{"id":11799,"date":"2016-09-11T08:17:52","date_gmt":"2016-09-11T06:17:52","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=11799"},"modified":"2021-02-14T08:59:38","modified_gmt":"2021-02-14T07:59:38","slug":"the-technical-report-on-the-ruag-espionage-case","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/der-technische-bericht-zum-spionagefall-ruag\/","title":{"rendered":"The technical report on the \"Ruag\" espionage case"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11816\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg\" alt=\"The technical report on the &quot;Ruag&quot; espionage case\" width=\"883\" height=\"526\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg 883w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag-768x457.jpg 768w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag-16x10.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag-294x175.jpg 294w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag-588x350.jpg 588w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag-300x179.jpg 300w\" sizes=\"auto, (max-width: 883px) 100vw, 883px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>The report by the Reporting and Analysis Centre for Information Assurance Melani, which was published at the end of May 2016 (see end of text), reveals few new findings - it focuses primarily on technical points. For example, that the attackers used malware from the Turla family that had been circulating for several years. This malware had most likely infiltrated Ruag IT for years. The technical report explicitly underlines: \"The attackers showed a lot of patience in infiltrating and advancing further. They only attacked victims in whom they had an interest, using various measures such as spying on IP lists (...).\"<\/p>\n<p>&nbsp;<\/p>\n<p>Once inside the network, the malware spread laterally \"by infecting more devices and gaining higher privileges.\"<\/p>\n<p>&nbsp;<\/p>\n<p>However, such findings about espionage via the Swiss arms company Ruag are only partially satisfactory for security experts. Although the report shows the technical sequence of events from September 2014 to May 2016, it also leaves many points - such as what sensitive data was stolen at the federal level - open.<\/p>\n<p><strong>No overview provided before 2014 <\/strong><br \/>\nThe Ruag systems have been infected since at least September 2014. However, as Melani\/GovCERT points out, Ruag does not have any proxy log files for the time before September 2014. However, already in the first checked files, Melani experts found signs that the Turla infection had taken place earlier.<\/p>\n<p>&nbsp;<\/p>\n<p>Apart from the spies themselves, no security specialist knows when and how the \"infection\" first took hold. The investigation of this major espionage attack is complex. The only thing that can be estimated is the volume of data that was lost. According to Melani, exactly 23 gigabytes were stolen. However, the commissioned IT experts cannot draw any further conclusions.<\/p>\n<p>&nbsp;<\/p>\n<p>\"The amount of data transferred does not indicate its confidentiality or the value of the stolen data,\" Pascal Lamia, head of the Federal Reporting and Analysis Centre, was quoted as saying by insideit. ch quoted. Experts criticize the linked activities between Ruag and the federal IT. However, some insiders believe that security measures, such as appropriate virus blockers, should have been installed much earlier.<\/p>\n<p>&nbsp;<\/p>\n<p>However, Pascal Lamia, the federal government's IT security officer, defends Ruag, saying that internal security officers could not have noted what was likely to have infected their computers before 2016. The Melanie report makes it clear: it was not until the beginning of February 2016, several months later, that the cyber attack was discovered and specific monitoring software installed.<\/p>\n<p>&nbsp;<\/p>\n<p>In the report, one can also find a graph of the amount of data pulled on a daily basis. This shows little activity between September 2014 and mid-2015. Most of the data was transferred to the \"command &amp; control\" (C&amp;C) servers used by the attackers between September 2015 and January 2016. After that, however, the activity suddenly stops - i.e. exactly at the time when the attack was discovered and monitoring software was installed.<\/p>\n<p><strong>Admin directory affected? <\/strong><br \/>\nSo, although there is no knowledge of the content or value of the tapped data, the Federal Department of Defense DDPS stated in a press release accompanying the technical report that \"it is likely to include data from the admin directory \" that \"feeds the federal administration's outlook software.\"<\/p>\n<p>&nbsp;<\/p>\n<p>This is a kind of telephone directory, with surnames, first names, function and workplace, i.e. purely business data - the DDPS told sda. It does not contain an agenda. Nor does it contain any personal data. For example, it is not possible to see where someone lives.<\/p>\n<p>&nbsp;<\/p>\n<p>How it was concluded that the Ruag spies \"might\" have tapped into this relatively insensitive data, no federal security official was willing to elaborate.<\/p>\n<p><strong>Federal Council pushes investigation <\/strong><br \/>\nAccording to insiders, the first Trojans of the Turla malware family have been known since 2007. The circulating attacker, who uses this type of malware, has infiltrated many government organizations as well as private companies in the last decade. However, political espionage may be assumed here, because only private or public subjects were infected, who have special information about research or armament data.<\/p>\n<p>&nbsp;<\/p>\n<p>At Ruag, there was most likely an attempt to spy on IP addresses. As the technical report goes on to say, the Active Directory came into focus in order to gain control of further devices in order to steal authorisations or group memberships to access further data stores of interest. Based on a security report, a committee has proposed to the Federal Council the adoption of 14 short- and medium-term measures. These are intended to eliminate the risks of data theft relating to information or persons. For security reasons, details of the measures are not being communicated.<\/p>\n<p>&nbsp;<\/p>\n<p><em>On the portal of the Reporting and Analysis Centre for Information Assurance MELANI there is a German summary as well as a detailed technical report (only in English). www.melani.admin.ch<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Der Bericht der Melde- und Analysestelle Informationssicherung Melani, welcher Ende Mai 2016 publiziert wurde (siehe Textende), bringt wenig neue Erkenntnisse zum Vorschein \u2013 in erster Linie konzentriert er sich auf technische Punkte. Etwa, dass die Angreifer eine seit mehreren Jahren kursierende Schadsoftware der Turla-Familie benutzten. Diese Malware hatte h\u00f6chstwahrscheinlich die Ruag-Informatik \u00fcber Jahre [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":11816,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[4785],"class_list":["post-11799","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-09-2016"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Der technische Bericht zum Spionagefall \u00abRuag\u00bb - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Die Ruag Cybercausa wurde durch Melani\/Gov-CERT im Hinblick auf Aufschluss \u00fcber den Angriffund weiteren Schutz analysiert. Der Bundesrat hatentschieden, diesen Bericht zu ver\u00f6ffentlichen, damitVerantwortliche und Fachleute im Bereich Netzwerksicherheitauf \u00e4hnliche Attacken sensibilisiertwerden. Die R\u00fcckverfolgung einzelner Spionageversucheim Ruag-Bundesverwaltungumfeld bleibtjedoch nebul\u00f6s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/the-technical-report-on-the-ruag-espionage-case\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Der technische Bericht zum Spionagefall \u00abRuag\u00bb - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Die Ruag Cybercausa wurde durch Melani\/Gov-CERT im Hinblick auf Aufschluss \u00fcber den Angriffund weiteren Schutz analysiert. Der Bundesrat hatentschieden, diesen Bericht zu ver\u00f6ffentlichen, damitVerantwortliche und Fachleute im Bereich Netzwerksicherheitauf \u00e4hnliche Attacken sensibilisiertwerden. Die R\u00fcckverfolgung einzelner Spionageversucheim Ruag-Bundesverwaltungumfeld bleibtjedoch nebul\u00f6s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/the-technical-report-on-the-ruag-espionage-case\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-11T06:17:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-14T07:59:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"883\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"upwork_1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"upwork_1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/\"},\"author\":{\"name\":\"upwork_1\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7\"},\"headline\":\"Der technische Bericht zum Spionagefall \u00abRuag\u00bb\",\"datePublished\":\"2016-09-11T06:17:52+00:00\",\"dateModified\":\"2021-02-14T07:59:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/\"},\"wordCount\":745,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg\",\"keywords\":[\"09\/2016\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/\",\"url\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/\",\"name\":\"Der technische Bericht zum Spionagefall \u00abRuag\u00bb - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg\",\"datePublished\":\"2016-09-11T06:17:52+00:00\",\"dateModified\":\"2021-02-14T07:59:38+00:00\",\"description\":\"Die Ruag Cybercausa wurde durch Melani\/Gov-CERT im Hinblick auf Aufschluss \u00fcber den Angriffund weiteren Schutz analysiert. Der Bundesrat hatentschieden, diesen Bericht zu ver\u00f6ffentlichen, damitVerantwortliche und Fachleute im Bereich Netzwerksicherheitauf \u00e4hnliche Attacken sensibilisiertwerden. Die R\u00fcckverfolgung einzelner Spionageversucheim Ruag-Bundesverwaltungumfeld bleibtjedoch nebul\u00f6s.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg\",\"width\":883,\"height\":526,\"caption\":\"Der technische Bericht zum Spionagefall \u00abRuag\u00bb\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Der technische Bericht zum Spionagefall \u00abRuag\u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7\",\"name\":\"upwork_1\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g\",\"caption\":\"upwork_1\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/upwork_1\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The technical report on the \"Ruag\" espionage case - MQ Management und Qualit\u00e4t","description":"The Ruag cybercausa was analysed by Melani\/Gov-CERT with a view to shedding light on the attack and further protection. The Federal Council has decided to publish this report so that those responsible and experts in the field of network security are made aware of similar attacks. However, the tracing of individual espionage attempts in the Ruag federal administration environment remains nebulous.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/the-technical-report-on-the-ruag-espionage-case\/","og_locale":"en_US","og_type":"article","og_title":"Der technische Bericht zum Spionagefall \u00abRuag\u00bb - MQ Management und Qualit\u00e4t","og_description":"Die Ruag Cybercausa wurde durch Melani\/Gov-CERT im Hinblick auf Aufschluss \u00fcber den Angriffund weiteren Schutz analysiert. Der Bundesrat hatentschieden, diesen Bericht zu ver\u00f6ffentlichen, damitVerantwortliche und Fachleute im Bereich Netzwerksicherheitauf \u00e4hnliche Attacken sensibilisiertwerden. Die R\u00fcckverfolgung einzelner Spionageversucheim Ruag-Bundesverwaltungumfeld bleibtjedoch nebul\u00f6s.","og_url":"https:\/\/www.m-q.ch\/en\/the-technical-report-on-the-ruag-espionage-case\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2016-09-11T06:17:52+00:00","article_modified_time":"2021-02-14T07:59:38+00:00","og_image":[{"width":883,"height":526,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg","type":"image\/jpeg"}],"author":"upwork_1","twitter_card":"summary_large_image","twitter_misc":{"Written by":"upwork_1","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/"},"author":{"name":"upwork_1","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7"},"headline":"Der technische Bericht zum Spionagefall \u00abRuag\u00bb","datePublished":"2016-09-11T06:17:52+00:00","dateModified":"2021-02-14T07:59:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/"},"wordCount":745,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg","keywords":["09\/2016"],"articleSection":["Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/","url":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/","name":"The technical report on the \"Ruag\" espionage case - MQ Management und Qualit\u00e4t","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg","datePublished":"2016-09-11T06:17:52+00:00","dateModified":"2021-02-14T07:59:38+00:00","description":"The Ruag cybercausa was analysed by Melani\/Gov-CERT with a view to shedding light on the attack and further protection. The Federal Council has decided to publish this report so that those responsible and experts in the field of network security are made aware of similar attacks. However, the tracing of individual espionage attempts in the Ruag federal administration environment remains nebulous.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/02\/Der-technische-Bericht-zum-Spionagefall-Ruag.jpg","width":883,"height":526,"caption":"Der technische Bericht zum Spionagefall \u00abRuag\u00bb"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/der-technische-bericht-zum-spionagefall-ruag\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Der technische Bericht zum Spionagefall \u00abRuag\u00bb"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/0bdf39ca27d0b9b779f5b8af54b3f7d7","name":"upwork_1","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/04d4d0fdc5886d535809f17d0eace7f6?s=96&d=mm&r=g","caption":"upwork_1"},"url":"https:\/\/www.m-q.ch\/en\/author\/upwork_1\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/11799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=11799"}],"version-history":[{"count":2,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/11799\/revisions"}],"predecessor-version":[{"id":11820,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/11799\/revisions\/11820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/11816"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=11799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=11799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=11799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}