<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Isenberg Institute of Strategic Satire</provider_name><provider_url>https://iissonline.net/2026</provider_url><title>Cybersecurity and the Age of Privateering - Isenberg Institute of Strategic Satire</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="e7ntenY0G1"&gt;&lt;a href="https://iissonline.net/2026/cybersecurity-and-the-age-of-privateering/"&gt;Cybersecurity and the Age of Privateering&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://iissonline.net/2026/cybersecurity-and-the-age-of-privateering/embed/#?secret=e7ntenY0G1" width="600" height="338" title="&#x201C;Cybersecurity and the Age of Privateering&#x201D; &#x2014; Isenberg Institute of Strategic Satire" data-secret="e7ntenY0G1" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://iissonline.net/2026/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>Return to Understanding Cyber Conflict: 14 Analogies Cybersecurity and the Age of Privateering Florian Egloff The study of the historical evolution of the private system of force in maritime history offers important lessons for analyzing and shaping the evolution of &hellip; Continue reading &rarr;</description><thumbnail_url>http://carnegieendowment.org/images/article_images/CyberAnalogies.jpg</thumbnail_url></oembed>
