{"id":1410,"date":"2013-10-31T23:24:51","date_gmt":"2013-10-31T23:24:51","guid":{"rendered":"http:\/\/microsoftgeek.com\/?p=1410"},"modified":"2018-09-06T23:29:24","modified_gmt":"2018-09-06T23:29:24","slug":"how-the-nsa-is-infiltrating-private-networks","status":"publish","type":"post","link":"https:\/\/microsoftgeek.com\/?p=1410","title":{"rendered":"How the NSA is infiltrating private networks"},"content":{"rendered":"<p>The NSA, working with its British counterpart, the Government Communications Headquarters (GCHQ), secretly taps into the internal networks of Yahoo and Google, the two biggest Internet companies by overall data traffic. The operation intercepts information flowing between the enormous data centers that those companies maintain around the world. In general, Google and Yahoo use privately owned or leased lines to synchronize their data centers. This graphic shows how the NSA and GCHQ break into those internal networks, using Google\u2019s as an example. Less is known about Yahoo\u2019s networks, but the NSA operations are thought to be similar.<\/p>\n<div><img decoding=\"async\" alt=\"\" src=\"http:\/\/www.washingtonpost.com\/rw\/2010-2019\/WashingtonPost\/2013\/10\/30\/National-Security\/Graphics\/NSA_private_Google_1030a.jpg\" \/><\/div>\n<div><\/div>\n<div>SOURCE: Staff reports; Google,\u00a0<a href=\"http:\/\/www.google.com\/about\/datacenters\/\">www.google.com\/about\/datacenters<\/a>.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The NSA, working with its British counterpart, the Government Communications Headquarters (GCHQ), secretly taps into the internal networks of Yahoo and Google, the two biggest Internet companies by overall data traffic. The operation intercepts information flowing between the enormous data centers that those companies maintain around the world. In general, Google and Yahoo use privately [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[],"class_list":["post-1410","post","type-post","status-publish","format-standard","hentry","category-sec-secops"],"_links":{"self":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/1410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1410"}],"version-history":[{"count":2,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/1410\/revisions"}],"predecessor-version":[{"id":1412,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/1410\/revisions\/1412"}],"wp:attachment":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}