{"id":1172,"date":"2024-08-06T08:44:29","date_gmt":"2024-08-06T12:44:29","guid":{"rendered":"https:\/\/gstsstg.wpenginepowered.com\/?p=1172"},"modified":"2026-04-07T09:56:09","modified_gmt":"2026-04-07T13:56:09","slug":"ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness","status":"publish","type":"post","link":"https:\/\/gsts.ca\/fr\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/","title":{"rendered":"Cloud Computing and OSINT in Maritime Domain Awareness"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1172\" class=\"elementor elementor-1172\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3e6d378e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e6d378e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68796097\" data-id=\"68796097\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4ba43d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e4ba43d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The contemporary security environment requires assimilation of vast amounts of data in order to maximize outcomes and the volume of data necessitates an increasing role for digitization and automation in the decision-making cycle.\u00a0 Data is increasingly becoming the currency of the realm, both for civilian and military applications, but users who continue with old paradigms about security and control will literally \u201cmiss the boat\u201d in terms of leveraging Artificial Intelligence (AI) to make decisions in a timely fashion.\u00a0\u00a0<span style=\"color: #2766a5; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">Ultimately decision-makers need to be able \u201cto make better informed decisions at the speed of relevance,\u201d<a href=\"#ref1\">[1]<\/a>\u00a0 which often means increasing use of verified but unclassified sources.<\/span><\/span><\/p><p><span data-contrast=\"auto\">Historically, the cost of space-based sensors meant that tools like satellite imagery or advanced communications intercepts could only be afforded by the most advanced actors. These sensors were almost always operated at the highest levels of security classification due to the underlying technology behind them. Dramatic reductions in infrastructure costs have been coupled with gains in processing speeds, the ubiquity of networks and the ease with which human beings can communicate with one another. Private citizens now have open access to information and data flows that were formerly only the purview of national level governments. <\/span><\/p><p><span data-contrast=\"auto\">In a world where most data is in the public domain, many national security practitioners cling to outdated notions of security and control. In doing so, they undermine both. To achieve a decision advantage over your competitor one must not only get the right information to the right person; it must also be done <\/span><span style=\"color: #4bbea6; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">in-time.<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">\u00a0<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing ); color: #2766a5;\">Over classification of information can restrict data flows or actually prevent the processing necessary to derive actionable intelligence. In a world where data is a commodity, speed and accuracy are more highly prized than 100% security, because information often becomes stale quickly.<\/span><\/p><p><span lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\">GSTS, through its proprietary AI powered platform, <span data-contrast=\"auto\"><span style=\"color: #2766a5; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\"><span lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\">OCIANA<\/span><span lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\">\u00ae, <\/span><span lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\">defaults to operating in an UNCLAS environment to ensure the speed of relevance<\/span>;<\/span><\/span><\/span><span lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\">\u00a0the platform can do so securely while maintaining the ability to export sensitive outputs to CLASSIFIED systems should the need arise.\u00a0<\/span><\/p><p><span lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\">OCIANA<\/span><span lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\">\u00ae <\/span><span lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\">tracks vessels via AIS (Automated Information System), detects ships automatically in satellite imagery, and even has the capability to find ships that have gone AIS and radar silent by fusing multiple data sources, including satellite based commercial Radio Frequency intercepts.\u00a0 Until recently, these capabilities and methods were highly classified and remained the purview of select security and intelligence agencies. In the past, the power and the sensitivity of these capabilities often meant that even talking about them occurred at the TOP SECRET or higher level.\u00a0 Today, the same sort of capability can be utilized by anyone with a credit card and internet connection.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0fcde8a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0fcde8a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c88212\" data-id=\"2c88212\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54be3b9 elementor-widget elementor-widget-image\" data-id=\"54be3b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"624\" height=\"210\" src=\"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/08\/Picture1.jpg\" class=\"attachment-large size-large wp-image-2146\" alt=\"\" srcset=\"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/08\/Picture1.jpg 624w, https:\/\/gsts.ca\/wp-content\/uploads\/2024\/08\/Picture1-300x101.jpg 300w, https:\/\/gsts.ca\/wp-content\/uploads\/2024\/08\/Picture1-18x6.jpg 18w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-353989e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"353989e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cdc66f7\" data-id=\"cdc66f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd93392 elementor-widget elementor-widget-text-editor\" data-id=\"fd93392\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The question then arises, just what exactly needs to be kept secret any more in the modern era of Maritime Domain Awareness (MDA)? If the baseline data (AIS) is readily available to everybody, what data is left to hide? GSTS contends that when you combine certain data elements together, you may derive sensitive information to which some clients might want to limit access. But there are means of securing this data, and it should become classified only if the proper statutory thresholds are met. The common threshold amongst the FIVE EYES intelligence community for classification is when \u201cunauthorized disclosure could reasonably be expected to cause injury to the national interest.\u201d<a href=\"#ref2\">[2]<\/a>\u00a0<span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">This is a substantially high bar. Most commercially available data and Open Source Intelligence (OSINT) falls well below this threshold.<\/span><\/p><p>Most countries&#8217; Classified networks contain substantial amounts of UNCLASSIFIED information because without it, users would not have the context to make sense of the Classified sources contained within.\u00a0 GSTS uses many of the same commercial service providers for satellite imagery and remote sensing and baseline maps used by many Western governments as the building blocks for its Classified maritime situational awareness tools.\u00a0 Despite this common data heritage, Classified networks, by necessity, remain highly restricted and do not have access to the volumes of information and inputs necessary to allow AI enabled technologies like OCIANA\u00ae to function to their full potential. \u00a0\u00a0Fortunately, OCIANA\u00ae can automatically forward sensitive machine learning (ML) outputs to a Classified environment via an API (Application Programming Interface) and secure data transfer can be achieved through a combination of encrypted communications and DIODES<a href=\"#ref3\" name=\"_ftnref1\">[3]<\/a>.\u00a0<span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">These methods allow for either safe storage or the follow-on use of OCIANA\u00ae derived INTELLIGENCE by programs and systems within a Classified network.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c4d26c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4d26c9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-04472e9\" data-id=\"04472e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46aa04b elementor-widget elementor-widget-image\" data-id=\"46aa04b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"624\" height=\"266\" data-src=\"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/08\/Picture2.jpg\" class=\"attachment-large size-large wp-image-2147 lazyload\" alt=\"\" data-srcset=\"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/08\/Picture2.jpg 624w, https:\/\/gsts.ca\/wp-content\/uploads\/2024\/08\/Picture2-300x128.jpg 300w, https:\/\/gsts.ca\/wp-content\/uploads\/2024\/08\/Picture2-18x8.jpg 18w\" data-sizes=\"auto\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 624px; --smush-placeholder-aspect-ratio: 624\/266;\" data-original-sizes=\"(max-width: 624px) 100vw, 624px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ad1697 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ad1697\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0f11536\" data-id=\"0f11536\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60cde97 elementor-widget elementor-widget-text-editor\" data-id=\"60cde97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #2766a5; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">OCIANA\u00ae leverages the power of the cloud by doing as much processing as possible in an UNCLASSIFIED but <em>SECURE<\/em> environment. <\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">Just because data is on a \u201cClassified\u201d network does not always mean it is secure.\u00a0 Procedural failures such as poor password management, an improper \u201cpatch\u201d installation (especially on legacy systems) or the actions of malevolent actors (as evidenced by the Delisle affair<a href=\"#ref4\" data-wplink-edit=\"true\">[4]<\/a>)\u00a0<\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">can all lead to compromise. \u00a0The key to security is to implement as many procedural and technological safeguards as possible as warranted by the sensitivity of the data.<\/span><\/p><p>At the core of OCIANA\u2019s security is the AWS (Amazon Web Services) Cloud and its Data Security Framework. \u00a0First and foremost, physical security is ensured by the location of data centres.\u00a0 All GSTS services are hosted on servers located with only vetted AWS having access to both the premises and the network.<\/p><p>Network security is ensured by dedicated AWS staff that monitor all activity within the AWS Cloud and allow for economies of scale that individual enterprises could not hope to achieve on their own.\u00a0 By sharing the burden of Cyber-security, all AWS clients get a higher level of service.\u00a0 <span style=\"color: #2766a5; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">Within AWS, OCIANA&#8217;s databases are isolated within a Virtual Private Cloud (VPC), preventing unauthorized access, and database passwords are regularly rotated to fend off potential breaches.\u00a0 This same feature also allows for isolation of each client\u2019s user and other sensitive data from that of other clients, which ensures both security and confidentiality.\u00a0 An additional layer of protection is offered by \u201cencryption at rest\u201d for all GSTS databases within its VPC.<\/span>\u00a0 In terms of external threats, network security is reinforced through AWS enthusiastic embrace of the principle of least privilege: users are granted only the minimum level access to the platform and the underlying data necessary to perform their tasks.\u00a0 Combined with Identity &amp; Access Management (IAM) protocols, GSTS personnel access AWS resources with minimal permissions necessary in their roles, reducing the risk of internal threats.<\/p><p>OCIANA\u00ae also benefits from continuous security practices including vulnerability scanning before and after deployment and scanning of the AWS environment to identify and rectify security risks or misconfigurations promptly. Simply, leveraging cloud-based services means utilizing a network that is more adaptable, regularly updated, and rigorously monitored against threats, providing a secure foundation that traditional on-premise solutions struggle to match. This comprehensive security strategy ensures that user data is not only protected through advanced encryption and strict access controls but is also continuously monitored and assessed for vulnerabilities, offering peace of mind to all OCIANA\u00ae users.<\/p><p>Many of the principles and methods listed above are the basis of ZERO-TRUST and Data Centric Security (DCS), the foundational concepts underpinning the US military\u2019s use of Classified Clouds to facilitate CJADC2<a href=\"#ref5\">[5]<\/a>, the ability to conduct Command &amp; Control (C2) across all combat domains.<a href=\"#ref6\">[6]<\/a>\u00a0<span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">Therefore, although not operated in a Classified environment, OCIANA<\/span><em style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\">\u00ae<\/em><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing );\"> is highly secure.\u00a0 National security users can rely on it to provide a comprehensive Maritime Picture and provide insights that might not be possible on SECRET or TOP SECRET systems.\u00a0 The wealth of data sources available through commercial sources or on the open internet might not be compatible with Classified networks, or the cost of importing or replicating them within might be cost prohibitive. But by processing as much data as possible in a secure, unclassified environment, <\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: var( --e-global-typography-text-font-size ); font-weight: var( --e-global-typography-text-font-weight ); letter-spacing: var( --e-global-typography-text-letter-spacing ); color: #2766a5;\">OCIANA\u00ae can provide MDA at the speed of relevance, while still supporting Classified systems with secure derived Intelligence.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45532f6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45532f6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25a53b7\" data-id=\"25a53b7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d57d035 elementor-widget elementor-widget-heading\" data-id=\"d57d035\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"references\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">References<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1afbb99 elementor-widget elementor-widget-text-editor\" data-id=\"1afbb99\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"ref1\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>[1]<span style=\"color: #020101;\">\u00a0Terri Pavelvic, \u201cOperational Decisions at the Speed of Relevance\u201d\u00a0<\/span><em style=\"color: #020101;\">Vanguard<\/em><span style=\"color: #020101;\">\u00a022 January 2023\u00a0\u00a0<\/span><a style=\"background-color: #ffffff;\" href=\"https:\/\/vanguardcanada.com\/operational-decisions-at-the-speed-of-relevance\/\">Operational Decisions at the Speed of Relevance \u2013 Vanguard (vanguardcanada.com)<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f97942c elementor-widget elementor-widget-text-editor\" data-id=\"f97942c\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"ref2\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>[2]\u00a0<a href=\"https:\/\/www.tbs-sct.canada.ca\/pol\/doc-eng.aspx?id=32614\">Directive on Security Management &#8211; Appendix J: Standard on Security Categorization- Canada.ca<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-227259d elementor-widget elementor-widget-text-editor\" data-id=\"227259d\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"ref3\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>[3]\u00a0In computer network security, a diode is a device or component used to ensure unidirectional data flow between two network segments while preventing any data leakage or unauthorized access from one segment to the other. The term &#8220;diode&#8221; in this context is derived from its analogy with electrical diodes, which allow current to flow in only one direction.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cef8ac9 elementor-widget elementor-widget-text-editor\" data-id=\"cef8ac9\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"ref4\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>[4]\u00a0Jeffrey Delisle is a former Canadian Naval Intelligence Officer convicted of spying for Russia\u2019s military intelligence agency, the GRU, in October 2012.\u00a0 Full details of his activities can be found at: Karen Blaze Carlson \u00a0<a style=\"background-color: #ffffff;\" href=\"https:\/\/nationalpost.com\/news\/canada\/decoding-the-case-of-alleged-canadian-spy-jeffrey-paul-delisle\">Jeffrey Paul Delisle: Decoding the case of an alleged Canadian spy | National Post<\/a>\u00a018 January 2012;\u00a0<a style=\"background-color: #ffffff;\" href=\"https:\/\/www.cbc.ca\/news\/canada\/jeffrey-delisle-naval-officer-turned-spy-1.1128380\">Jeffrey Delisle: Naval officer turned spy | CBC News<\/a>, 10 October 2012; Colin Freeze &amp; Jane Taber\u00a0<a style=\"background-color: #ffffff;\" href=\"https:\/\/www.theglobeandmail.com\/news\/politics\/so-dead-inside-how-the-mounties-cracked-jeffrey-delisle\/article4630144\/\">\u2018So dead inside\u2019: How the Mounties cracked Jeffrey Delisle &#8211; The Globe and Mail<\/a>, October 2012.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3955c77 elementor-widget elementor-widget-text-editor\" data-id=\"3955c77\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"ref5\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>[5]\u00a0Combined &amp; Joint All Domain Command &amp; Control<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-816e40c elementor-widget elementor-widget-text-editor\" data-id=\"816e40c\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"ref6\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>[6]\u00a0In Canada this concept is known as PDC2 (Pan-domain Command &amp; Control).\u00a0 The domains are operating environments for military forces and include: Air, Land, Maritime, Space and Cyber.\u00a0 \u00a0This concept is fully explained in Canada \u2013 Department of National Defence\u00a0<em><u>Pan-domain Force Employment Concept &#8211;<\/u><\/em><u>Prevailing in a Dangerous World<\/u>, October 2023<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f6c80ca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f6c80ca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a6fb3b5\" data-id=\"a6fb3b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef77e16 elementor-widget elementor-widget-text-editor\" data-id=\"ef77e16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><span style=\"font-weight: bold; letter-spacing: 0.15px;\">Contact us to learn more today: sales@gsts.ca<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The contemporary security environment requires assimilation of vast amounts of data in order to maximize outcomes and the volume of data necessitates an increasing role for digitization and automation in the decision-making cycle.\u00a0 Data is increasingly becoming the currency of the realm, both for civilian and military applications, but users who continue with old paradigms [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":1175,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1172","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-whitepaper"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud Computing and OSINT in Maritime Domain Awareness<\/title>\n<meta name=\"description\" content=\"To make better informed decisions at the speed of relevance means increasing use of OSINT for verified but unclassified data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gsts.ca\/fr\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Computing and OSINT in Maritime Domain Awareness\" \/>\n<meta property=\"og:description\" content=\"To make better informed decisions at the speed of relevance means increasing use of OSINT for verified but unclassified data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gsts.ca\/fr\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"GSTS\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-06T12:44:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T13:56:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/07\/istockphoto-1350348767-170667a.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"513\" \/>\n\t<meta property=\"og:image:height\" content=\"336\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Akanksha Sharma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Akanksha Sharma\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/\"},\"author\":{\"name\":\"Akanksha Sharma\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/#\\\/schema\\\/person\\\/20fb039dcbdd21abadf2746aceac4d3b\"},\"headline\":\"Cloud Computing and OSINT in Maritime Domain Awareness\",\"datePublished\":\"2024-08-06T12:44:29+00:00\",\"dateModified\":\"2026-04-07T13:56:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/\"},\"wordCount\":1546,\"publisher\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gsts.ca\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/istockphoto-1350348767-170667a.webp\",\"articleSection\":[\"Whitepaper\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/\",\"url\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/\",\"name\":\"Cloud Computing and OSINT in Maritime Domain Awareness\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gsts.ca\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/istockphoto-1350348767-170667a.webp\",\"datePublished\":\"2024-08-06T12:44:29+00:00\",\"dateModified\":\"2026-04-07T13:56:09+00:00\",\"description\":\"To make better informed decisions at the speed of relevance means increasing use of OSINT for verified but unclassified data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gsts.ca\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/istockphoto-1350348767-170667a.webp\",\"contentUrl\":\"https:\\\/\\\/gsts.ca\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/istockphoto-1350348767-170667a.webp\",\"width\":513,\"height\":336},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/gsts.ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Computing and OSINT in Maritime Domain Awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/#website\",\"url\":\"https:\\\/\\\/gsts.ca\\\/\",\"name\":\"GSTS\",\"description\":\"Navigate Tomorrow Today\",\"publisher\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gsts.ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/#organization\",\"name\":\"GSTS\",\"url\":\"https:\\\/\\\/gsts.ca\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/gsts.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/GSTS_tage_logo_RGB.jpg\",\"contentUrl\":\"https:\\\/\\\/gsts.ca\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/GSTS_tage_logo_RGB.jpg\",\"width\":1500,\"height\":900,\"caption\":\"GSTS\"},\"image\":{\"@id\":\"https:\\\/\\\/gsts.ca\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/gsts.ca\\\/#\\\/schema\\\/person\\\/20fb039dcbdd21abadf2746aceac4d3b\",\"name\":\"Akanksha Sharma\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c64a0483504a56a1b4c3512282fa903d8157d8da5546d07143692dce003cbcd5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c64a0483504a56a1b4c3512282fa903d8157d8da5546d07143692dce003cbcd5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c64a0483504a56a1b4c3512282fa903d8157d8da5546d07143692dce003cbcd5?s=96&d=mm&r=g\",\"caption\":\"Akanksha Sharma\"},\"url\":\"https:\\\/\\\/gsts.ca\\\/fr\\\/author\\\/akanksha-sharmagsts-ca\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Computing and OSINT in Maritime Domain Awareness","description":"To make better informed decisions at the speed of relevance means increasing use of OSINT for verified but unclassified data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gsts.ca\/fr\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/","og_locale":"fr_CA","og_type":"article","og_title":"Cloud Computing and OSINT in Maritime Domain Awareness","og_description":"To make better informed decisions at the speed of relevance means increasing use of OSINT for verified but unclassified data.","og_url":"https:\/\/gsts.ca\/fr\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/","og_site_name":"GSTS","article_published_time":"2024-08-06T12:44:29+00:00","article_modified_time":"2026-04-07T13:56:09+00:00","og_image":[{"width":513,"height":336,"url":"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/07\/istockphoto-1350348767-170667a.webp","type":"image\/webp"}],"author":"Akanksha Sharma","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Akanksha Sharma","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/#article","isPartOf":{"@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/"},"author":{"name":"Akanksha Sharma","@id":"https:\/\/gsts.ca\/#\/schema\/person\/20fb039dcbdd21abadf2746aceac4d3b"},"headline":"Cloud Computing and OSINT in Maritime Domain Awareness","datePublished":"2024-08-06T12:44:29+00:00","dateModified":"2026-04-07T13:56:09+00:00","mainEntityOfPage":{"@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/"},"wordCount":1546,"publisher":{"@id":"https:\/\/gsts.ca\/#organization"},"image":{"@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/07\/istockphoto-1350348767-170667a.webp","articleSection":["Whitepaper"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/","url":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/","name":"Cloud Computing and OSINT in Maritime Domain Awareness","isPartOf":{"@id":"https:\/\/gsts.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/#primaryimage"},"image":{"@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/07\/istockphoto-1350348767-170667a.webp","datePublished":"2024-08-06T12:44:29+00:00","dateModified":"2026-04-07T13:56:09+00:00","description":"To make better informed decisions at the speed of relevance means increasing use of OSINT for verified but unclassified data.","breadcrumb":{"@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/#primaryimage","url":"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/07\/istockphoto-1350348767-170667a.webp","contentUrl":"https:\/\/gsts.ca\/wp-content\/uploads\/2024\/07\/istockphoto-1350348767-170667a.webp","width":513,"height":336},{"@type":"BreadcrumbList","@id":"https:\/\/gsts.ca\/ociana-facilitating-information-at-the-speed-of-relevance-the-role-of-cloud-computing-and-open-source-intelligence-in-maritime-domain-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gsts.ca\/"},{"@type":"ListItem","position":2,"name":"Cloud Computing and OSINT in Maritime Domain Awareness"}]},{"@type":"WebSite","@id":"https:\/\/gsts.ca\/#website","url":"https:\/\/gsts.ca\/","name":"GSTS","description":"Naviguer demain d\u00e8s aujourd\u2019hui","publisher":{"@id":"https:\/\/gsts.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gsts.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/gsts.ca\/#organization","name":"GSTS","url":"https:\/\/gsts.ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/gsts.ca\/#\/schema\/logo\/image\/","url":"https:\/\/gsts.ca\/wp-content\/uploads\/2023\/01\/GSTS_tage_logo_RGB.jpg","contentUrl":"https:\/\/gsts.ca\/wp-content\/uploads\/2023\/01\/GSTS_tage_logo_RGB.jpg","width":1500,"height":900,"caption":"GSTS"},"image":{"@id":"https:\/\/gsts.ca\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/gsts.ca\/#\/schema\/person\/20fb039dcbdd21abadf2746aceac4d3b","name":"Akanksha Sharma","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/c64a0483504a56a1b4c3512282fa903d8157d8da5546d07143692dce003cbcd5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c64a0483504a56a1b4c3512282fa903d8157d8da5546d07143692dce003cbcd5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c64a0483504a56a1b4c3512282fa903d8157d8da5546d07143692dce003cbcd5?s=96&d=mm&r=g","caption":"Akanksha Sharma"},"url":"https:\/\/gsts.ca\/fr\/author\/akanksha-sharmagsts-ca\/"}]}},"_links":{"self":[{"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/posts\/1172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/comments?post=1172"}],"version-history":[{"count":0,"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/posts\/1172\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/media\/1175"}],"wp:attachment":[{"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/media?parent=1172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/categories?post=1172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gsts.ca\/fr\/wp-json\/wp\/v2\/tags?post=1172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}