{"version":"1.0","provider_name":"Xavier Raufer","provider_url":"https:\/\/www.xavier-raufer.com\/site","author_name":"Xavier Raufer","author_url":"https:\/\/www.xavier-raufer.com\/site\/author\/mpinosa-drmcc-75\/","title":"Global security considerations - XAVIER RAUFER - February 2009 - Xavier Raufer","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VJumwSWWoF\"><a href=\"https:\/\/www.xavier-raufer.com\/site\/en\/global-security-considerations-xavier-raufer-february-2009\/\">Global security considerations &#8211; XAVIER RAUFER &#8211; February 2009<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.xavier-raufer.com\/site\/en\/global-security-considerations-xavier-raufer-february-2009\/embed\/#?secret=VJumwSWWoF\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Global security considerations &#8211; XAVIER RAUFER &#8211; February 2009\u00a0\u00bb &#8212; Xavier Raufer\" data-secret=\"VJumwSWWoF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Threats - what kind of world do we live in?  Threats do not only come from the outside. Without being arrogant or paranoid, our society also has its own weaknesses, which make us vulnerable when it comes to global security. We are going to look at both internal (endogenous) and external (exogenous) threats, but first, it\u2019s important to emphasise a fact ..."}