{"id":26814,"date":"2023-10-23T13:53:16","date_gmt":"2023-10-23T21:53:16","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=26814"},"modified":"2023-10-23T13:53:17","modified_gmt":"2023-10-23T21:53:17","slug":"10-most-common-internet-crimes","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/","title":{"rendered":"Top 10 Internet Crimes Ranked by the FBI (and How to Protect Yourself)"},"content":{"rendered":"\n<p>As the internet grows, it\u2019s more important than ever to be a smart and savvy web user.&nbsp; Whether you use the internet for games and social media, or to conduct business, you could be at risk of becoming the next victim of the most common internet crimes.&nbsp; Take a look below at the top online crimes, according to the <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\">FBI<\/a>, and learn what you can do to protect yourself.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Phishing Scams&nbsp;<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 300,497&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $52,089,159<\/p>\n\n\n\n<p>Phishing scams are a common type of fraud where scammers pose as authority figures or agencies and request personal data or login information from unsuspecting users.&nbsp; This can be done manually via message or by leading the user to a decoy website that looks legitimate, where they unwittingly enter their identifying information for the scammer to record.&nbsp;<\/p>\n\n\n\n<p>One of the most well-known phishing tactics is the <a href=\"https:\/\/consumer.ftc.gov\/consumer-alerts\/2023\/05\/those-urgent-emails-metamask-and-paypal-are-phishing-scams\">PayPal scam<\/a>, where users are sent an email that appears to be from PayPal saying their account has been compromised.&nbsp; They are prompted to enter their credit card details to confirm their account, which are then just sent to the scammer to commit fraud with.&nbsp;<\/p>\n\n\n\n<p><strong><em>Find out who\u2019s really emailing you with a <\/em><\/strong><a href=\"https:\/\/www.spokeo.com\/email-search\"><strong><em>reverse email lookup<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Personal Data Breaches&nbsp;<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 58,859&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $742,438,136<\/p>\n\n\n\n<p>Personal data breaches occur when non-public, personal data or confidential information provided in confidence to a trusted third party is leaked or published without the consumer\u2019s permission, usually due to an intrusion or security breach of the trusted third party\u2019s systems.&nbsp;&nbsp;<\/p>\n\n\n\n<p>These breaches often involve multiple consumers\u2019 non-public information being breached at the same time and can precede other crimes on this list, like credit card fraud or <a href=\"https:\/\/www.spokeo.com\/compass\/latest-blackmail-scams\/\">blackmail<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Non-payment and Non-delivery&nbsp;<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 51,679&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $281,770,073<\/p>\n\n\n\n<p>Non-payment and non-delivery scams are types of fraud intended to take advantage of a buy\/sell relationship between two people.&nbsp; In a nonpayment scam, a buyer will promise payment up until the point at which the goods are shipped or the service has been rendered, after which the buyer will then \u201cghost\u201d the supplier without ever making the payment.&nbsp;<\/p>\n\n\n\n<p>In a nondelivery scam, the seller will accept payment for goods or services and either fail to provide them or provide a different product or one of lesser quality.&nbsp; A good example of this is the prom dress scam, where suppliers will photograph a high-quality gown for the product listing, but ship out a dress that looks completely different and is even unwearable.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Extortion&nbsp;<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 39,416&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $54,335,128<\/p>\n\n\n\n<p>Extortion involves obtaining money or something else of value by using threats, coercion or force.&nbsp; Blackmail, for example, is a form of extortion that involves threatening someone with the release of sensitive information that could negatively impact them in exchange for payment.&nbsp; Robbery is another form of extortion, where one or more people are forced to give an offender money and are threatened with violence or harm if they aren\u2019t complicit.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Tech Support Scams<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 32,538&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $806,551,993<\/p>\n\n\n\n<p>Tech support scams involve fraudsters posing as tech support or customer service representatives in order to obtain personal information, logins, debit or credit card numbers and important account data from people who are calling in for help.&nbsp;<\/p>\n\n\n\n<p>They often intercept calls coming into support centers and will pretend they work for whichever company you are trying to reach.&nbsp; These scammers seem helpful and genuine but are simply playing a role until there\u2019s a good time to ask you to reveal sensitive data.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. Investment Fraud<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 30,529&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $3,311,742,206<\/p>\n\n\n\n<p>Investment fraud is a type of theft that involves the use of deception to convince people to make investments based on wrong or misrepresented information.&nbsp; Pyramid and Ponzi schemes are two common investment scams that are designed to encourage good faith investors into putting their money into a venture meant to fail.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7. Identity Theft&nbsp;<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 27,922&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $189,205,793<\/p>\n\n\n\n<p><a href=\"https:\/\/www.spokeo.com\/compass\/how-to-check-for-identity-theft\/\">Identity theft<\/a> is a serious crime that involves using the Personal Identifying Information (PII) of someone else for the purpose of committing fraud.&nbsp; Identity theft is often medical or financial in nature and can take place online or off.&nbsp;<\/p>\n\n\n\n<p>For example, someone might hack a hospital\u2019s computer system via a security or personal data breach to steal the medical insurance information of hundreds of patients, which they can then sell for thousands of dollars on the <a href=\"https:\/\/www.spokeo.com\/compass\/difference-between-deep-web-and-dark-web\/\">dark web<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">8. Credit Card &amp; Check Fraud&nbsp;<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 22,985&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $264,148,905<\/p>\n\n\n\n<p>Credit card and <a href=\"https:\/\/www.nytimes.com\/2023\/03\/10\/your-money\/check-fraud-protection.html\">check fraud<\/a> is a broad category of fraud that includes any unauthorized transaction using a credit card, debit card, check or ACH transfer.&nbsp; Thieves can steal your credit card or checkbook and use them to pay for things in person, or obtain your information and use it to complete financial transactions online.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">9. Business Email Compromise (BEC)&nbsp;<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 21,832&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $2,742,354,049<\/p>\n\n\n\n<p>Business Email Compromise, or BEC, is a kind of online scam that uses sophisticated software to hack company email accounts and other forms of communication to make an unauthorized transfer of funds.&nbsp;<\/p>\n\n\n\n<p>An example of this is when a business manager gets an email from what looks like a vendor they normally deal with, giving them a change of address for payments.&nbsp; The manager then starts to mail checks to a scammer who\u2019s only posed as the vendor.&nbsp; This can go on for some time until both the manager and the vendor understand what happened.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">10. Spoofing Scams&nbsp;<\/h2>\n\n\n\n<p><strong>Number of victims in 2022:<\/strong> 20,649&nbsp;<\/p>\n\n\n\n<p><strong>Total victim losses:<\/strong> $107,926,252<\/p>\n\n\n\n<p>Spoofing scams involve the falsification of legitimate contact information for the purpose of leading unsuspecting users into providing their personal data.&nbsp;<\/p>\n\n\n\n<p>For example, someone running a spoof scam might get a <a href=\"https:\/\/www.spokeo.com\/compass\/track-phone-number\/\">telephone number<\/a> similar to a known debt collector and copy their greeting to a T.&nbsp; Then, they contact people to demand payment, usually by threatening them with negative action to their credit score, or even wage garnishment.&nbsp; And when users comply out of fear, they\u2019re defrauded when scammers take payment for a fake debt they\u2019ve created.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Yourself Against Internet Crimes&nbsp;<\/h2>\n\n\n\n<p>Whether for work or play, taking steps to protect yourself when engaging with people online is of the utmost importance.&nbsp; Never give your personal or financial information to anyone else online, even if they appear to be legitimate.&nbsp; Don\u2019t click on links from your email to websites that require you to enter your username and password, and be sure to update your login information frequently.&nbsp;<\/p>\n\n\n\n<p>You can also check with people search sites like Spokeo to verify if the people you\u2019re talking to on the web are who they say they are.&nbsp; For example, if someone claiming to be a business CEO is asking for your credit card information, you can use people&#8217;s search engines to find out if they gave you the name of a real person or if they work at the company they claim to.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Sources:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Federal Trade Commission &#8211; <a href=\"https:\/\/consumer.ftc.gov\/consumer-alerts\/2023\/05\/those-urgent-emails-metamask-and-paypal-are-phishing-scams\">Those urgent emails from MetaMask and PayPal are phishing scams<\/a><\/li>\n\n\n\n<li>The New York Times &#8211; <a href=\"https:\/\/www.nytimes.com\/2023\/03\/10\/your-money\/check-fraud-protection.html\">Check Fraud Is on the Rise. Here\u2019s What You Can Do to Prevent It.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>As the internet grows, it\u2019s more important than ever to be a smart and savvy web user.&nbsp; Whether you use the internet for games and social media, or to conduct&hellip;<\/p>\n","protected":false},"author":33,"featured_media":26815,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-26814","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The 10 Most Common Internet Crimes, According to the FBI | Spokeo<\/title>\n<meta name=\"description\" content=\"Learn about the 10 most common crimes that take place on the web, according to the FBI, and how to protect yourself from internet crimes like these.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 10 Most Common Internet Crimes, According to the FBI | Spokeo\" \/>\n<meta property=\"og:description\" content=\"Learn about the 10 most common crimes that take place on the web, according to the FBI, and how to protect yourself from internet crimes like these.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-23T21:53:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T21:53:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Spokeo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spokeo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/\",\"name\":\"The 10 Most Common Internet Crimes, According to the FBI | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg?fit=1170%2C585&ssl=1\",\"datePublished\":\"2023-10-23T21:53:16+00:00\",\"dateModified\":\"2023-10-23T21:53:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/d064cf67e95f6058dbec1c4eebc53c44\"},\"description\":\"Learn about the 10 most common crimes that take place on the web, according to the FBI, and how to protect yourself from internet crimes like these.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg?fit=1170%2C585&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg?fit=1170%2C585&ssl=1\",\"width\":1170,\"height\":585},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/d064cf67e95f6058dbec1c4eebc53c44\",\"name\":\"Spokeo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e492b2d60c7cf3c148525c45191c0bb108881d6c2d3a2413959adb9829b993f?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e492b2d60c7cf3c148525c45191c0bb108881d6c2d3a2413959adb9829b993f?s=96&r=g\",\"caption\":\"Spokeo\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/spokeo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 10 Most Common Internet Crimes, According to the FBI | Spokeo","description":"Learn about the 10 most common crimes that take place on the web, according to the FBI, and how to protect yourself from internet crimes like these.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/","og_locale":"en_US","og_type":"article","og_title":"The 10 Most Common Internet Crimes, According to the FBI | Spokeo","og_description":"Learn about the 10 most common crimes that take place on the web, according to the FBI, and how to protect yourself from internet crimes like these.","og_url":"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2023-10-23T21:53:16+00:00","article_modified_time":"2023-10-23T21:53:17+00:00","og_image":[{"width":1170,"height":585,"url":"https:\/\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg","type":"image\/jpeg"}],"author":"Spokeo","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Spokeo","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/","url":"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/","name":"The 10 Most Common Internet Crimes, According to the FBI | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg?fit=1170%2C585&ssl=1","datePublished":"2023-10-23T21:53:16+00:00","dateModified":"2023-10-23T21:53:17+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/d064cf67e95f6058dbec1c4eebc53c44"},"description":"Learn about the 10 most common crimes that take place on the web, according to the FBI, and how to protect yourself from internet crimes like these.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/10-most-common-internet-crimes\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg?fit=1170%2C585&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg?fit=1170%2C585&ssl=1","width":1170,"height":585},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/d064cf67e95f6058dbec1c4eebc53c44","name":"Spokeo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7e492b2d60c7cf3c148525c45191c0bb108881d6c2d3a2413959adb9829b993f?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e492b2d60c7cf3c148525c45191c0bb108881d6c2d3a2413959adb9829b993f?s=96&r=g","caption":"Spokeo"},"url":"https:\/\/www.spokeo.com\/compass\/author\/spokeo\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/Internet_Crimes.jpg?fit=1170%2C585&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-6Yu","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/26814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=26814"}],"version-history":[{"count":1,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/26814\/revisions"}],"predecessor-version":[{"id":26816,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/26814\/revisions\/26816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/26815"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=26814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=26814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=26814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}