{"id":2798,"date":"2021-04-07T13:56:47","date_gmt":"2021-04-07T13:56:47","guid":{"rendered":"https:\/\/www.getstoryshots.com\/?page_id=2798"},"modified":"2024-10-04T13:51:35","modified_gmt":"2024-10-04T13:51:35","slug":"permanent-record-summary","status":"publish","type":"post","link":"https:\/\/www.getstoryshots.com\/pt\/books\/permanent-record-summary\/","title":{"rendered":"Revis\u00e3o Resenha de Registro Permanente | Livro de Edward Snowden"},"content":{"rendered":"\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/www.getstoryshots.com\/wp-content\/uploads\/Permanent-Record-summary-audiobook.mp3\"><\/audio><\/figure>\n\n\n\n<p>Life gets busy. Has&nbsp;<a href=\"https:\/\/geni.us\/snowden-free-audiobook\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/geni.us\/snowden-free-audiobook\" target=\"_blank\" rel=\"noopener\">Permanent Record<\/a>&nbsp;been gathering dust on your bookshelf? Instead, pick up some of the key ideas now.<\/p>\n\n\n\n<p>We\u2019re scratching the surface here. If you don\u2019t already have the book, order the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/geni.us\/permanent-record-book\" target=\"_blank\">book<\/a>&nbsp;or get the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/geni.us\/snowden-free-audiobook\" target=\"_blank\">audiobook for free<\/a>&nbsp;on Amazon to learn the juicy details.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction to Permanent Record<\/h2>\n\n\n\n<p><a href=\"https:\/\/geni.us\/snowden-free-audiobook\" target=\"_blank\" rel=\"noopener\">Permanent Record<\/a> is an autobiography by Edward Snowden, whose revelations sparked a global debate about surveillance. He released his memoir six years after his disclosure of classified materials that revealed the National Security Agency\u2019s domestic surveillance. Mr. Snowden wrote the book to make people aware of the government\u2019s domestic surveillance and to contribute to a discussion about privacy rights.&nbsp;<\/p>\n\n\n\n<p>The first part of Permanent Record is mostly personal. He recounts his early years, much of which he spent behind a computer. He writes of his discovery and reporting of a vulnerability in Los Alamos National Laboratory\u2019s website, the country\u2019s nuclear research facility. At this point, he was just a teen. He would often stay up late exploring uncharted online territories during the internet\u2019s earliest days. Snowden struggled to stay engaged with school and failed to complete assignments. \u201cYou have so much potential, Ed,\u201d said one teacher, who pulled him aside after class. \u201cYou have to start thinking about your permanent record.\u201d<\/p>\n\n\n\n<p>Those curious about why and how he disclosed top-secret information might be most interested in the second and third parts of the book. These parts cover his years working in the intelligence community. Upon release, the United States filed a lawsuit against Snowden for alleged violations of non-disclosure agreements with the CIA and NSA. The lawsuit does not aim to restrict the book\u2019s content or distribution but capture the proceeds Snowden is earning from it. The book has been censored in China, with the removed content including comments about authoritarian states, privacy-supporting technologies, and the right to privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Edward Snowden&#8217;s Perspective<\/h2>\n\n\n\n<p><a href=\"https:\/\/geni.us\/edward-snowden-bio\" target=\"_blank\" rel=\"noopener\">Edward Snowden<\/a> is an American whistleblower who copied and leaked highly classified information from the National Security Agency (NSA) in 2013. He did so while he was a Central Intelligence Agency (CIA) employee and subcontractor. His disclosures revealed numerous global surveillance programs. Many of these were run by the NSA and the Five Eyes Intelligence Alliance with the cooperation of telecommunication companies and European governments. This act prompted a cultural discussion about national security and individual privacy. His disclosures have fueled debates over mass surveillance, government secrecy, and the balance between national security and information privacy.<\/p>\n\n\n\n<p>\u201cThe reason you\u2019re reading this book is that I did a dangerous thing for a man in my position: I decided to tell the truth.\u201d &#8211; Edward Snowden<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Snowden\u2019s Call To Protect His Country<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">A Young Talent<\/h3>\n\n\n\n<p>Snowden was technologically talented from a young age. Throughout his teenage years, he learned more and more about hacking. At the age of 16, Snowden\u2019s hacking skills were becoming highly developed. Eventually, he caught the attention of Mae, a woman who recruited him as a freelancer for her online business. At $30\/hour cash, Snowden worked from her townhouse doing web design. During this job, he realized that he needed further education if he wanted a future in IT. After this realization, Snowden signed up for a Microsoft certification course. This was a substantial commitment as he had to pay for it through loans.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9\/11&#8217;s Impact on Snowden<\/h3>\n\n\n\n<p>9\/11 was the event that sparked Snowden\u2019s patriotism. He remembers hearing the news of the attack on the World Trade Center. After the terrorist attack, Mae advised him to return home and be with his family. So, Snowden began his drive home. On the way, he passed the NSA headquarters and watched the frantic employees fleeing the building in fear. Seeing such a sight sparked a patriotic urge from Snowden to join the military. He felt a call to use his computer skills to protect America. That said, he didn\u2019t have a college degree and had no desire to earn one. His solution was enlisting in the Coast Guard.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Training to Be a Soldier<\/h3>\n\n\n\n<p>After intense testing, Snowden qualified for the 18 X-Ray program. This program was designed for soldiers with the highest physical and mental abilities. The hope was that these soldiers would later become Special Forces sergeants. Before enlisting, Snowden and the other talented soldiers had to attend basic training at Fort Benning, Georgia. Only a few months in, Snowden fractured his ankle, and he could not continue his military training. This rehab period gave him time to think about his future. He knew that the only way he could serve his country was using his computer skills. So, he decided to attempt to obtain the hardest security clearance possible: TS\/SCI. TS\/SCI is the clearance needed to work for the CIA and NSA. Obtaining such clearance would require an extensive background check. For example, the government would interview his friends and family members and examine his internet history.<\/p>\n\n\n\n<p>During this background check, government agents would have noticed his recent activity on a website called HotOrNot.com. On this dating website, users rate others\u2019 pictures and talk to them. Here, Snowden met Lindsay Mills. They hit it off immediately. At the age of 22, Snowden qualified for the TS\/SCI while also falling madly in love with his girlfriend.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Snowden\u2019s First CIA Job<\/h2>\n\n\n\n<p>Snowden began his career by working with the University of Maryland as a security guard. He knew this was a small step in the right direction as the university worked with the NSA. That said, Snowden realized that if he wanted to truly serve his country, he would be better off working for a private-sector company.<\/p>\n\n\n\n<p>Soon Snowden was hired as a subcontractor working for COSMO. Here, he was a systems administrator at CIA headquarters in Mclean, Virginia. The first stage of training involved him and his fellow recruits being sworn to secrecy. They were even shown a presentation about what happened to former contractors and agents who leaked information and had been punished for doing so.&nbsp;<\/p>\n\n\n\n<p>His role as the CIA\u2019s Directorate of Support meant Snowden helped manage servers for the CIA\u2019s Washington-Metropolitan area. He held the cryptographic keys that kept CIA secrets safe. Snowden took pride in his new position where he sat twelve hours each night in a secure office, ensuring that the servers functioned properly. Though, Snowden realized he also wanted to get out and see the world.<\/p>\n\n\n\n<p>After nine months of working in the private sector, Snowden applied and was accepted to work a CIA tech job abroad. Before starting, Snowden had to train as a Technical Information Security Officer (TISO) for six months. TISOs are responsible for handling the technology behind any intelligence operation. They are employed at every US embassy in the world. That said, this training was anything but glamorous. Living in a shabby motel, Snowden and his fellow students were tired of spending every hour of every day in such awful conditions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Snowden Uncovers a Top-Secret Program By Accident<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Learning About Government Surveillance<\/h3>\n\n\n\n<p>While working in Geneva, Snowden found himself in the middle of the US\u2019 transition to technology-based intelligence. Snowden worked with CIA case officers to help them navigate new technology that collected information on their targets. He taught these officers how to mask themselves on the internet and remain anonymous online. Snowden enjoyed his job, but he had yet to realize the full potential of the technology he was working with.<\/p>\n\n\n\n<p>In 2009, Snowden moved to Japan to work for the NSA at the Pacific Technical Center (PTC) at Yokota Air Base. Snowden was asked to attend a conference in Hong Kong and give a presentation on China\u2019s capability to track American assets. During his research, Snowden learned how the Chinese government tracks its own citizens. They can see and hear everything they do. This worried Snowden, and he wondered if America were doing the same.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The PSP Report<\/h3>\n\n\n\n<p>This experience encouraged Snowden to do some more digging, and he began reading unclassified reports on the President\u2019s Surveillance Program (PSP). After 9\/11, this program allowed the government to tap into phone calls without a warrant. The PSP report was actually released to the public by the government. Though, when Snowden attempted to do some more research, he couldn\u2019t find anything. Miraculously, the report wound up on his desk just a few months later. He realized the report had been marked as Exceptionally Controlled Information (ECI), meaning it remained confidential even to those with top security clearance. He received the report through a glitch in the system. Snowden expected to discover the report released to the public. Still, he was shocked to find that this report was significantly different.<\/p>\n\n\n\n<p>The report detailed a program named STELLARWIND, which was the NSA\u2019s most closely guarded secret. Since 2001, the program has been collecting communications through metadata. Metadata is the tags and markers that record everything done on your devices, as well as what your devices do by themselves. Metadata allows intelligence to know where you are at any moment, who you\u2019ve been communicating with, and everything in your browser history. It can tell where you\u2019ve been and even where you are headed next. In other words, STELLARWIND was a massive surveillance program that enabled the US government to spy on its citizens at all times.<\/p>\n\n\n\n<p>Keeping this knowledge a secret hurt Snowden and caused him to fall into depression. He also began to experience seizures on top of his already debilitating depression.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Snowden Takes the First Steps To Expose the Government\u2019s Secrets<\/h2>\n\n\n\n<p>\u201cThe freedom of a country can only be measured by its respect for the rights of its citizens, and it\u2019s my conviction that these rights are in fact limitations of state power that define exactly where and when a government may not infringe into that domain of personal or individual freedoms that during the American Revolution was called \u201cliberty\u201d and during the Internet Revolution is called \u201cprivacy.\u201d &#8211; Edward Snowden<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Snowden Streamlined His Whistleblowing<\/h3>\n\n\n\n<p>To help recover from his illnesses, Snowden took an NSA position in Hawaii. He decided to use his extra time to learn more about the NSA surveillance program. So, Snowden stayed up to date on technology by checking the NSA\u2019s \u201creading boards.\u201d These boards served as a daily digital bulletin board for the NSA. They consisted of internal news blogs based on classified intelligence activities.<\/p>\n\n\n\n<p>Snowden needed to come up with a way to streamline his browsing and make it more efficient. So, Snowden created a program called Heartbeat. Heartbeat compiled any new information and reports from these \u201creading boards\u201d into a single news feed. It was through Heartbeat that Snowden obtained most of the documents that he would later share with journalists. This includes an order that allowed the NSA to collect metadata from companies like Verizon and AT&amp;T. The order also included PRISM, which enabled the NSA to collect data from major companies like Google, Facebook, and Apple.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exposing the System<\/h3>\n\n\n\n<p>In 2012, smart devices were gaining popularity, and Snowden knew how the government was lying to the public. The NSA was clearly violating the 4th Amendment of the Constitution, the right to privacy. That said, he couldn\u2019t merely expose these documents; he had to expose the entire system.<\/p>\n\n\n\n<p>Snowden knew he had to choose the most appropriate journalists and teach them exactly what the documents and the technical language meant. Snowden narrowed his focus to Laura Poitras and Glenn Greenwald. Poitras had previously worked on the NSA\u2019s TRAILBLAZER program, the predecessor of STELLARWIND. Greenwald, a civil liberties lawyer, had previously reported on the NSA\u2019s unclassified PSP report from 2009. To contact them, Snowden used encrypted emails from his home computer using various pseudonyms. He disguised his location and protected their private conversations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Discovery of XKEYSCORE<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">How Snowden Covertly Gathered Information<\/h3>\n\n\n\n<p>Snowden understood how difficult it would be to leak this information and keep his identity hidden.&nbsp;<\/p>\n\n\n\n<p>To solve this issue, Snowden started by using the Heartbeat program he created to access the documents he needed. Then, he used old Dell PCs no longer in use at the office. Snowden explained to colleagues that he was using \u201ccompatibility testing\u201d to learn if new technology would work on these old computers. The reality was that Snowden could easily transfer files onto these old PCs where he safely browsed and organized the documents.<\/p>\n\n\n\n<p>From there, Snowden encrypted the data onto micro-SD cards. Each encryption process could take up to eight hours. Then, he smuggled the cards out of the building by hiding them under the tiles of his Rubik\u2019s cube. He would hide his nervousness as he walked past guards by playing with his Rubik\u2019s cube. Eventually, he earned the nickname \u201cRubik\u2019s Cube guy\u201d as he started to carry them around everywhere he went.<\/p>\n\n\n\n<p>Once home, Snowden would copy the files onto his own hard drive. He would then send the information to the journalists from his car, where he could easily hack into a stranger\u2019s Wi-Fi. Despite all this work, Snowden knew that if he tampered with the documents to obscure their origin, he would be hindering their credibility. In the end, he decided that the public good was more important than his personal safety, and he sent the documents as originals.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Asking For a Transfer<\/h3>\n\n\n\n<p>Wanting to absorb as much information as possible before the leak, Snowden asked for a transfer. He did this so he could get his hands on a program called XKEYSCORE. The program functioned as a search engine that allowed NSA officials to access data collected through STELLARWIND. His transfer was accepted, and he was flown to D.C. for training on how to use the program. During his training, Snowden discovered XKEYSCORE was far more powerful than he anticipated. He learned that agents could simply type in a name or IP address and access a person\u2019s entire digital history. Some analysts were even spying on their spouses and loved ones through the program.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Snowden Shocked the World on June 6, 2013<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Preparing to Flee the Country<\/h3>\n\n\n\n<p>In 2013, Snowden knew it was now or never. He was back in Hawaii when he began making preparations to expose the NSA. The worst part was keeping his secret from Lindsay, who he wanted to protect. Between March and May, Snowden began emptying his bank accounts, erased and encrypted old computers and prepared to leave the United States forever. He finally fled the country while Lindsay was away on a weekend camping trip.<\/p>\n\n\n\n<p>Snowden flew to Hong Kong, where he met Laura Poitras and Glenn Greenwald to divulge the information. On June 6, 2013, Greenwald\u2019s first story about the NSA appeared in The Guardian. It disclosed information about the court order that allowed Verizon to collect customer data. The following day, stories on PRISM were released. As the stories were released, the government frantically tried to find the source of the leak.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Coming Forward as the Whistleblower<\/h3>\n\n\n\n<p>Just a few days later, Snowden came forward as the whistleblower. Lawyers Robert Tibbo and Jonathan Man helped Snowden hide in some of the poorest neighborhoods of Hong Kong. On June 17, the U.S. government charged Snowden under the Espionage Act and requested his extradition. Hong Kong refused to allow him sanctuary within its borders, and he had nowhere to go. Snowden applied for asylum in numerous countries, but all his requests were denied.<\/p>\n\n\n\n<p>His new goal was to flee to Ecuador, which had previously given asylum to WikiLeaks founder Julian Assange. With the help of Sarah Harrison, Snowden was to fly via Moscow, Caracas, and Havana. The aim was to avoid detection by the U.S. However, on a layover in Moscow, Snowden was stopped by authorities once they discovered the U.S. Department of State had canceled his passport. He was stuck in Moscow. Snowden spent 40 nights sleeping at the airport surrounded by journalists but was soon granted temporary asylum by the Russian government.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Finding a New Home<\/h3>\n\n\n\n<p>During this time, the FBI followed Lindsay and interrogated her throughout the investigations. While she was initially upset with Snowden for what he had done, she understood why he did it. She eventually packed up their house in Hawaii and headed for Moscow, where she now lives with Snowden. In the years since, Snowden has continued to defend the public\u2019s data and privacy. He works with the European Center for Constitutional and Human Rights. He and Lindsay have adjusted to their new life in Moscow.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Summary of Permanent Record<\/h2>\n\n\n\n<p>Snowden was introduced to computers by his father, using his Commodore 64 home computer. From the age of twelve, he became obsessed with the internet. He eventually learned computer programming and became a hacker as a teenager. This took his focus away from his schoolwork to the detriment of his grades.<\/p>\n\n\n\n<p>Despite this, Snowden became a highly influential tech specialist for the NSA and CIA. Although initially passionate and patriotic, Snowden became worried after learning about the US government\u2019s surveillance of the public. After 9\/11, the US intelligence agencies had created a program that allowed them to gather their residents\u2019 private communications. They could access them anytime they wanted. This was all being done without the public\u2019s knowledge.<\/p>\n\n\n\n<p>The result was a complex and dangerous mission to transfer evidence of these crimes right under the government\u2019s nose. In 2013, Snowden became a whistleblower and revealed to the world how governments are not respecting our privacy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Rating<\/h2>\n\n\n\n<p>We rate <em>Permanent Record<\/em> 3.9\/5. How would you rate Edward Snowden&#8217;s book based on this summary?<\/p>\n\n\n\n<div class=\"wp-block-yet-another-stars-rating-visitor-votes yasr-vv-block\"><!--Yasr Visitor Votes Shortcode--><div id='yasr_visitor_votes_0d9e01dc56026' class='yasr-visitor-votes'><div class=\"yasr-custom-text-vv-before yasr-custom-text-vv-before-2798\">Click to rate this book!<\/div><div id='yasr-vv-second-row-container-0d9e01dc56026'\r\n                                        class='yasr-vv-second-row-container'><div id='yasr-visitor-votes-rater-0d9e01dc56026'\r\n                                      class='yasr-rater-stars-vv'\r\n                                      data-rater-postid='2798'\r\n                                      data-rating='5'\r\n                                      data-rater-starsize='32'\r\n                                      data-rater-readonly='false'\r\n                                      data-rater-nonce='d2cb598c43'\r\n                                      data-issingular='false'\r\n                                    ><\/div><div class=\"yasr-vv-stats-text-container\" id=\"yasr-vv-stats-text-container-0d9e01dc56026\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\"\r\n                                   class=\"yasr-dashicons-visitor-stats\"\r\n                                   data-postid=\"2798\"\r\n                                   id=\"yasr-stats-dashicon-0d9e01dc56026\">\r\n                                   <path d=\"M18 18v-16h-4v16h4zM12 18v-11h-4v11h4zM6 18v-8h-4v8h4z\"><\/path>\r\n                               <\/svg><span id=\"yasr-vv-text-container-0d9e01dc56026\" class=\"yasr-vv-text-container\">[Total: <span id=\"yasr-vv-votes-number-container-0d9e01dc56026\">1<\/span> Average: <span id=\"yasr-vv-average-container-0d9e01dc56026\">5<\/span>]<\/span><\/div><div id='yasr-vv-loader-0d9e01dc56026' class='yasr-vv-container-loader'><\/div><\/div><div id='yasr-vv-bottom-container-0d9e01dc56026' class='yasr-vv-bottom-container'><\/div><\/div><!--End Yasr Visitor Votes Shortcode--><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">PDF, Free Audiobook, Animated Summary<\/h2>\n\n\n\n<p>Comment below and let others know what you have learned or if you have any other thoughts.<\/p>\n\n\n\n<p>New to StoryShots? Get the audio and animated versions of this summary and hundreds of other bestselling nonfiction books in our <a href=\"https:\/\/go.getstoryshots.com\/free\">free top-ranking app.<\/a> It\u2019s been featured by Apple, The Guardian, The UN, and Google as one of the world\u2019s best reading and learning apps.<\/p>\n\n\n\n<p>To dive into the details, order the <a href=\"https:\/\/geni.us\/permanent-record-book\" target=\"_blank\" rel=\"noopener\">book<\/a> or get the audiobook <a href=\"https:\/\/geni.us\/snowden-free-audiobook\" target=\"_blank\" rel=\"noopener\">for free<\/a> on Amazon.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Related Book Summaries<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/1984-summary\/\" data-type=\"post\" data-id=\"89452\">1984<\/a> by George Orwell<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/ai-superpowers-summary\">AI Superpowers<\/a> by Kai-Fu Lee<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/mans-search-for-meaning-summary\">Man\u2019s Search for Meaning<\/a> by Viktor Frankl<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/21-lessons-for-the-21st-century-summary\">21 Lessons for the 21st Century<\/a> by Yuval Noah Harari<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/homo-deus-summary\">Homo Deus<\/a> by Yuval Noah Harari<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/superintelligence-summary\">Superintelligence<\/a> by Nick Bostrom<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/life-30-summary\">Life 3.0<\/a> by Max Tegmark<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/start-with-why-summary\">Start With Why<\/a> by Simon Sinek<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/educated-summary\">Educated<\/a> by Tara Westover<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/daring-greatly-summary\">Daring Greatly<\/a> by Brene Brown<\/li>\n\n\n\n<li><a href=\"https:\/\/www.getstoryshots.com\/books\/the-unthinkable-summary\">The Unthinkable<\/a> by Amanda Ripley<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A vida \u00e9 agitada. O Permanent Record est\u00e1 acumulando poeira em sua estante? Em vez disso, pegue algumas das principais ideias agora. Estamos apenas arranhando a superf\u00edcie aqui. Se voc\u00ea ainda n\u00e3o tem o livro, encomende-o ou obtenha o audiolivro gratuitamente na Amazon para conhecer os detalhes mais interessantes. Introdu\u00e7\u00e3o ao Permanent Record Permanent Record \u00e9 uma autobiografia de Edward Snowden,...<\/p>","protected":false},"author":1,"featured_media":93313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"right","_kad_post_sidebar_id":"sidebar-primary","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[4481,4482,4446,4652],"tags":[],"class_list":["post-2798","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biography-memoir","category-history","category-politics","category-technology"],"acf":[],"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":1,"sum_votes":5},"taxonomy_info":{"category":[{"value":4481,"label":"Biography &amp; Memoir"},{"value":4482,"label":"History"},{"value":4446,"label":"Politics"},{"value":4652,"label":"Technology"}]},"featured_image_src_large":["https:\/\/www.getstoryshots.com\/wp-content\/uploads\/Permanent-Record-summary-1024x536.png",1024,536,true],"author_info":{"display_name":"StoryShots - Free Book Summaries","author_link":"https:\/\/www.getstoryshots.com\/pt\/books\/author\/storyshotsadmin\/"},"comment_info":0,"category_info":[{"term_id":4481,"name":"Biography &amp; Memoir","slug":"biography-memoir","term_group":0,"term_taxonomy_id":4481,"taxonomy":"category","description":"","parent":0,"count":43,"filter":"raw","cat_ID":4481,"category_count":43,"category_description":"","cat_name":"Biography &amp; Memoir","category_nicename":"biography-memoir","category_parent":0},{"term_id":4482,"name":"History","slug":"history","term_group":0,"term_taxonomy_id":4482,"taxonomy":"category","description":"","parent":0,"count":31,"filter":"raw","cat_ID":4482,"category_count":31,"category_description":"","cat_name":"History","category_nicename":"history","category_parent":0},{"term_id":4446,"name":"Politics","slug":"politics","term_group":0,"term_taxonomy_id":4446,"taxonomy":"category","description":"","parent":0,"count":39,"filter":"raw","cat_ID":4446,"category_count":39,"category_description":"","cat_name":"Politics","category_nicename":"politics","category_parent":0},{"term_id":4652,"name":"Technology","slug":"technology","term_group":0,"term_taxonomy_id":4652,"taxonomy":"category","description":"","parent":0,"count":9,"filter":"raw","cat_ID":4652,"category_count":9,"category_description":"","cat_name":"Technology","category_nicename":"technology","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/posts\/2798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/comments?post=2798"}],"version-history":[{"count":8,"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/posts\/2798\/revisions"}],"predecessor-version":[{"id":96916,"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/posts\/2798\/revisions\/96916"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/media\/93313"}],"wp:attachment":[{"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/media?parent=2798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/categories?post=2798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getstoryshots.com\/pt\/wp-json\/wp\/v2\/tags?post=2798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}