  {"id":14571,"date":"2016-11-18T13:22:02","date_gmt":"2016-11-18T18:22:02","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/"},"modified":"2016-11-18T13:22:02","modified_gmt":"2016-11-18T18:22:02","slug":"ipod-to-irobot-how-our-loyal-devices-are-turning-against-us","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/","title":{"rendered":"iPod to iRobot: How Our Loyal Devices Are Turning Against Us"},"content":{"rendered":"<p>Robots run amok is a common science fiction trope: anthropomorphic terrors turning against their masters. Few versions of that story have the antagonists looking like printers. With the growing Internet of Things (IoT), however, that is quickly becoming our new reality.<\/p>\n<p><figure id=\"attachment_14554\" aria-describedby=\"caption-attachment-14554\" style=\"width: 232px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Printer.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14554\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Printer-300x300.jpeg\" alt=\"printer\" width=\"232\" height=\"232\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Printer-300x300.jpeg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Printer-150x150.jpeg 150w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Printer-768x768.jpeg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Printer-1024x1024.jpeg 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Printer-600x600.jpeg 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Printer.jpeg 2000w\" sizes=\"auto, (max-width: 232px) 100vw, 232px\" \/><\/a><figcaption id=\"caption-attachment-14554\" class=\"wp-caption-text\">Above: your new robot overlord [1]<\/figcaption><\/figure>On October 21st, 2016, hackers used malicious software (&#8220;malware&#8221;) known as Mirai to press-gang internet-connected devices, such as unsecured routers, DVRs, and connected IP cameras into committing a Distributed Denial of Service (DDoS) attack against Dyn, a major DNS host. The attack lasted several hours and caused massive internet outages across major services including Twitter, Spotify, Amazon, Reddit, Yelp, Netflix, and The New York Times. [2]<\/p>\n<p><figure style=\"width: 532px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/blogs-images.forbes.com\/briansolomon\/files\/2016\/10\/Screen-Shot-2016-10-21-at-12.39.17-PM1.jpg?width=960\" alt=\"XYZ [2]\" width=\"532\" height=\"308\" \/><figcaption class=\"wp-caption-text\">Internet outage map visualization as of 3:30 EST 10\/21\/16 [<em>ibid<\/em>]<\/figcaption><\/figure>A DDoS attack works by coordinating internet-connected machines to generate superfluous but &#8216;well-formed&#8217; requests (that is, indistinguishable from legitimate ones) against a particular target and overwhelm the servers to the point of failure. See below for a visualization of this: [3]<\/p>\n<p><iframe loading=\"lazy\" title=\"DDOS attack on the VideoLAN downloads infrastructure\" width=\"640\" height=\"480\" src=\"https:\/\/www.youtube.com\/embed\/hNjdBSoIa8k?start=18&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>These types of attacks have historically come from desktop and laptop computers, but recent attacks have increasingly come from internet peripherals. The Mirai software targets these unprotected devices and slaves them to a botnet that can be accessed and used at any time, for intimidation, entertainment, or even profit: oftentimes the groups responsible will rent out botnet time at affordable rates to anyone with bitcoin to spare. [4]<\/p>\n<p>The October attacks were just the most recent iteration of a growing trend. Over the summer, security firm Sucuri discovered a botnet of 25,000 cameras that was assaulting a brick-and-mortar jewelry store, with unknown motivations. [5] In September, the hosting giant OVH came under several attacks with volumes thought to be logistically nearly impossible (with traffic exceeding 1 terabit per second from over 145,000 devices). [6] That same month, a prominent security journalist named Brian Krebs came under attack numerous times before his website was eventually booted by the security firm he had been using, Prolexic. The company could no longer afford to protect him from the high volumes of attacks. [7]<\/p>\n<p>The fact that these attacks were made possible by the proliferation of internet-connected but undersecured devices has vast implications. Political activists in countries hostile to free speech have had their work censored for decades, but now those wishing to censor individuals need not be in positions of power or even possess a great deal of technical knowledge, since the Mirai source code is freely available to all, and there are more internet-connected devices than ever. Attacks can come <em>from<\/em> anywhere in the world <em>to<\/em> anywhere in the world and differentially impact independent and underfunded bloggers and journalists who face\u00a0expulsion from hosting services that are understandably unwilling to shoulder the burden of being routinely crippled. We face a new threat of internet bully that is anonymous, ubiquitous, and available for hire.<\/p>\n<p>Enter Google. Through one of their subsidiaries, Jigsaw, they have recently released a new type of infrastructure to protect these websites and authors. Originally intended for &#8220;small, under-resourced news sites&#8221;, Google has recently opened its infrastructure to any &#8220;independent news site&#8221; &#8211; those not owned by a particular government or political party &#8211; that wishes to join. [8]<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=wmTvv8ISwPA\">https:\/\/www.youtube.com\/watch?v=wmTvv8ISwPA<\/a><\/p>\n<p>The initiative is built off of Google&#8217;s Pagespeed service, which is a front-end tool that was originally oriented to allow developers faster page load times. Sites wishing to join Project Shield would sit behind this structure and would take advantage of Google&#8217;s massive scale: unless the attack were strong enough to bring down the entire service, they can&#8217;t touch any individual site. While this isn&#8217;t a wholly new model (see <em>Cloudfire<\/em>) this is the first time the service has been offered for free and with the intent of protecting free speech. [9]<\/p>\n<p>Google has maintained there is no monetary incentive here, with Jigsaw president Jared Cohen stating: &#8220;This isn&#8217;t about revenue&#8230; you have to make sure that once people have access to the information, it doesn&#8217;t get DDOS attacked, it doesn&#8217;t get compromised, it doesn&#8217;t get censored in a politically motivated way.&#8221; [10] Google&#8217;s\u00a0incentives may not include a direct dollar exchange, but their entire business model is predicated on having people feel comfortable sharing their information online. The majority of Google&#8217;s products &#8211; Google 性视界, Gmail, Cloud Services &#8211; survive only to the degree that we as consumers of information are willing to provide and share our content with one another &#8211; and with Google. In order to protect this ecosphere, Google may need to continue to add cost and complexity to its operating model by introducing products such as Project Shield. But Google should take this further: they should use their immense scale and market position to push for changes to IoT regulations and mandate more stringest minimum security thresholds on internet-connected devices. Concurrently, they should aim to make the public more aware of this issue and the steps they can take to avoid having devices they own be part of a botnet bully.<\/p>\n<p><em>Word Count: 798<\/em><\/p>\n<p><strong>Sources<\/strong><\/p>\n<p>[1]\u00a0Canon, (2016), Available at: <span style=\"text-decoration: underline\">http:\/\/www.canon.com<\/span>\u00a0[Accessed 18 November 2016].<\/p>\n<p>[2] Forbes, (2016), <em>Internet Outage Map<\/em> [ONLINE]. Available at: <u>http:\/\/www.forbes.com\/sites\/briansolomon\/2016\/10\/21\/hacked-cameras-cyber-attack-hacking-ddos-dyn-twitter-netflix\/#5f124afb7e6f<\/u> [Accessed 18 November 2016].<\/p>\n<p>[3] Dots left to right represent requests on the server, with the bar on the right attempting to service as many requests as possible. Traffic is directed against one particular file, locking up the resources of the target and crashing the system.<\/p>\n<p>[4] Thomas Fox-Brewster. 2016. <em>How Hacked Cameras Are Helping Launch The Biggest Attacks The Internet Has Ever Seen<\/em>. [ONLINE] Available at: <u><a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/09\/25\/brian-krebs-overwatch-ovh-smashed-by-largest-ddos-attacks-ever\/#56bd8adb6fb6\">http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/09\/25\/brian-krebs-overwatch-ovh-smashed-by-largest-ddos-attacks-ever\/#56bd8adb6fb6<\/a><\/u>. [Accessed 18 November 2016].<\/p>\n<p>[5] Dan Goodin. 2016. <em>Large botnet of CCTV devices knock the snot out of jewelry website<\/em>. [ONLINE] Available at: <u><a href=\"http:\/\/arstechnica.com\/security\/2016\/06\/large-botnet-of-cctv-devices-knock-the-snot-out-of-jewelry-website\/\">http:\/\/arstechnica.com\/security\/2016\/06\/large-botnet-of-cctv-devices-knock-the-snot-out-of-jewelry-website\/<\/a><\/u>. [Accessed 18 November 2016].<\/p>\n<p>[6]Dan Goodin. 2016. <em>Record-breaking DDoS reportedly delivered by &gt;145k hacked cameras<\/em>. [ONLINE] Available at: <u><a href=\"http:\/\/arstechnica.com\/security\/2016\/09\/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever\/\">http:\/\/arstechnica.com\/security\/2016\/09\/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever\/<\/a><\/u>. [Accessed 18 November 2016].<\/p>\n<p>[7] Dan Goodin. 2016. <em>Why the Silencing of KrebsOnSecurity Opens a Troubling Chapter for the Net<\/em>. [ONLINE] Available at: <u><a href=\"http:\/\/arstechnica.com\/security\/2016\/09\/why-the-silencing-of-krebsonsecurity-opens-a-troubling-chapter-for-the-net\/\">http:\/\/arstechnica.com\/security\/2016\/09\/why-the-silencing-of-krebsonsecurity-opens-a-troubling-chapter-for-the-net\/<\/a><\/u>. [Accessed 18 November 2016].<\/p>\n<p>[8] Andy Greenberg. 2016. <em>Google Wants to Save News Sites From Cyberattacks\u2014For Free<\/em>. [ONLINE] Available at: <u><a href=\"https:\/\/www.wired.com\/2016\/02\/google-wants-save-news-sites-cyberattacks-free\/\">https:\/\/www.wired.com\/2016\/02\/google-wants-save-news-sites-cyberattacks-free\/<\/a><\/u>. [Accessed 18 November 2016].<\/p>\n<p>[9] Russell Brandom. 2013. <em>Google Launches New Anti-DDOS Service Called Project Shield<\/em>. [ONLINE] Available at: <u><a href=\"http:\/\/www.theverge.com\/2013\/10\/21\/4862724\/google-launches-new-anti-ddos-service-called-project-shield\">http:\/\/www.theverge.com\/2013\/10\/21\/4862724\/google-launches-new-anti-ddos-service-called-project-shield<\/a><\/u>. [Accessed 18 November 2016].<\/p>\n<p>[10]\u00a0<em>See [8]<\/em><\/p>\n<div class=\"controls\"><\/div>\n<div class=\"controls\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things is being used as a weapon. Don&#039;t turn your back on your DVR.<\/p>\n","protected":false},"author":1807,"featured_media":17638,"comment_status":"open","ping_status":"closed","template":"","categories":[],"class_list":["post-14571","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>iPod to iRobot: How Our Loyal Devices Are Turning Against Us - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iPod to iRobot: How Our Loyal Devices Are Turning Against Us - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"The Internet of Things is being used as a weapon. Don&#039;t turn your back on your DVR.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/f2-robots-attack-at-lunar-echo-basecamp_mpoxt-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"324\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\\\/\",\"name\":\"iPod to iRobot: How Our Loyal Devices Are Turning Against Us - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/f2-robots-attack-at-lunar-echo-basecamp_mpoxt-1.jpg\",\"datePublished\":\"2016-11-18T18:22:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/f2-robots-attack-at-lunar-echo-basecamp_mpoxt-1.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/f2-robots-attack-at-lunar-echo-basecamp_mpoxt-1.jpg\",\"width\":350,\"height\":324},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"iPod to iRobot: How Our Loyal Devices Are Turning Against Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iPod to iRobot: How Our Loyal Devices Are Turning Against Us - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/","og_locale":"en_US","og_type":"article","og_title":"iPod to iRobot: How Our Loyal Devices Are Turning Against Us - Technology and Operations Management","og_description":"The Internet of Things is being used as a weapon. Don&#039;t turn your back on your DVR.","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/","og_site_name":"Technology and Operations Management","og_image":[{"width":350,"height":324,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/f2-robots-attack-at-lunar-echo-basecamp_mpoxt-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/","name":"iPod to iRobot: How Our Loyal Devices Are Turning Against Us - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/f2-robots-attack-at-lunar-echo-basecamp_mpoxt-1.jpg","datePublished":"2016-11-18T18:22:02+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/f2-robots-attack-at-lunar-echo-basecamp_mpoxt-1.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/f2-robots-attack-at-lunar-echo-basecamp_mpoxt-1.jpg","width":350,"height":324},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ipod-to-irobot-how-our-loyal-devices-are-turning-against-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"iPod to iRobot: How Our Loyal Devices Are Turning Against Us"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/14571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/1807"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=14571"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/14571\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/17638"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=14571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=14571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}