{"id":12117,"date":"2026-05-14T12:44:28","date_gmt":"2026-05-14T17:44:28","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=12117"},"modified":"2026-05-14T12:44:28","modified_gmt":"2026-05-14T17:44:28","slug":"carahsoft-osint-and-executive-protection-blog-2026","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/","title":{"rendered":"OSINT and Executive Protection: A Critical Capability for Modern Security Operations"},"content":{"rendered":"\n<p>As threats to executives, public officials and high-profile individuals continue to evolve, <strong>Executive Protection (EP) programs are increasingly reliant on Open Source Intelligence (OSINT)<\/strong> to anticipate, detect and mitigate risk. From online harassment and doxxing to geopolitical instability and lone-actor threats, the modern threat landscape is shaped\u2014and often signaled\u2014by publicly available information.<\/p>\n\n\n\n<p>OSINT has emerged as a foundational capability for EP teams, enabling proactive, intelligence-led security decisions that are faster, more adaptive and more comprehensive than traditional approaches alone.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why OSINT Matters for Executive Protection<\/h2>\n\n\n\n<p>EP is no longer limited to physical security and close-in protection. Today\u2019s threats often originate in the <strong>digital domain<\/strong> before manifesting in the physical world. OSINT allows EP teams to monitor and assess:<\/p>\n\n\n\n<ul>\n<li>Online threats, grievances and fixation behaviors<\/li>\n\n\n\n<li>Social media activity and emerging narratives targeting executives<\/li>\n\n\n\n<li>Event-driven risks tied to protests, activism or geopolitical developments<\/li>\n\n\n\n<li>Travel-related threats, including local crime trends and unrest<\/li>\n\n\n\n<li>Digital exposure, doxxing risks and personal data leakage<\/li>\n<\/ul>\n\n\n\n<p>By analyzing these open-source signals, EP teams gain <strong>early warning indicators<\/strong> that can inform protective posture, travel planning and resource allocation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Supporting Proactive, Intelligence-Led Protection<\/h2>\n\n\n\n<p>OSINT enables a shift from reactive protection to <strong>proactive threat management<\/strong>. Rather than responding only after an incident or credible threat emerges, EP teams can continuously assess risk and identify patterns that indicate escalation.<\/p>\n\n\n\n<p>Key benefits include:<\/p>\n\n\n\n<ul>\n<li><strong>Threat Identification &amp; Prioritization:<\/strong> Distinguishing between credible threats and background noise<\/li>\n\n\n\n<li><strong>Advance Planning:<\/strong> Enhancing route selection, venue security and travel assessments<\/li>\n\n\n\n<li><strong>Protective Intelligence Integration:<\/strong> Feeding OSINT into broader intelligence and security workflows<\/li>\n\n\n\n<li><strong>Scalability:<\/strong> Supporting protection for multiple executives across global environments<\/li>\n<\/ul>\n\n\n\n<p>This intelligence-driven approach is especially critical as executives maintain a growing digital presence and operate in increasingly complex security environments.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Ethical, Legal and Privacy Considerations<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Embedded.jpg\" alt=\"\" class=\"wp-image-12118\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Embedded.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Embedded-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>As with any intelligence activity, OSINT for EP must be conducted responsibly. EP programs must balance threat awareness with <strong>privacy, civil liberties and legal compliance<\/strong>, ensuring that collection and analysis focus on publicly available, lawful sources.<\/p>\n\n\n\n<p>Clear governance-defined use cases and analyst training are essential to maintaining ethical OSINT practices while still delivering actionable security insights.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">The Growing Role of OSINT in Executive Protection Programs<\/h2>\n\n\n\n<p>Across Government, Private Sector and critical infrastructure organizations, OSINT is becoming a <strong>standard component of mature EP programs<\/strong>. Whether supporting senior Government officials, corporate leadership or high-visibility executives, OSINT enhances situational awareness and strengthens protective outcomes.<\/p>\n\n\n\n<p>As digital information continues to expand and threats grow more asymmetric, OSINT will remain a vital tool\u2014helping EP teams stay ahead of risk, adapt to change and protect their principals in an increasingly interconnected world.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Ready to Strengthen Your Executive Protection Program with OSINT?<\/h2>\n\n\n\n<p>As The Trusted Government IT Solutions Provider\u2122, Carahsoft helps Government agencies, defense organizations and critical infrastructure teams access the OSINT tools and expertise needed to build proactive, intelligence-led protection programs.<\/p>\n\n\n\n<ul>\n<li><strong><em>Explore Carahsoft&#8217;s OSINT solutions and partner <a href=\"https:\/\/www.carahsoft.com\/solve\/osint\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"OSINT Executive Protection Blog 2026 - Bottom CTA\">portfolio<\/a><\/em><\/strong><\/li>\n\n\n\n<li><strong><em>Contact the Carahsoft to discuss solutions tailored to your EP program&#8217;s needs at <a href=\"mailto:OSINTVerticalMarketing@Carahsoft.com\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"OSINT Executive Protection Blog 2026 - Bottom CTA\">OSINTVerticalMarketing@Carahsoft.com<\/a><\/em><\/strong><\/li>\n\n\n\n<li><strong><em>Discover the full range of security and intelligence capabilities available through Carahsoft&#8217;s contract vehicles at <a href=\"https:\/\/www.carahsoft.com\/buy\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"OSINT Executive Protection Blog 2026 - Bottom CTA\">www.carahsoft.com\/buy<\/a><\/em><\/strong><\/li>\n<\/ul>\n<head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/carahsoft-osint-and-executive-protection-blog-2026\"><\/head>","protected":false},"excerpt":{"rendered":"<p>As threats to executives, public officials and high-profile individuals continue to evolve, Executive Protection (EP) programs are increasingly reliant on Open Source Intelligence (OSINT) to anticipate, detect and mitigate risk. From online harassment and doxxing to geopolitical instability and lone-actor &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":12119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[157,1545],"tags":[545,1704,611,549,1504,1371],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>OSINT and Executive Protection | Carahsoft<\/title>\n<meta name=\"description\" content=\"Enhance executive protection with OSINT, identify threats early, monitor digital risks and enable proactive, intelligence-led security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSINT and Executive Protection | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Enhance executive protection with OSINT, identify threats early, monitor digital risks and enable proactive, intelligence-led security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-14T17:44:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"OSINT and Executive Protection: A Critical Capability for Modern Security Operations\",\"datePublished\":\"2026-05-14T17:44:28+00:00\",\"dateModified\":\"2026-05-14T17:44:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/\"},\"wordCount\":520,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg\",\"keywords\":[\"Cybersecurity\",\"Executive Protection\",\"Federal Government\",\"Open Source\",\"OSINT\",\"SOF Week\"],\"articleSection\":[\"Federal Government\",\"OSINT\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/\",\"name\":\"OSINT and Executive Protection | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg\",\"datePublished\":\"2026-05-14T17:44:28+00:00\",\"dateModified\":\"2026-05-14T17:44:28+00:00\",\"description\":\"Enhance executive protection with OSINT, identify threats early, monitor digital risks and enable proactive, intelligence-led security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSINT and Executive Protection: A Critical Capability for Modern Security Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OSINT and Executive Protection | Carahsoft","description":"Enhance executive protection with OSINT, identify threats early, monitor digital risks and enable proactive, intelligence-led security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/","og_locale":"en_US","og_type":"article","og_title":"OSINT and Executive Protection | Carahsoft","og_description":"Enhance executive protection with OSINT, identify threats early, monitor digital risks and enable proactive, intelligence-led security.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/","og_site_name":"| Carahsoft","article_published_time":"2026-05-14T17:44:28+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg","type":"image\/jpeg"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"OSINT and Executive Protection: A Critical Capability for Modern Security Operations","datePublished":"2026-05-14T17:44:28+00:00","dateModified":"2026-05-14T17:44:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/"},"wordCount":520,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg","keywords":["Cybersecurity","Executive Protection","Federal Government","Open Source","OSINT","SOF Week"],"articleSection":["Federal Government","OSINT"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/","url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/","name":"OSINT and Executive Protection | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg","datePublished":"2026-05-14T17:44:28+00:00","dateModified":"2026-05-14T17:44:28+00:00","description":"Enhance executive protection with OSINT, identify threats early, monitor digital risks and enable proactive, intelligence-led security.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2026\/05\/OSINT-Executive-Protection_Blog-Post-Preview.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-osint-and-executive-protection-blog-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"OSINT and Executive Protection: A Critical Capability for Modern Security Operations"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/12117"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=12117"}],"version-history":[{"count":1,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/12117\/revisions"}],"predecessor-version":[{"id":12120,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/12117\/revisions\/12120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/12119"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=12117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=12117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=12117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}