{"id":163290,"date":"2014-02-21T21:34:09","date_gmt":"2014-02-21T21:34:09","guid":{"rendered":"https:\/\/www.meydan.tv\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/"},"modified":"2021-10-29T11:52:12","modified_gmt":"2021-10-29T07:52:12","slug":"azerbaijani-government-might-be-monitoring-our-computers-and-phones","status":"publish","type":"post","link":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/","title":{"rendered":"Azerbaijani Government Might Be Monitoring Our Computers and Phones"},"content":{"rendered":"<figure class=\"wp-block-image size-large\">\n  <img decoding=\"async\" src=\"https:\/\/www.meydan.tv\/az\/5896\/\" alt=\"\" class=\"wp-image-5896\"\/><figcaption><\/figcaption><\/figure>\n<p>\n  Researchers at the University of Toronto\u2019s Citizen Lab released a<br \/>\n  <a href=\"https:\/\/citizenlab.org\/2014\/02\/mapping-hacking-teams-untraceable-spyware\"><br \/>\n    report<br \/>\n  <\/a><br \/>\n  this week that indicates that the Azerbaijani government used a sophisticated computer spyware tool that can monitor<br \/>\n  <i><br \/>\n    all<br \/>\n  <\/i><br \/>\n  computer and mobile phone activity, regardless of encryption security tools being used, without the user knowing that anything was installed. This tool can even use the web camera and microphone as recording devices.\n<\/p>\n<p>\n  <b><br \/>\n    What is this monitoring tool and what can it do?<br \/>\n  <\/b>\n<\/p>\n<p>\n  A Milan-based company called Hacking Team (also known as HT S.r.l.) sells<br \/>\n  <a href=\"http:\/\/hackingteam.it\/index.php\/about-us\"><br \/>\n    software<br \/>\n  <\/a><br \/>\n  to governments that are<br \/>\n  <i><br \/>\n    officially<br \/>\n  <\/i><br \/>\n  to be used in criminal investigations. This includes a suite called<br \/>\n  <a href=\"http:\/\/vimeo.com\/36090385\"><br \/>\n    DaVinci<br \/>\n  <\/a><br \/>\n  (or sometimes Crisis), which costs hundreds of thousands of dollars, and a Remote Control System called<br \/>\n  <a href=\"http:\/\/hackingteam.it\/images\/stories\/galileo.pdf\"><br \/>\n    Galileo<br \/>\n  <\/a><br \/>\n  . These tools allow a government to take control of a user\u2019s computer or mobile phone and monitor all of their activities \u2013 even if the user has encryption tools turned on. The sales occur directly between the Hacking Team company and the government itself \u2013 it does not use third party vendors to sell the technology, so the company knows exactly which governments use the software. Moreover, there is a board of engineers and lawyers unaffiliated with the company that reviews every sale. The company<br \/>\n  <a href=\"http:\/\/hackingteam.it\/index.php\/customer-policy\"><br \/>\n    says<br \/>\n  <\/a><br \/>\n  that it considers \u201ccredible government or non-government reports reflecting that a potential customer could use surveillance technologies to facilitate human rights abuses.\u201d (Although it does not emphasize this process in its promotional materials.) And based on the list of countries in the<br \/>\n  <a href=\"https:\/\/citizenlab.org\/2014\/02\/mapping-hacking-teams-untraceable-spyware\"><br \/>\n    report<br \/>\n  <\/a><br \/>\n  , it seems as if a number of countries known for human rights violations do use the software.\n<\/p>\n<p>\n  A<br \/>\n  <a href=\"http:\/\/insidesurveillance.blogspot.com\/2014\/01\/profile-hacking-team-getting-inside.html\"><br \/>\n    security blog<br \/>\n  <\/a><br \/>\n  reports that \u201cGalileo can monitor and log: Any action performed on a PC, whether Windows or Mac architecture:<br \/>\n  <b><br \/>\n    web browsing<br \/>\n  <\/b><br \/>\n  ,<br \/>\n  <b><br \/>\n    keystrokes<br \/>\n  <\/b><br \/>\n  in any unicode language, printed documents,<br \/>\n  <b><br \/>\n    chat<br \/>\n  <\/b><br \/>\n  ,<br \/>\n  <b><br \/>\n    email<br \/>\n  <\/b><br \/>\n  ,<br \/>\n  <b><br \/>\n    instant messaging<br \/>\n  <\/b><br \/>\n  , remote audio spy, and<br \/>\n  <b><br \/>\n    Skype voice conversations<br \/>\n  <\/b><br \/>\n  . Any action on a smart phone including iOS, Windows, Blackberry and Symbian: call history,<br \/>\n  <b><br \/>\n    address book<br \/>\n  <\/b><br \/>\n  ,<br \/>\n  <b><br \/>\n    calendar<br \/>\n  <\/b><br \/>\n  ,<br \/>\n  <b><br \/>\n    email<br \/>\n  <\/b><br \/>\n  and<br \/>\n  <b><br \/>\n    SMS messages<br \/>\n  <\/b><br \/>\n  . Also intercepts call signal\/<br \/>\n  <b><br \/>\n    location info<br \/>\n  <\/b><br \/>\n  and<br \/>\n  <b><br \/>\n    voice calls<br \/>\n  <\/b><br \/>\n  , and provides remote audio spy function. Encryption? Not a problem. Galileo sails right by it.\u201d\n<\/p>\n<p>\n  Or from<br \/>\n  <a href=\"http:\/\/www.theverge.com\/2013\/9\/13\/4723610\/meet-hacking-team-the-company-that-helps-police-hack-into-computers\"><br \/>\n    The Verge<br \/>\n  <\/a><br \/>\n  , \u201cWith Da Vinci, the police can<br \/>\n  <b><br \/>\n    monitor a suspect\u2019s cell phone conversations<br \/>\n  <\/b><br \/>\n  ,<br \/>\n  <b><br \/>\n    emails<br \/>\n  <\/b><br \/>\n  , and<br \/>\n  <b><br \/>\n    Skype calls<br \/>\n  <\/b><br \/>\n  , and even<br \/>\n  <b><br \/>\n    spy on the target through his or her webcam and microphone<br \/>\n  <\/b><br \/>\n  . It\u2019s as if the investigator were standing behind a suspect using their computer.\u201d\n<\/p>\n<p>\n  A<br \/>\n  <a href=\"http:\/\/www.youtube.com\/watch?v=8GhEvuU8LjU\"><br \/>\n    promotional video<br \/>\n  <\/a><br \/>\n  indicates that this tool can work outside of the borders of the country that is using the tool as well.\n<\/p>\n<p>\n  The spyware installs itself through a variety of methods &#8211; but the easiest method would have someone with physical control of a user\u2019s computer or phone install the software. But as<br \/>\n  <a href=\"https:\/\/citizenlab.org\/2012\/10\/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent\/\"><br \/>\n    was the case in the UAE<br \/>\n  <\/a><br \/>\n  , a suspicious email with a Word document attachment was opened and installed the software without any human assistance. There is also evidence of tweets with links to malicious software that installs in a user\u2019s system in the same way. Either method exploits bugs in popular software. The Citizen Lab believes that governments purchase additional software to create websites and documents that are the source of the infection that then ties the computer or mobile phone into the Remote Control System. Once on the user\u2019s computer or phone, the malicious software cannot be detected by any spyware or virus scanner.\n<\/p>\n<p>\n  While the system is designed to help governments monitor criminals, but it was<br \/>\n  <a href=\"http:\/\/www.bloomberg.com\/news\/2012-10-10\/spyware-leaves-trail-to-beaten-activist-through-microsoft-flaw.html\"><br \/>\n    used against a UAE human rights blogger and activist<br \/>\n  <\/a><br \/>\n  and a<br \/>\n  <a href=\"http:\/\/www.slate.com\/blogs\/future_tense\/2012\/08\/20\/moroccan_website_mamfakinch_targeted_by_government_grade_spyware_from_hacking_team_.html\"><br \/>\n    Moroccan journalism organization<br \/>\n  <\/a><br \/>\n  as well as<br \/>\n  <a href=\"https:\/\/citizenlab.org\/2014\/02\/hacking-team-targeting-ethiopian-journalists\/\"><br \/>\n    Ethiopian journalists while they were in the United States<br \/>\n  <\/a><br \/>\n  .\n<\/p>\n<p>\n  <b><br \/>\n    Is it in Azerbaijan?<br \/>\n  <\/b>\n<\/p>\n<p>\n  The University of Toronto Citizen Lab research team explains that the software does not directly link a user\u2019s computer or phone to the government that wishes to monitor. Rather, there is a series of connections, often in different countries, that make the relationship difficult to trace. This system works in the same way that the popular encryption tool Tor does \u2013 through multiple \u201chops\u201d, the data becomes anonymized. The traced these hops to an \u201cendpoint\u201d which they believe represents the local government\u2019s operator of the tool. In Azerbaijan, they found one endpoint (Azertelekom: 109.235.193.83). This endpoint was active between June and November 2013, essentially the pre- and post-election period.\n<\/p>\n<p>\n  <b><br \/>\n    What can be done?<br \/>\n  <\/b>\n<\/p>\n<p>\n  While it is impossible to know if this software is on your computer or mobile phone, some simple things can be done to reduce the effect of an infection: turn your computer or mobile phone off when you\u2019re not using them, so that the web camera and microphone cannot be used without you knowing. Put a piece of dark tape or a Post It Note over the web camera when you\u2019re not using it. Make sure that your computer operating system and all applications are always updated to the most recent version. Fully reformatting one\u2019s hard drive and hard resetting one\u2019s phone<br \/>\n  <i><br \/>\n    may<br \/>\n  <\/i><br \/>\n  remove the software. Do not open email attachments or links from unknown people. However, assume that anything that you do on your computer or mobile phone, even if it is not connected to the Internet, can be monitored.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is this monitoring tool and what can it do?<\/p>\n","protected":false},"author":11,"featured_media":5896,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[37],"tags":[],"class_list":["post-163290","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","infinite-scroll-item","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33","no-featured-image-padding"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Azerbaijani Government Might Be Monitoring Our Computers and Phones - MEYDAN.TV<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azerbaijani Government Might Be Monitoring Our Computers and Phones - MEYDAN.TV\" \/>\n<meta property=\"og:description\" content=\"What is this monitoring tool and what can it do?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/\" \/>\n<meta property=\"og:site_name\" content=\"MEYDAN.TV\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-21T21:34:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-29T07:52:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.meydan.tv\/wp-content\/uploads\/1389.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"574\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"user-manager\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/\"},\"author\":{\"name\":\"user-manager\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#\\\/schema\\\/person\\\/10d11eccf6da3662cf5fdab9806ea91a\"},\"headline\":\"Azerbaijani Government Might Be Monitoring Our Computers and Phones\",\"datePublished\":\"2014-02-21T21:34:09+00:00\",\"dateModified\":\"2021-10-29T07:52:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/\"},\"wordCount\":872,\"publisher\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.meydan.tv\\\/wp-content\\\/uploads\\\/1389.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/\",\"url\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/\",\"name\":\"Azerbaijani Government Might Be Monitoring Our Computers and Phones - MEYDAN.TV\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.meydan.tv\\\/wp-content\\\/uploads\\\/1389.jpg\",\"datePublished\":\"2014-02-21T21:34:09+00:00\",\"dateModified\":\"2021-10-29T07:52:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.meydan.tv\\\/wp-content\\\/uploads\\\/1389.jpg\",\"contentUrl\":\"https:\\\/\\\/www.meydan.tv\\\/wp-content\\\/uploads\\\/1389.jpg\",\"width\":800,\"height\":574},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/article\\\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f\",\"item\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/section\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Azerbaijani Government Might Be Monitoring Our Computers and Phones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/\",\"name\":\"MEYDAN.TV\",\"description\":\"Meydan TV Az\u0259rbaycan\u0131n media m\u0259kan\u0131ndak\u0131 alternativ s\u0259sidir\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#organization\",\"name\":\"Meydan TV\",\"url\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.meydan.tv\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/meydan-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.meydan.tv\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/meydan-logo.svg\",\"width\":195,\"height\":46,\"caption\":\"Meydan TV\"},\"image\":{\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.meydan.tv\\\/en\\\/#\\\/schema\\\/person\\\/10d11eccf6da3662cf5fdab9806ea91a\",\"name\":\"user-manager\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azerbaijani Government Might Be Monitoring Our Computers and Phones - MEYDAN.TV","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/","og_locale":"en_US","og_type":"article","og_title":"Azerbaijani Government Might Be Monitoring Our Computers and Phones - MEYDAN.TV","og_description":"What is this monitoring tool and what can it do?","og_url":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/","og_site_name":"MEYDAN.TV","article_published_time":"2014-02-21T21:34:09+00:00","article_modified_time":"2021-10-29T07:52:12+00:00","og_image":[{"width":800,"height":574,"url":"https:\/\/www.meydan.tv\/wp-content\/uploads\/1389.jpg","type":"image\/jpeg"}],"author":"user-manager","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/#article","isPartOf":{"@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/"},"author":{"name":"user-manager","@id":"https:\/\/www.meydan.tv\/en\/#\/schema\/person\/10d11eccf6da3662cf5fdab9806ea91a"},"headline":"Azerbaijani Government Might Be Monitoring Our Computers and Phones","datePublished":"2014-02-21T21:34:09+00:00","dateModified":"2021-10-29T07:52:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/"},"wordCount":872,"publisher":{"@id":"https:\/\/www.meydan.tv\/en\/#organization"},"image":{"@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.meydan.tv\/wp-content\/uploads\/1389.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/","url":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/","name":"Azerbaijani Government Might Be Monitoring Our Computers and Phones - MEYDAN.TV","isPartOf":{"@id":"https:\/\/www.meydan.tv\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/#primaryimage"},"image":{"@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.meydan.tv\/wp-content\/uploads\/1389.jpg","datePublished":"2014-02-21T21:34:09+00:00","dateModified":"2021-10-29T07:52:12+00:00","breadcrumb":{"@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/#primaryimage","url":"https:\/\/www.meydan.tv\/wp-content\/uploads\/1389.jpg","contentUrl":"https:\/\/www.meydan.tv\/wp-content\/uploads\/1389.jpg","width":800,"height":574},{"@type":"BreadcrumbList","@id":"https:\/\/www.meydan.tv\/en\/article\/azerbaijani-government-might-be-monitoring-our-computers-and-phones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/www.meydan.tv\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.meydan.tv\/en\/section\/news\/"},{"@type":"ListItem","position":3,"name":"Azerbaijani Government Might Be Monitoring Our Computers and Phones"}]},{"@type":"WebSite","@id":"https:\/\/www.meydan.tv\/en\/#website","url":"https:\/\/www.meydan.tv\/en\/","name":"MEYDAN.TV","description":"Meydan TV Az\u0259rbaycan\u0131n media m\u0259kan\u0131ndak\u0131 alternativ s\u0259sidir","publisher":{"@id":"https:\/\/www.meydan.tv\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.meydan.tv\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.meydan.tv\/en\/#organization","name":"Meydan TV","url":"https:\/\/www.meydan.tv\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.meydan.tv\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.meydan.tv\/wp-content\/uploads\/2021\/07\/meydan-logo.svg","contentUrl":"https:\/\/www.meydan.tv\/wp-content\/uploads\/2021\/07\/meydan-logo.svg","width":195,"height":46,"caption":"Meydan TV"},"image":{"@id":"https:\/\/www.meydan.tv\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.meydan.tv\/en\/#\/schema\/person\/10d11eccf6da3662cf5fdab9806ea91a","name":"user-manager"}]}},"_links":{"self":[{"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/posts\/163290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/comments?post=163290"}],"version-history":[{"count":1,"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/posts\/163290\/revisions"}],"predecessor-version":[{"id":214309,"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/posts\/163290\/revisions\/214309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/media\/5896"}],"wp:attachment":[{"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/media?parent=163290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/categories?post=163290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.meydan.tv\/en\/wp-json\/wp\/v2\/tags?post=163290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}