{"version":"1.0","provider_name":"OCEAN4FUTURE","provider_url":"https:\/\/www.ocean4future.org\/savetheocean","author_name":"Redazione OCEAN4FUTURE","author_url":"https:\/\/www.ocean4future.org\/savetheocean\/archives\/author\/redazione-ocean4future","title":"Cyber warfare e cyber espionage parte II di Nicola Cristadoro &#8226; OCEAN4FUTURE autore","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"QPUsWz55VF\"><a href=\"https:\/\/www.ocean4future.org\/savetheocean\/archives\/112100\">Cyber warfare e cyber espionage parte II  di Nicola Cristadoro<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ocean4future.org\/savetheocean\/archives\/112100\/embed#?secret=QPUsWz55VF\" width=\"600\" height=\"338\" title=\"&#8220;Cyber warfare e cyber espionage parte II  di Nicola Cristadoro&#8221; &#8212; OCEAN4FUTURE\" data-secret=\"QPUsWz55VF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ocean4future.org\/savetheocean\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ocean4future.org\/savetheocean\/wp-content\/uploads\/2024\/12\/Screenshot-2024-11-21-081933.png","thumbnail_width":800,"thumbnail_height":758,"description":". . ARGOMENTO: GEOPOLITICAPERIODO: XXI SECOLOAREA: CYBERWARFAREparole chiave: spionaggio \u00a0 Il \u201cdossieraggio\u201d della societ\u00e0 di sicurezza privata Equalize Gli eventi \u201cinformatici\u201d che hanno scosso il nostro Paese nell\u2019autunno del 2024 non sono meno suscettibili di una trattazione in un articolo come questo. Il riferimento \u00e8 al caso di \u201cdossieraggio\u201d attuato a livello nazionale dall\u2019agenzia di [&hellip;]"}