If you haven't installed the processor yet, a Core vPro processor will access all your storage devices via the wSATA (wireless Serial ATA) connection built into every hard drive, optical drive and flash drive made since 2010.
I have a good war story you'll like: A computer uses radio-frequency energy to operate, and that energy can escape the confines of the computer's cabinet. The escaped energy is modulated by the data being processed...and it can be demodulated into the data with the right equipment. If the data is secret...well, that's bad. So the government has an approval process called Tempest that keeps this from happening.
One fine year, my unit received a lot of new PCs in late March. Our duty week ended on March 31, and April 1 was a work day for our day crew. So our fun-loving mission control officer typed up an Authentic-Looking Fake Message that claimed to be from our higher headquarters, and claimed that a Tempest issue had surfaced with the new machines. Lots of technical stuff in there and then came the instruction: the Tempest issue could be mitigated by covering the computer with a sheet of 2.5-mil clear polyethylene, which coincidentally was the exact thickness of an Army-issue 33-gallon trash bag. You were allowed to cut a hole in the bag for ventilation. He put this message in the day crew's read file and went home.
On April 4, we got to work and found these morons had put garbage bags or visqueen over every computer in the place. They even put one on my UYK-43

complete with the air hole...this is strange for three reasons: the UYK-43 wasn't on the message, a UYK-43 is three feet taller than a garbage bag is, and it doesn't need an air hole because it's water-cooled.