Is Intel Active Management Technology (Intel® AMT) really a snooping technology?

I happen to come across this article talking about the potential risk with Intel® AMT technology. The article goes on to say "But what if it were hacked? Or what if they hacked it?"

And get access to the data stored on the non-volatile memory. Hmmm... I don't think so.

IT administrators managing large network of computers have been screaming for a solution that enables them to monitor systems and repair them remotely (obviously in a secure way), thus simplifying the overall support overhead. The information stored in the non-volatile memory is very limited for this purpose and this provides a solution for a real IT problem.
Some users are claiming here that "It'll get out, it'll be compromised. Count on it. And, the best part, your computer doesn't even have to be turned on!"

On the other hand, Intel AMT is designed to do exactly the opposite to improve the security and compliance in the enterprise computing environment. And Intel engineers have put their best minds together to architect a secure solution. Read more here..

"Attacks via the internet are on the increase, and some have suggested the proceeds from cyber crime exceeded revenues from the sale of illegal drugs in 2005. Managing a "farm" of hundreds or thousands of "zombie" PCs to use as tools for spreading spam and malware can be a profitable business venture. As long as modifications can be made to Operating System components, individual PCs attached to networks are exposed."

I am bringing this topic up in this blog to discuss it head-on. I am curious to see what users of this community (who are actively developing applications using Intel AMT technology really think) and the Intel AMT technical experts think. Well, is this really a problem?
Reportez-vous à notre Notice d'optimisation pour plus d'informations sur les choix et l'optimisation des performances dans les produits logiciels Intel.