{"page":"\u003clink rel=\"stylesheet\" href=\"https://lessonplanet.com/assets/packs/css/resources-572d6a42.css\" /\u003e\n\u003clink rel=\"stylesheet\" href=\"https://lessonplanet.com/assets/packs/css/lp_boclips_stylesheets-f4d0de30.css\" media=\"all\" /\u003e\n\u003cdiv data-title='Investigation into how military plans can be accessed on-line' data-url='/boclips/videos/5c54be17d8eafeecae139028' data-video-url='/boclips/videos/5c54be17d8eafeecae139028' id='bo_player_modal'\u003e\n\u003cdiv class='boclips-resource-page modal-dialog panel-container'\u003e\n\u003cdiv class='react-notifications-root'\u003e\u003c/div\u003e\n\u003cdiv class='rp-header'\u003e\n\u003cdiv class='rp-type'\u003e\n\u003ci aria-hidden='true' class='fai fa-regular fa-circle-play'\u003e\u003c/i\u003e\nVideo\n\u003c/div\u003e\n\u003ch1 class='rp-title' id='video-title'\u003e\nInvestigation into how military plans can be accessed on-line\n\u003c/h1\u003e\n\u003cdiv class='rp-actions'\u003e\n\u003cdiv class='mr-1'\u003e\n\u003ca class=\"btn btn-success\" data-posthog-event=\"Signup: LP Signup Activity\" data-posthog-location=\"body_link_boclips\" data-remote=\"true\" href=\"/subscription/new\"\u003e\u003cspan\u003e\u003cspan\u003eGet Free Access\u003c/span\u003e\u003cspan class=\"\"\u003e for 10 Days\u003c/span\u003e\u003cspan\u003e!\u003c/span\u003e\u003c/span\u003e\u003c/a\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-body'\u003e\n\u003cdiv class='rp-info'\u003e\n\u003cdiv aria-label='Hide resource details' class='rp-hide-info' role='button' tabindex='0'\u003e\u0026times;\u003c/div\u003e\n\u003ci aria-label='Expand resource details' class='rp-expand-info fai fa-solid fa-up-right-and-down-left-from-center' role='button' tabindex='0'\u003e\u003c/i\u003e\n\u003ci aria-label='Compress resource details' class='rp-compress-info fai fa-solid fa-down-left-and-up-right-to-center' role='button' tabindex='0'\u003e\u003c/i\u003e\n\u003cdiv class='rp-rating'\u003e\n\u003cspan class='resource-pool'\u003e\n\u003cspan class='pool-label'\u003ePublisher:\u003c/span\u003e\n\u003cspan class='pool-name'\u003e\n\u003cspan class='text'\u003e\u003ca data-publisher-id=\"30356011\" href=\"/search?publisher_ids%5B%5D=30356011\"\u003eCurated Video\u003c/a\u003e\u003c/span\u003e\n\u003c/span\u003e\n\u003c/span\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-description'\u003e\n\u003cspan class='short-description'\u003eFILE - Bagram Air Base, Afghanistan, Date unknown1. Helicopters on the runway at Bagram Air Base2. Helicopter flying away Graphic - Unnamed US facility, unnamed location3. Three graphics of schematics of a military detainee holding...\u003c/span\u003e\n\u003cspan class='full-description hide'\u003eFILE - Bagram Air Base, Afghanistan, Date unknown\u003cbr/\u003e1. Helicopters on the runway at Bagram Air Base\u003cbr/\u003e2. Helicopter flying away \u003cbr/\u003eGraphic - Unnamed US facility, unnamed location\u003cbr/\u003e3. Three graphics of schematics of a military detainee holding facility\u003cbr/\u003eFILE - Unnamed location, Unknown date\u003cbr/\u003e4. Wide shot of a US military facility \u003cbr/\u003e5. Medium shot of a US military facility\u003cbr/\u003e6. Detainees walking at a US facility\u003cbr/\u003e7. US troops talking to detainees\u003cbr/\u003eArlington, Virginia - 6 June 2007\u003cbr/\u003e8. Walking shot of Vice President Lexington Institute Dr. Daniel Goure \u003cbr/\u003e9. SOUNDBITE: (English) Dr. Daniel Goure, Vice President of Lexington Institute: \u003cbr/\u003e\"It's hard to imagine that someone in a cave in Wajiristan, or a bomb builder in Baghdad in a garage in Baghdad spending his or her time surfing the internet or surfing US web sites to get something which frankly, if it is the layout of a base in either of those country, you can get with a pair of binoculars, so it is a little hard to see them doing that.  It is not hard to see other potential adversaries or criminal groups surfing these same sites pulling out some of this data that they can either sell or they can use for malicious purposes.  The higher up you go in the food chain from terrorist, to criminal group, to the smaller nations, to the big very sophisticated nations, the more likely it is that they can \"A\" do it and \"B\" will find things that are useful.\" \u003cbr/\u003eBagram Air Base, Afghanistan - 27 February 2007\u003cbr/\u003e10. Various of  site where a suicide bomber blew himself up in front Bagram Air Base when Vice President Dick Cheney was inside\u003cbr/\u003e11. Medium shot of Vice President Cheney with the president of Afghanistan, Hamid Karzai\u003cbr/\u003eFILE - Unknown date\u003cbr/\u003e12. US Army Cops of Engineers graphic with computer typing in the back ground\u003cbr/\u003eGreensboro - North Carolina, 27 June, 2007 \u003cbr/\u003e13. Wide of Chris Freeman, a civilian who has been trying to show that FTP sites need to be protected, at his computer\u003cbr/\u003e14. Medium of Freeman at his computer\u003cbr/\u003e15. Close up of Freeman's hand moving the mouse\u003cbr/\u003e16. SOUNDBITE: (English) Chris Freeman, civil servant and computer user:\u003cbr/\u003e\"That one incident (seeing a file at his work download from an IP address in Iran) got me asking the question, who else is looking, what else is out there.\"\u003cbr/\u003e17. Close up of Freeman's computer modem\u003cbr/\u003e18. Close up of Freeman's computer screen\u003cbr/\u003e19. Close up of Freeman's computer screen with a password window on it\u003cbr/\u003e20. SOUNDBITE: (English) Chris Freeman, civil servant and computer user: \u003cbr/\u003e\" Any average Joe (normal citizen) could do this. If you have ever gone to a web page and if you have ever had to go to an FTP site for whatever reason, you could do this.\"\u003cbr/\u003eWashington DC - 28 June, 2007\u003cbr/\u003e21. Wide of a computer screen with Los Alamos National Laboratory's web site on it\u003cbr/\u003e22. Medium shot of computer screen with Los Alamos National Laboratory's web site on it\u003cbr/\u003e23. Close up of files from an insecure FTP server scrolling across the screen\u003cbr/\u003e***** Los Alamos has now secured their FTP site ****************\u003cbr/\u003eFILE - Unknown Date and Location\u003cbr/\u003e24. Wide shot of US troops\u003cbr/\u003e25. Medium shot of US troops\u003cbr/\u003eWashington DC - 11 July 2007 \u003cbr/\u003e26. Wide shot of US National Counter-intelligence Executive, Dr. Joel Brenner\u003cbr/\u003e27. SOUNDBITE: (English) Dr. Joel Brenner, National Counterintelligence Executive and Mission Manager for Counter-intelligence: \u003cbr/\u003e\"The only way you an really eliminate risk is take all the information you've got and lock it up and not use it. You can eliminate risk that way and you can eliminate everything else too. We know that as we go about our business there are going to be mistakes made and information lost.  The idea is to manage our business in a way that we minimise that risk.\"\u003cbr/\u003eGreensboro, North Carolina- 27 June 2007\u003cbr/\u003e28. Close up of a computer modem\u003cbr/\u003e29. Close up of hands on a keyboard\u003cbr/\u003e30. Chris Freeman at his computer\u003cbr/\u003e31. Close up of Freeman's eyes\u003cbr/\u003eSensitive US government information and strategic documents that could eventually pose a threat to US troops have been available on the Web for anyone with an Internet connection to download, an AP Television report reveals.\u003cbr/\u003eWith a simple click of a mouse an Internet user could get hold of plans for a new fuel farm at Bagram Air Base in Afghanistan, detailed schematics of a military detainee holding facility in Iraq or geographical surveys and aerial photographs of two military airfields outside Baghdad. \u003cbr/\u003eThe military calls these documents \"need-to-know\" information, so sensitive it refused to release the documents when asked.\u003cbr/\u003eBut it was already out there, posted carelessly to file servers by government agencies and contractors, accessible by anyone with an Internet connection. \u003cbr/\u003eSuch material goes online all the time, posted often by mistake.  \u003cbr/\u003eIt is not in plain site, unlike the plans for the new American embassy in Baghdad that appeared recently on the Web site of an architectural firm, but is almost as easy to find.\u003cbr/\u003eOne military intelligence expert said foreign intelligence agencies and terrorists alike know where to look.\u003cbr/\u003e\"The higher up you go in the food chain from terrorists, to criminal groups, to the smaller nations, to the big very sophisticated nations, the more likely it is that they can \"A\" do it and \"B\" will find things that are useful,\" said Daniel Goure of the Lexington Institute.\"\u003cbr/\u003eIn one case, the Army Corps of Engineers asked the Associated Press to promptly dispose of several documents found on a contractor's server.\u003cbr/\u003eThe documents detailed a project to expand the fuel infrastructure at Bagram Air Force Base in Afghanistan, the base where earlier this year a suicide bomber blew himself up outside, while Vice President Dick Cheney was inside the base.\u003cbr/\u003eThe documents include a map of the entry point to be used by fuel trucks and the location of pump houses and fuel tanks. \u003cbr/\u003eThe Corps of Engineers then changed its policies for storing material online following the Associated Press's inquiry.\u003cbr/\u003eBut a week later, AP Television downloaded a new document directly from the agency's own server.\u003cbr/\u003eThe 61 pages of photos, graphics and charts map out the security features at Tallil Air Base, in south eastern Iraq.\u003cbr/\u003eThe documents depict proposed upgrades to the facility's perimeter fencing.\u003cbr/\u003eAP Television has destroyed the documents it downloaded, and all the material cited in the in this story is no longer available online on the sites surveyed.\u003cbr/\u003eThe posting of private material on publicly available FTP servers is a familiar problem to security experts hired by companies to secure sites and police the actions of employees who aren't always technically aware. \u003cbr/\u003eThey said files that never should appear online are often left unprotected by inexperienced or careless users who don't know better.\u003cbr/\u003eFile Transfer Protocol, or FTP, is a relatively old technology that makes files available on the Internet. \u003cbr/\u003eIt remains popular for its simplicity, efficiency and low cost. \u003cbr/\u003eIn fact, several agencies and contractors said the documents found by the AP were posted online so they could be easily shared among colleagues.\u003cbr/\u003eInternet users can't scour the sites with a typical search engine, but FTP servers routinely share a similar address as public Web sites.\u003cbr/\u003eA spokeswoman for the U.S. Central Command, which oversees the war in Iraq, declined to say if material accidentally left on the Internet had led to a physical breach of security.\u003cbr/\u003eBut among the documents the AP found were aerial photographs and detailed schematics of Camp Bucca, a U.S.-run facility for detainees in Iraq.\u003cbr/\u003eOne of the documents was password protected, but the password was printed in an unsecured document stored on the same server. \u003cbr/\u003eThey showed where U.S. forces keep prisoners and fuel tanks, as well as the locations of security fences, guard towers and other security measures.\u003cbr/\u003eThe information about Camp Bucca, Bagram Air Base and Contingency Operating Base Speicher was found on the FTP server of CH2M Hill Companies Ltd., an engineering, consulting and construction company based in Englewood, Colo.\u003cbr/\u003eBut the company added a password protection to its FTP site after AP's inquiry and referred the direct request for the documents to the government.\u003cbr/\u003eOther files found by the AP didn't appear to pose an immediate threat to troop security, but illustrated advanced military technologies. \u003cbr/\u003eThe National Geospatial-Intelligence Agency posted PowerPoint presentations outlining military GPS systems, including plans to combat GPS jammers. \u003cbr/\u003eFiles from Los Alamos National Laboratory give an early look at a developing technology to combat enemy snipers in urban environments, including one file describing the levels of security behind the new program.\u003cbr/\u003eDean Carver, a counterintelligence officer with the federal Office of the National Counterintelligence Executive, part of the Office of the Director of National Intelligence, said at a recent security conference that such trade secrets - even those dealing with a basic technology - are often a common target for foreign espionage because they can be used to advance a country's own military technology.\u003cbr/\u003eUS citizen and computer user Christopher Freeman believes he may have witnessed someone hunting for secrets on FTP servers. \u003cbr/\u003eFreeman describes himself as \"just a slightly above-average computer user,\" not a programmer or a hacker.\u003cbr/\u003eWhile working on an internal security review at his job with the city of Greensboro, North Carolina., he watched as a computer with an electronic address from Tehran accessed the city's server and downloaded a file that contained design drawings for the area's water infrastructure.\u003cbr/\u003eWhile there's no way to know if there was malicious intent behind the download, Freeman said, \"when you think of Iran, you think of all the bad stuff first.\"\u003cbr/\u003eFreeman passed along his findings to the FBI and the Department of Defence, and later aided investigators in securing the Space and Naval Warfare Systems Command site. \u003cbr/\u003eAfter getting calls from a contractor and the Army Materiel Command asking about what he found online, Freeman has sought legal representation from Denner Pellegrino, a Boston-based firm that specialises in cyber crime.\u003cbr/\u003eDr. Joel Brenner, the U.S. National Counterintelligence Executive said of information lost due to hackers and cyber attacks, \"we know that as we go about our business there are going to be mistakes made and information lost.  The idea is to manage our business in a way that we minimise that risk.\"\u003cbr/\u003e\u003c/span\u003e\n\u003c/div\u003e\n\u003cdiv class='action-container flex justify-between'\u003e\n\u003cbutton aria-expanded='false' aria-label='Read more description' class='rp-full-description' type='button'\u003e\n\u003ci class='fai fa-solid fa-align-left'\u003e\u003c/i\u003e\n\u003cspan id='read_more'\u003eRead More\u003c/span\u003e\n\u003c/button\u003e\n\u003cdiv class='rp-report'\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='resource-details-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='resource-details-heading'\u003eResource Details\u003c/h2\u003e\n\u003cdiv class='rp-resource-details clearfix'\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eCurator Rating\u003c/dt\u003e\n\u003cdd\u003e\u003cspan class=\"star-rating\" aria-label=\"3.5 out of 5 stars\" role=\"img\"\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star-half-stroke text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-regular fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt class=\"educator-rating-title\"\u003eEducator Rating\u003c/dt\u003e\u003cdd\u003e\u003cdiv class=\"educator-rating-details\" data-path=\"/educator_ratings/rrp_data?resourceable_id=752907\u0026amp;resourceable_type=Boclips%3A%3AVideoMetadata\"\u003e\u003cspan class=\"not-yet-rated\"\u003eNot yet Rated\u003c/span\u003e\u003c/div\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eGrade\u003c/dt\u003e\u003cdd title=\"Grade\"\u003eHigher Ed\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eSubjects\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?grade_ids%5B%5D=259\u0026amp;search_tab_id=1\u0026amp;subject_ids%5B%5D=1216220\"\u003eAll Subjects\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eMedia Type\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?grade_ids%5B%5D=259\u0026amp;search_tab_id=2\u0026amp;type_ids%5B%5D=4543650\"\u003eNews Clips\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eSource:\u003c/dt\u003e\n\u003cdd\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eDate\u003c/dt\u003e\n\u003cdd\u003e2007\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003ci aria-hidden='true' class='fai fa-solid fa-language'\u003e\u003c/i\u003e\n\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eAudiences\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?audience_ids%5B%5D=371079\u0026amp;grade_ids%5B%5D=259\u0026amp;search_tab_id=1\"\u003eFor Teacher Use\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\u003cdd class=\"text-muted\"\u003e\u003ci class=\"fa-solid fa-lock mr5\"\u003e\u003c/i\u003e2 more...\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='concepts-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='concepts-heading'\u003eConcepts\u003c/h2\u003e\n\u003cdiv class='clearfix'\u003e\n\u003cdiv class='details-list concepts' data-identifier='Boclips::VideoDecorator' data-type='concepts'\u003enorth carolina, iraq, terrorism, defense, business, computer hardware, surfing, afghanistan, crime, north america, asia\u003c/div\u003e\n\u003cdiv class='concepts-toggle-buttons' data-identifier='Boclips::VideoDecorator'\u003e\n\u003cbutton aria-expanded='false' class='more btn-link' type='button'\u003e\n\u003cspan\u003eShow More\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-down ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003cbutton aria-expanded='true' class='less btn-link' style='display: none;' type='button'\u003e\n\u003cspan\u003eShow Less\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-up ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='additional-tags-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='additional-tags-heading'\u003eAdditional Tags\u003c/h2\u003e\n\u003cdiv class='clearfix'\u003e\n\u003cdiv class='details-list keyterms' data-identifier='Boclips::VideoDecorator' data-type='keyterms'\u003etechnology issues, information, general news, central asia, middle east, computer hacking, criminal groups, industrial products and services, u.s. army, criminal investigations, consumer product technologies, server systems, war and unrest, civil service, sites, military facilities, hacking, united states military, hard, military technology, intelligence agencies, eliminate, military legal affairs, construction and engineering, law and order, industries, government and politics, united states, united states government, lexington, military affairs, computer and data security, file servers, baghdad, eliminate risk, greensboro, u.s. army corps of engineers, richard cheney, army, information technologies, armed forces, information and communication technologies, risk, hamid karzai\u003c/div\u003e\n\u003cdiv class='keyterms-toggle-buttons' data-identifier='Boclips::VideoDecorator'\u003e\n\u003cbutton aria-expanded='false' class='more btn-link' type='button'\u003e\n\u003cspan\u003eShow More\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-down ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003cbutton aria-expanded='true' class='less btn-link' style='display: none;' type='button'\u003e\n\u003cspan\u003eShow Less\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-up ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='educator-ratings-heading' class='rp-info-section'\u003e\n\u003ch2 class='title sr-only' id='educator-ratings-heading'\u003eEducator Ratings\u003c/h2\u003e\n\u003cdiv id=\"educator-ratings-root\"\u003e\u003c/div\u003e\u003cdiv id=\"all-educator-ratings-root\"\u003e\u003c/div\u003e\u003cdiv id=\"educator-rating-form-root\"\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-resource'\u003e\n\u003cdiv aria-label='Show resource details' class='rp-show-info' role='button' tabindex='0'\u003e\n\u003ci class='fai fa-solid fa-align-left'\u003e\u003c/i\u003e\nShow resource details\n\u003c/div\u003e\n\u003cdiv aria-label='Video player' class='player' id='player-wrapper' role='region'\u003e\n\u003cdiv class='relative container mx-auto' id='lp-boclips-visitor-thumbnail'\u003e\n\u003ca class=\"block\" data-html=\"true\" data-placement=\"bottom\" data-trigger=\"click\" data-content=\"\u003cdiv class=\u0026quot;text-center py-2\u0026quot;\u003e\u003ca class=\u0026quot;bold\u0026quot; href=\u0026quot;/auth/users/sign_in\u0026quot;\u003eSign in\u003c/a\u003e or \u003ca class=\u0026quot;bold text-danger\u0026quot; data-posthog-event=\u0026quot;Signup: LP Signup Activity\u0026quot; data-posthog-location=\u0026quot;body_link_boclips\u0026quot; data-remote=\u0026quot;true\u0026quot; href=\u0026quot;/subscription/new\u0026quot;\u003eJoin Now\u003c/a\u003e\u003c/div\u003e\" data-title=\"Get Full Access\" data-container=\"body\" rel=\"popover\" tabindex=\"0\" aria-label=\"Play video: Investigation into how military plans can be accessed on-line\" href=\"/subscription/new\"\u003e\u003cimg class=\"resource-img img-thumbnail img-responsive z-10 lp-boclips-thumbnail w-full h-full lozad\" alt=\"Investigation into how military plans can be accessed on-line\" title=\"Investigation into how military plans can be accessed on-line\" onError=\"handleImageNotLoadedError(this)\" data-default-image=\"https://static.lp.lexp.cloud/images/attachment_defaults/resource/large/missing.png\" data-src=\"https://static.lp.lexp.cloud/images/attachment_defaults/resource/large/missing.png\" width=\"315\" height=\"220\" src=\"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs\" /\u003e\n\u003cspan aria-hidden='true' class='flex justify-center items-center bg-white rounded-full w-16 h-16 absolute top-1/2 left-1/2 -mt-8 -ml-8 cursor-pointer z-0 border-2 border-primary drop-shadow-md lp-boclips-thumbnail-playBtn'\u003e\n\u003ci class='fa-solid fa-play text-primary text-3xl ml-1 drop-shadow-xl'\u003e\u003c/i\u003e\n\u003c/span\u003e\n\u003c/a\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n"}