{"guid":"baa6ac1c-3db1-4da1-a067-7126d3835b27","title":"Prioritäten der Cyberaußenpolitik","subtitle":null,"slug":"11np-04-Prioritäten_der_Cyberaußenpolitik","link":null,"description":"Dr. Thomas Fitschen, Beauftragter für die Vereinten Nationen, Cyber-Außenpolitik und internationale Zusammenarbeit bei der Terrorismusbekämpfung, wird einleitend die Neustrukturierung der mit Cyber-Außenpolitik befassten Stellen im Auswärtigen Amt sowie die Prioritäten für die kommenden Jahre vorstellen. Im Interview mit Geraldine de Bastion (tbc) werden einzelne Fragen der Cyber-Außenpolitik weiter beleuchtet.","original_language":"eng","persons":["Dr. Thomas Fitschen"],"tags":["Netzpolitik in Europa"],"view_count":114,"promoted":false,"date":"2015-09-04T11:00:00.000+02:00","release_date":"2015-09-15T02:00:00.000+02:00","updated_at":"2023-12-27T14:30:04.825+01:00","length":1263,"duration":1263,"thumb_url":"https://static.media.ccc.de/media/events/netzpolitik/11np/4-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/netzpolitik/11np/4-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/netzpolitik/11np/baa6ac1c-3db1-4da1-a067-7126d3835b27-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/netzpolitik/11np/baa6ac1c-3db1-4da1-a067-7126d3835b27-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/11np-04-Priorit%C3%A4ten_der_Cyberau%C3%9Fenpolitik","url":"https://api.media.ccc.de/public/events/baa6ac1c-3db1-4da1-a067-7126d3835b27","conference_title":"Das ist Netzpolitik! #11np","conference_url":"https://api.media.ccc.de/public/conferences/11np","related":[{"event_id":657,"event_guid":"import-a4e46602a0e417b76b","weight":2},{"event_id":2144,"event_guid":"29aecfd7-2e44-4f49-ab86-29b5e0877325","weight":2},{"event_id":2291,"event_guid":"2f68e356-6c3f-4034-9640-c06d717ed96b","weight":2},{"event_id":2332,"event_guid":"c8fe75dc-bc24-4bf7-8b6d-a5ac76c48d0e","weight":1},{"event_id":2337,"event_guid":"78eefe47-3278-4259-8b03-26944b0bba7c","weight":1},{"event_id":2587,"event_guid":"89b01590-66cd-4804-9235-f63f073da68d","weight":1},{"event_id":2670,"event_guid":"71c43eea-67b7-4f85-b4a9-4bd62138c167","weight":1},{"event_id":2755,"event_guid":"6733848c-84b1-4aa2-af57-820cbc5687e7","weight":1},{"event_id":2806,"event_guid":"654331ae-1710-42e5-bdf4-65a03a80c614","weight":1},{"event_id":3065,"event_guid":"161c6568-b7ae-41af-b20e-05d375872e66","weight":2},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":1},{"event_id":3702,"event_guid":"5fb5e620-383a-4679-b37a-beef20bcd4fe","weight":1},{"event_id":3814,"event_guid":"60b4de59-a9e2-4999-a3a8-3c3a8422adf6","weight":1},{"event_id":4578,"event_guid":"805bb174-4ec9-55c6-bd10-ebe111c212ab","weight":2},{"event_id":4618,"event_guid":"544e7dec-a9a6-11e7-9649-6f2a45a76afd","weight":1},{"event_id":4621,"event_guid":"1742b794-0e16-6fdf-d35c-3264e549d11c","weight":1},{"event_id":6468,"event_guid":"809b164e-a331-4005-a1d8-ebe55d61d64c","weight":2}],"recordings":[{"size":11,"length":1263,"mime_type":"audio/opus","language":"eng","filename":"11np-4-Prioritaeten_der_Cyberaussenpolitik_opus.opus","state":"downloaded","folder":"opus","high_quality":true,"width":null,"height":null,"updated_at":"2015-09-15T20:25:42.212+02:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/11np/opus/11np-4-Prioritaeten_der_Cyberaussenpolitik_opus.opus","url":"https://api.media.ccc.de/public/recordings/7725","event_url":"https://api.media.ccc.de/public/events/baa6ac1c-3db1-4da1-a067-7126d3835b27","conference_url":"https://api.media.ccc.de/public/conferences/11np"},{"size":53,"length":1263,"mime_type":"video/mp4","language":"eng","filename":"11np-4-Prioritaeten_der_Cyberaussenpolitik_sd.mp4","state":"downloaded","folder":"h264-sd","high_quality":true,"width":1280,"height":720,"updated_at":"2016-02-03T14:10:37.506+01:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/11np/h264-sd/11np-4-Prioritaeten_der_Cyberaussenpolitik_sd.mp4","url":"https://api.media.ccc.de/public/recordings/7726","event_url":"https://api.media.ccc.de/public/events/baa6ac1c-3db1-4da1-a067-7126d3835b27","conference_url":"https://api.media.ccc.de/public/conferences/11np"},{"size":14,"length":1263,"mime_type":"audio/mpeg","language":"eng","filename":"11np-4-Prioritaeten_der_Cyberaussenpolitik_mp3.mp3","state":"downloaded","folder":"mp3","high_quality":true,"width":null,"height":null,"updated_at":"2015-09-15T20:25:54.191+02:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/11np/mp3/11np-4-Prioritaeten_der_Cyberaussenpolitik_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/7727","event_url":"https://api.media.ccc.de/public/events/baa6ac1c-3db1-4da1-a067-7126d3835b27","conference_url":"https://api.media.ccc.de/public/conferences/11np"},{"size":921,"length":1263,"mime_type":"video/mp4","language":"eng","filename":"11np-4-Prioritaeten_der_Cyberaussenpolitik_hd.mp4","state":"downloaded","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-02-03T14:10:37.334+01:00","recording_url":"https://cdn.media.ccc.de/contributors/netzpolitik/11np/h264-hd/11np-4-Prioritaeten_der_Cyberaussenpolitik_hd.mp4","url":"https://api.media.ccc.de/public/recordings/7724","event_url":"https://api.media.ccc.de/public/events/baa6ac1c-3db1-4da1-a067-7126d3835b27","conference_url":"https://api.media.ccc.de/public/conferences/11np"}]}