{"description":{"en":"A structure primed to deploy interdiction bubbles in the event of a site Lockdown. \n\nIts security protocols can be hacked by a data analyzer, rendering it inactive during a Lockdown."},"graphic_id":2613,"group_id":319,"mass":1000,"name":{"en":"Confinement Node"},"portion_size":1,"published":false,"radius":241,"type_id":93868,"dogma_attributes":{"9":{"attribute_id":9,"value":5000},"55":{"attribute_id":55,"value":0},"182":{"attribute_id":182,"value":21718},"263":{"attribute_id":263,"value":5000},"265":{"attribute_id":265,"value":10000},"267":{"attribute_id":267,"value":0.9},"268":{"attribute_id":268,"value":0.45},"269":{"attribute_id":269,"value":0.72},"270":{"attribute_id":270,"value":0.54},"271":{"attribute_id":271,"value":0.9},"272":{"attribute_id":272,"value":0.45},"273":{"attribute_id":273,"value":0.72},"274":{"attribute_id":274,"value":0.54},"277":{"attribute_id":277,"value":1},"470":{"attribute_id":470,"value":86400000},"479":{"attribute_id":479,"value":500000},"481":{"attribute_id":481,"value":0},"482":{"attribute_id":482,"value":0},"552":{"attribute_id":552,"value":400},"562":{"attribute_id":562,"value":0},"903":{"attribute_id":903,"value":1},"1919":{"attribute_id":1919,"value":1},"1927":{"attribute_id":1927,"value":1}},"category_id":11,"required_skills":{"21718":1}}