{"id":292,"date":"2021-01-27T15:38:19","date_gmt":"2021-01-27T21:38:19","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=292"},"modified":"2023-11-08T16:55:05","modified_gmt":"2023-11-08T22:55:05","slug":"surveillance-forensics","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/surveillance-forensics\/","title":{"rendered":"Video Surveillance Forensics"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-292\" data-postid=\"292\" class=\"themify_builder_content themify_builder_content-292 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-1024x512.jpg\" class=\"wp-post-image wp-image-293\" title=\"Video Surveillance Forensics | iDS Case Study\" alt=\"Video Surveillance Forensics, iDS Case Study\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started.<\/h5>\n<p>The client needed expertise for the following:<\/p>\n<ul>\n<li>\n<p>To design, plan, coordinate, and execute a methodology for forensic collection of a video surveillance system.<\/p>\n<\/li>\n<li>\n<p>To locate and analyze video feeds for various points in time, and on various days.<\/p>\n<\/li>\n<li>\n<p>To recreate the hardware and software environment to allow opposing counsel to see the necessary video footage for<\/p>\n<p>themselves.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Our iDS Digital Forensics Experts designed a workflow that would accommodate the collection, analysis, and production of data from the server and software-based video surveillance system used by the client.<\/h5>\n<p>The iDS team collected, analyzed, and reported on the following:<\/p>\n<ul>\n<li>\n<p>The defensible imaging of the video system and associated video file storage system.<\/p>\n<\/li>\n<li>\n<p>The analysis and extraction of desired video footage.<\/p>\n<\/li>\n<li>\n<p>The replication of the necessary hardware and software that would allow all parties to review the video footage in a<\/p>\n<p>simulated live environment.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>By leveraging the expertise of iDS, the client was able to leave their video system up and running, while allowing a defensible forensic collection, and was able to create a replicated virtual environment that was a mirror of the client\u2019s system for use by other parties.<\/h5>\n<p>The client saved thousands, to hundreds of thousands, of dollars by engaging iDS to create an innovative workflow to accomplish this assignment.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started. The client needed expertise for the following: To design, plan, coordinate, and execute a [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":293,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-292","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Video Surveillance Forensics - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/surveillance-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Video Surveillance Forensics\" \/>\n<meta property=\"og:description\" content=\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/surveillance-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-08T22:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\",\"name\":\"Video Surveillance Forensics - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"datePublished\":\"2021-01-27T21:38:19+00:00\",\"dateModified\":\"2023-11-08T22:55:05+00:00\",\"description\":\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Surveillance-Forensics.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/surveillance-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Video Surveillance Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Video Surveillance Forensics - iDiscovery Solutions","description":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/surveillance-forensics\/","og_locale":"en_GB","og_type":"article","og_title":"Video Surveillance Forensics","og_description":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/surveillance-forensics\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2023-11-08T22:55:05+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/","url":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/","name":"Video Surveillance Forensics - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","datePublished":"2021-01-27T21:38:19+00:00","dateModified":"2023-11-08T22:55:05+00:00","description":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Surveillance-Forensics.jpg","width":1200,"height":600,"caption":"Video Surveillance Forensics allowed iDS to create a replicated virtual environment, mirroring the client\u2019s system for use by other parties."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/surveillance-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Video Surveillance Forensics"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<h5>A client who had a video surveillance system in place had been sued, alleging the class of employees should be paid overtime for the amount of time it takes to get through the required security checkpoint before their shift actually started.<\/h5> <p>The client needed expertise for the following:<\/p> <ul> <li> <p>To design, plan, coordinate, and execute a methodology for forensic collection of a video surveillance system.<\/p> <\/li> <li> <p>To locate and analyze video feeds for various points in time, and on various days.<\/p> <\/li> <li> <p>To recreate the hardware and software environment to allow opposing counsel to see the necessary video footage for<\/p> <p>themselves.<\/p> <\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<h5>Our iDS Digital Forensics Experts designed a workflow that would accommodate the collection, analysis, and production of data from the server and software-based video surveillance system used by the client.<\/h5> <p>The iDS team collected, analyzed, and reported on the following:<\/p> <ul> <li> <p>The defensible imaging of the video system and associated video file storage system.<\/p> <\/li> <li> <p>The analysis and extraction of desired video footage.<\/p> <\/li> <li> <p>The replication of the necessary hardware and software that would allow all parties to review the video footage in a<\/p> <p>simulated live environment.<\/p> <\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<h5>By leveraging the expertise of iDS, the client was able to leave their video system up and running, while allowing a defensible forensic collection, and was able to create a replicated virtual environment that was a mirror of the client\u2019s system for use by other parties.<\/h5> <p>The client saved thousands, to hundreds of thousands, of dollars by engaging iDS to create an innovative workflow to accomplish this assignment.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/292\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/293"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}