{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Introduction",
      "startTime": 0,
      "endTime": 20.3
    },
    {
      "title": "Exploits: FortiSIEM and WhisperPair",
      "startTime": 20.3,
      "endTime": 77.09
    },
    {
      "title": "Middle East Phishing & Surveillance",
      "startTime": 77.09,
      "endTime": 104.69
    },
    {
      "title": "Domestic Breaches: SCOTUS and AmeriCorps",
      "startTime": 104.69,
      "endTime": 152.62
    },
    {
      "title": "The Geopolitics of Data Sovereignty",
      "startTime": 152.62,
      "endTime": 239.35
    },
    {
      "title": "Conclusion",
      "startTime": 239.35,
      "endTime": 302.04
    }
  ]
}