{"id":2260,"date":"2013-04-16T11:05:24","date_gmt":"2013-04-16T11:09:08","guid":{"rendered":"http:\/\/www.cass-ro.org\/?p=2260"},"modified":"2017-11-14T21:28:42","modified_gmt":"2017-11-14T19:28:42","slug":"the-role-of-information-in-identifying-investigating-and-monitoring-crises-2","status":"publish","type":"post","link":"https:\/\/www.cass-ro.org\/en\/the-role-of-information-in-identifying-investigating-and-monitoring-crises-2\/","title":{"rendered":"The role of information in identifying, investigating and monitoring crises"},"content":{"rendered":"<div>\n<p><b><i><img decoding=\"async\" class=\"alignleft size-medium wp-image-2250\" alt=\"Intelligence \" src=\"http:\/\/www.cass-ro.org\/wp-content\/uploads\/2013\/04\/L04_fig02-300x189.gif\" width=\"300\" height=\"189\" srcset=\"https:\/\/www.cass-ro.org\/wp-content\/uploads\/2013\/04\/L04_fig02-300x189.gif 300w, https:\/\/www.cass-ro.org\/wp-content\/uploads\/2013\/04\/L04_fig02.gif 305w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>A<\/i><\/b><b><i>bstract<\/i><\/b><i>: Intelligence information is not different from common information. Nevertheless, the effect is that of optimizing state power and international influence at different levels. During crisis times, these two support the efficient use of force. Sometimes, during a crisis situation the effect goes further and it is done most of all in diplomacy in order to implement foreign policy and less in conceiving it. In both times of peace or war the most significant impact of the informative activity is materialized in its cumulative character and in its less surprising contribution in increasing efficiency and its capacity to influence.<\/i><\/p>\n<p><b><i>K<\/i><\/b><b><i>eywords<\/i><\/b><i>: source of information, informative activity, informative surveillance, spying, international terrorism, battlefield.<\/i><\/p>\n<p><b>1. INFORMATIVE ACTIVITY<\/b><\/p>\n<\/div>\n<div>\n<p>\u00a0Informative activity needs nowadays a laborious structure and it represents a process which takes place sequentially, between multiple\u00a0\u00a0 structural\u00a0 \u00a0elements\u00a0 \u00a0(agencies).The first \u00a0stage \u00a0consists \u00a0of \u00a0gathering\u00a0 information and it ends in single source results which are most of the time written memorandums from each of the sources of information. The second stage consists of a multisource review of information based on all available data and it has as purpose development of finite information. Next is a period of dissemination done by beneficiary structures of decision and structures responsible with developing policies called receptors, clients, consumers, users, beneficiaries \u00a0etc. \u00a0Between \u00a0the\u00a0 review\u00a0 stage and\u00a0 \u00a0the\u00a0 \u00a0dissemination\u00a0\u00a0 stage\u00a0 \u00a0&#8211;\u00a0 \u00a0but\u00a0 \u00a0not necessarily \u2013 there is an intermediary stage during which departments and agencies combine their personal information in order to obtain special interdepartmental \u201cnational\u201d evaluations\u00a0 for the highest\u00a0 level\u00a0 of political leadership.\u00a0 \u00a0One\u00a0\u00a0 must\u00a0 \u00a0know\u00a0\u00a0 that\u00a0 \u00a0such\u00a0 \u00a0a division is far from being an exact one but it has the possibility of providing the main framework of the system. The informative activity has an internal and an external part. In practice, both internal and external activities (in security purposes) overlap. External threats have internal elements and vice versa. Spying is done by external elements but it represents a threat to the internal elements. The border nature of the target represented by AL- QAEDA and its external sources make this international terrorist organization a classic internal and external ensemble. Most of the terrorist actions are openly international and antiterrorism makes the informative activity expand, in purpose of security, its domain of concerns\u00a0 \u00a0toward\u00a0\u00a0 its\u00a0\u00a0 armed\u00a0\u00a0 forces,\u00a0 \u00a0ships, aircraft\u00a0 \u00a0and\u00a0\u00a0 compatriots\u00a0\u00a0 from\u00a0 \u00a0across \u00a0\u00a0the border. In other words, a clear distinction does not exist. One of the classifications of the external informative activity has as a criterion the\u00a0 \u00a0country\u00a0\u00a0 or\u00a0 \u00a0\u201cgeographic\u00a0 \u00a0area\u201d.\u00a0 \u00a0This criterion depends strictly on the political and military realities. For example, if during The Cold \u00a0War\u00a0 the\u00a0 West\u2019s \u00a0most \u00a0important \u00a0target was the former Soviet Union and the countries which took part at The Treaty of Warsaw after the fall of the Iron Curtain the geographic area of targets consists in countries which support the international terrorist phenomenon. China and the Middle East continue to present a constant similar strategic interest with nuances that are necessary especially in what concerns \u00a0the first\u00a0 one. \u00a0It\u00a0 is\u00a0 certain\u00a0 that\u00a0 today targets consist less in countries and more in specific fields of activity. With all these, geographic targets can provide an approximate kind of sketch of the way of distributing effort in the informative activity domain.<\/p>\n<p>Until the terrorist attacks from 9\/11 against the USA, in the classification based on the criterion domain the informative activity was classically known by specialists worldwide as \u201cpolitical\u201d, \u201dmilitary\u201d and \u201deconomical\u201d informative activity. This classification has its own weak points. <i>Some information systems cover multiple targets <\/i>(Gov.Dec. 500, 2009). Satellites can monitor at any\u00a0\u00a0 time,\u00a0 \u00a0simultaneously,\u00a0 \u00a0multiple\u00a0 \u00a0targets while other systems act as giant vacuum cleaners that\u00a0 gather all types\u00a0 of information from which only those that are important are selected. In essence, the presented domains are not found in pure state, they overlap and duplicate. Regarding the external informative activity mutations are more representative. If before the fall of communism the prior domain was\u00a0\u00a0 the\u00a0 \u00a0defense\u00a0\u00a0 domain,\u00a0\u00a0 after\u00a0\u00a0 1990\u00a0 \u00a0the balance has started to tip in favor of the economic domain because after 9\/11 the international terrorism domain started to gain an \u00a0infinitely\u00a0 greater \u00a0share \u00a0as \u00a0before \u00a09\/11 maybe even more important than the economical and military domain.\u00a0 It must be specified that these mutations are visible and they continue to produce in both domains of activity, intelligence and counterintelligence \u2013 which means \u201cthe informative activity performed\u00a0 \u00a0by\u00a0\u00a0 other\u00a0 \u00a0states\u201d\u00a0 \u00a0meaning\u00a0 \u00a0the activity of getting information about all informative in nature external threats not only about those specific to spying, born from using all types of means (SIGINT, HUMINT, etc.) Between\u00a0 the categories \u00a0of targets \u00a0specific to counterintelligence can be found targets that not necessarily belong to \u00a0a \u00a0state.\u00a0 Some of these targets belong to the economic category. The effort from the domain of informative activity cannot be classified strictly. A clarification on the geographic domain and on the domain of action would elude the larger purpose the informative activity has in understanding realities from other areas \u201cas a whole\u201d or all aspects of the alleged problems both local and global.<\/p>\n<\/div>\n<div>\n<p>&nbsp;<\/p>\n<p><b>2. SOURCES OF INFORMATION<\/b><\/p>\n<p><b>The sources of information <\/b>used for obtaining data and information about terrorists are:<\/p>\n<p><b>\u00a0 HUMINT Sources <\/b>are used for designating information obtained from people but also for designating the domain of informative activity which uses mostly the human element in order to obtain information especially from other human subjects. In performing these missions, HUMINT has sources \u00a0that \u00a0can \u00a0be\u00a0 organized \u00a0to \u00a0form \u00a0a pyramid with every day sources at the bottom which are of relatively low interest and which become\u00a0 more \u00a0and \u00a0more\u00a0 interesting \u00a0as \u00a0we climb to the top of the pyramid. <i>At the bottom of the pyramid is the information gathering activity from travelers, experts and casual informants\u00a0 who\u00a0 have information\u00a0 about targets\u00a0 abroad\u00a0 etc \u00a0<a href=\"http:\/\/www.interpol.int\/\">(www.interpol.int<\/a><\/i>). \u00a0This kind of HUMINT collects information in a similar way from refugees and emigrants. HUMINT\u00a0\u00a0 agencies\u00a0 \u00a0tend\u00a0\u00a0 to\u00a0\u00a0 be\u00a0\u00a0 a\u00a0\u00a0 flexible resource \u00a0category, \u00a0for\u00a0 a \u00a0variety of \u00a0purposes, both in peacetime and in wartime. However, even the sources from the top of the pyramid have distinct limitations. Reports and comments from the memory of the agents are subject to human subjectivity and specific distortions. At one point, they can be so far from reality that their safety becomes unreliable. The advantage is that HUMINT subjects (informants) are almost the only means of penetration of international terrorism and the counterintelligence activity has needed and will always need information to deal with actions and other internal threats. \u00a0HUMINT agencies represented in the twentieth century a domain with a permanent upward evolution, although at a much lower scale from specific sources which gathered information by technical means.<\/p>\n<p><b>S<\/b><b>IGINT Sources <\/b>have become the most prolific sources of the twentieth century. The real pulse of the modern SIGINT sector of development consisted at the beginning of this century, in the introduction of radio waves in order to achieve military communications. Its importance increases even more during World War II, with the intensive use of radio waves, radar and beacons. After 1945, the Cold War had integrated the electronic technology era, which further led to the increase of the importance of the SIGINT domain. A Western study from 1989 noted that &#8220;The Soviet Union has by far the most developed domain of SIGINT\u00a0\u00a0 in\u00a0 \u00a0the\u00a0 \u00a0world\u00a0 \u00a0&#8220;.<\/p>\n<p>The\u00a0 \u00a0process\u00a0\u00a0 of gathering information was dealing with the gathering of information without the knowledge or \u00a0cooperation \u00a0of \u00a0the \u00a0target. \u00a0Usually\u00a0 this process takes place through specific undercover means, designed to penetrate the target\u2019s organized security measures. However, this process also includes some means with a less obvious character, in particular for collecting information from conflict areas.<\/p>\n<\/div>\n<div>\n<p><b>IMINT Sources <\/b>evolved and have become,\u00a0 \u00a0after\u00a0\u00a0 1945,\u00a0 \u00a0as\u00a0 \u00a0important\u00a0 \u00a0as\u00a0 \u00a0the SIGINT domain.\u00a0 In peacetime a part of the activity of the IMINT domain consists in gathering information from the air. . Images taken from planes, filled with those taken from unmanned aircraft, are currently the primary means of battlefield surveillance during wartime. The satellite branch of the IMINT domain has acquired dimensions which have increased ever since the Cold War. Technical progress\u00a0\u00a0\u00a0\u00a0 has reflected under the aspect of opportunity. Information from photos taken by satellites reflected a &#8220;reality&#8221; delayed as the photographic film had to be sent periodically on Earth or retained inside the satellites until they were removed from the orbit at the end of the mission. Today, digital images can be instantly transmitted to ground stations directly through a satellite relay. Regarding the value of using information in the IMINT domain there are some inherent limitations. First of all, interpretation of aerial photographs or satellite photographs is a process that takes place more slowly than other processes of operating with information from SIGINT sources. Second, IMINT \u00a0sources \u00a0cannot \u00a0see\u00a0 rather\u00a0 than \u00a0what can be seen and cannot know what is hidden or what is not yet there (see the Gulf War or Afghanistan). A third limiting factor is the fact that information from the IMINT domain consists\u00a0 of\u00a0 images\u00a0 or\u00a0 sequences\u00a0 of\u00a0 images. This requires the use of satellites that evolve at &#8220;low&#8221; orbits. Therefore, monitoring changes in the evolution of a specific target depends on the frequency of crossings done by a satellite and it is estimated that the best prediction of frequency shift during day time, for a single satellite, is considered by experts as one day. During crisis situations, when aviation can be used over the target area, the IMINT satellite domain and the conventional one have a complementary role. But satellite capabilities do not consist only of the extent of areas that can be observed, but also in its own satellite capacity to monitor the territories of other countries during peacetime. Vis-\u00e0-vis these aspects \u00a0should \u00a0be\u00a0 considered \u00a0the\u00a0 financial issue involving the use of satellites\u00a0 ,\u00a0 which now have become an efficient US-Russian monopoly.\u00a0 Some limited\u00a0 possibilities\u00a0 in this regard have China, France and also Israel since 1995. It is certain that the use of satellites is an element that propels a nation in the first league of informative activity.<\/p>\n<p><b>NUCINT Sources <\/b>designate the informative activity in the nuclear domain, in which satellites are used to detect nuclear explosions\u00a0 throughout \u00a0seismological \u00a0means that \u00a0record\u00a0 earthquakes\u00a0 caused\u00a0 by underground nuclear explosions, by taking air samples to monitor the level of radioactivity in the atmosphere \u00a0and\u00a0 with\u00a0 the use of \u00a0gamma radiation, which reveal the presence of nuclear material within a short distance.<\/p>\n<p><b>RADINT\u00a0 Sources \u00a0<\/b>designate conventional radars which can discover large distances, including those developed for discovering objects evolving in space as well as different types of radar designed for targets evolving beyond the horizon line.<\/p>\n<p><b>ACOUSINT <\/b>Sources are sources that designate\u00a0 \u00a0the\u00a0 \u00a0gathering\u00a0\u00a0 process\u00a0 \u00a0from\u00a0 \u00a0the aquatic \u00a0environment\u00a0\u00a0 throughout \u00a0sonic methods. Also, one part of the ACOUSTINT informative\u00a0 \u00a0activity\u00a0\u00a0 category\u00a0\u00a0 takes\u00a0 \u00a0place above the water, given the capability to discover military forces from long ranges with the use of remote devices capable of detecting sound, \u00a0vibration \u00a0and \u00a0the\u00a0 presence\u00a0 of substances\u00a0 with\u00a0 odor\u00a0 properties.\u00a0 Such defensive measures that are adopted to counter the specific actions of the ACOUSTINT and RADINT domains are included in the implementation of technologies used for &#8220;footprint reduction&#8221; and &#8220;satellites&#8221; in the production of military equipment.<\/p>\n<\/div>\n<div>\n<p><b>M<\/b><b>ASINT\u00a0 Sources \u00a0<\/b>represent\u00a0 the technical and scientific information obtained throughout \u00a0quantitative\u00a0 and \u00a0qualitative analysis.<\/p>\n<p><b>P<\/b><b>HOTOINT Sources <\/b>are secret and interpreted photographic materials.<\/p>\n<p><b>RINT Sources <\/b>are electromechanical energy sources that are received unintentionally.<\/p>\n<p><b>F<\/b><b>ISINT Sources <\/b>represent the intelligence domain referring to signals used in directing, the SIGINT category.<\/p>\n<p><b>TEL<\/b><b>I<\/b><b>N<\/b><b>T\u00a0 Sources \u00a0<\/b>represent\u00a0 the intelligence domain of interception and analysis of signals used in telemetry, they are a part of FISINT <div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\">[3].<\/p>\n<p><b>OS<\/b><b>I<\/b><b>N<\/b><b>T Sources <\/b>are &#8220;open sources&#8221; (Open Sources Intelligence) representing informative finished\u00a0 products\u00a0 obtained\u00a0 by processing primary information collected from open sources as well as public \u00a0documents media, books and magazines, &#8220;gray&#8221; literature and the Internet.<\/p>\n<p>Regarding\u00a0 \u00a0open\u00a0 \u00a0source,\u00a0 \u00a0there\u00a0\u00a0 are\u00a0\u00a0 a growing number of ideas today that highlight the importance which they represent in the economy of the informative activity, importance caused primarily, by today&#8217;s information explosion. <i>Much of the Western experts believe that the share of sources in the intelligence activity is \u201copen source&#8221; <\/i>(Gov.Dec. 2010-2012). The appreciation seems hazardous to a first assessment. Given, however, the particular impact of the media in the contemporary world, the extension of the freedoms of expression and opinion, we can say that we are witnessing a change in the relationship between open sources and covered sources meaning that the last are shrinking, as a coverage area, but also in volume in favor of the first. The problem that arises is however otherwise, namely accuracy. A confidential information can be &#8220;dressed&#8221; from the perspective of the open sources with a multitude of data and many additional or complementary elements resulting from the journalist in question wish to seem more informed,\u00a0\u00a0 more\u00a0 \u00a0prolific\u00a0 \u00a0and\u00a0 \u00a0expert\u00a0 \u00a0in\u00a0\u00a0 the problem in this case so that the essence and the true information, with an actually confidential character, to escape unnoticed or to be diluted to such an extent that it no longer poses only importance itself. To affirm and support today that in a modern intelligence service the share is &#8220;open source&#8221; would be very hazardous, because if something like this would be true that service should have a processing, analyzing and synthesizing, super-sophisticated center, able to filter media and to quickly separate &#8220;dead&#8221; information from the &#8220;relevant&#8221;, &#8220;prestigious\u201d information. But this possibility in view of services and intelligence agencies, does not exist yet, not even in major countries.<\/p>\n<p>Information gathering process is directed against targets that do not agree with this fact and usually take measures to counteract this process. In peacetime, in respect of targets from abroad, the most important part of the information gathering process takes place by means that distinguish the informative activity from the non-informative methods of the policy makers in order to acquire information. In time of war, the distinction between specific and nonspecific informative activity methods is less clear. Special methods of the covert information activities remain an attribute of it, but we are witnessing the increase of the collection of information from the battlefield by means with a less covered character. Furthermore, informative techniques from the battlefield merge with the military ones specific to &#8220;information from the battlefield&#8221;.<\/p>\n<p>Military distinctions between these two types of information gathering contain accidental bureaucratic elements as well as elements related to conveniences but there is some logical reasoning that led to them. Intelligence obtained in the theater of war is somehow exploitable, less penetrable and more capable of penetrating, more complex and fragile (and therefore secret) than information from the theatre of war. However, using satellites and computers make some of these differences disappear.<\/p>\n<p>In contrast the multisource informative activity is no different in its means. Its specific nature derives from the separation of its political recommendations and general orientation regarding its foreign policy (to which \u00a0are\u00a0 added \u00a0the\u00a0 inner\u00a0 aspects \u00a0of\u00a0 the internal security). In this framework, external study fields and issues must be large. But the results produced by it are considered by governments as having regard to more enemies than allies and even more the studies in which they\u00a0\u00a0 are\u00a0 \u00a0involved\u00a0 \u00a0come\u00a0 \u00a0from\u00a0 \u00a0the\u00a0 \u00a0public domain. The informative activity should not be diverted\u00a0 to\u00a0 informational\u00a0 materials \u00a0coming from covered sources. But it tends to have a stronger authority as this type of source has the most important contribution compared to sources completely &#8220;open&#8221;.<\/p>\n<\/div>\n<p>The \u00a0informative \u00a0activity\u00a0 justification \u00a0is that it informs practical actions in useful ways. However the using of these activities varies: some reports are used immediately while others will \u00a0be\u00a0 used \u00a0with \u00a0time. \u00a0While\u00a0 many reports influence decisions through their cumulative effects others have an educational or long-term psychological \u00a0value. \u00a0Supervision \u00a0for\u00a0 the purpose of warning constitutes a precautionary measure\u00a0 \u00a0against\u00a0\u00a0 things\u00a0\u00a0 that\u00a0\u00a0 might\u00a0 \u00a0never happen. Some information is not used at all.From all these points of view of &#8220;intelligence&#8221; information is not different from ordinary information. However, the effect is to optimize the state power and international influence at different levels. In times of crisis they support the effective use of force. Sometimes during a crisis situation the effect goes further and it is done most of all in diplomacy in order to implement foreign policy and less in conceiving it. In both times of peace or war the most significant impact of the informative activity is materialized in its cumulative character and in its less surprising contribution in increasing efficiency and its capacity to influence.<\/p>\n<p>&nbsp;<\/p>\n<p><b>3. CONCLUSION<\/b><\/p>\n<p><b>In conclusion\u00a0 <\/b>the role of information in identifying investigating and monitoring crises depends on the distribution of resources in informative activity chapters with a social and political international context , and its balance at one point. The increase of some or other domains depends on several factors: the political and military interests of the state, resources, the degree of receptivity of the &#8220;intelligence&#8221;\u00a0\u00a0 product\u00a0 \u00a0and\u00a0 \u00a0its\u00a0 \u00a0use\u00a0 \u00a0in\u00a0 \u00a0the decision\u00a0 process\u00a0 ,risk\u00a0 factors\u00a0 specific to\u00a0 the state and on the degree of adaptability of intelligence services to in these risk factors<\/p>\n<p>&nbsp;<\/p>\n<p><b>BIBLIOGRAPHY<\/b><\/p>\n<p>1.\u00a0\u00a0 Reese\u00a0 \u00a0Brown,\u00a0 \u00a0F.\u00a0 \u00a0(1993).\u00a0 \u00a0Behind\u00a0 \u00a0the Drumes\u00a0 and\u00a0 Bugles. \u00a0<i>International Journal of intelligence and Counterintelligence. <\/i>Vol.6. No.3.<\/p>\n<p>2.\u00a0\u00a0 ***. (2010). <i>Five steps to a safer Europe<\/i>. (<i>2012 \u00a0<\/i>COM). \u00a0 \u00a0673 &#8211; EU \u00a0Internal Security Strategy in Action.<\/p>\n<p>3.\u00a0\u00a0 ***.\u00a0\u00a0\u00a0\u00a0 (2009). \u00a0Government \u00a0 Decision no. 500\/2009 for the \u00a0implementation of the passenger \u00a0data \u00a0transmission system in airport. <i>Monitorul Oficial, <\/i>300.<\/p>\n<p>4.\u00a0\u00a0 ***. (2009). Government Decision draft for the National Strategy for integrated border management of the Romanian state 2010 -2012.<\/p>\n<p>5.\u00a0\u00a0<a href=\" http:\/\/www.interpol.int\"> http:\/\/www.interpol.int<\/a>\u00a0.<\/p>\n<p><span style=\"color: #c0c0c0;\"><a title=\"Articolul a fost publicat in Revista  Academiei Fortelor Aeriene ,,The Scientific Informative Review, Vol IX, No 1(20)\/2012''\" href=\"http:\/\/www.afahc.ro\/revista\/Nr_1_2012\/rev_1_2012.pdf\"><span style=\"color: #c0c0c0;\">Articolul a fost publicat in Revista \u00a0Academiei Fortelor Aeriene ,,The Scientific Informative Review, Vol IX, No 1(20)\/2012&#8221;<\/span><\/a><\/span><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract: Intelligence information is not different from common information. Nevertheless, the effect is that of optimizing state power and international influence at different levels. During crisis times, these two support the efficient use of force. Sometimes, during a crisis situation the effect goes further and it is done most of all in diplomacy in order to implement foreign policy and less in conceiving it. In both times of peace or war the most significant impact of the informative activity is materialized in its cumulative character and in its less surprising contribution in increasing efficiency and its capacity to influence. Keywords: source of information, informative activity, informative surveillance, spying, international terrorism, [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2251,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[102,88],"tags":[],"class_list":["post-2260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-issues","category-terrorism"],"_links":{"self":[{"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/posts\/2260"}],"collection":[{"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/comments?post=2260"}],"version-history":[{"count":1,"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/posts\/2260\/revisions"}],"predecessor-version":[{"id":4563,"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/posts\/2260\/revisions\/4563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/media\/2251"}],"wp:attachment":[{"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/media?parent=2260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/categories?post=2260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cass-ro.org\/en\/wp-json\/wp\/v2\/tags?post=2260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}