The most important document ever produced by this web site is here: Nuclear Sabotage at Fukushima
To read the Fukushima report in German, Click here and for the original click here
Bookmark the linked article, and whenever anyone calls you a conspiracy nutjob show it to them. Having the CIA make an announcement like this puts it in stone.
The CIA has officially announced that they are going to keep a record of EVERY VIDEO, EVERY CONVERSATION, EVERY MAIL, EVERY SINGLE PHOTO YOU EVER TOOK, A TOTAL INFORMATION LOCKDOWN. And unsaid in the linked article below is that they will be using wifi networks and Intel processors which have embedded 3g connectivity built into all of them (all current processors) to raid this information from computers that never "go online".
This means that everything you ever typed is theirs, everything ever stolen by a botnet, every last thing that ever went across the web or was gathered by other means will be permanently recorded in the CIA database. What makes this storage offer unique? Well, the fact that The CIA's OWN Gus Hunt has publicly stated it, READ THAT LINK. THIS IS NOT AN ALEX SCARE.
This will spell the end of data security as we knew it. And if you have a hard drive crash the data integrity won't be yours, if you crash your hard disk I don't think the CIA is going to allow you to access YOUR DATA on THEIR exabyte raid array.
1. Buying Intel i series processors Sandy Bridge or later, or ANY intel processor with CoreVPro technology (anything current).
2. Having your computer be wifi capable, bluetooth capable, or 3g capable, even if you never go online.
3. MOST IMPORTANTLY FOR MOST OF US - believing you can secure a Microsoft operating system.
The following is the best security info you are likely to read anywhere.
A secure Microsoft system is one of two things. (1) 200 or more feet underground in solid bedrock, with no connection to the outside whatsoever, or (2) 15 or more years old, with no Wifi, bluetooth, or any other sort of wireless technology installed, as well as locked in a closet.
I was in contact with a Microsoft programmer for a couple of mails before he went silent (mail censorship). In the two mails I received, he was at least able to say that Microsoft operating systems have as a feature, not a vulnerability, the ability to be breached at will, AS A FEATURE, by anyone who knew the correct commands to walk right in through a paralell FRONT door. He said it was top secret, prison term stuff to talk about, and that this door was there for the government and other priviledged people to use at will. In addition to this, this programmer made it perfectly clear that Microsoft worked hand in hand with McCaffee and Norton to make good and sure that not only did those two security products not interfere with this front door, but that in addition to the front door both McCaffee and Norton provided alternatives to it.
Many of you may know about a software application called PC anywhere, which allows full remote administration of any PC it is installed on. The front door this programmer spoke of, which is built into all Microsoft operating systems WORKS THE SAME WAY and can operate in paralell with the main user's front door, and provides a spook with the ability to open a session on your PC which is completely hidden to you and every bit as capable as the main user session. It's the same as hooking up two monitors, keyboards, and mice, and having two users use the same processor. This programmer used PC Anywhere as an example of how the front door built into all Microsoft operating systems since Windows 95 works. Obviously this front door will allow access to all data, but in addition to this it also allows fully remote installation of applications, deletion and modification of files, uploading of files to be used as "evidence", files which would remain hidden to the owner of the PC until a forensic examination revealed them, and any other abilities the real owner of the PC would have, and it all happens live, over the web, with the screen and input device control on the spook PC being provided by YOUR COMPUTER.
This programmer was going to tell me how to log into this second front window (he was nervous about just saying it all at once) and before that happened, all mails went silent.
So if anyone out there wonders why I don't use encryption, and don't do anything to secure my Microsoft PC, the answer is simple - THE FINAL AND MOST ADVANCED SYSTEM SECURITY KNOWLEDGE THAT ANY IT PROFESSIONAL COULD EVER HAVE IS KNOWING THAT WHEN DEALING WITH THE GOVERNMENT OR JEWISH COMMUNITY, NO SECURITY EXISTS AT ALL. Your security efforts are good ONLY against high school hackers and other idiots not on the inside track.
So you think no one can access your data because your computer is turned off. Heck it's more than turned off, you even took the main hard drive out, and only the backup disk is inside. There is no operating system installed at all. So you KNOW you are safe.
Frank from across the street is an alternative operating systems hobbyist, and he has tons of computers. He has Free BSD on a couple, his own compilation of Linux on another, a Mac for the wife, and even has Solaris on yet another. Frank knows systems security, so he cannot be hacked . . . . . . . or so he thinks.
The government does not like Frank much, because they LOVE to look at everything. Privacy is a crime don't you know, and it looks like Frank's luck with privacy is about to run out.
The new Intel Core vPro processors contain a new remote access feature which allows 100 percent remote acess to a PC 100 percent of the time, even if the computer is TURNED OFF. Core vPro processors contain a second physical processor embedded within the main processor which has it's own operating system embedded on the chip itself. As long as the power supply is available and and in working condition, it can be woken up by the ALWAYS ON 3G connection in the Core vPro processor, which runs on the system's phantom power and is able to quietly turn individual hardware components on and access anything on them.
This is being touted as something that makes IT administration easy. It is being advertised as something that will allow IT professionals the ability to remotely troubleshoot a PC no matter what is wrong with it. It allows IT professionals to view the contents of hard drives, check the memory, or hunt for problems on a machine without actually being in front of it. And to that, I call B.S, outside of snooping it's only real world applications would involve accessing a recovery partiton and restoring the computer to out of box state, installing software outside the knowledge of the main operating system, and secretly placing or deleting files.
But the intelligence agencies LOVE THIS. Because Frank is going on vacation soon and they know it. They have listened to all of his calls. They KNOW frank is a terrorist, because they have never been able to access anything Frank has done with a PC, and who would hide their use, other than a criminal? Frank keeps his computers up to date, and THREE of them now have Core vPro processors in them, and when Frank is gone, they are going to get their chance to access ALL of his files because the main backup hard disk went into the newest machine.
If a system has the ram chips pulled, a Core vPro processor will read the hard disk anyway because it has all the ram it needs embedded in the vPro core.
If you encrypted your hard drive, a Core vPro processor will read it anyway, because it snagged your encryption key
If your system has been taken apart, and has no video card, ram, floppy, or hard drive, your Core vPro processor nailed you, because you left a flash drive plugged in. Or a CD in the CD drive. And what about that web cam?
The bottom line? The Core vPro processor is the end of any pretend privacy. If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web AT ALL, think again. There is now more than just a ghost in the machine.
The Zionist, Globalist, Banker scamming war mongering cabal has a history of using the marketing of security as a means to remove ALL security and nail you. If you believe Intel's cheerful hype about these processors making things more secure than ever, think again, because any processor which allows a machine to be accessed even when it's turned off equates to an information tyrant's dream come true Please engage your brain while watching this, the security pitch is unadulterated B.S. These processors in fact represent an ABSOLUTE BREACH of security no matter HOW they are marketed. From the techinical viewpoint of someone who worked for an intelligence agency, I call B.S. on Intel, avoid these processors like the plague.
I had a decent Compaq laptop I had to ditch after doing the Fuku report. Everything about that laptop was perfect for me - a rugged design, a powerful processor, a good screen, and most importantly - a factory mirrored restore partition, rather than a partition that had install files. The difference between the two is when it is a mirrored factory restore, to return your PC to out of box state it takes less than 10 minutes rather than the hours a non mirrored restore takes. Both wipe the machine equally.
So I had gotten into the habit of putting all files on an external drive and totally wiping the machine every two or three days because a full system wipe was a non event with that particular laptop, it was just so easy. But after the Fuku report, something strange started happening after the wipes - even without EVER hooking up to the web or ANY wifi network at all - After the computer had sat for a few hours after a wipe, a microsoft update would announce it was ready for installation. This made a simple fact obvious - there was a way for that computer to go online or be accessed and force fed entirely without me knowing it.
So I pulled the WIFI card out and did a restore and NO UPDATES CAME IN. Interesting. This ruled out any local files being present to do it. I had no wifi network and no authorized connection, so how the * was that computer having updates come in through the wifi? I had already checked the neighboring connections and all of them required password log ins, there were no open networks. There was no way for that laptop to reach out. So HOW could this be happening?
There is only one answer
When doing the Fuku report, the spooks HAD TO have accessed my machine through the cell modem, scanned all neighboring wifi connections, and set THOSE up to hack my system through the wifi. It's the ONLY ANSWER. This means that if you have a computer that has wifi capability that you are not using, you are NOT safe from getting hacked as long as there are other networks in sight. But it goes even beyond that - it is possible to set up hidden WIFI networks that remain totally invisible to your PC when it scans for available networks, by simply making the connection private. So even if you cannot see a network it does not mean one is not there.
Bluetooth presents exactly the same problem, so if you have bluetooth or wifi capabilities you are not using and you want your system to be private, PULL THEM OUT. Simply disabling them won't cut it.
Other security hacks such as receiving the EMF from your processor are too difficult to use on little people. Those methods are typically reserved for spying on governments and other big fish. If you keep in mind what I have stated above, it will go a long way towards preventing your data from getting nabbed by the CIA. If you ever hook up to the web however, its as good as kissing it goodbye on whatever PC you use to do it.