{"id":3102,"date":"2021-09-12T07:23:52","date_gmt":"2021-09-12T07:23:52","guid":{"rendered":"https:\/\/stratign.com\/website\/?page_id=3102"},"modified":"2024-03-05T09:34:08","modified_gmt":"2024-03-05T05:34:08","slug":"semi-active-cellphone-interception-system","status":"publish","type":"page","link":"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/","title":{"rendered":"SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_spacer size=&#8221;xs:20;sm:40;lg:80&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]SYST\u00c8ME SEMI-ACTIF D&#8217;INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES[\/tm_heading][tm_spacer size=&#8221;xs:20;sm:30;lg:60&#8243;][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;padding_bottom:100&#8243; lg_spacing=&#8221;padding_bottom:15&#8243;][vc_column offset=&#8221;vc_col-md-5&#8243;][tm_heading style=&#8221;left-line&#8221; custom_google_font=&#8221;&#8221; font_weight=&#8221;800&#8243; font_size=&#8221;sm:18;md:21;lg:24&#8243; line_height=&#8221;1.67&#8243; max_width=&#8221;400px&#8221;]Le syst\u00e8me d\u2019interception de t\u00e9l\u00e9phone portable semi-actif \u00e9mule l\u2019attaque de l\u2019homme du milieu sur les r\u00e9seaux cellulaires pour l\u2019interception.[\/tm_heading][\/vc_column][vc_column offset=&#8221;vc_col-md-7&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Nos solutions d&#8217;interception cellulaire aident les autorit\u00e9s charg\u00e9es de l&#8217;application de la loi \u00e0 acqu\u00e9rir, intercepter, analyser et g\u00e9rer les communications cellulaires telles que la voix, les SMS et les donn\u00e9es relatives aux appels (CRI). Cela est d&#8217;autant plus important que les terroristes et les criminels s&#8217;appuient sur les communications mobiles cellulaires pour mener \u00e0 bien leurs op\u00e9rations subversives.[\/tm_heading][tm_spacer size=&#8221;xs:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243; css=&#8221;.vc_custom_1650608801771{padding-bottom: 5px !important;}&#8221;][\/tm_heading][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;margin_top:-90&#8243; xs_spacing=&#8221;margin_top:-90&#8243;][vc_column][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243; css=&#8221;.vc_custom_1704865422526{margin-top: -20px !important;}&#8221;]Notre solution d&#8217;interception cellulaire semi-active est con\u00e7ue pour intercepter les communications 2G, 3G et 4G entre la station de base (BTS) et le combin\u00e9 mobile (MS) en utilisant le principe de &#8220;l&#8217;homme du milieu&#8221;. Le syst\u00e8me \u00e9mule la station de base du fournisseur de services et force les mobiles situ\u00e9s dans la zone de couverture \u00e0 s&#8217;y connecter. Toutes les communications (voix et SMS) des mobiles connect\u00e9s au syst\u00e8me sont transmises au r\u00e9seau r\u00e9el via le syst\u00e8me et, au cours du processus, toutes les communications sont enregistr\u00e9es. Le syst\u00e8me peut intercepter les communications entrantes et sortantes. Il peut \u00e9galement proc\u00e9der \u00e0 un brouillage s\u00e9lectif des communications. Le syst\u00e8me peut d\u00e9chiffrer les normes de cryptage A5\/0, A5\/2, A5\/1 et A5\/3 en temps r\u00e9el.[\/tm_heading][tm_spacer size=&#8221;lg:50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704865438743{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques du syst\u00e8me[\/tm_heading][tm_spacer size=&#8221;lg:40&#8243;][tm_list list_style=&#8221;check-02&#8243; marker_color=&#8221;secondary&#8221; title_color=&#8221;primary&#8221; columns=&#8221;xs:1;lg:2&#8243; items=&#8221;%5B%7B%22item_title%22%3A%22Pas%20de%20soutien%20de%20la%20part%20du%20prestataire%20de%20services%22%2C%22item_desc%22%3A%22Interception%20et%20enregistrement%20de%20tous%20les%20r%C3%A9seaux%202G%2C%203G%20et%204G%20dans%20le%20monde%20entier%2C%20sans%20avoir%20besoin%20de%20la%20carte%20SIM%20d&#8217;un%20prestataire%20de%20services.%22%7D%2C%7B%22item_title%22%3A%22Probabilit%C3%A9%20d&#8217;interception%20de%20100%25%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20intercepter%20et%20surveiller%20toutes%20les%20communications%20de%20la%20cible%20(SMS%2C%20voix%2C%20CRI%2C%20localisation%2C%20etc.)%20jusqu&#8217;%C3%A0%20ce%20qu&#8217;elle%20se%20trouve%20dans%20la%20zone%20de%20couverture.%22%7D%2C%7B%22item_title%22%3A%22Interception%20en%20temps%20r%C3%A9el%22%2C%22item_desc%22%3A%22Interception%20en%20temps%20r%C3%A9el%20des%20communications%20GSM%20crypt%C3%A9es%20%C3%A0%20l&#8217;aide%20des%20algorithmes%20de%20chiffrement%20A5%2F1%2C%20A5%2F2%20et%20A5%2F3.%22%7D%2C%7B%22item_title%22%3A%22Ind%C3%A9tectable%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20est%20transparent%20pour%20la%20cible%20et%20le%20prestataire%20de%20services.%20%22%7D%2C%7B%22item_title%22%3A%22Conception%20modulaire%22%2C%22item_desc%22%3A%22La%20conception%20modulaire%20du%20syst%C3%A8me%20permet%20de%20le%20dimensionner%20selon%20les%20besoins%20du%20client.%22%7D%2C%7B%22item_title%22%3A%22Extraction%20du%20r%C3%A9seau%20mobile%20terrestre%20public%20(PLMN)%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20extraire%20le%20num%C3%A9ro%20de%20t%C3%A9l%C3%A9phone%20mobile%20actuel%20de%20la%20cible.%22%7D%2C%7B%22item_title%22%3A%22Manipulation%20%2F%20Usurpation%20d&#8217;identit%C3%A9%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20permet%20%C3%A0%20l&#8217;op%C3%A9rateur%20de%20modifier%20l&#8217;identit%C3%A9%20des%20cibles%20s%C3%A9lectionn%C3%A9es%20(spoofing)%20pour%20les%20appels%20entrants%20et%20sortants%2C%20de%20passer%20un%20faux%20appel%20(ou%20d&#8217;envoyer%20un%20faux%20SMS)%20%C3%A0%20la%20cible.%22%7D%2C%7B%22item_title%22%3A%22Capacit%C3%A9%20de%20brouillage%20s%C3%A9lectif%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20est%20dot%C3%A9%20d&#8217;une%20capacit%C3%A9%20de%20brouillage%20s%C3%A9lectif%2C%20gr%C3%A2ce%20%C3%A0%20laquelle%20l&#8217;op%C3%A9rateur%20peut%20d%C3%A9sactiver%20certains%20services%20de%20la%20cible%2C%20comme%20les%20appels%20sortants%2C%20les%20appels%20entrants%2C%20les%20SMS%2C%20les%20SS%2C%20etc.%22%7D%2C%7B%22item_title%22%3A%22Cibles%20illimit%C3%A9es%22%2C%22item_desc%22%3A%22Aucune%20limite%20quant%20au%20nombre%20de%20cibles%20pouvant%20%C3%AAtre%20ajout%C3%A9es%20%C3%A0%20la%20liste%20de%20cibles.%22%7D%2C%7B%22item_title%22%3A%22Liste%20de%20cibles%22%2C%22item_desc%22%3A%22La%20liste%20de%20cibles%20peut%20%C3%AAtre%20cr%C3%A9%C3%A9e%20%C3%A0%20partir%20de%20IMEI%2C%20IMSI%20ou%20du%20num%C3%A9ro%20de%20t%C3%A9l%C3%A9phone%20mobile%20de%20la%20cible.%22%7D%2C%7B%22item_title%22%3A%22Nombre%20de%20canaux%20configurable%22%2C%22item_desc%22%3A%22Surveillance%20en%20ligne%20jusqu&#8217;%C3%A0%2032%20canaux%20duplex%20(extensible).%22%7D%2C%7B%22item_title%22%3A%22%C3%89quipement%20de%20radiogoniom%C3%A9trie%22%2C%22item_desc%22%3A%22L&#8217;%C3%A9quipement%20de%20radiogoniom%C3%A9trie%20de%20Stratign%20peut%20%C3%AAtre%20int%C3%A9gr%C3%A9%20au%20syst%C3%A8me%20pour%20affiner%20les%20cibles.%22%7D%2C%7B%22item_title%22%3A%22%C3%89coute%20en%20temps%20r%C3%A9el%22%2C%22item_desc%22%3A%22%C3%89coute%20en%20temps%20r%C3%A9el%20des%20appels%20t%C3%A9l%C3%A9phoniques%20intercept%C3%A9s.%22%7D%2C%7B%22item_title%22%3A%22Fonctionnement%2024%20heures%20sur%2024%22%2C%22item_desc%22%3A%22Possibilit%C3%A9%20de%20fonctionner%2024%20heures%20sur%2024%20en%20mode%20automatique%20sans%20intervention%20de%20l&#8217;op%C3%A9rateur.%22%7D%2C%7B%22item_title%22%3A%22Radiomessagerie%20silencieuse%20automatique%20int%C3%A9gr%C3%A9e%22%2C%22item_desc%22%3A%22La%20radiomessagerie%20silencieuse%20automatique%20int%C3%A9gr%C3%A9e%20permet%20d&#8217;obtenir%20des%20informations%20sur%20la%20cible%2C%20telles%20que%20IMSI%2C%20TMSI%2C%20IMEI%2C%20etc.%22%7D%2C%7B%22item_title%22%3A%22Identification%20de%20mots-cl%C3%A9s%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20est%20capable%20de%20rep%C3%A9rer%20des%20mots-cl%C3%A9s%20dans%20les%20messages%20SMS%20re%C3%A7us%20ou%20dans%20les%20commentaires%20ins%C3%A9r%C3%A9s%20par%20les%20op%C3%A9rateurs.%22%7D%2C%7B%22item_title%22%3A%22Op%C3%A9ration%20en%20r%C3%A9seau%22%2C%22item_desc%22%3A%22Plusieurs%20syst%C3%A8mes%20peuvent%20%C3%AAtre%20configur%C3%A9s%20dans%20un%20environnement%20de%20r%C3%A9seau%20local%20(LAN)%20pour%20augmenter%20la%20couverture.%22%7D%2C%7B%22item_title%22%3A%22Fonction%20de%20recherche%20%C3%A9tendue%22%2C%22item_desc%22%3A%22La%20fonction%20de%20recherche%20%C3%A9tendue%20permet%20aux%20op%C3%A9rateurs%20d&#8217;effectuer%20des%20recherches%20sur%20la%20base%20de%20tous%20les%20param%C3%A8tres%20d&#8217;appel.%22%7D%2C%7B%22item_title%22%3A%22Forensique%20vocale%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20est%20int%C3%A9grable%20avec%20le%20logiciel%20forensique%20vocale%20de%20Stratign%20(identification%20de%20la%20langue%2C%20identification%20du%20locuteur%2C%20identification%20du%20sexe%2C%20etc.)%20et%20les%20outils%20d&#8217;analyse%20des%20liens.%22%7D%2C%7B%22item_title%22%3A%22Int%C3%A9gration%20de%20Renseignement%20d&#8217;Origine%20Sources%20Ouvertes%20(ROSO)%20%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20%C3%AAtre%20int%C3%A9gr%C3%A9%20au%20logiciel%20de%20Renseignement%20d&#8217;Origine%20Sources%20Ouvertes%20de%20Stratign.%22%7D%5D&#8221; custom_css=&#8221;LnRtLWxpc3Quc3R5bGUtY2hlY2stMDIlMjAuZGVzYyUyMCU3QiUwQSUyMCUyMCUyMCUyMG1hcmdpbi10b3AlM0ElMjAxMHB4JTNCJTBBJTIwJTIwJTIwJTIwbWFyZ2luLWJvdHRvbSUzQSUyMDEwcHglM0IlMEElN0Q=&#8221;][tm_spacer size=&#8221;xs:30;sm:60;lg:120&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; lg_spacing=&#8221;margin_bottom:10&#8243; md_spacing=&#8221;margin_bottom:10&#8243;][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; css=&#8221;.vc_custom_1702534293059{margin-top: 10px !important;}&#8221;]En savoir plus[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fcontact-us%2F|title:Nous%20contacter%20&#8243; el_id=&#8221;Contact-us-other&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221;]T\u00e9l\u00e9charger la brochure[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fbrochures%2F|title:T%C3%A9l%C3%A9charger&#8221; el_id=&#8221;Brochure-other&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Semi-Active Cellphone Interception System emulates the man-in-the-middle attack on cellular networks for interception.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3102","page","type-page","status-publish","hentry","post-no-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Semi-Active Cellphone Interception System - Stratign SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES<\/title>\n<meta name=\"description\" content=\"Le syst\u00e8me semi-actif d&#039;interception des t\u00e9l\u00e9phones portables intercepte les communications 2G \u00e0 4G entre le BTS et le combin\u00e9 en utilisant le principe de l&#039;homme du milieu.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Semi-Active Cellphone Interception System - Stratign SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES\" \/>\n<meta property=\"og:description\" content=\"Le syst\u00e8me semi-actif d&#039;interception des t\u00e9l\u00e9phones portables intercepte les communications 2G \u00e0 4G entre le BTS et le combin\u00e9 en utilisant le principe de l&#039;homme du milieu.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratign\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stratignfb\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T05:34:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@stratign\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/semi-active-cellphone-interception-system\\\/\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/semi-active-cellphone-interception-system\\\/\",\"name\":\"Semi-Active Cellphone Interception System - Stratign SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\"},\"datePublished\":\"2021-09-12T07:23:52+00:00\",\"dateModified\":\"2024-03-05T05:34:08+00:00\",\"description\":\"Le syst\u00e8me semi-actif d'interception des t\u00e9l\u00e9phones portables intercepte les communications 2G \u00e0 4G entre le BTS et le combin\u00e9 en utilisant le principe de l'homme du milieu.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/semi-active-cellphone-interception-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stratign.com\\\/fr\\\/semi-active-cellphone-interception-system\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/semi-active-cellphone-interception-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\",\"name\":\"Stratign\",\"description\":\"Military Defense Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Semi-Active Cellphone Interception System - Stratign SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES","description":"Le syst\u00e8me semi-actif d'interception des t\u00e9l\u00e9phones portables intercepte les communications 2G \u00e0 4G entre le BTS et le combin\u00e9 en utilisant le principe de l'homme du milieu.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/","og_locale":"en_US","og_type":"article","og_title":"Semi-Active Cellphone Interception System - Stratign SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES","og_description":"Le syst\u00e8me semi-actif d'interception des t\u00e9l\u00e9phones portables intercepte les communications 2G \u00e0 4G entre le BTS et le combin\u00e9 en utilisant le principe de l'homme du milieu.","og_url":"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/","og_site_name":"Stratign","article_publisher":"https:\/\/www.facebook.com\/stratignfb\/","article_modified_time":"2024-03-05T05:34:08+00:00","twitter_card":"summary_large_image","twitter_site":"@stratign","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/","url":"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/","name":"Semi-Active Cellphone Interception System - Stratign SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES","isPartOf":{"@id":"https:\/\/www.stratign.com\/fr\/#website"},"datePublished":"2021-09-12T07:23:52+00:00","dateModified":"2024-03-05T05:34:08+00:00","description":"Le syst\u00e8me semi-actif d'interception des t\u00e9l\u00e9phones portables intercepte les communications 2G \u00e0 4G entre le BTS et le combin\u00e9 en utilisant le principe de l'homme du milieu.","breadcrumb":{"@id":"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratign.com\/fr\/semi-active-cellphone-interception-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratign.com\/fr\/"},{"@type":"ListItem","position":2,"name":"SYST\u00c8ME SEMI-ACTIF D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES"}]},{"@type":"WebSite","@id":"https:\/\/www.stratign.com\/fr\/#website","url":"https:\/\/www.stratign.com\/fr\/","name":"Stratign","description":"Military Defense Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratign.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/comments?post=3102"}],"version-history":[{"count":8,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3102\/revisions"}],"predecessor-version":[{"id":15121,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3102\/revisions\/15121"}],"wp:attachment":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/media?parent=3102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}