{"id":3477,"date":"2018-12-21T09:41:18","date_gmt":"2018-12-21T09:41:18","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3477"},"modified":"2018-12-21T09:41:18","modified_gmt":"2018-12-21T09:41:18","slug":"we-need-to-talk-about-drone-hacking-2","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2","title":{"rendered":"We need to talk about drone hacking"},"content":{"rendered":"<p>As Gatwick Airport has been brought to a standstill over drones accessing the airfield, now is the time we need to talk about drone hacking.<\/p>\n<p><a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/drone-jacking-could-be-the-next-big-data-breach-risk\" target=\"_blank\" rel=\"noopener\"><strong>We\u2019ve highlighted this before<\/strong><\/a>, but given the news this week, it\u2019s time to bring it up again. If cars can be hacked, so can drones. If smart tech in the home can be hacked, so can drones. If these things can be used to harm people \u2013 physically or financially \u2013 so can drones. They\u2019re remote-controlled which means a huge door is there to be opened. There also incredibly easy to buy, and hackers have already demonstrated how easy it is to take control of another drone by hacking.<\/p>\n<p>If there\u2019s technology good enough to bring one of the UK\u2019s biggest airports to a standstill, drone hacking is a serious concern.<\/p>\n<p><!--more--><\/p>\n<h3><strong>What damage could drone hacking do?<\/strong><\/h3>\n<p>In short, drone hacking could cause a huge amount of damage. Aside from the chillingly obvious issue of terrorist attacks, everyday criminals could use them to cause harm to people as well.<\/p>\n<p>Data about the users and owners could be compromised in a drone hacking. Criminals could hold such data to ransom or leak it intentionally and cause distress for the victims. Industrial drones could be hacked, costing businesses a lot of money.<\/p>\n<p>The use of drones will likely grow. Although it\u2019s easy to see the attraction of drones for entertainment, drone hacking is a worry. We know drones can be useful for industry as well. From environmental research to 3D mapping for the construction industry, they can be incredibly useful.<\/p>\n<p>But they can also be incredibly dangerous.<\/p>\n<h3><strong>The Gatwick Airport incident should serve as a warning for drone hacking<\/strong><\/h3>\n<p>This Gatwick Airport incident that has caused delays for hundreds of thousands of passengers, and no doubt cost a huge amount of money, should serve as a warning about drone hacking.<\/p>\n<p>Although there\u2019s no suggestion this incident is related to drone hacking, it does highlight the dangers of drones. If a drone hits a plane, it can do enough damage to bring the aircraft down. We need to think about better regulation and protection for the use of drones, as well as ensuring they\u2019re cybersecurity safe.<\/p>\n<p>Earlier this year, information about US military drones was sold on the dark web. Who\u2019s to say that controlled drones for official use (like the police) couldn\u2019t be subject to a hack? If information about military drones from one of the world\u2019s biggest superpowers ended up on the dark web, there\u2019s every reason to be very worried.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As Gatwick Airport has been brought to a standstill over drones accessing the airfield, now is the time we need to talk about drone hacking. We\u2019ve highlighted this before, but given the news this week, it\u2019s time to bring it up again. If cars can be hacked, so can drones. If smart tech in the &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">We need to talk about drone hacking<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":3308,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,8,1,11,64,51],"tags":[2,26,55,27],"class_list":["post-3477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-hacking-news","category-latest","category-scammers","category-security","category-technology","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-smart-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>We need to talk about drone hacking - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"As Gatwick Airport has been brought to a standstill over drones accessing the airfield, now is the time we need to talk about drone hacking.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"We need to talk about drone hacking - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"As Gatwick Airport has been brought to a standstill over drones accessing the airfield, now is the time we need to talk about drone hacking.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-21T09:41:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/heathrow_airport.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"424\" \/>\n\t<meta property=\"og:image:height\" content=\"283\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"We need to talk about drone hacking\",\"datePublished\":\"2018-12-21T09:41:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2\"},\"wordCount\":442,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/heathrow_airport.jpg\",\"keywords\":[\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"smart technology\"],\"articleSection\":[\"Cybersecurity\",\"Hacking News\",\"Latest\",\"Scammers\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2\",\"name\":\"We need to talk about drone hacking - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/heathrow_airport.jpg\",\"datePublished\":\"2018-12-21T09:41:18+00:00\",\"description\":\"As Gatwick Airport has been brought to a standstill over drones accessing the airfield, now is the time we need to talk about drone hacking.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/heathrow_airport.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/heathrow_airport.jpg\",\"width\":424,\"height\":283,\"caption\":\"Airport\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/we-need-to-talk-about-drone-hacking-2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"We need to talk about drone hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"We need to talk about drone hacking - Data Leaks, Breaches &amp; Hacks","description":"As Gatwick Airport has been brought to a standstill over drones accessing the airfield, now is the time we need to talk about drone hacking.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2","og_locale":"en_GB","og_type":"article","og_title":"We need to talk about drone hacking - Data Leaks, Breaches &amp; Hacks","og_description":"As Gatwick Airport has been brought to a standstill over drones accessing the airfield, now is the time we need to talk about drone hacking.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2018-12-21T09:41:18+00:00","og_image":[{"width":424,"height":283,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/heathrow_airport.jpg","type":"image\/jpeg"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"We need to talk about drone hacking","datePublished":"2018-12-21T09:41:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2"},"wordCount":442,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/heathrow_airport.jpg","keywords":["cyber attack","cyber crime","cybersecurity","smart technology"],"articleSection":["Cybersecurity","Hacking News","Latest","Scammers","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2","name":"We need to talk about drone hacking - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/heathrow_airport.jpg","datePublished":"2018-12-21T09:41:18+00:00","description":"As Gatwick Airport has been brought to a standstill over drones accessing the airfield, now is the time we need to talk about drone hacking.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/heathrow_airport.jpg","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/heathrow_airport.jpg","width":424,"height":283,"caption":"Airport"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/we-need-to-talk-about-drone-hacking-2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"We need to talk about drone hacking"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3477"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3477\/revisions"}],"predecessor-version":[{"id":3479,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3477\/revisions\/3479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/3308"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}