{"id":87,"date":"2014-11-20T04:37:41","date_gmt":"2014-11-20T04:37:41","guid":{"rendered":"https:\/\/security2j2.com\/?page_id=87"},"modified":"2021-04-29T15:56:24","modified_gmt":"2021-04-29T15:56:24","slug":"use-of-force-options","status":"publish","type":"page","link":"https:\/\/security2j2.com\/?page_id=87","title":{"rendered":"Use of Force Options"},"content":{"rendered":"<p>Tactical Communications.<\/p>\n<p>PPCT, Pressure Point Control Tactics.<\/p>\n<p>Joint Locks<\/p>\n<p>Defensive Counter-Strikes<\/p>\n<p>Pepper Spray<\/p>\n<p>Impact Weapon Retention &amp; Disarming.<\/p>\n<p>More to follow.<\/p>\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2020\/06\/IMG_E2719-1024x707.jpg\" alt=\"\" class=\"wp-image-917\" width=\"295\" height=\"204\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2020\/06\/IMG_E2719-1024x707.jpg 1024w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/06\/IMG_E2719-300x207.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/06\/IMG_E2719-768x530.jpg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/06\/IMG_E2719-1536x1060.jpg 1536w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/06\/IMG_E2719-2048x1413.jpg 2048w\" sizes=\"(max-width: 295px) 100vw, 295px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-gallery columns-3 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7240-1024x768.jpg\" alt=\"\" data-id=\"1116\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7240-scaled.jpg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=1116\" class=\"wp-image-1116\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7240-1024x768.jpg 1024w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7240-300x225.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7240-768x576.jpg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7240-1536x1152.jpg 1536w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7240-2048x1536.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"1023\" height=\"609\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7468.jpg\" alt=\"\" data-id=\"1113\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7468.jpg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=1113\" class=\"wp-image-1113\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7468.jpg 1023w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7468-300x179.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_7468-768x457.jpg 768w\" sizes=\"(max-width: 1023px) 100vw, 1023px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"679\" height=\"509\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_E7591.jpg\" alt=\"\" data-id=\"1110\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_E7591.jpg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=1110\" class=\"wp-image-1110\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_E7591.jpg 679w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/04\/IMG_E7591-300x225.jpg 300w\" sizes=\"(max-width: 679px) 100vw, 679px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/03\/IMG_7201-1024x768.jpg\" alt=\"\" data-id=\"1076\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/03\/IMG_7201-scaled.jpg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=1076\" class=\"wp-image-1076\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2021\/03\/IMG_7201-1024x768.jpg 1024w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/03\/IMG_7201-300x225.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/03\/IMG_7201-768x576.jpg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/03\/IMG_7201-1536x1152.jpg 1536w, https:\/\/security2j2.com\/wp-content\/uploads\/2021\/03\/IMG_7201-2048x1536.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"761\" height=\"1024\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2020\/07\/IMG_2590-761x1024.jpg\" alt=\"\" data-id=\"930\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2020\/07\/IMG_2590-scaled.jpg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=930\" class=\"wp-image-930\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2020\/07\/IMG_2590-761x1024.jpg 761w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/07\/IMG_2590-223x300.jpg 223w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/07\/IMG_2590-768x1033.jpg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/07\/IMG_2590-1142x1536.jpg 1142w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/07\/IMG_2590-1522x2048.jpg 1522w, https:\/\/security2j2.com\/wp-content\/uploads\/2020\/07\/IMG_2590-scaled.jpg 1903w\" sizes=\"(max-width: 761px) 100vw, 761px\" \/><\/figure><\/li><\/ul><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Tactical Communications. PPCT, Pressure Point Control Tactics. Joint Locks Defensive Counter-Strikes Pepper Spray Impact Weapon Retention &amp; Disarming. More to follow.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/pages\/87"}],"collection":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=87"}],"version-history":[{"count":4,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/pages\/87\/revisions"}],"predecessor-version":[{"id":1123,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/pages\/87\/revisions\/1123"}],"wp:attachment":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}