{"id":3291,"date":"2021-09-22T08:08:14","date_gmt":"2021-09-22T08:08:14","guid":{"rendered":"https:\/\/stratign.com\/website\/?page_id=3291"},"modified":"2024-03-05T09:46:29","modified_gmt":"2024-03-05T05:46:29","slug":"isat-interception-system","status":"publish","type":"page","link":"https:\/\/www.stratign.com\/fr\/isat-interception-system\/","title":{"rendered":"SYST\u00c8ME D\u2019INTERCEPTION ISAT"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_spacer size=&#8221;xs:20;sm:40;lg:80&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]SYST\u00c8ME D&#8217;INTERCEPTION ISAT[\/tm_heading][tm_spacer size=&#8221;xs:20;sm:30;lg:60&#8243;][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;padding_bottom:100&#8243; lg_spacing=&#8221;padding_bottom:5&#8243;][vc_column offset=&#8221;vc_col-md-5&#8243;][tm_heading style=&#8221;left-line&#8221; custom_google_font=&#8221;&#8221; font_weight=&#8221;800&#8243; font_size=&#8221;sm:18;md:21;lg:24&#8243; line_height=&#8221;1.67&#8243; max_width=&#8221;400px&#8221;]Stratign propose deux types de solutions (tactique et strat\u00e9gique) pour l&#8217;interception des communications ISAT, similaires au syst\u00e8me d&#8217;interception Thuraya.[\/tm_heading][\/vc_column][vc_column offset=&#8221;vc_col-md-7 vc_hidden-xs&#8221;][tm_spacer size=&#8221;xs:10;sm:10&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Inmarsat plc. est une soci\u00e9t\u00e9 britannique de t\u00e9l\u00e9communications par satellite qui offre des services mobiles mondiaux. Elle fournit des services de t\u00e9l\u00e9phonie et de donn\u00e9es \u00e0 des utilisateurs du monde entier, via des terminaux portables ou mobiles qui communiquent avec des stations terrestres par l&#8217;interm\u00e9diaire de 14 satellites de t\u00e9l\u00e9communications g\u00e9ostationnaires.[\/tm_heading][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;margin_top:-90&#8243; xs_spacing=&#8221;margin_top:-90&#8243;][vc_column offset=&#8221;vc_hidden-xs&#8221;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Alors que la plupart des communications Isat sont intercept\u00e9es, la couverture g\u00e9ographique \u00e9tendue fournie par ce r\u00e9seau le rend plus populaire aupr\u00e8s des groupes subversifs et criminels situ\u00e9s dans des r\u00e9gions \u00e9loign\u00e9es ou de ceux qui souhaitent \u00e9viter l&#8217;interception des r\u00e9seaux fixes. Cette utilisation accrue du r\u00e9seau par des \u00e9l\u00e9ments antinationaux pour des activit\u00e9s subversives, en raison de sa couverture quasi mondiale, a n\u00e9cessit\u00e9 le d\u00e9veloppement d&#8217;un syst\u00e8me capable d&#8217;intercepter efficacement toutes les communications sur le r\u00e9seau ISAT.[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Stratign propose deux types de solutions pour l&#8217;interception des communications ISAT similaires au syst\u00e8me d&#8217;interception Thuraya.<br \/>\n1. Syst\u00e8me d&#8217;interception ISAT tactique<br \/>\n2. Syst\u00e8me d&#8217;interception ISAT strat\u00e9gique[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;lg:20&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_heading tag=&#8221;h5&#8243; custom_google_font=&#8221;&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:24;md:28;lg:30&#8243; line_height=&#8221;1.4&#8243;]1. Syst\u00e8me d&#8217;interception ISAT tactique[\/tm_heading][tm_spacer size=&#8221;lg:30&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Le syst\u00e8me d&#8217;interception tactique ISAT de Stratign est con\u00e7u pour intercepter le trafic t\u00e9l\u00e9phonique ISAT (voix et SMS) AceS, Isat Phone et ISAT PhonePro. Le syst\u00e8me fournit un appel duplex en interceptant \u00e0 la fois la liaison montante et la liaison descendante en bande L. Le syst\u00e8me d&#8217;interception tactique ISAT se compose de deux antennes directionnelles, l&#8217;une pour la liaison descendante (r\u00e9ception des signaux satellite) et l&#8217;autre pour la liaison montante (r\u00e9ception des signaux de liaison montante du t\u00e9l\u00e9phone ISAT vers le satellite).[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Le syst\u00e8me utilise une technologie de pointe pour la r\u00e9ception, la d\u00e9modulation et le d\u00e9codage des signaux ISAT. En raison de la restriction de la ligne de site, le syst\u00e8me fournit des appels duplex si la cible se trouve dans la ligne de site radio (RLOS) de 20 km (lorsque l&#8217;antenne de liaison montante est au-dessus du niveau du sol et maintient la condition RLOS). Dans des conditions non RLOS avec le combin\u00e9 ISAT, le syst\u00e8me ne pourra intercepter que les appels simplex (conversation entre le satellite et le t\u00e9l\u00e9phone ISAT).[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Outre le syst\u00e8me d&#8217;interception ISAT qui permet d&#8217;intercepter efficacement le trafic t\u00e9l\u00e9phonique ISAT, le syst\u00e8me d&#8217;interception Thuraya et le syst\u00e8me d&#8217;interception Iridium sont deux autres solutions robustes que Stratign propose dans le domaine de l&#8217;interception des communications.[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Le syst\u00e8me est totalement passif et n&#8217;interf\u00e8re pas avec les communications normales ; sa pr\u00e9sence ne peut donc pas \u00eatre d\u00e9tect\u00e9e. La robustesse et la portabilit\u00e9 du syst\u00e8me en font un outil id\u00e9al pour un d\u00e9ploiement rapide. L&#8217;interface graphique conviviale et la configuration simple du syst\u00e8me r\u00e9duisent consid\u00e9rablement le temps de formation n\u00e9cessaire \u00e0 l&#8217;op\u00e9rateur.[\/tm_heading][tm_spacer size=&#8221;lg:50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;sm:50;lg:50&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704961122722{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques du syst\u00e8me[\/tm_heading][tm_spacer size=&#8221;lg:40&#8243;][tm_list list_style=&#8221;check-02&#8243; marker_color=&#8221;secondary&#8221; title_color=&#8221;primary&#8221; columns=&#8221;xs:1;lg:2&#8243; items=&#8221;%5B%7B%22item_title%22%3A%22Interception%20de%20la%20bande%20L%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20est%20capable%20de%20surveiller%20les%20fr%C3%A9quences%20ascendantes%20et%20descendantes%20de%20la%20bande%20L.%22%7D%2C%7B%22item_title%22%3A%22D%C3%A9cryptage%20en%20temps%20r%C3%A9el%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20d%C3%A9crypte%20automatiquement%20les%20communications%20vocales%20et%20SMS%20en%20temps%20r%C3%A9el.%22%7D%2C%7B%22item_title%22%3A%22Surveillance%20des%20communications%20vocales%20et%20des%20SMS%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20surveille%20les%20communications%20vocales%20et%20SMS%20provenant%20d&#8217;AceS%2C%20d&#8217;Isat%20Phone%20et%20d&#8217;Isat%20Phone%20Pro.%22%7D%2C%7B%22item_title%22%3A%22Canaux%20avant%20et%20arri%C3%A8re%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20surveille%20simultan%C3%A9ment%20les%20canaux%20avant%20et%20arri%C3%A8re%22%7D%2C%7B%22item_title%22%3A%22Architecture%20modulaire%22%2C%22item_desc%22%3A%22L&#8217;architecture%20modulaire%20du%20syst%C3%A8me%20permet%20une%20extension%20ult%C3%A9rieure%20du%20syst%C3%A8me.%22%7D%2C%7B%22item_title%22%3A%22Param%C3%A8tres%20d&#8217;identit%C3%A9%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20conserve%20l&#8217;enregistrement%20interne%20des%20donn%C3%A9es%20d&#8217;appel%20pour%20chaque%20communication%20avec%20tous%20les%20param%C3%A8tres%20d&#8217;identit%C3%A9%20qui%20peuvent%20%C3%AAtre%20intercept%C3%A9s%20pour%20chaque%20appel.%22%7D%2C%7B%22item_title%22%3A%22Base%20de%20donn%C3%A9es%20consultable%22%2C%22item_desc%22%3A%22Les%20conversations%20enregistr%C3%A9es%20peuvent%20%C3%AAtre%20recherch%C3%A9es%20dans%20la%20base%20de%20donn%C3%A9es%20en%20fonction%20des%20param%C3%A8tres%20d%E2%80%99identit%C3%A9%20des%20appels%20intercept%C3%A9s.%22%7D%2C%7B%22item_title%22%3A%22R%C3%A9sum%C3%A9%20de%20l&#8217;appel%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20dispose%20d&#8217;un%20champ%20unique%20pour%20ajouter%20un%20r%C3%A9sum%C3%A9%20de%20l&#8217;appel.%22%7D%2C%7B%22item_title%22%3A%22Param%C3%A8tres%20intercept%C3%A9s%22%2C%22item_desc%22%3A%22Intercepte%20et%20affiche%20des%20param%C3%A8tres%20tels%20que%20la%20voix%2C%20les%20SMS%20et%20les%20t%C3%A9l%C3%A9copies%2C%20l&#8217;identifiant%20du%20faisceau%2C%20la%20date%20et%20l&#8217;heure%20de%20l&#8217;appel%2C%20le%20TMSI%2C%20l&#8217;IMSI%2C%20l&#8217;IMEI%2C%20le%20num%C3%A9ro%20de%20t%C3%A9l%C3%A9phone%20de%20l&#8217;appel%C3%A9%2C%20le%20num%C3%A9ro%20de%20t%C3%A9l%C3%A9phone%20de%20l&#8217;appelant%2C%20le%20type%20d&#8217;appel%20(voix%2C%20SMS%20ou%20t%C3%A9l%C3%A9copie)%2C%20la%20direction%20du%20flux%20d&#8217;appel%20(appel%20entrant%20ou%20appel%20sortant)%2C%20la%20dur%C3%A9e%20de%20l&#8217;appel%20(avec%20l&#8217;heure%20de%20d%C3%A9but%20et%20l&#8217;heure%20de%20fin).%22%7D%2C%7B%22item_title%22%3A%22Outils%20d&#8217;analyse%20en%20ligne%20et%20hors%20ligne%22%2C%22item_desc%22%3A%22Il%20est%20possible%20d&#8217;int%C3%A9grer%20les%20outils%20d&#8217;analyse%20de%20Stratign%20tels%20que%20le%20syst%C3%A8me%20forensique%20vocal%2C%20l&#8217;analyse%20des%20liens%2C%20Renseignement%20d&#8217;origine%20sources%20ouvertes%20(OSINT)%2C%20etc.%20Param%C3%A8tres%20d&#8217;interception.%22%7D%5D&#8221; custom_css=&#8221;LnRtLWxpc3Quc3R5bGUtY2hlY2stMDIlMjAuZGVzYyUyMCU3QiUwQSUyMCUyMCUyMCUyMG1hcmdpbi10b3AlM0ElMjAxMHB4JTNCJTBBJTIwJTIwJTIwJTIwbWFyZ2luLWJvdHRvbSUzQSUyMDEwcHglM0IlMEElN0Q=&#8221;][tm_spacer size=&#8221;lg:50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;xs:10;sm:10;lg:20&#8243;][tm_heading tag=&#8221;h5&#8243; custom_google_font=&#8221;&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:24;md:28;lg:30&#8243; line_height=&#8221;1.4&#8243;]2. Syst\u00e8me d&#8217;interception strat\u00e9gique ISAT[\/tm_heading][tm_spacer size=&#8221;lg:30&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Le syst\u00e8me d&#8217;interception strat\u00e9gique ISAT permet d&#8217;intercepter, \u00e0 l&#8217;\u00e9chelle nationale, des communications duplex sur le r\u00e9seau Inmarsat. Le syst\u00e8me surveille les signaux descendants du satellite sur la bande L (du satellite au combin\u00e9) et sur la bande C (du satellite \u00e0 la station passerelle primaire). Ce faisant, la limitation de l&#8217;interception duplex jusqu&#8217;\u00e0 la distance RLOS dans le syst\u00e8me d&#8217;interception ISAT tactique est supprim\u00e9e. Comme tous les appels ISAT sont achemin\u00e9s via les stations passerelles r\u00e9gionales, la liaison montante en bande L du combin\u00e9 vers le satellite est achemin\u00e9e sur la liaison descendante en bande C vers les stations passerelles r\u00e9gionales. Comme tous les appels ISAT sont achemin\u00e9s via les stations passerelles r\u00e9gionales, la liaison montante en bande L du combin\u00e9 vers le satellite est achemin\u00e9e sur la liaison descendante en bande C vers les stations passerelles r\u00e9gionales. Nous surveillons donc principalement un c\u00f4t\u00e9 de la communication \u00e0 partir de l&#8217;emplacement de la cible et l&#8217;autre c\u00f4t\u00e9 de la communication vers la station passerelle r\u00e9gionale. Les c\u00f4t\u00e9s montants et descendants des appels sont ensuite appari\u00e9s par le syst\u00e8me pour produire un appel full duplex (recto-verso). Le syst\u00e8me pourra surveiller simultan\u00e9ment jusqu&#8217;\u00e0 4 faisceaux r\u00e9gionaux, toutefois, si le pays est vaste et couvert par plus de 4 faisceaux, des stations de surveillance en bande L suppl\u00e9mentaires peuvent \u00eatre d\u00e9ploy\u00e9es et int\u00e9gr\u00e9es au syst\u00e8me principal.[\/tm_heading][tm_spacer size=&#8221;lg:50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;sm:50;lg:50&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704961362546{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques du syst\u00e8me[\/tm_heading][tm_spacer size=&#8221;lg:40&#8243;][tm_list list_style=&#8221;check-02&#8243; marker_color=&#8221;secondary&#8221; title_color=&#8221;primary&#8221; columns=&#8221;xs:1;lg:2&#8243; items=&#8221;%5B%7B%22item_title%22%3A%22Interception%20de%20la%20bande%20C%2BL%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20est%20capable%20de%20surveiller%20les%20fr%C3%A9quences%20descendantes%20de%20la%20bande%20C%20(du%20satellite%20%C3%A0%20la%20station%20passerelle%20r%C3%A9gionale)%20et%20de%20la%20bande%20L%20(du%20satellite%20au%20combin%C3%A9%20ISAT%20Phone%20Pro).%22%7D%2C%7B%22item_title%22%3A%22Interception%20de%20la%20voix%20et%20des%20SMS%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20surveille%20les%20communications%20vocales%20et%20SMS%20provenant%20d&#8217;AceS%2C%20d&#8217;Isat%20Phone%20et%20d&#8217;Isat%20Phone%20Pro.%22%7D%2C%7B%22item_title%22%3A%22D%C3%A9cryptage%20en%20temps%20r%C3%A9el%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20d%C3%A9crypte%20automatiquement%20les%20communications%20vocales%20et%20SMS%20en%20temps%20r%C3%A9el.%22%7D%2C%7B%22item_title%22%3A%22Interception%20duplex%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20surveille%20simultan%C3%A9ment%20les%20canaux%20avant%20et%20arri%C3%A8re.%22%7D%2C%7B%22item_title%22%3A%22Architecture%20modulaire%22%2C%22item_desc%22%3A%22L&#8217;architecture%20modulaire%20du%20syst%C3%A8me%20permet%20une%20extension%20ult%C3%A9rieure%20du%20syst%C3%A8me.%22%7D%2C%7B%22item_title%22%3A%22Base%20de%20donn%C3%A9es%20consultable%22%2C%22item_desc%22%3A%22Les%20conversations%20enregistr%C3%A9es%20sont%20stock%C3%A9es%20dans%20la%20base%20de%20donn%C3%A9es%20du%20syst%C3%A8me%20et%20peuvent%20%C3%AAtre%20recherch%C3%A9es%20en%20fonction%20des%20param%C3%A8tres%20d&#8217;identit%C3%A9%20de%20l&#8217;appelant.%22%7D%2C%7B%22item_title%22%3A%22Couverture%20%C3%A9tendue%22%2C%22item_desc%22%3A%22Plusieurs%20syst%C3%A8mes%20de%20surveillance%20ISAT%20%C3%A0%20bande%20L%20peuvent%20%C3%AAtre%20int%C3%A9gr%C3%A9s%20%C3%A0%20une%20commande%20unifi%C3%A9e%20pour%20surveiller%20un%20plus%20grand%20nombre%20de%20faisceaux%20ponctuels%2Fune%20zone%20plus%20%C3%A9tendue.%22%7D%2C%7B%22item_title%22%3A%22Interception%20et%20affichage%20des%20param%C3%A8tres%20d&#8217;appel%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20est%20capable%20d&#8217;intercepter%20et%20d&#8217;afficher%20les%20param%C3%A8tres%20de%20l&#8217;appel%20tels%20que%20la%20voix%2C%20le%20SMS%2C%20le%20fax%2C%20l&#8217;ID%20du%20faisceau%20ponctuel%2C%20la%20date%20et%20l&#8217;heure%20de%20l&#8217;appel%2C%20le%20TMSI%2C%20l&#8217;IMSI%2C%20l&#8217;IMEI%2C%20etc.%22%7D%5D&#8221; custom_css=&#8221;LnRtLWxpc3Quc3R5bGUtY2hlY2stMDIlMjAuZGVzYyUyMCU3QiUwQSUyMCUyMCUyMCUyMG1hcmdpbi10b3AlM0ElMjAxMHB4JTNCJTBBJTIwJTIwJTIwJTIwbWFyZ2luLWJvdHRvbSUzQSUyMDEwcHglM0IlMEElN0Q=&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;xs:2;sm:10;lg:10&#8243;][tm_list list_style=&#8221;check-02&#8243; marker_color=&#8221;secondary&#8221; title_color=&#8221;primary&#8221; columns=&#8221;xs:1;lg:1&#8243; items=&#8221;%5B%7B%22item_title%22%3A%22Outils%20d&#8217;analyse%20en%20ligne%20et%20hors%20ligne%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20%C3%AAtre%20int%C3%A9gr%C3%A9%20aux%20syst%C3%A8mes%20d&#8217;analyse%20de%20Stratign%20tels%20que%20le%20syst%C3%A8me%20d&#8217;analyse%20de%20la%20voix%2C%20le%20syst%C3%A8me%20d&#8217;analyse%20des%20liens%2C%20Renseignement%20d&#8217;origine%20sources%20ouvertes%20(OSINT)%2C%20etc.%22%7D%5D&#8221; custom_css=&#8221;LnRtLWxpc3Quc3R5bGUtY2hlY2stMDIlMjAuZGVzYyUyMCU3QiUwQSUyMCUyMCUyMCUyMG1hcmdpbi10b3AlM0ElMjAxMHB4JTNCJTBBJTIwJTIwJTIwJTIwbWFyZ2luLWJvdHRvbSUzQSUyMDEwcHglM0IlMEElN0Q=&#8221;][\/vc_column][vc_column][tm_spacer size=&#8221;xs:30;sm:60;lg:120&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; lg_spacing=&#8221;margin_bottom:10&#8243; md_spacing=&#8221;margin_bottom:10&#8243;][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; css=&#8221;.vc_custom_1702534293059{margin-top: 10px !important;}&#8221;]En savoir plus[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fcontact-us%2F|title:Nous%20contacter%20&#8243; el_id=&#8221;Contact-us-other&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221;]T\u00e9l\u00e9charger la brochure[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fbrochures%2F|title:T%C3%A9l%C3%A9charger&#8221; el_id=&#8221;Brochure-other&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Stratign offers two types of solutions (Tactical and Strategic) for interception of ISAT communications similar to the Thuraya Interception System<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3291","page","type-page","status-publish","hentry","post-no-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SYST\u00c8ME D\u2019INTERCEPTION ISAT - Stratign<\/title>\n<meta name=\"description\" content=\"Les communications ISAT peuvent \u00eatre intercept\u00e9es sur une zone g\u00e9ographique plus large, soit par un syst\u00e8me tactique, soit par un syst\u00e8me strat\u00e9gique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratign.com\/fr\/isat-interception-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SYST\u00c8ME D\u2019INTERCEPTION ISAT - Stratign\" \/>\n<meta property=\"og:description\" content=\"Les communications ISAT peuvent \u00eatre intercept\u00e9es sur une zone g\u00e9ographique plus large, soit par un syst\u00e8me tactique, soit par un syst\u00e8me strat\u00e9gique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratign.com\/fr\/isat-interception-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratign\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stratignfb\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T05:46:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@stratign\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/isat-interception-system\\\/\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/isat-interception-system\\\/\",\"name\":\"SYST\u00c8ME D\u2019INTERCEPTION ISAT - Stratign\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\"},\"datePublished\":\"2021-09-22T08:08:14+00:00\",\"dateModified\":\"2024-03-05T05:46:29+00:00\",\"description\":\"Les communications ISAT peuvent \u00eatre intercept\u00e9es sur une zone g\u00e9ographique plus large, soit par un syst\u00e8me tactique, soit par un syst\u00e8me strat\u00e9gique.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/isat-interception-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stratign.com\\\/fr\\\/isat-interception-system\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/isat-interception-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SYST\u00c8ME D\u2019INTERCEPTION ISAT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\",\"name\":\"Stratign\",\"description\":\"Military Defense Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SYST\u00c8ME D\u2019INTERCEPTION ISAT - Stratign","description":"Les communications ISAT peuvent \u00eatre intercept\u00e9es sur une zone g\u00e9ographique plus large, soit par un syst\u00e8me tactique, soit par un syst\u00e8me strat\u00e9gique.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratign.com\/fr\/isat-interception-system\/","og_locale":"en_US","og_type":"article","og_title":"SYST\u00c8ME D\u2019INTERCEPTION ISAT - Stratign","og_description":"Les communications ISAT peuvent \u00eatre intercept\u00e9es sur une zone g\u00e9ographique plus large, soit par un syst\u00e8me tactique, soit par un syst\u00e8me strat\u00e9gique.","og_url":"https:\/\/www.stratign.com\/fr\/isat-interception-system\/","og_site_name":"Stratign","article_publisher":"https:\/\/www.facebook.com\/stratignfb\/","article_modified_time":"2024-03-05T05:46:29+00:00","twitter_card":"summary_large_image","twitter_site":"@stratign","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stratign.com\/fr\/isat-interception-system\/","url":"https:\/\/www.stratign.com\/fr\/isat-interception-system\/","name":"SYST\u00c8ME D\u2019INTERCEPTION ISAT - Stratign","isPartOf":{"@id":"https:\/\/www.stratign.com\/fr\/#website"},"datePublished":"2021-09-22T08:08:14+00:00","dateModified":"2024-03-05T05:46:29+00:00","description":"Les communications ISAT peuvent \u00eatre intercept\u00e9es sur une zone g\u00e9ographique plus large, soit par un syst\u00e8me tactique, soit par un syst\u00e8me strat\u00e9gique.","breadcrumb":{"@id":"https:\/\/www.stratign.com\/fr\/isat-interception-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratign.com\/fr\/isat-interception-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratign.com\/fr\/isat-interception-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratign.com\/fr\/"},{"@type":"ListItem","position":2,"name":"SYST\u00c8ME D\u2019INTERCEPTION ISAT"}]},{"@type":"WebSite","@id":"https:\/\/www.stratign.com\/fr\/#website","url":"https:\/\/www.stratign.com\/fr\/","name":"Stratign","description":"Military Defense Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratign.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/comments?post=3291"}],"version-history":[{"count":13,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3291\/revisions"}],"predecessor-version":[{"id":15128,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3291\/revisions\/15128"}],"wp:attachment":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/media?parent=3291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}