{"id":1561,"date":"2012-08-17T12:07:45","date_gmt":"2012-08-17T10:07:45","guid":{"rendered":"http:\/\/www.montejo.biz\/blog\/?p=1561"},"modified":"2012-08-15T12:09:17","modified_gmt":"2012-08-15T10:09:17","slug":"anda-trapwire-tras-la-caida-de-wikileaks","status":"publish","type":"post","link":"https:\/\/www.montejo.biz\/blog\/2012\/08\/17\/anda-trapwire-tras-la-caida-de-wikileaks\/","title":{"rendered":"\u00bfAnda TrapWire tras la ca\u00edda de WikiLeaks?"},"content":{"rendered":"<div id=\"post-entry-excerpt-1561\" class=\"entry-part\"><p>Resumamos lo acontecido en los \u00faltimos d\u00edas. WikiLeaks desvela que Estados Unidos se sirve de una red llamada TrapWire para videovigilar a la poblaci\u00f3n. Dise\u00f1ada en 2004 por ex agentes de la CIA, TrapWire es una herramienta que se alimenta con diversos algoritmos para combinar los datos de la red de c\u00e1maras de vigilancia de Estados Unidos y analizar individualmente a cada ciudadano usando, entre otras, tecnolog\u00edas de reconocimiento facial.<\/p>\n<p><a title=\"Trapwire\" href=\"http:\/\/www.nacionred.com\/derechos-y-libertades\/anda-trapwire-tras-la-caida-de-wikileaks\" target=\"_blank\">Enlace<\/a><\/p>\n\n\t\t\t\t\t\t\t<p style=\" color: #999999;\">If you found an error, highlight it and press <strong>Shift + E<\/strong> or <a href=\"#\" class=\"enp-report\"><strong>pulsa aqu\u00ed<\/strong><\/a> to inform us.<\/p>\n\t\t\t\t\t\t<\/div><div id=\"post-footer-1561\" class=\"post-footer clear\"><\/div>","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Resumamos lo acontecido en los \u00faltimos d\u00edas. WikiLeaks desvela que Estados Unidos se sirve de una red llamada TrapWire para videovigilar a la poblaci\u00f3n. Dise\u00f1ada <a class=\"mh-excerpt-more\" href=\"https:\/\/www.montejo.biz\/blog\/2012\/08\/17\/anda-trapwire-tras-la-caida-de-wikileaks\/\" title=\"\u00bfAnda TrapWire tras la ca\u00edda de WikiLeaks?\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[14],"tags":[122],"class_list":["post-1561","post","type-post","status-publish","format-standard","hentry","category-ciberguerra","tag-ciberguerra"],"_links":{"self":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/1561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/comments?post=1561"}],"version-history":[{"count":1,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/1561\/revisions"}],"predecessor-version":[{"id":1562,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/1561\/revisions\/1562"}],"wp:attachment":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/media?parent=1561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/categories?post=1561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/tags?post=1561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}