{"id":24245,"date":"2026-04-19T21:04:02","date_gmt":"2026-04-19T20:04:02","guid":{"rendered":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/"},"modified":"2026-04-19T21:04:02","modified_gmt":"2026-04-19T20:04:02","slug":"hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe","status":"publish","type":"post","link":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/","title":{"rendered":"Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe"},"content":{"rendered":"<p>Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex challenge. Put simply, it&#8217;s about achieving strategic goals through a mix of conventional and unconventional tactics, often designed to blur the lines and keep adversaries off balance.<\/p>\n<h3>What is Hybrid Warfare in the European Context?<\/h3>\n<p>Hybrid warfare is essentially a sophisticated form of conflict that avoids outright military engagement while still aiming to destabilise and undermine a target nation or bloc. In Europe\u2019s current landscape, this translates to a deliberate and coordinated application of various tools and tactics, often deployed below the threshold of a declaration of war. The goal is typically to create confusion, sow discord, and weaken a target\u2019s political will and societal cohesion. It\u2019s less about tanks rolling across borders and more about nudging perceptions, disrupting systems, and eroding trust.<\/p>\n<h4>The Blurred Lines of Conflict<\/h4>\n<p>The inherent nature of hybrid warfare is its ambiguity. Traditionally, warfare was clearly defined by clear adversaries, declared intentions, and observable military actions. Hybrid warfare deliberately blurs these lines, making attribution difficult and response challenging. This ambiguity is a key weapon, allowing perpetrators to deny involvement or claim plausible deniability.<\/p>\n<h3>Cyber Attacks as a Primary Tool<\/h3>\n<p>Cyber attacks are central to modern hybrid warfare in Europe. These aren&#8217;t just random hacks; they\u2019re targeted operations designed to cause specific damage or disruption. We&#8217;re talking about more than just phishing emails; these are sophisticated intrusions that can cripple critical infrastructure, steal sensitive information, or influence public opinion.<\/p>\n<h4>Disrupting Critical Infrastructure<\/h4>\n<p>Imagine essential services grinding to a halt: power grids flickering, water treatment plants faltering, or transportation networks seizing up. Cyber attacks can achieve precisely this. By targeting the digital backbone of a nation, adversaries can create widespread panic and economic damage without firing a shot. This often involves exploiting vulnerabilities in industrial control systems (ICS) or Supervisory Control and Data Acquisition (SCADA) systems, which manage many of our vital utilities.<\/p>\n<h5>Targeting Energy Networks<\/h5>\n<p>The energy sector is a prime target. A successful attack on an electricity grid could have cascading effects, impacting everything from hospitals to businesses to homes. The motivation here is clear: to create widespread disruption and demonstrate vulnerability.<\/p>\n<h5>Impacting Public Services<\/h5>\n<p>Beyond energy, attacks on healthcare systems can disrupt patient care, while targeting financial institutions can cause economic instability. The interconnectedness of modern society means that a breach in one area can have far-reaching consequences.<\/p>\n<h4>Espionage and Information Theft<\/h4>\n<p>Beyond outright disruption, cyber attacks are also extensively used for espionage. Sensitive government documents, industrial secrets, or personal data of influential figures can be exfiltrated. This stolen information can then be used for blackmail, to gain a strategic advantage, or to discredit individuals and institutions.<\/p>\n<h5>Gaining Strategic Intelligence<\/h5>\n<p>The acquisition of classified military or political intelligence is a significant objective for states engaging in hybrid warfare. This allows them to understand their adversaries&#8217; plans and capabilities, informing their own strategic decision-making.<\/p>\n<h5>Undermining Public Trust<\/h5>\n<p>The exposure of leaked, often embarrassing or compromising, information can be deliberately timed to coincide with elections or other significant political events, aiming to erode public trust in governments and democratic processes.<\/p>\n<h4>Disinformation Campaigns Amplified by Cyber Means<\/h4>\n<p>Cyber capabilities are not just about breaching systems; they are crucial for amplifying disinformation. Social media platforms, hacked news sites, and state-sponsored troll farms are all part of the cyber arsenal used to spread false narratives and manipulate public opinion.<\/p>\n<h5>Exploitng Social Media Vulnerabilities<\/h5>\n<p>Social media\u2019s speed and reach make it an ideal vector for disinformation. Coordinated campaigns can create echo chambers, reinforce existing biases, and introduce entirely fabricated narratives that gain traction rapidly.<\/p>\n<h5>Creating &#8216;Fake News&#8217; Ecosystems<\/h5>\n<p>Sophisticated actors can create entirely fabricated news outlets, complete with professional-looking websites and social media presences, to lend an air of legitimacy to their disinformation efforts.<\/p>\n<h3>The Role of Political Influence Operations<\/h3>\n<p>Alongside cyber attacks, political influence operations are a cornerstone of hybrid warfare in Europe. These efforts aim to shape political discourse, influence elections, and undermine democratic institutions from within. They often play on existing societal divisions and grievances.<\/p>\n<h4>Interfering in Elections<\/h4>\n<p>This is perhaps one of the most visible forms of political influence. Efforts can range from spreading misleading information about candidates and electoral processes to enabling foreign funding of political campaigns or even directly manipulating voting systems, although the latter is far more technically demanding and thus less commonly proven. The goal is to sway election outcomes in favour of a particular agenda.<\/p>\n<h5>Spreading Propaganda and Misinformation<\/h5>\n<p>Targeted campaigns aim to discredit certain politicians or parties and promote others, often through emotionally charged or misleading content designed to resonate with specific voter demographics.<\/p>\n<h5>Amplifying Divisive Narratives<\/h5>\n<p>Existing societal tensions, whether they are related to immigration, economic inequality, or cultural differences, are often exploited and amplified to create political polarisation and instability.<\/p>\n<h4>Undermining Trust in Institutions<\/h4>\n<p>Hybrid warfare seeks to erode faith in democratic institutions, the media, and the rule of law. When citizens lose trust in their government or their electoral systems, the foundations of a stable society begin to weaken. This can make populations more susceptible to external influence.<\/p>\n<h5>Questioning Electoral Integrity<\/h5>\n<p>Propaganda aimed at suggesting that elections are rigged or unfair can lead to widespread disillusionment and a decreased willingness to participate in the democratic process.<\/p>\n<h5>Discrediting Mainstream Media<\/h5>\n<p>By promoting alternative, often state-controlled or ideologically aligned, news sources and labelling established media as biased or inauthentic, hybrid actors aim to control the narrative.<\/p>\n<h4>Fomenting Social and Political Unrest<\/h4>\n<p>By exacerbating existing societal divisions and promoting extremist viewpoints, hybrid actors can contribute to increased social fragmentation and political instability, making a nation more vulnerable to external pressure.<\/p>\n<h5>Supporting Extremist Groups<\/h5>\n<p>Though often covertly, certain actors may provide support, whether financial or through facilitating propaganda, to extremist factions within a target country to amplify their message and disrupt the political landscape.<\/p>\n<h3>Deniability and the Challenge of Attribution<\/h3>\n<p>A key feature of hybrid warfare, and a significant challenge for those on the receiving end, is the difficulty in attributing attacks and influence operations. This allows perpetrators to operate with a degree of impunity.<\/p>\n<h4>Plausible Deniability<\/h4>\n<p>The sophisticated nature of cyber attacks and the covert methods used in political influence campaigns often make it exceedingly difficult to definitively link them to a specific state actor. This allows for a policy of plausible deniability, where the perpetrator can simply deny involvement, leaving the target nation in a state of uncertainty.<\/p>\n<h5>Sophisticated Hacking Techniques<\/h5>\n<p>The use of advanced persistent threats (APTs) and other sophisticated hacking tools means that attacks can be meticulously planned and executed to leave minimal traces.<\/p>\n<h5>Proxy Actors and Cut-outs<\/h5>\n<p>Perpetrators often utilise proxy actors, third-party groups, or cyber mercenaries to carry out attacks, further obscuring the trail back to the original state sponsor.<\/p>\n<h4>The Importance of Intelligence and Forensics<\/h4>\n<p>Overcoming the challenge of attribution relies heavily on robust intelligence gathering and advanced cyber forensics. Tracing the origins of an attack, analysing malware, and mapping communication networks are crucial steps in identifying responsible parties.<\/p>\n<h5>Cross-Agency Cooperation<\/h5>\n<p>Effective attribution requires close collaboration between intelligence agencies, law enforcement, and national cybersecurity centres.<\/p>\n<h5>International Collaboration<\/h5>\n<p>Disseminating information and collaborating with international partners is vital, as hybrid threats often cross national borders.<\/p>\n<h3>Responding to Hybrid Threats in Europe<\/h3>\n<p>Defending against hybrid warfare requires a multi-faceted approach that goes beyond traditional military defence. It necessitates a strengthening of societal resilience and a proactive stance in both the digital and political spheres.<\/p>\n<h4>Enhancing Cyber Defences<\/h4>\n<p>Investing in robust cybersecurity infrastructure and capabilities is paramount. This includes strengthening national networks, developing rapid response mechanisms, and fostering a skilled cybersecurity workforce.<\/p>\n<h5>Government and Private Sector Synergy<\/h5>\n<p>A coordinated effort between government bodies and private sector companies is essential. Many critical infrastructure elements are privately owned, requiring strong partnerships.<\/p>\n<h5>Public Awareness and Education<\/h5>\n<p>A well-informed public is a more resilient public. Educating citizens about the risks of disinformation and the importance of critical thinking is a crucial long-term defence strategy.<\/p>\n<h4>Strengthening Democratic Resilience<\/h4>\n<p>Protecting democratic processes requires safeguarding electoral integrity, promoting media literacy, and fostering an environment where civil discourse can thrive, even amidst disagreement.<\/p>\n<h5>Electoral Security Measures<\/h5>\n<p>Implementing stringent measures to secure electoral systems against cyber interference and disinformation campaigns is vital for maintaining public confidence.<\/p>\n<h5>Supporting Independent Journalism<\/h5>\n<p>A strong and independent media is a crucial bulwark against disinformation. Supporting and protecting journalistic integrity is therefore a key element of defence.<\/p>\n<h4>Strategic Communication and Counter-Disinformation<\/h4>\n<p>Developing clear, consistent, and credible communication strategies is essential to counter false narratives and build public trust. This involves not only debunking disinformation but also proactively communicating truthful and transparent information.<\/p>\n<h5>Proactive Information Sharing<\/h5>\n<p>Governments and institutions need to be proactive in sharing accurate information with the public, especially during times of potential crisis or heightened geopolitical tension.<\/p>\n<h5>Building Alliances Against Disinformation<\/h5>\n<p>Working with allies and international organisations to expose and counter disinformation efforts is a critical component of a comprehensive defence strategy.<\/p>\n<p>Hybrid warfare in Europe is a persistent and evolving challenge. By understanding its components \u2013 the intricate dance of cyber attacks and political influence operations \u2013 Europe can better equip itself to identify, deter, and ultimately defend against these subtle yet significant threats to its security and stability.<\/p>\n<p><\/p>\n<h2>FAQs<\/h2>\n<p><\/p>\n<h3>What is hybrid warfare?<\/h3>\n<p>Hybrid warfare is a military strategy that combines conventional warfare, irregular warfare, and cyber warfare. It involves a combination of military, political, economic, and informational tactics to achieve strategic objectives.<\/p>\n<h3>How are cyber attacks used in hybrid warfare?<\/h3>\n<p>Cyber attacks are used in hybrid warfare to disrupt communication networks, sabotage critical infrastructure, steal sensitive information, and spread disinformation. These attacks can be carried out by state-sponsored hackers or non-state actors.<\/p>\n<h3>What is the role of political influence in hybrid warfare?<\/h3>\n<p>Political influence is a key component of hybrid warfare, involving efforts to manipulate public opinion, influence decision-making processes, and undermine the legitimacy of governments. This can be achieved through propaganda, covert operations, and support for political proxies.<\/p>\n<h3>How is Europe affected by hybrid warfare?<\/h3>\n<p>Europe has been a target of hybrid warfare tactics, including cyber attacks and political influence campaigns. These tactics have been used to exploit existing divisions, undermine democratic institutions, and challenge the security and stability of European countries.<\/p>\n<h3>What are the implications of hybrid warfare for European security?<\/h3>\n<p>Hybrid warfare poses significant challenges to European security, as it blurs the lines between military and non-military threats. It requires a comprehensive and coordinated response from European governments, including improved cyber defences, enhanced intelligence sharing, and efforts to counter disinformation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yoast_wpseo_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"_yoast_wpseo_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe"],"yoast_wpseo_metadesc":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"_yoast_wpseo_metadesc":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"rank_math_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"_rank_math_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"rank_math_description":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"_rank_math_description":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"aioseo_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"_aioseo_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"aioseo_description":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"_aioseo_description":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"seopress_titles_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"_seopress_titles_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"seopress_titles_desc":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"_seopress_titles_desc":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"genesis_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"_genesis_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"genesis_description":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"_genesis_description":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"sq_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"_sq_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"sq_description":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"_sq_description":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"wds_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"_wds_title":["Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\r"],"wds_metadesc":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."],"_wds_metadesc":["Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex.."]},"categories":[10],"tags":[],"class_list":["post-24245","post","type-post","status-publish","format-standard","hentry","category-geography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe<\/title>\n<meta name=\"description\" content=\"Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex..\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe\" \/>\n<meta property=\"og:description\" content=\"Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex..\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/\" \/>\n<meta property=\"og:site_name\" content=\"Earth Site Education\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Earth-Site-Education\/61556359432402\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-19T20:04:02+00:00\" \/>\n<meta name=\"author\" content=\"Keir Chapman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Keir Chapman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe","description":"Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex..","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/","og_locale":"en_GB","og_type":"article","og_title":"Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe","og_description":"Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex..","og_url":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/","og_site_name":"Earth Site Education","article_publisher":"https:\/\/www.facebook.com\/people\/Earth-Site-Education\/61556359432402\/","article_published_time":"2026-04-19T20:04:02+00:00","author":"Keir Chapman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Keir Chapman","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/#article","isPartOf":{"@id":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/"},"author":{"name":"Keir Chapman","@id":"https:\/\/www.earth-site.co.uk\/Education\/#\/schema\/person\/f028ca91f88fe2e9e578f24056a12819"},"headline":"Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe","datePublished":"2026-04-19T20:04:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/"},"wordCount":1764,"commentCount":0,"publisher":{"@id":"https:\/\/www.earth-site.co.uk\/Education\/#organization"},"articleSection":["Geography"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/","url":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/","name":"Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe","isPartOf":{"@id":"https:\/\/www.earth-site.co.uk\/Education\/#website"},"datePublished":"2026-04-19T20:04:02+00:00","description":"Hybrid warfare isn\u2019t a new concept in Europe, but its modern manifestation, blending cyber attacks with political influence, is a complex..","breadcrumb":{"@id":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.earth-site.co.uk\/Education\/hybrid-warfare-explained-cyber-attacks-and-political-influence-in-europe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.earth-site.co.uk\/Education\/"},{"@type":"ListItem","position":2,"name":"Hybrid Warfare Explained: Cyber Attacks and Political Influence in Europe"}]},{"@type":"WebSite","@id":"https:\/\/www.earth-site.co.uk\/Education\/#website","url":"https:\/\/www.earth-site.co.uk\/Education\/","name":"Earth Site Education","description":"","publisher":{"@id":"https:\/\/www.earth-site.co.uk\/Education\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.earth-site.co.uk\/Education\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.earth-site.co.uk\/Education\/#organization","name":"Earth Site Education","url":"https:\/\/www.earth-site.co.uk\/Education\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.earth-site.co.uk\/Education\/#\/schema\/logo\/image\/","url":"https:\/\/www.earth-site.co.uk\/Education\/wp-content\/uploads\/2024\/06\/LogoYouTube.png","contentUrl":"https:\/\/www.earth-site.co.uk\/Education\/wp-content\/uploads\/2024\/06\/LogoYouTube.png","width":800,"height":800,"caption":"Earth Site Education"},"image":{"@id":"https:\/\/www.earth-site.co.uk\/Education\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/Earth-Site-Education\/61556359432402\/"]},{"@type":"Person","@id":"https:\/\/www.earth-site.co.uk\/Education\/#\/schema\/person\/f028ca91f88fe2e9e578f24056a12819","name":"Keir Chapman","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/93795f5d72a690673db58fc60779e6bb369542d93350bb5432476175ff04c468?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93795f5d72a690673db58fc60779e6bb369542d93350bb5432476175ff04c468?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93795f5d72a690673db58fc60779e6bb369542d93350bb5432476175ff04c468?s=96&d=mm&r=g","caption":"Keir Chapman"},"url":"https:\/\/www.earth-site.co.uk\/Education\/author\/keirearthsiteadmin-7\/"}]}},"_links":{"self":[{"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/posts\/24245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/comments?post=24245"}],"version-history":[{"count":0,"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/posts\/24245\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/media?parent=24245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/categories?post=24245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.earth-site.co.uk\/Education\/wp-json\/wp\/v2\/tags?post=24245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}