  {"id":15753,"date":"2016-11-17T18:13:44","date_gmt":"2016-11-17T23:13:44","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/"},"modified":"2016-11-17T18:13:44","modified_gmt":"2016-11-17T23:13:44","slug":"defeating-terrorism-with-big-data","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/","title":{"rendered":"Defeating Terrorism With Big Data"},"content":{"rendered":"<p><strong>Terrorism<\/strong><\/p>\n<p>Terrorism is something familiar to us all, especially over the last decade where we have seen many terrorist attacks around the world either directly or through the media. From 2006 to 2013, there have been approximately 90,000 terrorist attacks causing about 130,000 fatalities throughout the world.<a href=\"#_edn1\" name=\"_ednref1\">[1]<\/a> The rise of terror groups like Al Qaeda and Al-Shabaab over the last several decades has created chaos and fear throughout the international system. The loss of life and the economic impact of terrorist attacks are devastating. How do intelligence communities, the military, and law enforcement combat this threat?<\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/TerrorReport.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-15787 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/TerrorReport-300x182.png\" alt=\"terrorreport\" width=\"328\" height=\"199\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/TerrorReport-300x182.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/TerrorReport-768x467.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/TerrorReport-600x365.png 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/TerrorReport.png 772w\" sizes=\"auto, (max-width: 328px) 100vw, 328px\" \/><\/a><\/p>\n<hr \/>\n<p><strong>Big Data<\/strong><\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/bigdata.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-15788 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/bigdata-300x146.jpg\" alt=\"Data digital flow\" width=\"384\" height=\"187\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/bigdata-300x146.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/bigdata-768x375.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/bigdata.jpg 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/bigdata-600x293.jpg 600w\" sizes=\"auto, (max-width: 384px) 100vw, 384px\" \/><\/a><\/p>\n<p>What exactly is \u201cbig data\u201d and how can it help in the global effort to stop terrorism? Big data is the concept of using an enormous volume of available information, from a variety of sources and networks, to make insights at a rapid velocity to, in turn, gain an advantage against competitors.<a href=\"#_edn2\" name=\"_ednref2\">[2]<\/a> Big data is a technology that lets users crunch an enormous amount of data, that when used correctly, can identify hard-to-detect patterns of terrorist groups or terrorist attacks, allowing the users to either prevent or respond to terrorism.<a href=\"#_edn3\" name=\"_ednref3\">[3]<\/a><\/p>\n<hr \/>\n<p><strong><a href=\"#_edn3\" name=\"_ednref3\"><\/a>Enter\u2026 Palantir<\/strong><\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/100732627-palantir-logo-courtesy.1910x1000.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-15782 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/100732627-palantir-logo-courtesy.1910x1000-300x157.jpg\" alt=\"100732627-palantir-logo-courtesy-1910x1000\" width=\"300\" height=\"157\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/100732627-palantir-logo-courtesy.1910x1000-300x157.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/100732627-palantir-logo-courtesy.1910x1000-768x402.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/100732627-palantir-logo-courtesy.1910x1000-1024x536.jpg 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/100732627-palantir-logo-courtesy.1910x1000-600x314.jpg 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/100732627-palantir-logo-courtesy.1910x1000.jpg 1910w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Palantir Technologies, a Peter Thiel created Palo-Alto technology company currently valued at $20 billion, utilizes software to find connections between people, places and events in large repositories of electronic data.<a href=\"#_edn4\" name=\"_ednref4\">[4]<\/a> Palantir\u2019s current customers include the Central Intelligence Agency, the Federal Bureau of Investigations, Special Operations Command, the Department of Homeland Security, the New York and Los Angeles Police Department, and numerous other organizations within and outside the United States.<a href=\"#_edn5\" name=\"_ednref5\">[5]<\/a> Why is this software so valuable? Intelligence and law enforcement organizations often have their own databases, with their own formats, that do not link to other databases, making it very difficult for analysts to conduct investigations and to obtain all the possible information that exists.<a href=\"#_edn6\" name=\"_ednref6\">[6]<\/a> By interconnecting the databases, Palantir allows users to link and add new information where gaps previously existed. Palantir also allows users to see other users that are working on a project to promote interagency communication.<a href=\"#_edn7\" name=\"_ednref7\">[7]<\/a><\/p>\n<hr \/>\n<p><a href=\"#_edn7\" name=\"_ednref7\"><\/a><strong>Show Me an Example of this Technology!<\/strong><\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/palantirtech.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-15781 aligncenter\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/palantirtech-300x221.png\" alt=\"palantirtech\" width=\"300\" height=\"221\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/palantirtech-300x221.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/palantirtech.png 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The following is a condensed version of a hypothetical situation that Palantir created:<a href=\"#_edn8\" name=\"_ednref8\">[8]<\/a><\/p>\n<p>\u201c\u2026 a foreign national named Mike Fikri purchased a one-way plane ticket from Cairo to Miami, where he rented a condo. Over the previous few weeks, he\u2019d made a number of large withdrawals from a Russian bank account and placed repeated calls to a few people in Syria. More recently, he rented a truck, drove to Orlando, and visited Walt Disney World by himself. He spent his day taking pictures of crowded plazas and gate areas.<\/p>\n<p>The day Fikri drives to Orlando, he gets a speeding ticket, which triggers an alert in the CIA\u2019s Palantir system. An analyst types Fikri\u2019s name into a search box and up pops a wealth of information pulled from every database at the government\u2019s disposal. There\u2019s fingerprint and DNA evidence for Fikri gathered by a CIA operative in Cairo; video of him going to an ATM in Miami; shots of his rental truck\u2019s license plate at a tollbooth; phone records; and a map pinpointing his movements across the globe. All this information is then displayed on a clearly designed graphical interface that looks like something Tom Cruise would use in a Mission: Impossible movie.\u201d<\/p>\n<p>As you can see in the above example, Palantir links all useful information into a single portal for intelligence and law enforcement communities to act upon. With this new link in the chain, information can be linked and communicated to prevent terrorist attacks from occurring or it can be examined retroactively to find terrorist locations.<\/p>\n<hr \/>\n<p><strong>That\u2019s Cool, Can it Do Anything Else?<\/strong><\/p>\n<p>JPMorgan Chase is using Palantir\u2019s software to spot fraud and prevent people from hacking into others\u2019 online or ATM accounts.<a href=\"#_edn9\" name=\"_ednref9\">[9]<\/a> Following the devastating 2010 Haiti earthquake, Palantir developed a database of names and structures affected by the crisis.<a href=\"#_edn10\" name=\"_ednref10\">[10]<\/a> Palantir Health is a platform that allows authorities to reconstruct the history of patient interactions with health administrators.<a href=\"#_edn11\" name=\"_ednref11\">[11]<\/a> These are simply the opportunities available for Palantir\u2026 what else can be done with big data?<\/p>\n<p>Word Count: 797<\/p>\n<hr \/>\n<p><strong>Endnotes<\/strong><\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[1]<\/a> Statistics and Facts &#8211;\u00a0 Terrorism, https:\/\/www.statista.com\/topics\/2267\/terrorism\/<\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[2]<\/a> Big Data: The Management Evolution, Andrew McAfee and Erik Brynjolfsson, https:\/\/hbr.org\/2012\/10\/big-data-the-management-revolution<\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[3]<\/a> Counter-terrorism Tools Used to Spot Fraud, Richard Waters, Financial Times, https:\/\/www.ft.com\/content\/796b412a-4513-11e2-838f-00144feabdc0<\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[4]<\/a> Palantir Technologies Spots Patterns to Solve Crimes and Track Terrorists, Shane Harris, Wired Magazine, http:\/\/www.wired.co.uk\/article\/joining-the-dots<\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[5]<\/a> Ibid.<\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\">[6]<\/a> How Team of Geeks Cracked Spy Trade, Siobhan Gorman, The Wall Street Journal, http:\/\/www.wsj.com\/articles\/SB125200842406984303<\/p>\n<p><a href=\"#_ednref7\" name=\"_edn7\">[7]<\/a> Ibid.<\/p>\n<p><a href=\"#_ednref8\" name=\"_edn8\">[8]<\/a> Palantir, the War on Terror\u2019s Secret Weapon, Ashlee Vance and Brad Stone, Bloomberg, http:\/\/www.cfr.org\/world\/bloomberg-palantir-war-terrors-secret-weapon\/p26601<\/p>\n<p><a href=\"#_ednref9\" name=\"_edn9\">[9]<\/a> Counter-terrorism Tools Used to Spot Fraud, Richard Waters, Financial Times, https:\/\/www.ft.com\/content\/796b412a-4513-11e2-838f-00144feabdc0<\/p>\n<p><a href=\"#_ednref10\" name=\"_edn10\">[10]<\/a> Palantir Technologies Spots Patterns to Solve Crimes and Track Terrorists, Shane Harris, Wired Magazine, http:\/\/www.wired.co.uk\/article\/joining-the-dots<\/p>\n<p><a href=\"#_ednref11\" name=\"_edn11\">[11]<\/a> Ibid.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThis is a new way of war-fighting.\u201d \u2013 Mary Beth Long, former Assistant Secretary of Defense<\/p>\n","protected":false},"author":1912,"featured_media":15819,"comment_status":"open","ping_status":"closed","template":"","categories":[],"class_list":["post-15753","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/digitization-challenge-2016\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defeating Terrorism With Big Data - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defeating Terrorism With Big Data - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"\u201cThis is a new way of war-fighting.\u201d \u2013 Mary Beth Long, former Assistant Secretary of Defense\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Terrorism-Word-Cloud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"608\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/defeating-terrorism-with-big-data\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/defeating-terrorism-with-big-data\\\/\",\"name\":\"Defeating Terrorism With Big Data - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/defeating-terrorism-with-big-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/defeating-terrorism-with-big-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Terrorism-Word-Cloud.jpg\",\"datePublished\":\"2016-11-17T23:13:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/defeating-terrorism-with-big-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/defeating-terrorism-with-big-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/defeating-terrorism-with-big-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Terrorism-Word-Cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2016\\\/11\\\/Terrorism-Word-Cloud.jpg\",\"width\":1300,\"height\":608},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/defeating-terrorism-with-big-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defeating Terrorism With Big Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defeating Terrorism With Big Data - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/","og_locale":"en_US","og_type":"article","og_title":"Defeating Terrorism With Big Data - Technology and Operations Management","og_description":"\u201cThis is a new way of war-fighting.\u201d \u2013 Mary Beth Long, former Assistant Secretary of Defense","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/","og_site_name":"Technology and Operations Management","og_image":[{"width":1300,"height":608,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Terrorism-Word-Cloud.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/","name":"Defeating Terrorism With Big Data - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Terrorism-Word-Cloud.jpg","datePublished":"2016-11-17T23:13:44+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Terrorism-Word-Cloud.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2016\/11\/Terrorism-Word-Cloud.jpg","width":1300,"height":608},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/defeating-terrorism-with-big-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Defeating Terrorism With Big Data"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/15753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/1912"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=15753"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/15753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/15819"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=15753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=15753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}