Special Reports & Tweets - 20140120_SpecialReport-2_Alex Aired: 2014-01-20 Duration: 03:07 === NSA's Evil Purposes (03:03) === [00:00:00] Look at what the NSA surveillance boss just said about this. [00:00:08] He said that the NSA has defined U.S. [00:00:11] surveillance programs as part of a noble mission to protect the nation, and that any reports about what they're doing are simply sensationalized. [00:00:19] Keith Alexander, the head of the NSA, said that not only was their mission noble, but that reports about what they're doing have been sensationalized. [00:00:28] Well, there is absolutely nothing about a secret shadow government That is breaking the law. [00:00:35] He's lied to Congress. [00:00:36] He and James Clapper have lied to Congress about what they're doing. [00:00:39] They're breaking the law. [00:00:40] They're simply criminals who don't think they're subject to the law. [00:00:43] And we've seen how the NSA is using PRISM in conjunction with large Internet companies. [00:00:50] But you're not even safe if you stay away from the Internet. [00:00:52] We now learn that there are backdoors even in your computer processor. [00:00:56] Take a look at this clip from Intel talking about their new generation of processors. [00:01:01] Unlike software-only solutions that require PCs to be powered on and software agents running on a fully functional OS, a hardware-assisted approach enables PCs to be managed regardless of system state and without requiring software agents. [00:01:16] The result? [00:01:18] IT or IT service providers can diagnose and fix problems without a deskside visit, schedule PCs to power down at night to cut energy costs, and still have the ability to power them up for off-hours patching. [00:01:31] So Intel reported about that, but it went again largely unnoticed. [00:01:35] But in this article we have today on InfoWars, secret 3G Intel chip gives Snoops backdoor PC access. It points out that the [00:01:43] Intel Core vPro processors contain a secret 3G wireless chip that [00:01:47] allows remote disabling and backdoor access to any computer [00:01:52] even if it's turned off and that's because it uses the system's [00:01:55] phantom power. So it can individually turn on hardware components and it can [00:02:00] access anything on your computer. [00:02:02] And it allows third parties to do this. [00:02:04] In that video that you just saw, Intel is bragging about how it can be used for system management. [00:02:09] And of course, like any technology, it can be used for good purposes or for bad purposes. [00:02:13] But we've already seen how the NSA uses all the technology that it gets for evil purposes, for spying on people. [00:02:20] It points out that the webcams can also be remotely accessed. [00:02:24] So any third party, and you can bet that an interested third party, is going to be the NSA. [00:02:30] And, as a former NSA director said just ten days ago, they want to see our internet, he wants to see our internet, look more like China's. [00:02:39] He said it's too much like the Wild West. [00:02:41] Well, you know what? [00:02:41] In the Wild West, in America's frontier past, we had respect for individual liberty. [00:02:47] Not in China. === People Speaking Out (00:18) === [00:02:49] If the government in China doesn't like what you're saying, they can grab you and force you to confess your crimes in public. [00:02:55] Well, it's not just Internet dissenters that they're cracking down on in China. [00:02:59] Of course, they crack down on people who are dissenting apart from the Internet. [00:03:03] People who are speaking out about human rights violations against forced abortions.