| Time | Text |
|---|---|
|
NSA's Evil Purposes
00:03:03
|
|
| Look at what the NSA surveillance boss just said about this. | |
| He said that the NSA has defined U.S. | |
| surveillance programs as part of a noble mission to protect the nation, and that any reports about what they're doing are simply sensationalized. | |
| Keith Alexander, the head of the NSA, said that not only was their mission noble, but that reports about what they're doing have been sensationalized. | |
| Well, there is absolutely nothing about a secret shadow government That is breaking the law. | |
| He's lied to Congress. | |
| He and James Clapper have lied to Congress about what they're doing. | |
| They're breaking the law. | |
| They're simply criminals who don't think they're subject to the law. | |
| And we've seen how the NSA is using PRISM in conjunction with large Internet companies. | |
| But you're not even safe if you stay away from the Internet. | |
| We now learn that there are backdoors even in your computer processor. | |
| Take a look at this clip from Intel talking about their new generation of processors. | |
| Unlike software-only solutions that require PCs to be powered on and software agents running on a fully functional OS, a hardware-assisted approach enables PCs to be managed regardless of system state and without requiring software agents. | |
| The result? | |
| IT or IT service providers can diagnose and fix problems without a deskside visit, schedule PCs to power down at night to cut energy costs, and still have the ability to power them up for off-hours patching. | |
| So Intel reported about that, but it went again largely unnoticed. | |
| But in this article we have today on InfoWars, secret 3G Intel chip gives Snoops backdoor PC access. It points out that the | |
| Intel Core vPro processors contain a secret 3G wireless chip that | |
| allows remote disabling and backdoor access to any computer | |
| even if it's turned off and that's because it uses the system's | |
| phantom power. So it can individually turn on hardware components and it can | |
| access anything on your computer. | |
| And it allows third parties to do this. | |
| In that video that you just saw, Intel is bragging about how it can be used for system management. | |
| And of course, like any technology, it can be used for good purposes or for bad purposes. | |
| But we've already seen how the NSA uses all the technology that it gets for evil purposes, for spying on people. | |
| It points out that the webcams can also be remotely accessed. | |
| So any third party, and you can bet that an interested third party, is going to be the NSA. | |
| And, as a former NSA director said just ten days ago, they want to see our internet, he wants to see our internet, look more like China's. | |
| He said it's too much like the Wild West. | |
| Well, you know what? | |
| In the Wild West, in America's frontier past, we had respect for individual liberty. | |
| Not in China. | |
|
People Speaking Out
00:00:18
|
|
| If the government in China doesn't like what you're saying, they can grab you and force you to confess your crimes in public. | |
| Well, it's not just Internet dissenters that they're cracking down on in China. | |
| Of course, they crack down on people who are dissenting apart from the Internet. | |
| People who are speaking out about human rights violations against forced abortions. | |