{"id":35325,"date":"2017-03-15T10:36:05","date_gmt":"2017-03-15T17:36:05","guid":{"rendered":"http:\/\/69.46.6.243\/?p=35325"},"modified":"2017-03-15T10:36:05","modified_gmt":"2017-03-15T17:36:05","slug":"u-s-charges-russian-fsb-officers-and-their-criminal-conspirators-for-hacking-yahoo-and-millions-of-email-accounts","status":"publish","type":"post","link":"https:\/\/new.thepinetree.net\/?p=35325","title":{"rendered":"U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts"},"content":{"rendered":"<p>Washington, DC&#8230;A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo\u2019s network and the contents of webmail accounts. The defendants are Dmitry Aleksandrovich Dokuchaev, 33, a Russian national and resident; Igor Anatolyevich Sushchin, 43, a Russian national and resident; Alexsey Alexseyevich Belan, aka \u201cMagg,\u201d 29, a Russian national and resident; and Karim Baratov, aka \u201cKay,\u201d \u201cKarim Taloverov\u201d and \u201cKarim Akehmet Tokbergenov,\u201d 22, a Canadian and Kazakh national and a resident of Canada.<\/p>\n<p><iframe loading=\"lazy\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/gli1KTZxJMg\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>The defendants used unauthorized access to Yahoo\u2019s systems to steal information from about at least 500 million Yahoo accounts and then used some of that stolen information to obtain unauthorized access to the contents of accounts at Yahoo, Google and other webmail providers, including accounts of Russian journalists, U.S. and Russian government officials and private-sector employees of financial, transportation and other companies. One of the defendants also exploited his access to Yahoo\u2019s network for his personal financial gain, by searching Yahoo user communications for credit card and gift card account numbers, redirecting a subset of Yahoo search engine web traffic so he could make commissions and enabling the theft of the contacts of at least 30 million Yahoo accounts to facilitate a spam campaign.<\/p>\n<p>The charges were announced by Attorney General Jeff Sessions of the U.S. Department of Justice, Director James Comey of the FBI, Acting Assistant Attorney General Mary McCord of the National Security Division, U.S. Attorney Brian Stretch for the Northern District of California and Executive Assistant Director Paul Abbate of the FBI\u2019s Criminal, Cyber, Response and Services Branch.<\/p>\n<p>\u201cCyber crime poses a significant threat to our nation\u2019s security and prosperity, and this is one of the largest data breaches in history,\u201d said Attorney General Sessions. \u201cBut thanks to the tireless efforts of U.S. prosecutors and investigators, as well as our Canadian partners, today we have identified four individuals, including two Russian FSB officers, responsible for unauthorized access to millions of users\u2019 accounts. The United States will vigorously investigate and prosecute the people behind such attacks to the fullest extent of the law.\u201d<\/p>\n<p>\u201cToday we continue to pierce the veil of anonymity surrounding cyber crimes,\u201d said Director Comey. \u201cWe are shrinking the world to ensure that cyber criminals think twice before targeting U.S. persons and interests.\u201d<\/p>\n<p>\u201c The criminal conduct at issue, carried out and otherwise facilitated by officers from an FSB unit that serves as the FBI\u2019s point of contact in Moscow on cybercrime matters, is beyond the pale,\u201d said Acting Assistant Attorney General McCord. \u201cOnce again, the Department and the FBI have demonstrated that hackers around the world can and will be exposed and held accountable. State actors may be using common criminals to access the data they want, but the indictment shows that our companies do not have to stand alone against this threat. We commend Yahoo and Google for their sustained and invaluable cooperation in the investigation aimed at obtaining justice for, and protecting the privacy of their users.\u201d<\/p>\n<p>\u201cThis is a highly complicated investigation of a very complex threat. It underscores the value of early, proactive engagement and cooperation between the private sector and the government,\u201d said Executive Assistant Director Abbate. \u201cThe FBI will continue to work relentlessly with our private sector and international partners to identify those who conduct cyber-attacks against our citizens and our nation, expose them and hold them accountable under the law, no matter where they attempt to hide.\u201d<\/p>\n<p>\u201cSilicon Valley\u2019s computer infrastructure provides the means by which people around the world communicate with each other in their business and personal lives. The privacy and security of those communications must be governed by the rule of law, not by the whim of criminal hackers and those who employ them. People rightly expect that their communications through Silicon Valley internet providers will remain private, unless lawful authority provides otherwise. We will not tolerate unauthorized and illegal intrusions into the Silicon Valley computer infrastructure upon which both private citizens and the global economy rely,\u201d said U.S. Attorney Stretch. \u201cWorking closely with Yahoo and Google, Department of Justice lawyers and the FBI were able to identify and expose the hackers responsible for the conduct described today, without unduly intruding into the privacy of the accounts that were stolen. We commend Yahoo and Google for providing exemplary cooperation while zealously protecting their users\u2019 privacy.\u201d<\/p>\n<p>Summary of Allegations<\/p>\n<p>According to the allegations of the Indictment:<\/p>\n<p>The FSB officer defendants, Dmitry Dokuchaev and Igor Sushchin, protected, directed, facilitated and paid criminal hackers to collect information through computer intrusions in the U.S. and elsewhere. In the present case, they worked with co-defendants Alexsey Belan and Karim Baratov to obtain access to the email accounts of thousands of individuals.<\/p>\n<p>Belan had been publicly indicted in September 2012 and June 2013 and was named one of FBI\u2019s Cyber Most Wanted criminals in November 2013. An Interpol Red Notice seeking his immediate detention has been lodged (including with Russia) since July 26, 2013. Belan was arrested in a European country on a request from the U.S. in June 2013, but he was able to escape to Russia before he could be extradited.<\/p>\n<p>Instead of acting on the U.S. government\u2019s Red Notice and detaining Belan after his return, Dokuchaev and Sushchin subsequently used him to gain unauthorized access to Yahoo\u2019s network. In or around November and December 2014, Belan stole a copy of at least a portion of Yahoo\u2019s User Database (UDB), a Yahoo trade secret that contained, among other data, subscriber information including users\u2019 names, recovery email accounts, phone numbers and certain information required to manually create, or \u201cmint,\u201d account authentication web browser \u201ccookies\u201d for more than 500 million Yahoo accounts.<\/p>\n<p>Belan also obtained unauthorized access on behalf of the FSB conspirators to Yahoo\u2019s Account Management Tool (AMT), which was a proprietary means by which Yahoo made and logged changes to user accounts. Belan, Dokuchaev and Sushchin then used the stolen UDB copy and AMT access to locate Yahoo email accounts of interest and to mint cookies for those accounts, enabling the co-conspirators to access at least 6,500 such accounts without authorization.<\/p>\n<p>Some victim accounts were of predictable interest to the FSB, a foreign intelligence and law enforcement service, such as personal accounts belonging to Russian journalists; Russian and U.S. government officials; employees of a prominent Russian cybersecurity company; and numerous employees of other providers whose networks the conspirators sought to exploit. However, other personal accounts belonged to employees of commercial entities, such as a Russian investment banking firm, a French transportation company, U.S. financial services and private equity firms, a Swiss bitcoin wallet and banking firm and a U.S. airline.<\/p>\n<p>&nbsp;<\/p>\n<p>During the conspiracy, the FSB officers facilitated Belan\u2019s other criminal activities, by providing him with sensitive FSB law enforcement and intelligence information that would have helped him avoid detection by U.S. and other law enforcement agencies outside Russia, including information regarding FSB investigations of computer hacking and FSB techniques for identifying criminal hackers. Additionally, while working with his FSB conspirators to compromise Yahoo\u2019s network and its users, Belan used his access to steal financial information such as gift card and credit card numbers from webmail accounts; to gain access to more than 30 million accounts whose contacts were then stolen to facilitate a spam campaign; and to earn commissions from fraudulently redirecting a subset of Yahoo\u2019s search engine traffic.<\/p>\n<p>&nbsp;<\/p>\n<p>When Dokuchaev and Sushchin learned that a target of interest had accounts at webmail providers other than Yahoo, including through information obtained as part of the Yahoo intrusion, they tasked their co-conspirator, Baratov, a resident of Canada, with obtaining unauthorized access to more than 80 accounts in exchange for commissions. On March 7, the Department of Justice submitted a provisional arrest warrant to Canadian law enforcement authorities, requesting Baratov\u2019s arrest. On March 14, Baratov was arrested in Canada and the matter is now pending with the Canadian authorities.<\/p>\n<p>&nbsp;<\/p>\n<p>An indictment is merely an accusation, and a defendant is presumed innocent unless proven guilty in a court of law.<\/p>\n<p>&nbsp;<\/p>\n<p>The FBI, led by the San Francisco Field Office, conducted the investigation that resulted in the charges announced today. The case is being prosecuted by the U.S. Department of Justice National Security Division\u2019s Counterintelligence and Export Control Section and the U.S. Attorney\u2019s Office for the Northern District of California, with support from the Justice Department\u2019s Office of International Affairs.<\/p>\n<p><b><strong>Defendants:<\/strong><\/b> At all times relevant to the charges, the Indictment alleges as follows:<\/p>\n<ul>\n<li>\n<ul>\n<li><b><strong>Dmitry Aleksandrovich Dokuchaev<\/strong><\/b>, 33, was an officer in the FSB Center for Information Security, aka \u201cCenter 18.\u201d Dokuchaev was a Russian national and resident.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<ul>\n<li><b><strong>Igor Anatolyevich Sushchin<\/strong><\/b>, 43, was an FSB officer, a superior to Dokuchaev within the FSB, and a Russian national and resident. Sushchin was embedded as a purported employee and Head of Information Security at a Russian investment bank.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<ul>\n<li><b><strong>Alexsey Alexseyevich Belan<\/strong><\/b>, aka \u201cMagg,\u201d 29, was born in Latvia and is a Russian national and resident. U.S. Federal grand juries have indicted Belan twice before, in 2012 and 2013, for computer fraud and abuse, access device fraud and aggravated identity theft involving three U.S.-based e-commerce companies and the FBI placed Belan on its \u201cCyber Most Wanted\u201d list.\u00a0 Belan is currently the subject of a pending \u201cRed Notice\u201d requesting that Interpol member nations (including Russia) arrest him pending extradition. Belan was also one of two criminal hackers named by President Barack Obama on Dec. 29, 2016, pursuant to Executive Order 13694, as a Specially Designated National subject to sanctions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<ul>\n<li><b><strong>Karim Baratov<\/strong><\/b>, aka \u201cKay,\u201d \u201cKarim Taloverov\u201d and \u201cKarim Akehmet Tokbergenov,\u201d 22. He is a Canadian and Kazakh national and a resident of Canada.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b><strong>Victims: <\/strong><\/b>Yahoo; more than 500 million Yahoo accounts for which account information about was stolen by the defendants; more than 30 million Yahoo accounts for which account contents were accessed without authorization to facilitate a spam campaign; and at least 18 additional users at other webmail providers whose accounts were accessed without authorization.<\/p>\n<p>&nbsp;<\/p>\n<p><b><strong>Time Period: <\/strong><\/b>As alleged in the Indictment, the conspiracy began at least as early as 2014 and, even though the conspirators lost their access to Yahoo\u2019s networks in September 2016, they continued to utilize information stolen from the intrusion up to and including at least December 2016.<\/p>\n<p>&nbsp;<\/p>\n<p><b><strong>Crimes:<\/strong><\/b><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"104\"><b><strong>Count(s)<\/strong><\/b><\/td>\n<td width=\"143\"><b><strong>Defendant(s)<\/strong><\/b><\/td>\n<td width=\"160\"><b><strong>Charge<\/strong><\/b><\/td>\n<td width=\"206\"><b><strong>Statute\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a018 U.S.C.<\/strong><\/b><\/td>\n<td width=\"674\"><b><strong>Conduct<\/strong><\/b><\/td>\n<td width=\"152\"><b><strong>Maximum Penalty<\/strong><\/b><\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>1<\/strong><\/b><\/td>\n<td width=\"143\">All<\/td>\n<td width=\"160\">Conspiring to commit computer fraud and abuse<\/td>\n<td width=\"206\">\u00a7 1030(b)<\/td>\n<td width=\"674\">Defendants conspired to hack into the computers of Yahoo and accounts maintained by Yahoo, Google and other providers to steal information from them.<\/p>\n<p>&nbsp;<\/p>\n<p>First, Belan gained access to Yahoo\u2019s servers and stole information that allowed him, Dokuchaev, and Sushchin to gain unauthorized access to individual Yahoo user accounts.<\/p>\n<p>Then, Dokuchaev and Sushchin tasked Baratov with gaining access to individual user accounts at Google and other Providers (but not Yahoo) and paid Baratov for providing them with the account passwords. In some instances, Dokuchaev and Sushchin tasked Baratov with targeting accounts that they learned of through access to Yahoo\u2019s UDB and AMT (e.g., Gmail accounts that served as a Yahoo user\u2019s secondary account).<\/td>\n<td width=\"152\">10 years<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>2<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Conspiring to engage in economic espionage<\/td>\n<td width=\"206\">\u00a7 1831(a)(5)<\/td>\n<td width=\"674\">Starting on Nov. 4, 2014, Belan stole, and the defendants thereafter transferred, received and possessed the following Yahoo trade secrets:<\/p>\n<ul>\n<li>the Yahoo UDB, which was proprietary and confidential Yahoo technology and information, including subscriber names, secondary accounts, phone numbers, challenge questions and answers;<\/li>\n<li>the AMT, Yahoo\u2019s interface to the UDB; and<\/li>\n<li>Yahoo\u2019s cookie \u201cminting\u201d source code, which enabled the defendants to manufacture account cookies to then gain access to individual Yahoo user accounts.<\/li>\n<\/ul>\n<\/td>\n<td width=\"152\">15 years<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>3<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Conspiring to engage in theft of trade secrets<\/td>\n<td width=\"206\">\u00a7 1832(a)(5)<\/td>\n<td width=\"674\">See Count 2<\/td>\n<td width=\"152\">10 years<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>4-6<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Economic espionage<\/td>\n<td width=\"206\">\u00a7\u00a7 1831(a)(1), (a)(4), and 2<\/td>\n<td width=\"674\">See Count 2<\/td>\n<td width=\"152\">15 years (each count)<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>7-9<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Theft of trade secrets<\/td>\n<td width=\"206\">\u00a7\u00a7 1832(a)(1), and 2<\/td>\n<td width=\"674\">See Count 2<\/td>\n<td width=\"152\">10 years (each count)<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>10<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Conspiring to commit wire fraud<\/td>\n<td width=\"206\">\u00a7 1349<\/td>\n<td width=\"674\">The defendants fraudulently schemed to gain unauthorized access to Yahoo\u2019s network through compromised Yahoo employee accounts and then used the Yahoo trade secrets to gain unauthorized access to valuable non-public information in individual Yahoo user accounts.<\/td>\n<td width=\"152\">20 years<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>11-13<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Accessing (or attempting to access) a computer without authorization to obtain information for the purpose of commercial advantage and private financial gain.<\/td>\n<td width=\"206\">\u00a7\u00a7 1030(a)(2)(C), 1030(c)(2)(B)(i)-(iii), and 2<\/td>\n<td width=\"674\">The defendants gained unauthorized access to Yahoo\u2019s corporate network and obtained information regarding Yahoo\u2019s network architecture and the UDB.<\/td>\n<td width=\"152\">5 years<\/p>\n<p>(each count)<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>14-17<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Transmitting code with the intent to cause damage to computers.<\/td>\n<td width=\"206\">\u00a7\u00a7 1030(a)(5)(A), 1030(c)(4)(B), and 2<\/td>\n<td width=\"674\">During the course of their unauthorized access to Yahoo\u2019s network, the defendants transmitted code on Yahoo\u2019s network in order to maintain a persistent presence, to redirect Yahoo search engine users and to mint cookies for individual Yahoo accounts.<\/td>\n<td width=\"152\">10 years (each count)<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>18-24<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Accessing (or attempting to access) a computer without authorization to obtain information for the purpose of commercial advantage and private financial gain.<\/td>\n<td width=\"206\">\u00a7\u00a7 1030(a)(2)(C), 1030(c)(2)(B)(i)-(iii), and 2<\/td>\n<td width=\"674\">Defendants obtained unauthorized access to individual Yahoo user accounts.<\/td>\n<td width=\"152\">5 years<\/p>\n<p>(each count)<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>25-36<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Counterfeit access device fraud<\/td>\n<td width=\"206\">\u00a7\u00a7 1029(a)(1), 1029(b)(1), and 2<\/td>\n<td width=\"674\">Defendants used minted cookies to gain unauthorized access to individual Yahoo user accounts.<\/td>\n<td width=\"152\">10 years (each count)<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>37<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Belan<\/td>\n<td width=\"160\">Counterfeit access device making equipment<\/td>\n<td width=\"206\">\u00a7\u00a7 1029(a)(4)<\/td>\n<td width=\"674\">Defendants used software to mint cookies for unauthorized access to individual Yahoo user accounts.<\/td>\n<td width=\"152\">15 years<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>38<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Baratov<\/td>\n<td width=\"160\">Conspiring to commit access device fraud<\/td>\n<td width=\"206\">\u00a7\u00a7 1029(b)(2)<\/td>\n<td width=\"674\">Defendants Dokuchaev and Sushchin tasked Baratov with gaining unauthorized access to individual user accounts at Google and other Providers and then paid Baratov for providing them with the account passwords. In some instances, Dokuchaev and Sushchin tasked Baratov with targeting accounts that they learned of through access to Yahoo\u2019s UDB and AMT (e.g., Gmail accounts that served as a Yahoo user\u2019s secondary account).<\/td>\n<td width=\"152\">7 \u00bd years.<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>39<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Sushchin<\/p>\n<p>Baratov<\/td>\n<td width=\"160\">Conspiring to commit wire fraud<\/td>\n<td width=\"206\">\u00a7 1349<\/td>\n<td width=\"674\">See Count 38<\/td>\n<td width=\"152\">20 years<\/td>\n<\/tr>\n<tr>\n<td width=\"104\"><b><strong>40-47<\/strong><\/b><\/td>\n<td width=\"143\">Dokuchaev<\/p>\n<p>Baratov<\/td>\n<td width=\"160\">Aggravated identity theft<\/td>\n<td width=\"206\">\u00a7 1028A(a)(1)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Washington, DC&#8230;A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo\u2019s network and the contents of webmail accounts. The defendants are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35326,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_cbd_carousel_blocks":"[]","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,5,16,1],"tags":[],"class_list":["post-35325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-government","category-law-enforcement","category-news","last_archivepost"],"jetpack_featured_media_url":"https:\/\/new.thepinetree.net\/wp-content\/uploads\/2017\/03\/dojyahoo.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=\/wp\/v2\/posts\/35325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35325"}],"version-history":[{"count":0,"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=\/wp\/v2\/posts\/35325\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=\/wp\/v2\/media\/35326"}],"wp:attachment":[{"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.thepinetree.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}