{"id":1996,"date":"2021-06-02T14:19:23","date_gmt":"2021-06-02T18:19:23","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1996"},"modified":"2021-06-02T14:19:25","modified_gmt":"2021-06-02T18:19:25","slug":"u-s-soldiers-leak-nuclear-info-via-flashcard-apps","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/","title":{"rendered":"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-u-s-soldiers-used-flashcard-apps-to-study-and-store-sensitive-nuclear-stockpile-information-they-failed-to-make-their-profiles-private-exposing-the-information-stored-in-the-apps\">U.S. soldiers used flashcard apps to study and store sensitive nuclear stockpile information. They failed to make their profiles private, exposing the information stored in the apps.<\/h2>\n\n\n\n<p>When it comes to the security of our country, we put a lot of faith in our government and military. Our armed forces are truly a force to be reckoned with, which is why the United States is looked to as a peacekeeper, why we are often called in to moderate discussions between adversarial countries. Our cyber-defenses are top-notch, too, fortified stronger than Fort Knox to give threat actors an incredibly infinitesimally small shot at getting past those defenses. However, if a hacker would get the credentials of a ranking military member, all of that security means nothing. Which is why it\u2019s surprising to learn that U.S. soldiers used public-facing flashcard apps to study and store information on our nuclear stockpile.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bellingcat.com\/news\/2021\/05\/28\/us-soldiers-expose-nuclear-weapons-secrets-via-flashcard-apps\/\" target=\"_blank\" rel=\"noreferrer noopener\">According to Foeke Postma<\/a>, a researcher with Bellingcat, Bellingcat discovered the problem when doing a routine search using military acronyms. The searches came back with flashcards from apps like Chegg, Cram and Quizlet, where the researchers found information about bases in Europe where U.S. nuclear weapons are likely located. They also found secret codes, passwords and other information about security processes and protocols. The soldiers would use the apps to study and memorize the information, but didn\u2019t set their profiles to private so their usernames and photos were public-facing. When you can match profile information across platforms, it\u2019s not hard to figure out who people are and what information they might have.<\/p>\n\n\n\n<p>Bellingcat spoke with Dr. Jeffrey Lewis, founding publisher of Arms Control Wonk.com and Director of the East Asia Nonproliferation Program at the James Martin Center for Nonproliferation Studies, who said, \u201csecrecy about US nuclear weapons deployments in Europe does not exist to protect the weapons from terrorists, but only to protect politicians and military leaders from having to answer tough questions about whether NATO\u2019s nuclear-sharing arrangements still make sense today. This is yet one more warning that these weapons are not secure.\u201d<\/p>\n\n\n\n<p>The Pentagon scrubbed some of the flashcards from the web, but didn\u2019t get all of them. <a href=\"https:\/\/www.vice.com\/en\/article\/v7ebmd\/us-military-personnel-spilled-nuclear-secrets-in-online-flashcards\" target=\"_blank\" rel=\"noreferrer noopener\">Vice\u2019s Motherboard says<\/a> that many are still archived on the Wayback Machine.<\/p>\n\n\n\n<p>This is a serious problem. Some of the flashcards had been publicly visible since 2013 and some were as recent as April 2021. Even after scrubbing what they could, it\u2019s likely that the Pentagon forced all soldiers to obtain new credentials, forced units to alter code words and secret phrases, and reset anything that could possibly be attached to one of these cards. So now, everyone not only has to learn a new set of security protocols, but they have to figure out a new way to study and remember them.&nbsp;<\/p>\n\n\n\n<p>Having our nuclear weapons exposed, especially those stored overseas, is a serious threat to our country\u2019s security. This threat was brought to us by our own soldiers, and it could have been entirely prevented with proper monitoring and training. Our soldiers are really good at what they do. The best in the world, in fact. But cybersecurity is not their forte, which is why it is so important that they are trained properly. There should be set ways to study the sensitive information they need to know without using an internet-facing application. And if it must touch the internet, then the users should be taught how to protect that information.&nbsp;<\/p>\n\n\n\n<p>Technology and its security are not new, but most people still do not understand the risks of using the internet. Most people do not know how to really secure their home networks, let alone that their mobile device doesn\u2019t come with its own security or antivirus software. It\u2019s likely that some do, and some will not use public-facing apps to store sensitive information. But it\u2019s better to assume that no one knows what they are doing and train them than to assume they do and have a breach. This is applicable in every industry, not just the military.&nbsp;<\/p>\n\n\n\n<p>Business leaders need to take note. If our military is making mistakes like this, it is incredibly likely that someone at your company is making your business insecure. They don\u2019t even know they are doing it, either. So find an expert to come in and train them and you, make sure everyone understands what is okay and what is not. Write a new internet\/cybersecurity policy and add it to your handbook. Do everything you can to keep your business safe from threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>U.S. soldiers used public-facing flashcard apps to store and study sensitive security protocols and nuclear stockpile information.<\/p>\n","protected":false},"author":1,"featured_media":1999,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,5,4,14],"tags":[1910,31,2330,1929,2329,2332,2331,17,571,2327,2328],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>U.S. Soldiers Leak Nuclear Info Via Flashcard Apps - PWV Consultants<\/title>\n<meta name=\"description\" content=\"U.S. soldiers used public-facing flashcard apps to store and study sensitive security protocols and nuclear stockpile information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps\" \/>\n<meta property=\"og:description\" content=\"U.S. soldiers used public-facing flashcard apps to store and study sensitive security protocols and nuclear stockpile information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-02T18:19:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-02T18:19:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps\",\"datePublished\":\"2021-06-02T18:19:23+00:00\",\"dateModified\":\"2021-06-02T18:19:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/\"},\"wordCount\":778,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg\",\"keywords\":[\"CyberSec\",\"Cybersecurity\",\"flashcard app\",\"government\",\"Military\",\"nuclear stockpile\",\"nuclear weapons\",\"Security\",\"technology\",\"U.S. Soldiers\",\"United States\"],\"articleSection\":[\"Application Security\",\"Cyber Security\",\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/\",\"name\":\"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg\",\"datePublished\":\"2021-06-02T18:19:23+00:00\",\"dateModified\":\"2021-06-02T18:19:25+00:00\",\"description\":\"U.S. soldiers used public-facing flashcard apps to store and study sensitive security protocols and nuclear stockpile information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Soldier works on his laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps - PWV Consultants","description":"U.S. soldiers used public-facing flashcard apps to store and study sensitive security protocols and nuclear stockpile information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/","og_locale":"en_US","og_type":"article","og_title":"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps","og_description":"U.S. soldiers used public-facing flashcard apps to store and study sensitive security protocols and nuclear stockpile information.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-06-02T18:19:23+00:00","article_modified_time":"2021-06-02T18:19:25+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps","datePublished":"2021-06-02T18:19:23+00:00","dateModified":"2021-06-02T18:19:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/"},"wordCount":778,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg","keywords":["CyberSec","Cybersecurity","flashcard app","government","Military","nuclear stockpile","nuclear weapons","Security","technology","U.S. Soldiers","United States"],"articleSection":["Application Security","Cyber Security","Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/","url":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/","name":"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg","datePublished":"2021-06-02T18:19:23+00:00","dateModified":"2021-06-02T18:19:25+00:00","description":"U.S. soldiers used public-facing flashcard apps to store and study sensitive security protocols and nuclear stockpile information.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/06\/US-Soldiers-Leak-Nuclear-Information-scaled.jpeg","width":2560,"height":1707,"caption":"Soldier works on his laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/u-s-soldiers-leak-nuclear-info-via-flashcard-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"U.S. Soldiers Leak Nuclear Info Via Flashcard Apps"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1996"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1996"}],"version-history":[{"count":2,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1996\/revisions"}],"predecessor-version":[{"id":2002,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1996\/revisions\/2002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1999"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}