{"id":25330,"date":"2021-12-09T16:02:00","date_gmt":"2021-12-10T00:02:00","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=25330"},"modified":"2022-04-13T12:22:00","modified_gmt":"2022-04-13T20:22:00","slug":"social-media-identity-theft","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/","title":{"rendered":"\u201cI\u2019ve Been Hacked!\u201d Your Guide to Social Media Identity Theft"},"content":{"rendered":"\n<p>There are several kinds of posts you can expect to see pretty regularly on social media.&nbsp; There\u2019s the \u201chaving a great time, don\u2019t you wish you were here?\u201d vacation post; there\u2019s the picture-perfect meal post; there\u2019s the \u201cno, seriously, I just rolled out looking like this\u201d post; and \u2014 increasingly \u2014 the despairing \u201cthat wasn\u2019t me, my account was hacked or something!\u201d post.&nbsp;<\/p>\n\n\n\n<p>That last one is the result of social media identity theft: someone using your name and image on social media, or using it as part of an all-new <a href=\"https:\/\/www.spokeo.com\/compass\/what-is-synthetic-identity-theft\">synthetic identity<\/a>.\u00a0 It\u2019s something that can complicate your life in embarrassing and sometimes costly ways, so it\u2019s well worth taking a closer look at how social media identity theft works and what the scammers want.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Scammers Love Social Media<\/h2>\n\n\n\n<p>Social media sites are a fertile ground for identity theft, because sharing the details of your personal life is what they\u2019re <em>for<\/em>.&nbsp; While scammers sometimes manage to capture entire identities at once through <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\">phishing schemes<\/a> or major data breaches, more often they\u2019ll have just one or two crucial pieces and will need to find enough additional information to meaningfully impersonate you.&nbsp;<\/p>\n\n\n\n<p>That\u2019s where social media comes in.&nbsp; Someone who follows you, or is a friend of a friend, could pretty easily glean all the information they need to fill in those blanks: birthday wishes and a mention of your age give them your birthdate; discussions of genealogy can give them your mom\u2019s maiden name; and it\u2019s equally easy \u2014 if you\u2019re incautious \u2014 to pick out details like your location, the names of your kids and pets and a whole lot more.&nbsp;<\/p>\n\n\n\n<p>Sometimes that information is used for conventional identity theft, resulting in damaged credit and financial losses to you personally.&nbsp; Other times the information you\u2019ve given away is deployed on social media, in ways ranging from the (relatively) innocuous to the mercenary to the downright \u2014 and personally \u2014 malicious. It might be used to create a fake profile with your name and image, or in a worst-case scenario to actively take over your own real account.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Social Media Identity Theft Is Used<\/h2>\n\n\n\n<p>How an attacker uses your identity on social media can be pretty varied, depending who\u2019s using it and what their goals are.\u00a0 There are an almost infinite number of variations on the theme, but they break down into a handful of broad categories that account for most known cases.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Pranks<\/h3>\n\n\n\n<p>If you\u2019re <em>really<\/em> lucky, the end result of social media identity theft might be nothing more than a harmless prank instigated by a friend, a family member or a random stranger (the modern equivalent of an older day\u2019s prank phone calls).&nbsp; It could happen, but it\u2019s likely you\u2019ll see something more serious instead.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Catfishing<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft-victim-of-catfishing\/\">Catfishing<\/a> is simply pretending to be someone you\u2019re not.&nbsp; On the most innocuous level, a catfisher might steal your photo because they think your face is more attractive than their own (which is flattering, if a bit creepy).&nbsp; It grows from insecurity and a desire to be someone else for just a little while.&nbsp;<\/p>\n\n\n\n<p>On the downside, catfishing can also be done for more malicious reasons.&nbsp; It might be the setup to a cruel prank, or the prelude to actual criminal activity.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Romance Scams<\/h3>\n\n\n\n<p>This is one of those malicious reasons.&nbsp; A scammer might use your image, or your name and identity, to woo someone online.&nbsp; They might even present photos of your family as photos of their own family.&nbsp; It all helps build a plausible identity, which ultimately \u2014 for most <a href=\"https:\/\/www.spokeo.com\/compass\/top-3-online-dating-tips-avoid-romance-scams-2\/\">romance scams<\/a> \u2014 ends in a financial loss for you.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Personal, Individualized Malice<\/h3>\n\n\n\n<p>This is a tough one.&nbsp; Someone who knows and dislikes you personally, or encounters you online and takes exception to your views, could use your information to take control of your account or set up a fake account (a \u201csock puppet\u201d) under your name.&nbsp; At that point, they\u2019ll use it to post material that casts you in a negative light.&nbsp; In extreme cases, if the faux you posts defamatory, hateful or criminal content, it could even have legal repercussions for the real you.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Scamming Your Friends and Family<\/h3>\n\n\n\n<p>One of the most common forms of fraud on <a href=\"https:\/\/www.spokeo.com\/compass\/is-venmo-safe-protecting-yourself-against-hacks-and-scams\/\">Venmo<\/a> and other cash apps comes from scammers who pretend to be you and reach out to your friends and family to ask for (financial) help with a sudden emergency.&nbsp; Once the money is sent, it\u2019s typically gone forever.&nbsp; A variation on the theme urges your acquaintances to put their money into bogus investments, often a dodgy cryptocurrency or \u201cmoney-flipping\u201d scheme.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Phishing Your Family, Friends or Work Contacts<\/h3>\n\n\n\n<p>Scammers can also use your social media identity to send phishing messages to your friends and family, and perhaps \u2014 if you use social media for work purposes \u2014 your colleagues (maybe your boss!), clients and prospects as well.&nbsp; Messages that appear to come from a trusted source are <a href=\"https:\/\/www.wrcbtv.com\/story\/42255734\/what-the-tech-how-identity-theft-happens-on-social-media\">more likely to be clicked<\/a>, and so are malicious, identity-stealing links in those messages.&nbsp; With that advantage, criminals can then leverage their information in turn.&nbsp; It\u2019s like the evil twin of word-of-mouth advertising.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Know When Your Social Media Identity Has Been Stolen<\/h2>\n\n\n\n<p>There are several ways to know when you\u2019ve been the victim of social media identity theft.&nbsp; One is when you start receiving angry messages from friends who\u2019ve been deceived, or are shocked at something the faux you have posted.&nbsp; If the scammer has taken active control of your actual personal account, you might find that you\u2019ve been locked out and that the password and the phone number used for recovery purposes have been changed.&nbsp;<\/p>\n\n\n\n<p>It\u2019s better, of course, to catch on before the trap is sprung.&nbsp; Proactively checking your own identity on a regular basis is a good way to do that.&nbsp; Set a particular day at least once a month: it could be calendar driven (the first Sunday) or inspired by an existing habit (the same day you check your statements, or pay your bills, or wash the car).&nbsp; Start by using Spokeo\u2019s <a href=\"https:\/\/www.spokeo.com\/\">people search tools<\/a> to search your own name, address, email and phone number.&nbsp; If you find more than one you, or you on a social-media platform you don\u2019t use, you\u2019ll know you may have a problem.&nbsp;<\/p>\n\n\n\n<p>Next, search yourself on all of the social media platforms you actually use, to see if there\u2019s a duplicate.&nbsp; If so, notify the company immediately. Finally \u2014 because your photos are a part of your identity that\u2019s often stolen and misused rather than your name \u2014 pop a dozen or so of your recent photos into Google\u2019s <a href=\"https:\/\/support.google.com\/websearch\/answer\/1325808?co=GENIE.Platform%3DDesktop&amp;hl=en&amp;oco=2\">reverse image search<\/a> tool.&nbsp; If they show up on a social media or dating site with someone else\u2019s name attached (or yours), that\u2019s a pretty definite red flag.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting Yourself on Social Media<\/h2>\n\n\n\n<p>So how do you <a href=\"https:\/\/us.norton.com\/internetsecurity-crm-identitytheftprotection-social-media-identity-theft-how-to-protect-yourself.html\">protect yourself<\/a> from social media identity theft?&nbsp; Well, if you hear that there\u2019s been a data breach at a site you use, the first thing you should do is change your password <em>immediately<\/em>. &nbsp; In fact, it\u2019s a good idea to change your password regularly just in case.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Your next step should be to review the privacy settings across all of your social media accounts:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You don\u2019t necessarily have to <a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-what-you-need-to-know-about-public-vs-private-social-media-accounts\/\">make your account private<\/a> (though it\u2019s a good idea for some).&nbsp; Changing your default settings so that only friends see your posts by default, and you have to deliberately make things public, is better than doing it the other way around.&nbsp;<\/li><li>You should also <a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-social-media-follower-audit\/\">audit your friends and followers<\/a>, trimming away any you don\u2019t know and whose own accounts look suspiciously thin.&nbsp;<\/li><li>Finally, tackle your photos.&nbsp; Make those private or friends-only, so they\u2019re less likely to be stolen.&nbsp; Your photos also contain metadata that tells when and where they were taken, so you should learn <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/remove-metadata-from-photos\/\">how to strip that out<\/a> by default.&nbsp;<\/li><\/ul>\n\n\n\n<p>Ultimately, the biggest thing you can do to protect yourself on social media (and elsewhere online) is both the simplest and the hardest: stop oversharing, especially when <a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2021\/02\/social-media-no-place-covid-19-vaccination-cards\">personally identifying information<\/a> is involved.\u00a0 Before you click \u201cSubmit\u201d on that next post, take a moment to ask yourself whether it <em>really<\/em> needs to be shared beyond a few close friends (or at all).\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sources<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>WRCB Chattanooga: <a href=\"https:\/\/www.wrcbtv.com\/story\/42255734\/what-the-tech-how-identity-theft-happens-on-social-media\">What the Tech? How Identity Theft Happens on Social Media<\/a><\/li><li>Google Search Help: <a href=\"https:\/\/support.google.com\/websearch\/answer\/1325808?co=GENIE.Platform%3DDesktop&amp;hl=en&amp;oco=2\">Search With an Image on Google<\/a><\/li><li>Have I Been Pwned?: <a href=\"https:\/\/haveibeenpwned.com\/Passwords\">Pwned Passwords<\/a><\/li><li>Comparitech: <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/remove-metadata-from-photos\/\">How to Remove Metadata From Your Photos<\/a><\/li><li>Norton: <a href=\"https:\/\/us.norton.com\/internetsecurity-crm-identitytheftprotection-social-media-identity-theft-how-to-protect-yourself.html\">Social Media Identity Theft: How to Protect Yourself<\/a><\/li><li>US Federal Trade Commission: <a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2021\/02\/social-media-no-place-covid-19-vaccination-cards\">Social Media is No Place for COVID-19 Vaccination Cards<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>There are several kinds of posts you can expect to see pretty regularly on social media.&nbsp; There\u2019s the \u201chaving a great time, don\u2019t you wish you were here?\u201d vacation post;&hellip;<\/p>\n","protected":false},"author":112,"featured_media":25331,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[810],"tags":[],"class_list":["post-25330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Social Media Identity Theft: What It Is, How It Happens | Spokeo<\/title>\n<meta name=\"description\" content=\"Social media identity theft may not get the same kind of attention as big data breaches, but it\u2019s dangerous and widespread. Learn how it works, how to recognize when it happens and what to do about it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Media Identity Theft: What It Is, How It Happens | Spokeo\" \/>\n<meta property=\"og:description\" content=\"Social media identity theft may not get the same kind of attention as big data breaches, but it\u2019s dangerous and widespread. Learn how it works, how to recognize when it happens and what to do about it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-10T00:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T20:22:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/\",\"name\":\"Social Media Identity Theft: What It Is, How It Happens | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1\",\"datePublished\":\"2021-12-10T00:02:00+00:00\",\"dateModified\":\"2022-04-13T20:22:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"Social media identity theft may not get the same kind of attention as big data breaches, but it\u2019s dangerous and widespread. Learn how it works, how to recognize when it happens and what to do about it.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1\",\"width\":1170,\"height\":600},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Media Identity Theft: What It Is, How It Happens | Spokeo","description":"Social media identity theft may not get the same kind of attention as big data breaches, but it\u2019s dangerous and widespread. Learn how it works, how to recognize when it happens and what to do about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/","og_locale":"en_US","og_type":"article","og_title":"Social Media Identity Theft: What It Is, How It Happens | Spokeo","og_description":"Social media identity theft may not get the same kind of attention as big data breaches, but it\u2019s dangerous and widespread. Learn how it works, how to recognize when it happens and what to do about it.","og_url":"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2021-12-10T00:02:00+00:00","article_modified_time":"2022-04-13T20:22:00+00:00","og_image":[{"width":1170,"height":600,"url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/","url":"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/","name":"Social Media Identity Theft: What It Is, How It Happens | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1","datePublished":"2021-12-10T00:02:00+00:00","dateModified":"2022-04-13T20:22:00+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"Social media identity theft may not get the same kind of attention as big data breaches, but it\u2019s dangerous and widespread. Learn how it works, how to recognize when it happens and what to do about it.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1","width":1170,"height":600},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/IDPBeAwareOfSocialMediaIdentityTheft_1170x600.jpg?fit=1170%2C600&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-6Ay","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=25330"}],"version-history":[{"count":2,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25330\/revisions"}],"predecessor-version":[{"id":25368,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25330\/revisions\/25368"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/25331"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=25330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=25330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=25330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}