{"id":1481,"date":"2016-07-06T09:56:09","date_gmt":"2016-07-06T07:56:09","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=1481"},"modified":"2023-03-14T08:57:17","modified_gmt":"2023-03-14T07:57:17","slug":"terroristen-im-cyberraum","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/terroristen-im-cyberraum\/","title":{"rendered":"Terrorists in cyberspace"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1482 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg\" width=\"680\" height=\"444\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security-375x245.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>Even though online terrorists, unlike cybercriminals and cyberspies, value the highest possible visibility on the Internet and on social channels, they use encryption as well as anonymization services and tools to avoid being located and caught. These include Tor for anonymous web access, Cloudfare for disguising web addresses, SIGAINT, Ruggedinbox and Mail2Tor as secure mail services, of course, but also the instant messaging services Wickr, Surespot, Signal, Threema and Telegram, with the latter seeming to be the absolute favorite among online terrorists with a 34% usage rate. For secure file exchange, they use top4top.net, Sendspace and SecureDrop, for example. So far, this corresponds to behavior that one would also expect from cybercriminals and spies.<\/p>\n<p>In contrast, however, there are also deviations. These reflect the development that online terrorists seem to have to hide better on the Internet than they did a few years ago. For this reason, they are increasingly resorting to tools they have developed themselves. Apparently, this development is related to the greater search pressure and success that the investigative authorities are exerting on the cybercriminal scene internationally. The <a href=\"https:\/\/blog.trendmicro.de\/der-lange-arm-des-gesetzes-mehrere-cyberkriminelle-hinter-gitter\/\" target=\"_blank\" data-cke-saved-href=\"https:\/\/blog.trendmicro.de\/der-lange-arm-des-gesetzes-mehrere-cyberkriminelle-hinter-gitter\/\" rel=\"noopener\">Arrests and convictions<\/a> of recent times speak for themselves here.<\/p>\n<p>The most important special tools used by Islamist-motivated terrorists in particular include:<\/p>\n<ul>\n<li><em>Mojahedeen Secrets:<\/em> This is an encryption application for e-mail communication that is considered \"professional\" and has been available since 2007, apparently developed as an alternative to PGP 2.<\/li>\n<li><em>Tashfeer al-Jawwal:<\/em> This application was developed and published by Global Islamic Media Front (GIMF) in 2013. As an encryption app, it is used to secure cell phones, one of the important means of communication for terrorists.<\/li>\n<li><em>Asrar al-Dardashah:<\/em> This allows \"instant messages\" to be encrypted at the touch of a button and sent via the IM application Pidgin.<\/li>\n<li><em>Amn al-Mujahed:<\/em> This software, available since 2013 and still under development, encrypts messages for various platforms, for email, SMS and instant messaging. The author is the Al-Fajr Technical Committee (ATC).<\/li>\n<li><em>Alemarah:<\/em> This Android app is designed to disseminate news about terrorist attacks. Users receive news feeds, websites, and calendar entries that contain information about ongoing terror operations.<\/li>\n<li><em>Amaq v 1.1:<\/em> This Android app is also used for propaganda, with the difference that the URL under which the app is hosted can be easily changed in the current version 2.1. Consequently, even if a website is taken offline, communication does not stop completely, but is only temporarily interrupted - a tactic that is also popular among cybercriminals.<\/li>\n<li><em>DDOS Tool:<\/em> This is apparently the work of a sympathizer of a certain terrorist group. It allows limited denial-of-service attacks via SYN flood technology.<\/li>\n<\/ul>\n<p>Even if terrorists use self-developed tools, the techniques used, such as encryption or DoS attacks, are the same. The main differences with cybercriminals therefore remain at the level of motives and their relationship with propaganda. Admittedly, this does not make the investigators' work any easier. After all, the more technical advances online gangsters and spies make, the more likely it is that terrorists on the Net will also take advantage of these developments - whether in the form of tools they have developed themselves or not. But knowing what tools and techniques they are using is certainly the first step in the right direction.<\/p>\n<p>For more details on Trend Micro's findings about similarities and differences in the use of techniques and tools between online criminals and terrorists, see <a href=\"https:\/\/www.trendmicro.de\/media\/wp\/dunkle-absichten-online-whitepaper-de.pdf\" target=\"_blank\" data-cke-saved-href=\"https:\/\/www.trendmicro.de\/media\/wp\/dunkle-absichten-online-whitepaper-de.pdf\" rel=\"noopener\">here<\/a>.<\/p>\n<p><em>Comment by security expert Udo Schneider, press spokesman at the Japanese IT security provider <a href=\"https:\/\/www.trendmicro.de\" target=\"_blank\" data-cke-saved-href=\"https:\/\/www.trendmicro.de\" rel=\"noopener\">Trend Micro<\/a><\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Auch wenn Online-Terroristen im Gegensatz zu Cyberkriminellen und -spionen im Internet und auf sozialen Kan\u00e4len Wert auf eine m\u00f6glichst hohe Sichtbarkeit legen, nutzen sie Verschl\u00fcsselungs- sowie Anonymisierungsdienste und -werkzeuge, um nicht lokalisiert und gefasst zu werden. Dazu z\u00e4hlen nat\u00fcrlich Tor f\u00fcr den anonymen Webzugang, Cloudfare zur Verschleierung von Webadressen, SIGAINT, Ruggedinbox und Mail2Tor als sichere [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1482,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[63,43],"class_list":["post-1481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-it-security","tag-terrorismus"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Cyberraum","_yoast_wpseo_opengraph-image":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","_yoast_wpseo_opengraph-description":"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen. Wer ihn also bek\u00e4mpfen will, muss verstehen, welche Werkzeuge und Techniken er nutzt. Ein Team des \u201eForward Looking Threat Research\u201c hat deshalb untersucht, wo es Gemeinsamkeiten, aber auch Unterschiede zwischen \u201egew\u00f6hnlichen\u201c Cyberkriminellen und Online-Terroristen gibt. Eine der wichtigsten Erkenntnisse ist: Die Professionalit\u00e4t ist bei beiden Gruppen mittlerweile gleich hoch und steigt weiter.","_yoast_wpseo_opengraph-title":"Terroristen im Cyberraum","enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Terroristen im Cyberraum - Save<\/title>\n<meta name=\"description\" content=\"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/terroristen-im-cyberraum\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Terroristen im Cyberraum\" \/>\n<meta property=\"og:description\" content=\"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen. Wer ihn also bek\u00e4mpfen will, muss verstehen, welche Werkzeuge und Techniken er nutzt. Ein Team des \u201eForward Looking Threat Research\u201c hat deshalb untersucht, wo es Gemeinsamkeiten, aber auch Unterschiede zwischen \u201egew\u00f6hnlichen\u201c Cyberkriminellen und Online-Terroristen gibt. Eine der wichtigsten Erkenntnisse ist: Die Professionalit\u00e4t ist bei beiden Gruppen mittlerweile gleich hoch und steigt weiter.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/terroristen-im-cyberraum\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-06T07:56:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"Terroristen im Cyberraum\",\"datePublished\":\"2016-07-06T07:56:09+00:00\",\"dateModified\":\"2023-03-14T07:57:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\"},\"wordCount\":550,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Terroristen-im-Cyberraum-it-security.jpg\",\"keywords\":[\"IT-SECURITY\",\"Terrorismus\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\",\"name\":\"Terroristen im Cyberraum - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Terroristen-im-Cyberraum-it-security.jpg\",\"datePublished\":\"2016-07-06T07:56:09+00:00\",\"dateModified\":\"2023-03-14T07:57:17+00:00\",\"description\":\"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Terroristen-im-Cyberraum-it-security.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Terroristen-im-Cyberraum-it-security.jpg\",\"width\":1000,\"height\":653},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Terroristen im Cyberraum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Terrorists in cyberspace - Save","description":"Today's international terrorism relies significantly on its presence in cyberspace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/terroristen-im-cyberraum\/","og_locale":"en_US","og_type":"article","og_title":"Terroristen im Cyberraum","og_description":"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen. Wer ihn also bek\u00e4mpfen will, muss verstehen, welche Werkzeuge und Techniken er nutzt. Ein Team des \u201eForward Looking Threat Research\u201c hat deshalb untersucht, wo es Gemeinsamkeiten, aber auch Unterschiede zwischen \u201egew\u00f6hnlichen\u201c Cyberkriminellen und Online-Terroristen gibt. Eine der wichtigsten Erkenntnisse ist: Die Professionalit\u00e4t ist bei beiden Gruppen mittlerweile gleich hoch und steigt weiter.","og_url":"https:\/\/news.save.ch\/en\/terroristen-im-cyberraum\/","og_site_name":"Save","article_published_time":"2016-07-06T07:56:09+00:00","article_modified_time":"2023-03-14T07:57:17+00:00","og_image":[{"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"Terroristen im Cyberraum","datePublished":"2016-07-06T07:56:09+00:00","dateModified":"2023-03-14T07:57:17+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/"},"wordCount":550,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","keywords":["IT-SECURITY","Terrorismus"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/","url":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/","name":"Terrorists in cyberspace - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","datePublished":"2016-07-06T07:56:09+00:00","dateModified":"2023-03-14T07:57:17+00:00","description":"Today's international terrorism relies significantly on its presence in cyberspace.","breadcrumb":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/terroristen-im-cyberraum\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","width":1000,"height":653},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Terroristen im Cyberraum"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/1481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=1481"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/1481\/revisions"}],"predecessor-version":[{"id":17608,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/1481\/revisions\/17608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/1482"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=1481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=1481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=1481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}