YOUR PC WAS PRE HACKED AT THE FACTORY!
hacker inside your tower, your hard drive,
                  pre-installed
Your Software and HARDware were both Hacked Already tiger. We are IN LIKE FLYNN!

... This news from:
http://www.veteranstoday.com/2016/05/21/spyware-linked-to-nsa-discovered-in-hard-drives-across-the-world/

Source - Spyware Linked To NSA Discovered In Hard Drives Across The World
http://dailycaller.com/2015/02/17/spyware-linked-to-nsa-discovered-in-hard-drives-across-the-world/

All computing devices designed by Western companies are likely fatally compromised by in-built backdoors

By Ian Greenhalgh on May 21, 2016

When I read this article I was so shaken by the implications that I turned to Mike Harris, our resident expert in the computing industry, for verification that it could be true. Mike replied:

    Absolutely, not only hard drives but also back doors within microprocessors, which is why Putin mandated last year that Russia no longer buy any Intel or AMD products and that Russia design and manufacture their own.

Mike added:

    People need to understand just how exposed they are.

Let's think about the implications of this -- every computing device could be fundamentally compromised by software code built into the firmware of the electronic components.

Therefore, there is no security, it is all totally undermined by these 'backdoors'. This is worrying enough when it is your home computer, laptop or cell phone that is at risk, but when you consider the same issue applies to computers doing much more important tasks such as monitoring nuclear reactors or processing signals in the fly-by-wire system of a fighter jet then things become exponentially more worrying.

In short, the entire concept of computer security is fundamentally undermined by this revelation.

While the immensity of the implications of this discovery were sinking in I happened to mention to Mike that one of Intel's main design centres was in Israel. Mike replied:

    They have many design centers, but they made a coordinated effort to locate R&D assets in Israel; former Intel CEO Andy Grove was an avid pro-Israel Zionist.

Oh, so that means that it's not just the NSA who can access these backdoors, the Israelis will no doubt have access too, seeing as they were designed into the devices in Israel in the first place! Mike further explained:

    That has been an Israeli initiative for some time now, as it gives them access to R&D that they would never have on their own and they have nothing to offer, only to gain; then they resell the tech to other countries and steal the IP from the companies. It is a racket for the Zionists.


What a racket! In a computerised world, holding the secret key to the hidden backdoors within all computing devices gives you a massive degree of control and access to almost any information held in computerised form -- which is virtually all information!

I looked at wikipedia and learned that there are over 250 foreign R&D Centers in Israel:

List of multinationals with research and development centres in Israel >

https://en.wikipedia.org/wiki/ List_of_multinationals_with_research_and_development_centres_in_Israel


Intel established their R&D centre in Israel way back in 1974; AMD followed suit in 2011, opening an R&D centre in Ramat Gan, near Tel-Aviv. Mike commented on the AMD move:

    "Funny how that works and Putin forbids the sale of their products within 18-24 months after that; then tie that to the improvements in Russia military capabilities shortly after that.  I am sure you are connecting the dots..."


Sure I'm connecting the dots; as the Russians obviously found out about these backdoors some time ago, hence they stopped using components containing the nefarious code, leading to Putin's initiative for Russia to develop their own semiconductor products with the result that their military capabilities are improved by the removal of compromised Western components and replacement with Russian ones.

Russian state news agency TASS reported last year that Russia wants to replace US computer chips with local processors:

...... http:// tass.ru /en/economy/736804

...... "Russia's Industry and Trade Ministry plans to replace US microchips Intel and AMD, used in government's computers, with domestically-produced micro processor Baikal in a project worth dozens of millions of dollars.

...... The Baikal micro processor will be designed by a unit of T-Platforms, a producer of supercomputers, next year, with support from state defense conglomerate Rostec and co-financing by state-run technological giant Rosnano."


Replacing compromised foreign products with sound domestic ones will no doubt make Russian readers sleep a little more soundly, knowing their military is wise to the racket and has taken steps to remedy the situation. However, it has a far more unsettling effect on those of us who live in countries who posses militaries armed and equipped with compromised hardware.

I happen to be 17 miles from a nuclear power station as I write this article and I can't help but wonder just how secure the computers that control those reactors are, if they contain compromised components with backdoors for bad guys to slip through and do untold damage. The Fukushima disaster may well have been partly caused by a cyber attack; now we can see just how vulnerable to such attacks we are.
__________


Spyware Linked To NSA Discovered In Hard Drives Across The World

Giuseppe Macri, The Daily Caller

http://dailycaller.com/2015/02/17/spyware-linked-to-nsa-discovered-in-hard-drives-across-the-world/

Noted cybersecruity firm Kaspersky Lab has discovered evidence of advanced spyware likely tied to the National Security Agency embedded deep in hard drives from more than a dozen manufacturers worldwide.

According to the Moscow-based firm, which released a report detailing the threat Monday, the spyware is able to reprogram the firmware of infected hard drives and inject the computers they're built into with highly effective and evasive malware, adept at gathering information and avoiding detection.

Attributed to hackers dubbed "The Equation Group" by Kaspersky, the threat "surpasses anything known in terms of complexity and sophistication of techniques," and has been active in major hard drives manufactured by Western Digital, Seagate, Toshiba and others in more than 30 countries over the last 20 years.

The suite of surveillance platforms has been behind more than 500 attacks against military and government institutions, banks, telecommunications companies, energy companies, Islamic activists and media in Iran, Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen, Algeria and others.

According to Kaspersky, the number of attacks is likely much higher -- possibly in the tens of thousands -- but self-destruct mechanisms embedded in the infections makes the true number virtually uncountable.

While the firm did not mention the NSA by name in its report, Equation Group was linked to the Stuxnet virus deployed by the signals intelligence agency between 2007 and 2008 to sabotage Iranian uranium enrichment centrifuges, which successfully destroyed about one-fifth of the country's nuclear enrichment infrastructure.

Spokespersons for both Western Digital and Seagate deny sharing their hard drives' source code with the government. However, a former NSA analyst confirmed to Reuters that the NSA has ways of obtaining the source code for hard drives from companies, including "posing as a software developer" or requesting a security audit for a proposed purchase.

    "They don't admit it, but they do say, 'We're going to do an evaluation, we need the source code,'" former NSA analyst Vincent Liu said in the report.

    "It's usually the NSA doing the evaluation, and it's a pretty small leap to say they're going to keep that source code."


Kaspersky's report also details the existence of an Equation Group tool known as the "Fanny" worm, which is used to surveil computer networks not connected to the Internet. The worm is installed in secret compartments on intercepted USB sticks or CD-ROMS, and infects such "air-gapped" networks when inserted into a computer on that network. The worm then transmits the information it gleaned back to Equation after it's plugged into an Internet-connected computer again.

Vulnerabilities uncovered by Fanny were later found to have been exploited by Stuxnet.

Read more:

http://dailycaller.com/2015/02/17/spyware-linked-to-nsa-discovered-in-hard-drives-across-the-world/

___
Posted by Ian Greenhalgh

http://www.veteranstoday.com/author/iangreenhalgh/

Filed under Investigations >

http://www.veteranstoday.com/category/false-flag-investigations/


    It's also a timely article, as this subject has also been a big blip on my own radar now for several months. The problem is indeed as bad as you state... It's possibly even worse.

    Couple all this state-sponsored malware with the recent deluge of ransomware attacks, and marked increases in other unusually sophisticated [and very damaging] cyber-threats, and it becomes clear that there is a coordinated effort afoot to create chaos in the silicon world. (Such subversive efforts are obviously ALSO being stepped up on more conventional fronts, as well: Ukraine, Syria, Brazil, Venezuela, Macedonia, to name just a few. (Oops.. can't leave out Orlando!)

    No doubt the Unit 8200 Reprobate Army is very busy these days. And their Western Zio-Media crime syndicate buddies always blame it all on Russia, China, or Korea... ***as expected***

    Here's a tip for anyone out there reading this that suspects they have been targeted by this state-sponsored garbage: There are a few tools available that WILL actually detect some of it (NOTHING will likely detect their most current stuff; also the so-called "antivirus" vendors all white-list it, anyhow, per Cabal orders.) Google "APT Scanner" -- it should lead you to a few options. (APT is short for "Advanced Persistent Threat"). You might be surprised what you find with these tools... Don't be; it's not that uncommon.

COMMENTS:    cyber-attacks are the way they run martial law in nations. one stroke in the keyboard... and no electricity, no water, no food, and the american dream becomes a nightmare. In fact we have no idea how many viruses are in america's computers, databases, electricity supply and army equipment. But once they activate... it's the end of the american dream, and the descent into the american nightmare.

        You're closer to the truth than you can imagine: part of a suicide note left by a FED that committed suicide.. see note to Preston below.

        "When the inevitable collapse begins to take place, electric power to the entire country will be shut off, as will all forms of communication. All banks will be immediately closed; no one will be able to get any money because all ATM's will be offline. Credit, Debit and EBT cards will not function. Anyone without cash will have no way to get any. The Emergency Alert System will be used to takeover all broadcast stations and tell the public this is a result of a cyber attack.

COMMENTS:
    I can make it even much more scarier for you. Traditional hard drives are being replaced by much faster solid state drives (SSD) even in older existing laptops. So as to transform an older machine into a much faster computer at bargain prices for consumers. Next step: after the integration of core microprocessors with random access memory and SSD, (and size reduction) no one will ever be able to figure out any leaks in the complexity. The NSA may think they are much more clever than all the rest, but are in fact hard wired into Mossad (who are controlled by another force).

    After the main stream introduction and acceptance of wearables (including electronic money) by the general public as a blessing or even an unavoidable necessity, populations will be able to be totally mind controlled. As a newfound atheistic / scientific religion people will believe and love the virtual reality and the direction hive mind (no more borders and complete equality in intelligence, opinion, race, culture, transhumanism, transgenderism, artificial life extension of some human bodies and artificial intelligence). In return they might even be given free energy. The death of the human soul / spirit could be a complete achievement within 30 to 40 year. (see also "Phantom Self" by David Icke).

<=====BACK TO EVERYTHING THE NEWBIE WANTS TO KNOW ABOUT COMPUTING