{"id":16255,"date":"2020-04-01T06:00:28","date_gmt":"2020-04-01T13:00:28","guid":{"rendered":"https:\/\/www.trulioo.com\/?p=14812"},"modified":"2023-06-07T18:43:37","modified_gmt":"2023-06-07T18:43:37","slug":"fraud-against-children","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children","title":{"rendered":"Preventing fraud against children"},"content":{"rendered":"\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-14813 alignnone\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2020\/04\/fraud-against-children.jpg\" alt=\"fraud against children\" width=\"900\" height=\"600\"><br>It\u2019s easy to think of identity fraud and the problems it causes as an adults-only issue. However, fraudsters know that children are easy targets as they are generally trusting and less aware of financial, security and privacy matters. Children spend countless hours on their mobiles, which produces a wealth of data that can be hacked by bad actors and used for&nbsp;financial gain by committing fraud or other financial crime.<\/p>\n\n\n\n<p>It\u2019s easy for fraudsters to glean data from children in game chat rooms, on social media, even from data breaches. Cases like the Anthem health insurance breach in 2015 meant thousands of children\u2019s social security and personal details were shared on the dark web along with their parents\u2019 information: a wealth of data for creating synthetic and not-so-synthetic IDs.<\/p>\n\n\n\n<p>One of the main types of fraud is <a href=\"\/blog\/fraud-prevention\/synthetic-identity-fraud\"><em>synthetic identity fraud<\/em><\/a>, or SIF. With synthetic identity fraud, fraudsters curate real personal identity data (stolen or purchased on the black market) with fake information to create an entirely new identity. This process can take years to pay off, making it even more difficult to detect.<\/p>\n\n\n\n<p>Another common problem is <em>familiar fraud<\/em>, where the person committing the fraud is a close relative. This can sometimes involve a level of synthetic identity fraud, for example, where the child\u2019s name and other details are used with a false date of birth. A study in 2012 revealed that the perpetrator was a close family member or friend <a href=\"https:\/\/www.cnbc.com\/2015\/07\/21\/identity-theft-victims-may-know-the-culprit.html\" target=\"_blank\" rel=\"noopener noreferrer\">in 27 percent of child identity fraud<\/a> cases.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-effects-of-identity-theft-on-children\">The effects of identity theft on children<\/h2>\n\n\n\n<p>A synthetic identity might consist of a real name and date of birth but use a false address and social security number from somewhere else. Fraudsters will then try to acquire new driver\u2019s licenses, passports and other identity documents. If successful, these child-based synthetic identities can join the 20 percent of credit losses that SIF is thought to be responsible for, according to a study by <a href=\"https:\/\/www.auriemma.group\/synthetic-identity-fraud-cost-banks-6-billion-in-2016-auriemma-consulting-group\/\" target=\"_blank\" rel=\"noopener noreferrer\">Auriemma Consulting Group<\/a>.<\/p>\n\n\n\n<p>Some of the worst harm can come when fraudsters manage to set up a synthetic identity that\u2019s very close to the child\u2019s real identity, changing only the date of birth. This can effectively give criminals a blank slate credit history that will come back to haunt the child when they are old enough to apply for their first financial products.<\/p>\n\n\n\n<p>The fallout can even start before the child comes of age. It\u2019s not unheard of for a minor to end up having to defend against fraudulent charges while still underage. In fact, with less legitimate paperwork tracking their real credit history, it can actually be harder for a child to prove their innocence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tips-for-parents\">Tips for parents<\/h2>\n\n\n\n<p>What can we, as parents and caregivers, do to protect our children from these risks?<\/p>\n\n\n\n<ol>\n<li><strong>Educate:<\/strong> The most obvious step is to educate children and parents about data security and how to protect personal data online, including the reasons why it\u2019s necessary. Age-appropriate learning should accompany all of these other steps, with all but the youngest children able to understand at least some of the risks and issues involved. By the time a child is old enough to be online unsupervised, they will need to know how to keep their data safe as well as themselves.This information sheet from the ITRC is a great resource for parents, and it includes a list of red flags \u2014 such as additional types of mail to watch out for.<\/li>\n\n\n\n<li><strong>Monitor: <\/strong>&nbsp;Parents need to know how to keep an eye on their children\u2019s online behavior, including how to use parental controls and monitoring software where age-appropriate. &nbsp;Parents\/guardians also need to know the importance of monitoring mail and other offline data trails. Age-inappropriate mailings can be a warning that someone is using part or all of a child\u2019s identity for fraud.<\/li>\n<\/ol>\n\n\n\n<p>From an organizational point of view, any company that deals with children\u2019s personal details needs to be aware that these are also attractive to data thieves, and why.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tips-for-businesses\">Tips for businesses<\/h2>\n\n\n\n<p>Organizations also have a role to play; not only do organizations need to combat fraud for their own purposes, but fraud against children is especially heinous.<\/p>\n\n\n\n<ol>\n<li><strong>Identity checks: <\/strong>Don\u2019t rely on just one database to verify new accounts. By checking multiple databases that include alternative data sources, you increase the likelihood that you can spot identity anomalies. For example, mobile network operators have an <a href=\"\/blog\/identity-verification\/data-role-against-online-fraud\">abundance of data<\/a> that is difficult for fraudsters to falsify.<\/li>\n<\/ol>\n\n\n\n<p>The trick here is depth of data history. Real people have real histories, including those <a href=\"https:\/\/www.experian.com\/assets\/decision-analytics\/brochures\/keep-synthetic-identities-out-tip-sheet.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">from<\/a> <a href=\"https:\/\/www.paymentsjournal.com\/understanding-and-stopping-synthetic-identity-fraud\/\" target=\"_blank\" rel=\"noopener noreferrer\">third-party<\/a> <a href=\"https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/fighting-back-against-synthetic-identity-fraud\" target=\"_blank\" rel=\"noreferrer noopener\">sources<\/a>. Children and newly crafted synthetic identities will have shallow or non-existent data pools behind them. The more places you check, the clearer it will be that there\u2019s little or nothing there.<\/p>\n\n\n\n<ol start=\"2\">\n<li><span style=\"font-weight: normal !msorm;\"><strong>Identity authentication<\/strong><\/span>: Using authentication techniques helps ensure that the individual has some real-world connection to the identity. For example, <a href=\"\/solutions\/identity-verification\">ID document verification<\/a> techniques require the individual to have government-issued documentation that matches the person, or mobile two-factor authentication (2FA) requires the person have access to the mobile number on the account.<\/li>\n\n\n\n<li><strong>Fraud tools<\/strong>: There are a growing number of sophisticated <a href=\"\/blog\/payments\/payment-fraud-management\">fraud prevention tools<\/a> that help spot questionable patterns and stop losses. Keep in mind that, while the techniques might make use of children\u2019s identity, in the end their goal is to profit. Monitoring for unusual transactions, implementing additional security measures and deploying a security mindset will not only protect your business but also help protect vulnerable potential victims.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-is-fraud-prevention-important-when-it-comes-to-children\">Why is fraud prevention important when it comes to children?<\/h2>\n\n\n\n<p>Identity fraud affects children far more than it does adults. Even for grown-ups, extracting yourself from the tangle of charges, fines and accusations that can occur alongside identity fraud is difficult. Knowing that, in many cases, child identity fraud goes undetected until the child applies for student loans (making students four times more likely to be the victim of identity fraud than the general adult population), one starts to realize how bad things can get.<\/p>\n\n\n\n<p>Imagine how many different instances of fraud and steep debts could be run up in a child\u2019s name if their details were used fraudulently for a decade or more. Now, imagine how much time and effort it would take to put right and get that child back to the blank credit slate they deserve. In the meantime, it could affect borrowing for university, car loans, credit checks by landlords and more \u2014 many major life milestones.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-protect-your-organization-and-children\">Protect your organization and children<\/h2>\n\n\n\n<p>In today\u2019s digital landscape, it\u2019s never too early for cybercriminals to take advantage of a child\u2019s personal data. This synthetic fraud can be run by organized criminals on a large scale, but it can also involve close family and friends changing just the age of the child to take advantage of another set of names already linked to that address.<\/p>\n\n\n\n<p>Either way, it\u2019s vital to take a holistic approach to identity verification to prevent child identity fraud. As this type of fraud can go unnoticed for some time, the consequences can be dire for both the companies and children involved. Using strong identity verification and authentication measures, such as identifying unique data points and alternative authentication channels, are always good ideas when opening any account. Ensuring effective due diligence procedures are especially important when considering the victims can be children.<\/p>\n","protected":false},"excerpt":{"rendered":"It\u2019s easy to think of identity fraud and the problems it causes as an adults-only&#8230;","protected":false},"author":8,"featured_media":16271,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[331],"post-types":[],"post-topics":[101,123],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Preventing fraud against children - a holistic approach<\/title>\n<meta name=\"description\" content=\"It\u2019s vital to take a holistic approach to identity verification to prevent child identity fraud, including ensuring effective due diligence procedures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preventing fraud against children - a holistic approach\" \/>\n<meta property=\"og:description\" content=\"It\u2019s vital to take a holistic approach to identity verification to prevent child identity fraud, including ensuring effective due diligence procedures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-01T13:00:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-07T18:43:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2020\/04\/fraud-against-children.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Valkama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Valkama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children\"},\"author\":{\"name\":\"Paul Valkama\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\"},\"headline\":\"Preventing fraud against children\",\"datePublished\":\"2020-04-01T13:00:28+00:00\",\"dateModified\":\"2023-06-07T18:43:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children\"},\"wordCount\":1228,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Fraud and Risk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children\",\"url\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children\",\"name\":\"Preventing fraud against children - a holistic approach\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2020-04-01T13:00:28+00:00\",\"dateModified\":\"2023-06-07T18:43:37+00:00\",\"description\":\"It\u2019s vital to take a holistic approach to identity verification to prevent child identity fraud, including ensuring effective due diligence procedures.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud and Risk\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Preventing fraud against children\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\",\"name\":\"Paul Valkama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"caption\":\"Paul Valkama\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Preventing fraud against children - a holistic approach","description":"It\u2019s vital to take a holistic approach to identity verification to prevent child identity fraud, including ensuring effective due diligence procedures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children","og_locale":"en_US","og_type":"article","og_title":"Preventing fraud against children - a holistic approach","og_description":"It\u2019s vital to take a holistic approach to identity verification to prevent child identity fraud, including ensuring effective due diligence procedures.","og_url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2020-04-01T13:00:28+00:00","article_modified_time":"2023-06-07T18:43:37+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2020\/04\/fraud-against-children.jpg","type":"image\/jpeg"}],"author":"Paul Valkama","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Paul Valkama","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children"},"author":{"name":"Paul Valkama","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae"},"headline":"Preventing fraud against children","datePublished":"2020-04-01T13:00:28+00:00","dateModified":"2023-06-07T18:43:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children"},"wordCount":1228,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Fraud and Risk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children","url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children","name":"Preventing fraud against children - a holistic approach","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2020-04-01T13:00:28+00:00","dateModified":"2023-06-07T18:43:37+00:00","description":"It\u2019s vital to take a holistic approach to identity verification to prevent child identity fraud, including ensuring effective due diligence procedures.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-against-children#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Fraud and Risk","item":"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention"},{"@type":"ListItem","position":3,"name":"Preventing fraud against children"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae","name":"Paul Valkama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","caption":"Paul Valkama"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/16255"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=16255"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/16255\/revisions"}],"predecessor-version":[{"id":35012,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/16255\/revisions\/35012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/16271"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=16255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=16255"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=16255"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=16255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}