{"version":"1.0","provider_name":"Center for Democracy and Technology","provider_url":"https:\/\/cdt.org","author_name":"Jamal Magby","author_url":"https:\/\/cdt.org\/author\/jmagby\/","title":"OCTOPUS CONFERENCE ON CYBERCRIME 2025","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"JSTXZdC2cC\"><a href=\"https:\/\/cdt.org\/event\/octopus-conference-on-cybercrime-2025\/\">OCTOPUS CONFERENCE ON CYBERCRIME 2025<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cdt.org\/event\/octopus-conference-on-cybercrime-2025\/embed\/#?secret=JSTXZdC2cC\" width=\"600\" height=\"338\" title=\"&#8220;OCTOPUS CONFERENCE ON CYBERCRIME 2025&#8221; &#8212; Center for Democracy and Technology\" data-secret=\"JSTXZdC2cC\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cdt.org\/wp-content\/uploads\/2025\/05\/OCTOPUS-CONFERENCE-ON-CYBERCRIME-2025.png","thumbnail_width":1612,"thumbnail_height":491,"description":"Date: Thursday, June 5, 2025 Time: 9:00 am &#8211; 12:30 pm CET Main session 2 \u2013 Cyber interference with democracy Cyber interference with democracy\u201d refers to the use of information and communication technologies to manipulate or undermine democratic institutions, processes, or public trust in governance. Elections are at the core of democracy. Interference with elections [&hellip;]"}