{"id":9198,"date":"2018-01-25T14:28:53","date_gmt":"2018-01-25T14:28:53","guid":{"rendered":"http:\/\/www.firstlinepractitioners.com\/cybercrime-and-organized-crime\/"},"modified":"2025-01-08T08:51:11","modified_gmt":"2025-01-08T08:51:11","slug":"cybercrime-and-organized-crime","status":"publish","type":"post","link":"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/","title":{"rendered":"Cybercrime and Organized Crime"},"content":{"rendered":"<p><strong>Cybercrime is now far away of hackers fighting with computer systems just for fun or to teas administrators. The growth of the digital economy completely changed the criminal scene where access to assets stored in the computer\u2019s systems becomes a objective of the crime. Possibility of high profit combined with practically very low risks made digital networks an attractive environment for various types of criminal activities. Organized crime in the past had found safe environment in countries with weak governments and unstable political regimes. Today, organized crime use advantage of national jurisdictions with not proper legal frameworks and weak technical capabilities to fight cybercrime.<\/strong><\/p>\n<p>Historically, traditional organized crime and cyber crime have been two discrete branches. There is one overriding message emerging from Europol\u2019s Serious and Organised Crime Threat Assessment 2017 \u2013 organized crime hasfinally gone digital, wiping original difference between this two entities. All possible means had come into consideration of organized crime \u2013 drones, tracking devices, social engineering, hacking, encrypted communication etc. This is a development that law enforcement agencies have to recognize and deal with on a transnational basis.<\/p>\n<p>For Europol, which acts as an information exchange for the EU\u2019s 28 national police agencies, that is an immense challenge. Electorates continue to clamor for more police on foot patrol, but on the same time vast sums are required to keep up with the technological challenge from sophisticated organized crime gangs. According to the SOCTA2, Europol is now combating 5,000 international crime groups within the EU, that means 1,400 more than in 2013. But there are many others operating outside the territory, while selling their illicit goods and services into the EU largely using cybernetic means.<\/p>\n<p>It is not that long ago when Swedish cybercriminal described how he had tried to interest his father\u2019s organized crime operation in Malm\u00f6 in online credit and debit card fraud. \u201cThe returns were much higher and the risks much lower,\u201d he explained, \u201cbut they just couldn\u2019t get their heads round the technology. They preferred to stick with what they knew best \u2014 baseball bats, Semtex and stockings over their heads.\u201d His response hinted distinctive attribute that has kept apart old-style crime and the new world of criminal hackers: the use of violence. In the world of mafia organizations, if you cannot deploy or credibly threaten intimidation, you don\u2019t make it. Violence is the sine qua non of traditional organized crime. But in cybercrime, the physical world is not an issue: you can hatch a crime in Australia with your victim in West Coast of United States while organizing the cash-out in Dubai.<\/p>\n<p>As we already announced, the crime become a digital with all the aspects which could be admissible. The crime itself change not only an environment where it is occurred, but also a time element when days and hours are changed to milliseconds as well as the nature of the tools used on the crime scene which becomes non material. The law enforcement agencies and law itself is very slow in change not achieving the speed of the change in the crime scene. The tools, mode of the operation and immateriality of the environment creates completely new situation for investigators, prosecutors and attorneys in the process of law enforcement and thanks to problematic practices slow in reaction to changes in the society, unpractical to use old tools and habits.<\/p>\n<h4>Crime as a Service<\/h4>\n<p>Steve Durbin1, managing director of the Information Security Forum, proposed the most significant cyber threats ahead the attacks fueled by &#8220;crime-as-a-service&#8221;. &#8220;Crime as a service&#8221; refers to organized crime rings offering services such as on-demand distributed denial-of-service attacks and bulletproof hosting to support malware attacks etc. The easiness of communication, anonymity, and the accessibility of tools for illegal operations have transformed cybercrime into a global, fast-expanding and profit-driven industry with organized criminal groups thriving behind it a machine. Police estimate that just 100 to 200 people may be powering the &#8220;cybercrime-as-a-service&#8221; ecosystem by developing the attack code and services that enable criminals who lack technical acumen to pay for their cybercrime will to be accomplished. Various providers offer such services as installing malware onto PCs and then selling access to those devices; selling subscriptions to malware and ransomware toolkits that automate attacks, with developers taking a cut of all proceeds. There are not rare services that will support gang members with fake debit cards so they can make as many ATM cash withdrawals as possible before banks catch on. Other services will offer to &#8220;clean&#8221; the bitcoins that attackers demand from victims, making them more difficult for authorities to trace. Many cyber-attacks today copy the method of classical racketeering crime, threatening to launch distributed denial-of-service attacks against organizations unless they pay attackers bitcoins. To carry through on those threats, attackers often rely on so- called booter or stresser services2, which sell on-demand DDoS attacks based on traditional business act as issuing purchase order and pay invoice in bitcoin. Based on online advertisements, the cybercrime-for-hire business appears to be so lucrative and booming that hacker gangs can&#8217;t keep their crews staffed. In recent months, crime syndicates have enhanced their ability to share information and collaborate, achieving better understanding of product positioning, of strengths and weaknesses. We are seeing a decrease in the price points for crime as a service, because the market is becoming a little bit more saturated and the consumers or buyers of this service have a little bit more choice.&#8221;<\/p>\n<h4>Big Data Issue<\/h4>\n<p>It looks easy to generate enormous amount of data and then get caught up in opportunity of big data presentation. However, one of the reasons big data is so underutilized is because big data and big data technologies also present many challenges. One survey found that 55% of big data projects are never completed [1]. This finding was repeated in a second survey that found the majority of on-premises big data projects aren\u2019t successful.<\/p>\n<p>With big data, it\u2019s crucial to be able to scale up and down on-demand. Many organizations fail to take into account how quickly a big data project can grow and evolve. Constantly pausing a project to add additional resources cuts into time for data analysis. Big data workloads also tend to be bursty, making it difficult to predict where resources should be allocated. The extent of this big data challenge varies by solution. A solution in the cloud will scale much easier and faster than an on-premises solution. Large scale system requested for storage of tremendous amount of data leads usually to store such a data outside of the company, on cloud systems, when data are transferred to the storage managed by third party, so allowing unobserved analysis and possibly a fraud of the data stored. When attacker penetrate through the first level of the system security \u2013 authentication, then the doors should be open for selling the data as a service for other, possibly competing company.<\/p>\n<p>On the other hand, there should be not necessary to break into the system, data should be accessible openly for further analysis. The security guarding company, contracted to ensure security services including to registering visitors, can easily keep a list of incoming visitors and sell it to the competition. While the number of big data challenges can be overwhelming, it also presents an opportunity. Those businesses, which are able to identify the right infrastructure for their big data project and follow best practices for implementation, will see a significant competitive advantage. Entrepreneurs have also capitalized on big data technology to create new products and services.<\/p>\n<h4>Data Quality<\/h4>\n<p>The care has to be taken about data quality itself, which would be questionable in IoT. It is not a new concern, but the ability to store every piece of data during business produces in its original form compounds the incredible problem. Dirty data costs companies in the United States up to $600 billion every year. Common causes of dirty data that must be addressed include user input errors, duplicate data and incorrect data linking. In addition to being meticulous at maintaining and cleaning data, big data algorithms can also be used to help clean data.<\/p>\n<ul>\n<li><strong>Data<\/strong><strong> Security and Privacy<\/strong><\/li>\n<\/ul>\n<p>Keeping that vast lake of data secure is another big data challenge. Specific challenges include:<\/p>\n<ul>\n<li>Recording data access histories and meeting other compliance regulations<\/li>\n<li>Restricting access based on a user\u2019s<\/li>\n<li>User authentication for every team and team member accessing the<\/li>\n<li>Proper use of encryption on data in-transit and at<\/li>\n<\/ul>\n<p>Data quality faces formidable security challenges. Data security and privacy are being raised ever higher as sensitive healthcare data, personal retail customer data, smartphone data, and social media and sentiment data become more and more a part of the big data mix. It is necessary to reevaluate the safety of data in database and with the following security best practices:<\/p>\n<h5>(i)\u00a0\u00a0\u00a0\u00a0 Plan before you deploy<\/h5>\n<ol>\n<li>data protection strategies must be determined during the planning phase of the new database deployment,<\/li>\n<li>it is critical to identify any sensitive data elements before moving any data into database, along with where those elements will reside in the system,<\/li>\n<li>company privacy policies and pertinent industry and governmental regulations must be taken into consideration during the planning phase in order to better identify and mitigate risk1.<\/li>\n<\/ol>\n<h5>(ii)\u00a0\u00a0 Do not overlook basic security measures<\/h5>\n<ol>\n<li>ensure user identification,<\/li>\n<li>control user access to sensitive data,<\/li>\n<li>create users and groups and then map users to groups; permissions should be assigned and locked down by groups,<\/li>\n<li>use of strong passwords1.<\/li>\n<\/ol>\n<h5>(iii) Choose the right remediation technique<\/h5>\n<ol>\n<li>use remediation techniques as encryption or masking2,<\/li>\n<li>place both masked and unmasked versions of sensitive data in separate<\/li>\n<\/ol>\n<h5>(iv)\u00a0 Ensure that encryption integrates with access control<\/h5>\n<ol>\n<li>make encryption solution compatible with the organization\u2019s access control technology,<\/li>\n<li>keep on mind that users with different credentials won\u2019t have the appropriate, selective access to sensitive data in the environment that they<\/li>\n<\/ol>\n<h5>(v)\u00a0\u00a0\u00a0 Monitor, detect and resolve issues<\/h5>\n<ol>\n<li>even the best security models are inadequate to reality,<\/li>\n<li>organizations need to make sure that best practice monitoring, and detection processes are in<\/li>\n<\/ol>\n<h5>(vi)\u00a0 Ensure proper training and enforcement<\/h5>\n<ol>\n<li>best practice policies and procedures with respect to data security in\u00a0 must \u00a0be frequently revisited,<\/li>\n<li>employee trainings and constant supervision is<\/li>\n<\/ol>\n<h4>Social Impact<\/h4>\n<p>With the development of computer industry and internet networks during the last three decades things have changed and global communication has reached an unprecedented height [2]. With these developments immense scopes have come to the surface to impart learning in a much less efficient and interactive way. Multimedia technology and internet networks had limited and revolutionized the whole philosophy of knowledge and memorization. Quick dispatch of information globally has facilitated the commercial expansion to an extremely high level. Information smog, coming from the internet, television and radio, is continually overloading humans and as an impact the human way of achieving knowledge is changed. The knowledge based information filtering is replaced by emotional filtering and such a way the attitude, supported by knowledge, is replaced by emotional attitudes without any background.<\/p>\n<p>Mankind itself is promptly decreasing the ability to create finding a solution just relying on evaluated information but retrieving the knowledge from the web sites. A lot of the information available on the Internet is incomplete and even incorrect. People spend more and more of their time absorbing irrelevant information just because it is available and they think they should know about it. The role of memory is being downsized to knowledge of internet web site, where we can search for the information \u2013 usually Google, accompanied with endless trust to the information found. The privacy, thanks to social network with a lot of personal documents loaded by users, has potential impact on the security not only the one who loaded it up, but on the sharing companions also.<\/p>\n<p>Increasing \u00a0representation \u00a0of \u00a0a \u00a0wide \u00a0variety \u00a0of \u00a0content \u00a0in \u00a0digital \u00a0form \u00a0results \u00a0in \u00a0easier \u00a0and \u00a0cheaper duplication and distribution of information. This has a mixed effect on the provision of content. On the one hand, content can be distributed at a lower unit cost, easily stolen. On the other hand, distribution of content outside of channels that respect intellectual property rights can reduce the motivations of creators and distributors to produce and make content available in the first place.<\/p>\n<p>Information technology raises a host of questions about intellectual property protection and new tools and regulations have to be developed in order to solve this problem. Many issues also surround free speech and regulation of content on the Internet, and there continue to be calls for mechanisms to control objectionable content. However it is very difficult to find a sensible solution. Dealing with indecent material involves understanding not only the views on such topics but also their evolution over time. Furthermore, the same technology that allows for content altering with respect to decency can be used to alter political speech and to restrict access to political material. Thus, if censorship does not appear to be an option, another possible solution might be labeling1, but introduction of the Offices of Fair Things looks rather curious.<\/p>\n<p>The rapid increase in computing and communications power has raised considerable concern about privacy both in the public and private sector. A technological approach to protecting privacy might by cryptography although it might be claimed that cryptography presents a serious barrier to criminal investigations. Introduction of large global surveillance system as well as broad availability of hidden and spying devices leads to the conclusion that nobody knows who currently collects data about individuals, how this data is used and shared or how this data might be misused. In any case, the \u201cBig Brother\u201d from George Orwell 1984 novel becomes reality. In the view of these concerns the consumers&#8217; trust in online institutions and communication lowers and inhibit the development of electronic commerce.<\/p>\n<p>Therefore, it must be studied how people assign credibility to the information they collect in order to invent and develop new credibility systems to help consumers to manage the information overload. Technological progress inevitably creates dependence on technology.<\/p>\n<h4>Author<\/h4>\n<p>Vaclav Jirovsky, Czech Technical University in Prague<\/p>\n<h4>References<\/h4>\n<p>[1] \u201eWhy 55% of Big Data projects fail \u2013 and what IT can do about it,\u201c IT Manager Daily, February 2013. [Online]. Available: http:\/\/www.itmanagerdaily.com\/big-data-projects-fail\/. [P\u0159\u00edstup z\u00edsk\u00e1n 2017].<\/p>\n<p>[2] \u201eThe Impact of Information Technology on Work and Society,\u201c 6 February 2014. [Online]. Available: http:\/\/www.benmeadowcroft.com\/reports\/impact\/.<\/p>\n<p>[3] \u201eGartner Symposium ITxpo 2014,\u201c Gartner, November 2014. [Online]. Available: http:\/\/www.gartner.com\/imagesrv\/symposium\/barcelona\/docs\/Symp-2014-Barcelona-Trip- Report.pdf. [P\u0159\u00edstup z\u00edsk\u00e1n November 2018].<\/p>\n<p>[4] \u201eREGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE<br \/>\nCOUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC,\u201c EURLEX, pp. L119_1-88, 5 May 2016.<\/p>\n<p>[5] C. Cimpanu, \u201eOwners of vDos, Largest DDoS-For-Hire Service, Officially Charged in Israel,\u201c 10 August 2017. [Online]. Available: https:\/\/www.bleepingcomputer.com\/news\/security\/owners-of- vdos-largest-ddos-for-hire-service-officially-charged-in-israel\/. [P\u0159\u00edstup z\u00edsk\u00e1n 12 December 2017].<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime is now far away of hackers fighting with computer systems just for fun or to teas administrators. The growth of the digital economy completely changed the criminal scene where access to assets stored in the computer\u2019s systems becomes a objective of the crime. Possibility of high profit combined with practically very low risks made<\/p>\n","protected":false},"author":4,"featured_media":7256,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[153],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercrime and Organized Crime - FIRST-LINE PRACTITIONERS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime and Organized Crime - FIRST-LINE PRACTITIONERS\" \/>\n<meta property=\"og:description\" content=\"Cybercrime is now far away of hackers fighting with computer systems just for fun or to teas administrators. The growth of the digital economy completely changed the criminal scene where access to assets stored in the computer\u2019s systems becomes a objective of the crime. Possibility of high profit combined with practically very low risks made\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"FIRST-LINE PRACTITIONERS\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-25T14:28:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T08:51:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.firstlinepractitioners.com\/wp-content\/uploads\/2018\/04\/cybercrime-e1523531747515.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"takedown\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"takedown\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/\",\"url\":\"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/\",\"name\":\"Cybercrime and Organized Crime - FIRST-LINE PRACTITIONERS\",\"isPartOf\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#website\"},\"datePublished\":\"2018-01-25T14:28:53+00:00\",\"dateModified\":\"2025-01-08T08:51:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/7d5a619c42df960d0c5d11e863fa4ffd\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firstlinepractitioners.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime and Organized Crime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#website\",\"url\":\"https:\/\/www.firstlinepractitioners.com\/el\/\",\"name\":\"FIRST-LINE PRACTITIONERS\",\"description\":\"Curricula - Knowledge - Navigation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firstlinepractitioners.com\/el\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/7d5a619c42df960d0c5d11e863fa4ffd\",\"name\":\"takedown\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1392f034480ca8e6cd0982311e71e125?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1392f034480ca8e6cd0982311e71e125?s=96&d=mm&r=g\",\"caption\":\"takedown\"},\"url\":\"https:\/\/www.firstlinepractitioners.com\/it\/author\/takedown\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime and Organized Crime - FIRST-LINE PRACTITIONERS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/","og_locale":"it_IT","og_type":"article","og_title":"Cybercrime and Organized Crime - FIRST-LINE PRACTITIONERS","og_description":"Cybercrime is now far away of hackers fighting with computer systems just for fun or to teas administrators. The growth of the digital economy completely changed the criminal scene where access to assets stored in the computer\u2019s systems becomes a objective of the crime. Possibility of high profit combined with practically very low risks made","og_url":"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/","og_site_name":"FIRST-LINE PRACTITIONERS","article_published_time":"2018-01-25T14:28:53+00:00","article_modified_time":"2025-01-08T08:51:11+00:00","og_image":[{"width":2000,"height":1125,"url":"https:\/\/www.firstlinepractitioners.com\/wp-content\/uploads\/2018\/04\/cybercrime-e1523531747515.jpg","type":"image\/jpeg"}],"author":"takedown","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"takedown","Tempo di lettura stimato":"12 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/","url":"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/","name":"Cybercrime and Organized Crime - FIRST-LINE PRACTITIONERS","isPartOf":{"@id":"https:\/\/www.firstlinepractitioners.com\/el\/#website"},"datePublished":"2018-01-25T14:28:53+00:00","dateModified":"2025-01-08T08:51:11+00:00","author":{"@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/7d5a619c42df960d0c5d11e863fa4ffd"},"breadcrumb":{"@id":"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstlinepractitioners.com\/it\/cybercrime-and-organized-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firstlinepractitioners.com\/it\/"},{"@type":"ListItem","position":2,"name":"Cybercrime and Organized Crime"}]},{"@type":"WebSite","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#website","url":"https:\/\/www.firstlinepractitioners.com\/el\/","name":"FIRST-LINE PRACTITIONERS","description":"Curricula - Knowledge - Navigation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstlinepractitioners.com\/el\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/7d5a619c42df960d0c5d11e863fa4ffd","name":"takedown","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.firstlinepractitioners.com\/el\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1392f034480ca8e6cd0982311e71e125?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1392f034480ca8e6cd0982311e71e125?s=96&d=mm&r=g","caption":"takedown"},"url":"https:\/\/www.firstlinepractitioners.com\/it\/author\/takedown\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/posts\/9198"}],"collection":[{"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/comments?post=9198"}],"version-history":[{"count":1,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/posts\/9198\/revisions"}],"predecessor-version":[{"id":9208,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/posts\/9198\/revisions\/9208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/media\/7256"}],"wp:attachment":[{"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/media?parent=9198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/categories?post=9198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firstlinepractitioners.com\/it\/wp-json\/wp\/v2\/tags?post=9198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}