{"id":70790,"date":"2020-09-23T13:54:45","date_gmt":"2020-09-23T11:54:45","guid":{"rendered":"https:\/\/www.hiig.de\/?p=70790"},"modified":"2021-10-22T18:35:28","modified_gmt":"2021-10-22T16:35:28","slug":"security-in-cyberspace-workshop-insights","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/security-in-cyberspace-workshop-insights\/","title":{"rendered":"Security in Cyberspace: Workshop Insights"},"content":{"rendered":"\n<p><em>At the same time that cyberspace has created some opportunities, such as higher efficiency of critical infrastructures and a lower barrier cost venue for non-state actors to project their ideas and voices, the <a href=\"https:\/\/www.e-ir.info\/2018\/01\/14\/securitisation-theory-an-introduction\/\">securitisation<\/a> of the digital domain happens. Society\u2019s collective imaginary has already created some catastrophic scenario projections directed to states and military manoeuvres. Besides, recent geopolitical movements related to emerging technologies, have rekindled ideas towards power in cyberspace. These developments increase concerns about instability in cyberspace and deserve some consideration and more in-depth debate.&nbsp;<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>Thus, aiming to promote an in-depth debate about security in cyberspace, the online workshop \u201cSecurity in Cyberspace: dynamics, limits, and opportunities\u201d &#8211; held by the Alexander von Humboldt Institute for Internet and Society (HIIG), Getulio Vargas Foundation (FGV Direito SP) and the Federal Universities of Santa Catarina (UFSC) and Rio Grande do Sul (UFRGS),&nbsp; &#8211; &nbsp; encompassed four main topics: (1) cyberspace as a war domain, (2) liberty vs security in cyberspace, (3) the cyber institutional and organisational apparatus of European and Brazilian states and (4) the changes, or the lack thereof, as a consequence of the international balance of power entrenched in the digital sphere. Seeking also to demystify, with the presentations of Brazilian and European scholars, the perception that cyber problems are constrained to a very few \u201cgreat powers\u201d like China, Russia, and the USA.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The workshop: dynamic and ideas<\/strong><\/h3>\n\n\n\n<p>The workshop assembled a total of twelve panellists with different backgrounds and strong cybersecurity and cyber defence expertise; four similarly diverse mediators; and an audience of more than 170 attendees, participating in eight polls throughout the event. This dynamic allowed the development of a detailed <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3645964\">report<\/a>, providing valuable insights for the field, which will be summarised here.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cyberspace as a war domain<\/strong><\/h3>\n\n\n\n<p>The <a href=\"https:\/\/www.youtube.com\/watch?v=ElTsmTU5Y0Q\">first panel<\/a> approached the idea of cyberspace as a war domain. The topic was chosen to open the event because even though cyberwar and cyberwarfare are still contested concepts, the idea of a possible warlike conflict in cyberspace has been very much present since the 1980s. Indeed, the three panellists made it clear that the concept of cyberwarfare is mutable, has evolved, and has been shaped by other concepts such as power and domination.&nbsp;<\/p>\n\n\n\n<p>Interestingly, despite cyberwar being a loose concept, the majority of the attendees agreed that cyberspace <strong>should be<\/strong> considered a war domain. Moreover, they agreed that to reach stability in cyberspace, a solution could be a normative take, since the majority agreed that states need to develop a cyber-weapon nonproliferation treaty.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Liberty vs. Security in Cyberspace<\/strong><\/h3>\n\n\n\n<p>The <a href=\"https:\/\/www.youtube.com\/watch?v=0XqkBoOWxNU&amp;t=51s\">second panel<\/a> sought to debate the dichotomy between security and liberty online, a topic more focused on data management. Each cyber actor \u2013 states, companies and civil society \u2013 seeks to push the security discourse to either increase surveillance or information control or to diminish it. Thus, the panellists exposed that placing the concepts of privacy and security on opposite sides is a fallacy. And as such, it should be disregarded when seeking solutions to the challenges in cyberspace interactions. Moreover, they pointed out that the debate and solutions for determining adjustable parameters must be done both at the individual (privacy protection) and global level (data regulators), which resonated with the attendees\u2019 answers.&nbsp;<\/p>\n\n\n\n<p>According to the attendees, to better develop balanced security and fundamental rights and freedoms, mixed (public-private) arrangements would be the best way to go, and those should be based on transparency, as the lack thereof could undermine confidence-building measures.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Brazil and European Union Cybersecurity<\/strong><\/h3>\n\n\n\n<p>The <a href=\"https:\/\/www.youtube.com\/watch?v=-lVD2WVlsGM&amp;t=3823s\">third panel<\/a> delved into a detailed discussion on Brazilian and European institutional frameworks and particularities, bringing the importance of contextual and regional cybersecurity frameworks to the debate in order to understand the broader international picture of cyber interactions. From the panellists\u2019 presentations, it was clear that bringing together like-minded states could potentially strengthen strategic partnerships, and provide overlapping benefits to areas such as cyber norms development and competitive advantage, especially when thinking about improvements of public-private partnerships (PPPs). Concerning a more cooperative and plural environment to reach stability in cyberspace, the majority of attendees pointed that states should pursue multilateral approaches and that the world does not need a&nbsp; \u201ccyber hegemon\u201d to maintain order in the digital domain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Interstate dynamics in Cyberspace and their consequences for International Relations&nbsp;<\/strong><\/h3>\n\n\n\n<p>From the regional to the systemic arena, the <a href=\"https:\/\/www.youtube.com\/watch?v=syDm6mvjxKQ&amp;t=2998s\">fourth panel<\/a> focused on power. The topic at stake were the interstate dynamics in cyberspace and its consequences for International Relations balance of power. The panellists made the case that the world is suffering a new transition phase where the power that technologies \u2013 and thus cyberspace \u2013 provide is diffused. The transitional time shifts reasoning and strategies; the digital environment allows the participation of non-state actors in power interactions, and ultimately, the measurement of cyber power is still a new task.&nbsp;<\/p>\n\n\n\n<p>In this regard, the attendees pointed out that infrastructure development and access to critical information infrastructure, cyber military force\/cyber command, the number of cyber awareness and cyber specialists of a population, and a national cyber strategy should be elements of consideration when talking about cyber power. Moreover, they agreed that non-state actors benefited from power relations in cyberspace, which can be interpreted as a reinforcement of the idea of plurality and a degree of horizontality that cyberspace has in proportion to power dynamics.&nbsp;<\/p>\n\n\n\n<p><strong>Takeaways: <\/strong>continuing strive for stability<\/p>\n\n\n\n<p>In sum, the debates were very fruitful, and there are three main insights I want to highlight.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Security in cyberspace is essential but must be balanced.&nbsp;<\/li><li>Both top-down and bottom-up dialogue on actions and limits among the cyber actors can bring the balance if they are based on multilateral, transparent bases.&nbsp;<\/li><li>Ideas of dominance and hegemony could potentially trigger conflict escalation to the degree of war-like scenarios.&nbsp;<\/li><\/ol>\n\n\n\n<p>Although these insights may not be new in the cyber interactions discussion, it is necessary to recall them. Thus, we can continue to strive for stability in the digital realm, especially when the world becomes more digital, not only through the digital economy but also the rapid and increasing pace that is inherent in the physical and digital domain.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fsecurity-in-cyberspace-workshop-insights%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Security%20in%20Cyberspace%3A%20Workshop%20Insights https%3A%2F%2Fwww.hiig.de%2Fen%2Fsecurity-in-cyberspace-workshop-insights%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fsecurity-in-cyberspace-workshop-insights%2F&subject=Security%20in%20Cyberspace%3A%20Workshop%20Insights\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Analysing security in cyberspace can encompass a variety of topics. The workshop under scrutiny touched upon some of them, providing valuable insights for society and, ultimately, relevant ideas for building up better relationships among \u201ccyber-actors\u201d.<\/p>\n","protected":false},"author":316,"featured_media":70788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[224],"tags":[1045,1049,1111],"class_list":["post-70790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-and-law","tag-datenschutz-2","tag-privatsphare","tag-uberwachung"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security in Cyberspace: Workshop Insights &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"Analysing security in cyberspace can encompass a variety of topics. The workshop under scrutiny touched upon some of them, providing valuable insights for society and, ultimately, relevant ideas for building up better relationships among \u201ccyber-actors\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security in Cyberspace: Workshop Insights &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Analysing security in cyberspace can encompass a variety of topics. The workshop under scrutiny touched upon some of them, providing valuable insights for society and, ultimately, relevant ideas for building up better relationships among \u201ccyber-actors\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-23T11:54:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-22T16:35:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/lukenn-sabellano-RDufjtg6JpQ-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1439\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruna Toso de Alc\u00e2ntara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruna Toso de Alc\u00e2ntara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security in Cyberspace: Workshop Insights &#8211; Digital Society Blog","description":"Analysing security in cyberspace can encompass a variety of topics. The workshop under scrutiny touched upon some of them, providing valuable insights for society and, ultimately, relevant ideas for building up better relationships among \u201ccyber-actors\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/","og_locale":"en_US","og_type":"article","og_title":"Security in Cyberspace: Workshop Insights &#8211; Digital Society Blog","og_description":"Analysing security in cyberspace can encompass a variety of topics. The workshop under scrutiny touched upon some of them, providing valuable insights for society and, ultimately, relevant ideas for building up better relationships among \u201ccyber-actors\u201d.","og_url":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/","og_site_name":"HIIG","article_published_time":"2020-09-23T11:54:45+00:00","article_modified_time":"2021-10-22T16:35:28+00:00","og_image":[{"width":2560,"height":1439,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/lukenn-sabellano-RDufjtg6JpQ-unsplash.jpg","type":"image\/jpeg"}],"author":"Bruna Toso de Alc\u00e2ntara","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruna Toso de Alc\u00e2ntara","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/"},"author":{"name":"Bruna Toso de Alc\u00e2ntara","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/ca76c0a9a31b8635179d4f0cd642afd0"},"headline":"Security in Cyberspace: Workshop Insights","datePublished":"2020-09-23T11:54:45+00:00","dateModified":"2021-10-22T16:35:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/"},"wordCount":1022,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/lukenn-sabellano-RDufjtg6JpQ-unsplash.jpg","keywords":["datenschutz","privatsph\u00e4re","\u00fcberwachung"],"articleSection":["Policy and Law"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/","url":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/","name":"Security in Cyberspace: Workshop Insights &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/lukenn-sabellano-RDufjtg6JpQ-unsplash.jpg","datePublished":"2020-09-23T11:54:45+00:00","dateModified":"2021-10-22T16:35:28+00:00","description":"Analysing security in cyberspace can encompass a variety of topics. The workshop under scrutiny touched upon some of them, providing valuable insights for society and, ultimately, relevant ideas for building up better relationships among \u201ccyber-actors\u201d.","breadcrumb":{"@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/lukenn-sabellano-RDufjtg6JpQ-unsplash.jpg","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/09\/lukenn-sabellano-RDufjtg6JpQ-unsplash.jpg","width":2560,"height":1439},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/sicherheit-im-cyberspace-workshop-einblicke\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Security in Cyberspace: Workshop Insights"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/ca76c0a9a31b8635179d4f0cd642afd0","name":"Bruna Toso de Alc\u00e2ntara"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/70790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=70790"}],"version-history":[{"count":7,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/70790\/revisions"}],"predecessor-version":[{"id":74204,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/70790\/revisions\/74204"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/70788"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=70790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=70790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=70790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}