{"id":96482,"date":"2025-07-01T06:10:59","date_gmt":"2025-07-01T06:10:59","guid":{"rendered":"https:\/\/neclink.com\/index.php\/2025\/07\/01\/ex-cisa-official-warns-weve-gutted-cybersecurity-a-gift-to-iran-china-and-russia\/"},"modified":"2025-07-01T06:10:59","modified_gmt":"2025-07-01T06:10:59","slug":"ex-cisa-official-warns-weve-gutted-cybersecurity-a-gift-to-iran-china-and-russia","status":"publish","type":"post","link":"https:\/\/neclink.com\/index.php\/2025\/07\/01\/ex-cisa-official-warns-weve-gutted-cybersecurity-a-gift-to-iran-china-and-russia\/","title":{"rendered":"Ex-CISA Official Warns: We\u2019ve Gutted Cybersecurity\u2014A Gift to Iran, China and Russia"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Yves here. I hope tech and security-savvy readers will treat this post as a critical thinking exercise and voice corrections, quibbles, and points of agreement in comments. This topic is generally over my pay grade so I am not ideally positioned to do so. I\u2019m not keen about giving presumed hacking groups cute names to indicate their supposed backers, as well as hackers from a particular nation being insinuated to be state actors. During Russiagate, experts called out gimmickry like the use of Russia tools to claim that certain hackers were Russian when those tools were widely used, and the inept and gratuitous use of Russian. <\/p>\n<p>I also note the absence of mention of gangs as a cyberthreat, when my impression is that they are becoming more effective. <\/p>\n<p>Nevertheless, it\u2019s telling that DOGE managed to degrade the operations of CISA, which is part of the intelligence apparatus, but has left the armed forces largely alone. Note that the title elevates Iran to the status of lead cybersecurity menace. <\/p>\n<p><em><strong>By Lynn Parramore, Senior Research Analyst at the Institute for New Economic Thinking. Originally published at <a href=\"https:\/\/www.ineteconomics.org\/perspectives\/blog\/ex-cisa-official-warns-weve-gutted-cybersecurity-a-gift-to-iran-china-and-russia\" rel=\"nofollow\" target=\"_blank\">the Institute for New Economic Thinking website&lt;<\/a>\/strong&gt;<\/strong><\/em><\/p>\n<p><em>As international tensions increase, cyberwarfare and ransomware attacks loom\u2014and America\u2019s digital defenses face a perfect storm of foreign attacks, criminal behavior, and self-inflicted damage.<\/em><\/p>\n<p><em>Few understand the stakes better than Dr. David Mussington, former head of Infrastructure Security at CISA, who\u2019s spent decades crafting strategies at RAND, the Pentagon, and DHS. In this eye-opening conversation with the <\/em><a href=\"https:\/\/www.ineteconomics.org\/\" target=\"_blank\" rel=\"nofollow\"><em>Institute for New Economic Thinking<\/em><\/a><em>, Mussington warns that while countries like Iran, China, and Russia grow more aggressive, the Trump administration has gutted the very agency designed to protect America\u2019s most critical systems\u2014cutting CISA\u2019s budget by nearly half, eliminating nearly a third of its staff, and driving out decades of cybersecurity expertise.<\/em><\/p>\n<p><em>With experienced defenders gone, vital federal structures disbanded, and state and private actors left to pick up the slack, Mussington raises a chilling question: are we really ready for what\u2019s coming \u2014 or are we falling dangerously behind? He discusses our vulnerabilities as consumers, citizens, and as a country.<\/em><\/p>\n<hr\/>\n<p><strong>Lynn Parramore: Can you say a bit about your background in cybersecurity?<\/strong><\/p>\n<p>David Mussington: I have over two decades of experience in different aspects of the cybersecurity risk challenge. My career began at the RAND corporation, where I participated in and led research teams evaluating U.S. critical infrastructure security. This included exercises, assessments, and policy analysis. Later on I worked at the Department of Defense \u2013 writing cyber strategies and advising the Office of the Secretary on USCYBERCOM\u2019s standup, and on supply chain and other challenges posed by U.S. adversaries in the cyber domain.<\/p>\n<p>Most recently, I led the Infrastructure Security Division for CISA (Cybersecurity and Infrastructure Security Agency \u2013 a part of the Department of Homeland Security) for four years during the Biden\/Harris administration, overseeing physical security, Internet of Things (IOT), operational tech, and critical infrastructure risk assessments and remediation programs. That role gave me a front-row seat to threat levels, vulnerabilities, private sector responses, and global collaboration\u2014especially around nation-state threats, our top concern.<\/p>\n<p><strong>LP: Let\u2019s talk about CISA. How has the agency changed under the current administration, especially with the recent cuts and firings?<\/strong><\/p>\n<p>DM: First, I think it\u2019s fair to say the changes have been dramatic\u2014but it\u2019s still early to know where they\u2019ll lead. CISA doesn\u2019t have a permanent director yet\u2014Sean Plankey\u2019s been nominated, but not confirmed. We do have a national cyber director, Sean Cairncross, and some key roles at DHS and the Sector Risk Management Agencies are finally taking shape. But the team hasn\u2019t fully come together yet. It takes time when we change administrations to reestablish new priorities.<\/p>\n<p>My biggest concern is losing experienced people. Fewer staff means a heavier burden on those that remain, weaker national critical infrastructure security, and lessened resilience. These public servants are dedicated, but constant attacks on their patriotism are unfair and hurt morale. I deeply respect the CISA staff and others facing sudden changes after decades of service. Leaving a mission they believed in\u2014defending the country\u2014is hard.<\/p>\n<p>We must support those still serving\u2014they\u2019re fighting for all of us. I loved this work, and moments like representing the U.S. at Australia\u2019s National War Memorial reminded me why it matters. That mission and honor must never be forgotten.<\/p>\n<p><strong>LP: One of CISA\u2019s past priorities has been securing our elections. But under the current administration, there\u2019s talk of that mission shifting. What can you tell us about the changing focus?<\/strong><\/p>\n<p>DM: You mentioned the election mission. It\u2019s clear from recent decisions that CISA\u2019s role in that area has been deliberately targeted for reduction\u2014if not outright removal. That\u2019s a decision made by this administration. Obviously, the administration I was in didn\u2019t agree with that. We were focused on a specific cluster of activities \u2013 mostly foreign malign threats. Russia was a key concern, among others, given their efforts to manipulate American opinion using tactics <a href=\"https:\/\/www.ineteconomics.org\/perspectives\/blog\/cybersecurity-expert-what-the-media-miss-on-americas-election-risks\" target=\"_blank\" rel=\"nofollow\">we discussed in our last conversation<\/a>.<\/p>\n<p>On the other hand, nation-state threats still exist. This administration\u2019s rhetoric remains focused on them \u2014 particularly China\u2019s campaigns like Salt Typhoon, Volt Typhoon, and Silk Typhoon. Their persistent access to U.S. critical infrastructure and the potential to weaponize those vulnerabilities remains, I believe, a top national priority.<\/p>\n<p>There\u2019s clearly a shift toward greater reliance on states and the private sector to handle cybersecurity on their own. That\u2019s how I interpret the shrinking federal role in critical infrastructure protection\u2014both in size and scope.<\/p>\n<p><strong>LP: In moving from federal to state responsibility, what security vulnerabilities at the state level concern you?<\/strong><\/p>\n<p>DM: It\u2019s less about where the vulnerabilities are and more about who controls them\u2014and what capabilities they have. In Texas, for instance, some private infrastructure operators are technically strong, but they may now bear more responsibility than they\u2019re used to. That puts greater weight on their security plans. As the federal role recedes, the effectiveness of those plans\u2014against everything from insider threats and ransomware to nation-state actors\u2014matters more than ever.<\/p>\n<p>A state will be only as good as the big private sector infrastructure operators are. States don\u2019t typically have a lot of autonomous critical infrastructure protection or resilience capacity of their own. They\u2019re very dependent on the private sector.<\/p>\n<p><strong>LP: Do you see any states modeling effective planning?<\/strong><\/p>\n<p>DM: Difficult to tell, because this shift toward the states also represents a move away from federal Sector Risk Management Agencies (SRMAs). Under the traditional model, CISA coordinated at the top, followed by SRMAs, then state and local governments, and finally the private-sector operators of critical infrastructure. That hierarchy now seems to be changing.<\/p>\n<p>To the extent that states have technological capabilities under their control\u2014take California, for example: a wealthy state with significant critical infrastructure and advanced industries\u2014the state can leverage its own partnerships, fiscal tools, and regulatory mechanisms. That combination of technical expertise, preexisting capacity, and the presence of a strong technological and educational ecosystem is probably the best predictor of how well a state will perform. And across the U.S., states vary widely in how well they\u2019re positioned to take on more of this responsibility themselves.<\/p>\n<p>I think generally that richer states are going to be in a better position to do this than poorer states. But is the federal government still able to step in and pick up the slack?<\/p>\n<p><strong>LP: We saw it during the pandemic\u2014states can act independently, but for certain challenges, coordination is essential. How do you see that playing out when it comes to cybersecurity?<\/strong><\/p>\n<p>DM: CISA remains the national coordinator for critical infrastructure security and resilience. Regardless of resources, it\u2019s essential for public-private coordination and helping states leverage each other\u2019s strengths. That\u2019s where my concerns lie\u2014I worry about the loss of expertise and whether CISA, especially after the <a href=\"https:\/\/www.scotusblog.com\/2024\/06\/supreme-court-strikes-down-chevron-curtailing-power-of-federal-agencies\/\" target=\"_blank\" rel=\"nofollow\">Chevron deference decision<\/a>(curtailing the power of agencies), will keep the authority and capacity to coordinate effectively. I\u2019m also concerned if Sector Risk Management Agencies have the authority to do their part.<\/p>\n<p>Some don\u2019t, and some won\u2019t. I don\u2019t expect Congress to grant federal agencies\u2019 broad cyber-regulatory power anytime soon. So, regulatory approaches to cyber-risk won\u2019t be as prominent, even though regulation has long been seen as key to federal cyber-risk management.<\/p>\n<p>States do have the authority to regulate critical infrastructure within their borders. The big question is how each state will approach it. I don\u2019t know most states well enough to predict, but generally, regulations aren\u2019t popular\u2014and cybersecurity rules likely won\u2019t be either.<\/p>\n<p><strong>LP: Let\u2019s talk about the politicization of cybersecurity and the shifting approaches of different administrations. How do you view that issue, especially in light of evolving threats arising from global conflicts?<\/strong><\/p>\n<p>DM: I think it makes us less coherent as a nation, since we won\u2019t be able to articulate a single strategy or strategic approach to critical infrastructure security and resilience.<\/p>\n<p>My former director, Jen Easterly, used to say that cybersecurity isn\u2019t political\u2014it\u2019s a set of risks we have to address regardless of ideology. I agree. That perspective points you toward a particular approach: federal coordination of a largely private-sector-oriented, voluntary framework built around best practices carried out for the public good.<\/p>\n<p>In areas like defense and nuclear power generation and distribution, there are strong mandates for infrastructure protection\u2014and I think that\u2019s rightly seen as nonpartisan. Whether we return to that view remains to be seen. Given current threat conditions, I\u2019m not sure it\u2019s sustainable to treat this as a partisan issue. We have real vulnerabilities in our critical infrastructure.<\/p>\n<p>CISA continues to publish the Known Exploited Vulnerabilities (KEV) list, which was already voluminous when I was there\u2014and it hasn\u2019t gotten any shorter. These are vulnerabilities that have been actively exploited, sometimes for years, and they pose serious risks both individually and when chained together. These are the same vulnerabilities that adversaries from China, Iran, and Russia continue to target\u2014and that remains true regardless of ideology. The best practice recommendations to counter them haven\u2019t changed either.<\/p>\n<p>Right now, there\u2019s real potential for Iranian cyber countermeasures against the U.S., given the current conflict involving Israel. In the recent past, Iranian cyber actors linked to the Islamic Revolutionary Guard Corps (IRGC) have targeted U.S. critical infrastructure and even election systems. They\u2019ve also shown interest in water systems and dams.<\/p>\n<p>Iran\u2019s cyber capabilities are serious. They\u2019ve actively targeted regional rivals like the UAE and Saudi Arabia. If conflict escalates, could they go after U.S. infrastructure again\u2014and would our defenses hold up? Those are key questions as we consider possible actions related to Iran\u2019s nuclear and military capabilities.<\/p>\n<p><strong>LP: Let\u2019s talk economics and budgets. DOGE was sold as a way to cut costs and boost efficiency. But when agencies like CISA face cuts and lose expertise, could we be risking higher costs later?<\/strong><\/p>\n<p>DM: We could. But I\u2019d frame it a bit differently: the real question is whether the private sector and the states can mitigate risk at scale to meet the threat as it exists\u2014and whether we have systems in place to actually measure that.<\/p>\n<p><strong>LP: Do we?<\/strong><\/p>\n<p>DM: We don\u2019t. There\u2019s no metrics-based framework to assess how well we\u2019re doing on cybersecurity or critical infrastructure resilience at the national level. When we were running risk management and infrastructure assessments through CISA, we struggled\u2014our metrics were weak, and the data was often stale.<\/p>\n<p>Knowing things are fragile\u2014and understanding how risk and vulnerability have changed between 2022 and 2025\u2014makes responding effectively a major challenge.<\/p>\n<p>On the economics, I think the key is focusing on incentives for remediation. Are the asset owners\u2014where the risks actually exist\u2014truly incentivized to take the necessary steps to reduce risk to their assets, their operations, and the public? It\u2019s clear there\u2019s an incentive misalignment\u2014asset owners often shift the cost of risk onto others, like customers or other jurisdictions, because they rarely face accountability for breaches or for passing risks along.<\/p>\n<p>Our insurance markets don\u2019t align those incentives, and we don\u2019t regulate to prevent companies from inadvertently imposing risks on their customers. This is especially clear with consumer technologies, which people buy and are then expected to protect on their own.<\/p>\n<p>I do a lot with my computers. But at a certain level, I can\u2019t fix hardware vulnerabilities. I can\u2019t really do a lot about the software vulnerabilities either. If I hear about a piece of software that\u2019s breached or something, I guess I can look for an update. But that\u2019s about it.<\/p>\n<p>What about hardware and software manufacturers? What about the secure-by-design principles we discussed during our administration? How do we measure if something truly meets those standards\u2014and how do we make that information available to consumers so they can make informed choices?<\/p>\n<p>All of that undermines market-based incentives from favoring security over insecurity, because the market isn\u2019t properly structured for it. And since regulation is so often off the table, we don\u2019t have enough security to protect cyberspace\u2014whether at the national critical infrastructure level against nation-states, or at the individual level inside people\u2019s homes.<\/p>\n<p><strong>LP: With massive password breaches hitting companies like <\/strong><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/06\/20\/16-billion-apple-facebook-google-passwords-leaked---change-yours-now\/\" target=\"_blank\" rel=\"nofollow\"><strong>Google, Apple, and Facebook<\/strong><\/a><strong>, what security challenges are everyday people facing\u2014and how are they changing?<\/strong><\/p>\n<p>DM: Problems like identity theft, ecommerce fraud, and ransomware have actually worsened over the last decade. The actors conducting these activities are sometimes criminals, and sometimes proxy groups \u2013 acting on behalf of others for ideological or foreign intelligence reasons. It is often difficult to differentiate the causes of activity. We just know we are seeing more of it, and more consequential critical infrastructure impacts. The best defense for consumers is to use best practices such as multi-factor authentication\u2014ideally with authenticator apps, not SMS\u2014and using strong, unique passwords or passkeys. Having a playbook for incident response is a good practice as well as it enables practice and preparation for difficult circumstances.<\/p>\n<p><strong>LP: We rely on businesses to keep us safe. Are they doing enough?<\/strong><\/p>\n<p>DM: Awareness is much better now, especially around ransomware. Most medium-sized companies follow basic security practices or hire experts. Small businesses still struggle but often use built-in protections from Apple, Microsoft, etc. The real issue is the mindset\u2014some still think \u201cit won\u2019t happen to us,\u201d which is dangerous. Your security depends on your weakest link\u2014like contractors without protections.<\/p>\n<p>CISA and others do a lot to share best practices, but the bigger problem is vulnerable hardware and software\u2014like IoT devices with default passwords anyone can find. Consumers depend on companies to build secure products, but often they don\u2019t.<\/p>\n<p><strong>LP: What risks do devices like smart speakers pose?<\/strong><\/p>\n<p>DM: The major risk that IoT devices \u2014 of which smart speakers are just one example \u2014 is that their provenance \u2014 the security procedures built into their hardware and software \u2014 may be entirely unknown to the consumer and possibly architected to prevent user modifications of their functionality. This means that consumers may be unable to rectify flaws in shipped hardware (or software) \u2014 meaning that risk is shifted from technology producers to consumers from the standpoint of accountability and cost.<\/p>\n<p><strong>LP: With so many breaches in 2025, which worries you most?<\/strong><\/p>\n<p>DM: Honestly, I\u2019m not surprised by new or repackaged breach data anymore. After a decade of massive breaches affecting hundreds of millions, how much more can be stolen? We live in a \u201cbreached\u201d environment, which fuels cybercrime. The core issue is that we still haven\u2019t nailed the basics.<\/p>\n<p>Overall, my major concerns were and remain nation-state cyber operations targeting US critical infrastructure, and the velocity of change that new technologies \u2013 such as AI \u2013 bring to the risk challenge.<\/p>\n<p><strong>LP: What are the things that keep you up at night?<\/strong><\/p>\n<p>DM: Given my last job, I\u2019m especially worried about vulnerabilities that linger unpatched for years. I use the CISA Known Exploited Vulnerability (KEV) list as a strategic litmus test\u2014is it shrinking? Is the average time vulnerabilities stay on it going down? The answer is no. Campaigns like Salt Typhoon and Volt Typhoon show ongoing intrusions. Are we pushing those actors out? No. These persistent weaknesses let adversaries hold a foothold in critical infrastructure\u2014a serious strategic threat.<\/p>\n<p>We didn\u2019t always face widespread, persistent vulnerabilities exploited by China across most critical infrastructure. Now we do. Russia\u2019s tactics in Ukraine\u2014using crimeware and criminal groups tied to nation-states\u2014weren\u2019t always seen here, but they are now. Plus, IoT is embedded everywhere in our lives, vastly expanding the attack surface and risks. I worry about identity theft too\u2014I\u2019ve had my data breached like many, relying on lifetime monitoring because that\u2019s the reality today.<\/p>\n<p>Nation-state techniques used to be elite and rare; now they\u2019ve trickled down to criminals, making anyone a target. That cluster of risks is what keeps me up at night.<\/p>\n<p><strong>LP: Every administration presumably wants to keep Americans safe and avoid being blamed for a major incident. That\u2019s a strong incentive. But are there disincentives working against our cybersecurity?<\/strong><\/p>\n<p>DM: Everything requires a solid plan. The best incentives and intentions don\u2019t stop risks actively being actively exploited. We\u2019re still in the early stages of this administration\u2019s cybersecurity plans.<\/p>\n<p>We have numerous top-level executive orders and presidential directives, but CISA still doesn\u2019t have a director. The fate of NSM-22, the successor to PPD-21, remains uncertain. Sector Risk Management Agencies are still finding their footing without new strategic guidance.<\/p>\n<p>That guidance hasn\u2019t formally arrived yet. Meanwhile, the Critical Infrastructure Partnership Advisory Council (CIPAC), which connects the federal government with private-sector leaders in critical sectors, was suspended. Its successor has yet to emerge.<\/p>\n<p>So we have structures that aren\u2019t functioning as they used to, nor have they been redesigned to fit the new administration\u2019s priorities. Five or six months in, much hasn\u2019t yet gelled around a new approach. What remains is the leftover framework from before, alongside a lot of disbanded structures. For example\u2014where is the National Infrastructure Advisory Council? Where is the Cyber Safety Review Board (CSRB)? These bodies, created to tackle cyber risks, have been sidelined, supposedly awaiting better replacements.<\/p>\n<p>So in these early days, even though the threat remains, we\u2019ve effectively taken a five- or six-month hiatus from framing a renewed and fully strategic response.<\/p>\n<p><strong>LP: If you had to give one piece of advice to the current administration, what would it be?<\/strong><\/p>\n<p>DM: It\u2019s easy for someone no longer in the administration to advise their successors. So I won\u2019t do that\u2014just share a couple of thoughts instead.<\/p>\n<p>If we agree that nation-state risks are real\u2014and I believe they are\u2014and that CISA\u2019s known exploited vulnerabilities and interagency concerns are valid, then we need to act with much greater urgency. Our ability to collaborate with the private sector and states, now with more responsibility, must become a higher priority.<\/p>\n<p><strong>LP: What happens if we don\u2019t?<\/strong><\/p>\n<p>DM: Well, attackers hold huge advantages in this environment, and that\u2019s largely because these exploited vulnerabilities remain unmitigated. That\u2019s the first, and biggest, concern.<\/p>\n<p>Second, if we take the China threat seriously\u2014Salt Typhoon and Volt Typhoon\u2014their ability to freely access and remain inside our critical infrastructure hostage has to be a huge concern. When I was in, we worried about 2027 and threats to Taiwan, fearing China might miscalculate and disrupt our infrastructure to keep us out of \u2018their business.\u2019 That concern remains, because 2027 will still come.<\/p>\n<p>Are we positioned to protect our critical infrastructure from being held hostage\u2014so China can\u2019t use those vulnerabilities to deter U.S. policy choices? The idea that the U.S. could be blackmailed into backing down from defending its Pacific interests is a major concern\u2014one I had then and still have now. How well we\u2019ll manage this remains to be seen, but if we have fewer capabilities in 2027 than if better plans had been made, we\u2019ll be more vulnerable.<\/p>\n<div class=\"printfriendly pf-alignleft\"><a href=\"#\" rel=\"nofollow\" onclick=\"window.print(); return false;\" title=\"Printer Friendly, PDF &amp; Email\"><img decoding=\"async\" style=\"border:none;-webkit-box-shadow:none; -moz-box-shadow: none; box-shadow:none; padding:0; margin:0\" src=\"https:\/\/cdn.printfriendly.com\/buttons\/print-button-gray.png\" alt=\"Print Friendly, PDF &amp; Email\"\/><\/a><\/div>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.nakedcapitalism.com\/2025\/07\/ex-cisa-official-warns-weve-gutted-cybersecurity-a-gift-to-iran-china-and-russia.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yves here. I hope tech and security-savvy readers will treat this post as a critical thinking exercise and voice corrections, quibbles, and points of agreement<\/p>\n","protected":false},"author":1,"featured_media":96483,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[153,183],"tags":[],"class_list":["post-96482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-economy","category-spotlight"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/96482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/comments?post=96482"}],"version-history":[{"count":0,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/96482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media\/96483"}],"wp:attachment":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media?parent=96482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/categories?post=96482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/tags?post=96482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}