<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Stone Security Engineering</provider_name><provider_url>https://stonesecurityengineering.com</provider_url><author_name>Amber Kasbeer</author_name><author_url>https://stonesecurityengineering.com/author/akasbeer/</author_url><title>New Year, Same Threats &#x2013; Updates to Old Tactics - Stone Security Engineering</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="sSz5vM40T5"&gt;&lt;a href="https://stonesecurityengineering.com/new-year-same-threats/"&gt;New Year, Same Threats &#x2013; Updates to Old Tactics&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://stonesecurityengineering.com/new-year-same-threats/embed/#?secret=sSz5vM40T5" width="600" height="338" title="&#x201C;New Year, Same Threats &#x2013; Updates to Old Tactics&#x201D; &#x2014; Stone Security Engineering" data-secret="sSz5vM40T5" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><description>The nature and tactics of explosive threats look to remain consistent in 2025. However, as everything in nature and life, the methods and technologies used to execute these threats are evolving. Traditionally, terrorist explosive threats were assessed as occurring at ground or street level (e.g., explosive-laden cars, trucks, or boats). The Bomb Threat Standoff Cards [&hellip;]</description></oembed>
