{"id":39488,"date":"2014-02-10T13:48:38","date_gmt":"2014-02-10T13:48:38","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=39488"},"modified":"2015-05-05T22:11:07","modified_gmt":"2015-05-05T21:11:07","slug":"selling-your-secrets-the-invisible-world-of-software-backdoors-and-bounty-hunters","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/02\/selling-your-secrets-the-invisible-world-of-software-backdoors-and-bounty-hunters\/","title":{"rendered":"Selling Your Secrets: The Invisible World of Software Backdoors and Bounty Hunters"},"content":{"rendered":"<p>Imagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night.\u00a0 Imagine that, once inside, you could observe everything happening, unnoticed by others &#8212; from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also that you have the ability to silently record everybody\u2019s actions, whether they are at work or play without leaving a trace. Such omniscience could, of course, make you rich, but perhaps more important, it could make you very powerful.<\/p>\n<p>That scenario out of some futuristic sci-fi novel is, in fact, almost reality right now.\u00a0 After all, globalization and the Internet have connected all our lives in a single, seamless virtual city where everything is accessible at the tap of a finger. We store our money in online vaults; we conduct most of our conversations and often get from place to place with the help of our mobile devices. Almost everything that we do in the digital realm is recorded and lives on forever in a computer memory that, with the right software and the correct passwords, can be accessed by others, whether you want them to or not.<\/p>\n<p>Now &#8212; one more moment of imagining &#8212; what if every one of your transactions in that world was infiltrated? What if the government had paid developers to put trapdoors and secret passages into the structures that are being built in this new digital world to connect all of us all the time? What if they had locksmiths on call to help create master keys for all the rooms? And what if they could pay bounty hunters to stalk us and build profiles of our lives and secrets to use against us?<\/p>\n<p>Well, check your imagination at the door, because this is indeed the brave new dystopian world that the U.S. government is building, according to the latest revelations from the treasure trove of documents released by National Security Agency whistleblower <a href=\"http:\/\/www.freesnowden.is\/index.html\"  target=\"_blank\">Edward Snowden<\/a>.<\/p>\n<p>Over the last eight months, journalists have dug deep into these documents to reveal that the world of NSA mass surveillance involves close partnerships with a series of companies most of us have never heard of that design or probe the software we all take for granted to help keep our digital lives humming along.<\/p>\n<p>There are three broad ways that these software companies collaborate with the state: a National Security Agency program called \u201c<a href=\"http:\/\/www.nytimes.com\/2013\/09\/06\/us\/nsa-foils-much-internet-encryption.html?pagewanted=all&amp;pagewanted=print\"  target=\"_blank\">Bullrun<\/a>\u201d through which that agency is alleged to pay off developers like RSA, a software security firm, to build \u201cbackdoors\u201d into our computers; the use of \u201c<a href=\"http:\/\/www.nytimes.com\/2013\/07\/14\/world\/europe\/nations-buying-as-hackers-sell-computer-flaws.html?pagewanted=print%27\"  target=\"_blank\">bounty hunters<\/a>\u201d like Endgame and Vupen that find exploitable flaws in existing software like Microsoft Office and our smartphones; and finally the use of data brokers like <a href=\"http:\/\/www.corpwatch.org\/article.php?id=15920\"  target=\"_blank\">Millennial Media<\/a> to harvest personal data on everybody on the Internet, especially when they go shopping or play games like Angry Birds, Farmville, or Call of Duty.<\/p>\n<p>Of course, that\u2019s just a start when it comes to enumerating the ways the government is trying to watch us all, as I explained in a previous TomDispatch piece, \u201c<a href=\"http:\/\/www.tomdispatch.com\/post\/175757\/\"  target=\"_blank\">Big Bro is Watching You<\/a>.\u201d For example, the <a href=\"http:\/\/www.corpwatch.org\/article.php?id=15864\"  target=\"_blank\">FBI uses hackers<\/a> to break into individual computers and turn on computer cameras and microphones, while the NSA collects bulk cell phone records and tries to harvest all the data traveling over <a href=\"http:\/\/www.corpwatch.org\/article.php?id=15862\"  target=\"_blank\">fiber-optic cables<\/a>. In December 2013, computer researcher and hacker Jacob Appelbaum revealed that the NSA has also built hardware with names like <a href=\"http:\/\/cryptome.org\/2013\/12\/appelbaum-30c3.pdf\"  target=\"_blank\">Bulldozer<\/a>, Cottonmouth, Firewalk, Howlermonkey, and Godsurge that can be inserted into computers to transmit data to U.S. spooks even when they are not connected to the Internet.<\/p>\n<p>\u201cToday, [the NSA is] conducting instant, total invasion of privacy with limited effort,\u201d Paul Kocher, the chief scientist of Cryptography Research, Inc. which designs security systems, <a href=\"http:\/\/www.nytimes.com\/2013\/09\/06\/us\/nsa-foils-much-internet-encryption.html\"  target=\"_blank\">told<\/a> the <em>New York Times<\/em>. \u201cThis is the golden age of spying.\u201d<\/p>\n<p><strong>Building Backdoors<\/strong><\/p>\n<p>Back in the 1990s, the Clinton administration promoted a special piece of NSA-designed hardware that it wanted installed in computers and telecommunication devices. Called the <a href=\"https:\/\/epic.org\/crypto\/clipper\/\"  target=\"_blank\">Clipper Chip<\/a>, it was intended to help scramble data to protect it from unauthorized access &#8212; but with a twist. \u00a0It also transmitted a &#8220;Law Enforcement Access Field&#8221; signal with a key that the government could use if it wanted to access the same data.<\/p>\n<p>Activists and even software companies fought against the Clipper Chip in a series of political skirmishes that are often referred to as the <a href=\"http:\/\/www.nytimes.com\/1994\/06\/12\/magazine\/battle-of-the-clipper-chip.html\"  target=\"_blank\">Crypto Wars<\/a>. One of the most active companies was RSA from California.\u00a0 It even printed posters with a call to \u201c<a href=\"https:\/\/w2.eff.org\/Misc\/Graphics\/sinkclipper.gif\"  target=\"_blank\">Sink Clipper<\/a>.\u201d By 1995, the proposal was dead in the water, defeated with the help of such unlikely allies as broadcaster Rush Limbaugh and Senators John Ashcroft and John Kerry.<\/p>\n<p>But the NSA proved <a href=\"http:\/\/www.propublica.org\/article\/the-nsas-secret-campaign-to-crack-undermine-internet-encryption\"  target=\"_blank\">more tenacious<\/a> than its opponents imagined.\u00a0 It never gave up on the idea of embedding secret decryption keys inside computer hardware &#8212; a point Snowden has emphasized (with the documents to prove it).<\/p>\n<p>A decade after the Crypto Wars, RSA, now a subsidiary of EMC, a Massachusetts company, had changed sides.\u00a0 According to an investigative report by Joseph Menn of Reuters, it allegedly took <a href=\"http:\/\/www.reuters.com\/article\/2013\/12\/20\/us-usa-security-rsa-idUSBRE9BJ1C220131220\"  target=\"_blank\">$10 million<\/a> from the National Security Agency in exchange for embedding an NSA-designed mathematical formula called the <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2007\/11\/the_strange_sto.html\"  target=\"_blank\">Dual Elliptic Curve Deterministic Random Bit Generator<\/a> inside its Bsafe software products as the default encryption method.<\/p>\n<p>The Dual Elliptic Curve has a \u201cflaw\u201d that allows it to be hacked, as even RSA now admits. Unfortunately for the rest of us, Bsafe is built into a number of popular personal computer products and most people would have no way of figuring out how to turn it off.<\/p>\n<p>According to the Snowden documents, the RSA deal was just one of several struck under the NSA\u2019s Bullrun program that has cost taxpayers over <a href=\"http:\/\/www.ibtimes.com\/edward-snowden-reveals-secret-decryption-programs-10-things-you-need-know-about-bullrun-edgehill\"  target=\"_blank\">$800 million<\/a> to date and opened every computer and mobile user around the world to the prying eyes of the surveillance state.<\/p>\n<p>\u201cThe <a href=\"https:\/\/www.eff.org\/deeplinks\/2013\/09\/crucial-unanswered-questions-about-nsa-bullrun-program\"  target=\"_blank\">deeply pernicious nature<\/a> of this campaign &#8212; undermining national standards and sabotaging hardware and software &#8212; as well as the amount of overt private sector cooperation are both shocking,\u201d wrote Dan Auerbach and Kurt Opsahl of the Electronic Frontier Foundation, a San Francisco-based activist group that has led the fight against government surveillance. \u201cBack doors fundamentally undermine everybody&#8217;s security, not just that of bad guys.\u201d<\/p>\n<p><strong>Bounty Hunters<\/strong><\/p>\n<p>For the bargain basement price of $5,000, hackers offered for sale a <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2012\/03\/23\/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits\"  target=\"_blank\">software flaw<\/a> in Adobe Acrobat that allows you to take over the computer of any unsuspecting victim who downloads a document from you.\u00a0 At the opposite end of the price range, Endgame Systems of Atlanta, Georgia, offered for sale a <a href=\"http:\/\/www.businessweek.com\/magazine\/cyber-weapons-the-new-arms-race-07212011.html\"  target=\"_blank\">package named Maui<\/a> for $2.5 million that can attack targets all over the world based on flaws discovered in the computer software that they use. For example, some years ago, Endgame offered for sale targets in Russia including an oil refinery in Achinsk, the National Reserve Bank, and the Novovoronezh nuclear power plant. \u00a0(The list was revealed by Anonymous, the online network of activist hackers.)<\/p>\n<p>While such \u201cproducts,\u201d known in hacker circles as \u201c<a href=\"https:\/\/www.eff.org\/deeplinks\/2012\/03\/zero-day-exploit-sales-should-be-key-point-cybersecurity-debate\"  target=\"_blank\">zero day exploits<\/a>,\u201d may sound like sales pitches from the sorts of crooks any government would want to put behind bars, the hackers and companies who make it their job to discover flaws in popular software are, in fact, courted assiduously by spy agencies like the NSA who want to use them in cyberwarfare against potential enemies.<\/p>\n<p>Take Vupen, a French company that offers a regularly updated catalogue of global computer vulnerabilities for an annual subscription of $100,000. If you see something that you like, you pay extra to get the details that would allow you to hack into it. A <a href=\"http:\/\/wikileaks.org\/spyfiles\/files\/0\/279_VUPEN-THREAD-EXPLOITS.pdf\"  target=\"_blank\">Vupen brochure<\/a> released by Wikileaks in 2011 assured potential clients that the company aims \u201cto deliver exclusive exploit codes for undisclosed vulnerabilities\u201d for \u201ccovertly attacking and gaining access to remote computer systems.\u201d<\/p>\n<p>At a Google sponsored event in Vancouver in 2012, Vupen hackers<a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2012\/03\/21\/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees\/\"  target=\"_blank\"> demonstrated<\/a> that they could hijack a computer via Google\u2019s Chrome web browser. But they refused to hand over details to the company, mocking Google publicly. \u201cWe wouldn\u2019t share this with Google for even $1 million,\u201d Chaouki Bekrar of Vupen boasted to <em>Forbes<\/em> magazine. \u201cWe don\u2019t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.\u201d<\/p>\n<p>In addition to Endgame and Vupen, other players in this field include Exodus Intelligence in Texas, Netragard in Massachussetts, and ReVuln in Malta.<\/p>\n<p>Their best customer? The NSA, which spent at least $25 million in 2013 buying up dozens of such \u201cexploits.\u201d In December, Appelbaum and his colleagues reported in <em>Der Spiegel<\/em> that agency staff crowed about their ability to <a href=\"http:\/\/www.spiegel.de\/international\/world\/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html\"  target=\"_blank\">penetrate<\/a> any computer running Windows at the moment that machine sends messages to Microsoft. So, for example, when your computer crashes and helpfully offers to report the problem to the company, clicking yes could open you up for attack.<\/p>\n<p>The federal government is already alleged to have used such exploits (including one in <a href=\"http:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet\"  target=\"_blank\">Microsoft Windows<\/a>) &#8212; most famously when the <a href=\"http:\/\/www.nytimes.com\/2011\/01\/16\/world\/middleeast\/16stuxnet.html?pagewanted=all\"  target=\"_blank\">Stuxnet virus<\/a> was deployed to destroy Iran\u2019s nuclear centrifuges.<\/p>\n<p>\u201cThis is the <a href=\"http:\/\/cryptome.org\/2013\/12\/appelbaum-30c3.pdf\"  target=\"_blank\">militarization of the Internet<\/a>,\u201d Appelbaum told the Chaos Computer Congress in Hamburg. \u201cThis strategy is undermining the Internet in a direct attempt to keep it insecure. We are under a kind of martial law.\u201d<\/p>\n<p><strong>Harvesting your Data<\/strong><\/p>\n<p>Among the Snowden documents was a 20-page 2012 report from the Government Communications Headquarters &#8212; the British equivalent of the NSA &#8212; that listed a Baltimore-based ad company, Millennial Media.\u00a0 According to the spy agency, it can provide \u201cintrusive\u201d profiles of users of smartphone applications and games. The <em>New York Times<\/em> has noted that the company <a href=\"http:\/\/www.nytimes.com\/2014\/01\/28\/world\/spy-agencies-scour-phone-apps-for-personal-data.html\"  target=\"_blank\">offers data<\/a> like whether individuals are single, married, divorced, engaged, or \u201cswinger,\u201d as well as their sexual orientation (\u201cstraight, gay, bisexuall, and \u2018not sure\u2019\u201d).<\/p>\n<p>How does Millennial Media get this data? Simple. It happens to gather data from some of the most popular video game manufacturers in the world. That includes Activision in California which makes Call of Duty, a military war game that has sold over 100 million copies; Rovio of Finland, which has given away 1.7 billion copies of a game called Angry Birds that allows users to fire birds from a catapult at laughing pigs; and Zynga &#8212; also from California &#8212; which makes Farmville, a farming game with 240 million active monthly users.<\/p>\n<p>In other words, we\u2019re talking about what is undoubtedly a significant percentage of the connected world unknowingly handing over personal data, including their location and search interests, when they download \u201cfree\u201d apps after clicking on a licensing agreement that legally allows the manufacturer to capture and resell their personal information. Few bother to read the fine print or think twice about the actual purpose of the agreement.<\/p>\n<p>The apps pay for themselves via a new business model called \u201c<a href=\"http:\/\/www.chango.com\/resources\/articles\/complete-guide-to-understanding-RTB\"  target=\"_blank\">real-time bidding<\/a>\u201d in which advertisers like Target and Walmart send you coupons and special offers for whatever branch of their store is closest to you. They do this by analyzing the personal data sent to them by the \u201cfree\u201d apps to discover both where you are and what you might be in the market for.<\/p>\n<p>When, for instance, you walk into a mall, your phone broadcasts your location and within a millisecond a data broker sets up a <a href=\"http:\/\/www.huffingtonpost.co.uk\/wes-biggs\/mobile-realtime-bidding-f_b_2169786.html\"  target=\"_blank\">virtual auction<\/a> to sell your data to the highest bidder. This rich and detailed data stream allows advertisers to tailor their ads to each individual customer. As a result, based on their personal histories, two people walking hand in hand down a street might get very different advertisements, even if they live in the same house.<\/p>\n<p>This also has immense value to any organization that can match up the data from a device with an actual name and identity &#8212; such as the federal government.\u00a0 Indeed, the <em>Guardian<\/em> has highlighted an NSA document from 2010 in which the agency boasts that it can \u201ccollect <a href=\"http:\/\/www.theguardian.com\/world\/2014\/jan\/27\/nsa-gchq-smartphone-app-angry-birds-personal-data\"  target=\"_blank\">almost every key detail of a user&#8217;s life<\/a>: including home country, current location (through geolocation), age, gender, zip code, marital status\u2026 income, ethnicity, sexual orientation, education level, and number of children.\u201d<\/p>\n<p><strong>In Denial <\/strong><\/p>\n<p>It\u2019s increasingly clear that the online world is, for both government surveillance types and corporate sellers, a new Wild West where anything goes.\u00a0 This is especially true when it comes to spying on you and gathering every imaginable version of your \u201cdata.\u201d<\/p>\n<p>Software companies, for their part, have denied helping the NSA and reacted with anger to the Snowden disclosures.<strong> <\/strong>\u201cOur fans\u2019 trust is the most important thing for us and we take privacy extremely seriously,\u201d commented Mikael Hed, CEO of Rovio Entertainment, in a public statement. \u201cWe <a href=\"http:\/\/www.rovio.com\/en\/news\/press-releases\/450\/rovio-does-not-provide-end-user-data-to-government-surveillance-agencies\/\"  target=\"_blank\">do not collaborate<\/a>, collude, or share data with spy agencies anywhere in the world.\u201d<\/p>\n<p>RSA has <a href=\"https:\/\/blogs.rsa.com\/news-media-2\/rsa-response\/\"  target=\"_blank\">tried to deny<\/a> that there are any flaws in its products. &#8220;We have never entered into any contract or engaged in any project with the intention of weakening RSA\u2019s products, or introducing potential \u2018backdoors\u2019 into our products for anyone\u2019s use,\u201d the company said in a statement on its website. \u201cWe categorically deny this allegation.&#8221; (Nonetheless RSA has recently started advising clients to <a href=\"http:\/\/www.wired.com\/threatlevel\/2013\/09\/rsa-advisory-nsa-algorithm\/\"  target=\"_blank\">stop using<\/a> the Dual Elliptical Curve.)<\/p>\n<p>Other vendors like Endgame and Millennial Media have maintained a stoic silence. Vupen is one of the few that <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2012\/03\/21\/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees\/\"  target=\"_blank\">boasts about its ability<\/a> to uncover software vulnerabilities.<\/p>\n<p>And the NSA has issued a <a href=\"http:\/\/www.theguardian.com\/world\/2014\/jan\/27\/nsa-gchq-smartphone-app-angry-birds-personal-data\"  target=\"_blank\"><em>Pravda<\/em>-like statement<\/a> that neither confirms nor denies the revelations. &#8220;The communications of people who are not valid foreign intelligence targets are not of interest to the National Security Agency,&#8221; an NSA spokeswoman told the <em>Guardian<\/em>. &#8220;Any implication that NSA&#8217;s foreign intelligence collection is focused on the smartphone or social media communications of everyday Americans is not true.\u201d<\/p>\n<p>The NSA has not, however, denied the existence of its <a href=\"http:\/\/www.spiegel.de\/international\/world\/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html\"  target=\"_blank\">Office of Tailored Access Operations (TAO)<\/a>, which <em>Der Spiegel<\/em> describes as \u201ca squad of [high-tech] plumbers that can be called in when normal access to a target is blocked.\u201d<\/p>\n<p>The Snowden documents indicate that TAO has a sophisticated set of tools at its disposal &#8212; that the NSA calls \u201c<a href=\"http:\/\/cryptome.org\/2013\/12\/nsa-quantumtheory.pdf\"  target=\"_blank\">Quantum Theory<\/a>\u201d &#8212; made up of backdoors and bugs that allow its software engineers to plant spy software on a target computer. One powerful and hard to detect example of this is TAO\u2019s ability to be notified when a target\u2019s computer visits certain websites like LinkedIn and to redirect it to an NSA server named \u201c<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2013\/10\/how_the_nsa_att.html\"  target=\"_blank\">Foxacid<\/a>\u201d where the agency can upload spy software in a fraction of a second.<\/p>\n<p><strong>Which Way Out of the Walled Garden?<\/strong><\/p>\n<p>The simple truth of the matter is that most individuals are easy targets for both the government and corporations.\u00a0 They either pay for software products like Pages and Office from well known manufacturers like Apple and Microsoft or download them for free from game companies like Activision, Rovio, and Zynga for use inside \u201creputable\u201d mobile devices like Blackberries and iPhones.<strong> <\/strong><\/p>\n<p>These manufacturers jealously guard access to the software that they make available, saying that they need to have quality control.\u00a0 Some go even further with what is known as the \u201c<a href=\"https:\/\/www.eff.org\/deeplinks\/2010\/06\/eff-nothing-new-about-iphones-closed-platform\"  target=\"_blank\">walled garden<\/a>\u201d approach, only allowing pre-approved programs on their devices. Apple\u2019s iTunes, Amazon\u2019s Kindle, and Nintendo\u2019s Wii are examples of this.<\/p>\n<p>But as the Snowden revelations have helped make clear, such devices and software are vulnerable both to manufacturer\u2019s mistakes, which open exploitable backdoors into their products, and to secret deals with the NSA.<\/p>\n<p>So in a world where, increasingly, nothing is private, nothing is simply yours, what is an Internet user to do?\u00a0 As a start, there is an alternative to most major software programs for word processing, spreadsheets, and layout and design &#8212; the use of <a href=\"https:\/\/www.fsf.org\/\"  target=\"_blank\">free and open source software<\/a> like <a href=\"http:\/\/www.linuxfoundation.org\/programs\/legal\/compliance\/tools\"  target=\"_blank\">Linux<\/a> and <a href=\"http:\/\/www.openoffice.org\/\"  target=\"_blank\">Open Office<\/a>, where the underlying code is freely available to be examined for hacks and flaws. (Think of it this way: if the NSA cut a deal with Apple to copy everything on your iPhone, you would never know.\u00a0 If you bought an open-source phone &#8212; not an easy thing to do &#8212; that sort of thing would be quickly spotted.)\u00a0 You can also use encrypted browsers like <a href=\"https:\/\/www.torproject.org\/\"  target=\"_blank\">Tor<\/a> and search engines like <a href=\"https:\/\/duckduckgo.com\/\"  target=\"_blank\">Duck Duck Go<\/a> that don\u2019t store your data.<\/p>\n<p>Next, if you own and use a mobile device on a regular basis, you owe it yourself to turn off as many of the <a href=\"http:\/\/support.foursquare.com\/entries\/21775250-How-do-I-turn-off-location-services-\"  target=\"_blank\">location settings<\/a> and <a href=\"https:\/\/ssd.eff.org\/book\/export\/html\/41\"  target=\"_blank\">data-sharing options<\/a> as you can.\u00a0 And last but hardly least, don\u2019t play Farmville, go out and do the real thing. As for Angry Birds and Call of Duty, honestly, instead of shooting pigs and people, it might be time to think about finding better ways to entertain yourself. Pick up a paintbrush, perhaps? Or join an activist group like the <a href=\"https:\/\/www.eff.org\/\"  target=\"_blank\">Electronic Frontier Foundation<\/a> and fight back against Big Brother.<\/p>\n<p>__________________________<\/p>\n<p><em>Pratap Chatterjee is executive director of CorpWatch and a board member of Amnesty International USA. He is the author of <\/em><a href=\"http:\/\/www.amazon.com\/dp\/1568583923\/ref=nosim\/?tag=tomdispatch-20\"  target=\"_blank\">Halliburton\u2019s Army<\/a><em> and <\/em>Iraq, Inc.<\/p>\n<p><i>Copyright 2014 Pratap Chatterjee<\/i><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.tomdispatch.com\/post\/175803\/tomgram%3A_pratap_chatterjee%2C_the_wild_west_of_surveillance\/#more\" >Go to Original \u2013 tomdispatch.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night.  Imagine that, once inside, you could observe everything happening, unnoticed by others &#8212; from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also\u2026<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-39488","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/39488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=39488"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/39488\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=39488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=39488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=39488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}