{"id":1732,"date":"2019-07-08T13:40:00","date_gmt":"2019-07-08T19:40:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=1732"},"modified":"2026-03-05T16:59:33","modified_gmt":"2026-03-05T22:59:33","slug":"text-message-screenshots","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/text-message-screenshots\/","title":{"rendered":"Text Message Screenshots: Real Or Fake?"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Fake news, false identities, and phony emails \u2013 in today\u2019s digital world, it is becoming increasingly more difficult to detect fact from fiction.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Fake Texts Are Easy To Create, Difficult To Detect<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">For lawyers and investigators, discerning what\u2019s real when dealing with digital evidence is more difficult than ever. This is due, in part, to how easy it is to create fake evidence. Specifically, a rise in fake text message apps makes it almost effortless to falsify all types of instant mobile communications \u2013 iMessage, SMS, MMS, and chat. Nearly every aspect of the text message can be fabricated, including the sender and recipient, time stamp, and delivery status.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With the click of a button, the imposter can download an image that looks like a genuine text message, making it nearly impossible for an untrained eye to notice the difference between a real chat and a fake.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Uncovering Fake Evidence In Litigation And Investigations<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In litigation and investigations, fake texts can wreak havoc. This is not to say that you should assume screenshots of text messages are fake, but diligence is recommended. Consider these scenarios:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Hostile Work Environment<\/strong> \u2013 An employee claims that a co-worker made unwelcome comments, and he or she provides HR with screenshots of text messages allegedly proving the accusations. The HR team member notices that on the screenshot, the wireless carrier is not capitalized (\u201cverizon\u201d instead of \u201cVerizon\u201d).<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Trade Secret Theft<\/strong> \u2013 Two members of the sales team give their resignations. One of their former colleagues discloses a series of text messages implicating that the former salespeople stole trade secrets and confidential information days before leaving the company. The manager of the sales team observes that the text message bubbles are gray and black (even though they were disclosed as color printouts), which seems out of place from traditional messaging color schemes.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Child Custody<\/strong> \u2013 One parent produces text messages proving the other parent\u2019s lack of involvement in the child\u2019s life, including failure to pick up the child at arranged times or provide financial support for the child. The family court officer receiving the screenshots detects that the date and time stamp on the text messages is in the future, instead of in the past.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">In each of these situations, the veracity of the text messages is critical to the legitimacy of the claims. The HR professionals, attorneys, and court officials involved in these circumstances \u2013 and other matters with similar scenarios \u2013 should not accept the communications at face value. Rather, a properly trained forensics examiner should be consulted to confirm the authenticity of the text messages.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-seek-help-from-a-digital-forensics-expert\"><strong>Seek Help From A Digital Forensics Expert<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Modern professionals should be aware of the ease of falsification of text message evidence. If there are any red flags, dig deeper to verify the authenticity of the screenshots or images provided.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Work to determine whether the text messages were truly typed, sent, or received by the parties and that they contain the full conversation. This can be as easy as reaching out to the other parties involved in the alleged communications and asking them to confirm sending or receiving suspect communications.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Also, consult a <a href=\"https:\/\/idsinc.com\/en_gb\/services\/#digital-forensics\" target=\"_blank\" rel=\"noreferrer noopener\">digital forensics expert<\/a> to examine the device(s) that originated and received the messages. Using specialized tools, forensics experts can analyze the metadata associated with the messages in question to substantiate their validity. Forensics experts issue reports and create an affidavit, if needed, to reveal the authenticity (or lack thereof) of the text message(s).&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDiscovery Solutions is a strategic consulting, technology, and expert services firm \u2013 providing customized eDiscovery solutions from digital forensics to expert testimony for law firms and corporations across the United States and Europe.<\/em><\/strong><\/p>\n\n\n<!-- wp:themify-builder\/canvas \/-->","protected":false},"excerpt":{"rendered":"<p>Fake news, false identities, and phony emails \u2013 in today\u2019s digital world, it is becoming increasingly more difficult to detect fact from fiction. Fake Texts Are Easy To Create, Difficult To Detect For lawyers and investigators, discerning what\u2019s real when dealing with digital evidence is more difficult than ever. This is due, in part, to [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":1740,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,30],"tags":[],"class_list":["post-1732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-digital-evidence","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Text Message Screenshots: Real Or Fake? - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/text-message-screenshots\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Text Message Screenshots: Real Or Fake?\" \/>\n<meta property=\"og:description\" content=\"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/text-message-screenshots\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-08T19:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T22:59:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Vaughn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Vaughn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\"},\"author\":{\"name\":\"Jim Vaughn\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d5856b1e9c82af5e2fe3df3d7c5234fc\"},\"headline\":\"Text Message Screenshots: Real Or Fake?\",\"datePublished\":\"2019-07-08T19:40:00+00:00\",\"dateModified\":\"2026-03-05T22:59:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Text-Message-Screenshots.jpg\",\"articleSection\":[\"Blog\",\"Digital Evidence + Data Authenticity\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\",\"name\":\"Text Message Screenshots: Real Or Fake? - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Text-Message-Screenshots.jpg\",\"datePublished\":\"2019-07-08T19:40:00+00:00\",\"dateModified\":\"2026-03-05T22:59:33+00:00\",\"description\":\"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Text-Message-Screenshots.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Text-Message-Screenshots.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/text-message-screenshots\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Text Message Screenshots: Real or Fake?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/d5856b1e9c82af5e2fe3df3d7c5234fc\",\"name\":\"Jim Vaughn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g\",\"caption\":\"Jim Vaughn\"},\"sameAs\":[\"https:\\\/\\\/idsinc.com\\\/team\\\/james-vaughn\\\/\"],\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/jim-vaughn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Text Message Screenshots: Real Or Fake? - iDiscovery Solutions","description":"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/text-message-screenshots\/","og_locale":"en_GB","og_type":"article","og_title":"Text Message Screenshots: Real Or Fake?","og_description":"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.","og_url":"https:\/\/idsinc.com\/en_gb\/text-message-screenshots\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-07-08T19:40:00+00:00","article_modified_time":"2026-03-05T22:59:33+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","type":"image\/jpeg"}],"author":"Jim Vaughn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Vaughn","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/idsinc.com\/text-message-screenshots\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/"},"author":{"name":"Jim Vaughn","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d5856b1e9c82af5e2fe3df3d7c5234fc"},"headline":"Text Message Screenshots: Real Or Fake?","datePublished":"2019-07-08T19:40:00+00:00","dateModified":"2026-03-05T22:59:33+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/"},"wordCount":622,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","articleSection":["Blog","Digital Evidence + Data Authenticity"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/text-message-screenshots\/","url":"https:\/\/idsinc.com\/text-message-screenshots\/","name":"Text Message Screenshots: Real Or Fake? - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","datePublished":"2019-07-08T19:40:00+00:00","dateModified":"2026-03-05T22:59:33+00:00","description":"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts.","breadcrumb":{"@id":"https:\/\/idsinc.com\/text-message-screenshots\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/text-message-screenshots\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/text-message-screenshots\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/08\/Text-Message-Screenshots.jpg","width":2500,"height":1250,"caption":"It\u2019s more difficult to detect fake evidence in our digital world. Fake Text Message Screenshots can be identified digital forensics experts."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/text-message-screenshots\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Text Message Screenshots: Real or Fake?"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/d5856b1e9c82af5e2fe3df3d7c5234fc","name":"Jim Vaughn","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/40e31cb43d0388a015864b3f4a0bfbfaf6d723fbfca5067d802bddd24f682e90?s=96&d=mm&r=g","caption":"Jim Vaughn"},"sameAs":["https:\/\/idsinc.com\/team\/james-vaughn\/"],"url":"https:\/\/idsinc.com\/en_gb\/author\/jim-vaughn\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/1732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=1732"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/1732\/revisions"}],"predecessor-version":[{"id":9432,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/1732\/revisions\/9432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/1740"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=1732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=1732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=1732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}