{"id":553,"date":"2016-08-23T12:26:32","date_gmt":"2016-08-23T11:26:32","guid":{"rendered":"http:\/\/www.dataleaklawyers.co.uk\/blog\/?p=553"},"modified":"2016-09-14T14:38:37","modified_gmt":"2016-09-14T13:38:37","slug":"city-transport-systems-vulnerable-to-hack","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack","title":{"rendered":"How vulnerable are Smart City transport systems to being hacked?"},"content":{"rendered":"<p>American photojournalist Lori Nichols was driving down the highway near Atlantic City close to midnight when she snapped a picture of a free standing temporary road sign. On the lit up road sign, instead of the normal &#8220;work ahead&#8221; or &#8220;slow down&#8221;, the sign instead read the word &#8220;poop&#8221;.<\/p>\n<p>The sign had been like that for several hours. When she reported it to the police station in the morning, she was told other people had also called it in.<\/p>\n<p>While the pranksters only wrote &#8220;poop&#8221; on the sign, it does raise the question as to how easy it was to gain access to an unlocked panel at the back of the sign. Instead of writing what they did, they could have written something that could have created an entirely different scenario. Something warning of a serious incident, or perhaps a threat that could have sparked a very different response&#8230;<br \/>\n<!--more--><\/p>\n<h2>Cities getting smarter<\/h2>\n<p>This one sign could have sent people in to panic, causing accidents and all sorts of problems. With cities using more &#8220;smart technology&#8221; hackers could use this as a way to cause large scale chaos through hacking, and we fear that it will not be long before it happens.<\/p>\n<p>By hackers taking control of traffic lights, automated bus stops, parking, street lights, and other systems, this could be very appealing to anyone who might have a political or terrorist agenda.<\/p>\n<p>Cesar Cerrudo is the chief technology officer at security company IOActive Labs. He found weaknesses in different systems in China, UK, US, Australia, and France. He discovered that hackers could cause havoc using cheap computer hardware to easily access systems and software.<\/p>\n<p>He says that: <\/p>\n<blockquote><p>&#8220;I don&#8217;t think now we are seeing many attacks, maybe some isolated attacks on lower maintained systems. But everything indicates that in the future they will become common because cyber threats are continually evolving.&#8221;<\/p><\/blockquote>\n<h3>Protecting our cities<\/h3>\n<p>In America many states are using cloud technology, such as in Kansas City Missouri. The Smart City project they run is the new RideKC Streetcar which is free to use. The project also includes in-street parking sensors that allow car owners to find spaces near the Streetcar route, and cameras placed on lamp posts to monitor traffic conditions, and trigger brightness controls that turn on street lights when a person enters the area.<\/p>\n<p>The cloud is used to store data from the Smart City installation, but not for the Streetcar vehicle specific system &#8211; this is done to aggregate and pool data that Kansas City Authority want to make publicly accessible.<\/p>\n<p>However, a lot of these companies on-board have never written software for these new transport devices before. This means that lessons in security that the IT industry has learned over the last twenty years, are just being re-learned now by these Smart City innovators.<\/p>\n<p>This includes how to respond and protect from security threats. As Mr Cerrudo points out &#8220;There is nothing smart about building a city that has the latest transportation technology, but leaving the infrastructure wide open to anyone who fancies a quick snoop around &#8211; or worse.&#8221;<\/p>\n<p>Source: <a href=\"https:\/\/www.bbc.co.uk\/news\/business-36854293\">https:\/\/www.bbc.co.uk\/news\/business-36854293<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>American photojournalist Lori Nichols was driving down the highway near Atlantic City close to midnight when she snapped a picture of a free standing temporary road sign. On the lit up road sign, instead of the normal &#8220;work ahead&#8221; or &#8220;slow down&#8221;, the sign instead read the word &#8220;poop&#8221;. The sign had been like that &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">How vulnerable are Smart City transport systems to being hacked?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":60,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[27],"class_list":["post-553","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest","tag-smart-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Vulnerable Are Smart City Transport Systems To Being Hacked?<\/title>\n<meta name=\"description\" content=\"As more cities worldwide adopt Smart City transport systems, questions on how vulnerable they are to being hacked must be raised.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Vulnerable Are Smart City Transport Systems To Being Hacked?\" \/>\n<meta property=\"og:description\" content=\"As more cities worldwide adopt Smart City transport systems, questions on how vulnerable they are to being hacked must be raised.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-23T11:26:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-09-14T13:38:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/03\/british_gas_data_leak_fb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How vulnerable are Smart City transport systems to being hacked?\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/03\/british_gas_data_leak_tw.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\"},\"headline\":\"How vulnerable are Smart City transport systems to being hacked?\",\"datePublished\":\"2016-08-23T11:26:32+00:00\",\"dateModified\":\"2016-09-14T13:38:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack\"},\"wordCount\":534,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/british_gas_data_leak.png\",\"keywords\":[\"smart technology\"],\"articleSection\":[\"Latest\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack\",\"name\":\"How Vulnerable Are Smart City Transport Systems To Being Hacked?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/british_gas_data_leak.png\",\"datePublished\":\"2016-08-23T11:26:32+00:00\",\"dateModified\":\"2016-09-14T13:38:37+00:00\",\"description\":\"As more cities worldwide adopt Smart City transport systems, questions on how vulnerable they are to being hacked must be raised.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/british_gas_data_leak.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/03\\\/british_gas_data_leak.png\",\"width\":725,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/city-transport-systems-vulnerable-to-hack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How vulnerable are Smart City transport systems to being hacked?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/maisie\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Vulnerable Are Smart City Transport Systems To Being Hacked?","description":"As more cities worldwide adopt Smart City transport systems, questions on how vulnerable they are to being hacked must be raised.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack","og_locale":"en_GB","og_type":"article","og_title":"How Vulnerable Are Smart City Transport Systems To Being Hacked?","og_description":"As more cities worldwide adopt Smart City transport systems, questions on how vulnerable they are to being hacked must be raised.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2016-08-23T11:26:32+00:00","article_modified_time":"2016-09-14T13:38:37+00:00","og_image":[{"width":1200,"height":801,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/03\/british_gas_data_leak_fb.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_title":"How vulnerable are Smart City transport systems to being hacked?","twitter_image":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/03\/british_gas_data_leak_tw.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd"},"headline":"How vulnerable are Smart City transport systems to being hacked?","datePublished":"2016-08-23T11:26:32+00:00","dateModified":"2016-09-14T13:38:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack"},"wordCount":534,"commentCount":0,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/03\/british_gas_data_leak.png","keywords":["smart technology"],"articleSection":["Latest"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack","name":"How Vulnerable Are Smart City Transport Systems To Being Hacked?","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/03\/british_gas_data_leak.png","datePublished":"2016-08-23T11:26:32+00:00","dateModified":"2016-09-14T13:38:37+00:00","description":"As more cities worldwide adopt Smart City transport systems, questions on how vulnerable they are to being hacked must be raised.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/03\/british_gas_data_leak.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/03\/british_gas_data_leak.png","width":725,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/city-transport-systems-vulnerable-to-hack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"How vulnerable are Smart City transport systems to being hacked?"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=553"}],"version-history":[{"count":5,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/553\/revisions"}],"predecessor-version":[{"id":661,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/553\/revisions\/661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/60"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}