{"version":"1.0","provider_name":"Isenberg Institute of Strategic Satire","provider_url":"https:\/\/iissonline.net\/2026","title":"Analysing Security Threats: Man vs Machine - Isenberg Institute of Strategic Satire","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TaDeUCBwGd\"><a href=\"https:\/\/iissonline.net\/2026\/analysing-security-threats-man-vs-machine\/\">Analysing Security Threats: Man vs Machine<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/iissonline.net\/2026\/analysing-security-threats-man-vs-machine\/embed\/#?secret=TaDeUCBwGd\" width=\"600\" height=\"338\" title=\"&#8220;Analysing Security Threats: Man vs Machine&#8221; &#8212; Isenberg Institute of Strategic Satire\" data-secret=\"TaDeUCBwGd\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/iissonline.net\/2026\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Analysing Security Threats: Man vs Machine The claim that in today\u2019s information age, with open source media instantly available via mobile devices or at the desk, the ability to identify and analyse security threats before a voyage is considered should &hellip; Continue reading &rarr;","thumbnail_url":"http:\/\/worldmaritimenews.com\/wp-content\/uploads\/2015\/01\/Analysing-Security-Threats-Man-vs-Machine-320x168.jpg"}