{"id":1786,"date":"2021-04-20T15:12:30","date_gmt":"2021-04-20T19:12:30","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1786"},"modified":"2021-04-20T15:12:33","modified_gmt":"2021-04-20T19:12:33","slug":"fbi-secretly-legally-accesses-ms-exchange-servers","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/","title":{"rendered":"FBI Secretly, Legally Accesses MS Exchange Servers"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-the-fbi-made-an-unprecedented-move-in-a-sweeping-cleanse-of-the-ms-exchange-hack-while-seemingly-a-smart-move-it-opens-the-doors-for-privacy-questions\">The FBI made an unprecedented move in a sweeping cleanse of the MS Exchange hack. While seemingly a smart move, it opens the doors for privacy questions.<\/h2>\n\n\n\n<p>Last month, Microsoft Exchange Servers were hacked. A new China state-sponsored hacking group, Hafnium, appears to be the culprit of this hack, which targeted servers run from company networks. When they chained four vulnerabilities together, it allowed the hackers to break into a server and steal its contents. A patch was released, but the patch didn\u2019t close the backdoors created in servers which were already breached. So even if the patch was applied, those backdoors would still allow a hacker to enter. Within days, even more hackers joined in attacking the vulnerable servers to deploy ransomware. But, don\u2019t worry, the FBI has us covered. In an unprecedented move, the FBI secretly, but legally, accessed these private servers to mitigate the problem.<\/p>\n\n\n\n<p>According to <a href=\"https:\/\/gizmodo.com\/the-fbi-just-snuck-into-computers-all-over-the-country-1846679332\" target=\"_blank\" rel=\"noreferrer noopener\">Gizmodo<\/a>, \u201cThe FBI targeted this unique digital clean-up at servers running the vulnerability-ridden email product Microsoft Exchange. The U.S. Justice Department said Tuesday that the purpose of the bureau\u2019s operation was to digitally erase traces of web shells that, had they remained, \u201ccould have been used to maintain and escalate persistent, unauthorized access to U.S. networks.\u201d\u201d<\/p>\n\n\n\n<p>The amount of infected servers dropped as businesses applied the patch provided by Microsoft, but many of them still remained at-risk because backdoors are difficult to find and eliminate.<\/p>\n\n\n\n<p>\u201cThis operation removed one early hacking group\u2019s remaining web shells which could have been used to maintain and escalate persistent, unauthorized access to U.S. networks,\u201d <a href=\"https:\/\/techcrunch.com\/2021\/04\/13\/fbi-launches-operation-to-remotely-remove-microsoft-exchange-server-backdoors\/\" target=\"_blank\" rel=\"noreferrer noopener\">the statement said<\/a>. \u201cThe FBI conducted the removal by issuing a command through the web shell to the server, which was designed to cause the server to delete only the web shell (identified by its unique file path).\u201d<\/p>\n\n\n\n<p>While initially one might think that this is a great move, there are many questions surrounding how this unfolded. In this instance, it\u2019s likely the FBI did the right thing. They didn\u2019t access any information, they simply patched the problem and removed access points. We already know this was a nation state attack, which means the purpose is intelligence gathering. Leaving those backdoors open, or allowing them to stay open because a business owner doesn\u2019t have the resources to fix it, is a bad idea. Still, there are a lot of privacy questions to consider. Especially since most of the companies whose servers were infected aren\u2019t even aware that the FBI did anything.<\/p>\n\n\n\n<p>That\u2019s the biggest kicker really. A Houston court ruled that the FBI could do this, and at the time of this writing, the FBI was still working on contacting the owners of the impacted servers. That they did this with full legal authority is somewhat questionable. Again, in this case, it\u2019s better than doing nothing. But, at the end of the day, do we really want the authorities to have this kind of power? If this is okay, then where is the line?<\/p>\n\n\n\n<p>The thing is, privacy matters. In the U.S. especially, where people are more concerned than ever with what businesses are doing with their information. <\/p>\n\n\n\n<p>It\u2019s so important for businesses to conduct regular security and compliance reviews. Especially if the government is going to continue to access servers without our knowledge or consent. It is the responsibility of the business to maintain the security of its equipment, so if it is discovered that the FBI was in your servers, it\u2019s probably a good idea to do a review. Bring in an expert to do it, it ensures that business continues as usual while maintaining the safety and integrity of your data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The FBI raises eyebrows with its unprecedented move to access private MS Exchange servers. The move raises many privacy questions.<\/p>\n","protected":false},"author":1,"featured_media":1793,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[2134,14,2073],"tags":[709,25,926,2256,2258,2209,2181,2257,1820,1997],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FBI Secretly, Legally Accesses MS Exchange Servers - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The FBI raises eyebrows with its unprecedented move to access private MS Exchange servers. The move raises many privacy questions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FBI Secretly, Legally Accesses MS Exchange Servers\" \/>\n<meta property=\"og:description\" content=\"The FBI raises eyebrows with its unprecedented move to access private MS Exchange servers. The move raises many privacy questions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-20T19:12:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-20T19:12:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"FBI Secretly, Legally Accesses MS Exchange Servers\",\"datePublished\":\"2021-04-20T19:12:30+00:00\",\"dateModified\":\"2021-04-20T19:12:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/\"},\"wordCount\":627,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg\",\"keywords\":[\"breach\",\"cyber attack\",\"data breach\",\"FBI\",\"Hafnium\",\"Microsoft Exchange\",\"Microsoft Exchange Servers\",\"MS Exchange Servers\",\"privacy\",\"vulnerability\"],\"articleSection\":[\"Privacy\",\"Security\",\"Vulnerability\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/\",\"name\":\"FBI Secretly, Legally Accesses MS Exchange Servers - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg\",\"datePublished\":\"2021-04-20T19:12:30+00:00\",\"dateModified\":\"2021-04-20T19:12:33+00:00\",\"description\":\"The FBI raises eyebrows with its unprecedented move to access private MS Exchange servers. The move raises many privacy questions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FBI Secretly, Legally Accesses MS Exchange Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FBI Secretly, Legally Accesses MS Exchange Servers - PWV Consultants","description":"The FBI raises eyebrows with its unprecedented move to access private MS Exchange servers. The move raises many privacy questions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/","og_locale":"en_US","og_type":"article","og_title":"FBI Secretly, Legally Accesses MS Exchange Servers","og_description":"The FBI raises eyebrows with its unprecedented move to access private MS Exchange servers. The move raises many privacy questions.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-04-20T19:12:30+00:00","article_modified_time":"2021-04-20T19:12:33+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"FBI Secretly, Legally Accesses MS Exchange Servers","datePublished":"2021-04-20T19:12:30+00:00","dateModified":"2021-04-20T19:12:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/"},"wordCount":627,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg","keywords":["breach","cyber attack","data breach","FBI","Hafnium","Microsoft Exchange","Microsoft Exchange Servers","MS Exchange Servers","privacy","vulnerability"],"articleSection":["Privacy","Security","Vulnerability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/","url":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/","name":"FBI Secretly, Legally Accesses MS Exchange Servers - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg","datePublished":"2021-04-20T19:12:30+00:00","dateModified":"2021-04-20T19:12:33+00:00","description":"The FBI raises eyebrows with its unprecedented move to access private MS Exchange servers. The move raises many privacy questions.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/FBI-Secretly-Accesses-MS-Exchange-Servers-scaled.jpeg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/fbi-secretly-legally-accesses-ms-exchange-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"FBI Secretly, Legally Accesses MS Exchange Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1786"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1786"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1786\/revisions"}],"predecessor-version":[{"id":1794,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1786\/revisions\/1794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1793"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}