{"id":413,"date":"2013-02-26T13:29:34","date_gmt":"2013-02-26T13:29:34","guid":{"rendered":"http:\/\/blogs.iit.edu\/public_safety\/files\/2013\/02\/2262013.pdf"},"modified":"2013-02-26T13:29:34","modified_gmt":"2013-02-26T13:29:34","slug":"2262013","status":"inherit","type":"attachment","link":"https:\/\/blogs.iit.edu\/public_safety\/2013\/02\/26\/public-crime-log-february-26-2013\/attachment\/2262013\/","title":{"rendered":"2262013"},"author":23,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"class_list":["post-413","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/blogs.iit.edu\/public_safety\/files\/2013\/02\/2262013.pdf'>2262013<\/a><\/p>\n"},"caption":{"rendered":"<p>2262013<\/p>\n"},"alt_text":"","media_type":"file","mime_type":"application\/pdf","media_details":{},"post":412,"source_url":"https:\/\/blogs.iit.edu\/public_safety\/files\/2013\/02\/2262013.pdf","_links":{"self":[{"href":"https:\/\/blogs.iit.edu\/public_safety\/wp-json\/wp\/v2\/media\/413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.iit.edu\/public_safety\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/blogs.iit.edu\/public_safety\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/public_safety\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/public_safety\/wp-json\/wp\/v2\/comments?post=413"}],"wp:attached-to":[{"embeddable":true,"post_type":"post","id":412,"href":"https:\/\/blogs.iit.edu\/public_safety\/wp-json\/wp\/v2\/posts\/412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}