{"id":1460,"date":"2020-10-02T09:27:20","date_gmt":"2020-10-02T13:27:20","guid":{"rendered":"http:\/\/ielrblog.com\/?p=1460"},"modified":"2020-10-02T09:27:20","modified_gmt":"2020-10-02T13:27:20","slug":"former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network","status":"publish","type":"post","link":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/","title":{"rendered":"Former IT Employee Sentenced to Prison for Damaging Company&#8217;s Computer Network"},"content":{"rendered":"<p>Information security professionals today are awash in <a href=\"https:\/\/healthitsecurity.com\/news\/study-finds-cyberthreat-data-overwhelming-to-security-workers\">overwhelming<\/a>, and constantly replenished surges of information about cyberthreats.\u00a0 Because so much of this cyberthreat intelligence concerns external threats of <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/09\/29\/microsoft-digital-defense-report-cyber-threats\/\">increasing sophistication and complexity<\/a>, from organized criminal networks to state actors, it can be easy for information security teams to overlook the possibility that disgruntled insiders may pose a risk to their organization\u2019s networks and data.<\/p>\n<p>Insider attacks, however, are a genuine and persistent dimension of the cyberthreat environment.\u00a0 The Ponemon Institute\u2019s <a href=\"https:\/\/www.observeit.com\/2020costofinsiderthreat\/\">2020 Cost of Insider Threats Report<\/a> found that in only two years the number of insider threats has increased 47 percent &#8212; from 3,200 in 2018 to 4,716 in 2020 \u2013 while the cost of such incidents has increased 31 percent, from $8.76 million in 2018 to $11.45 million in 2020. In addition, careless or negligent employees account for 62 percent of incidents, leading to an average cost of $307,111 per incident, while incidents involving malicious insiders or credential thieves lead to an average cost of $871,686 per incident.<\/p>\n<p>One recent case provides concrete examples of the damage that a single disaffected employee can cause within an organization. On September 24, the U.S. District Court in Maryland sentenced Shannon\u00a0 Stafford, a former information technology (IT) manager for a global company identified only as \u201cBusiness A,\u201d to a year and a day in federal prison and restitution of $193,258.10 for illegally accessing and damaging Business A\u2019s computer network.<\/p>\n<p>According to the U.S. Department of Justice, Stafford was employed in Business A\u2019s information technology department from 2005 to 2015. As part of his duties, he had access to other employees\u2019 system login credentials \u201cand was authorized to use them in the course of performing his technical support duties.\u201d He also was responsible for disabling network access credentials company users at the end of their employment.<\/p>\n<p>Although Stafford was promoted in 2014 to a managerial role, as technical site lead for the company\u2019s Washington office, he was demoted in March 2015 to an IT support role because of performance issues in his management position. After his performance issues continued, Stafford was fired on August 6, 2015.<\/p>\n<p>Beginning on the evening of August 6, Stafford engaged in a series of actions directed at damaging Company A\u2019s network:<\/p>\n<ul>\n<li><strong>August 6<\/strong>: That evening, Stafford \u201crepeatedly attempted to remotely access Business A\u2019s computer networks from his residence,\u201d using the laptop that the company had provided to him. He unsuccessfully tried to access Company A\u2019s network approximately 10 times, using his own credentials and those of a former co-worker whom he had previously assisted.<\/li>\n<li><strong>August 8<\/strong>: In the early morning, Stafford successfully used the former co-worker\u2019s credentials and the company laptop to access, without authorization, the computer that had been located under his desk in the Washington office. He \u201cused the Washington IT computer to execute demands to delete all of the file storage drives used by the Washington office, then changed the password to access the storage management system.\u201d The deletion of those files\n<ul>\n<li>caused a severe disruption to the company\u2019s operations and the loss of some customer and user data. Changing the password hindered the company\u2019s efforts to determine what happened and restore access to its remaining files. As a result of the deletion of the network file storage drives, Washington users were unable to access their stored files for approximately three days, until the data could be restored from backups.\u00a0 Customer and user data that was not included in the most recent backup prior to Stafford\u2019s deletion of the files was permanently lost.<\/li>\n<\/ul>\n<\/li>\n<li><strong>August 11<\/strong>: Stafford \u201cunsuccessfully attempted to remotely access the company\u2019s computer network from his home approximately 13 times, using credentials that were not his.\u201d<\/li>\n<li><strong>August 13<\/strong>: A Company A representative \u201cspoke to Stafford and demanded that he cease and desist his attempts to unlawfully access Business A\u2019s computer systems.<\/li>\n<li><strong>August 21 \u2013 September 9<\/strong>: Despite Company A\u2019s demand, between August 21 and September 9, Stafford \u201cattempted to access the company\u2019s network from his home approximately 17 times, using credentials that were not his.\u201d<\/li>\n<li><strong>September 14<\/strong>: Stafford \u201cused the credentials of another former co-worker to access a network file storage system computer that he had been responsible for maintaining in the IT department of the company\u2019s Baltimore office, intending to cause the same type of damage he did when he deleted the Washington office\u2019s stored files.\u201d That attempt failed \u201cbecause Business A had changed the password after Stafford\u2019s attack on the Washington files.\u201d<\/li>\n<\/ul>\n<p>The actual loss to Business A that resulted from Stafford\u2019s damage and attempted damage to its computer systems, including the costs of restoration of the deleted systems, investigation of the events, and response to the intrusion was at least $38,270. In addition, Business A incurred legal fees of $133,950.60 and a fee of $21,037.50 for a forensic investigation.<\/p>\n<p>Ultimately, a federal grand jury <a href=\"https:\/\/regmedia.co.uk\/2020\/09\/25\/stafford.pdf\">indicted<\/a> Stafford in 2017 on two computer damage-related charges: one for the August 8 damage to the files in Company A\u2019s Washington office, and the other for Stafford\u2019s damage attempts between August 21 and September 9. Stafford was convicted after a four-day trial.<\/p>\n<p>***<\/p>\n<p>In one sense, Stafford\u2019s case is unremarkable because it did not involve the use of any sophisticated hacking techniques.\u00a0 Yet it is precisely the simplicity of his conduct and the ease with which he caused harm to his company that should be of concern to chief information security officers (CISOs) and chief compliance officers (CCOs) in all types of companies around the world.\u00a0 What Stafford did can easily be mimicked by other disgruntled IT staffers in other countries \u2013 as United Kingdom law enforcement has seen on several occasions (<a href=\"https:\/\/www.bbc.com\/news\/uk-england-leeds-50843669\">here<\/a>, <a href=\"https:\/\/www.welivesecurity.com\/2019\/03\/28\/man-jailed-destroying-exemployer-data\/\">here<\/a>, and <a href=\"https:\/\/www.cps.gov.uk\/west-midlands\/news\/man-sentenced-after-admitting-hacking-offences\">here<\/a>).<\/p>\n<p>For that reasons, CISOs and CCOs should make use of the Stafford case in two ways.\u00a0 First, they should cite it in briefing senior executives in their organizations and remind them of the risks of internal computer sabotage. \u00a0Those risks certainly include the immediate costs of lost business and repairing the damage.\u00a0 But CCOs and CISOs can also join forces with their businesses\u2019 legal officers to point out the potential for <a href=\"https:\/\/www.occ.gov\/news-issuances\/news-releases\/2020\/nr-occ-2020-101.html\">regulatory enforcement action<\/a> based on the organization\u2019s failure to maintain adequate information security.<\/p>\n<p>Second, they should make sure that their organizations\u2019 internal procedures include certain minimum procedures in place when it appears that it may be necessary to terminate or demote an IT manager or employee whose workplace conduct includes serious indications of hostility or anger.<\/p>\n<p>Based on Stafford\u2019s and other insider sabotage cases, those procedures should include the following.<\/p>\n<p>First, if an organization decides to terminate an IT employee, or receives <a href=\"https:\/\/regmedia.co.uk\/2018\/02\/14\/grupe.pdf\">a resignation letter with immediate effect<\/a> from that employee, it should not accept the employee\u2019s representations that he will return a company-issued computer. Rather, the company should take immediate lawful action to obtain custody of that computer. Under no circumstances should the company rely on the employee\u2019s promises to return company property in due course. As Stafford\u2019s and <a href=\"https:\/\/regmedia.co.uk\/2018\/02\/14\/grupe.pdf\">other<\/a> insider-sabotage cases have shown, even one or two days after separation of that employee can be enough to allow the employee to use the company computer to cause damage.<\/p>\n<p>Second, if an IT employee is about to be separated from the organization, even before, and during, the formal actions to inform the employee of his termination and escort him from the premises, the organization should review the employee\u2019s outgoing emails for indications of intent to retaliate against the company and determine what levels of administrator access that employee may have.<\/p>\n<p>In one insider-sabotage case, an IT help desk employee, even after his termination, was able to <a href=\"https:\/\/www.justice.gov\/usao-wdtx\/pr\/former-el-paso-based-company-employee-pleads-guilty-computer-intrusion\">access an administrator account<\/a> and shut down his company\u2019s email server and application server and delete systems files essential to restoring computer operations. Even though the employee\u2019s access rights <a href=\"https:\/\/www.theregister.com\/2017\/03\/31\/it_admin_pleads_guilty_to_hacking_bosses\/\">reportedly<\/a> had been revoked as he left the building, the company\u2019s IT director found that the employee had emailed himself a list of network access codes and passwords for various company IT subsystems.<\/p>\n<p>Third, with respect to IT administrators, the organization should have a second person, whether inside that organization or in an external information security firm, who has system privileges and access equivalent to or greater than those of the IT administrator. No organization should be totally reliant on a single individual who, if threatened with demotion or termination, could be tempted to retaliate against the organization\u2019s networks or files.<\/p>\n<p>Accordingly, if the organization has made the decision to terminate that administrator, it should direct the backup administrator to take all necessary steps to block the primary administrator\u2019s access to the enterprise\u2019s systems immediately before, or during, the organization\u2019s notifying the disgruntled administrator of his termination, before that administrator can take action against the organization.<\/p>\n<p>None of these measures are guaranteed to prevent a disaffected IT employee from lashing out at his organization by using what IT skills he has. All of them, however, can reduce the chances that such an employee will succeed in his destructive mission, and can be accomplished at minimal cost to the organization. The potential risks of operational shutdowns and loss of key files and processes, and of <a href=\"https:\/\/www.sec.gov\/litigation\/investreport\/34-84429.pdf\">regulatory sanction <\/a>for failure to maintain adequate cybersecurity measures, are too substantial to ignore.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security professionals today are awash in overwhelming, and constantly replenished surges of information about cyberthreats.\u00a0 Because so much of this cyberthreat intelligence concerns external threats of increasing sophistication and complexity, from organized criminal networks to state actors, it can be easy for information security teams to overlook the possibility that disgruntled insiders may pose [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":{"0":"post-1460","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Former IT Employee Sentenced to Prison for Damaging Company&#039;s Computer Network | IELR Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Former IT Employee Sentenced to Prison for Damaging Company&#039;s Computer Network | IELR Blog\" \/>\n<meta property=\"og:description\" content=\"Information security professionals today are awash in overwhelming, and constantly replenished surges of information about cyberthreats.\u00a0 Because so much of this cyberthreat intelligence concerns external threats of increasing sophistication and complexity, from organized criminal networks to state actors, it can be easy for information security teams to overlook the possibility that disgruntled insiders may pose [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/\" \/>\n<meta property=\"og:site_name\" content=\"IELR Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/intlenforcementlawreporter\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-02T13:27:20+00:00\" \/>\n<meta name=\"author\" content=\"Jonathan J. Rusch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ielr\" \/>\n<meta name=\"twitter:site\" content=\"@ielr\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan J. Rusch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/\"},\"author\":{\"name\":\"Jonathan J. Rusch\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/5f691342a280008ce613c4aecea9dcb2\"},\"headline\":\"Former IT Employee Sentenced to Prison for Damaging Company&#8217;s Computer Network\",\"datePublished\":\"2020-10-02T13:27:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/\"},\"wordCount\":1527,\"commentCount\":0,\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/\",\"url\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/\",\"name\":\"Former IT Employee Sentenced to Prison for Damaging Company's Computer Network | IELR Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#website\"},\"datePublished\":\"2020-10-02T13:27:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/5f691342a280008ce613c4aecea9dcb2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/2020\\\/10\\\/02\\\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ielrblog.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Former IT Employee Sentenced to Prison for Damaging Company&#8217;s Computer Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#website\",\"url\":\"https:\\\/\\\/ielrblog.com\\\/\",\"name\":\"IELR Blog\",\"description\":\"Official Blog of the International Enforcement Law Reporter\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ielrblog.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ielrblog.com\\\/#\\\/schema\\\/person\\\/5f691342a280008ce613c4aecea9dcb2\",\"name\":\"Jonathan J. Rusch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69433290b457bc4ae980640ac87e7319b133864d6e1519aacab864b4159dace2?s=96&d=monsterid&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69433290b457bc4ae980640ac87e7319b133864d6e1519aacab864b4159dace2?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69433290b457bc4ae980640ac87e7319b133864d6e1519aacab864b4159dace2?s=96&d=monsterid&r=g\",\"caption\":\"Jonathan J. Rusch\"},\"url\":\"https:\\\/\\\/ielrblog.com\\\/index.php\\\/author\\\/jonathan-j-rusch\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Former IT Employee Sentenced to Prison for Damaging Company's Computer Network | IELR Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/","og_locale":"en_US","og_type":"article","og_title":"Former IT Employee Sentenced to Prison for Damaging Company's Computer Network | IELR Blog","og_description":"Information security professionals today are awash in overwhelming, and constantly replenished surges of information about cyberthreats.\u00a0 Because so much of this cyberthreat intelligence concerns external threats of increasing sophistication and complexity, from organized criminal networks to state actors, it can be easy for information security teams to overlook the possibility that disgruntled insiders may pose [&hellip;]","og_url":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/","og_site_name":"IELR Blog","article_publisher":"https:\/\/m.facebook.com\/intlenforcementlawreporter\/?ref=bookmarks","article_published_time":"2020-10-02T13:27:20+00:00","author":"Jonathan J. Rusch","twitter_card":"summary_large_image","twitter_creator":"@ielr","twitter_site":"@ielr","twitter_misc":{"Written by":"Jonathan J. Rusch","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/#article","isPartOf":{"@id":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/"},"author":{"name":"Jonathan J. Rusch","@id":"https:\/\/ielrblog.com\/#\/schema\/person\/5f691342a280008ce613c4aecea9dcb2"},"headline":"Former IT Employee Sentenced to Prison for Damaging Company&#8217;s Computer Network","datePublished":"2020-10-02T13:27:20+00:00","mainEntityOfPage":{"@id":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/"},"wordCount":1527,"commentCount":0,"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/","url":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/","name":"Former IT Employee Sentenced to Prison for Damaging Company's Computer Network | IELR Blog","isPartOf":{"@id":"https:\/\/ielrblog.com\/#website"},"datePublished":"2020-10-02T13:27:20+00:00","author":{"@id":"https:\/\/ielrblog.com\/#\/schema\/person\/5f691342a280008ce613c4aecea9dcb2"},"breadcrumb":{"@id":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ielrblog.com\/index.php\/2020\/10\/02\/former-it-employee-sentenced-to-prison-for-damaging-companys-computer-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ielrblog.com\/"},{"@type":"ListItem","position":2,"name":"Former IT Employee Sentenced to Prison for Damaging Company&#8217;s Computer Network"}]},{"@type":"WebSite","@id":"https:\/\/ielrblog.com\/#website","url":"https:\/\/ielrblog.com\/","name":"IELR Blog","description":"Official Blog of the International Enforcement Law Reporter","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ielrblog.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ielrblog.com\/#\/schema\/person\/5f691342a280008ce613c4aecea9dcb2","name":"Jonathan J. Rusch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/69433290b457bc4ae980640ac87e7319b133864d6e1519aacab864b4159dace2?s=96&d=monsterid&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/69433290b457bc4ae980640ac87e7319b133864d6e1519aacab864b4159dace2?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69433290b457bc4ae980640ac87e7319b133864d6e1519aacab864b4159dace2?s=96&d=monsterid&r=g","caption":"Jonathan J. Rusch"},"url":"https:\/\/ielrblog.com\/index.php\/author\/jonathan-j-rusch\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pas6ng-ny","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/1460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/comments?post=1460"}],"version-history":[{"count":1,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/1460\/revisions"}],"predecessor-version":[{"id":1461,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/posts\/1460\/revisions\/1461"}],"wp:attachment":[{"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/media?parent=1460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/categories?post=1460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ielrblog.com\/index.php\/wp-json\/wp\/v2\/tags?post=1460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}