I don't see how your links/quotes even remotely support your claim. Are you arguing that Intel adding a switch to toggle ME on/off for a local machine, at the behest of government agencies, is proof that those government agencies have a backdoor into ME (which in turn can compromise the whole machine) for every system with ME? Because the former in no way implies that latter.
There exists what one basically can say a CPU within your CPU with its own Operating System, residing in ring -3 [1], independent of any OS/Software [2], able to use TCP/IP [3] even when PC is turned off (!)[4], collects the most critical hardware information the moment PC is turned on [5], is able to FULLY REMOTELY control your PC [6][7][8], named Intel Management Engine (also AMD Secure Platform) and only one entity, the incredibly disgraceful NSA, knows how to turn this off [9][10] despite scientists and engineers even google [11] (which was not liking the taste if its own medicine) trying hard for years to disable it and failed, and you are saying these are not relevant to my "claim"?! Wow.Your original links do not claim at all that Intel (or AMD) created these management features on the behest of the NSA, merely that they developed a way to shut them off locally (presumably you'd need firmware access, like this vulnerability, to shut them off remotely) at the behest of the NSA. This could be because the NSA wants the ability to hack into systems, or it could be because the NSA wants the ability to open up seized systems as part of an investigation, or because the NSA wants full security control of the systems it uses internally.
NSA (and NSA only) having a kill switch to such a hardware speak volumes for itself! Things become darker quickly if we remember NSA's shameful, disgraceful, predatory and criminal history (as exposed by whistleblowers who are witch hunted for life) as well.
My point is, why is everyone silent about the elephants in the room, but when a CPU Vulnerability is exposed, the fear-mongering is brutal!
________________________
[1]: Wikipdia:
The ME is colloquially categorized as ring −3, below System Management Mode (ring −2) and the hypervisor (ring −1), all running at a higher privilege level than the kernel (ring 0).
[2]: Same
[3]: Wikipedia:
The ME has its own MAC and IP address for the out-of-band management interface, with direct access to the Ethernet controller;
[4]: Wikipedia:
The Intel Management Engine always runs as long as the motherboard is receiving power, even when the computer is turned off.
[5]: Intel:
Intel AMT stores the following information in flash (Intel ME data):
* PC manufacturer-configurable parameters:
* Setup and configuration parameters such as passwords, network configuration, certificates, and access control lists (ACLs).
* Other configuration information, such as lists of alerts and Intel AMT System Defense policies.
* The hardware configuration captured by the BIOS at startup.
[6]: Intel (note: Intel AMT is a sub-part of Intel Management Engine):Intel AMT is part of the Intel vPro technology offering. Platforms equipped with Intel AMT can be managed remotely, regardless of its power state or if it has a functioning OS or not.
[7]: Wikipedia:
"full control of affected machines, including the ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data."
[8]: StackExchange (read the answer):
How can I prevent a computer from turning ON?
[9]: TheRegister:
On Monday, Positive Technologies researchers said they had found a way to turn off the Intel ME by setting the undocumented HAP bit to 1 in a configuration file.
HAP stands for high assurance platform. It's an IT security framework developed by the US National Security Agency.
[10]: Wikipedia:
the ME contains a switch to enable government authorities such as the NSA to make the ME go into High-Assurance Platform (HAP) mode after boot. This mode disables most of ME's functions.
[11]: Wikipedia:
As of 2017, Google was attempting to eliminate proprietary firmware from its servers and found that the ME was a hurdle to that.