{"version":"1.0","provider_name":"counterintelligence.pl","provider_url":"https:\/\/counterintelligence.pl\/en","author_name":"Kamil Bojarski","author_url":"https:\/\/counterintelligence.pl\/en\/author\/kamil\/","title":"Francuska doktryna operacji cyber - operacje wp\u0142ywu","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"p3jmcdFeEi\"><a href=\"https:\/\/counterintelligence.pl\/en\/2022\/08\/francuska-doktryna-operacji-cyber-operacje-wplywu\/\">French doctrine of cyber operations - influence operations<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/counterintelligence.pl\/en\/2022\/08\/francuska-doktryna-operacji-cyber-operacje-wplywu\/embed\/#?secret=p3jmcdFeEi\" width=\"600\" height=\"338\" title=\"&quot;French doctrine of cyber operations - impact operations&quot; - counterintelligence.pl\" data-secret=\"p3jmcdFeEi\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/counterintelligence.pl\/wp-includes\/js\/wp-embed.min.js\n<\/script>","thumbnail_url":"https:\/\/counterintelligence.pl\/wp-content\/uploads\/2022\/08\/lwifrance.png","thumbnail_width":865,"thumbnail_height":939,"description":"Operacje informacyjne, operacje wp\u0142ywu, czy tzw active measures to do\u015b\u0107 specyficzny aspekt dzia\u0142a\u0144 cyber. Wydawa\u0107 by si\u0119 mog\u0142o, \u017ce jest to zagadnienie zupe\u0142nie odr\u0119bne od cyber szpiegostwa czy sabota\u017cu. Ze wzgl\u0119du jednak na to jak wielk\u0105 rol\u0119 w ich prowadzeniu odgrywa Internet, media spo\u0142eczno\u015bciowe i inne formy komunikacji cyfrowej, cz\u0119sto [&hellip;]"}