{"version":"1.0","provider_name":"Meu site jur\u00eddico","provider_url":"https:\/\/cdn.meusitejuridico.com.br","author_name":"D\u00e9bora de Souza de Almeida","author_url":"https:\/\/cdn.meusitejuridico.com.br\/author\/deboradebora-com-br\/","title":"O ciberataque do dia 12 de maio: ciberterrorismo? - Meu site jur\u00eddico","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"LrK6SFvfTZ\"><a href=\"https:\/\/cdn.meusitejuridico.com.br\/2017\/05\/16\/o-ciberataque-dia-12-de-maio-ciberterrorismo\/\">O ciberataque do dia 12 de maio: ciberterrorismo?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cdn.meusitejuridico.com.br\/2017\/05\/16\/o-ciberataque-dia-12-de-maio-ciberterrorismo\/embed\/#?secret=LrK6SFvfTZ\" width=\"600\" height=\"338\" title=\"&#8220;O ciberataque do dia 12 de maio: ciberterrorismo?&#8221; &#8212; Meu site jur\u00eddico\" data-secret=\"LrK6SFvfTZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/meusitejuridico.editorajuspodivm.com.br\/s.meusitejuridico\/2017\/05\/e37e74c1-shutterstock-583264453.jpg","thumbnail_width":500,"thumbnail_height":334,"description":"Resumo: O presente artigo visa analisar, ainda que de forma breve, se h\u00e1 adequa\u00e7\u00e3o do ataque cibern\u00e9tico de 12 de maio de 2017 \u00e0 categoria de crime de ciberterrorismo, avaliando, ao final, se seria poss\u00edvel sua subsun\u00e7\u00e3o \u00e0 Lei 13.260\/16 (Lei Antiterrorismo). Neste compasso, s\u00e3o ilustradas algumas defini\u00e7\u00f5es de ciberterrorismo e sua rela\u00e7\u00e3o com a [&hellip;]"}