{"id":1018,"date":"2014-08-11T00:00:00","date_gmt":"2014-08-11T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2014\/08\/11\/defcon-advice-on-evading-black-helicopters\/"},"modified":"2021-01-28T16:17:57","modified_gmt":"2021-01-28T16:17:57","slug":"defcon-advice-on-evading-black-helicopters","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/","title":{"rendered":"DefCon: Advice on Evading Black Helicopters"},"content":{"rendered":"<div id=\"article-content\">\n<p>In the modern post-Snowden world, the idea that we&#8217;re all constantly being watched is not as farfetched as it once was. But how does an individual who thinks they are being watched all the time avoid being watched?<\/p>\n<p>Speaking at last week&#8217;s Defcon security conference, Philip Polstra, associate professor of Digital Forensics at Bloomsburg University of Pennsylvania, detailed some best practices for those who believe they are being watched, followed or bugged.<\/p>\n<p>&#8220;It could be national or local authorities, stalkers or even people that just don&#8217;t like you,&#8221; Polstra said of the people who might follow an individual.<\/p>\n<p>He provided a number of low-cost actions that people can take to avoid surveillance.<\/p>\n<h2>Dodging Digital Cameras<\/h2>\n<p><strong><\/strong>While everyone has a camera on their phones, Polstra noted there can also be hidden cameras placed in homes or businesses. He suggested using an infrared TV remote controller, which can sometimes be used to trigger hidden night vision cameras, to see if such cameras are present.<\/p>\n<p>Even when hidden, cameras still typically require WiFi access in order to communicate. So paranoid people should be on the lookout for unknown WiFi networks, Polstra said.<\/p>\n<h2>Foiling Followers<\/h2>\n<p><strong><\/strong>What about being followed, or tailed, by a car? Polstra noted that while non-government adversaries will choose any kind of vehicle they want, the government typically uses black SUVs and Ford Crown Victorias.<\/p>\n<p>A tail is considered to be blown if the subject has three suspicious impressions, he said, suggesting that individuals &#8220;look around&#8221; at other cars. &#8220;Maybe they&#8217;re going the same way, maybe not,&#8221; he said.<\/p>\n<p>Cars can also be tailed through the use of &#8220;bumper beepers&#8221; that track a car&#8217;s location. Simply turning on the AM radio in a car and scanning all the channels for one that is just broadcasting a single strong tone can indicate a beeper is present, Polstra suggested.<\/p>\n<p>For individuals hoping to avoid being tailed, Polstra advised taking unusual routes, driving through residential areas and occasionally simply parking for no reason.<\/p>\n<h2>Styming Stakeouts<\/h2>\n<p><strong><\/strong>For those who think their offices or homes are being monitored or staked out, Polstra offered a test: &#8220;If someone has a view of all your exits, that&#8217;s probably not coincidental and it could be a stakeout,&#8221; he said.<\/p>\n<p>Bugs placed inside hardware are another potential risk for the paranoid. One way to detect bugs, Polstra said, is to look for power drains on things that should not be running.<\/p>\n<p>&#8220;In summary choose your level of paranoia,&#8221; Polstra said. &#8220;If you&#8217;re paranoid and not rich, you can test things without financial ruin.&#8221;<\/p>\n<p><em>Sean Michael Kerner is a senior editor at eSecurityPlanet and InternetNews.com. Follow him on Twitter <a href=\"https:\/\/twitter.com\/TechJournalist\">@TechJournalist<\/a>.<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d7068c2bdf6-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7068c2bdf6\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7068c2bdf6\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7068c2bdf6\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7068c2bdf6\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7068c2bdf6\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7068c2bdf6\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the modern post-Snowden world, the idea that we&#8217;re all constantly being watched is not as farfetched as it once was. But how does an individual who thinks they are being watched all the time avoid being watched? Speaking at last week&#8217;s Defcon security conference, Philip Polstra, associate professor of Digital Forensics at Bloomsburg University [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[378,379],"class_list":["post-1018","post","type-post","status-publish","format-standard","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_product-endpoint-security","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DefCon: Advice on Evading Black Helicopters<\/title>\n<meta name=\"description\" content=\"You say &#039;paranoid,&#039; I say &#039;careful.&#039; Expert offers &#039;practical&#039; advice on living the paranoid lifestyle.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DefCon: Advice on Evading Black Helicopters\" \/>\n<meta property=\"og:description\" content=\"You say &#039;paranoid,&#039; I say &#039;careful.&#039; Expert offers &#039;practical&#039; advice on living the paranoid lifestyle.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-11T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:17:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sean Michael Kerner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Michael Kerner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/\"},\"author\":{\"name\":\"Sean Michael Kerner\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\"},\"headline\":\"DefCon: Advice on Evading Black Helicopters\",\"datePublished\":\"2014-08-11T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:17:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/\"},\"wordCount\":453,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/\",\"name\":\"DefCon: Advice on Evading Black Helicopters\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2014-08-11T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:17:57+00:00\",\"description\":\"You say 'paranoid,' I say 'careful.' Expert offers 'practical' advice on living the paranoid lifestyle.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DefCon: Advice on Evading Black Helicopters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\",\"name\":\"Sean Michael Kerner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"caption\":\"Sean Michael Kerner\"},\"description\":\"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DefCon: Advice on Evading Black Helicopters","description":"You say 'paranoid,' I say 'careful.' Expert offers 'practical' advice on living the paranoid lifestyle.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/","og_locale":"en_US","og_type":"article","og_title":"DefCon: Advice on Evading Black Helicopters","og_description":"You say 'paranoid,' I say 'careful.' Expert offers 'practical' advice on living the paranoid lifestyle.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/","og_site_name":"eSecurity Planet","article_published_time":"2014-08-11T00:00:00+00:00","article_modified_time":"2021-01-28T16:17:57+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Sean Michael Kerner","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sean Michael Kerner","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/"},"author":{"name":"Sean Michael Kerner","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0"},"headline":"DefCon: Advice on Evading Black Helicopters","datePublished":"2014-08-11T00:00:00+00:00","dateModified":"2021-01-28T16:17:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/"},"wordCount":453,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"articleSection":["Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/","url":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/","name":"DefCon: Advice on Evading Black Helicopters","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2014-08-11T00:00:00+00:00","dateModified":"2021-01-28T16:17:57+00:00","description":"You say 'paranoid,' I say 'careful.' Expert offers 'practical' advice on living the paranoid lifestyle.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/defcon-advice-on-evading-black-helicopters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"DefCon: Advice on Evading Black Helicopters"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0","name":"Sean Michael Kerner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","caption":"Sean Michael Kerner"},"description":"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.","url":"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/1018"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=1018"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/1018\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=1018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=1018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=1018"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=1018"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=1018"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=1018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}