<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Security, Identity, Memory</provider_name><provider_url>https://research.kent.ac.uk/security-identity-memory</provider_url><author_name>Security, Identity, Memory</author_name><author_url>https://research.kent.ac.uk/security-identity-memory</author_url><title>Security, Identity, Memory - Research at Kent</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="wO2chuDCDs"&gt;&lt;a href="https://research.kent.ac.uk/security-identity-memory/"&gt;Home&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://research.kent.ac.uk/security-identity-memory/embed/#?secret=wO2chuDCDs" width="600" height="338" title="&#x201C;Home&#x201D; &#x2014; Security, Identity, Memory" data-secret="wO2chuDCDs" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://research.kent.ac.uk/security-identity-memory/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>What is the relationship between security and identity? How can historical grievances become the subject of contemporary foreign and security policies? Why do states and nations seek to defend their historical memory by means of law at times? How might the legal framing of public remembrance infringe upon freedom of speech and freedom of association? [&hellip;]</description><thumbnail_url>https://research.kent.ac.uk/security-identity-memory/wp-content/uploads/sites/1928/2018/03/323-300x200.jpg</thumbnail_url></oembed>
