{"id":26,"date":"2008-11-12T10:56:40","date_gmt":"2008-11-12T15:56:40","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/hroberts\/?p=26"},"modified":"2008-11-12T10:56:40","modified_gmt":"2008-11-12T15:56:40","slug":"surveillance-project-blog","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/hroberts\/2008\/11\/12\/surveillance-project-blog\/","title":{"rendered":"Surveillance Project Blog"},"content":{"rendered":"<p>We&#8217;ve started a <a href=\"http:\/\/blogs.law.harvard.edu\/surveillance\">blog for the Berkman Surveillance Project<\/a>.  I&#8217;ve been posting all of my surveillance stuff there, including the following stories:<\/p>\n<ul>\n<li><a href=\"http:\/\/blogs.law.harvard.edu\/surveillance\/2008\/11\/11\/narus-security-through-surveillance\/\">Narus: Security through Surveillance<\/a><\/li>\n<li><a href=\"http:\/\/blogs.law.harvard.edu\/surveillance\/2008\/11\/10\/best-western-data-breach-as-shell-game\/\"> Best Western Data Breach as Shell Game<\/a><\/li>\n<li><a href=\"http:\/\/blogs.law.harvard.edu\/surveillance\/2008\/10\/23\/calea-status\/\">CALEA Status<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;ve started a blog for the Berkman Surveillance Project. I&#8217;ve been posting all of my surveillance stuff there, including the following stories: Narus: Security through Surveillance Best Western Data Breach as Shell Game CALEA Status<\/p>\n","protected":false},"author":71,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-26","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/posts\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/posts\/26\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/categories?post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/tags?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}