{"id":723,"date":"2015-11-04T12:00:45","date_gmt":"2015-11-04T12:00:45","guid":{"rendered":"http:\/\/www2.law.temple.edu\/voices\/?p=723"},"modified":"2021-12-16T14:58:51","modified_gmt":"2021-12-16T14:58:51","slug":"the-ashley-madison-hack-and-witness-character","status":"publish","type":"post","link":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/","title":{"rendered":"The Ashley Madison \u201cHack\u201d and Witness Character"},"content":{"rendered":"<p>The Ashley Madison website self-describes as \u201cthe most famous name in infidelity and married dating.\u201d <a href=\"https:\/\/www.ashleymadison.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.ashleymadison.com\/<\/a> (last visited August 27, 2015). The hacking of the website resulted in the release of the names of tens of millions of subscribers \u2013 individuals who joined the website with the ability and apparently the intent to seek out a partner for an adulterous encounter, be it one-time or ongoing.<\/p>\n<p>And if one of those individuals were to now be a witness in a trial, would the act of registering an interest in or seeking out an adulterous relationship be admissible as an attack on credibility? To answer the question requires a parsing of the language, theoretical underpinnings and application of Federal Rule of Evidence 608(b).<\/p>\n<p>Before discussing the Rule, practitioners need to be chided for its apparent underuse. Available in many jurisdictions [Pennsylvania being a notable exception] as a tool for attacking witness credibility, its limited role in the litigator\u2019s toolkit is confirmed in evidence lectures, when practicing lawyers and judges show unfamiliarity with the rule; and arguably by the paucity of cases mentioning its language. As of August, 2015, only 382 reported decisions were found in a national LEXIS search using the parameters \u201c608(b) w\/12 specific w\/5 conduct w\/12 character.\u201d<\/p>\n<p>So what does the Rule provide? At its core, \u201cspecific instances of a witness\u2019s conduct\u2026 may, on cross-examination,\u2026be inquired into if they are probative of the character for truthfulness or untruthfulness of [] the witness[.]\u201d<\/p>\n<p>The Rule\u2019s genesis can be found in a common law tradition of allowing witnesses to be impeached with at least some types of misconduct. As described in the late 1800s, a witness \u201cmay be interrogated upon specific acts and transactions of his past life\u2026if they are not too remote in time and clearly relate to the credit of the witness in an important and material respect\u2026\u201d Terr. v. Chavez, 45 P. 1107, 1108 (N.M. 1896). The line was that between \u201cthose matters\u2026which merely excite prejudice against the witness or tend to humiliate him or wound his feelings, and those\u2026calculated in an important and material respect to influence the credit to be given to his testimony.\u201d<\/p>\n<p>Arguably, Rule 608(b) is consistent with this antecedent common law approach. It recognizes the distinction between acts, even dishonest ones, and acts that \u201creflect on the witness\u2019s character for truthfulness or untruthfulness\u2026\u201d 4-608 Weinstein&#8217;s Federal Evidence \u00a7 608.22. All of us have told a lie or done something dishonest in nature; but the rule envisions more \u2013 an act that is a proxy for or measure of having a character for being dishonest, a general propensity to lie. And of course 608(b) evidence may be subject to further scrutiny under Rule 403, although that should be tempered with the command of Rule 611 that judges \u201cprotect witnesses from harassment or undue embarrassment.\u201d By dint of this language, some embarrassment is inherent in testifying and is \u201cdue.\u201d<\/p>\n<p>Having said that, the Rule is arbitrary in defining which acts are sufficient to show propensity. It is not tethered to any scientific measure or research as to what conduct predicts future lies but instead vests the decision-making authority as to which acts qualify in the judge\u2019s discretion, an \u201cI know it when I see it\u201d jurisprudence. Examples of acts that were deemed to show a dishonest character include: using false social security numbers; lying on an employment application about not having received psychiatric treatment; bringing false criminal charges against another; fraudulently reneging on a home sale agreement; receiving stolen goods; and witness intimidation, the last on the theory that \u201c[t]hreatening to cause physical harm to a person who proposes to testify against you is at least as probative of truthfulness as receiving stolen tires or a stolen railroad ticket.\u201d United States v. Manske, 186 F.3d 770, 776 (Wis. 1999)(offering an overview of varying approaches to Rule 608(b) analysis).<\/p>\n<p>Given that lying on an employment application was deemed to be indicative of dishonest character, one might expect adultery or attempts at engaging in adultery to be treated the same. Yet the opposite is true. Relying on <em>non sequitur<\/em>, inapposite caselaw [such as cases rejecting a woman\u2019s promiscuity as a permissible ground for attacking credibility] or just <em>ipsi dixit<\/em> pronouncement, several courts have held that an adulterer \u201cmay not be impeached on cross-examination based solely on the existence of an adulterous relationship when the relationship is collateral to the charged crimes.\u201d State v. Moses, 726 A.2d 250, 252-253 (N.H. 1999) (collecting cases). <em>See also<\/em> State v. Morgan, 340 S.E.2d 84, 90 (1986).<\/p>\n<p>What stands unexplained is how breaking a marital vow of monogamy is less probative of truthful or untruthful character than reneging on a sales agreement or lying on a job application. Unless one concludes that adultery is a stand-alone dishonesty, confined to intimate sexual activity and not extrapolatable to other spheres of life, the distinction is without reason. It also runs afoul of the popular view of adultery, one that is highly condemnatory.<\/p>\n<p><a href=\"http:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/11\/Jules-Ashley-Madison-Chart.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-724\" src=\"http:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/11\/Jules-Ashley-Madison-Chart.png\" alt=\"Percent Who Believe that Each Type of Sex is Always Wrong\" width=\"833\" height=\"559\" \/><\/a><\/p>\n<p>So, what about applying 608(b) to a witness who, it turns out, was exposed by the hack as being an Ashley Madison registrant\/member? Notwithstanding the dated and, as suggested above, less-than-sound caselaw excluding adultery from the realm acts emblematic of dishonest character, valid arguments can be made that this is at least as probative of the more typical fraudulent behavior and has the same hallmarks \u2013 deceiving a trusted individual for personal gratification or gain.<\/p>\n<p>There may, however, be proof problems. The first is determining whether the individual actually was an Ashley Madison member or was the victim of identity theft. Next, there is arguably an escalating scale \u2013 those who joined Ashley Madison; those who attempted to have an illicit liaison; and those who \u2018succeeded.\u2019 But whatever the hierarchy of conduct, if the name of a witness is on the Ashley Madison list a 608(b) attack needs to be contemplated and investigated; and if the person is not listed, it does not mean that there is not <em>some<\/em> core dishonest act that the witness may have committed. The skilled litigator only needs to remember to look for it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Ashley Madison website self-describes as \u201cthe most famous name in infidelity and married dating.\u201d https:\/\/www.ashleymadison.com\/ (last visited August 27, 2015). The hacking of the website resulted in the release of the names of tens of millions of subscribers \u2013 individuals who joined the website with the ability and apparently the intent to seek out<\/p>\n","protected":false},"author":31,"featured_media":727,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"generate_page_header":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2,3,7],"tags":[22,144],"coauthors":[238],"class_list":["post-723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advocacy","category-advocacy-and-evidence-blog","category-evidence","tag-ashley-madison","tag-witness-credibility"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Ashley Madison \u201cHack\u201d and Witness Character - Advocacy and Evidence Resources<\/title>\n<meta name=\"description\" content=\"The hacking of Ashley Madison resulted in the release of the names of subscribers. If one of those individuals were to now be a witness in a trial, would the act of registering an interest in or seeking out an adulterous relationship be admissible as an attack on credibility?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ashley Madison \u201cHack\u201d and Witness Character - Advocacy and Evidence Resources\" \/>\n<meta property=\"og:description\" content=\"The hacking of Ashley Madison resulted in the release of the names of subscribers. If one of those individuals were to now be a witness in a trial, would the act of registering an interest in or seeking out an adulterous relationship be admissible as an attack on credibility?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/\" \/>\n<meta property=\"og:site_name\" content=\"Advocacy and Evidence Resources\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-04T12:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-16T14:58:51+00:00\" \/>\n<meta name=\"author\" content=\"Jules M Epstein (hehimhis)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jules M Epstein (hehimhis)\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/\"},\"author\":{\"name\":\"Jules M Epstein (hehimhis)\",\"@id\":\"https:\/\/law.temple.edu\/aer\/#\/schema\/person\/ebe47f403ad14e2c5faec834f2d8472e\"},\"headline\":\"The Ashley Madison \u201cHack\u201d and Witness Character\",\"datePublished\":\"2015-11-04T12:00:45+00:00\",\"dateModified\":\"2021-12-16T14:58:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/\"},\"wordCount\":1019,\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/#organization\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Ashley Madison\",\"Witness Credibility\"],\"articleSection\":[\"Advocacy\",\"Advocacy and Evidence Blog\",\"Evidence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/\",\"url\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/\",\"name\":\"The Ashley Madison \u201cHack\u201d and Witness Character - Advocacy and Evidence Resources\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2015-11-04T12:00:45+00:00\",\"dateModified\":\"2021-12-16T14:58:51+00:00\",\"description\":\"The hacking of Ashley Madison resulted in the release of the names of subscribers. If one of those individuals were to now be a witness in a trial, would the act of registering an interest in or seeking out an adulterous relationship be admissible as an attack on credibility?\",\"breadcrumb\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/law.temple.edu\/aer\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Ashley Madison \u201cHack\u201d and Witness Character\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/law.temple.edu\/aer\/#website\",\"url\":\"https:\/\/law.temple.edu\/aer\/\",\"name\":\"Advocacy and Evidence Resources\",\"description\":\"Just another Law Sites site\",\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/law.temple.edu\/aer\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/law.temple.edu\/aer\/#organization\",\"name\":\"Advocacy and Evidence Resources\",\"url\":\"https:\/\/law.temple.edu\/aer\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/aer\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/law.temple.edu\/aer\/wp-content\/uploads\/sites\/5\/2021\/07\/AER-LOGO.png\",\"contentUrl\":\"https:\/\/law.temple.edu\/aer\/wp-content\/uploads\/sites\/5\/2021\/07\/AER-LOGO.png\",\"width\":711,\"height\":220,\"caption\":\"Advocacy and Evidence Resources\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/aer\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/law.temple.edu\/aer\/#\/schema\/person\/ebe47f403ad14e2c5faec834f2d8472e\",\"name\":\"Jules M Epstein (hehimhis)\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d2a56b84151f5331c5c999af7a12cc505aeed9fec929142bc9dd30b398301e5b?s=96&d=mm&r=g6b68adb939ecac32ef61d8026f0bafe4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2a56b84151f5331c5c999af7a12cc505aeed9fec929142bc9dd30b398301e5b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2a56b84151f5331c5c999af7a12cc505aeed9fec929142bc9dd30b398301e5b?s=96&d=mm&r=g\",\"caption\":\"Jules M Epstein (hehimhis)\"},\"url\":\"https:\/\/law.temple.edu\/aer\/author\/tug27334\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Ashley Madison \u201cHack\u201d and Witness Character - Advocacy and Evidence Resources","description":"The hacking of Ashley Madison resulted in the release of the names of subscribers. If one of those individuals were to now be a witness in a trial, would the act of registering an interest in or seeking out an adulterous relationship be admissible as an attack on credibility?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/","og_locale":"en_US","og_type":"article","og_title":"The Ashley Madison \u201cHack\u201d and Witness Character - Advocacy and Evidence Resources","og_description":"The hacking of Ashley Madison resulted in the release of the names of subscribers. If one of those individuals were to now be a witness in a trial, would the act of registering an interest in or seeking out an adulterous relationship be admissible as an attack on credibility?","og_url":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/","og_site_name":"Advocacy and Evidence Resources","article_published_time":"2015-11-04T12:00:45+00:00","article_modified_time":"2021-12-16T14:58:51+00:00","author":"Jules M Epstein (hehimhis)","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jules M Epstein (hehimhis)","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#article","isPartOf":{"@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/"},"author":{"name":"Jules M Epstein (hehimhis)","@id":"https:\/\/law.temple.edu\/aer\/#\/schema\/person\/ebe47f403ad14e2c5faec834f2d8472e"},"headline":"The Ashley Madison \u201cHack\u201d and Witness Character","datePublished":"2015-11-04T12:00:45+00:00","dateModified":"2021-12-16T14:58:51+00:00","mainEntityOfPage":{"@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/"},"wordCount":1019,"publisher":{"@id":"https:\/\/law.temple.edu\/aer\/#organization"},"image":{"@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#primaryimage"},"thumbnailUrl":"","keywords":["Ashley Madison","Witness Credibility"],"articleSection":["Advocacy","Advocacy and Evidence Blog","Evidence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/","url":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/","name":"The Ashley Madison \u201cHack\u201d and Witness Character - Advocacy and Evidence Resources","isPartOf":{"@id":"https:\/\/law.temple.edu\/aer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#primaryimage"},"image":{"@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#primaryimage"},"thumbnailUrl":"","datePublished":"2015-11-04T12:00:45+00:00","dateModified":"2021-12-16T14:58:51+00:00","description":"The hacking of Ashley Madison resulted in the release of the names of subscribers. If one of those individuals were to now be a witness in a trial, would the act of registering an interest in or seeking out an adulterous relationship be admissible as an attack on credibility?","breadcrumb":{"@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/law.temple.edu\/aer\/2015\/11\/04\/the-ashley-madison-hack-and-witness-character\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/law.temple.edu\/aer\/"},{"@type":"ListItem","position":2,"name":"The Ashley Madison \u201cHack\u201d and Witness Character"}]},{"@type":"WebSite","@id":"https:\/\/law.temple.edu\/aer\/#website","url":"https:\/\/law.temple.edu\/aer\/","name":"Advocacy and Evidence Resources","description":"Just another Law Sites site","publisher":{"@id":"https:\/\/law.temple.edu\/aer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/law.temple.edu\/aer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/law.temple.edu\/aer\/#organization","name":"Advocacy and Evidence Resources","url":"https:\/\/law.temple.edu\/aer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/aer\/#\/schema\/logo\/image\/","url":"https:\/\/law.temple.edu\/aer\/wp-content\/uploads\/sites\/5\/2021\/07\/AER-LOGO.png","contentUrl":"https:\/\/law.temple.edu\/aer\/wp-content\/uploads\/sites\/5\/2021\/07\/AER-LOGO.png","width":711,"height":220,"caption":"Advocacy and Evidence Resources"},"image":{"@id":"https:\/\/law.temple.edu\/aer\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/law.temple.edu\/aer\/#\/schema\/person\/ebe47f403ad14e2c5faec834f2d8472e","name":"Jules M Epstein (hehimhis)","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d2a56b84151f5331c5c999af7a12cc505aeed9fec929142bc9dd30b398301e5b?s=96&d=mm&r=g6b68adb939ecac32ef61d8026f0bafe4","url":"https:\/\/secure.gravatar.com\/avatar\/d2a56b84151f5331c5c999af7a12cc505aeed9fec929142bc9dd30b398301e5b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2a56b84151f5331c5c999af7a12cc505aeed9fec929142bc9dd30b398301e5b?s=96&d=mm&r=g","caption":"Jules M Epstein (hehimhis)"},"url":"https:\/\/law.temple.edu\/aer\/author\/tug27334\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/posts\/723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/comments?post=723"}],"version-history":[{"count":1,"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/posts\/723\/revisions"}],"predecessor-version":[{"id":3454,"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/posts\/723\/revisions\/3454"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/aer\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/media?parent=723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/categories?post=723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/tags?post=723"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/law.temple.edu\/aer\/wp-json\/wp\/v2\/coauthors?post=723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}