{"id":4959,"date":"2024-10-31T10:47:00","date_gmt":"2024-10-31T10:47:00","guid":{"rendered":"https:\/\/affa.co.id\/global\/?p=4959"},"modified":"2024-12-06T11:49:52","modified_gmt":"2024-12-06T11:49:52","slug":"unraveling-the-global-complexity-of-ip-crime-money-laundering-and-more","status":"publish","type":"post","link":"https:\/\/affa.co.id\/global\/2024\/10\/31\/unraveling-the-global-complexity-of-ip-crime-money-laundering-and-more\/","title":{"rendered":"Unraveling the Global Complexity of IP Crime: Money Laundering and More!"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Intellectual Property (IP) Crime negatively impacts the economy and consumer safety and has become structurally more complex, posing a worldwide threat to economic and social security.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">According to the recently released report \u201c<\/span><b><i>Uncovering the Ecosystem of Intellectual Property Crime<\/i><\/b><i><span style=\"font-weight: 400\">,&#8221;<\/span><\/i> <span style=\"font-weight: 400\">published this October by the<\/span> <b>European Union Agency for Law Enforcement Cooperation (Europol)<\/b><span style=\"font-weight: 400\"> and the <\/span><b>European Union Intellectual Property Office (EUIPO)<\/b><span style=\"font-weight: 400\">, it is revealed that 6% of imported products entering the European Union are counterfeit, with a value exceeding 2 billion euros) annually. This figure represents only the seized products, mainly packaging materials, toys, cigarettes, and CDs\/DVDs. Imagine if we could account for the undetected counterfeit goods distributed worldwide.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">So, why is tackling IP crime so challenging? The report highlights that this form of crime is highly networked and involves corrupt officials, money laundering, and even tax officers. EUIPO labels these facilitators as IP Crime Enablers!<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">How significant is their role, and how do they perpetuate Intellectual Property crime? Here are the details.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Intellectual Property Crime &#8211; The Definition<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">In the document, &#8220;IP Crime&#8221; refers to illegal activities involving the theft, infringement, or unauthorized use of Intellectual Property (IP) rights, which include Copyrights, Industrial Designs, Trademarks, Patents, Geographical Indications, and Trade Secrets. The document categorizes IP crime primarily as:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Counterfeiting <\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Manufacturing, importing, distributing, storing, or selling goods that bear the Trademark of a genuine brand without permission.<br \/>\n<\/span>Examples:<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Counterfeit Pharmaceuticals: Production and distribution of fake pharmaceutical products that can pose severe health risks to consumers. For instance, <\/span><a href=\"https:\/\/affa.co.id\/global\/2024\/09\/13\/legal-implications-of-counterfeit-drugs-in-indonesia\/\"><span style=\"font-weight: 400\">counterfeit Semaglutide injection pens <\/span><\/a><span style=\"font-weight: 400\">falsely labeled as containing the active ingredient were found to contain other substances, leading to serious health incidents\u200b.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Counterfeit Automotive Parts: The production and distribution of fake automotive parts, like brake pads and wheel rims, infringe Trademarks and pose serious safety risks.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400\"><b>Piracy<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Unauthorized copying, use, reproduction, and distribution of materials protected by IP rights, such as digital media, software, and entertainment.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"><span style=\"font-weight: 400\">Example:<\/span><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Digital Piracy: Illicit streaming services that distribute copyrighted content (like movies and sports events) without authorization. In one case, a streaming service was operating across multiple countries, generating significant revenue through illegal broadcasts\u200b.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><b>The Mechanics of IP Crime<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">IP criminals exploit weaknesses in the global supply chain, legal loopholes, and infrastructure to operate with resilience and evade law enforcement efforts. This structured approach allows them to profit significantly while remaining difficult to prosecute due to their operations&#8217; multi-jurisdictional and often hidden nature. The structured process criminal networks use to conduct IP crimes ranges from obtaining infringing items to laundering the proceeds. Here are the key phases:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li style=\"font-weight: 400\"><b>Infringing IP Rights (Acquisition Phase)<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"><span style=\"font-weight: 400\">This is the initial stage where IP rights are intentionally violated. Criminals produce counterfeit goods by replicating brand logos, labels, or pirated content. This phase may involve either manufacturing counterfeit products directly or diverting legitimate products from the supply chain. Common sources for counterfeit goods include China, Hong Kong, and T\u00fcrkiye.<\/span><\/span><\/li>\n<li style=\"font-weight: 400\"><b>Transportation and Distribution Phase<br \/>\n<\/b>After acquiring the counterfeit items, networks transport them globally, often abusing the legal logistical and shipping sectors to move goods across borders. Criminals use sophisticated smuggling techniques, including splitting shipments and hiding counterfeit items within legitimate products to avoid detection.<\/li>\n<li style=\"font-weight: 400\"><b>Marketing and Retail Phase<br \/>\n<\/b>Criminals use both online and offline methods to market and sell counterfeit products. Online marketplaces, social media platforms, and even the dark web provide anonymity and access to large audiences. Offline, counterfeit goods may also be sold through physical retail outlets or open markets.<\/li>\n<li style=\"font-weight: 400\"><b>Dealing with Profits and Risks (Money-Laundering Phase)<br \/>\n<\/b>The final stage involves managing the profits from these illegal sales. Criminal networks employ money laundering techniques to disguise the origins of their profits. This includes investing in legal businesses, conducting physical cash transfers, or using complex digital financial systems to reintegrate funds into the economy.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><b>Parties Also Involved in Intellectual Property Crimes<\/b><\/p>\n<p><span style=\"font-weight: 400\">In addition to the 4 (four) phases of crime above, Europol and EUIPO mapped the parties involved in IP crimes, making these crimes complex and challenging to eradicate.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><b><img loading=\"lazy\" class=\"aligncenter wp-image-4961 size-large\" src=\"https:\/\/affa.co.id\/global\/wp-content\/uploads\/sites\/10\/2024\/10\/serious-organized-ip-crime-affa-1024x996.png\" alt=\"Serious &amp; Organized IP Crime - AFFA IPR\" width=\"1024\" height=\"996\" srcset=\"https:\/\/affa.co.id\/global\/wp-content\/uploads\/sites\/10\/2024\/10\/serious-organized-ip-crime-affa-1024x996.png 1024w, https:\/\/affa.co.id\/global\/wp-content\/uploads\/sites\/10\/2024\/10\/serious-organized-ip-crime-affa-300x292.png 300w, https:\/\/affa.co.id\/global\/wp-content\/uploads\/sites\/10\/2024\/10\/serious-organized-ip-crime-affa-768x747.png 768w, https:\/\/affa.co.id\/global\/wp-content\/uploads\/sites\/10\/2024\/10\/serious-organized-ip-crime-affa.png 1332w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>Criminal Enablers<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">These are illegal activities or crimes that help facilitate IP crime:<\/span><\/p>\n<ul>\n<li><b>Corruption: <\/b><span style=\"font-weight: 400\">Bribery or manipulation within organizations to ease illegal processes.<\/span><\/li>\n<li><b>Forced Labour: <\/b><span style=\"font-weight: 400\">Exploitation of labor, often under inhumane conditions, to produce counterfeit goods.<\/span><\/li>\n<li><b>Cybercrime:<\/b><span style=\"font-weight: 400\"> Digital crimes that support IP crime, such as phishing, malware, or data theft.<\/span><\/li>\n<li><b>Money Laundering: <\/b><span style=\"font-weight: 400\">Concealing the profits from IP crime by converting illegal earnings into legitimate assets.<\/span><\/li>\n<li><b>Document Fraud: <\/b><span style=\"font-weight: 400\">Creating fake documents to disguise the origin or legitimacy of counterfeit goods.<\/span><\/li>\n<li><b>Environmental Crime (Envicrime):<\/b><span style=\"font-weight: 400\"><span style=\"font-weight: 400\"> Illegal activities that harm the environment, often associated with the improper disposal of waste from counterfeit production.<\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li><b>Non-Criminal Enablers<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400\">These are lawful activities or structures that criminals misuse to facilitate IP crime:<\/span><\/p>\n<ol>\n<li><b>Professional Expertise: <\/b><span style=\"font-weight: 400\">Use of skills from professionals (e.g., lawyers, technicians) to support illegal IP activities.<\/span><\/li>\n<li><b>Use of Legal Business Structures (LBS):<\/b><span style=\"font-weight: 400\"> Legal businesses that provide a front for illegal IP activities, such as follows:<\/span>\n<ul>\n<li><b>Trading Companies or Factories<br \/>\n<\/b>These legitimate businesses can be set up or inserted into the supply chain to disguise the production or distribution of counterfeit goods. Factories or production sites can be used to produce counterfeit goods under the guise of legitimate products.<\/li>\n<li><b>Warehouses or Logistics Service Providers<br \/>\n<\/b>Legitimate warehouses or logistics companies can be used to store or transport counterfeit goods without raising suspicion. For example, counterfeit goods can be hidden among legitimate products in international shipments.<\/li>\n<li><b>Physical Retail Stores<br \/>\n<\/b>Appearing legitimate stores can be used to sell counterfeit goods to consumers without their knowledge. Counterfeit goods can be sold alongside legitimate products, making it difficult for consumers to tell the difference.<\/li>\n<li><b>Online Stores or Marketplace Platforms<br \/>\n<\/b>Many IP criminals use e-commerce websites or accounts on platforms like Amazon, eBay, or social media to sell counterfeit products. These platforms often give the impression of a legitimate business, making it easier for criminals to reach consumers at a wide range.<\/li>\n<li><b>Front or Shell Companies<br \/>\n<\/b>These companies are technically legitimate but serve only as a front for illegal activity. They are often used to launder money or hide proceeds from IP crimes.<\/li>\n<li><b>Pharmaceutical Business or Pharmacy<br \/>\n<\/b>In the case of pharmaceutical crime, pharmacies or pharmaceutical companies can be used to obtain or sell counterfeit pharmaceutical products or drugs diverted from the legal supply chain.<\/li>\n<\/ul>\n<\/li>\n<li>\u00a0<b>Technology and Digital Infrastructure:<\/b> Use of advanced technology like 3D printing or digital platforms to create or market counterfeit goods.<\/li>\n<li><b>Logistical and Trade Infrastructure:<\/b> Legal logistics systems, such as shipping and storage, that criminals exploit to transport counterfeit goods.<\/li>\n<\/ol>\n<\/li>\n<li><b>IP Crime as an Enabler<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">IP crime can facilitate or support other forms of crime:<\/span><\/li>\n<li style=\"list-style-type: none\">\n<ol>\n<li style=\"font-weight: 400\"><b>Money Laundering: <\/b><span style=\"font-weight: 400\">Allows for the flow of illegal profits.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Environmental Crimes: <\/b><span style=\"font-weight: 400\">Counterfeit production often disregards environmental regulations, leading to illegal waste disposal.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Excise Fraud and Tax Evasion: <\/b><span style=\"font-weight: 400\">Counterfeit goods bypass taxes and duties, leading to significant revenue loss.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Cyberattacks:<\/b><span style=\"font-weight: 400\"> IP crime, especially digital piracy, is associated with cyber threats like malware.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>VAT Fraud:<\/b><span style=\"font-weight: 400\"> Avoiding Value Added Tax through the illegal trade of counterfeit goods.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Online Fraud Schemes: <\/b><span style=\"font-weight: 400\">Fake e-commerce platforms or phishing scams tied to counterfeit sales.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Sports Corruption:<\/b><span style=\"font-weight: 400\"> Counterfeit goods like unauthorized pharmaceuticals or supplements can be linked to doping or match-fixing.<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><b>7 Steps to Combat Intellectual Property Crime<\/b><\/p>\n<p><span style=\"font-weight: 400\">Europol and EUIPO specifically emphasize the importance of a collaborative and strategic approach to address IP crime, as follows:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li style=\"font-weight: 400\"><b>Strengthening Collaboration and Cooperation Among Stakeholders<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\"><span style=\"font-weight: 400\">Law enforcement, policymakers, the private sector, and the public must work together to combat IP crime. This collaboration is essential for identifying criminal networks, strengthening legal processes, and accelerating actions against IP crime offenders.<\/span><\/span><\/li>\n<li style=\"font-weight: 400\"><b>Raising Public Awareness<br \/>\n<\/b>The public needs to be better informed about the risks of purchasing counterfeit products, in terms of health, safety, and economic impact. Public awareness campaigns can help reduce demand for counterfeit goods and increase consumer vigilance.<\/li>\n<li style=\"font-weight: 400\"><b>Enhancing Detection Technology<br \/>\n<\/b>Law enforcement and Trademark owners can use advanced technology, such as Artificial Intelligence (AI), to quickly identify counterfeit products. This technology can also assist online platforms in flagging suspicious products and preventing counterfeit sellers from operating.<\/li>\n<li style=\"font-weight: 400\"><b>Strengthening Regulations and Law Enforcement<br \/>\n<\/b>Legislation related to IP crime must be reinforced to impose stricter offender penalties. Stronger law enforcement, including tighter border control measures and greater international cooperation, can reduce opportunities for criminals to smuggle counterfeit goods.<\/li>\n<li style=\"font-weight: 400\"><b>Implementing Security Technology on Genuine Products<br \/>\n<\/b>Trademark owners can <a href=\"https:\/\/affa.co.id\/global\/2024\/08\/31\/anti-counterfeiting-methods-choose-the-right-strategy-to-get-additional-protection-for-your-intellectual-property\/\">incorporate security features on their products<\/a>, such as QR codes or Near-Field Communication (NFC) technology, allowing consumers to verify the authenticity of products. This measure helps consumers identify genuine products and avoid counterfeits.<\/li>\n<li style=\"font-weight: 400\"><b>Promoting Transparency in the Supply Chain<br \/>\n<\/b>Increasing transparency and oversight in the supply chain can reduce opportunities for criminals to introduce counterfeit products into the market. This includes tracking the origin and distribution paths of products to ensure each item sold is genuine.<\/li>\n<li style=\"font-weight: 400\"><b>Financial Investigation and Money Laundering<br \/>\n<\/b>Conducting in-depth investigations into the financial flows of criminal networks involved in IP crime can help identify and cut off their funding sources. Money laundering is often an integral part of IP crime, and criminal networks can be weakened by disrupting the flow of money.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">By understanding the mechanisms, enabling factors, and impact of IP crime, it becomes clear that a collaborative and comprehensive approach is essential to countering this threat. Public education, strengthened regulations, advanced technology, and multi-stakeholder cooperation are key to overcoming this challenge. As an Intellectual Property Lawyer, we are committed to continuously raising awareness and understanding among the public about the importance of protecting IP rights, preserving market integrity, and ensuring consumer safety.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Should you need more information regarding Intellectual Property protection in Indonesia or abroad, you can contact us via email: <\/b><a href=\"mailto:emirsyah.dinar@affa.co.id\"><b>emirsyah.dinar@affa.co.id<\/b><\/a><b>.<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><b>Source:<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/www.euipo.europa.eu\/en\/publications\/uncovering-the-ecosystem-of-intellectual-property-crime-a-focus-on-enablers-and-impact\"><b>EUIPO: Uncovering the Ecosystem of Intellectual Property Crime<\/b><\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intellectual Property (IP) Crime negatively impacts the economy and consumer safety and has become structurally more complex, posing a worldwide threat to economic and social security. &nbsp; According to the recently released report \u201cUncovering the Ecosystem of Intellectual Property Crime,&#8221; published this October by the European Union Agency for Law Enforcement Cooperation (Europol) and the European Union Intellectual Property Office (EUIPO), it is revealed that 6% of imported products entering the European Union are counterfeit, with a value exceeding 2 billion euros) annually. This figure represents only the seized products, mainly packaging materials, toys, cigarettes, and CDs\/DVDs. Imagine if we could account for the undetected counterfeit goods distributed worldwide. &nbsp; So, why is tackling IP crime so challenging? The report highlights that this form of crime is highly networked and involves corrupt officials, money laundering, and even tax officers. EUIPO labels these facilitators as IP Crime Enablers! &nbsp; How significant is their role, and how do they perpetuate Intellectual Property crime? Here are the details. &nbsp; Intellectual Property Crime &#8211; The Definition &nbsp; In the document, &#8220;IP Crime&#8221; refers to illegal activities involving the theft, infringement, or unauthorized use of Intellectual Property (IP) rights, which include Copyrights, Industrial Designs, Trademarks, Patents, Geographical Indications, and Trade Secrets. The document categorizes IP crime primarily as: &nbsp; Counterfeiting Manufacturing, importing, distributing, storing, or selling goods that bear the Trademark of a genuine brand without permission. Examples: Counterfeit Pharmaceuticals: Production and distribution of fake pharmaceutical products that can pose severe health risks to consumers. For instance, counterfeit Semaglutide injection pens falsely labeled as containing the active ingredient were found to contain other substances, leading to serious health incidents\u200b. Counterfeit Automotive Parts: The production and distribution of fake automotive parts, like brake pads and wheel rims, infringe Trademarks and pose serious safety risks. Piracy Unauthorized copying, use, reproduction, and distribution of materials protected by IP rights, such as digital media, software, and entertainment. Example: Digital Piracy: Illicit streaming services that distribute copyrighted content (like movies and sports events) without authorization. In one case, a streaming service was operating across multiple countries, generating significant revenue through illegal broadcasts\u200b. &nbsp; The Mechanics of IP Crime &nbsp; IP criminals exploit weaknesses in the global supply chain, legal loopholes, and infrastructure to operate with resilience and evade law enforcement efforts. This structured approach allows them to profit significantly while remaining difficult to prosecute due to their operations&#8217; multi-jurisdictional and often hidden nature. The structured process criminal networks use to conduct IP crimes ranges from obtaining infringing items to laundering the proceeds. Here are the key phases: &nbsp; Infringing IP Rights (Acquisition Phase) This is the initial stage where IP rights are intentionally violated. Criminals produce counterfeit goods by replicating brand logos, labels, or pirated content. This phase may involve either manufacturing counterfeit products directly or diverting legitimate products from the supply chain. Common sources for counterfeit goods include China, Hong Kong, and T\u00fcrkiye. Transportation and Distribution Phase After acquiring the counterfeit items, networks transport them globally, often abusing the legal logistical and shipping sectors to move goods across borders. Criminals use sophisticated smuggling techniques, including splitting shipments and hiding counterfeit items within legitimate products to avoid detection. Marketing and Retail Phase Criminals use both online and offline methods to market and sell counterfeit products. Online marketplaces, social media platforms, and even the dark web provide anonymity and access to large audiences. Offline, counterfeit goods may also be sold through physical retail outlets or open markets. Dealing with Profits and Risks (Money-Laundering Phase) The final stage involves managing the profits from these illegal sales. Criminal networks employ money laundering techniques to disguise the origins of their profits. This includes investing in legal businesses, conducting physical cash transfers, or using complex digital financial systems to reintegrate funds into the economy. &nbsp; Parties Also Involved in Intellectual Property Crimes In addition to the 4 (four) phases of crime above, Europol and EUIPO mapped the parties involved in IP crimes, making these crimes complex and challenging to eradicate. &nbsp; Criminal Enablers These are illegal activities or crimes that help facilitate IP crime: Corruption: Bribery or manipulation within organizations to ease illegal processes. Forced Labour: Exploitation of labor, often under inhumane conditions, to produce counterfeit goods. Cybercrime: Digital crimes that support IP crime, such as phishing, malware, or data theft. Money Laundering: Concealing the profits from IP crime by converting illegal earnings into legitimate assets. Document Fraud: Creating fake documents to disguise the origin or legitimacy of counterfeit goods. Environmental Crime (Envicrime): Illegal activities that harm the environment, often associated with the improper disposal of waste from counterfeit production. Non-Criminal Enablers These are lawful activities or structures that criminals misuse to facilitate IP crime: Professional Expertise: Use of skills from professionals (e.g., lawyers, technicians) to support illegal IP activities. Use of Legal Business Structures (LBS): Legal businesses that provide a front for illegal IP activities, such as follows: Trading Companies or Factories These legitimate businesses can be set up or inserted into the supply chain to disguise the production or distribution of counterfeit goods. Factories or production sites can be used to produce counterfeit goods under the guise of legitimate products. Warehouses or Logistics Service Providers Legitimate warehouses or logistics companies can be used to store or transport counterfeit goods without raising suspicion. For example, counterfeit goods can be hidden among legitimate products in international shipments. Physical Retail Stores Appearing legitimate stores can be used to sell counterfeit goods to consumers without their knowledge. Counterfeit goods can be sold alongside legitimate products, making it difficult for consumers to tell the difference. Online Stores or Marketplace Platforms Many IP criminals use e-commerce websites or accounts on platforms like Amazon, eBay, or social media to sell counterfeit products. These platforms often give the impression of a legitimate business, making it easier for criminals to reach consumers at a wide range. Front or Shell Companies These companies are technically legitimate but serve only as a front for illegal activity. They are often used to launder money&hellip;<\/p>\n","protected":false},"author":4,"featured_media":4966,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[71,81,102,158,212],"tags":[16,35,43,48,51,57,58,68,75,76,77,79,87,114,115,145],"_links":{"self":[{"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/posts\/4959"}],"collection":[{"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/comments?post=4959"}],"version-history":[{"count":5,"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/posts\/4959\/revisions"}],"predecessor-version":[{"id":4967,"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/posts\/4959\/revisions\/4967"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/media\/4966"}],"wp:attachment":[{"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/media?parent=4959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/categories?post=4959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/affa.co.id\/global\/wp-json\/wp\/v2\/tags?post=4959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}