{"version":"1.0","provider_name":"L\u2019humanitaire dans tous ses \u00e9tats","provider_url":"https:\/\/blogs.icrc.org\/hdtse","author_name":"fjoli","author_url":"https:\/\/blogs.icrc.org\/hdtse\/author\/fjoli\/","title":"R\u00e9flexion : les menaces num\u00e9riques dans les conflits arm\u00e9s","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GkaBXPkq4M\"><a href=\"https:\/\/blogs.icrc.org\/hdtse\/2023\/10\/04\/reflexion-les-menaces-numeriques-dans-les-conflits-armes\/\">R\u00e9flexion : les menaces num\u00e9riques dans les conflits arm\u00e9s<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blogs.icrc.org\/hdtse\/2023\/10\/04\/reflexion-les-menaces-numeriques-dans-les-conflits-armes\/embed\/#?secret=GkaBXPkq4M\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0R\u00e9flexion : les menaces num\u00e9riques dans les conflits arm\u00e9s\u00a0\u00bb &#8212; L\u2019humanitaire dans tous ses \u00e9tats\" data-secret=\"GkaBXPkq4M\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blogs.icrc.org\/hdtse\/wp-content\/uploads\/sites\/113\/2023\/10\/DRFinal-1152x620-1.png","thumbnail_width":1152,"thumbnail_height":620,"description":"Sur le blog institutionnel \u00ab Droit et Politiques humanitaires \u00bb qui propose une s\u00e9rie d&rsquo;articles traduits en fran\u00e7ais du blog \u00ab law and policy \u00bb, vient d\u2019\u00eatre publi\u00e9 un article sur les menaces num\u00e9riques dans les conflits arm\u00e9s. Une contribution sign\u00e9e de deux experts CICR, Joelle Rizk et Sean Cordey. \u00ab\u00a0Le d\u00e9veloppement et le recours..."}