From my brief reading, it does require a 3G card of some kind. So as long as you remove any such thing from your offline machine you should be OK. But it's still scary of course.
"Intel actually embedded the 3G radio chip in order to enable its Anti Theft 3.0 technology. And since that technology is found on every Core i3/i5/i7 CPU after Sandy Bridge, that means a lot of CPUs, not just new vPro"
http://www.infowars.com/91497/The CPU itself is a 3G transmitter/receiver. The CPU contains a separate computer inside, with it's own memory and storage, it operates at Ring -2 and beyond which is below the operating system at Ring 0, it is also below a hypervisor at Ring -1. It cannot be detected by the operating system and it is standalone.
It can't access any data on harddisk though.
It can access the hard disk drive and any storage devices plugged into the computer, that is it's intended purpose, to be able to switch the computer on remotely and make changes to the operating system and hard disk drive.
Setup and configuration is the process that makes Intel AMT features accessible to management applications. Intel AMT devices are by default delivered in an unconfigured state. Before management applications can access an Intel AMT device, the device must be populated with various settings such as network configuration and security parameters.
Yeah this is complete lie, it is enabled by default and cannot ever be disabled, configuration is not necessary.
"Intel AMT backdoor enabled by default"
https://forums.lenovo.com/t5/Security-Malware/Intel-AMT-backdoor-enabled-by-default/td-p/824749"Yes, but our rootkit would still be active. We have determined that some AMT code is still being executed, regardless of whether AMT is disabled in BIOS or not. In our proof of concept rootkit we decided to subvert this very AMT code."
I would be interesting in seeing any links to actual exploits/demonstrations.
Many exploits exist using various approaches, a demonstration was given at the Black Hat Conference in Las Vegas a long time ago in 2009.
"Invisible Things Lab's Rafal Wojtczuk and Alexander Tereshkin will present two new technical presentations at this year's Black Hat Conference in Las Vegas, NV, in July. The first presentation will talk about a new type of stealth malware, that potentially could be more powerful than kernel-mode, hypervisor-mode, and even SMM-based rootkits"
http://theinvisiblethings.blogspot.com/2009/08/vegas-toys-part-i-ring-3-tools.htmlHere is the proof of concept code:
http://invisiblethingslab.com/resources/bh09usa/ring-minus-3-tools-1.3.tgzIt is concerning that you show an interest in 'how' it is done.