{"id":10211,"date":"2014-01-15T09:24:20","date_gmt":"2014-01-15T09:24:20","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2014-01-15T09:24:20","slug":"en-US","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=10211","title":{"rendered":"NYT: N.S.A. Devises Radio Pathway Into Computers [from \u201cAnything is possible\u201d Dept.]"},"content":{"rendered":"<p>\u201cAnything is possible\u201d Dept.: NYT: <a href=\"http:\/\/www.nytimes.com\/2014\/01\/15\/us\/nsa-effort-pries-open-computers-not-connected-to-internet.html?hp&amp;_r=0\">N.S.A. Devises Radio Pathway Into Computers<\/a> by David E. Sanger and Thom Shanker:<\/p>\n<p><!--more--><\/p>\n<blockquote><p>WASHINGTON \u2014 The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.<\/p>\n<p>While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=10211\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-10211","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/10211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10211"}],"version-history":[{"count":0,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/10211\/revisions"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10211"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}