<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Just Security</provider_name><provider_url>https://www.justsecurity.org</provider_url><title>Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility - Just Security</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="U52ZDv3Yw8"&gt;&lt;a href="https://www.justsecurity.org/59546/tech-pressure-privacy-national-security-requires-fuller-view-corporate-social-responsibility/"&gt;Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.justsecurity.org/59546/tech-pressure-privacy-national-security-requires-fuller-view-corporate-social-responsibility/embed/#?secret=U52ZDv3Yw8" width="600" height="338" title="&#x201C;Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility&#x201D; &#x2014; Just Security" data-secret="U52ZDv3Yw8" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.justsecurity.org/wp-content/uploads/2018/07/GettyImages-519417510-1024x679.jpg</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>679</thumbnail_height><description>The corporate world and the U.S. national security apparatus increasingly find themselves in conflict over technology and expertise, with implications for the effectiveness of U.S. intelligence and law enforcement. The clashes, from the 1990s telecom-privacy debates to today&#x2019;s confrontations over access to iPhones and social media infiltration, are more than just occasional spats between the [&hellip;]</description></oembed>
