{"id":26052,"date":"2016-01-12T14:44:20","date_gmt":"2016-01-12T13:44:20","guid":{"rendered":"https:\/\/www.hiig.de\/en\/?p=26052"},"modified":"2016-01-12T16:31:10","modified_gmt":"2016-01-12T15:31:10","slug":"conference-on-anti-cybercrime-in-saudi-arabia","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/","title":{"rendered":"EU-Cybercrime-Directive: a new global model law?"},"content":{"rendered":"<p><em>Our doctoral reseacher Adrian Haase was a presenting author at the <\/em><a href=\"http:\/\/icacc.ccis-imsiu.edu.sa\/\"><em>First International Confernece on Anti-Cybercrime in Riyadh, Saudi Arabia in November 2015<\/em><\/a><em>. His paper as well as his corresponding presentation focused on the\u00a0<\/em><a href=\"http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2013:218:0008:0014:en:PDF\"><em>EU-Directive 2013\/40\/EU on attacks against information systems<\/em><\/a><em> and its potential to become a global model law for substantive cybercrime legislation.<\/em><\/p>\n<p>In Bereichen besonders schwerer Kriminalit\u00e4t mit grenz\u00fcberschreitender Dimension hat die Europ\u00e4ische Union seit dem Vertrag von Lissabon eine Kompetenz zu Strafrechtsharmonisierung (Art. 83 Abs. 1 AEUV). F\u00fcr das Kriminalit\u00e4tsfeld der Computerkriminalit\u00e4t hat die Europ\u00e4ische Union diese Kompetenz im Jahre 2013 genutzt und Richtlinie 2013\/40\/EU verabschiedet. Diese adressiert vier Bereiche krimineller Aktivit\u00e4ten, die sich gegen Informationssysteme richten: den rechtswidrigen Zugang zu Informationssystemen (Artikel 3), rechtswidrige Systemeingriffe (Artikel 4), rechtswidrige Eingriffe in Daten (Artikel 5) und rechtswidriges Abfangen von Daten (Artikel 6). Zum September 2015 haben die EU-Mitgliedstaaten ihr jeweiliges materielles und prozessuales Strafrecht den Erfordernissen der Richtlinie angepasst.<\/p>\n<p>Insbesondere der Schutz kritischer Infrastrukturen soll durch dieses EU-Instrument verbessert werden. Als Beispiel dient dazu die Vorfeld-Kriminalisierung bei der Konstruktion von Bot-Netzen, die regelm\u00e4\u00dfig f\u00fcr DDoS-Attacken genutzt werden. Bereits in fr\u00fchen Entwicklungsstadien von Bot-Netzen und somit ohne tats\u00e4chliche Sch\u00e4digung fremder Rechtsg\u00fcter haben die EU-Staaten nun derartige Aktivit\u00e4ten unter Strafe gestellt. Die Diskussion bez\u00fcglich strafrechtsdogmatischer Schwierigkeiten bei einer Kriminalisierung solcher Handlungen, die eine sp\u00e4tere Straftat lediglich vorbereiten, wird an anderer Stelle zu f\u00fchren sein. Der Ansatz, \u201eHacking\u201c-Aktivit\u00e4ten weitreichend unter Strafe zu stellen, zeigt allerdings jetzt bereits zweierlei: erstens ist der Glaube an ein abschreckendes Strafrecht lebendiger denn je und zweitens wird die Bedrohung kritischer Infrastrukturen durch Angriffe auf Informationssysteme durch die EU als nahezu existenzgef\u00e4hrdend eingesch\u00e4tzt.<\/p>\n<p>Letzterer Aspekt bei der Bek\u00e4mpfung von Angriffen auf Informationssysteme spiegelt durchaus real existierende Gefahren wider, wie aktuelle <a href=\"http:\/\/www8.hp.com\/de\/de\/software-solutions\/ponemon-cyber-security-report\/\">Studien<\/a> zu den Auswirkungen von Cyberattacken nachweisen. Den IT-Infrastrukturen kommt dabei eine besondere Wichtigkeit zu. Zun\u00e4chst gew\u00e4hrleisten sie Informationsbeschaffung und l\u00fcckenlose Kommunikation zu gesellschaftlichen, sozialen, wirtschaftlichen und politischen Zwecken. Dar\u00fcber hinaus erf\u00fcllen die Informations- und Kommunikationsinfrastrukturen allerdings noch einen weiteren Zweck, denn sie dienen mittlerweile den meisten anderen kritischen Infrastrukturen, wie Finanzwirtschaft, Energieversorgung, Transport, etc. als Meta-Infrastruktur. Bei einem Ausfall von kritischen IT-Infrastrukturen sind somit weitere relevante Bereiche des gesellschaftlichen Lebens bedroht.<\/p>\n<p>Die Vernetzung zwischen IT-Infrastrukturen \u00fcber Staatsgrenzen hinweg globalisiert diese Gefahren zudem. Wie bereits <a href=\"https:\/\/www.hiig.de\/cyberkriminalitaet-im-fokus-der-vereinten-nationen-ein-bericht-von-der-unodc-konferenz-in-doha\/\">meinem letzten Artikel<\/a> zu entnehmen war, sind Einigungsversuche bez\u00fcglich bindender v\u00f6lkerrechtlicher Abkommen auf globaler Ebene bislang nicht von Erfolg gekr\u00f6nt gewesen und werden auch f\u00fcr die n\u00e4here Zukunft als wenig aussichtsreich angesehen. Ein Hauptproblem dabei ist stets der Ansatz, Cyberkriminalit\u00e4t umfassend kriminalisieren zu wollen. Regionale, nationale, gesellschaftliche, historische, politische und religi\u00f6se Unterschiede bzw. Besonderheiten verhindern derartige Abkommen jedoch oftmals. Auch das bislang erfolgreichste internationale Cybercrime-Instrument, die <a href=\"http:\/\/www.cr-online.de\/2001_11-23_Europarat_Uebereink._Computerkriminalitaet.pdf\">Convention on Cybercrime des Europarates<\/a>, kommt nach ca. 14 Jahren des Bestehens in ihrer Bedeutung nicht signifikant \u00fcber den westlichen Kulturkreis hinaus.<\/p>\n<p>Beim Schutz kritischer IT-Infrastrukturen hingegen scheint ein globaler Konsens jedoch m\u00f6glich, sodass die EU-Richtlinie gegen Angriffe auf Informationssysteme m\u00f6glicherweise das dringend ben\u00f6tigte <em>model law<\/em> darstellen k\u00f6nnte, obwohl die Vorfeldkriminalisierung gleichwohl weiterhin kritisch zu begleiten sein wird.<\/p>\n<p>Der genannte Aufsatz ist erschienen bei <a href=\"http:\/\/ieeexplore.ieee.org\/Xplore\/home.jsp\">IEEE Xplore\u00ae<\/a> und abrufbar unter: <a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=7351931&amp;newsearch=true&amp;queryText=adrian%20haase\"><em>Haase, Harmonizing Substantive Cybercrime Law through European Union Directive 2013\/40\/EU \u2013 From European Legislation to International Model Law?, ICACC 2015<\/em><\/a><em>.<\/em><\/p>\n<p>Photo:\u00a0<a href=\"https:\/\/www.flickr.com\/photos\/mrcacahuate\/\" target=\"_blank\">User:Ivan David Gomez Arce<\/a>\u00a0\/\u00a0<a href=\"https:\/\/www.flickr.com\/\" target=\"_blank\">Flickr<\/a>,\u00a0<a style=\"color: #008eb2;\" href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\" target=\"_blank\" data-slimstat-tracking=\"true\" data-slimstat-callback=\"false\" data-slimstat-type=\"0\" data-slimstat-clicked=\"false\" data-slimstat-async=\"true\">CC BY 2.0<\/a><\/p>\n<h4 style=\"color: grey;\">This post is part of a weekly series of articles by\u00a0<a style=\"color: #008eb2;\" href=\"https:\/\/www.hiig.de\/en\/doctoral-programme\/\" data-slimstat-tracking=\"false\" data-slimstat-callback=\"true\" data-slimstat-type=\"2\">doctoral canditates<\/a>\u00a0of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and asssociated research projects, please contact\u00a0<a style=\"color: #008eb2;\" href=\"mailto:info@hiig.de\" data-slimstat-tracking=\"false\" data-slimstat-callback=\"true\" data-slimstat-type=\"1\">info@hiig.de<\/a>.<\/h4>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fconference-on-anti-cybercrime-in-saudi-arabia%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=EU-Cybercrime-Directive%3A%20a%20new%20global%20model%20law%3F https%3A%2F%2Fwww.hiig.de%2Fen%2Fconference-on-anti-cybercrime-in-saudi-arabia%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fconference-on-anti-cybercrime-in-saudi-arabia%2F&subject=EU-Cybercrime-Directive%3A%20a%20new%20global%20model%20law%3F\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Our doctoral reseacher Adrian Haase was a presenting author at the First International Confernece on Anti-Cybercrime in Riyadh, Saudi Arabia in November 2015. His paper as well as his corresponding presentation focused on the\u00a0EU-Directive 2013\/40\/EU on attacks against information systems and its potential to become a global model law for substantive cybercrime legislation. In Bereichen&hellip;<\/p>\n","protected":false},"author":53,"featured_media":26049,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-26052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>EU-Cybercrime-Directive: a new global model law? &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EU-Cybercrime-Directive: a new global model law? &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Our doctoral reseacher Adrian Haase was a presenting author at the First International Confernece on Anti-Cybercrime in Riyadh, Saudi Arabia in November 2015. His paper as well as his corresponding presentation focused on the\u00a0EU-Directive 2013\/40\/EU on attacks against information systems and its potential to become a global model law for substantive cybercrime legislation. In Bereichen&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-12T13:44:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-01-12T15:31:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/01\/5825972240_1d1dba6dca_o.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adrian Haase\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adrian Haase\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EU-Cybercrime-Directive: a new global model law? &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/","og_locale":"en_US","og_type":"article","og_title":"EU-Cybercrime-Directive: a new global model law? &#8211; Digital Society Blog","og_description":"Our doctoral reseacher Adrian Haase was a presenting author at the First International Confernece on Anti-Cybercrime in Riyadh, Saudi Arabia in November 2015. His paper as well as his corresponding presentation focused on the\u00a0EU-Directive 2013\/40\/EU on attacks against information systems and its potential to become a global model law for substantive cybercrime legislation. In Bereichen&hellip;","og_url":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/","og_site_name":"HIIG","article_published_time":"2016-01-12T13:44:20+00:00","article_modified_time":"2016-01-12T15:31:10+00:00","og_image":[{"width":2048,"height":1536,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2016\/01\/5825972240_1d1dba6dca_o.jpg","type":"image\/jpeg"}],"author":"Adrian Haase","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adrian Haase","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/"},"author":{"name":"Adrian Haase","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/c4b59c3bb59d195ca49e88c66dc1fbbe"},"headline":"EU-Cybercrime-Directive: a new global model law?","datePublished":"2016-01-12T13:44:20+00:00","dateModified":"2016-01-12T15:31:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/"},"wordCount":617,"commentCount":0,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/","url":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/","name":"EU-Cybercrime-Directive: a new global model law? &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2016-01-12T13:44:20+00:00","dateModified":"2016-01-12T15:31:10+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":2048,"height":1536},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/conference-on-anti-cybercrime-in-saudi-arabia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"EU-Cybercrime-Directive: a new global model law?"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/c4b59c3bb59d195ca49e88c66dc1fbbe","name":"Adrian Haase"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/26052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=26052"}],"version-history":[{"count":3,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/26052\/revisions"}],"predecessor-version":[{"id":26070,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/26052\/revisions\/26070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/26049"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=26052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=26052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=26052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}