{"id":3122,"date":"2021-09-12T08:53:34","date_gmt":"2021-09-12T08:53:34","guid":{"rendered":"https:\/\/stratign.com\/website\/?page_id=3122"},"modified":"2024-03-05T09:27:13","modified_gmt":"2024-03-05T05:27:13","slug":"hybrid-cellphone-interception-system","status":"publish","type":"page","link":"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/","title":{"rendered":"SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_spacer size=&#8221;xs:20;sm:40;lg:80&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]SYST\u00c8MES HYBRIDES D&#8217;INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES[\/tm_heading][tm_spacer size=&#8221;xs:20;sm:30;lg:60&#8243;][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;padding_bottom:100&#8243; lg_spacing=&#8221;padding_bottom:5&#8243;][vc_column offset=&#8221;vc_col-md-5&#8243;][tm_heading style=&#8221;left-line&#8221; custom_google_font=&#8221;&#8221; font_weight=&#8221;800&#8243; font_size=&#8221;sm:18;md:21;lg:24&#8243; line_height=&#8221;1.67&#8243; max_width=&#8221;400px&#8221;]La solution de surveillance cellulaire hybride est une combinaison de syst\u00e8mes d&#8217;interception passifs et semi-actifs pr\u00e9sentant les caract\u00e9ristiques des deux.[\/tm_heading][\/vc_column][vc_column offset=&#8221;vc_col-md-7 vc_hidden-xs&#8221;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]La solution d&#8217;interception cellulaire aide les autorit\u00e9s charg\u00e9es de l&#8217;application de la loi \u00e0 acqu\u00e9rir, analyser et g\u00e9rer les communications cellulaires intercept\u00e9es, qu&#8217;il s&#8217;agisse de voix ou de donn\u00e9es. Cela est d&#8217;autant plus important que les terroristes et les criminels s&#8217;appuient sur les communications mobiles cellulaires pour mener \u00e0 bien leurs op\u00e9rations malveillantes.[\/tm_heading][tm_spacer size=&#8221;xs:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]La solution hybride de surveillance cellulaire est une combinaison de la solution passive et de certaines caract\u00e9ristiques de la solution de surveillance[\/tm_heading][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;margin_top:-90&#8243; xs_spacing=&#8221;margin_top:-90&#8243;][vc_column offset=&#8221;vc_hidden-xs&#8221;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]combination of Passive Solution &amp; certain features of Semi-Active Cellular Monitoring Solution. The basic functioning of the system is like the passive system; so, the presence of the system cannot be detected during normal operations. The system is turned into an active one only when required. The active functions present in the system include obtaining the PLMN (actual mobile no.) of the target. The hybrid system also allows the operator to carryout spoofing, selective jamming or selective denial of services as done in the semi-active interception solution.[\/tm_heading][tm_spacer size=&#8221;sm:20;lg:20&#8243;][tm_spacer size=&#8221;sm:20;lg:20&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704863815934{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques du syst\u00e8me[\/tm_heading][tm_spacer size=&#8221;lg:40&#8243;][tm_list list_style=&#8221;check-02&#8243; marker_color=&#8221;secondary&#8221; title_color=&#8221;primary&#8221; columns=&#8221;xs:1;lg:2&#8243; items=&#8221;%5B%7B%22item_title%22%3A%22Syst%C3%A8me%20100%25%20passif%22%2C%22item_desc%22%3A%22Syst%C3%A8me%20100%25%20passif%20(en%20mode%20passif)%2C%20la%20pr%C3%A9sence%20du%20syst%C3%A8me%20ne%20peut%20%C3%AAtre%20d%C3%A9tect%C3%A9e%20par%20personne.%22%7D%2C%7B%22item_title%22%3A%22Surveillance%20des%20r%C3%A9seaux%20cellulaires%202G%2C%203G%2C%204G%20et%205G%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Capable%20de%20surveiller%20les%20r%C3%A9seaux%20cellulaires%202G%2C%203G%2C%204G%20et%205G.%22%7D%2C%7B%22item_title%22%3A%22Interception%20de%20la%20voix%20et%20des%20SMS%22%2C%22item_desc%22%3A%22Capable%20d&#8217;intercepter%20les%20communications%20vocales%20et%20SMS.%22%7D%2C%7B%22item_title%22%3A%22D%C3%A9chiffrement%20passif%20en%20temps%20r%C3%A9el%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22D%C3%A9chiffrement%20passif%20en%20temps%20r%C3%A9el%20de%20A5%2F1%2C%20A5%2F2%2C%20A5%2F0.%22%7D%2C%7B%22item_title%22%3A%22Taux%20de%20surveillance%20des%20appels%20de%20la%20cible%20de%20100%25%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20surveiller%20toutes%20les%20communications%20de%20la%20cible%20(SMS%20et%20voix)%20jusqu&#8217;%C3%A0%20ce%20qu&#8217;elle%20se%20trouve%20dans%20sa%20zone%20de%20couverture.%22%7D%2C%7B%22item_title%22%3A%22Pas%20d&#8217;assistance%20de%20la%20part%20du%20prestataire%20de%20services%22%2C%22item_desc%22%3A%22Contrairement%20%C3%A0%20d&#8217;autres%20syst%C3%A8mes%2C%20le%20syst%C3%A8me%20n&#8217;a%20pas%20besoin%20de%20la%20carte%20SIM%20du%20fournisseur%20de%20services%20pour%20fonctionner.%22%7D%2C%7B%22item_title%22%3A%22Syst%C3%A8me%20de%20radiomessagerie%20automatique%22%2C%22item_desc%22%3A%22Syst%C3%A8me%20de%20radiomessagerie%20automatique%20int%C3%A9gr%C3%A9%20pour%20v%C3%A9rifier%20la%20pr%C3%A9sence%20de%20la%20cible.%22%7D%2C%7B%22item_title%22%3A%22Manipulation%20%2F%20Usurpation%20d&#8217;identit%C3%A9%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20permet%20%C3%A0%20l&#8217;op%C3%A9rateur%20de%20passer%20un%20appel%20(ou%20d&#8217;envoyer%20un%20SMS)%20en%20utilisant%20l&#8217;identit%C3%A9%20de%20la%20personne%20cibl%C3%A9e.%22%7D%2C%7B%22item_title%22%3A%22D%C3%A9tection%20automatique%20des%20num%C3%A9ros%20publics%20(PN)%22%2C%22item_desc%22%3A%22D%C3%A9tection%20automatique%20des%20num%C3%A9ros%20publics%20(PN)%20pour%20les%20combin%C3%A9s%20enregistr%C3%A9s.%22%7D%2C%7B%22item_title%22%3A%22Codecs%20vocaux%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20prendre%20en%20charge%20les%20codecs%20vocaux%20FR%2C%20EFR%2C%20HR%20et%20AMR.%22%7D%2C%7B%22item_title%22%3A%22S%C3%A9lection%20des%20cibles%22%2C%22item_desc%22%3A%22S%C3%A9lection%20des%20cibles%20en%20fonction%20de%20diff%C3%A9rents%20param%C3%A8tres%20tels%20que%20l&#8217;IMEI%2C%20l&#8217;IMSI%2C%20le%20TMSI%2C%20la%20distance%20de%20la%20cible%20par%20rapport%20%C3%A0%20la%20station%20de%20base%2C%20le%20type%20de%20combin%C3%A9%20de%20la%20cible%2C%20le%20num%C3%A9ro%20compos%C3%A9%20et%20re%C3%A7u%20de%20la%20cible%20(PLMN).%22%7D%2C%7B%22item_title%22%3A%22Stockage%22%2C%22item_desc%22%3A%22Toutes%20les%20conversations%20enregistr%C3%A9es%20sur%20les%20t%C3%A9l%C3%A9phones%20portables%2C%20les%20informations%20relatives%20aux%20appels%20et%20les%20informations%20sur%20le%20r%C3%A9seau%20sont%20stock%C3%A9es%20sur%20le%20disque%20dur%20de%20l&#8217;ordinateur%20de%20traitement.%22%7D%2C%7B%22item_title%22%3A%22Brouillage%20s%C3%A9lectif%22%2C%22item_desc%22%3A%22Peut%20%C3%A9galement%20%C3%AAtre%20utilis%C3%A9%20pour%20le%20brouillage%20s%C3%A9lectif.%22%7D%2C%7B%22item_title%22%3A%22Interception%20duplex%22%2C%22item_desc%22%3A%22Surveillance%20des%20canaux%20avant%20et%20arri%C3%A8re%20(conversation%20duplex).%22%7D%2C%7B%22item_title%22%3A%22Localisation%20de%20l&#8217;abonn%C3%A9%22%2C%22item_desc%22%3A%22Recherche%20de%20la%20position%20de%20l&#8217;abonn%C3%A9%20par%20rapport%20%C3%A0%20la%20station%20de%20base%20(LAC%2C%20BS%2C%20secteur%2C%20distance)%20avec%20possibilit%C3%A9%20d&#8217;indication%20sur%20la%20carte%20num%C3%A9rique%20(optionnel).%22%7D%2C%7B%22item_title%22%3A%22Localisation%20de%20la%20position%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20%C3%AAtre%20utilis%C3%A9%20conjointement%20avec%20le%20radiogoniom%C3%A8tre%20pour%20localiser%20la%20position%20de%20la%20cible.%22%7D%2C%7B%22item_title%22%3A%22Traitement%20automatique%20des%20signaux%20de%20saut%20de%20fr%C3%A9quence%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20g%C3%A8re%20automatiquement%20les%20sauts%20de%20fr%C3%A9quence%20et%20les%20transferts.%22%7D%2C%7B%22item_title%22%3A%22Fonctionnement%2024%20heures%20sur%2024%22%2C%22item_desc%22%3A%22Possibilit%C3%A9%20de%20fonctionnement%2024%20heures%20sur%2024%20en%20mode%20automatique%20sans%20intervention%20de%20l&#8217;op%C3%A9rateur.%22%7D%2C%7B%22item_title%22%3A%22Analyse%20du%20r%C3%A9seau%22%2C%22item_desc%22%3A%22Analyse%20des%20param%C3%A8tres%20du%20r%C3%A9seau%20GSM%20dans%20la%20zone%20contr%C3%B4l%C3%A9e%20(fournisseur%20de%20services%2C%20num%C3%A9ro%20de%20canal%20de%20diffusion%2C%20LAC%2C%20ID%20de%20cellule%20et%20niveaux%20de%20signal).%22%7D%2C%7B%22item_title%22%3A%22Logiciel%20de%20Renseignement%20d&#8217;origine%20sources%20ouvertes%20(ROSO)%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20%C3%AAtre%20int%C3%A9gr%C3%A9%20au%20logiciel%20de%20Renseignement%20d&#8217;origine%20sources%20ouvertes%20de%20Stratign.%22%7D%5D&#8221; custom_css=&#8221;LnRtLWxpc3Quc3R5bGUtY2hlY2stMDIlMjAuZGVzYyUyMCU3QiUwQSUyMCUyMCUyMCUyMG1hcmdpbi10b3AlM0ElMjAxMHB4JTNCJTBBJTIwJTIwJTIwJTIwbWFyZ2luLWJvdHRvbSUzQSUyMDEwcHglM0IlMEElN0Q=&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;lg:10&#8243;][tm_list list_style=&#8221;check-02&#8243; marker_color=&#8221;secondary&#8221; title_color=&#8221;primary&#8221; columns=&#8221;xs:1;lg:1&#8243; items=&#8221;%5B%7B%22item_title%22%3A%22Forensique%20vocale%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20est%20int%C3%A9grable%20avec%20le%20logiciel%20forensique%20vocale%20de%20Stratign%20(identification%20de%20la%20langue%2C%20du%20locuteur%2C%20du%20sexe%2C%20etc.)%20et%20les%20outils%20d&#8217;analyse%20des%20liens.%22%7D%5D&#8221; custom_css=&#8221;LnRtLWxpc3Quc3R5bGUtY2hlY2stMDIlMjAuZGVzYyUyMCU3QiUwQSUyMCUyMCUyMCUyMG1hcmdpbi10b3AlM0ElMjAxMHB4JTNCJTBBJTIwJTIwJTIwJTIwbWFyZ2luLWJvdHRvbSUzQSUyMDEwcHglM0IlMEElN0Q=&#8221;][tm_spacer size=&#8221;xs:30;sm:60;lg:120&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; lg_spacing=&#8221;margin_bottom:10&#8243; md_spacing=&#8221;margin_bottom:10&#8243;][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; css=&#8221;.vc_custom_1702534293059{margin-top: 10px !important;}&#8221;]En savoir plus[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fcontact-us%2F|title:Nous%20contacter%20&#8243; el_id=&#8221;Contact-us-other&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221;]T\u00e9l\u00e9charger la brochure[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fbrochures%2F|title:T%C3%A9l%C3%A9charger&#8221; el_id=&#8221;Brochure-other&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Hybrid Cellular Monitoring Solution is a combination of Passive and Semi-Active Interception Systems with features of both.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3122","page","type-page","status-publish","hentry","post-no-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES - Stratign<\/title>\n<meta name=\"description\" content=\"La solution de surveillance cellulaire hybride est une combinaison de syst\u00e8mes passifs et semi-actifs, et ne peut donc pas \u00eatre d\u00e9tect\u00e9e pendant les op\u00e9rations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES - Stratign\" \/>\n<meta property=\"og:description\" content=\"La solution de surveillance cellulaire hybride est une combinaison de syst\u00e8mes passifs et semi-actifs, et ne peut donc pas \u00eatre d\u00e9tect\u00e9e pendant les op\u00e9rations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratign\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stratignfb\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T05:27:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@stratign\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hybrid-cellphone-interception-system\\\/\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hybrid-cellphone-interception-system\\\/\",\"name\":\"SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES - Stratign\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\"},\"datePublished\":\"2021-09-12T08:53:34+00:00\",\"dateModified\":\"2024-03-05T05:27:13+00:00\",\"description\":\"La solution de surveillance cellulaire hybride est une combinaison de syst\u00e8mes passifs et semi-actifs, et ne peut donc pas \u00eatre d\u00e9tect\u00e9e pendant les op\u00e9rations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hybrid-cellphone-interception-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hybrid-cellphone-interception-system\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/hybrid-cellphone-interception-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\",\"name\":\"Stratign\",\"description\":\"Military Defense Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES - Stratign","description":"La solution de surveillance cellulaire hybride est une combinaison de syst\u00e8mes passifs et semi-actifs, et ne peut donc pas \u00eatre d\u00e9tect\u00e9e pendant les op\u00e9rations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/","og_locale":"en_US","og_type":"article","og_title":"SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES - Stratign","og_description":"La solution de surveillance cellulaire hybride est une combinaison de syst\u00e8mes passifs et semi-actifs, et ne peut donc pas \u00eatre d\u00e9tect\u00e9e pendant les op\u00e9rations.","og_url":"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/","og_site_name":"Stratign","article_publisher":"https:\/\/www.facebook.com\/stratignfb\/","article_modified_time":"2024-03-05T05:27:13+00:00","twitter_card":"summary_large_image","twitter_site":"@stratign","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/","url":"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/","name":"SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES - Stratign","isPartOf":{"@id":"https:\/\/www.stratign.com\/fr\/#website"},"datePublished":"2021-09-12T08:53:34+00:00","dateModified":"2024-03-05T05:27:13+00:00","description":"La solution de surveillance cellulaire hybride est une combinaison de syst\u00e8mes passifs et semi-actifs, et ne peut donc pas \u00eatre d\u00e9tect\u00e9e pendant les op\u00e9rations.","breadcrumb":{"@id":"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratign.com\/fr\/hybrid-cellphone-interception-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratign.com\/fr\/"},{"@type":"ListItem","position":2,"name":"SYST\u00c8MES HYBRIDES D\u2019INTERCEPTION DES T\u00c9L\u00c9PHONES PORTABLES"}]},{"@type":"WebSite","@id":"https:\/\/www.stratign.com\/fr\/#website","url":"https:\/\/www.stratign.com\/fr\/","name":"Stratign","description":"Military Defense Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratign.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/comments?post=3122"}],"version-history":[{"count":7,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3122\/revisions"}],"predecessor-version":[{"id":15123,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3122\/revisions\/15123"}],"wp:attachment":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/media?parent=3122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}