{"id":9630,"date":"2022-05-30T10:45:27","date_gmt":"2022-05-30T15:45:27","guid":{"rendered":"https:\/\/colombiainteligente.org\/?p=9630"},"modified":"2022-12-30T10:47:53","modified_gmt":"2022-12-30T15:47:53","slug":"hacktivismo-y-ciberyihadismo","status":"publish","type":"post","link":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/hacktivismo-y-ciberyihadismo\/","title":{"rendered":"Hacktivismo y ciberyihadismo"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"9630\" class=\"elementor elementor-9630\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79148795 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79148795\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1ece4ebf\" data-id=\"1ece4ebf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a61c7e5 elementor-widget elementor-widget-text-editor\" data-id=\"7a61c7e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>El CCN-CERT es la Capacidad de Respuesta a incidentes de Seguridad de la Informaci\u00f3n del Centro Criptol\u00f3gico Nacional, CCN, adscrito al Centro Nacional de Inteligencia, CNI. Este \u00a0servicio se cre\u00f3 en el a\u00f1o 2006 como CERT Gubernamental Nacional espa\u00f1ol y sus funciones quedan recogidas en la Ley 11\/2002 reguladora del CNI, el RD 421\/2004 de regulaci\u00f3n del CCN y en el RD 3\/2010, de 8 de enero, regulador del Esquema Nacional de Seguridad (ENS), modificado por el RD 951\/2015 de 23 de octubre.<\/p><p>Las caracter\u00edsticas del hacktivismo aut\u00f3ctono en Espa\u00f1a durante 2021 no han mostrado diferencias respecto al a\u00f1o anterior y, en general, la \u00faltima media d\u00e9cada.<\/p><p>En resumidas cuentas, en Espa\u00f1a no opera un tejido hacktivista propiamente originado en el pa\u00eds, m\u00e1s all\u00e1 de una m\u00ednima actividad de propaganda en redes sociales por parte de identidades que utilizan iconograf\u00eda hacktivista.<\/p><p>\u00a0Para leer m\u00e1s ingrese a:<\/p><p>\u00a0<a href=\"https:\/\/www.ccn-cert.cni.es\/\">https:\/\/www.ccn-cert.cni.es\/<\/a><\/p><p>\u00a0<a href=\"https:\/\/www.ccn-cert.cni.es\/informes\/informes-ccn-cert-publicos\/6597-ccn-cert-ia-03-22-informe-anual-2021-hacktivismo-y-ciberyihadismo-paginas-enfrentadas-1\/file.html\">https:\/\/www.ccn-cert.cni.es\/informes\/informes-ccn-cert-publicos\/6597-ccn-cert-ia-03-22-informe-anual-2021-hacktivismo-y-ciberyihadismo-paginas-enfrentadas-1\/file.html<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div style=\"text-align:center\" class=\"yasr-auto-insert-visitor\"><\/div>","protected":false},"excerpt":{"rendered":"<p>El CCN-CERT es la Capacidad de Respuesta a incidentes de Seguridad de la Informaci\u00f3n del Centro Criptol\u00f3gico Nacional, CCN, adscrito al Centro Nacional de Inteligencia, CNI. Este  servicio se cre\u00f3 en el a\u00f1o 2006 como CERT Gubernamental Nacional espa\u00f1ol y sus funciones quedan recogidas en la Ley 11\/2002 reguladora del CNI, el RD 421\/2004 de regulaci\u00f3n del CCN y en el RD 3\/2010, de 8 de enero, regulador del Esquema Nacional de Seguridad (ENS), modificado por el RD 951\/2015 de 23 de octubre.<\/p>","protected":false},"author":23,"featured_media":9631,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[56,53],"tags":[],"class_list":["post-9630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-convergencia-y-sostenibilidad","category-tendencias"],"yasr_visitor_votes":{"number_of_votes":0,"sum_votes":0,"stars_attributes":{"read_only":false,"span_bottom":false}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacktivismo y ciberyihadismo - Colombia Inteligente<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/hacktivismo-y-ciberyihadismo\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacktivismo y ciberyihadismo - Colombia Inteligente\" \/>\n<meta property=\"og:description\" content=\"El CCN-CERT es la Capacidad de Respuesta a incidentes de Seguridad de la Informaci\u00f3n del Centro Criptol\u00f3gico Nacional, CCN, adscrito al Centro Nacional de Inteligencia, CNI. Este servicio se cre\u00f3 en el a\u00f1o 2006 como CERT Gubernamental Nacional espa\u00f1ol y sus funciones quedan recogidas en la Ley 11\/2002 reguladora del CNI, el RD 421\/2004 de regulaci\u00f3n del CCN y en el RD 3\/2010, de 8 de enero, regulador del Esquema Nacional de Seguridad (ENS), modificado por el RD 951\/2015 de 23 de octubre.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/hacktivismo-y-ciberyihadismo\/\" \/>\n<meta property=\"og:site_name\" content=\"Colombia Inteligente\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-30T15:45:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-30T15:47:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Hacktivismo-y-ciberyihadismo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"388\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:site\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/\"},\"author\":{\"name\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/e207145d548b75a6d339ff1d4d3b0432\"},\"headline\":\"Hacktivismo y ciberyihadismo\",\"datePublished\":\"2022-05-30T15:45:27+00:00\",\"dateModified\":\"2022-12-30T15:47:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/\"},\"wordCount\":175,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Hacktivismo-y-ciberyihadismo.jpg\",\"articleSection\":[\"Convergencia y Sostenibilidad\",\"Tendencias\"],\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/\",\"name\":\"Hacktivismo y ciberyihadismo - Colombia Inteligente\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Hacktivismo-y-ciberyihadismo.jpg\",\"datePublished\":\"2022-05-30T15:45:27+00:00\",\"dateModified\":\"2022-12-30T15:47:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/#primaryimage\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Hacktivismo-y-ciberyihadismo.jpg\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Hacktivismo-y-ciberyihadismo.jpg\",\"width\":388,\"height\":543,\"caption\":\"Hacktivismo-y-ciberyihadismo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/hacktivismo-y-ciberyihadismo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/colombiainteligente.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacktivismo y ciberyihadismo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"name\":\"Colombia Inteligente\",\"description\":\"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano\",\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/colombiainteligente.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\",\"name\":\"Colombia Inteligente\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"width\":588,\"height\":274,\"caption\":\"Colombia Inteligente\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/colombiaintelig\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/colombiainteligente\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/e207145d548b75a6d339ff1d4d3b0432\",\"name\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"caption\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\"},\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/es_co\\\/author\\\/difusioncolombiainteligente-org\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacktivismo y ciberyihadismo - Colombia Inteligente","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/hacktivismo-y-ciberyihadismo\/","og_locale":"es_ES","og_type":"article","og_title":"Hacktivismo y ciberyihadismo - Colombia Inteligente","og_description":"El CCN-CERT es la Capacidad de Respuesta a incidentes de Seguridad de la Informaci\u00f3n del Centro Criptol\u00f3gico Nacional, CCN, adscrito al Centro Nacional de Inteligencia, CNI. Este servicio se cre\u00f3 en el a\u00f1o 2006 como CERT Gubernamental Nacional espa\u00f1ol y sus funciones quedan recogidas en la Ley 11\/2002 reguladora del CNI, el RD 421\/2004 de regulaci\u00f3n del CCN y en el RD 3\/2010, de 8 de enero, regulador del Esquema Nacional de Seguridad (ENS), modificado por el RD 951\/2015 de 23 de octubre.","og_url":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/hacktivismo-y-ciberyihadismo\/","og_site_name":"Colombia Inteligente","article_published_time":"2022-05-30T15:45:27+00:00","article_modified_time":"2022-12-30T15:47:53+00:00","og_image":[{"width":388,"height":543,"url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Hacktivismo-y-ciberyihadismo.jpg","type":"image\/jpeg"}],"author":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","twitter_card":"summary_large_image","twitter_creator":"@colombiaintelig","twitter_site":"@colombiaintelig","twitter_misc":{"Escrito por":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","Tiempo estimado de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/#article","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/"},"author":{"name":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/e207145d548b75a6d339ff1d4d3b0432"},"headline":"Hacktivismo y ciberyihadismo","datePublished":"2022-05-30T15:45:27+00:00","dateModified":"2022-12-30T15:47:53+00:00","mainEntityOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/"},"wordCount":175,"commentCount":0,"publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Hacktivismo-y-ciberyihadismo.jpg","articleSection":["Convergencia y Sostenibilidad","Tendencias"],"inLanguage":"es-CO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/","url":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/","name":"Hacktivismo y ciberyihadismo - Colombia Inteligente","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/#primaryimage"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Hacktivismo-y-ciberyihadismo.jpg","datePublished":"2022-05-30T15:45:27+00:00","dateModified":"2022-12-30T15:47:53+00:00","breadcrumb":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/"]}]},{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/#primaryimage","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Hacktivismo-y-ciberyihadismo.jpg","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/Hacktivismo-y-ciberyihadismo.jpg","width":388,"height":543,"caption":"Hacktivismo-y-ciberyihadismo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/colombiainteligente.org\/tendencias\/hacktivismo-y-ciberyihadismo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/colombiainteligente.org\/"},{"@type":"ListItem","position":2,"name":"Hacktivismo y ciberyihadismo"}]},{"@type":"WebSite","@id":"https:\/\/colombiainteligente.org\/#website","url":"https:\/\/colombiainteligente.org\/","name":"Colombia Inteligente","description":"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano","publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/colombiainteligente.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/colombiainteligente.org\/#organization","name":"Colombia Inteligente","url":"https:\/\/colombiainteligente.org\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","width":588,"height":274,"caption":"Colombia Inteligente"},"image":{"@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/colombiaintelig","https:\/\/www.linkedin.com\/company\/colombiainteligente\/"]},{"@type":"Person","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/e207145d548b75a6d339ff1d4d3b0432","name":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","caption":"DIFUSI\u00d3N COLOMBIA INTELIGENTE"},"url":"https:\/\/colombiainteligente.org\/es_co\/author\/difusioncolombiainteligente-org\/"}]}},"_links":{"self":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/comments?post=9630"}],"version-history":[{"count":4,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9630\/revisions"}],"predecessor-version":[{"id":9683,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9630\/revisions\/9683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media\/9631"}],"wp:attachment":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media?parent=9630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/categories?post=9630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/tags?post=9630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}