{"id":8512,"date":"2026-04-09T07:00:00","date_gmt":"2026-04-09T12:00:00","guid":{"rendered":"https:\/\/cyberscoop.com\/?p=88534"},"modified":"2026-04-09T07:00:00","modified_gmt":"2026-04-09T12:00:00","slug":"dont-just-fight-fraud-hunt-it","status":"publish","type":"post","link":"https:\/\/ddi.mohflo.net\/index.php\/2026\/04\/09\/dont-just-fight-fraud-hunt-it\/","title":{"rendered":"Don\u2019t just fight fraud, hunt it"},"content":{"rendered":"<p><head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\"> <meta name=\"robots\" content=\"index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1\"> <!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ --> <title>Don\u2019t just fight fraud, hunt it | CyberScoop<\/title> <meta name=\"description\" content=\"As AI-powered identity farms bypass traditional defenses, a new report warns that email-based fraud detection will be obsolete by 2027. Here is why the U.S. must shift to a proactive &quot;hunt&quot; posture to combat the rise of industrialized, global crime syndicates.\"> <link rel=\"canonical\" href=\"https:\/\/cyberscoop.com\/industrialized-fraud-ai-identity-theft-prevention-op-ed\/\"> <meta property=\"og:locale\" content=\"en_US\"> <meta property=\"og:type\" content=\"article\"> <meta property=\"og:title\" content=\"Don\u2019t just fight fraud, hunt it\"> <meta property=\"og:description\" content=\"As AI-powered identity farms bypass traditional defenses, a new report warns that email-based fraud detection will be obsolete by 2027. Here is why the U.S. must shift to a proactive &quot;hunt&quot; posture to combat the rise of industrialized, global crime syndicates.\"> <meta property=\"og:url\" content=\"https:\/\/cyberscoop.com\/industrialized-fraud-ai-identity-theft-prevention-op-ed\/\"> <meta property=\"og:site_name\" content=\"CyberScoop\"> <meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cyberscoop\/\"> <meta property=\"article:published_time\" content=\"2026-04-09T12:00:00+00:00\"> <meta property=\"og:image\" content=\"https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg\"> <meta property=\"og:image:width\" content=\"2070\"> <meta property=\"og:image:height\" content=\"1449\"> <meta property=\"og:image:type\" content=\"image\/jpeg\"> <meta name=\"author\" content=\"Greg Otto\"> <meta name=\"twitter:card\" content=\"summary_large_image\"> <meta name=\"twitter:creator\" content=\"@gregotto\"> <meta name=\"twitter:site\" content=\"@CyberScoopNews\"> <!-- \/ Yoast SEO Premium plugin. --> <link rel=\"dns-prefetch\" href=\"\/\/securepubads.g.doubleclick.net\">\n<link rel=\"dns-prefetch\" href=\"\/\/use.typekit.net\">\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"CyberScoop \u00bb Feed\" href=\"https:\/\/cyberscoop.com\/feed\/\">\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"CyberScoop \u00bb Comments Feed\" href=\"https:\/\/cyberscoop.com\/comments\/feed\/\"> <link rel=\"stylesheet\" id=\"all-css-2\" href=\"https:\/\/cyberscoop.com\/wp-includes\/css\/dist\/block-library\/style.min.css?m=1774626878g\" type=\"text\/css\" media=\"all\"> <link rel=\"stylesheet\" id=\"all-css-6\" href=\"https:\/\/cyberscoop.com\/wp-content\/mu-plugins\/search\/elasticpress\/dist\/css\/related-posts-block-styles.min.css?m=1775074092g\" type=\"text\/css\" media=\"all\"> <link rel=\"stylesheet\" id=\"all-css-8\" href=\"https:\/\/cyberscoop.com\/wp-content\/themes\/scoopnewsgroup\/dist\/css\/frontend.css?m=1775068334g\" type=\"text\/css\" media=\"all\">\n<link rel=\"stylesheet\" id=\"typekit-css\" href=\"https:\/\/use.typekit.net\/itk2qbh.css?ver=13897d660a0ac2c9c7d1\" media=\"all\"> <link rel=\"https:\/\/api.w.org\/\" href=\"https:\/\/cyberscoop.com\/wp-json\/\"><link rel=\"alternate\" title=\"JSON\" type=\"application\/json\" href=\"https:\/\/cyberscoop.com\/wp-json\/wp\/v2\/posts\/88534\"><meta name=\"generator\" content=\"WordPress 6.8.5\">\n<link rel=\"shortlink\" href=\"https:\/\/cyberscoop.com\/?p=88534\">\n<link rel=\"alternate\" title=\"oEmbed (JSON)\" type=\"application\/json+oembed\" href=\"https:\/\/cyberscoop.com\/wp-json\/oembed\/1.0\/embed?url=https%3A%2F%2Fcyberscoop.com%2Findustrialized-fraud-ai-identity-theft-prevention-op-ed%2F\">\n<link rel=\"alternate\" title=\"oEmbed (XML)\" type=\"text\/xml+oembed\" href=\"https:\/\/cyberscoop.com\/wp-json\/oembed\/1.0\/embed?url=https%3A%2F%2Fcyberscoop.com%2Findustrialized-fraud-ai-identity-theft-prevention-op-ed%2F&amp;format=xml\"> <!-- Google Tag Manager --> <!-- End Google Tag Manager --> <link rel=\"icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=32\" sizes=\"32x32\">\n<link rel=\"icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=192\" sizes=\"192x192\">\n<link rel=\"apple-touch-icon\" href=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=180\">\n<meta name=\"msapplication-TileImage\" content=\"https:\/\/cyberscoop.com\/wp-content\/uploads\/sites\/3\/2023\/01\/cropped-cs_favicon-2.png?w=270\"> <\/head><body class=\"wp-singular post-template-default single single-post postid-88534 single-format-standard wp-theme-scoopnewsgroup wp-child-theme-cyberscoop\" id=\"readabilityBody\"> <a href=\"https:\/\/cyberscoop.com\/industrialized-fraud-ai-identity-theft-prevention-op-ed\/#main\" class=\"skip-to-content-link visually-hidden-focusable\">Skip to main content<\/a> <\/p>\n<div class=\"ad ad--top ad--top-desktop\">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p> <main id=\"main\" role=\"main\" tabindex=\"-1\"> <\/p>\n<div class=\"ad ad--top ad--top-mobile\">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<section id=\"stickybar\" class=\"stickybar stickybar--newsletter js-stickybar\" readability=\"0.82\"> <button class=\"stickybar__close js-stickybar-close\" aria-controls=\"stickybar\"> <svg class=\"icon icon--close\" width=\"21\" height=\"22\" viewBox=\"0 0 21 22\" fill=\"none\"><path d=\"m.822.518-.805.805L9.695 11 .017 20.678l.805.805 9.678-9.678 9.677 9.678.806-.805L11.305 11l9.678-9.677-.806-.805-9.677 9.677L.822.518Z\" fill=\"currentColor\" \/><\/svg> <span class=\"visually-hidden\">Close<\/span> <\/button> <\/section>\n<article class=\"single-article content\">\n<div class=\"single-article__container js-single-article-content\">\n<header class=\"single-article__header \" readability=\"26.267688679245\">\n<div class=\"single-article__header-content\" readability=\"36.234718826406\">\n<ul class=\"single-article__eyebrow\">\n<li class=\"single-article__category\"> <a class=\"single-article__category-link\" href=\"https:\/\/cyberscoop.com\/industrialized-fraud-ai-identity-theft-prevention-op-ed\/\"> <span>Commentary<\/span> <\/a> <\/li>\n<\/ul>\n<p> As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings. <\/p>\n<p> <!-- Listen to this article section --> <!-- Audio Element --><br \/>\n<audio id=\"audio-player\" src=\"https:\/\/wp-tts-cdn.api.scpnewsgrp.com\/cyberscoop\/88534\/english.openai.mp3\"><\/audio> <\/p>\n<div readability=\"11\">\n<div>\n<p>Listen to this article<\/p>\n<p> <!-- Countdown Timer --> <\/p>\n<p>0:00<\/p>\n<\/p><\/div>\n<p> <!-- Tooltip --> <\/p>\n<p> <span id=\"tts-tooltip\">Learn more.<\/span> <span> This feature uses an automated voice, which may result in occasional errors in pronunciation, tone, or sentiment. <\/span> <\/p>\n<\/div>\n<p> <!-- End of audio player --> <\/div>\n<div class=\"single-article__cover-wrap\">\n<figure class=\"single-article__cover\"> <img data-recalc-dims=\"1\" fetchpriority=\"high\" width=\"640\" height=\"448\" src=\"https:\/\/i0.wp.com\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it.jpg?resize=640%2C448&#038;ssl=1\" class=\"single-article__cover-image wp-post-image\" alt decoding=\"async\" fetchpriority=\"high\" srcset=\"https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg 2070w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=300,210 300w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=768,538 768w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=1024,717 1024w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=1536,1075 1536w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=2048,1434 2048w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=600,420 600w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=240,168 240w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=481,337 481w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=964,675 964w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-2.jpg?resize=1204,843 1204w\" sizes=\"(max-width: 964px) 100vw, 964px\"><figcaption> (Getty Images) <\/figcaption><\/figure>\n<\/p><\/div>\n<\/header>\n<div class=\"single-article__content\">\n<div class=\"single-article__content-inner has-drop-cap\"> <html readability=\"57.346251053075\"><body readability=\"117.51336898396\"><\/p>\n<p>Our nation has entered a new fraud arms race fueled by AI.<\/p>\n<p>With billions of dollars in fraud losses mounting in both the private and public sectors, it\u2019s clear the old ways of deterring fraud aren\u2019t working. That\u2019s why we need a new playbook that starts with understanding how fraudsters operate, evolving our defenses, and shifting to a proactive posture that doesn\u2019t just fight fraud but actively hunts it down.&nbsp;<\/p>\n<p>In the <a href=\"https:\/\/cyberscoop.com\/tag\/artificial-intelligence-ai\/\">AI<\/a> era, treating fraud as just a front-door problem won\u2019t work. This moment requires industry, government, and consumers to work together, reduce silos, and share real-time intelligence. The goal is to move beyond reactive detection by understanding the lifecycle of a threat\u2014from its formation to its spread\u2014so we can intervene before it establishes a foothold.<\/p>\n<p>For decades, fraud has been treated like a series of isolated incidents. This false assumption has underpinned nearly every past effort to crack down on it. Those efforts, while well-intentioned, have missed the mark.&nbsp;<\/p>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p>Now, in light of the Trump Administration\u2019s <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2026\/03\/president-trumps-cyber-strategy-for-america.pdf\">Cyber Strategy for America<\/a> and accompanying <a href=\"https:\/\/cyberscoop.com\/trump-cybersecurity-strategy\/\">executive order<\/a>, it\u2019s critical to understand the modern fraud landscape and the central role that digital identity exploitation plays within it.<\/p>\n<p>New <a href=\"https:\/\/content.socure.com\/fraudsters-are-changing-playbooks-report\">research<\/a> from Socure reveals just how dramatically the landscape is evolving.&nbsp;<\/p>\n<p><a href=\"https:\/\/cyberscoop.com\/tag\/fraud\/\">Fraud<\/a> has become industrialized, with organized crime syndicates running operations that are global, systemic, automated, and powered by AI. No organization, service, or program is safe. Fraudsters target government programs, banks, fintech platforms, telecom companies, and more, blurring the lines between public sector fraud, financial crime, and cybercrime.<\/p>\n<p>It used to be that fraud could be detected through the reuse of identity elements across multiple applications: the same email, device, phone number, or IP address used over and over.&nbsp;<\/p>\n<p>But the data is clear: these links are declining fast. Today\u2019s sophisticated fraudsters are now engineering their attacks to avoid traditional fraud detection patterns. Our research demonstrates that emails will be completely unique within fraud populations as soon as 2027, so we won\u2019t be able to rely on email to identify patterns.<\/p>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" height=\"214\" width=\"640\" src=\"https:\/\/i0.wp.com\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it.png?resize=640%2C214&#038;ssl=1\" alt class=\"wp-image-88535\" srcset=\"https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.png 1600w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.png?resize=300,100 300w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.png?resize=768,256 768w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.png?resize=1024,342 1024w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.png?resize=1536,513 1536w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.png?resize=600,200 600w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.png?resize=1200,401 1200w, https:\/\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.png?resize=1500,501 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\"><\/figure>\n<p>Speed is another defining feature of modern identity fraud. Fraudsters use AI to create clean, durable, synthetic and stolen identities at scale. In one observed campaign, 24,148 synthetic identities were built and launched in under a month, with many attacks occurring within 48 hours. What once took weeks or even months can now be completed in days.&nbsp;<\/p>\n<p>The rapid rise of <a href=\"https:\/\/cyberscoop.com\/southeast-asia-cybercrime-networks-sanctions-seizure\/\">identity farms<\/a> is another indicator of the industrialization of fraud. Identity farms are operated by crime rings to systematically create synthetic or stolen identities over time in order to closely resemble legitimate identities. Matured identities are used to open bank, credit, and money-movement accounts, siphon government benefits, launder funds, and more. These identity farms focus on durable identities that can bypass traditional verification controls.<\/p>\n<p>So what should we do? Simply put, we must go on offense.&nbsp;<\/p>\n<p>This means treating identity as <a href=\"https:\/\/cyberscoop.com\/tag\/critical-infrastructure\/\">critical infrastructure<\/a> and implementing strategies that track how identities were created before the moment of application; expanding signals monitoring to include elements like residential proxies, ISP behavior, and domain registration activity; evaluating velocity and orchestration in real-time; and treating continuous measurement, rapid model iteration, and cross-industry intelligence as core capabilities.<\/p>\n<div class=\"ad ad--inline_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<p>Additionally, given the rapid scaling of fraud, we need more analysis of the complete ecosystem, including dynamic factors like device information, digital footprints, and behavioral biometrics so organizations can effectively distinguish genuine humans from machines. Ultimately, this layered and interconnected approach makes it significantly harder for malicious actors to recreate or steal identities at scale.<\/p>\n<p>Fraud is no longer a series of isolated acts. It is a coordinated, global enterprise built on the exploitation of identity. Until our efforts reflect this new reality, we will continue to fight an imminent and ongoing threat with outdated tools and fall further behind.&nbsp;<\/p>\n<p>Now is the time to make this strategic shift and finally put fraudsters on their heels.&nbsp;<\/p>\n<p><em>Mike Cook serves as head of fraud insights at Socure, the identity and risk platform for the AI age.<\/em><\/p>\n<p> <\/body> <\/p>\n<footer class=\"single-article__footer\" readability=\"1.0965250965251\">\n<div class=\"author-card\" readability=\"9\">\n<div class=\"author-card__avatar\">\n<figure class=\"author-card__image-wrap\"> <img data-recalc-dims=\"1\" decoding=\"async\" class=\"author-card__image\" src=\"https:\/\/i0.wp.com\/ddi.mohflo.net\/wp-content\/uploads\/2026\/04\/dont-just-fight-fraud-hunt-it-1.jpg?w=640&#038;ssl=1\" alt=\"Mike Cook\"> <\/figure>\n<\/p><\/div>\n<p><h4 class=\"author-card__name\">Written by Mike Cook<\/h4>\n<p> Mike Cook serves as Head of Fraud Insights at Socure, the identity and risk platform for the AI age. <\/p>\n<\/p><\/div>\n<div class=\"single-article__tags-container\">\n<h4 class=\"single-article__tags-title\">In This Story<\/h4>\n<\/p><\/div>\n<\/footer>\n<p> <\/html><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"single-article__ads js-single-article-sidebar\">\n<div class=\"ad ad--sidebar js-single-article-sidebar-5 ad--rightrail_1 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div class=\"ad ad--sidebar js-single-article-sidebar-4 ad--rightrail_2 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div class=\"ad ad--sidebar js-single-article-sidebar-3 ad--rightrail_3 \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div><\/div>\n<\/article>\n<div class=\"popular-stories popular-stories--single-post\">\n<div class=\"popular-stories__container\">\n<h2 class=\"popular-stories__title\"> More Scoops <\/h2>\n<p> <!-- .popular-stories__stories --> <\/div>\n<p><!-- .popular-stories__inner -->\n<\/div>\n<p><!-- .popular-stories --> <\/p>\n<section class=\"latest-podcasts\">\n<h2 class=\"latest-podcasts__title\"> Latest Podcasts\t<\/h2>\n<\/section>\n<div class=\"top-categories\">\n<div class=\"top-categories__container\">\n<h3 class=\"top-categories__category-title\">Government<\/h3>\n<\/p><\/div>\n<div class=\"top-categories__container\">\n<h3 class=\"top-categories__category-title\">Technology<\/h3>\n<\/p><\/div>\n<\/p><\/div>\n<p> <\/main> <\/p>\n<div class=\"ad ad--bottom \">\n<div class=\"ad__inner\"> <span class=\"screen-reader-text\">Advertisement<\/span> <\/div>\n<\/div>\n<div id=\"interstitial\" class=\"welcome__container\"> <button id=\"close-modal-1\" class=\"welcome__clickable_area\"><\/button> <\/p>\n<div class=\"welcome__ad_wrapper\">\n<p> <button id=\"close-modal-3\" class=\"welcome__continue-button\">Continue to CyberScoop<\/button> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> <!-- Start of HubSpot Embed Code --> <!-- End of HubSpot Embed Code --> <\/body> <a href=\"https:\/\/cyberscoop.com\/industrialized-fraud-ai-identity-theft-prevention-op-ed\/\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Don\u2019t just fight fraud, hunt it | CyberScoop Skip to<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[384,280,413,1316,6355,520,2807,1,639],"tags":[388,284,415,1318,6356,523,2808,325,641],"class_list":["post-8512","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence-ai","category-commentary","category-critical-infrastructure","category-fraud","category-identity-fraud","category-national-cybersecurity-strategy","category-op-ed","category-uncategorized","category-white-house","tag-artificial-intelligence-ai","tag-commentary","tag-critical-infrastructure","tag-fraud","tag-identity-fraud","tag-national-cybersecurity-strategy","tag-op-ed","tag-uncategorized","tag-white-house"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","chromenews-featured":"","chromenews-large":"","chromenews-medium":""},"author_info":{"display_name":"Cyber Scoop","author_link":"https:\/\/ddi.mohflo.net\/index.php\/author\/cyberscoop\/"},"category_info":"<a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/artificial-intelligence-ai\/\" rel=\"category tag\">artificial intelligence (AI)<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/commentary\/\" rel=\"category tag\">Commentary<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/critical-infrastructure\/\" rel=\"category tag\">critical infrastructure<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/fraud\/\" rel=\"category tag\">fraud<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/identity-fraud\/\" rel=\"category tag\">identity fraud<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/national-cybersecurity-strategy\/\" rel=\"category tag\">National Cybersecurity Strategy<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/op-ed\/\" rel=\"category tag\">op-ed<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/white-house\/\" rel=\"category tag\">White House<\/a>","tag_info":"White House","comment_count":"0","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts\/8512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/comments?post=8512"}],"version-history":[{"count":0,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts\/8512\/revisions"}],"wp:attachment":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/media?parent=8512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/categories?post=8512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/tags?post=8512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}