{"id":19156,"date":"2022-05-28T19:08:06","date_gmt":"2022-05-29T03:08:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12889\/"},"modified":"2022-05-28T19:08:06","modified_gmt":"2022-05-29T03:08:06","slug":"news-12889","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12889\/","title":{"rendered":"Open Source Intelligence May Be Changing Old-School War"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628c24c4da40d0a2f45e8c6f\/master\/pass\/leak_sec_GettyImages-1349278109.jpg\"\/><\/p>\n<p><strong>Credit to Author: Alexa O&#8217;Brien| Date: Tue, 24 May 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/alexa-obrien\">Alexa O&#x27;Brien<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">An open source<\/span> panopticon\u2014from commercial big data aggregation to information infrastructure across mobile, smart devices, and social media\u2014is reshaping the way intelligence is collected and used in conventional war.<\/p>\n<p class=\"paywall\">Open source intelligence is information that can be readily and legally accessed by the general public. It was used in war and diplomacy long before the internet\u2014alongside information stolen or otherwise secretly obtained and closely held. But its prevalence today means what was once cost-prohibitive to many is now affordable to myriad actors, whether North Korea, the CIA, journalists, terrorists, or cybercriminals.<\/p>\n<p class=\"paywall\">One consequence of widely available open source information is that anonymity is eroding, not only for ordinary civilians, but also for members of <a data-offer-url=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/08850607.2015.1022464?src=recsysand%20journalCode=ujic20\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/08850607.2015.1022464?src=recsysand%20journalCode=ujic20&quot;}\" href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/08850607.2015.1022464?src=recsysand%20journalCode=ujic20\" rel=\"nofollow noopener\" target=\"_blank\">law enforcement, military, and the intelligence community<\/a>. Even missing information can alert an adversarial spy service, says a former US intelligence official who spoke on background. When the US State Department unfolded a public diplomacy <a data-offer-url=\"https:\/\/2001-2009.state.gov\/r\/us\/2008\/112605.htm\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/2001-2009.state.gov\/r\/us\/2008\/112605.htm&quot;}\" href=\"https:\/\/2001-2009.state.gov\/r\/us\/2008\/112605.htm\" rel=\"nofollow noopener\" target=\"_blank\">strategy<\/a> in 2008 that emphasized the use of social media, a foreign counterpart joked to the former US intelligence official that CIA officers, working under nonofficial cover at US embassies, were easily deduced because they lacked Facebook profiles. The US government has a gargantuan <a data-offer-url=\"https:\/\/www.newsweek.com\/exclusive-inside-militarys-secret-undercover-army-1591881\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.newsweek.com\/exclusive-inside-militarys-secret-undercover-army-1591881&quot;}\" href=\"https:\/\/www.newsweek.com\/exclusive-inside-militarys-secret-undercover-army-1591881\" rel=\"nofollow noopener\" target=\"_blank\">effort<\/a> underway to address similar issues brought on by an absence or expectation of digital exhaust associated with intelligence officers\u2019 cover identities.<\/p>\n<p class=\"paywall\">When it comes to modern intelligence collection, closed societies like North Korea, Russia, and Iran have an advantage against open ones. Both secrecy and transparency\u2014or the control of information, whether by individuals or governments\u2014are integral to the freedom and security of those individuals and societies. Closed societies can collect an open one\u2019s information with ease, all the while preventing access to similar information from domestic political opponents or hostile foreign actors.<\/p>\n<p class=\"paywall\">But too much secrecy on the part of governments and militaries\u2014including those of Russia\u2019s Vladimir Putin\u2014can also prevent them from <a data-offer-url=\"https:\/\/www.theguardian.com\/world\/2022\/mar\/30\/putin-advisers-russia-ukraine-error-gchq-head-jeremy-fleming-speech\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/world\/2022\/mar\/30\/putin-advisers-russia-ukraine-error-gchq-head-jeremy-fleming-speech&quot;}\" href=\"https:\/\/www.theguardian.com\/world\/2022\/mar\/30\/putin-advisers-russia-ukraine-error-gchq-head-jeremy-fleming-speech\" rel=\"nofollow noopener\" target=\"_blank\">knowing<\/a> themselves, which may contribute to strategic blunders. Information technology, by its nature, disintegrates boundaries. It erodes barriers to markets across sectors and societies: from journalism to intelligence, crime to terrorism\u2014and now it seems, with Russia\u2019s invasion of Ukraine, conventional war.<\/p>\n<p class=\"paywall\">Intelligence isn\u2019t just information, says Jeff Rogg, a historian of US intelligence whose work focuses on civil-intelligence relations. The objective of intelligence, compared to just information, is obtaining or maintaining an advantage over one\u2019s adversaries\u2014whether that intelligence is secret or open source. This principle is at play when the Biden administration <a data-offer-url=\"https:\/\/www.cnn.com\/2022\/02\/11\/politics\/biden-administration-russia-intelligence\/index.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cnn.com\/2022\/02\/11\/politics\/biden-administration-russia-intelligence\/index.html&quot;}\" href=\"https:\/\/www.cnn.com\/2022\/02\/11\/politics\/biden-administration-russia-intelligence\/index.html\" rel=\"nofollow noopener\" target=\"_blank\">declassifies<\/a> intelligence in an unprecedented manner in order to counter Russian misinformation or <a data-offer-url=\"https:\/\/news.usni.org\/2022\/03\/18\/intel-sharing-between-u-s-and-ukraine-revolutionary-says-dia-director\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/news.usni.org\/2022\/03\/18\/intel-sharing-between-u-s-and-ukraine-revolutionary-says-dia-director&quot;}\" href=\"https:\/\/news.usni.org\/2022\/03\/18\/intel-sharing-between-u-s-and-ukraine-revolutionary-says-dia-director\" rel=\"nofollow noopener\" target=\"_blank\">shares<\/a> secret intelligence with Ukrainian counterparts.<\/p>\n<p class=\"paywall\">\u201cGiven the emphasis placed on open sources in the war in Ukraine, it\u2019s easy to forget how successful intelligence outcomes can also depend on secrecy, and even a bit of deception. Attributing successes in Ukraine to open sources can also offer a cover of sorts for more closely held sources and methods,\u201d says Rogg.<\/p>\n<p class=\"paywall\">British scholar Matthew Ford, coauthor of an upcoming <a data-offer-url=\"http:\/\/www.radicalwar.com\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;http:\/\/www.radicalwar.com\/&quot;}\" href=\"http:\/\/www.radicalwar.com\/\" rel=\"nofollow noopener\" target=\"_blank\">book<\/a> on the impact information infrastructure and connected devices have on conventional military conflicts, calls the phenomenon \u201cradical war.\u201d<\/p>\n<p class=\"paywall\">Ford says that the high level of mobile connectivity among Ukrainians and a notable absence of combat footage from smartphones and headcams, especially in the early phases of the war, suggest an effective information operation may be underway. \u201cNo doubt the Ukrainians fear such images will reveal their tactics, techniques, and procedures,\u201d says Ford. So Ukrainians may simply be censoring themselves.<\/p>\n<p class=\"paywall\">Social media platforms and cell phones are also a force multiplier for traditionally weaker military powers, like Ukraine, especially when it comes to coordinating intelligence collection for targeting activities. \u201cTargeting information is now being exchanged online,\u201d Ford says. \u201cSuccessful kills have been celebrated on Telegram. Chatbots have been established, helping Ukrainians share target coordinates with their smartphones. Identifying targets doesn\u2019t involve complex military systems; it works from civilian information infrastructures.\u201d<\/p>\n<p class=\"paywall\">\u201cThe problem with crowdsourced intelligence in a war like Ukraine is standardizing the reporting,\u201d Ford says. For example: \u201cYou want to be able to identify the vehicle, geo-locate it, then map against any available signals or satellite imagery, or other collection disciplines, fusing it into actionable target information.\u201d<\/p>\n<p class=\"BylineWrapper-iiTsTb gRgFYc byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Virginia Heffernan<\/span><\/span><\/p>\n<p class=\"BylineWrapper-iiTsTb gRgFYc byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Andy Greenberg<\/span><\/span><\/p>\n<p class=\"BylineWrapper-iiTsTb gRgFYc byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Vittoria Elliott<\/span><\/span><\/p>\n<p class=\"paywall\">The Russian invasion of Ukraine is not only the 21st century\u2019s first conventional war in Europe, it is the \u201cmost digitally connected in history,\u201d according to Ford. \u201cIf the Ukrainians can make that intelligence actionable quicker than the Russians, they can use their limited remote fires, artillery, drones, and maybe even missiles or air power effectively. The objective, therefore, is to find, fix, and finish Russian forces more quickly than the Russians can do this themselves.\u201d<\/p>\n<p class=\"paywall\">When Russia launched its full-scale invasion in late February, the <a data-offer-url=\"https:\/\/www.newsweek.com\/us-expects-kyiv-fall-days-ukraine-source-warns-encirclement-1682326\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.newsweek.com\/us-expects-kyiv-fall-days-ukraine-source-warns-encirclement-1682326&quot;}\" href=\"https:\/\/www.newsweek.com\/us-expects-kyiv-fall-days-ukraine-source-warns-encirclement-1682326\" rel=\"nofollow noopener\" target=\"_blank\">US<\/a>, its <a data-offer-url=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-02-24\/western-allies-see-kyiv-falling-to-russian-forces-within-hours\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bloomberg.com\/news\/articles\/2022-02-24\/western-allies-see-kyiv-falling-to-russian-forces-within-hours&quot;}\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-02-24\/western-allies-see-kyiv-falling-to-russian-forces-within-hours\" rel=\"nofollow noopener\" target=\"_blank\">allies<\/a>, and <a data-offer-url=\"https:\/\/www.gchq.gov.uk\/speech\/director-gchq-global-security-amid-russia-invasion-of-ukraine\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.gchq.gov.uk\/speech\/director-gchq-global-security-amid-russia-invasion-of-ukraine&quot;}\" href=\"https:\/\/www.gchq.gov.uk\/speech\/director-gchq-global-security-amid-russia-invasion-of-ukraine\" rel=\"nofollow noopener\" target=\"_blank\">Russia<\/a> concluded that Ukraine\u2019s forces were asymmetrically disadvantaged against Putin\u2019s endowed and historically brutal counterpart. US officials expected the country to fall in days. Yet despite the US\u2019s monumental success predicting Russia\u2019s intentions and plans and offering warnings, American intelligence agencies incorrectly assessed Ukraine\u2019s prospects\u2014the current subject of an <a data-offer-url=\"https:\/\/www.cnn.com\/2022\/05\/13\/politics\/us-intelligence-review-ukraine\/index.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cnn.com\/2022\/05\/13\/politics\/us-intelligence-review-ukraine\/index.html&quot;}\" href=\"https:\/\/www.cnn.com\/2022\/05\/13\/politics\/us-intelligence-review-ukraine\/index.html\" rel=\"nofollow noopener\" target=\"_blank\">internal review<\/a>.<\/p>\n<p class=\"paywall\">Facing the full onslaught of Russia&#x27;s armed forces, Ukraine\u2019s military resilience may even have come as a bit of a surprise to Ukrainians themselves, Ford suspects. Yet mistaken judgments about the expected balance between strong and weak powers, accompanied by strategic surprise, may be a common occurrence in the information age. Before the acknowledged <a data-offer-url=\"https:\/\/www.pewresearch.org\/journalism\/2012\/11\/28\/role-social-media-arab-uprisings\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.pewresearch.org\/journalism\/2012\/11\/28\/role-social-media-arab-uprisings\/&quot;}\" href=\"https:\/\/www.pewresearch.org\/journalism\/2012\/11\/28\/role-social-media-arab-uprisings\/\" rel=\"nofollow noopener\" target=\"_blank\">role<\/a> of social media in fueling the Arab Spring, or the reported significance of thumb drives in more recent <a href=\"https:\/\/www.wired.com\/2013\/06\/snowden-thumb-drive\/\">counterintelligence failures<\/a>\u2014telecommunications, open source infrastructure, and cheap and accessible consumer technology have impacted the parity calculus for state and non-state actors alike.<\/p>\n<p class=\"paywall\">Indeed, it was the worldwide growth of telecommunications in the 1990s that empowered Al-Qaeda to conduct its successful covert military attacks on US soil on September 11, 2001. But in the run-up to those attacks, the US Department of Defense hadn\u2019t drafted a net assessment on the military or intelligence capabilities of what was later described by the 9\/11 Commission as America\u2019s \u201c<a data-offer-url=\"https:\/\/www.govinfo.gov\/app\/details\/GPO-911REPORT\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.govinfo.gov\/app\/details\/GPO-911REPORT&quot;}\" href=\"https:\/\/www.govinfo.gov\/app\/details\/GPO-911REPORT\" rel=\"nofollow noopener\" target=\"_blank\">most dangerous foreign enemy<\/a>.\u201d The concept was unimaginable then, but it shouldn\u2019t be now.<\/p>\n<p class=\"paywall\">Similarly, the intelligence community had not authored a national estimate that comprehensively evaluated or articulated the <a data-offer-url=\"https:\/\/press.princeton.edu\/books\/paperback\/9780691141039\/spying-blind\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/press.princeton.edu\/books\/paperback\/9780691141039\/spying-blind&quot;}\" href=\"https:\/\/press.princeton.edu\/books\/paperback\/9780691141039\/spying-blind\" rel=\"nofollow noopener\" target=\"_blank\">strategic threat<\/a> posed by Al-Qaeda before its 2001 attack. This category of cognitive bias is called the \u201c<a data-offer-url=\"https:\/\/www.cambridge.org\/core\/books\/abs\/paradoxical-brain\/paradox-of-human-expertise-why-experts-get-it-wrong\/D7D9DCD8E0074ACA9C66B2C044177A74\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cambridge.org\/core\/books\/abs\/paradoxical-brain\/paradox-of-human-expertise-why-experts-get-it-wrong\/D7D9DCD8E0074ACA9C66B2C044177A74&quot;}\" href=\"https:\/\/www.cambridge.org\/core\/books\/abs\/paradoxical-brain\/paradox-of-human-expertise-why-experts-get-it-wrong\/D7D9DCD8E0074ACA9C66B2C044177A74\" rel=\"nofollow noopener\" target=\"_blank\">paradox of expertise<\/a>.\u201d Genuine experts may communicate incredible nuance and understanding of a subject but overlook indicators of seismic changes within the domains of their knowledge.<\/p>\n<p class=\"paywall\">It\u2019s also possible to make analytical errors by overstating or inflating the impact or outcomes of technology and information on civil society\u2014or any domain\u2014including conventional war. The internet, which promised us a techno-utopian commune of open source information, has arguably turned large swaths of civil society into psychedelic hellscapes, much like the Charles Manson murders after the Summer of Love.<\/p>\n<p class=\"paywall\">Civilian noncombatants\u2019 use of open source platforms and consumer devices in support of hostile military actions raise serious questions about blurred lines between civilian and combatant\u2014lawful or otherwise\u2014leading to the same subjects becoming legitimate targets or tried for espionage under the law of war. Civilians are legally protected under international humanitarian law, as long as they are not party to military conflicts.<\/p>\n<p class=\"paywall\">According to recent reports, US intelligence support led to the successful targeting of Russian <a data-offer-url=\"https:\/\/www.nytimes.com\/2022\/05\/04\/us\/politics\/russia-generals-killed-ukraine.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2022\/05\/04\/us\/politics\/russia-generals-killed-ukraine.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2022\/05\/04\/us\/politics\/russia-generals-killed-ukraine.html\" rel=\"nofollow noopener\" target=\"_blank\">generals<\/a> and the <a data-offer-url=\"https:\/\/www.nytimes.com\/2022\/05\/05\/us\/politics\/moskva-russia-ship-ukraine-us.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2022\/05\/05\/us\/politics\/moskva-russia-ship-ukraine-us.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2022\/05\/05\/us\/politics\/moskva-russia-ship-ukraine-us.html\" rel=\"nofollow noopener\" target=\"_blank\"><em>Moskva<\/em><\/a>, Russia\u2019s flagship in the Black Sea. \u201cOne of the intelligence concerns people have voiced is that these leaks unnecessarily raise the risks of <a data-offer-url=\"https:\/\/www.theguardian.com\/us-news\/2022\/may\/07\/us-spies-ukraine-russia-military-intelligence\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/us-news\/2022\/may\/07\/us-spies-ukraine-russia-military-intelligence&quot;}\" href=\"https:\/\/www.theguardian.com\/us-news\/2022\/may\/07\/us-spies-ukraine-russia-military-intelligence\" rel=\"nofollow noopener\" target=\"_blank\">escalation<\/a>,\u201d Rogg says. \u201cBut consider the Javelins, Stingers, and military hardware we are publicly providing. The US and its allies are fighting an overt\u2014as compared to covert\u2014proxy war against Russia. That\u2019s one of the key distinctions in this conflict from, for example, US support to the mujahideen in Afghanistan in the 1980s, which is one of the popular comparisons you read about today: The US is taking a risk by abandoning some of the hallmarks of intelligence and advantages of covert action, like plausible deniability. That being said, there is still plenty that we do not know. Putting aside all the reporting, leaks, and official disclosures, the exact role and impact of US intelligence in Ukraine will be a source of study and debate for years to come.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/open-source-intelligence-war-russia-ukraine\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628c24c4da40d0a2f45e8c6f\/master\/pass\/leak_sec_GettyImages-1349278109.jpg\"\/><\/p>\n<p><strong>Credit to Author: Alexa O&#8217;Brien| Date: Tue, 24 May 2022 11:00:00 +0000<\/strong><\/p>\n<p>Intelligence collected from public information online could be impacting traditional warfare and altering the calculus between large and small powers.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21465],"class_list":["post-19156","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-national-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19156"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19156\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}