{"version":"1.0","provider_name":"Humanitarian Law &amp; Policy Blog","provider_url":"https:\/\/blogs.icrc.org\/law-and-policy","author_name":"mdhere","author_url":"https:\/\/blogs.icrc.org\/law-and-policy\/author\/mdhere\/","title":"What we don\u2019t understand about digital risks in armed conflict and what to do about it - Humanitarian Law & Policy Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"JqPUTjYivO\"><a href=\"https:\/\/blogs.icrc.org\/law-and-policy\/2023\/07\/27\/digital-risks-in-armed-conflict\/drfinal\/\">What we don\u2019t understand about digital risks in armed conflict and what to do about it<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blogs.icrc.org\/law-and-policy\/2023\/07\/27\/digital-risks-in-armed-conflict\/drfinal\/embed\/#?secret=JqPUTjYivO\" width=\"600\" height=\"338\" title=\"&#8220;What we don\u2019t understand about digital risks in armed conflict and what to do about it&#8221; &#8212; Humanitarian Law &amp; Policy Blog\" data-secret=\"JqPUTjYivO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blogs.icrc.org\/law-and-policy\/wp-content\/uploads\/sites\/102\/2023\/07\/DRFinal.png","thumbnail_width":1152,"thumbnail_height":648,"description":"The deployment and use of new digital technologies in modern conflicts \u2013 from information to cyber operations \u2013 creates new risks and enables actual risks of harm to civilians\u2019 rights, lives, safety, dignity, and resilience. Understanding these risks is at the core of protection work in the digital age. In this post, ICRC Digital Risk..."}