{"id":12603,"date":"2013-09-30T14:01:22","date_gmt":"2013-09-30T07:01:22","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/2013\/09\/30\/video-games-are-making-us-too-comfortable-with-the-modern-surveillance-state-new-statesman\/"},"modified":"2013-09-30T14:01:22","modified_gmt":"2013-09-30T07:01:22","slug":"video-games-are-making-us-too-comfortable-with-the-modern-surveillance-state-new-statesman","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2013\/09\/video-games-are-making-us-too-comfortable-with-the-modern-surveillance-state-new-statesman\/","title":{"rendered":"Video games are making us too comfortable with the modern surveillance state &#8211; New Statesman"},"content":{"rendered":"<p> Video games are making us too comfortable with the modern surveillance state New Statesman And while this mission looked and sounded real, an eerie precursor to WikiLeak&#39;s infamous \u201cCollateral Murder\u201d video, it came with built-in safeguards that immediately failed players who shot at civilians. These military and surveillance games are &#8230; <\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/news.google.com\/news\/url?sa=t&amp;fd=R&amp;usg=AFQjCNHqPSlCF1iB7zZJZvWBvJ1IkP4Mqg&amp;url=http:\/\/www.newstatesman.com\/games\/2013\/09\/video-games-are-making-us-too-comfortable-modern-surveillance-state\" title=\"Video games are making us too comfortable with the modern surveillance state - New Statesman\">Video games are making us too comfortable with the modern surveillance state &#8211; New Statesman<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Video games are making us too comfortable with the modern surveillance state New Statesman And while this mission looked and sounded real, an eerie precursor to WikiLeak&#39;s infamous \u201cCollateral Murder\u201d video, it came with built-in safeguards that immediately failed players who shot at civilians. These military and surveillance games are &#8230; <\/p>\n","protected":false},"author":439,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[162,6,260],"tags":[39,209],"class_list":["post-12603","post","type-post","status-publish","format-standard","hentry","category-ddos-security","category-m","category-wikileak-security","tag-hacker","tag-wikileak"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-3hh","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/12603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/439"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=12603"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/12603\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=12603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=12603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=12603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}