{"id":180,"date":"2016-03-18T08:22:20","date_gmt":"2016-03-18T12:22:20","guid":{"rendered":"https:\/\/www.saintpeters.edu\/cyber-security\/?p=180"},"modified":"2016-03-23T08:26:39","modified_gmt":"2016-03-23T12:26:39","slug":"n-j-is-home-to-the-most-dangerous-2-miles-in-america-how-do-you-protect-it","status":"publish","type":"post","link":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/2016\/03\/18\/n-j-is-home-to-the-most-dangerous-2-miles-in-america-how-do-you-protect-it\/","title":{"rendered":"&#8220;N.J. is home to &#8216;the most dangerous 2 miles in America.&#8217; How do you protect it?&#8221;"},"content":{"rendered":"<blockquote><p>PRINCETON \u2014 There&#8217;s a patch of land in New Jersey \u2014 spanning roughly from Exit 13A on the Turnpike to Newark International Airport and the ports of Newark and Elizabeth \u2014 that homeland security experts call &#8220;the most dangerous two miles in America.&#8221;<\/p>\n<p>With critical infrastructure, major thoroughfares and sensitive chemical processing facilities, officials in New Jersey are particularly worried about the state&#8217;s <a href=\"https:\/\/www.nj.com\/politics\/index.ssf\/2016\/03\/how_do_you_protect_the_most_dangerous_2_miles_in_a.html\" target=\"_blank\">vulnerability to terror attacks<\/a>.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>PRINCETON \u2014 There&#8217;s a patch of land in New Jersey \u2014 spanning roughly from Exit 13A on the Turnpike to Newark International Airport and the ports of Newark and Elizabeth \u2014 that homeland security experts call &#8220;the most dangerous two miles in America.&#8221; With critical infrastructure, major thoroughfares and sensitive chemical processing facilities, officials in [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-180","post","type-post","status-publish","format-standard","hentry","category-cyber-security-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/comments?post=180"}],"version-history":[{"count":1,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/180\/revisions"}],"predecessor-version":[{"id":181,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/180\/revisions\/181"}],"wp:attachment":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/media?parent=180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/categories?post=180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/tags?post=180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}