{"id":383,"date":"2016-04-19T15:07:18","date_gmt":"2016-04-19T15:07:18","guid":{"rendered":"https:\/\/security2j2.com\/?p=383"},"modified":"2016-04-20T15:10:20","modified_gmt":"2016-04-20T15:10:20","slug":"april-19-2016-golden-eagle-casino-northbattleford-sask","status":"publish","type":"post","link":"https:\/\/security2j2.com\/?p=383","title":{"rendered":"April 19 2016 Golden Eagle Casino, NorthBattleford, Sask."},"content":{"rendered":"<p>Tactical Communication and Executive overview for Security Officers Training Presentation. \u00a0 MOD&#8217;s and Operations.<\/p>\n<p><a href=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/04\/tciOcB_-.jpg\" rel=\"attachment wp-att-384\"><img loading=\"lazy\" class=\"alignnone wp-image-384\" src=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/04\/tciOcB_--300x300.jpg\" alt=\"tciOcB_-\" width=\"168\" height=\"168\" srcset=\"https:\/\/security2j2.com\/wp-content\/uploads\/2016\/04\/tciOcB_--300x300.jpg 300w, https:\/\/security2j2.com\/wp-content\/uploads\/2016\/04\/tciOcB_--150x150.jpg 150w, https:\/\/security2j2.com\/wp-content\/uploads\/2016\/04\/tciOcB_-.jpg 400w\" sizes=\"(max-width: 168px) 100vw, 168px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tactical Communication and Executive overview for Security Officers Training Presentation. \u00a0 MOD&#8217;s and Operations.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/383"}],"collection":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=383"}],"version-history":[{"count":1,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/383\/revisions"}],"predecessor-version":[{"id":385,"href":"https:\/\/security2j2.com\/index.php?rest_route=\/wp\/v2\/posts\/383\/revisions\/385"}],"wp:attachment":[{"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security2j2.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}