{"id":148,"date":"2017-09-25T14:22:01","date_gmt":"2017-09-25T14:22:01","guid":{"rendered":"https:\/\/blogs.imperial.ac.uk\/security-institute\/?p=148"},"modified":"2017-09-25T14:23:06","modified_gmt":"2017-09-25T14:23:06","slug":"the-security-of-driverless-cars","status":"publish","type":"post","link":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/","title":{"rendered":"The Security of Driverless Cars"},"content":{"rendered":"<p><em>A post by Dr Deeph Chana, Deputy Director for the Institute for Security Science and Technology. This blog first appeared as an opinion piece on GATEway project <a href=\"https:\/\/gateway-project.org.uk\/the-security-of-driverless-cars\/\">website<\/a>, 19 September 2017.\u00a0<\/em><\/p>\n<figure id=\"attachment_149\" aria-describedby=\"caption-attachment-149\" style=\"width: 740px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"487\" class=\"size-full wp-image-149\" src=\"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2017\/09\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg\" alt=\"\" \/><figcaption id=\"caption-attachment-149\" class=\"wp-caption-text\">Image copyright Frank Derks under CC-CC-BY-2.0<\/figcaption><\/figure>\n<p>The opportunities that driverless vehicles present are undoubtedly profound. None more so than the emergence of multi-modal transport services (trains, planes, automobiles \u2026 and boats) that will intelligently cooperate to take us from A to B without any human intervention.<\/p>\n<p>Replacing the old biological controllers \u2014 namely us \u2014 the autonomous vehicle will excel in everything from energy efficiency to just being safe. The technology of today already affords us a near-term vision of the car where route planning and optimisation, refuelling and recharging, transactions with services (tolls , shops , parking lots), and authentication and hand-shaking for the purpose of site access control are all automatically achieved by the vehicle, without the human \u2018in-the-loop\u2019.<\/p>\n<p>Removing the human from all of these piloting activities in concert, including that of physically maneuvering the vehicle, will prove to be the real transformation in experience that autonomy will bring to car users. The main outstanding technical piece needed to achieve this \u2014 the driving bit \u2014 is a problem that is rapidly being cracked by some of the largest and smartest companies in the world.<\/p>\n<h2>Removing the human from the driving seat<\/h2>\n<p>Furthermore, the use of artificial intelligence and deep-learning technology is poised not merely to deliver our replacement, but a significant upgrade. A \u2018driver\u2019 that will be better at learning, anticipation and adaption and one that will work tirelessly, around the clock. Driver 1.0 looks set, almost inevitably, for extinction. But, don\u2019t worry if you\u2019re feeling somehow obsolete, all of this will leave us with far more time to get on with the more important things in life like texting and motorway Tinder and will eliminate that potent source of stress, road rage \u2014 although there are no promises about the more general problem of rage on the road.<\/p>\n<p>However, let\u2019s leave the debate as to whether or not this transport paradigm-shift represents a psychological step forward for the road user for another day and settle for the fact that it certainly will be a technical leap-forward on how we go about the business of moving about.<\/p>\n<p>Considering the comprehensive nature of the transformation we\u2019re talking about, it is not unreasonable to ask if a re-think on what it means for a car to be secure and safe is motivated. Ironically, when we do pose the question, rather than the longer-term prospects of some kind of dystopian robo-world emerging, understanding how to be secure against humans emerges as the more pressing concern.<\/p>\n<p>For whatever motivation \u2014 and there are plenty to choose from \u2014 humans are the most likely to seek the means and methods for compromising the whole operation; either by delivering costly nuisance cyber-hacks or by engineering complex orchestrated attacks that result in large scale economic hits or even the loss of life. Tragic incidents in urban settings around the world such as the most recent in Barcelona, illustrate how the car, even in its current form, may be used to generate terror and fear with global resonance and impact.<\/p>\n<p>Paradoxically, the driverless car simultaneously represents an opportunity for virtually eliminating such incidents and the means by which their impacts could be greatly amplified. Both of these outcomes will be made possible by the unprecedented interconnectivity the car of the future will possess, where participation in a massive and distributed network of things including other cars, buildings, IoT devices, knowledge repositories and databases will provide access to huge computing power and a physical reach far beyond the individual car. Which outcome becomes reality rests on how well considered the design of this entire car-system will be to security problems and whether security will be \u2018designed in\u2019 from the start.<\/p>\n<p>The argument that security is not the primary purpose of the car or that security incidents are generally not that likely to occur is a rationale that risks this aspect of the system\u2019s design being given far less attention than it deserves. We might consider such arguments as rooted in the simplistic view of what we understand the car to be today rather than the reality of what it is about to become. It would be liberating and perhaps more in keeping with the technical revolution to consider the very concept of a car to be a fading reality, being replaced by a completely new mode of transport that bears only a superficial resemblance to the automobile. It may look like a car, move like a car, but in all other aspects it will not be one.<\/p>\n<h2>The Gateway project<\/h2>\n<p>Within the Gateway project \u2014 one of the UK\u2019s autonomous vehicles urban demonstrators \u2014 we have been considering what security for driverless cars should look like in the near, medium and longer-terms. In the near-term we have examined the more practical aspects of securing vehicles that are being rapidly developed in the market by viewing our trial vehicles as moving cyber-physical systems: the driverless car is far more than just a moving piece of office IT. In the medium-term, problems such as ensuring that vehicles can trust connections to things around them with a digital pulse, including other cars, remains an open but tractable problem. Detecting security issues during the operation of such systems, countering problems in real-time and the legal ramifications of failure are all things that will keep our community and our wider networks working for some time to come.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A post by Dr Deeph Chana, Deputy Director for the Institute for Security Science and Technology. This blog first appeared as an opinion piece on GATEway project website, 19 September 2017.\u00a0 The opportunities that driverless vehicles present are undoubtedly profound. None more so than the emergence of multi-modal transport services (trains, planes, automobiles \u2026 and [&hellip;]<\/p>\n","protected":false},"author":1009,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-148","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Security of Driverless Cars - Institute for Security Science &amp; Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Security of Driverless Cars - Institute for Security Science &amp; Technology\" \/>\n<meta property=\"og:description\" content=\"A post by Dr Deeph Chana, Deputy Director for the Institute for Security Science and Technology. This blog first appeared as an opinion piece on GATEway project website, 19 September 2017.\u00a0 The opportunities that driverless vehicles present are undoubtedly profound. None more so than the emergence of multi-modal transport services (trains, planes, automobiles \u2026 and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/\" \/>\n<meta property=\"og:site_name\" content=\"Institute for Security Science &amp; Technology\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-25T14:22:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-09-25T14:23:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2017\/09\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg\" \/>\n<meta name=\"author\" content=\"Duncan Swinscow-Hall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Duncan Swinscow-Hall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/\"},\"author\":{\"name\":\"Duncan Swinscow-Hall\",\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/#\\\/schema\\\/person\\\/a9851b3499446d814b4d953bf1c0cd21\"},\"headline\":\"The Security of Driverless Cars\",\"datePublished\":\"2017-09-25T14:22:01+00:00\",\"dateModified\":\"2017-09-25T14:23:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/\"},\"wordCount\":931,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/files\\\/2017\\\/09\\\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/\",\"url\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/\",\"name\":\"The Security of Driverless Cars - Institute for Security Science &amp; Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/files\\\/2017\\\/09\\\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg\",\"datePublished\":\"2017-09-25T14:22:01+00:00\",\"dateModified\":\"2017-09-25T14:23:06+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/#\\\/schema\\\/person\\\/a9851b3499446d814b4d953bf1c0cd21\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/files\\\/2017\\\/09\\\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/files\\\/2017\\\/09\\\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg\",\"width\":740,\"height\":487,\"caption\":\"Image copyright Frank Derks under CC-CC-BY-2.0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/2017\\\/09\\\/25\\\/the-security-of-driverless-cars\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Security of Driverless Cars\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/#website\",\"url\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/\",\"name\":\"Institute for Security Science &amp; Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/#\\\/schema\\\/person\\\/a9851b3499446d814b4d953bf1c0cd21\",\"name\":\"Duncan Swinscow-Hall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15c7f5c3c4af7b7908bf36c8b5fc07d49fca6d05ed155f535e6c067b4d4b8510?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15c7f5c3c4af7b7908bf36c8b5fc07d49fca6d05ed155f535e6c067b4d4b8510?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15c7f5c3c4af7b7908bf36c8b5fc07d49fca6d05ed155f535e6c067b4d4b8510?s=96&d=mm&r=g\",\"caption\":\"Duncan Swinscow-Hall\"},\"url\":\"https:\\\/\\\/blogs.imperial.ac.uk\\\/security-institute\\\/author\\\/dswinsco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Security of Driverless Cars - Institute for Security Science &amp; Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/","og_locale":"en_GB","og_type":"article","og_title":"The Security of Driverless Cars - Institute for Security Science &amp; Technology","og_description":"A post by Dr Deeph Chana, Deputy Director for the Institute for Security Science and Technology. This blog first appeared as an opinion piece on GATEway project website, 19 September 2017.\u00a0 The opportunities that driverless vehicles present are undoubtedly profound. None more so than the emergence of multi-modal transport services (trains, planes, automobiles \u2026 and [&hellip;]","og_url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/","og_site_name":"Institute for Security Science &amp; Technology","article_published_time":"2017-09-25T14:22:01+00:00","article_modified_time":"2017-09-25T14:23:06+00:00","og_image":[{"url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2017\/09\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg","type":"","width":"","height":""}],"author":"Duncan Swinscow-Hall","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Duncan Swinscow-Hall","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/#article","isPartOf":{"@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/"},"author":{"name":"Duncan Swinscow-Hall","@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/#\/schema\/person\/a9851b3499446d814b4d953bf1c0cd21"},"headline":"The Security of Driverless Cars","datePublished":"2017-09-25T14:22:01+00:00","dateModified":"2017-09-25T14:23:06+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/"},"wordCount":931,"commentCount":0,"image":{"@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2017\/09\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg","articleSection":["Uncategorized"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/","url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/","name":"The Security of Driverless Cars - Institute for Security Science &amp; Technology","isPartOf":{"@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/#primaryimage"},"image":{"@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2017\/09\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg","datePublished":"2017-09-25T14:22:01+00:00","dateModified":"2017-09-25T14:23:06+00:00","author":{"@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/#\/schema\/person\/a9851b3499446d814b4d953bf1c0cd21"},"breadcrumb":{"@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/#primaryimage","url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2017\/09\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg","contentUrl":"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2017\/09\/car-sensor-Frank-Derks-CC-CC-BY-2.0.jpg","width":740,"height":487,"caption":"Image copyright Frank Derks under CC-CC-BY-2.0"},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/09\/25\/the-security-of-driverless-cars\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.imperial.ac.uk\/security-institute\/"},{"@type":"ListItem","position":2,"name":"The Security of Driverless Cars"}]},{"@type":"WebSite","@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/#website","url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/","name":"Institute for Security Science &amp; Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.imperial.ac.uk\/security-institute\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/blogs.imperial.ac.uk\/security-institute\/#\/schema\/person\/a9851b3499446d814b4d953bf1c0cd21","name":"Duncan Swinscow-Hall","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/15c7f5c3c4af7b7908bf36c8b5fc07d49fca6d05ed155f535e6c067b4d4b8510?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/15c7f5c3c4af7b7908bf36c8b5fc07d49fca6d05ed155f535e6c067b4d4b8510?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15c7f5c3c4af7b7908bf36c8b5fc07d49fca6d05ed155f535e6c067b4d4b8510?s=96&d=mm&r=g","caption":"Duncan Swinscow-Hall"},"url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/author\/dswinsco\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/posts\/148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/users\/1009"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":2,"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/posts\/148\/revisions"}],"predecessor-version":[{"id":151,"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/posts\/148\/revisions\/151"}],"wp:attachment":[{"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/media?parent=148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/categories?post=148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-json\/wp\/v2\/tags?post=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}