{"id":1707,"date":"2017-07-12T12:09:39","date_gmt":"2017-07-12T16:09:39","guid":{"rendered":"http:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image.jpeg"},"modified":"2017-07-12T12:09:39","modified_gmt":"2017-07-12T16:09:39","slug":"hacktivism-image","status":"inherit","type":"attachment","link":"https:\/\/blogs.law.columbia.edu\/uprising1313\/11-13\/hacktivism-image\/#main","title":{"rendered":"Hacktivism image"},"author":1641,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"class_list":["post-1707","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><object class=\"vanilla-pdf-embed\" data=\"http:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image.jpeg#page=1&view=FitH\" type=\"application\/pdf\" width=\"100%\" height=\"500em\">\n    <p><a href=\"http:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image.jpeg\">Download the PDF file .<\/a><\/p>\n<\/object><\/p>\n"},"caption":{"rendered":"<p>Download the PDF file .<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":3264,"height":2448,"file":"2016\/05\/Hacktivism-image.jpeg","sizes":{"thumbnail":{"file":"Hacktivism-image-150x150.jpeg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-150x150.jpeg"},"medium":{"file":"Hacktivism-image-300x225.jpeg","width":300,"height":225,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-300x225.jpeg"},"medium_large":{"file":"Hacktivism-image-768x576.jpeg","width":768,"height":576,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-768x576.jpeg"},"large":{"file":"Hacktivism-image-1024x768.jpeg","width":1024,"height":768,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-1024x768.jpeg"},"thumb-small":{"file":"Hacktivism-image-50x50.jpeg","width":50,"height":50,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-50x50.jpeg"},"thumb-medium":{"file":"Hacktivism-image-300x135.jpeg","width":300,"height":135,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-300x135.jpeg"},"thumb-featured":{"file":"Hacktivism-image-640x250.jpeg","width":640,"height":250,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image-640x250.jpeg"},"full":{"file":"Hacktivism-image.jpeg","width":3264,"height":2448,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image.jpeg"}},"image_meta":{"aperture":"2.2","credit":"","camera":"iPhone 5s","caption":"","created_timestamp":"1499859534","copyright":"","focal_length":"4.15","iso":"64","shutter_speed":"0.033333333333333","title":"","orientation":"1","keywords":[]}},"post":44,"source_url":"https:\/\/blogs.law.columbia.edu\/uprising1313\/files\/2016\/05\/Hacktivism-image.jpeg","_links":{"self":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/media\/1707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/users\/1641"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.law.columbia.edu\/uprising1313\/wp-json\/wp\/v2\/comments?post=1707"}]}}