{"id":15593,"date":"2021-10-27T08:00:47","date_gmt":"2021-10-27T06:00:47","guid":{"rendered":"https:\/\/voelkerrechtsblog.org\/?p=15593"},"modified":"2021-10-28T10:02:16","modified_gmt":"2021-10-28T08:02:16","slug":"trimming-pegasus-wings","status":"publish","type":"post","link":"https:\/\/voelkerrechtsblog.org\/de\/trimming-pegasus-wings\/","title":{"rendered":"Trimming Pegasus\u2019 Wings"},"content":{"rendered":"<p>For centuries, export control regulations have accompanied the development of new weapon technologies. The revelations of the \u2018Pegasus Project\u2019 have put the question of whether and how to regulate the export of the new technology \u2018cyberweapons\u2019 in the limelight: Is the current international export control law up to the challenge of sufficiently regulating the proliferation of \u2018cyberweapons\u2019 or does it need an update? To answer this question, the blog post will, first, turn to the definition and relevance of \u2018cyberweapons\u2019. Secondly, international export control law is introduced as a possible measure to mitigate the risks posed by \u2018cyberweapons\u2019 against the backdrop of regulating the use of \u2018cyberweapons\u2019 or establishing a moratorium on its trade. Third, the blog post will assess the export of \u2018cyberweapons\u2019 in general and the export of Pegasus in particular within the current international export control framework. The current framework seems to touch upon partial aspects of the trade with \u2018cyberweapons\u2019. However, it stands to fear that it is not up to the task of sufficiently curtailing the proliferation of \u2018cyberweapons\u2019 and the associated risks, as it especially leaves the underlying problem of the trade with zero-day vulnerabilities untouched.<\/p>\n<p><strong>The \u2018Pegasus Project\u2019<\/strong><\/p>\n<p>The \u2018<a href=\"https:\/\/forbiddenstories.org\/case\/the-pegasus-project\/\">Pegasus Project<\/a>\u2018 is an investigative research project into the dealings of the Israeli company NSO Group Technologies (NSO). NSO is a technology firm that sells a smartphone surveillance tool called \u2018Pegasus\u2019 to States. The States can then silently \u2013 thus without user interaction of the target like \u2018clicking\u2019 on a link (so-called zero-touch) \u2013 install \u2018Pegasus\u2019 on smartphones, taking advantage of unknown software vulnerabilities (so-called zero-day vulnerabilities). The combination of zero-day and zero-touch can be referenced as zero-day zero-touch vulnerabilities, which are particularly rare and valuable. After successful intrusion, the intruder can access the smartphone\u2019s data, communications, and turn on the microphone, the camera, and GPS tracking. The project <a href=\"https:\/\/forbiddenstories.org\/about-the-pegasus-project\/\">revealed<\/a> that many States used the tool not only to legitimately fight crime and terrorism but also to spy on human rights attorneys, journalists, activists, opposition politicians, dissidents, and other State\u2019s officials. While such <em>use<\/em> by the recipient state raises <em>inter alia <\/em>the issue of the legality of international espionage, the following sections will address whether the <em>transfer<\/em> of \u2018Pegasus\u2019 has violated international export control law.<\/p>\n<p><strong>Defining \u2018Cyberweapons\u2019<\/strong><\/p>\n<p>Amid the revelations, \u2018Pegasus\u2019 has often been referred to as a \u2018cyberweapon\u2019 (see, i.e., <a href=\"https:\/\/www.dw.com\/en\/opinion-pegasus-the-favorite-cyber-weapon-of-dictators\/a-58568913\">here<\/a>, <a href=\"https:\/\/www.haaretz.com\/israel-news\/tech-news\/.premium-nso-s-pegasus-the-israeli-cyber-weapon-used-against-180-journalists-1.10010446\">here<\/a> and <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2021\/07\/nso-group-hacked.html\">here<\/a>). However, it is unclear what the term \u2018cyberweapon\u2019 precisely conveys. So far, a clear-cut (legal) definition has not emerged. Instead, \u2018cyberweapons\u2019 are primarily <a href=\"https:\/\/www.cambridge.org\/core\/journals\/american-journal-of-international-law\/article\/an-inspection-regime-for-cyber-weapons-a-challenge-too-far\/0FD64925A8CA9DDBCB7AF05F6CBEAB2D#fn9\">described<\/a> in varying functional or technical terms. One point of divergence is the distinction between <em>offensive <\/em>and <em>defensive<\/em> cyber tools and whether they both fall within the category of \u2018cyberweapons\u2019. Moreover, it is unsettled whether surveillance tools like \u2018Pegasus\u2019 should be classified as \u2018cyberweapons\u2019. However, for this blog post, a precise delimitation is unwarranted as this classification does not affect the assessment of surveillance tools under international export control law.<\/p>\n<p>The interconnected world is undoubtedly vulnerable to attacks by \u2018cyberweapons\u2019. They pose significant risks to critical infrastructure, the functioning of the State, international peace and security, and \u2014 like \u2018Pegasus\u2019 \u2014 to individuals\u2019 human rights. Despite these risks, the trade of \u2018cyberweapons\u2019 flourishes due to high demand by States and other actors. The copying and electronic transfer of \u2018cyberweapons\u2019 further accelerate their proliferation compared to traditional arms. One way to cope with these risks is to regulate the <em>use<\/em> of \u2018cyberweapons\u2019 and promote responsible state behavior in cyberspace.<\/p>\n<p><strong>Regulating the Use of \u2018Cyberweapons\u2019?<\/strong><\/p>\n<p>In the last years, several state and non-state initiatives have started addressing the problem in different fora and with different focuses. These include the \u2018<a href=\"https:\/\/www.un.org\/disarmament\/open-ended-working-group\/\">UN Open-Ended Working Group on Developments in the Field of ICTs in the Context of International Security<\/a>\u2018 (OEWG), the \u2018<a href=\"https:\/\/www.un.org\/disarmament\/group-of-governmental-experts\/\">UN Group of Governmental Experts on Advancing Responsible State Behavior in Cyberspace in the Context of International Security<\/a>\u2018 (GGE), the \u2018<a href=\"https:\/\/front.un-arm.org\/wp-content\/uploads\/2020\/10\/joint-contribution-poa-future-of-cyber-discussions-at-un-10-08-2020.pdf\">Programme of Action for Advancing Responsible State Behaviour in Cyberspace<\/a>\u2018, the Tallinn Manual Processes (with 3.0. just being <a href=\"https:\/\/ccdcoe.org\/news\/2020\/ccdcoe-to-host-the-tallinn-manual-3-0-process\/\">initiated<\/a>) and state practice (i.e. <a href=\"https:\/\/www.auswaertiges-amt.de\/blob\/2446304\/32e7b2498e10b74fb17204c54665bdf0\/on-the-application-of-international-law-in-cyberspace-data.pdf\">Germany<\/a>).<\/p>\n<p>State practice, thereby, concentrates mostly on applying current international law to cyberspace, including issues surrounding \u2018cyberattacks\u2019. Germany, for example, <a href=\"https:\/\/www.auswaertiges-amt.de\/blob\/2446304\/32e7b2498e10b74fb17204c54665bdf0\/on-the-application-of-international-law-in-cyberspace-data.pdf\">is of the position<\/a> that cyber operations by a state may infringe upon another state\u2019s rights and may likewise be responded to by cyber means, i.e., to counter an armed (cyber-)attack. Moreover, Germany <a href=\"https:\/\/www.auswaertiges-amt.de\/blob\/2446304\/32e7b2498e10b74fb17204c54665bdf0\/on-the-application-of-international-law-in-cyberspace-data.pdf\">puts forward<\/a> that cyber operations need to and are able to follow IHL when employed. Similarly, the Tallinn Manual focuses on applying the international law of war to cyberspace, including the application to cyberattacks perpetrated with \u2018cyberweapons\u2019. In contrast, the GGE and the OEWG not only deal with the application of international law to cyberspace but also established detailed, non-binding norms to advance \u2018<a href=\"https:\/\/front.un-arm.org\/wp-content\/uploads\/2021\/08\/A_76_135-2104030E-1.pdf\">Responsible State Behaviour in Cyberspace in the Context of International Security<\/a>\u2019. History, however, has shown that mere regulation on the use of certain technologies and weapons does not suffice to prevent actors from \u2018irresponsibly\u2019 utilizing the technology to the detriment of international peace and security. Therefore, these actors need to be barred from acquiring \u2018cyberweapons\u2019 in the first place.<\/p>\n<p><strong>An International Moratorium on the Trade with \u2018Cyberweapons\u2019?<\/strong><\/p>\n<p>Prominently, Edward Snowden <a href=\"https:\/\/www.theguardian.com\/news\/2021\/jul\/19\/edward-snowden-calls-spyware-trade-ban-pegasus-revelations\">called<\/a> for an international export ban on \u2018cyberweapons\u2019 amid the \u2018Pegasus\u2019 revelations (see similarly <a href=\"https:\/\/www.washingtonpost.com\/opinions\/2021\/07\/19\/pegasus-spyware-nso-group-threat-democracy-journalism\/\">here<\/a>, <a href=\"https:\/\/www.amnesty.org\/download\/Documents\/DOC1045162021ENGLISH.PDF\">here<\/a>, <a href=\"https:\/\/www.ohchr.org\/EN\/NewsEvents\/Pages\/DisplayNews.aspx?NewsID=27379&amp;LangID=E\">here<\/a>, <a href=\"https:\/\/www.ohchr.org\/EN\/NewsEvents\/Pages\/DisplayNews.aspx?LangID=E&amp;NewsID=27455&amp;utm_source=pocket_mylist\">here<\/a> and <a href=\"https:\/\/www.aljazeera.com\/opinions\/2021\/9\/7\/there-is-an-urgent-need-for-a-moratorium-on-sale-of-spy-tech?utm_source=pocket_mylist\">here<\/a>). Such a ban seems like an apparent solution to the proliferation risks associated with \u2018cyberweapons\u2019. However, such a \u2018cyberweapons\u2019 moratorium is unlikely to emerge in the near-term future for several reasons.<\/p>\n<p>Recent examples show that an international treaty on the issue would most probably require years of lengthy negotiations. For example, the <a href=\"https:\/\/www.un.org\/disarmament\/the-convention-on-certain-conventional-weapons\/background-on-laws-in-the-ccw\/\">discussions<\/a> on the regulation on lethal autonomous weapon systems (LAWS) within the United Nations Convention of Certain Conventional Weapons framework have been going on for several years, without significant progress. States\u2019 positions regarding this matter <a href=\"https:\/\/www.hrw.org\/report\/2020\/08\/10\/stopping-killer-robots\/country-positions-banning-fully-autonomous-weapons-and\">range<\/a> \u2014 comparable to the discussion about \u2018cyberweapons\u2019 \u2014 from an outright ban of LAWS to \u2018merely\u2019 <a href=\"https:\/\/perma.cc\/CV7S-QP7S\">regulating<\/a> the trade of LAWS or its components and to not regulating LAWS at all. Moreover, attempts to negotiate a \u2018Cybersecurity\u2019-Treaty, which would also take on the trade with \u2018cyberweapons\u2019, has so far fallen on deaf ears within the international community.<\/p>\n<p>Nevertheless, the GGE and OEWG took a small step towards a proliferation halt. Their final reports both called for the prevention of \u2018the proliferation of malicious [information and communications technology] tools and techniques and the use of harmful hidden functions\u2019 (see <a href=\"https:\/\/front.un-arm.org\/wp-content\/uploads\/2021\/03\/Final-report-A-AC.290-2021-CRP.2.pdf\">here<\/a> and <a href=\"https:\/\/front.un-arm.org\/wp-content\/uploads\/2021\/06\/final-report-2019-2021-gge-1-advance-copy.pdf\">here<\/a>). The GGE thereby restated its principle 13 i), which it had established in its 2015 report, and which has been reiterated by the UN General Assembly (UNGA) on several occasions. These non-binding norms may have an impact towards the creation of formal international law in the future, if they are referenced and reiterated by States and international organs like the UNGA. The Tallinn Manual, for instance, may not be explicitly endorsed by States but is still used as a reference, as exemplified by <a href=\"https:\/\/www.auswaertiges-amt.de\/blob\/2446304\/32e7b2498e10b74fb17204c54665bdf0\/on-the-application-of-international-law-in-cyberspace-data.pdf\">Germany\u2019s report on the application of international law in cyberspace<\/a>. Despite this, the calls by the OEWG and GGE are merely non-binding recommendations that have not manifested to international law or developed into a comprehensive framework for cyber non-proliferation efforts. For the moment, principle 13 i) reflects the international communities\u2019 general understanding that \u2018cyberweapons\u2019 may pose risks to international security and stresses the preference of States for non-binding instruments in this area. This way, they retain enough leeway to foster their strategic goals by exporting \u2018cyberweapons\u2019. The export of \u2018Pegasus\u2019, for instance, was part of Israeli foreign policy, especially in the warming relations to its Arabic neighbors (see <a href=\"https:\/\/www.haaretz.com\/israel-news\/tech-news\/.premium.HIGHLIGHT-where-bibi-went-nso-followed-how-israel-pushed-cyberweapons-sales-1.10015034\">here<\/a>). For the same strategic reasons, unilateral declarations by States to impose a moratorium on \u2018cyberweapons\u2019 exports within their jurisdiction are highly unlikely.<\/p>\n<p>While \u2018new\u2019 international law is not on the horizon, the question arises: What does existing international export control law have to say about \u2018cyberweapons\u2019?<\/p>\n<p><strong>Existing International Export Control Law and \u2018Cyberweapons\u2019<\/strong><\/p>\n<p>There are two main pillars in international export control law: binding international arms treaties (i.e., <a href=\"https:\/\/www.iaea.org\/sites\/default\/files\/publications\/documents\/infcircs\/1970\/infcirc140.pdf\">NPT<\/a>, <a href=\"https:\/\/front.un-arm.org\/wp-content\/uploads\/2020\/12\/BWC-text-English-1.pdf\">BTWC<\/a>, <a href=\"https:\/\/www.opcw.org\/sites\/default\/files\/documents\/CWC\/CWC_en.pdf\">CWC<\/a>, <a href=\"https:\/\/www.thearmstradetreaty.org\/hyper-images\/file\/TheArmsTradeTreaty1\/TheArmsTradeTreaty.pdf\">ATT<\/a>, <a href=\"https:\/\/www.un.org\/disarmament\/the-convention-on-certain-conventional-weapons\/\">CCW<\/a>) and non-binding multilateral export control regimes (i.e., <a href=\"https:\/\/www.nuclearsuppliersgroup.org\/de\/dokumente\">NSG<\/a>, <a href=\"https:\/\/www.dfat.gov.au\/publications\/minisite\/theaustraliagroupnet\/site\/en\/index.html\">Australia Group<\/a>, <a href=\"https:\/\/mtcr.info\/\">MTCR<\/a> and the <a href=\"https:\/\/www.wassenaar.org\/app\/uploads\/2019\/12\/WA-DOC-19-Public-Docs-Vol-I-Founding-Documents.pdf\">Wassenaar Arrangement<\/a>). These frameworks cover a wide range of weapons, namely nuclear, biological, chemical, and conventional weapons, as well as dual-use items. However, among them, only the Wassenaar Arrangement deals \u2014 at least partially \u2014 with \u2018cyberweapons\u2019, although without expressly mentioning the term.<\/p>\n<p>The Wassenaar Arrangement is a voluntary export control regime established in 1996, with currently 42 participating States. Its primary purpose is \u2018to contribute to regional and international security and stability, by promoting transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies, thus preventing destabilising accumulations.\u2019 To this end, the participating States should apply export controls to all items either on the <a href=\"https:\/\/www.wassenaar.org\/app\/uploads\/2020\/12\/Public-Docs-Vol-II-2020-List-of-DU-Goods-and-Technologies-and-Munitions-List-Dec-20-3.pdf\">Dual-Use List<\/a> or the <a href=\"https:\/\/www.wassenaar.org\/app\/uploads\/2020\/12\/Public-Docs-Vol-II-2020-List-of-DU-Goods-and-Technologies-and-Munitions-List-Dec-20-3.pdf\">Munitions List<\/a>, meaning they have to license the export of listed items.<\/p>\n<p>In the case of the Wassenaar Agreement\u2019s applicability, States agreed to follow multiple <a href=\"https:\/\/www.wassenaar.org\/app\/uploads\/2019\/12\/WA-DOC-19-PUB-005-Public-Docs-Vol-III-Comp.-of-Best-Practice-Documents-Dec.-2019.pdf\">best practices<\/a>, such as to control the transfer of \u2018software\u2019 irrespective of its means of transfer, thus, including intangible transfers. Moreover, according to the Arrangement, States should report on their export decisions of listed items. If one State denies the export of a listed item, another participating State can still approve the export. The exporting State should then merely notify all other States of the approval. The final export decision always remains the sole responsibility of each participating State.<\/p>\n<p><strong>The Case of \u2018Pegasus\u2019<\/strong><\/p>\n<p>In the case of \u2018Pegasus\u2019, Israel <a href=\"https:\/\/www.timesofisrael.com\/after-nso-bombshell-gantz-asserts-that-israel-complies-with-international-law\/\">claims<\/a> to have acted \u2018in accordance with its defense export control law, complying with international export control regimes\u2019. The claim is intriguing as Israel is not a participating State of the Wassenaar Arrangement. However, Israel has <a href=\"https:\/\/mfa.gov.il\/MFA\/PressRoom\/2019\/Pages\/Israeli-statement-at-the-conclusion-of-the-Wassenaar-Arrangement-Outreach-Delegation-visit-20-November-2019.aspx\">committed<\/a> to following the Arrangement unilaterally. The commitment indicates the authority and impact of the non-binding Wassenaar Arrangement, but only if Israel indeed <em>acts<\/em> within the Arrangement\u2019s constraints. Otherwise, Israel\u2019s commitment would not be more than mere lip service. Therefore, the question remains whether Israel acted within the bounds of the Wassenaar Arrangement concerning the export of \u2018Pegasus\u2019.<\/p>\n<p>The Wassenaar Agreement\u2019s Munitions List names \u2018\u201dSoftware\u201d specially designed or modified for the conduct of military offensive cyber operations\u2019 as a controlled item (Item 21.b.5. Munitions List). This \u2018includes \u201csoftware\u201d designed to destroy, damage, degrade or disrupt systems, equipment or \u201csoftware\u201d, specified by the Munitions List, cyber reconnaissance and cyber command and control \u201csoftware\u201d, therefor\u2019. Thus, the Wassenaar Arrangement applies to \u2018cyberweapons\u2019, used in a <em>purely<\/em> military manner. However, \u2018Pegasus\u2019 and the like are not designed to \u2018destroy, damage, degrade or disrupt\u2019 military systems. Instead, they intrude and manipulate civilian cell phones.<\/p>\n<p>But software often has both, military <em>and<\/em> civilian use. Generally, the Dual-Use List covers such dual-use items, including dual-use software. However, it does <em>not<\/em> directly cover any dual-use items that can be classified as \u2018cyberweapons\u2019. Instead, the Dual-Use List only names items <em>related<\/em> to intrusion software: Specifically, \u2018systems, equipment, and components\u2019 (Cat. 4.A.5 Dual-Use List) or \u2018software\u2019 (Cat. 4.D.4 Dual-Use List) \u2018specially designed or modified for the generation, command and control, or delivery of \u201cintrusion software\u201d\u2019. The Wassenaar Arrangement defines intrusion software \u2014 and, therefore, arguably a type of \u2018cyberweapon\u2019 \u2014 in its <a href=\"https:\/\/www.wassenaar.org\/app\/uploads\/2020\/12\/Public-Docs-Vol-II-2020-List-of-DU-Goods-and-Technologies-and-Munitions-List-Dec-20-3.pdf\">definitions section<\/a>. According to the definition, intrusion software is \u2018\u201c[s]oftware\u201d specially designed or modified to avoid detection by \u201cmonitoring tools\u201d, or to defeat \u201cprotective countermeasures\u201d, of a computer or network-capable device\u2019 and to perform either \u2018extraction of data\u2019 or \u2018modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions.\u2019 Thus, the Arrangement does not place intrusion software <em>itself<\/em> on the Dual-Use List but only related items.<\/p>\n<p>The Arrangement, therefore, applies only to \u2018Pegasus\u2019-related exports. As intrusion software, \u2018Pegasus\u2019 itself is not among the listed items. But supplying the necessary IT infrastructure to employ and control \u2018Pegasus\u2019, retrieve data, and provide technical assistance (Cat. 4.E.1.c Dual-Use List) to other States, which NSO certainly did, requires prior licensing. Indeed, the Israeli government <a href=\"https:\/\/www.theguardian.com\/world\/2021\/jul\/18\/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus\">approved<\/a> each export of \u2018Pegasus\u2019-related technology. Crucially, however, the underlying decision of whether a specific export of \u2018Pegasus\u2019 is compatible with the goals and aims of the Arrangement and, therefore, eligible for a license remains within the sole discretion of Israel. Something the Israeli government apparently answered in the affirmative. Thus, Israel acted within the bounds of the Wassenaar Arrangement, thereby confirming its authority. However, this conclusion lays bare the lack of a mutual understanding within the Arrangement which circumstances necessitate the denial of an export license.<\/p>\n<p><strong>The Way Forward<\/strong><\/p>\n<p>In line with the aforementioned, the Wassenaar Arrangement applies to offensive military \u2018cyberweapons\u2019 and items related to intrusion software like \u2018Pegasus\u2019. It, therefore, draws a baseline in the non\u2011proliferation efforts against \u2018cyberweapons\u2019. However, it does not offer an entirely comprehensive export control regime for \u2018cyberweapons\u2019: Its limited membership and the categories of \u2018cyberweapons\u2019 on the Dual-Use List would have to be broadened to close existing gaps. Moreover, although the Arrangement\u2019s non-binding character does not necessarily render it ineffective, a strengthened compliance mechanism would boost its effectiveness. Finally, participating States should try to find common ground on the circumstances under which an export license should be denied.<\/p>\n<p>In addition to <em>international export control law,<\/em> other areas of international law, as well as supranational and national law, might offer an extra layer of protection against the irresponsible proliferation of \u2018cyberweapons\u2019. This includes above all positive and due diligence obligations derived from international human rights, as well as the recently recast <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32021R0821\">EU Dual-Use Regulation<\/a>, which expressly addresses \u2018cyber-surveillance items\u2019 and transforms the non-binding Wassenaar Arrangement\u2019s lists into binding European law. Moreover, the efforts to regulate the proliferation of \u2018cyberweapons\u2019 should not preclude the ongoing efforts to promote responsible state behavior in cyberspace and regulate the <em>use<\/em> of \u2018cyberweapons\u2019.<\/p>\n<p>Even with an effective export control regime in place, the nature of \u2018cyberweapons\u2019 and their intangible transfer make enforcement challenging. An unsatisfied NSO employee, for example, copied the source code of \u2018Pegasus\u2019 and offered it in the darknet (see <a href=\"https:\/\/www.zeit.de\/politik\/ausland\/2021-07\/spionage-software-pegasus-cyberwaffe-ueberwachung-menschenrechte-enthuellung\">here<\/a>). Thus, the answer to the risks posed by \u2018cyberweapons\u2019 must go further than banning or controlling their export. The promise of a secure and stable \u2018cyberspace\u2019 can only be achieved if the core of most \u2018cyberweapons\u2019 is terminated: (zero-day) vulnerabilities. Consequently, States need to promote adequate, international zero-day vulnerabilities governance, including the responsible disclosure of such vulnerabilities, instead of hoarding them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For centuries, export control regulations have accompanied the development of new weapon technologies. The revelations of the \u2018Pegasus Project\u2019 have put the question of whether and how to regulate the export of the new technology \u2018cyberweapons\u2019 in the limelight: Is the current international export control law up to the challenge of sufficiently regulating the proliferation [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6639],"tags":[],"authors":[6896],"article-categories":[6000],"doi":[],"class_list":["post-15593","post","type-post","status-publish","format-standard","hentry","category-uncategorized","authors-roland-klein","article-categories-article"],"acf":{"subline":"International Export Control Law and \u2018Cyberweapons\u2019"},"meta_box":{"doi":"10.17176\/20211027-182514-0"},"_links":{"self":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/15593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/comments?post=15593"}],"version-history":[{"count":1,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/15593\/revisions"}],"predecessor-version":[{"id":15596,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/15593\/revisions\/15596"}],"wp:attachment":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/media?parent=15593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/categories?post=15593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/tags?post=15593"},{"taxonomy":"authors","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/authors?post=15593"},{"taxonomy":"article-categories","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/article-categories?post=15593"},{"taxonomy":"doi","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/doi?post=15593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}