  {"id":31237,"date":"2018-11-13T06:40:34","date_gmt":"2018-11-13T11:40:34","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-t"},"modified":"2018-11-13T13:35:12","modified_gmt":"2018-11-13T18:35:12","slug":"how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/","title":{"rendered":"How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war"},"content":{"rendered":"<p>In 2007 the United States Army suffered a direct attack in Iraq by a group of insurgents, who managed to destroy four new AH-64 \u201cApache Helicopters\u201d.\u00a0 The attack was successful only because a group of American Soldiers uploaded photographs of the newly arrived helicopters to Facebook. The pictures that the soldiers took with their iPhone had geotagged the exact coordinates of the where the picture was taken. As Steve Warren, deputy G2 for the Maneuver Center of Excellence explains \u201cToday, in pretty much every single smartphone, there is built-in GPS, (\u2026) For every picture you take with that phone, it will automatically embed the latitude and longitude within the photograph.&#8221; (1)<\/p>\n<p>Similar events have occurred where United States Service Members unwillingly have given out their unit location by commenting on Facebook and Twitter events that occur in the day to day activities of their deployment. The comments and posts are taken by the enemy in Iraq, Afghanistan, and Syria to locate, evade, and harm the mission of the Department of Defense. (2)<\/p>\n<p>Most recently as of January 2018, the jogging platform Strava is capturing sensitive information of Service member locations, size of the force, and even outer perimeter movements and patrol routes, by tracking the fitness devices that Service members use, such as Fitbit and Jawbone (Exhibit 1 shows a map of Kandahar Airfield Afghanistan produced by Strava Labs) (3). This unwilling crowdsourcing can prove disastrous for the covert missions necessary to win the insurgency wars in the middle east, as they provide to the insurgent\u2019s valuable real time information on military capabilities, troop placements, and patrol routes, all of which need to remain secret to ensure the success of the mission. This information can also lead to the loss of service members by coordinating precise attacks based on the information gathered. (1) (2) (3)<\/p>\n<p>So far, the Department of Defense has been very vigilant regarding the undesired crowdsourcing by introducing very strict policy regarding the use of Social Media by service members. It also has created several training programs that Service members need to take, both in garrison and while deployed, that highlight the consequences of poor social media use and the military punishments that are associated with it. (4) The DoD has also introduced military reprimands for service Members who disseminate information via Social Media, yet as the landscape of technology evolves the new military policy must keep up to date to ensure that vital information is not shared with the enemy. Currently the DoD has not created a policy regarding the use of jogging technology while in a deployed location as they are analyzing ways to prevent the unwanted outsource data to be shared with the public. (5)<\/p>\n<p>The United States has also learned from the enemy and since has utilized social media to locate and eradicate the enemy insurgency, as was the case in 2015 when an ISIS commander used Twitter to discuss some new organizational changes in the ISIS chain of command, the United States Air Force responded with three Joint Direct Attack Munition (JDAMs) in less than 20 minutes (6). Currently the DoD has a group of cyber technology experts monitoring the social media account of multiple terrorist organizations to discover unwanted information that their members post on social media.<\/p>\n<p>As technology continues to advance the use of geolocation will be more prevalent than ever, the DoD needs to find new ways to protect its members from undesired crowdsourcing by doing something more than issuing anti use policy. As demonstrated with tangible events a simple undesired mistake by a service member can lead to mortal consequences, for these reasons the DoD should invest in new technology that disables or alters the Geolocation GPS device in personal devices, thus ensuring that the enemy will not be able to benefit from undesired crowdsourcing such as a picture and jogging devices. Until that new technology is developed the DoD should not only focus its energy in finding enemy locations but should also use its resources to monitor deployed locations to prevent a simple mistake by service members that could lead to a loss of life or equipment.<\/p>\n<p>As new technology is introduced to the consumer space, how can consumers protect their privacy, when unwillingly the new technology they take for granted has a method of crowdsourcing for companies without users noticing? Is privacy dying as a trade off with new technological advancements?<\/p>\n<p>(716 Words)<a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-31230\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-1024x759.jpg\" alt=\"\" width=\"640\" height=\"474\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-1024x759.jpg 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-300x222.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-768x569.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-600x445.jpg 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U.jpg 1352w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>References<\/p>\n<p>Military.com. (2018).\u00a0<em>Insurgents Used Cell Phone Geotags to Destroy AH-64s in Iraq<\/em>. [online] Available at: https:\/\/www.military.com\/defensetech\/2012\/03\/15\/insurgents-used-cell-phone-geotags-to-destroy-ah-64s-in-iraq [Accessed 13 Nov. 2018].<\/p>\n<p>Singer, E. (2018).\u00a0<em>War Goes Viral<\/em>. [online] The Atlantic. Available at: https:\/\/www.theatlantic.com\/magazine\/archive\/2016\/11\/war-goes-viral\/501125\/ [Accessed 13 Nov. 2018].<\/p>\n<p>Timberg, L. (2018).\u00a0<em>U.S. military reviewing its rules after fitness trackers exposed sensitive data<\/em>. [online] Washington Post. Available at: https:\/\/www.washingtonpost.com\/world\/a-map-showing-the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing\/2018\/01\/28\/86915662-0441-11e8-aa61-f3391373867e_story.html?utm_term=.caac02a1fab8 [Accessed 13 Nov. 2018].<\/p>\n<p>Timberg, L. (2018).\u00a0<em>U.S. military reviewing its rules after fitness trackers exposed sensitive data<\/em>. [online] Washington Post. Available at: https:\/\/www.washingtonpost.com\/world\/a-map-showing-the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing\/2018\/01\/28\/86915662-0441-11e8-aa61-f3391373867e_story.html?utm_term=.caac02a1fab8 [Accessed 13 Nov. 2018].<\/p>\n<p>Walbert Castillo, C. (2018).\u00a0<em>U.S. bombs ISIS using social media intel &#8211; CNNPolitics<\/em>. [online] CNN. Available at: https:\/\/www.cnn.com\/2015\/06\/05\/politics\/air-force-isis-moron-twitter\/ [Accessed 13 Nov. 2018].<\/p>\n<p>Washington Post. (2018).\u00a0<em>U.S. military reviewing its rules after fitness trackers exposed sensitive data<\/em>. [online] Available at: https:\/\/www.washingtonpost.com\/world\/the-us-military-reviews-its-rules-as-new-details-of-us-soldiers-and-bases-emerge\/2018\/01\/29\/6310d518-050f-11e8-aa61-f3391373867e_story.html?utm_term=.562a9437aa73 [Accessed 13 Nov. 2018].<\/p>\n<p>www.army.mil. (2018).\u00a0<em>Geotagging poses security risks<\/em>. [online] Available at: https:\/\/www.army.mil\/article\/75165\/geotagging_poses_security_risks [Accessed 13 Nov. 2018].<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article explores the negative effects of undesired crowdsourcing and how it has been used in the battle field to yield catastrophic results. <\/p>\n","protected":false},"author":11396,"featured_media":31681,"comment_status":"open","ping_status":"closed","template":"","categories":[74,4608,135],"class_list":["post-31237","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-crowd-sourcing","category-isis","category-military","hck-taxonomy-organization-military","hck-taxonomy-industry-communications","hck-taxonomy-country-afghanistan"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2018\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"This article explores the negative effects of undesired crowdsourcing and how it has been used in the battle field to yield catastrophic results.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-13T18:35:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1352\" \/>\n\t<meta property=\"og:image:height\" content=\"1002\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\\\/\",\"name\":\"How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/AHZCFFAEMII6RNEMWB76VFL32U-1.jpg\",\"datePublished\":\"2018-11-13T11:40:34+00:00\",\"dateModified\":\"2018-11-13T18:35:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/AHZCFFAEMII6RNEMWB76VFL32U-1.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/AHZCFFAEMII6RNEMWB76VFL32U-1.jpg\",\"width\":1352,\"height\":1002},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/","og_locale":"en_US","og_type":"article","og_title":"How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war - Technology and Operations Management","og_description":"This article explores the negative effects of undesired crowdsourcing and how it has been used in the battle field to yield catastrophic results.","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/","og_site_name":"Technology and Operations Management","article_modified_time":"2018-11-13T18:35:12+00:00","og_image":[{"width":1352,"height":1002,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/","name":"How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-1.jpg","datePublished":"2018-11-13T11:40:34+00:00","dateModified":"2018-11-13T18:35:12+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-1.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/AHZCFFAEMII6RNEMWB76VFL32U-1.jpg","width":1352,"height":1002},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/how-unwanted-crowdsourcing-can-be-the-difference-between-life-and-death-for-the-united-states-department-of-defense-dod-and-leads-to-open-innovation-in-an-insurgent-war\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"How unwanted crowdsourcing can be the difference between life and death for the United States Department of Defense (DoD) and leads to Open Innovation in an insurgent war"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/31237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/11396"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=31237"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/31237\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/31681"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=31237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=31237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}