{"id":3547,"date":"2019-04-04T09:00:00","date_gmt":"2019-04-04T15:00:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=3547"},"modified":"2022-04-12T14:22:19","modified_gmt":"2022-04-12T20:22:19","slug":"electronic-evidence","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/electronic-evidence\/","title":{"rendered":"Trust But Verify: How To Approach Electronic Evidence"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3547\" data-postid=\"3547\" class=\"themify_builder_content themify_builder_content-3547 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\">When word processing and graphic design became desktop tools, there was a concern that bad actors now had the ability to create fake documents. And some did.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">But today, even as the world has become more and more digitized, one of the unintended consequences of that interwoven digitalization is the increased difficulty to create fake evidence. This is due to several contributing factors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4 Reason It\u2019s Harder To Create Fake Evidence<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">First, our individual documents have become increasing complex. Take email as an example. Originally, emails were simple text communications with limited features. Today, they can be colorful, animated, filled with attachments, broadcast to many recipients, prioritized, rules-driven, automated, and be set up for automatic responses.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">All of these aspects rely on a variety of features that, themselves, carry a variety of metadata or tell-tale characteristics, that can easily be overlooked by the average forger, or incorrectly replicated. In one recent case, recently, a plaintiff fabricated a PDF of an alleged email chain. In one of the subject lines, he used mixed Serif and Sans Serif fonts. This cannot happen in a valid email. This was a fatal flaw.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Second, we work with software stacks. A \u201cstack\u201d is a collection of software tools that are combined to provide a collective capability. When you use multiple tools in combination with each other, each is assisting, and recording, the events. Eventually, these recorded stories have to agree. When evidence is faked, they don\u2019t.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Third, our operating systems have become more and more user friendly, which in turn requires a lot more work behind the scenes. This work is facilitated with system handshakes, activity logs, security checks, and other systems that, again, record and document what the system is doing on a high-volume and high-frequency basis.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, thanks to connectivity and mobility, the systems that we use go through a variety of service providers to bring data from point A to point B. Not only does this create a data trail, that trail is often in the hands of multiple systems, belonging to multiple service providers. Even if you knew all the places to create fake data, or falsely change existing data, it\u2019s impossible to gain modification access to all of them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For all of these reasons, compounded with the need for disaster recovery, data security, and data privacy \u2013 all of which result in more tracking, more logs, and more copies of our activities \u2013 it has become increasingly impossible to fully fake evidence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-should-you-accept-or-dig-look-for-these-red-flags\"><strong>Should You Accept Or Dig? Look For These Red Flags<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Instead, forgers can only hope that you do not dig deep enough. The challenge then becomes knowing when to accept, and when to dig. Here are some easy flags to look for to determine if you should accept, or challenge, data:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Is it too good to be true? If so, then it might be worth looking into.<\/li><li>Is the electronic copy missing? When we see key evidence produced only in paper form, where the original is no longer available, then that raises &nbsp;a red flag.<\/li><li>Are there no other witnesses? When we have cases where other people involved in a document, or an email communication, are not available and only the person proffering the evidence is available to discuss it, or \u2013 worse yet \u2013 there are others who do not recall the document, or refute it, that is a red flag.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Recently, we had a case where all three red flags came up. That warranted a deeper dive into the evidence (in this case one email, one read receipt, and one picture of the plaintiff\u2019s outbox). That deeper dive revealed over 100 problems in the evidence. It wasn\u2019t just fake, it was really, really fake.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The U.S. legal system relies on the integrity of the parties to allow our system of civil procedure and discovery to work. But, in the words of Ronald Reagan during his administration\u2019s negotiations with our adversaries and our allies, sometimes you need to take a position of \u201ctrust but verify.\u201d We promote the same approach with respect to electronic evidence. Especially where red flags start to show.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage&nbsp; \u2013 both in and out of the courtroom. Our subject matter experts and data&nbsp; strategists specialize in finding solutions to complex data problems \u2013 ensuring data can be leveraged as an asset and not a liability.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>When word processing and graphic design became desktop tools, there was a concern that bad actors now had the ability to create fake documents. And some did. But today, even as the world has become more and more digitized, one of the unintended consequences of that interwoven digitalization is the increased difficulty to create fake [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3548,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-3547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Trust But Verify: How To Approach Electronic Evidence - iDS<\/title>\n<meta name=\"description\" content=\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/electronic-evidence\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust But Verify: How To Approach Electronic Evidence\" \/>\n<meta property=\"og:description\" content=\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/electronic-evidence\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-04T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-12T20:22:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Regard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Regard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"},\"author\":{\"name\":\"Dan Regard\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/803ad31781146823f476911393d83156\"},\"headline\":\"Trust But Verify: How To Approach Electronic Evidence\",\"datePublished\":\"2019-04-04T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:22:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"},\"wordCount\":749,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\",\"name\":\"Trust But Verify: How To Approach Electronic Evidence - iDS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"datePublished\":\"2019-04-04T15:00:00+00:00\",\"dateModified\":\"2022-04-12T20:22:19+00:00\",\"description\":\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Electronic-Evidence.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/electronic-evidence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trust But Verify: How To Approach Electronic Evidence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/803ad31781146823f476911393d83156\",\"name\":\"Dan Regard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g\",\"caption\":\"Dan Regard\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/dan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Trust But Verify: How To Approach Electronic Evidence - iDS","description":"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/electronic-evidence\/","og_locale":"en_GB","og_type":"article","og_title":"Trust But Verify: How To Approach Electronic Evidence","og_description":"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.","og_url":"https:\/\/idsinc.com\/en_gb\/electronic-evidence\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2019-04-04T15:00:00+00:00","article_modified_time":"2022-04-12T20:22:19+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","type":"image\/jpeg"}],"author":"Dan Regard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Regard","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/electronic-evidence\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/"},"author":{"name":"Dan Regard","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/803ad31781146823f476911393d83156"},"headline":"Trust But Verify: How To Approach Electronic Evidence","datePublished":"2019-04-04T15:00:00+00:00","dateModified":"2022-04-12T20:22:19+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/"},"wordCount":749,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","articleSection":["Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/electronic-evidence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/electronic-evidence\/","url":"https:\/\/idsinc.com\/electronic-evidence\/","name":"Trust But Verify: How To Approach Electronic Evidence - iDS","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","datePublished":"2019-04-04T15:00:00+00:00","dateModified":"2022-04-12T20:22:19+00:00","description":"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data.","breadcrumb":{"@id":"https:\/\/idsinc.com\/electronic-evidence\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/electronic-evidence\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/electronic-evidence\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/04\/Electronic-Evidence.jpg","width":2500,"height":1250,"caption":"When should you take a deeper dive into the evidence? Learn some easy flags to look for to determine if you should accept or challenge data."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/electronic-evidence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Trust But Verify: How To Approach Electronic Evidence"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/803ad31781146823f476911393d83156","name":"Dan Regard","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/71f395a2e924fed8327f7eae9a8e3f3c021847644b1cea8c14a20b0396aa22f1?s=96&d=mm&r=g","caption":"Dan Regard"},"url":"https:\/\/idsinc.com\/en_gb\/author\/dan\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/3547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=3547"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/3547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/3548"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=3547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=3547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=3547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}