{"id":4034,"date":"2012-06-01T07:01:29","date_gmt":"2012-06-01T12:01:29","guid":{"rendered":"http:\/\/www.ict-pulse.com\/wp-content\/uploads\/2012\/06\/Structure-of-cyber-crime-syndicate..jpg"},"modified":"2012-06-01T07:01:29","modified_gmt":"2012-06-01T12:01:29","slug":"structure-of-cyber-crime-syndicate","status":"inherit","type":"attachment","link":"https:\/\/ict-pulse.com\/2012\/06\/escalating-cyber-security-up-the-political-agenda\/structure-of-cyber-crime-syndicate\/","title":{"rendered":"Structure of cyber crime syndicate."},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false},"class_list":["post-4034","attachment","type-attachment","status-inherit","hentry"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/a2iE1G-134","description":{"rendered":"