{"id":3984,"date":"2025-05-29T14:10:04","date_gmt":"2025-05-29T14:10:04","guid":{"rendered":"https:\/\/sharefoundation.info\/?p=3984"},"modified":"2025-05-29T14:11:30","modified_gmt":"2025-05-29T14:11:30","slug":"spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise","status":"publish","type":"post","link":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/","title":{"rendered":"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><em>How forensic analysis uncovered manipulation, exploitation, and the hidden risks behind one of digital forensics&#8217; most powerful tools<\/em><\/h4>\n\n\n\n<p><em>By: Boris Babovi\u0107<\/em><\/p>\n\n\n\n<p>A re-examination of data from the analysis of devices seized from Serbian activists \u2014 originally conducted last year by the international organization Amnesty International \u2014 reveals that the Cellebrite UFED forensic tool has the capability to selectively delete its own logs or evade logging altogether. This potential manipulation undermines the integrity of the data extraction process and raises serious concerns about the admissibility of such evidence in legal proceedings.<\/p>\n\n\n\n<p>In its <a href=\"https:\/\/www.amnesty.org\/en\/documents\/eur70\/8813\/2024\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">December 2024 report<\/a>, Amnesty International documented a forensic analysis of mobile devices belonging to activists, journalists, and civil society members in Serbia. During their detention by the police or the Security Information Agency, the devices were infected with low-grade spyware (NoviSpy), but access and extraction of data was carried out using UFED, an advanced digital forensics tool developed by the Israeli company Cellebrite. This tool is used in criminal investigations worldwide and was provided to Serbian law enforcement as a donation from the Norwegian Ministry of Foreign Affairs.<\/p>\n\n\n\n<p>For the purposes of this research, data from the infected phones analyzed by Amnesty was re-examined in order to better understand how this advanced forensic technology operates. The focus was specifically on the traces left behind by Cellebrite UFED, and whether its activity can be reliably detected after device security has been breached.<\/p>\n\n\n\n<p>The analysis revealed clear indicators of device exploitation. Log data showed unauthorized modifications to Android Debug Bridge (ADB) and system security settings \u2014 evidence of privilege escalation. These changes closely match patterns previously documented by Amnesty International, suggesting the use of an exploit chain capable of bypassing the standard security mechanisms of the Android operating system.<\/p>\n\n\n\n<p>One particularly notable forensic artifact was a binary file identified as <em>Falcon<\/em>. Although its exact function remains unclear, its presence aligns with previous findings from Amnesty\u2019s report, which hypothesized that <em>Falcon<\/em> may be used either to deploy a payload or to establish persistent access. However, in the absence of publicly documented cases involving <em>Falcon<\/em> in other forensic investigations, any conclusions regarding its actual role remain speculative and must be treated with caution.<\/p>\n\n\n\n<p>The next key point of interest was the selective absence of USB exploitation traces. In earlier cases documented by Amnesty, rogue USB devices were used to exploit kernel-level vulnerabilities on Android devices \u2014 an approach that typically leaves clear USB enumeration logs. In this case, however, no such logs were found.<\/p>\n\n\n\n<p>What makes this absence particularly significant is the fact that the surrounding system logs remained intact, indicating that the missing logs were not the result of a general logging failure. On the contrary, the evidence points to either selective log deletion or deliberate avoidance of logging during the exploitation process. This suggests that Cellebrite\u2019s methods not only successfully bypass device security measures but also actively obscure traces immediately after the compromise.<\/p>\n\n\n\n<p>Further analysis raised deeper concerns. Several independent studies have identified multiple critical vulnerabilities in UFED, including the use of hardcoded RSA keys and static cryptographic material. These weaknesses potentially allow forensic data that has been extracted to be reaccessed or modified, thereby compromising the integrity of the evidence and breaking the chain of custody.<\/p>\n\n\n\n<p>A detailed timeline analysis of the compromised device revealed events such as APK installation attempts, file system modifications, and device reboots \u2014 all of which closely aligned with the sequence described in earlier reports by Amnesty International regarding UFED-based device exploitation. Although the logs contained no direct references to Cellebrite, the alignment of these events strongly suggests the use of the same or a very similar exploit chain.<\/p>\n\n\n\n<p>Tampering with forensic logs may be the most consequential finding of this research. When a forensic tool is capable of deleting or selectively altering records of its own activity, the integrity and transparency of the entire data extraction process are seriously compromised. Such manipulation undermines the reliability of subsequent incident analysis and raises serious concerns about the admissibility of evidence in legal proceedings.<\/p>\n\n\n\n<p>If logging mechanisms can be bypassed or falsified during an investigation, the evidence gathered under such conditions may be challenged or excluded from court. This not only diminishes the evidentiary value of data extracted using Cellebrite UFED, but also calls into question the overall credibility of the tool and its suitability for use in forensic contexts.<\/p>\n\n\n\n<p>The research focused on analyzing system logs from an Android device suspected of being compromised. The primary objective was to determine whether Cellebrite UFED had been used to forcibly access the device and, if so, to reconstruct the sequence of the exploitation process. Forensic data was collected using the Mobile Verification Toolkit (MVT) and Android Quick Forensics (AndroidQF), while additional insights were obtained through ADB commands used to monitor real-time system messages and service states. The findings were then systematically compared against MITRE ATT&amp;CK tactics and cross-verified using relevant vulnerability databases, including CVE and ExploitDB. Particular attention was given to confirming observed patterns in light of Amnesty International\u2019s reporting on UFED activity in Serbia.<\/p>\n\n\n\n<p>Cellebrite UFED has proven to be not merely a tool for bypassing encryption, but an integral part of a sophisticated and adaptive exploitation framework. Its ability to selectively insert or remove forensic traces raises serious concerns about the integrity and reliability of evidence obtained through its use.<\/p>\n\n\n\n<p>For digital forensics to retain its legitimacy as a scientific discipline grounded in objectivity and trust, advanced technical capabilities alone are not sufficient. Transparency, independent oversight, and verifiable extraction methods are essential prerequisites for the use of forensic tools in contexts where evidentiary integrity and legal accountability are of critical importance. After verifying Amnesty&#8217;s finding that UFED had been misused to unlawfully access and infect the devices of activists and journalists, Cellebrite <a href=\"https:\/\/cellebrite.com\/en\/cellebrite-statement-about-amnesty-international-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">announced<\/a> that it would suspend its services to clients in Serbia. A serious discussion on the ethical and legal implications of oversight and responsibility in the field of digital forensics has yet to begin.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How forensic analysis uncovered manipulation, exploitation, and the hidden risks behind one of digital forensics&#8217; most powerful tools By: Boris Babovi\u0107 A re-examination of data from the analysis of devices seized from Serbian activists \u2014 originally conducted last year by the international organization Amnesty International \u2014 reveals that the Cellebrite UFED forensic tool has the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":3986,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[33,34],"class_list":["post-3984","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-digital-security","tag-information-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise - SHARE Fondacija<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise - SHARE Fondacija\" \/>\n<meta property=\"og:description\" content=\"How forensic analysis uncovered manipulation, exploitation, and the hidden risks behind one of digital forensics&#8217; most powerful tools By: Boris Babovi\u0107 A re-examination of data from the analysis of devices seized from Serbian activists \u2014 originally conducted last year by the international organization Amnesty International \u2014 reveals that the Cellebrite UFED forensic tool has the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/\" \/>\n<meta property=\"og:site_name\" content=\"SHARE Fondacija\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-29T14:10:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T14:11:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-fb-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"b p\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-x-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"b p\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/\"},\"author\":{\"name\":\"b p\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/person\\\/d8ca06ccf338cd33904919ba1237e0d8\"},\"headline\":\"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise\",\"datePublished\":\"2025-05-29T14:10:04+00:00\",\"dateModified\":\"2025-05-29T14:11:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/\"},\"wordCount\":1005,\"publisher\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/spyware-blog-wp-1.png\",\"keywords\":[\"digital security\",\"information privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/\",\"name\":\"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise - SHARE Fondacija\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/spyware-blog-wp-1.png\",\"datePublished\":\"2025-05-29T14:10:04+00:00\",\"dateModified\":\"2025-05-29T14:11:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/spyware-blog-wp-1.png\",\"contentUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/spyware-blog-wp-1.png\",\"width\":1200,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#website\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/\",\"name\":\"Share Foundation\",\"description\":\"Dru\u0161tvo, tehnologija, sajberspejs\",\"publisher\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sharefoundation.info\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\",\"name\":\"Share Foundation\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/share-favicon.png\",\"contentUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/share-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Share Foundation\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/person\\\/d8ca06ccf338cd33904919ba1237e0d8\",\"name\":\"b p\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g\",\"caption\":\"b p\"},\"url\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/author\\\/bojanperkovsharedefense-org\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise - SHARE Fondacija","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/","og_locale":"en_US","og_type":"article","og_title":"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise - SHARE Fondacija","og_description":"How forensic analysis uncovered manipulation, exploitation, and the hidden risks behind one of digital forensics&#8217; most powerful tools By: Boris Babovi\u0107 A re-examination of data from the analysis of devices seized from Serbian activists \u2014 originally conducted last year by the international organization Amnesty International \u2014 reveals that the Cellebrite UFED forensic tool has the [&hellip;]","og_url":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/","og_site_name":"SHARE Fondacija","article_published_time":"2025-05-29T14:10:04+00:00","article_modified_time":"2025-05-29T14:11:30+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-fb-1.png","type":"image\/png"}],"author":"b p","twitter_card":"summary_large_image","twitter_image":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-x-1.png","twitter_misc":{"Written by":"b p","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/#article","isPartOf":{"@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/"},"author":{"name":"b p","@id":"https:\/\/sharefoundation.info\/#\/schema\/person\/d8ca06ccf338cd33904919ba1237e0d8"},"headline":"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise","datePublished":"2025-05-29T14:10:04+00:00","dateModified":"2025-05-29T14:11:30+00:00","mainEntityOfPage":{"@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/"},"wordCount":1005,"publisher":{"@id":"https:\/\/sharefoundation.info\/#organization"},"image":{"@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-wp-1.png","keywords":["digital security","information privacy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/","url":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/","name":"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise - SHARE Fondacija","isPartOf":{"@id":"https:\/\/sharefoundation.info\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/#primaryimage"},"image":{"@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-wp-1.png","datePublished":"2025-05-29T14:10:04+00:00","dateModified":"2025-05-29T14:11:30+00:00","breadcrumb":{"@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/#primaryimage","url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-wp-1.png","contentUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/05\/spyware-blog-wp-1.png","width":1200,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/sharefoundation.info\/en\/spywares-first-step-a-systematic-analysis-of-exploits-used-for-mobile-device-compromise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sharefoundation.info\/en\/"},{"@type":"ListItem","position":2,"name":"Spyware\u2019s First Step: A Systematic Analysis of Exploits Used for Mobile Device Compromise"}]},{"@type":"WebSite","@id":"https:\/\/sharefoundation.info\/#website","url":"https:\/\/sharefoundation.info\/","name":"Share Foundation","description":"Dru\u0161tvo, tehnologija, sajberspejs","publisher":{"@id":"https:\/\/sharefoundation.info\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sharefoundation.info\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sharefoundation.info\/#organization","name":"Share Foundation","url":"https:\/\/sharefoundation.info\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sharefoundation.info\/#\/schema\/logo\/image\/","url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/02\/share-favicon.png","contentUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/02\/share-favicon.png","width":512,"height":512,"caption":"Share Foundation"},"image":{"@id":"https:\/\/sharefoundation.info\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sharefoundation.info\/#\/schema\/person\/d8ca06ccf338cd33904919ba1237e0d8","name":"b p","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93e0d1765d4de36779654c9d6e932b5011557231b36ee5a0398d29e7aff6b23c?s=96&d=mm&r=g","caption":"b p"},"url":"https:\/\/sharefoundation.info\/en\/author\/bojanperkovsharedefense-org\/"}]}},"_links":{"self":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/3984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/comments?post=3984"}],"version-history":[{"count":3,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/3984\/revisions"}],"predecessor-version":[{"id":3993,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/3984\/revisions\/3993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/media\/3986"}],"wp:attachment":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/media?parent=3984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/categories?post=3984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/tags?post=3984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}