{"id":25460,"date":"2020-02-04T18:29:46","date_gmt":"2020-02-04T12:59:46","guid":{"rendered":"https:\/\/www.armourinfosec.com\/wp-content\/uploads\/2020\/02\/unnamed.jpg"},"modified":"2020-02-04T18:33:28","modified_gmt":"2020-02-04T13:03:28","slug":"unnamed","status":"inherit","type":"attachment","link":"https:\/\/www.armourinfosec.com\/mobile-forensic-and-its-procedure\/unnamed\/","title":{"rendered":"mobile forensic"},"author":1,"comment_status":"open","ping_status":"closed","template":"","meta":[],"yoast_head":"\n