<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Just Security</provider_name><provider_url>https://www.justsecurity.org</provider_url><title>The New Intelligence Sharing Procedures Are Not About Law Enforcement - Just Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="FRDqjJ5DjT"&gt;&lt;a href="https://www.justsecurity.org/30327/intelligence-sharing-procedures-not-law-enforcement/"&gt;The New Intelligence Sharing Procedures Are Not About Law Enforcement&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.justsecurity.org/30327/intelligence-sharing-procedures-not-law-enforcement/embed/#?secret=FRDqjJ5DjT" width="600" height="338" title="&#x201C;The New Intelligence Sharing Procedures Are Not About Law Enforcement&#x201D; &#x2014; Just Security" data-secret="FRDqjJ5DjT" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://i0.wp.com/www.justsecurity.org/wp-content/uploads/2016/03/GettyImages-77559629.jpg?fit=3000%2C2000&amp;ssl=1</thumbnail_url><thumbnail_width>3000</thumbnail_width><thumbnail_height>2000</thumbnail_height><description>[Editor&#x2019;s Note: The author composed this analytic essay while serving as General Counsel for the Director of National Intelligence.] There has been a lot of speculation about the content of proposed procedures that are being drafted to authorize the sharing of unevaluated signals intelligence. While the procedures are not yet in final form, it would [&hellip;]</description></oembed>
