{"id":1625,"date":"2013-06-25T14:02:15","date_gmt":"2013-06-25T12:02:15","guid":{"rendered":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/?p=1625"},"modified":"2017-03-20T12:06:44","modified_gmt":"2017-03-20T11:06:44","slug":"investigative-recherche-2","status":"publish","type":"post","link":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/blog\/investigative-recherche-2\/","title":{"rendered":"Investigative Recherche"},"content":{"rendered":"<p>Boris Kartheuser: <a href=\"http:\/\/web.archive.org\/web\/20170305231338\/http:\/\/www.investigativerecherche.de\/digitale-sicherheit\/\">Programme und Anleitungen f\u00fcr digitale Sicherheit<\/a><br \/>\n(Link zu investigativerecherche.de)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Boris Kartheuser: Programme und Anleitungen f\u00fcr digitale Sicherheit (Link zu investigativerecherche.de)<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[38],"tags":[],"class_list":["post-1625","post","type-post","status-publish","format-standard","hentry","category-datensicherheit"],"acf":[],"_links":{"self":[{"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/posts\/1625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/comments?post=1625"}],"version-history":[{"count":2,"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/posts\/1625\/revisions"}],"predecessor-version":[{"id":8105,"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/posts\/1625\/revisions\/8105"}],"wp:attachment":[{"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/media?parent=1625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/categories?post=1625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netzwerkrecherche.org\/nr-termine-archive\/wp-json\/wp\/v2\/tags?post=1625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}