{"id":1020,"date":"2020-10-29T13:31:00","date_gmt":"2020-10-29T17:31:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1020"},"modified":"2020-10-29T13:07:40","modified_gmt":"2020-10-29T17:07:40","slug":"the-law-and-encrypted-data-an-ongoing-saga","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/","title":{"rendered":"The Law and Encrypted Data, An Ongoing Saga"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">The U.S. and six other countries want a back door easier access to encrypted data when a warrant is issued. Tech companies argue that implementing a back door creates a soft spot for hackers.<\/h2>\n\n\n\n<p>Earlier this month, the United States Department of Justice in conjunction with officials from the United Kingdom, Australia, New Zealand, Canada,, India and Japan, <a href=\"https:\/\/www.justice.gov\/opa\/pr\/international-statement-end-end-encryption-and-public-safety#_ftnref1\" target=\"_blank\" rel=\"noreferrer noopener\">signed an international statement<\/a> citing the dangers with encryption. They implored an industry-wide effort to give law enforcement agencies access to encrypted data upon the issuance of a warrant.<\/p>\n\n\n\n<p>While the statement (linked above) does acknowledge the need for and value of encryption, it later goes on to cite the problems that current encryption implementation poses to authorities:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>\u201cParticular implementations of encryption technology, however, pose significant challenges to public safety, including to highly vulnerable members of our societies like sexually exploited children. We urge industry to address our serious concerns where encryption is applied in a way that wholly precludes any legal access to content.&nbsp; We call on technology companies to work with governments to take the following steps, focused on reasonable, technically feasible solutions:<\/p><p>-Embed the safety of the public in system designs, thereby enabling companies to act against illegal content and activity effectively with no reduction to safety, and facilitating the investigation and prosecution of offences and safeguarding the vulnerable;<\/p><p>-Enable law enforcement access to content in a readable and usable format where an authorisation is lawfully issued, is necessary and proportionate, and is subject to strong safeguards and oversight; and<\/p><p>-Engage in consultation with governments and other stakeholders to facilitate legal access in a way that is substantive and genuinely influences design decisions.\u201d<\/p><\/blockquote>\n\n\n\n<p>It is understandable from a law enforcement perspective that having access to data will help certain cases in a variety of ways. There\u2019s a pretty long history of enti-encryption advocacy in the U.S., the most recent in 2018 when they joined four other countries (Canada, Australia, UK and New Zealand) in sending a memo to tech companies regarding the issue. The memos always state that the backdoors requested would only be used for \u201clawful\u201d access to a device.<\/p>\n\n\n\n<p>On the flip side, technology companies are increasingly wary about this request. Even should governments mandate that a backdoor be put in place, tech companies are going to fight it. Why? Because it creates a softer point of entry for an attack. Tech companies fear that hackers will seek out this backdoor and try to exploit it, which then puts the company on the hook for any information that gets exposed.&nbsp;<\/p>\n\n\n\n<p>While <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cybercrime-cybersecurity-get-organized\/\" target=\"_blank\" rel=\"noreferrer noopener\">law enforcement agencies sometimes need access to encrypted information<\/a> relating to investigations, there has to be a better way than putting in a backdoor. Both sides have an argument that makes sense. If tech companies can collaborate and come up with an alternative solution, law enforcement might be willing to listen. Until then, it\u2019s going to be an ongoing saga worldwide.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seven countries band together for easier access to encrypted data for legal investigations. If it happens, it could be a security nightmare.<\/p>\n","protected":false},"author":1,"featured_media":1034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4,14],"tags":[31,1202,1929,1931,1928,1930,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Law and Encrypted Data, An Ongoing Saga - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Seven countries band together for easier access to encrypted data for legal investigations. If it happens, it could be a security nightmare.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Law and Encrypted Data, An Ongoing Saga\" \/>\n<meta property=\"og:description\" content=\"Seven countries band together for easier access to encrypted data for legal investigations. If it happens, it could be a security nightmare.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-29T17:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-29T17:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1066\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"The Law and Encrypted Data, An Ongoing Saga\",\"datePublished\":\"2020-10-29T17:31:00+00:00\",\"dateModified\":\"2020-10-29T17:07:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg\",\"keywords\":[\"Cybersecurity\",\"encryption\",\"government\",\"Justice Department\",\"law\",\"tech\",\"technology\"],\"articleSection\":[\"Cyber Security\",\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/\",\"name\":\"The Law and Encrypted Data, An Ongoing Saga - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg\",\"datePublished\":\"2020-10-29T17:31:00+00:00\",\"dateModified\":\"2020-10-29T17:07:40+00:00\",\"description\":\"Seven countries band together for easier access to encrypted data for legal investigations. If it happens, it could be a security nightmare.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg\",\"width\":1920,\"height\":1066,\"caption\":\"Image by Arek Socha from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Law and Encrypted Data, An Ongoing Saga\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Law and Encrypted Data, An Ongoing Saga - PWV Consultants","description":"Seven countries band together for easier access to encrypted data for legal investigations. If it happens, it could be a security nightmare.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/","og_locale":"en_US","og_type":"article","og_title":"The Law and Encrypted Data, An Ongoing Saga","og_description":"Seven countries band together for easier access to encrypted data for legal investigations. If it happens, it could be a security nightmare.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-10-29T17:31:00+00:00","article_modified_time":"2020-10-29T17:07:40+00:00","og_image":[{"width":1920,"height":1066,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"The Law and Encrypted Data, An Ongoing Saga","datePublished":"2020-10-29T17:31:00+00:00","dateModified":"2020-10-29T17:07:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/"},"wordCount":498,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg","keywords":["Cybersecurity","encryption","government","Justice Department","law","tech","technology"],"articleSection":["Cyber Security","Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/","url":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/","name":"The Law and Encrypted Data, An Ongoing Saga - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg","datePublished":"2020-10-29T17:31:00+00:00","dateModified":"2020-10-29T17:07:40+00:00","description":"Seven countries band together for easier access to encrypted data for legal investigations. If it happens, it could be a security nightmare.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/gavel-2492011_1920.jpg","width":1920,"height":1066,"caption":"Image by Arek Socha from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Law and Encrypted Data, An Ongoing Saga"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1020"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1020"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1020\/revisions"}],"predecessor-version":[{"id":1036,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1020\/revisions\/1036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1034"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}