{"id":2,"date":"2012-10-09T08:17:21","date_gmt":"2012-10-09T08:17:21","guid":{"rendered":"http:\/\/www.genuinesecurity.org\/wordpress\/?page_id=2"},"modified":"2013-05-27T18:08:41","modified_gmt":"2013-05-27T18:08:41","slug":"sample-page","status":"publish","type":"page","link":"http:\/\/www.genuinesecurity.org\/wordpress\/sample-page\/","title":{"rendered":"About this site"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>This is the Blog of Women for Genuine Security (WGS), U.S. based partner of the International Women&#8217;s Network Against Militarism (IWNAM).\u00a0 In this blog, we publish <a href=\"http:\/\/www.genuinesecurity.org\/wordpress\/?page_id=131\">Our Writings <\/a>on our analysis of militarism from a U.S. based context. We also archive the statements of our network partners in our <a href=\"http:\/\/www.genuinesecurity.org\/wordpress\/?page_id=68\">Take Action <\/a>page.<\/p>\n<p>To learn about the WGS and the IWNAM, please visit our official website at <a href=\"http:\/\/www.genuinesecurity.org\">www.genuinesecurity.org<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; This is the Blog of Women for Genuine Security (WGS), U.S. based partner of the International Women&#8217;s Network Against Militarism (IWNAM).\u00a0 In this blog, we publish Our Writings on our analysis of militarism from a U.S. based context. We &hellip; <a href=\"http:\/\/www.genuinesecurity.org\/wordpress\/sample-page\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/www.genuinesecurity.org\/wordpress\/wp-json\/wp\/v2\/pages\/2"}],"collection":[{"href":"http:\/\/www.genuinesecurity.org\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.genuinesecurity.org\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.genuinesecurity.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.genuinesecurity.org\/wordpress\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":16,"href":"http:\/\/www.genuinesecurity.org\/wordpress\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":168,"href":"http:\/\/www.genuinesecurity.org\/wordpress\/wp-json\/wp\/v2\/pages\/2\/revisions\/168"}],"wp:attachment":[{"href":"http:\/\/www.genuinesecurity.org\/wordpress\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}