{"id":1474,"date":"2025-03-12T15:13:39","date_gmt":"2025-03-12T15:13:39","guid":{"rendered":"https:\/\/security2j2.com\/?p=1474"},"modified":"2025-09-15T13:25:51","modified_gmt":"2025-09-15T13:25:51","slug":"de-escalation-use-of-force-tactical-handcuffing-techniques-tactical-communications","status":"publish","type":"post","link":"https:\/\/security2j2.com\/?p=1474","title":{"rendered":"De-Escalation, Use of Force, Tactical Handcuffing Techniques, tactical Communications. SIGA"},"content":{"rendered":"\n<figure class=\"wp-block-gallery columns-3 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/thumbnail_IMG_9645.jpeg\"><img loading=\"lazy\" width=\"320\" height=\"249\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/thumbnail_IMG_9645.jpeg\" alt=\"\" data-id=\"1475\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/thumbnail_IMG_9645.jpeg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=1475\" class=\"wp-image-1475\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/thumbnail_IMG_9645.jpeg 320w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/thumbnail_IMG_9645-300x233.jpeg 300w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/cuff.jpeg\"><img loading=\"lazy\" width=\"965\" height=\"1024\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/cuff-965x1024.jpeg\" alt=\"\" data-id=\"1476\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/cuff.jpeg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=1476\" class=\"wp-image-1476\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/cuff-965x1024.jpeg 965w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/cuff-283x300.jpeg 283w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/cuff-768x815.jpeg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/cuff.jpeg 1415w\" sizes=\"(max-width: 965px) 100vw, 965px\" \/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/IMG_0481-scaled.jpeg\"><img loading=\"lazy\" width=\"1024\" height=\"699\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/IMG_0481-1024x699.jpeg\" alt=\"\" data-id=\"1477\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/IMG_0481-scaled.jpeg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=1477\" class=\"wp-image-1477\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/IMG_0481-1024x699.jpeg 1024w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/IMG_0481-300x205.jpeg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/IMG_0481-768x525.jpeg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/IMG_0481-1536x1049.jpeg 1536w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/IMG_0481-2048x1399.jpeg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/76279110816__1AE90EA6-7307-4C99-9336-1E3959C6E5F6-scaled.jpeg\"><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/76279110816__1AE90EA6-7307-4C99-9336-1E3959C6E5F6-1024x768.jpeg\" alt=\"\" data-id=\"1478\" data-full-url=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/76279110816__1AE90EA6-7307-4C99-9336-1E3959C6E5F6-scaled.jpeg\" data-link=\"https:\/\/security2j2.com\/?attachment_id=1478\" class=\"wp-image-1478\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/76279110816__1AE90EA6-7307-4C99-9336-1E3959C6E5F6-1024x768.jpeg 1024w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/76279110816__1AE90EA6-7307-4C99-9336-1E3959C6E5F6-300x225.jpeg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/76279110816__1AE90EA6-7307-4C99-9336-1E3959C6E5F6-768x576.jpeg 768w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/76279110816__1AE90EA6-7307-4C99-9336-1E3959C6E5F6-1536x1152.jpeg 1536w, https:\/\/security2j2.com\/wp-content\/uploads\/2025\/04\/76279110816__1AE90EA6-7307-4C99-9336-1E3959C6E5F6-2048x1536.jpeg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/li><\/ul><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/1474"}],"collection":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1474"}],"version-history":[{"count":2,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/1474\/revisions"}],"predecessor-version":[{"id":1497,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/1474\/revisions\/1497"}],"wp:attachment":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}