{"id":13078,"date":"2024-03-25T09:00:50","date_gmt":"2024-03-25T13:00:50","guid":{"rendered":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/?p=13078"},"modified":"2024-03-28T09:37:00","modified_gmt":"2024-03-28T13:37:00","slug":"should-the-u-s-prioritize-cyber-defense-in-its-budget","status":"publish","type":"post","link":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/","title":{"rendered":"Should the U.S. Prioritize Cyber Defense in its Budget?"},"content":{"rendered":"<p><b>Katherine Dorrer<\/b><\/p>\n<p><i><span style=\"font-weight: 400\">Staff Writer<\/span><\/i><\/p>\n<div class=\"ose-gettyimages ose-uid-35d8cc06abbf431856e941d9a60f22a4 ose-embedpress-responsive\" style=\"width:723px; height:623px; max-height:623px; max-width:100%; display:inline-block;\" data-embed-type=\"GettyImages\"><a id=\"ioaYZ0JQS1V3K0fKEOi1Rg\" class=\"gie-single\" href=\"https:\/\/www.gettyimages.com\/detail\/109818858\" target=\"_blank\" style=\"color:#a7a7a7;text-decoration:none;font-weight:normal !important;border:none;display:inline-block;\">Embed from Getty Images<\/a><script>window.gie=window.gie||function(c){(gie.q=gie.q||[]).push(c)};gie(function(){gie.widgets.load({id:\"ioaYZ0JQS1V3K0fKEOi1Rg\",sig:\"kMeqUgMaWK0SoCTagz6Qp-gCo05Hl1AXSy0CANrztv0=\",w:\"594px\",h:\"396px\",items:\"109818858\",caption: false ,tld:\"com\",is360: false })});<\/script><script src=\"\/\/embed-cdn.gettyimages.com\/widgets.js\" charset=\"utf-8\" async><\/script><\/div>\n\t\t\t<script>\n\t\t\t\tif (typeof gie === 'function') {\n\t\t\t\t\tgie(function(){\n\t\t\t\t\t\tvar iframe = document.querySelector('.ose-embedpress-responsive iframe');\n\t\t\t\t\t\tif(iframe && !iframe.getAttribute('title')){\n\t\t\t\t\t\t\tiframe.setAttribute('title', '')\n\t\t\t\t\t\t}\n\t\t\t\t\t});\n\t\t\t\t}\n\t\t\t<\/script>\n\t\t\n<p><span style=\"font-weight: 400\">The exponential growth of digital technologies and the pervasive reach of the Internet have revolutionized global communication, commerce, and information exchange. In today\u2019s interconnected world, where a substantial portion of daily activities occurs online, maintaining robust cyber security standards is not just advisable but imperative. The United States, faced with escalating cyber threats from foreign adversaries and the pervasive digitalization of critical infrastructure, must prioritize cybersecurity in its budget allocations to safeguard national security interests and ensure resilience in the face of evolving threats.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The <\/span><a href=\"blank\"><span style=\"font-weight: 400\">Fiscal Year 2025 Department of Defense<\/span><\/a><span style=\"font-weight: 400\"> budget request of $849.8 billion, reflects a recognition of the urgent need to bolster cybersecurity measures. This allocation not only serves to provide immediate protection against cyber-attacks but also lays the groundwork for the nation&#8217;s future security. A <\/span><a href=\"blank\"><span style=\"font-weight: 400\">senior defense official<\/span><\/a><span style=\"font-weight: 400\"> at the Pentagon states that \u201cthe FY23 cyber activity budget focuses investments in three portfolios, covering cybersecurity, cyberspace operations, and cyber research and development.\u201d With this, cybersecurity is no longer confined to the realms of government agencies; it has become a national obligation affecting every facet of society including finance, healthcare, transportation, and energy. The proliferation of interconnected devices and the digitalization of essential services have significantly expanded the attack surface for cyber threats, leaving critical infrastructure vulnerable to exploitation by malicious actors.<\/span><\/p>\n<p><span style=\"font-weight: 400\">While the allocation of <\/span><a href=\"blank\"><span style=\"font-weight: 400\">$1.7 billion<\/span><\/a><span style=\"font-weight: 400\"> to the Cybersecurity and Infrastructure Security Agency (CISA) in the FY25 budget marks a step forward in consolidating cyber threat data, it is crucial to recognize that traditional methods alone may not suffice in combating the evolving threat landscape A recent breach in a federal agency responsible for cyber security underscores the vulnerability of organizations to cyber vulnerabilities and the necessity of having robust incident response plans in place. A CISA <\/span><a href=\"blank\"><span style=\"font-weight: 400\">spokesperson<\/span><\/a><span style=\"font-weight: 400\"> stated, \u201c<\/span><span style=\"font-weight: 400\">This is a reminder that any organization can be affected by a cyber vulnerability, and having an incident response plan in place is a necessary component of resilience.\u201d <\/span><span style=\"font-weight: 400\">Failure to prioritize cybersecurity investments leaves nations vulnerable to exploitation and disruption, highlighting the urgent need for increased resources and efforts to fortify cyber defenses and protocols against evolving threats.<\/span><\/p>\n<p><span style=\"font-weight: 400\">While the National Defense Strategy effectively addresses traditional security challenges such as geopolitical rivalries and traditional military threats, the landscape of warfare has evolved dramatically in recent years, with cybersecurity emerging as a prominent domain of conflict. Unlike conventional warfare, where adversaries engage in physical battles, cyber warfare operates in the virtual realm, leveraging digital technologies to launch attacks on critical infrastructure, government systems, and private networks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The growing prominence of cybersecurity warfare stems from several factors. First, advancements in technology have made cyberspace an attractive arena for state and non-state actors seeking to disrupt operations without the need for conventional military forces. Cyber-attacks offer anonymity, deniability, and the potential for significant impact with relatively low costs and risks. The asymmetrical nature of cyber warfare allows smaller, less powerful entities to pose significant threats to larger, more technologically advanced nations. State-sponsored cyber espionage, cyber terrorism, and cybercrime present formidable challenges that cannot be adequately addressed through traditional means alone.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">As threats are evolving rapidly and adversaries becoming increasingly sophisticated, the necessity for adaptive strategies is paramount. As highlighted by Former NSA Chief Michael Rodgers, Western countries faced unprecedented levels of cyber-attacks, including ransomware incidents and successful data breaches, in the previous year, reports <\/span><a href=\"https:\/\/therecord.media\/former-nsa-chief-alternative-approach-cyber\"><span style=\"font-weight: 400\">The Record<\/span><\/a><span style=\"font-weight: 400\">. In its annual crime report, cryptocurrency firm <\/span><a href=\"https:\/\/www.chainalysis.com\/blog\/ransomware-2024\/\"><span style=\"font-weight: 400\">Chainalysis<\/span><\/a><span style=\"font-weight: 400\"> stated that in 2023, ransomware payments exceeded $1.1 billion. At the Munich Cyber Security Conference <\/span><a href=\"blank\"><span style=\"font-weight: 400\">Rodgers<\/span><\/a><span style=\"font-weight: 400\"> asserts<\/span><span style=\"font-weight: 400\"> that \u201ccontinuing with the same strategies and expecting different outcomes is a low-probability success strategy.,\u201d continues The Record.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Given these dynamics, it is imperative that the United States allocates greater attention and investment in its budget priorities. <\/span><a href=\"https:\/\/www.msn.com\/en-us\/news\/world\/bidens-meager-1-us-defense-budget-increase-buys-fewer-ships-jets\/ar-BB1jINzE\"><span style=\"font-weight: 400\">Reuters<\/span><\/a><span style=\"font-weight: 400\"> explains that despite the significant budget allocation of $849.8 billion, representing a one percent increase from 2024 defense spending, there remains a pressing need to give a more substantial portion of these resources to bolster cyber defenses, enhance resilience, and invest in cutting-edge technologies to mitigate cyber risks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In this critical juncture of cybersecurity strategy and spending, the United States must acknowledge the imperative for practice and innovative approaches. While the FY25 proposed budget demonstrates commendable strides in bolstering cybersecurity, it is but a single step in an ongoing journey toward cyber resilience. Failing to heed this not only jeopardizes the nation\u2019s security but also risks ceding ground to adversaries eager to exploit the nation\u2019s vulnerabilities.<\/span><\/p>\n<p>Image courtesy of <em>Getty Images<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The exponential growth of digital technologies and the pervasive reach of the Internet have revolutionized global communication, commerce, and information exchange. In today\u2019s interconnected world, where a substantial portion of daily activities occurs online, maintaining robust cyber security standards is not just advisable but imperative. The United States, faced with escalating cyber threats from foreign adversaries and the pervasive digitalization of critical infrastructure, must prioritize cybersecurity in its budget allocations to safeguard national security interests and ensure resilience in the face of evolving threats.<\/p>\n","protected":false},"author":5148,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2786,2705,7,383],"tags":[514,1389,2478],"class_list":["post-13078","post","type-post","status-publish","format-standard","hentry","category-march-2024","category-2705","category-opinion","category-us","tag-united-states","tag-defense-spending","tag-military-aid"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Should the U.S. Prioritize Cyber Defense in its Budget? - The Diplomatic Envoy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Should the U.S. Prioritize Cyber Defense in its Budget? - The Diplomatic Envoy\" \/>\n<meta property=\"og:description\" content=\"The exponential growth of digital technologies and the pervasive reach of the Internet have revolutionized global communication, commerce, and information exchange. In today\u2019s interconnected world, where a substantial portion of daily activities occurs online, maintaining robust cyber security standards is not just advisable but imperative. The United States, faced with escalating cyber threats from foreign adversaries and the pervasive digitalization of critical infrastructure, must prioritize cybersecurity in its budget allocations to safeguard national security interests and ensure resilience in the face of evolving threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/\" \/>\n<meta property=\"og:site_name\" content=\"The Diplomatic Envoy\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-25T13:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-28T13:37:00+00:00\" \/>\n<meta name=\"author\" content=\"Katherine Dorrer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katherine Dorrer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/\"},\"author\":{\"name\":\"Katherine Dorrer\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/44feba2f6eb0847bd9da2be61eeff4ff\"},\"headline\":\"Should the U.S. Prioritize Cyber Defense in its Budget?\",\"datePublished\":\"2024-03-25T13:00:50+00:00\",\"dateModified\":\"2024-03-28T13:37:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/\"},\"wordCount\":763,\"commentCount\":0,\"keywords\":[\"United States\",\"Defense Spending\",\"Military aid\"],\"articleSection\":[\"March 2024\",\"2024\",\"Opinion\",\"U.S.\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/\",\"name\":\"Should the U.S. Prioritize Cyber Defense in its Budget? - The Diplomatic Envoy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#website\"},\"datePublished\":\"2024-03-25T13:00:50+00:00\",\"dateModified\":\"2024-03-28T13:37:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/44feba2f6eb0847bd9da2be61eeff4ff\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/2024\\\/03\\\/25\\\/should-the-u-s-prioritize-cyber-defense-in-its-budget\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Should the U.S. Prioritize Cyber Defense in its Budget?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#website\",\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/\",\"name\":\"The Diplomatic Envoy\",\"description\":\"Words Beyond Borders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/#\\\/schema\\\/person\\\/44feba2f6eb0847bd9da2be61eeff4ff\",\"name\":\"Katherine Dorrer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e9d9c37283f9883dc302152e677f11017667f566d58c71fab5f06cb483e63ff?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e9d9c37283f9883dc302152e677f11017667f566d58c71fab5f06cb483e63ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7e9d9c37283f9883dc302152e677f11017667f566d58c71fab5f06cb483e63ff?s=96&d=mm&r=g\",\"caption\":\"Katherine Dorrer\"},\"url\":\"https:\\\/\\\/blogs.shu.edu\\\/thediplomaticenvoy\\\/author\\\/dorrerka\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Should the U.S. Prioritize Cyber Defense in its Budget? - The Diplomatic Envoy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/","og_locale":"en_US","og_type":"article","og_title":"Should the U.S. Prioritize Cyber Defense in its Budget? - The Diplomatic Envoy","og_description":"The exponential growth of digital technologies and the pervasive reach of the Internet have revolutionized global communication, commerce, and information exchange. In today\u2019s interconnected world, where a substantial portion of daily activities occurs online, maintaining robust cyber security standards is not just advisable but imperative. The United States, faced with escalating cyber threats from foreign adversaries and the pervasive digitalization of critical infrastructure, must prioritize cybersecurity in its budget allocations to safeguard national security interests and ensure resilience in the face of evolving threats.","og_url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/","og_site_name":"The Diplomatic Envoy","article_published_time":"2024-03-25T13:00:50+00:00","article_modified_time":"2024-03-28T13:37:00+00:00","author":"Katherine Dorrer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Katherine Dorrer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/#article","isPartOf":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/"},"author":{"name":"Katherine Dorrer","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/44feba2f6eb0847bd9da2be61eeff4ff"},"headline":"Should the U.S. Prioritize Cyber Defense in its Budget?","datePublished":"2024-03-25T13:00:50+00:00","dateModified":"2024-03-28T13:37:00+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/"},"wordCount":763,"commentCount":0,"keywords":["United States","Defense Spending","Military aid"],"articleSection":["March 2024","2024","Opinion","U.S."],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/","name":"Should the U.S. Prioritize Cyber Defense in its Budget? - The Diplomatic Envoy","isPartOf":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#website"},"datePublished":"2024-03-25T13:00:50+00:00","dateModified":"2024-03-28T13:37:00+00:00","author":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/44feba2f6eb0847bd9da2be61eeff4ff"},"breadcrumb":{"@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/2024\/03\/25\/should-the-u-s-prioritize-cyber-defense-in-its-budget\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/"},{"@type":"ListItem","position":2,"name":"Should the U.S. Prioritize Cyber Defense in its Budget?"}]},{"@type":"WebSite","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#website","url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/","name":"The Diplomatic Envoy","description":"Words Beyond Borders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/#\/schema\/person\/44feba2f6eb0847bd9da2be61eeff4ff","name":"Katherine Dorrer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7e9d9c37283f9883dc302152e677f11017667f566d58c71fab5f06cb483e63ff?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e9d9c37283f9883dc302152e677f11017667f566d58c71fab5f06cb483e63ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e9d9c37283f9883dc302152e677f11017667f566d58c71fab5f06cb483e63ff?s=96&d=mm&r=g","caption":"Katherine Dorrer"},"url":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/author\/dorrerka\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/13078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/users\/5148"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/comments?post=13078"}],"version-history":[{"count":1,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/13078\/revisions"}],"predecessor-version":[{"id":13080,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/posts\/13078\/revisions\/13080"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/media?parent=13078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/categories?post=13078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/thediplomaticenvoy\/wp-json\/wp\/v2\/tags?post=13078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}