{"id":28076,"date":"2010-02-01T14:51:54","date_gmt":"2010-02-01T14:51:54","guid":{"rendered":"https:\/\/www.its.ac.id\/news\/2010\/02\/01\/hacker-people-power\/"},"modified":"2010-02-01T14:51:54","modified_gmt":"2010-02-01T14:51:54","slug":"hacker-people-power","status":"publish","type":"post","link":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/","title":{"rendered":"Hacker People Power"},"content":{"rendered":"<p>Bisa jadi saat ini &quot;jenderal&quot; Xiao Tian, Peng Yinan, Goodwell, dan Withered Rose sedang merayakan kemenangan. Kelompok mereka sukses membuat Google dan sedikitnya 30 <em>high-profile company<\/em> bidang teknologi, termasuk Adobe <em>blingsatan<\/em>. Di bawah komando kode Operasi Aurora, gelombang serangan <em>hacker <\/em>mengobrak-abrik perusahaan asing di Cina sejak akhir 2009.<\/p>\n<p>Saking dasyatnya serangan itu, pihak Google sampai merengek kepada Paman Sam. Melalui Menteri Luar Negerinya, Hillary Clinton, Amerika Serikat (AS) melayangkan teguran dan meminta penjelasan. Ia meminta transparansi Cina untuk memudahkan proses investigasi.<\/p>\n<p>Apa tanggapan Cina ? Ia justru ongkang-ongkang dan dengan entengnya memberikan jawaban menantang, &quot;Kami secara tegas menentang siapa saja yang menyebarkan isu tanpa melihat fakta di lapangan, menuduh Cina sembarangan, mengabaikan hukum rakyat Cina, dan berusaha mencampuri internal politik masyarakat Cina&quot;. Pernyataan&nbsp; ini dilontarkan oleh seorang pejabat dari State Council Information Office Cina yang tak disebutkan namanya.<\/p>\n<p>Sikap Cina ini dipertegas oleh Yan Xuetong, Direktur Institute of International Studies, Tsinghua University, &quot;Kondisi global diam-diam mengalami perubahan yang tak terkendali dan dalih kebebasan berintenet hanyalah satu langkah AS untuk mempertahankan dominasi hegemoninya&quot;.<\/p>\n<p>Mencermati kedua pernyataan di atas, kita bisa menyimpulkan apa yang diingin rakyat Cina. <em>Ya<\/em>, mereka tak menghendaki pengaruh asing menancap di negerinya. AS mungkin mampu menekan pemerintah Cina namun tidak bisa menguasai rakyat Cina. Siapa yang berani menghadapi empat juta (data 2008) <em>hacker <\/em>yang bersarang di negeri Tirai Bambu ?<\/p>\n<p>Sebenarnya, pemberontakan&nbsp; <em>hacker<\/em> Cina ini bukanlah yang kali pertama. Pada tanggal 4 Mei 2001&nbsp; pukul 08.00 pagi, situs gedung putih menjadi korban Distributed Denial-of-Service (DDoS) attack. Halaman situs US Navy bertuliskan &quot;I AM CHINESE&quot;, situs Interior Department&#8217;s National Business Center AS tampilannya berubah menjadi &quot;Beat down Imperialism of American [sic]! Attack anti-Chinese arrogance!&quot;, halaman depan Department of Labor muncul tulisan &quot;CHINA HACK&quot;. Status siaga militer AS pun meningkat dari normal langsung ke alpha. Tragedi tersebut mengakibatkan 1000 situs Amerika tumbang.<\/p>\n<p>Beruntun setelah itu, aksi <em>hacker<\/em> Cina terus mewarnai dunia cyber. Seperti tahun 2004, Cina dituduh melakukan intrusion (penyusupan) ke jaringan Pemerintah Korea Selatan (Korsel), penyusupan ke jaringan Pemerintah Jerman (2007), penyusupan ke Pentagon (2007), menyusup ke jaringan Prancis (2007), memata-matai United States Pacific Command (2009), dan Google intrusion (2010).<\/p>\n<p><strong>Trauma sejarah<\/strong><br \/>Watak masyarakat Cina telah dibentuk oleh sejarah. Dan mereka benar-benar belajar dari sejarah. Pemberontakan Boxer (Boxer Rebellion) yang terjadi di masa akhir Dinasti Qing dipicu oleh makin kuatnya pengaruh asing. Lumrah bila rakyat Cina kemudian menganggap orang asinglah biang keladi tamatnya kekaisaran. Anggapan ini diperkuat oleh fakta, serentetan perang yang terjadi sebelum Boxer seperti Perang Suku Punti-Hakka, Pemberontakan Nien, Pemberontakan Minoritas Hui, dan Pemberontakan Panthay selalu tak lepas dari campur tangan asing.<\/p>\n<p>Duka masa lalu itu tentu tak bisa terhapus begitu saja. Namun, inilah yang menjadi sumber kekuatan utama Cina sekarang. Menyemai bibit konflik dengan Cina sama dengan menggerakkan nasionalisme <em>hacker<\/em> negeri tersebut. Serangan <em>hacker<\/em> Cina ke AS pada 2001 di atas juga bukan tanpa alasan. Pemicunya adalah kematian seorang pilot setelah pesawatnya bertabrakan dengan pesawat pengintai AS yang berkeliaran di lepas pantai selatan Cina.<\/p>\n<p>Dan apa yang dialami oleh Google dkk sekarang, cukuplah disebut sebagai kecelakaan. Sebelum menanamkan modal, mereka seharusnya belajar sejarah rakyat Cina. Monopoli bisnis di Cina berarti sama dengan cari mati. Dan jangan salahkan bila kemudian Google dkk menjadi obyek praktikum jutaan <em>hacker <\/em>di sana.<\/p>\n<p><strong>Indonesia perlu belajar<\/strong><br \/>Mengikuti cerita aksi <em>hacker <\/em>Cina tak ubahnya seperti menikmati film fiktif <em>science<\/em>. Kita membayangkan sekelompok orang dalam jaringan mengahadap layar komputer, mengetikkan kode rumit di console (layar hitam), dan diakhiri dengan tombol ENTER. <em>Click<\/em>. Seketika, jaringan keamanan nun jauh di benua lain, mengalami<em> trouble<\/em> serius. <em>Keren<\/em>.<\/p>\n<p>Bayangan tetaplah bayangan. Pertanyaan pentingnya adalah kapan ya Indonesia seperti mereka. Dengan pertanyaan ini, bukan berarti penulis ingin mengajak untuk melakukan sabotase besar-besaran ke negeri tetangga, menghalalkan pembajakan, atau mendukung aktifitas <em>cyber cryme<\/em>. Lebih spesifiknya, kapan ya kita memiliki SDM seperti Cina ?<\/p>\n<p>Banyak sebenarnya yang dapat kita ambil sebagai teladan dari Negeri Panda. Diantaranya, Cina memiliki rakyat dengan kemampuan teknologi tinggi, kenapa kita tidak ? Cina mampu belajar dari sejarahnya, mengapa kita tidak ? Lebih dari empat juta <em>hacker<\/em> Cina rata-rata adalah pemuda, kenapa kita tidak ? Cina adalah negeri yang inovatif dan tak konsumtif, kenapa kita tidak ? Kata Pak Ustadz, belajarlah sampai ke negeri Cina, kenapa tidak ?<\/p>\n<p>Labib Fayumi<br \/><em>ITS Online Journalist <\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bulan November 1899, puluhan ribu pesilat menyeberangi kawasan Cina utara. Mereka mengusung satu misi, f\u00c3\u00ba qing mi\u00c3\u00a8 y\u00c3\u00a1ng ( dukung Dinasti Qing, hancurkan hegemoni asing ). Maka, pecahlah perang Boxer di Beijing. Tepat 111 tahun kemudian, &quot;perang&quot; itu berulang. Bukan lagi dipelopori para boxer, tapi oleh para <em>hacker<\/em>. Konon, search engine nomor wahid dunia, Google, dipaksa angkat koper karena tak mampu membendung serangan <em>hacker<\/em>.<\/p>\n","protected":false},"author":1,"featured_media":28077,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-28076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-opini"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker People Power - ITS News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker People Power - ITS News\" \/>\n<meta property=\"og:description\" content=\"Bulan November 1899, puluhan ribu pesilat menyeberangi kawasan Cina utara. Mereka mengusung satu misi, f\u00c3\u00ba qing mi\u00c3\u00a8 y\u00c3\u00a1ng ( dukung Dinasti Qing, hancurkan hegemoni asing ). Maka, pecahlah perang Boxer di Beijing. Tepat 111 tahun kemudian, &quot;perang&quot; itu berulang. Bukan lagi dipelopori para boxer, tapi oleh para hacker. Konon, search engine nomor wahid dunia, Google, dipaksa angkat koper karena tak mampu membendung serangan hacker.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/\" \/>\n<meta property=\"og:site_name\" content=\"ITS News\" \/>\n<meta property=\"article:published_time\" content=\"2010-02-01T14:51:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"220\" \/>\n\t<meta property=\"og:image:height\" content=\"165\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dadang ITS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dadang ITS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/\"},\"author\":{\"name\":\"Dadang ITS\",\"@id\":\"https:\/\/www.its.ac.id\/news\/#\/schema\/person\/8111aa8ffd0592f58831229eec76ff50\"},\"headline\":\"Hacker People Power\",\"datePublished\":\"2010-02-01T14:51:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/\"},\"wordCount\":693,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg\",\"articleSection\":[\"Opini\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/\",\"url\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/\",\"name\":\"Hacker People Power - ITS News\",\"isPartOf\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg\",\"datePublished\":\"2010-02-01T14:51:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#primaryimage\",\"url\":\"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg\",\"contentUrl\":\"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg\",\"width\":220,\"height\":165},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.its.ac.id\/news\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker People Power\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.its.ac.id\/news\/#website\",\"url\":\"https:\/\/www.its.ac.id\/news\/\",\"name\":\"ITS News\",\"description\":\"Institut Teknologi Sepuluh Nopember\",\"publisher\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.its.ac.id\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.its.ac.id\/news\/#organization\",\"name\":\"ITS News\",\"url\":\"https:\/\/www.its.ac.id\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.its.ac.id\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2026\/01\/LOGO-ITS.svg\",\"contentUrl\":\"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2026\/01\/LOGO-ITS.svg\",\"width\":98,\"height\":56,\"caption\":\"ITS News\"},\"image\":{\"@id\":\"https:\/\/www.its.ac.id\/news\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.its.ac.id\/news\/#\/schema\/person\/8111aa8ffd0592f58831229eec76ff50\",\"name\":\"Dadang ITS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.its.ac.id\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c2c42565b0c1e5c1707526aec338a8711f052dbed405d0e0267cfacb2ef8e2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c2c42565b0c1e5c1707526aec338a8711f052dbed405d0e0267cfacb2ef8e2a?s=96&d=mm&r=g\",\"caption\":\"Dadang ITS\"},\"url\":\"https:\/\/www.its.ac.id\/news\/author\/root\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker People Power - ITS News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/","og_locale":"en_US","og_type":"article","og_title":"Hacker People Power - ITS News","og_description":"Bulan November 1899, puluhan ribu pesilat menyeberangi kawasan Cina utara. Mereka mengusung satu misi, f\u00c3\u00ba qing mi\u00c3\u00a8 y\u00c3\u00a1ng ( dukung Dinasti Qing, hancurkan hegemoni asing ). Maka, pecahlah perang Boxer di Beijing. Tepat 111 tahun kemudian, &quot;perang&quot; itu berulang. Bukan lagi dipelopori para boxer, tapi oleh para hacker. Konon, search engine nomor wahid dunia, Google, dipaksa angkat koper karena tak mampu membendung serangan hacker.","og_url":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/","og_site_name":"ITS News","article_published_time":"2010-02-01T14:51:54+00:00","og_image":[{"width":220,"height":165,"url":"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg","type":"image\/jpeg"}],"author":"Dadang ITS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dadang ITS","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#article","isPartOf":{"@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/"},"author":{"name":"Dadang ITS","@id":"https:\/\/www.its.ac.id\/news\/#\/schema\/person\/8111aa8ffd0592f58831229eec76ff50"},"headline":"Hacker People Power","datePublished":"2010-02-01T14:51:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/"},"wordCount":693,"commentCount":0,"publisher":{"@id":"https:\/\/www.its.ac.id\/news\/#organization"},"image":{"@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#primaryimage"},"thumbnailUrl":"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg","articleSection":["Opini"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.its.ac.id\/news\/hacker-people-power\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/","url":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/","name":"Hacker People Power - ITS News","isPartOf":{"@id":"https:\/\/www.its.ac.id\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#primaryimage"},"image":{"@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#primaryimage"},"thumbnailUrl":"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg","datePublished":"2010-02-01T14:51:54+00:00","breadcrumb":{"@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.its.ac.id\/news\/hacker-people-power\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#primaryimage","url":"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg","contentUrl":"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2017\/11\/6413.jpeg","width":220,"height":165},{"@type":"BreadcrumbList","@id":"https:\/\/www.its.ac.id\/news\/hacker-people-power\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.its.ac.id\/news\/en\/"},{"@type":"ListItem","position":2,"name":"Hacker People Power"}]},{"@type":"WebSite","@id":"https:\/\/www.its.ac.id\/news\/#website","url":"https:\/\/www.its.ac.id\/news\/","name":"ITS News","description":"Institut Teknologi Sepuluh Nopember","publisher":{"@id":"https:\/\/www.its.ac.id\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.its.ac.id\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.its.ac.id\/news\/#organization","name":"ITS News","url":"https:\/\/www.its.ac.id\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.its.ac.id\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2026\/01\/LOGO-ITS.svg","contentUrl":"https:\/\/www.its.ac.id\/news\/wp-content\/uploads\/sites\/2\/2026\/01\/LOGO-ITS.svg","width":98,"height":56,"caption":"ITS News"},"image":{"@id":"https:\/\/www.its.ac.id\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.its.ac.id\/news\/#\/schema\/person\/8111aa8ffd0592f58831229eec76ff50","name":"Dadang ITS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.its.ac.id\/news\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5c2c42565b0c1e5c1707526aec338a8711f052dbed405d0e0267cfacb2ef8e2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c2c42565b0c1e5c1707526aec338a8711f052dbed405d0e0267cfacb2ef8e2a?s=96&d=mm&r=g","caption":"Dadang ITS"},"url":"https:\/\/www.its.ac.id\/news\/author\/root\/"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/posts\/28076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/comments?post=28076"}],"version-history":[{"count":0,"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/posts\/28076\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/media\/28077"}],"wp:attachment":[{"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/media?parent=28076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/categories?post=28076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.its.ac.id\/news\/wp-json\/wp\/v2\/tags?post=28076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}