{"id":77013,"date":"2019-03-04T20:35:10","date_gmt":"2019-03-05T02:35:10","guid":{"rendered":"https:\/\/news.medill.northwestern.edu\/chicago\/?p=77013"},"modified":"2019-03-04T20:35:10","modified_gmt":"2019-03-05T02:35:10","slug":"facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response","status":"publish","type":"post","link":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/","title":{"rendered":"Facing inevitable data breaches and new privacy laws, companies shift focus to response"},"content":{"rendered":"<p><strong>By Tyler Sonnemaker<\/strong><br \/>\n<em>Medill Reports<\/em><\/p>\n<p class=\"dropcap\">The number of data breaches has skyrocketed in recent years, with high-profile incidents involving major companies such as Facebook and Uber, financial institutions and <a href=\"https:\/\/news.medill.northwestern.edu\/chicago\/federal-agencies-iran-cyberattck\/\">government agencies<\/a>. According to <a href=\"https:\/\/www.idtheftcenter.org\/images\/breach\/2017Breaches\/2017AnnualDataBreachYearEndReview.pdf\">a report <\/a>from the Identity Theft Resource Center, 1,579 incidents \u2014 involving nearly 179 million records \u2014 occurred in 2017 alone.<\/p>\n<p>That amounts to more than four incidents per day, and there are likely many more that go undetected. As a result, hundreds of millions of people have had their personal information stolen.<!--more--><\/p>\n<p>For everyday internet users, it\u2019s easy to become numb to news about data breaches. And with the sheer volume of records leaked, it\u2019s hard to determine whether to be concerned about a particular incident or whether to stop using products and services from a company that has exposed your data.<\/p>\n<p>At the same time, it\u2019s impossible for businesses, government agencies and other organizations that collect and store your data to completely guarantee safety.<\/p>\n<p>\u201cCybersecurity is an oxymoron and a data breach is inevitable,\u201d said John Reed Stark, an independent cybersecurity consultant and former chief of the SEC\u2019s Office of Internet Enforcement.<\/p>\n<p>But that inevitability doesn\u2019t mean giving up entirely. Instead, it just changes how companies must approach cybersecurity, requiring them to go beyond preventative measures.<\/p>\n<p>\u201cIt\u2019s important to have the latest tools and technology because the threat is evolving,\u201d Stark said, but added that \u201cit\u2019s even more important to have the proper governance and proper response framework in place.\u201d<\/p>\n<p>Stark recommended companies hire an independent cybersecurity firm immediately after learning of a breach. He compared it to going to the doctor \u2014 the doctor gets paid whether the results are good or bad, so there\u2019s no incentive to skew the findings.<\/p>\n<p>Companies, cybersecurity professionals, and policymakers alike have started paying more attention to how breach victims respond to an incident.<\/p>\n<p>\u201cCompanies are recognizing that they need to be prompt in disclosing the breaches,\u201d said Michelle Cohen, a partner at Ifrah Law and chair of its privacy and data security practice. They must be \u201ctransparent with consumers and regulators regarding what happened, what may have been compromised and what the company is offering to do to remedy the situation,\u201d Cohen added.<\/p>\n<p>Each incident is unique, from the laws governing the organization involved to the type of information compromised. But this shift in thinking means consumers and regulators must look to new metrics \u2014 such as how long it takes a company to both discover and disclose a breach.<\/p>\n\n<!-- iframe plugin v.6.0 wordpress.org\/plugins\/iframe\/ -->\n<iframe src=\"https:\/\/public.tableau.com\/views\/20190228-DataBreaches\/d-disclosure?:showVizHome=no&#038;:embed=true\" width=\"100%\" height=\"700\" scrolling=\"yes\" class=\"iframe-class\" frameborder=\"0\"><\/iframe>\n\n\n<!-- iframe plugin v.6.0 wordpress.org\/plugins\/iframe\/ -->\n<iframe src=\"https:\/\/public.tableau.com\/views\/20190228-DataBreaches\/d-incident?:showVizHome=no&#038;:embed=true\" width=\"100%\" height=\"700\" scrolling=\"yes\" class=\"iframe-class\" frameborder=\"0\"><\/iframe>\n\n<p>There are legitimate reasons why breach victims may not want to immediately alert the public. They might still be fixing the vulnerability and don\u2019t want to draw more attention to it.<\/p>\n<p>Companies may also be reluctant to alert authorities, who could ask for access to customer information to assist with an investigation. \u201cThat\u2019s information about customers that they haven\u2019t agreed for the company to give to the FBI,\u201d Stark said.<\/p>\n<p>But sometimes the motives are more selfish. Executives, whose compensation is often directly tied to their company\u2019s stock performance, may fear that disclosure could negatively impact stock price or cause a PR headache.<\/p>\n<p>\u201cTwo weeks [is] probably fine because you need to investigate, but four months could easily be viewed as too long, especially if there is a likely harm to consumers,\u201d Cohen said.<\/p>\n<p>In recent years, several high-profile companies, including <a href=\"https:\/\/www.wsj.com\/articles\/sec-probes-why-facebook-didnt-warn-sooner-on-privacy-lapse-1531422043\">Facebook<\/a>, <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/ne3bv7\/equifax-breach-social-security-numbers-researcher-warning\">Equifax<\/a>, <a href=\"https:\/\/www.wsj.com\/articles\/yahoos-successor-to-pay-35-million-in-settlement-over-cyber-breach-1524588040?mod=article_inline\">Yahoo<\/a>, and <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2017-11-21\/uber-concealed-cyberattack-that-exposed-57-million-people-s-data\">Uber<\/a>, have responded to breaches by choosing not to alert the public or trying to cover up the incident entirely.<\/p>\n<p>Regardless of executives\u2019 motivations, public backlash has spurred new legislation around online privacy, cybersecurity standards and disclosure requirements. Most notable are Europe\u2019s General Data Protection Regulation (GDPR), which became effective May 2018, and California\u2019s Consumer Privacy Act (CCPA), set to go into effect January 2020.<\/p>\n<p>Many customers of U.S. companies are covered by GDPR\u2019s extensive protections, and as more <a href=\"https:\/\/termly.io\/resources\/articles\/data-privacy-laws-by-state-a-complete-guide\/\">states pass their own laws<\/a>, the legal landscape is becoming fragmented and complicated, making compliance a moving target.<\/p>\n<p>This has helped lead to a growing, diverse chorus in favor of a national digital privacy law.<\/p>\n<p>\u201cMany parties (myself included), think that a national standard around data notifications would make things clearer,\u201d said Cohen, noting that \u201ccompanies would not have to engage in a 50 state analysis of the different state standards.\u201d<\/p>\n<p>The devil is of course, in the details, from both a political and technical standpoint. Politically, some fear that a weak national standard could undermine stronger state protections.<\/p>\n<p>Technically, Congress has so far demonstrated a severe lack of understanding about how the internet and modern digital economy operate. This was especially apparent\u00a0<a href=\"https:\/\/www.cnet.com\/news\/some-senators-in-congress-capitol-hill-just-dont-get-facebook-and-mark-zuckerberg\/\">during hearings<\/a> with Facebook CEO Mark Zuckerberg, where members seemed confused about basic aspects of the social media giant&#8217;s business model and services it provides.<\/p>\n<p>\u201cMost sitting members of Congress don\u2019t personally have that expertise,\u201d said Lisa Hayes, vice president of strategy and general counsel for the Center for Democracy and Technology, a Washington, D.C., nonprofit that focuses on internet and privacy issues.<\/p>\n<p>Hayes, noting that she herself relies on CDT\u2019s technologists, hopes that legislators will \u201cgo get experts who can advise [them] on technologically feasible solutions.\u201d<\/p>\n<p>Whether or not effective national legislation is likely to pass in the immediate future, it\u2019s clear that companies are facing increasing legal, political, and financial pressure to respond transparently when data breaches inevitably do occur.<\/p>\n<hr \/>\n<p><em> Understanding the visualizations:<\/em><\/p>\n<ol>\n<li><em>Breach dates and discovery dates are approximate based on the best publicly available information.<\/em><\/li>\n<li><em>Friend Finder Network&#8217;s breach was first publicized on Twitter by a security researcher who goes by the handle @1&#215;0123. It appears this is also when FFN discovered the breach, preventing it from withholding information from the public.<\/em><\/li>\n<li><em>Equifax was notified of its vulnerability in December 2016 by a security researcher but did not act to fix it until after it was hacked in June 2017.<\/em><\/li>\n<\/ol>\n<div class=\"featurecaption\">Photo at top: Data is impossible to secure perfectly, making breaches inevitable (image courtesy of Blogtrepreneur\/FLICKR under CC-BY-2.0).<\/div>\n","protected":false},"excerpt":{"rendered":"<p>By Tyler Sonnemaker Medill Reports The number of data breaches has skyrocketed in recent years, with high-profile incidents involving major companies such as Facebook and Uber, financial institutions and government agencies. According to a report from the Identity Theft Resource Center, 1,579 incidents \u2014 involving nearly 179 million records \u2014 occurred in 2017 alone. That [&hellip;]<\/p>\n","protected":false},"author":547,"featured_media":77014,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27,4630,4559],"tags":[4589,4655,4662,4661,4657,94,4663,4656,4660,4659,936,192,171,3269,177,4658],"class_list":["post-77013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-technology","category-winter-2019","tag-cybersecurity","tag-data-breaches","tag-deep-root-analytics","tag-ebay","tag-equifax","tag-facebook","tag-friend-finder-networks","tag-identity-theft","tag-marriott","tag-myspace","tag-privacy","tag-promo","tag-technology","tag-uber","tag-under-armour","tag-yahoo"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Facing inevitable data breaches and new privacy laws, companies shift focus to response - Medill Reports Chicago<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Facing inevitable data breaches and new privacy laws, companies shift focus to response - Medill Reports Chicago\" \/>\n<meta property=\"og:description\" content=\"By Tyler Sonnemaker Medill Reports The number of data breaches has skyrocketed in recent years, with high-profile incidents involving major companies such as Facebook and Uber, financial institutions and government agencies. According to a report from the Identity Theft Resource Center, 1,579 incidents \u2014 involving nearly 179 million records \u2014 occurred in 2017 alone. That [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Medill Reports Chicago\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-05T02:35:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2019\/03\/data_security-blogtrepreneur-ccby20-1100px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"825\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tylersonnemaker2019\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tylersonnemaker2019\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/\",\"url\":\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/\",\"name\":\"Facing inevitable data breaches and new privacy laws, companies shift focus to response - Medill Reports Chicago\",\"isPartOf\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2019\/03\/data_security-blogtrepreneur-ccby20-1100px.jpg\",\"datePublished\":\"2019-03-05T02:35:10+00:00\",\"author\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/a997eaedb8918b85419a9688c6dd3e27\"},\"breadcrumb\":{\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#primaryimage\",\"url\":\"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2019\/03\/data_security-blogtrepreneur-ccby20-1100px.jpg\",\"contentUrl\":\"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2019\/03\/data_security-blogtrepreneur-ccby20-1100px.jpg\",\"width\":1100,\"height\":825,\"caption\":\"Data is impossible to secure perfectly, making breaches inevitable (Image Courtesy of Blogtrepreneur\/FLICKR under CC-BY-2.0).\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/news.medill.northwestern.edu\/chicago\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Facing inevitable data breaches and new privacy laws, companies shift focus to response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#website\",\"url\":\"https:\/\/news.medill.northwestern.edu\/chicago\/\",\"name\":\"Medill Reports Chicago\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.medill.northwestern.edu\/chicago\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/a997eaedb8918b85419a9688c6dd3e27\",\"name\":\"tylersonnemaker2019\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c5cc7818730c636c13f9799e5c6dd5ac2829daf2b40f80964e900727604a38c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c5cc7818730c636c13f9799e5c6dd5ac2829daf2b40f80964e900727604a38c?s=96&d=mm&r=g\",\"caption\":\"tylersonnemaker2019\"},\"url\":\"https:\/\/news.medill.northwestern.edu\/chicago\/author\/tylersonnemaker2019\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Facing inevitable data breaches and new privacy laws, companies shift focus to response - Medill Reports Chicago","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/","og_locale":"en_US","og_type":"article","og_title":"Facing inevitable data breaches and new privacy laws, companies shift focus to response - Medill Reports Chicago","og_description":"By Tyler Sonnemaker Medill Reports The number of data breaches has skyrocketed in recent years, with high-profile incidents involving major companies such as Facebook and Uber, financial institutions and government agencies. According to a report from the Identity Theft Resource Center, 1,579 incidents \u2014 involving nearly 179 million records \u2014 occurred in 2017 alone. That [&hellip;]","og_url":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/","og_site_name":"Medill Reports Chicago","article_published_time":"2019-03-05T02:35:10+00:00","og_image":[{"width":1100,"height":825,"url":"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2019\/03\/data_security-blogtrepreneur-ccby20-1100px.jpg","type":"image\/jpeg"}],"author":"tylersonnemaker2019","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tylersonnemaker2019","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/","url":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/","name":"Facing inevitable data breaches and new privacy laws, companies shift focus to response - Medill Reports Chicago","isPartOf":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#primaryimage"},"image":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#primaryimage"},"thumbnailUrl":"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2019\/03\/data_security-blogtrepreneur-ccby20-1100px.jpg","datePublished":"2019-03-05T02:35:10+00:00","author":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/a997eaedb8918b85419a9688c6dd3e27"},"breadcrumb":{"@id":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#primaryimage","url":"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2019\/03\/data_security-blogtrepreneur-ccby20-1100px.jpg","contentUrl":"https:\/\/s3.amazonaws.com\/medill.wordpress.offload\/WP%20Media%20Folder%20-%20medill-reports-chicago\/wp-content\/uploads\/sites\/3\/2019\/03\/data_security-blogtrepreneur-ccby20-1100px.jpg","width":1100,"height":825,"caption":"Data is impossible to secure perfectly, making breaches inevitable (Image Courtesy of Blogtrepreneur\/FLICKR under CC-BY-2.0)."},{"@type":"BreadcrumbList","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/facing-inevitable-data-breaches-and-new-privacy-laws-companies-shift-focus-to-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.medill.northwestern.edu\/chicago\/"},{"@type":"ListItem","position":2,"name":"Facing inevitable data breaches and new privacy laws, companies shift focus to response"}]},{"@type":"WebSite","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#website","url":"https:\/\/news.medill.northwestern.edu\/chicago\/","name":"Medill Reports Chicago","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.medill.northwestern.edu\/chicago\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/a997eaedb8918b85419a9688c6dd3e27","name":"tylersonnemaker2019","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.medill.northwestern.edu\/chicago\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5c5cc7818730c636c13f9799e5c6dd5ac2829daf2b40f80964e900727604a38c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c5cc7818730c636c13f9799e5c6dd5ac2829daf2b40f80964e900727604a38c?s=96&d=mm&r=g","caption":"tylersonnemaker2019"},"url":"https:\/\/news.medill.northwestern.edu\/chicago\/author\/tylersonnemaker2019\/"}]}},"_links":{"self":[{"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/posts\/77013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/users\/547"}],"replies":[{"embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/comments?post=77013"}],"version-history":[{"count":0,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/posts\/77013\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/media\/77014"}],"wp:attachment":[{"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/media?parent=77013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/categories?post=77013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.medill.northwestern.edu\/chicago\/wp-json\/wp\/v2\/tags?post=77013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}