{"id":4034,"date":"2012-06-01T07:01:29","date_gmt":"2012-06-01T12:01:29","guid":{"rendered":"http:\/\/www.ict-pulse.com\/wp-content\/uploads\/2012\/06\/Structure-of-cyber-crime-syndicate..jpg"},"modified":"2012-06-01T07:01:29","modified_gmt":"2012-06-01T12:01:29","slug":"structure-of-cyber-crime-syndicate","status":"inherit","type":"attachment","link":"https:\/\/ict-pulse.com\/2012\/06\/escalating-cyber-security-up-the-political-agenda\/structure-of-cyber-crime-syndicate\/","title":{"rendered":"Structure of cyber crime syndicate."},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false},"class_list":["post-4034","attachment","type-attachment","status-inherit","hentry"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/a2iE1G-134","description":{"rendered":"

\"\"<\/a><\/p>\n"},"caption":{"rendered":"

Figure 1: Typical structure of a well organised cyber crime syndicate (Source: ICT Pulse)<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":"488","height":"327","hwstring_small":"height='85' width='128'","file":"2012\/06\/Structure-of-cyber-crime-syndicate..jpg","sizes":{"thumbnail":{"file":"Structure-of-cyber-crime-syndicate.-150x150.jpg","width":"150","height":"150","source_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2012\/06\/Structure-of-cyber-crime-syndicate..jpg?resize=150%2C150&ssl=1"},"medium":{"file":"Structure-of-cyber-crime-syndicate.-300x201.jpg","width":"300","height":"201","source_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2012\/06\/Structure-of-cyber-crime-syndicate..jpg?fit=300%2C201&ssl=1"},"post-thumbnail":{"file":"Structure-of-cyber-crime-syndicate.-488x198.jpg","width":"488","height":"198","source_url":"https:\/\/ict-pulse.com\/wp-content\/uploads\/2012\/06\/Structure-of-cyber-crime-syndicate.-488x198.jpg"},"full":{"file":"Structure-of-cyber-crime-syndicate..jpg?fit=488%2C327&ssl=1","width":488,"height":327,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2012\/06\/Structure-of-cyber-crime-syndicate..jpg?fit=488%2C327&ssl=1"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":""}},"post":4032,"source_url":"https:\/\/ict-pulse.com\/wp-content\/uploads\/2012\/06\/Structure-of-cyber-crime-syndicate..jpg","_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/4034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=4034"}]}}