UFO Facts

Investigating the {Billy} Eduard Albert Meier case

We have 22 guests and no members online

Website Hits

What does AMD, Cisco, Hewlett-Packard, IBM, Intel, Juniper Networks, Lenovo, Microsoft, and Wave Systems have in common?

AMD, Cisco, Hewlett-Packard, IBM, Intel, Juniper Networks, Lenovo, Microsoft, and Wave Systems are all members and promoters of Trusted Computing Group along with contributors of well known companies like American Megatrends, Canon, Dell, Huawei Technologies, Jetway, Nokia, NVidia, Phoenix, Scandisk, Samsung, Seagate, Sony, Toyota. Toshiba and Western Digital, to name a few. So what you might ask.

The Trusted Computing Group have developed a system called "Trusted Platform Module (TPM): Built-in Authentication" or TPM. The following is from their website.

To date, more than 500 million PCs have shipped with the Trusted Platform Module (TPM), an embedded crypto capability that supports user, application, and machine authentication with a single solution. Enterprise systems from a variety of vendors, including Dell, HP, Lenovo and others, include the TPM, as do a new class of ultrabooks for both business and home use.
The TPM, a simple, yet revolutionary concept, ensures only authorized users and authorized PCs are on an enterprise network. It also acts as a secure vault for certificates, keys and passwords, negating the need for costly tokens.

So what you might ask again.

Microsoft explains what TPM is and does with Windows Vista and Windows Server 2008 and all newer versions of Windows. Basicly, with TPM there is a microchip on the computer motherboard, not all motherboards have these ... mine does not, which encrypts your whole hard disk partitions and stores the passwords on the microchip. Once you turn on your computer and it starts to boot into windows the passwords are read and the hard disks can be accessed.

From the article "Don't use Windows 8 due to risk of 'back doors', warns German government"

The German government has recommended that Federal Administration and other high profile public sector departments in the country do not use Windows 8 because, it warns, it contains security backdoors that cannot be controlled or trusted, and that may be easily accessible by the NSA.
The warnings are present in leaked documents obtained by German daily newspaper Zeit.de:
Due to the loss of full sovereignty over the information technology, the security objectives of 'confidentiality' and 'integrity' can no longer be guaranteed.
"This can have significant consequences on the IT security of the Federal Administration," the documents say.
The focus of the security concerns is the Trusted Computing technology standard, which has been in existence for more than a decade. It was developed by major US hardware and software manufacturers, including Intel, HP, AMD, Dell and Microsoft.The German government's documents allege that the group's core hardware element - a chip called the Trusted Platform Module (TPM), which appears in hardware built by Trusted Computing Group companies - interfaces directly with Windows 8 and enables Microsoft remote, unfettered access to any computer on which the operating system runs.
The leaked document is dated from early 2012 - pre-dating the release of Windows 8 - and explains how IT experts at the German Federal Office for Information Security (BSI) made these supposed discoveries.
They claim that they found out that the TPM chip's digital rights management (DRM) capabilities can decide which software on a computer can be enabled or disabled, and is fully remotely controlled by Microsoft.
The TPM 2.0 hardware interface - launched in late 2011 - is activated by default when a computer boots, and cannot be turned off.
The German government fears that access to these backdoor systems could easily be passed to the National Security Agency, the US spying agency, and its so-called Prism group, which is known to be involved in secretly recording internet data, such as emails and voice calls.
The scope of its activities were exposed when whistleblower Edward Snowden last month leaked several thousand documents to The Guardian newspaper.
The German government warns that use of Windows 8 - with such a believed risk from TPM - is "unacceptable for the Federal Administration and for operators of critical infrastructure".
It calls Windows 8 "already" unusable because of TPM 2.0, but that Windows 7 can be "operated safely until 2020".
Finally, the documents complain that German companies tried to get involved in the formation of TPM 2.0's standard, but were snubbed by the hardware companies involved.
However, the document asserts that the NSA was involved and enjoyed an influential role.
Shortly after Snowden sought refuge in Russia, the Russian government revealed that it was dumping all its PCs for sensitive work - and using typewriters instead.

 Of course, I cannot prove or disprove the information above. However on January 15th, 2007, 11:17 pm Eduard Meier had a contact (440) with Ptaah whereby the following was discussed

Billy Billy
Some time ago - if I may ask yet another question - you said that US secret services manipulate the Internet and the computer world - which I have also suggested in a bulletin about the CIA, whereby Microsoft is also embroiled in it with the Windows system. Can you tell me which US secret service is therein embroiled with Microsoft, along with the CIA, if it is also involved with that? Vor einiger Zeit - wenn ich nochmals eine Frage stellen darf - hast du gesagt, dass US-Geheimdienste das Internet und die Computerwelt manipulieren - was ich auch in einem Bulletin über die CIA angedeutet habe, wobei auch Microsoft mit dem Windows-System darin verwickelt sei -, kannst du mir sagen, welcher US-Geheimdienst bei Microsoft darin verwickelt ist, eben nebst der CIA, wenn diese auch daran beteiligt ist?
Ptaah Ptaah
The Windows-program system is manipulated through the US secret service, NSA, respectively, through the National Security Agency, as well as through other secret services. Das Windows-Programm-System ist manipuliert durch den US-Geheimdienst NSA resp. durch die National Security Agency sowie durch andere Geheimdienste.
The manipulation enables the secret services to penetrate into any computer, unrecognized and according to their desire, in order to pull out data or, unrecognized, to carry out alterations and falsifications of the existing data. Die Manipulation ermöglicht es den Geheimdiensten, unerkannt und nach Belieben in jeden Computer einzudringen, darin Daten herauszuholen oder unerkannt Änderungen und Fälschungen an den bestehenden Daten vorzunehmen.

So we have Eduard and Ptaah discussing how the NSA can penetrate into any computer and we have the information regarding TPM and Windows Operating Systems. I have my own opinion on this along with some critical thinking. A microchip designed by the aforementioned companies, which purpose is to store passwords and ecryption details and encrypt a system hard disk partition. A so called "back door" into this microchip could be used to then read passwords and then gain access to the entire contents of the hard disk partition, without the user, owner of the computer knowing.