{"id":7675,"date":"2021-02-11T03:35:39","date_gmt":"2021-02-11T03:35:39","guid":{"rendered":"http:\/\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png"},"modified":"2021-02-11T03:35:39","modified_gmt":"2021-02-11T03:35:39","slug":"structured-analytic-techniques-for-intelligence-analysis-ach-coding-evidence","status":"inherit","type":"attachment","link":"https:\/\/arielsheen.com\/index.php\/2021\/02\/11\/notes-on-structured-analytic-techniques-for-intelligence-analysis\/structured-analytic-techniques-for-intelligence-analysis-ach-coding-evidence\/","title":{"rendered":"Structured Analytic Techniques for Intelligence Analysis ACH Coding Evidence"},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false},"class_list":["post-7675","attachment","type-attachment","status-inherit","hentry"],"acf":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/a8e7kf-1ZN","description":{"rendered":"<p class=\"attachment\"><a href=\"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?ssl=1\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"255\" src=\"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=300%2C255&amp;ssl=1\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?w=1038&amp;ssl=1 1038w, https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?resize=300%2C255&amp;ssl=1 300w, https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?resize=768%2C653&amp;ssl=1 768w, https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?resize=1024%2C870&amp;ssl=1 1024w\" sizes=\"auto, (max-width: 300px) 85vw, 300px\" data-attachment-id=\"7675\" data-permalink=\"https:\/\/arielsheen.com\/index.php\/2021\/02\/11\/notes-on-structured-analytic-techniques-for-intelligence-analysis\/structured-analytic-techniques-for-intelligence-analysis-ach-coding-evidence\/\" data-orig-file=\"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=1038%2C882&amp;ssl=1\" data-orig-size=\"1038,882\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Structured Analytic Techniques for Intelligence Analysis ACH Coding Evidence\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=300%2C255&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=840%2C714&amp;ssl=1\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"","media_type":"image","mime_type":"image\/png","media_details":{"width":1038,"height":882,"file":"2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png","sizes":{"thumbnail":{"file":"Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence-150x150.png","width":150,"height":150,"mime_type":"image\/png","source_url":"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?resize=150%2C150&ssl=1"},"medium":{"file":"Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence-300x255.png","width":300,"height":255,"mime_type":"image\/png","source_url":"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=300%2C255&ssl=1"},"medium_large":{"file":"Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence-768x653.png","width":768,"height":653,"mime_type":"image\/png","source_url":"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=768%2C653&ssl=1"},"large":{"file":"Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence-1024x870.png","width":1024,"height":870,"mime_type":"image\/png","source_url":"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=840%2C714&ssl=1"},"full":{"file":"Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=1038%2C882&ssl=1","width":1038,"height":882,"mime_type":"image\/png","source_url":"https:\/\/i0.wp.com\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png?fit=1038%2C882&ssl=1"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":7653,"source_url":"https:\/\/arielsheen.com\/wp-content\/uploads\/2021\/02\/Structured-Analytic-Techniques-for-Intelligence-Analysis-ACH-Coding-Evidence.png","_links":{"self":[{"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/media\/7675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/comments?post=7675"}],"wp:attached-to":[{"embeddable":true,"post_type":"post","id":7653,"href":"https:\/\/arielsheen.com\/index.php\/wp-json\/wp\/v2\/posts\/7653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}