{"id":3336,"date":"2021-09-23T07:57:48","date_gmt":"2021-09-23T07:57:48","guid":{"rendered":"https:\/\/stratign.com\/website\/?page_id=3336"},"modified":"2024-03-05T09:33:10","modified_gmt":"2024-03-05T05:33:10","slug":"lawful-interception-system","status":"publish","type":"page","link":"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/","title":{"rendered":"SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI)"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][tm_spacer size=&#8221;xs:20;sm:40;lg:80&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; text_transform=&#8221;uppercase&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243;]SYST\u00c8ME D&#8217;INTERCEPTION L\u00c9GALE (LI)[\/tm_heading][tm_spacer size=&#8221;xs:20;sm:30;lg:60&#8243;][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;padding_bottom:100&#8243; lg_spacing=&#8221;padding_bottom:5&#8243;][vc_column offset=&#8221;vc_col-md-5&#8243;][tm_heading style=&#8221;left-line&#8221; custom_google_font=&#8221;&#8221; font_weight=&#8221;800&#8243; font_size=&#8221;sm:18;md:21;lg:24&#8243; line_height=&#8221;1.67&#8243; max_width=&#8221;400px&#8221;]Le syst\u00e8me LI de Stratign est une solution cl\u00e9 en main pour la surveillance, le traitement, le d\u00e9codage, la distribution et la pr\u00e9sentation des donn\u00e9es intercept\u00e9es des cibles \u00e0 partir des r\u00e9seaux \u00e0 commutation de circuits.[\/tm_heading][tm_spacer size=&#8221;xs:10;sm:10;md:0;lg:0&#8243;][\/vc_column][vc_column offset=&#8221;vc_col-md-7&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]L&#8217;interception l\u00e9gale des communications est essentielle aux efforts d\u00e9ploy\u00e9s par les organismes gouvernementaux charg\u00e9s de l&#8217;application de la loi pour mener des enqu\u00eates approfondies et constituer des preuves \u00e0 la fois recevables et convaincantes. Presque tous les pays ont adopt\u00e9 des normes et des r\u00e9glementations en mati\u00e8re d&#8217;interception l\u00e9gale qui exigent que le contenu et les donn\u00e9es des communications soient captur\u00e9s et pr\u00e9sent\u00e9s de mani\u00e8re \u00e0 garantir leur int\u00e9grit\u00e9 et leur fiabilit\u00e9.[\/tm_heading][tm_spacer size=&#8221;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]La plupart des pays exigent que les fournisseurs de services (PS) et les fournisseurs d&#8217;acc\u00e8s \u00e0 Internet (FAI) mettent en \u0153uvre leurs r\u00e9seaux de mani\u00e8re \u00e0 prendre explicitement en charge la surveillance[\/tm_heading][\/vc_column][\/vc_row][vc_row sm_spacing=&#8221;margin_top:-90&#8243; xs_spacing=&#8221;margin_top:-90&#8243;][vc_column][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]\u00e9lectronique autoris\u00e9e par les autorit\u00e9s charg\u00e9es de l&#8217;application de la loi. Les types de fournisseurs de services ou de fournisseurs d&#8217;acc\u00e8s \u00e0 Internet qui sont soumis \u00e0 des mandats d&#8217;interception l\u00e9gale varient consid\u00e9rablement d&#8217;un pays \u00e0 l&#8217;autre. Les gouvernements exigent des fournisseurs de services t\u00e9l\u00e9phoniques qu&#8217;ils installent une passerelle d&#8217;interception l\u00e9gale (LIG), ainsi que des n\u0153uds d&#8217;interception l\u00e9gale (LIN), qui leur permettent d&#8217;intercepter en temps r\u00e9el les appels t\u00e9l\u00e9phoniques, les messages SMS, les courriels et certains transferts de fichiers ou messages instantan\u00e9s. Les exigences et les normes mondiales en mati\u00e8re d&#8217;Interception L\u00e9gale ont d\u00e9j\u00e0 \u00e9t\u00e9 \u00e9labor\u00e9es par l&#8217;Institut europ\u00e9en des normes de t\u00e9l\u00e9communications (ETSI), le projet de partenariat de troisi\u00e8me g\u00e9n\u00e9ration (3GPP) et le Communications Assistance for Law Enforcement Act (CALEA) pour les syst\u00e8mes filaires\/Internet, sans fil et c\u00e2bl\u00e9s.[\/tm_heading][tm_spacer size=&#8221;sm:10;lg:20&#8243;][tm_heading tag=&#8221;div&#8221; custom_google_font=&#8221;&#8221; font_size=&#8221;lg:18&#8243; line_height=&#8221;1.67&#8243;]Le Stratign Monitoring Center (STN-MC) est une solution cl\u00e9 en main pour la surveillance, le traitement, le d\u00e9codage, la distribution et la pr\u00e9sentation de donn\u00e9es intercept\u00e9es des cibles provenant des r\u00e9seaux \u00e0 commutation de circuits. (p. ex., t\u00e9l\u00e9phonie mobile et fixe) ainsi que pour les r\u00e9seaux \u00e0 commutation par paquets (p. ex., Internet, courriel) et est utilis\u00e9 par les organismes d&#8217;application de la loi et\/ou de renseignement. Le STN MC est conforme aux derni\u00e8res sp\u00e9cifications ETSI, 3GPP et\/ou CALEA pour l&#8217;interception l\u00e9gale, mais peut \u00e9galement prendre en charge les protocoles de transfert d&#8217;interception l\u00e9gale sp\u00e9cifiques au pays.[\/tm_heading][tm_spacer size=&#8221;lg:50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][tm_spacer size=&#8221;lg:50&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; align=&#8221;center&#8221; text_color=&#8221;secondary&#8221; font_size=&#8221;sm:28;md:34;lg:40&#8243; line_height=&#8221;1.4&#8243; css=&#8221;.vc_custom_1704690574117{background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;]Caract\u00e9ristiques du syst\u00e8me[\/tm_heading][tm_spacer size=&#8221;lg:40&#8243;][tm_list list_style=&#8221;check-02&#8243; marker_color=&#8221;secondary&#8221; title_color=&#8221;primary&#8221; columns=&#8221;xs:1;lg:2&#8243; items=&#8221;%5B%7B%22item_title%22%3A%22Canaux%20physiques%22%2C%22item_desc%22%3A%22R%C3%A9ception%20ind%C3%A9pendante%20d&#8217;un%20maximum%20de%2032%20canaux%20physiques%2C%20soit%2032%20appels%20duplex.%22%7D%2C%7B%22item_title%22%3A%22Communications%20vocales%20et%20SMS%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20d%C3%A9crypte%20automatiquement%20la%20communication%20vocale%20et%20SMS%20en%20temps%20r%C3%A9el.%22%7D%2C%7B%22item_title%22%3A%22D%C3%A9codage%22%2C%22item_desc%22%3A%22D%C3%A9codage%20(extraction%20de%20paquets%2C%20d%C3%A9multiplexage%2C%20d%C3%A9sembrouillage%2C%20d%C3%A9sentrelacement%2C%20retrait%20d&#8217;un%20code%20convolutif)%20de%20flux%20num%C3%A9riques.%22%7D%2C%7B%22item_title%22%3A%22S%C3%A9lection%20de%20la%20zone%20de%20couverture%22%2C%22link%22%3A%22%7C%7C%7C%22%2C%22item_desc%22%3A%22La%20zone%20de%20couverture%20peut%20%C3%AAtre%20s%C3%A9lectionn%C3%A9e%20par%20l&#8217;op%C3%A9rateur%20en%20fonction%20de%20la%20priorit%C3%A9%20de%20la%20mission%20de%20renseignement.%22%7D%2C%7B%22item_title%22%3A%22Gestion%20des%20bases%20de%20donn%C3%A9es%22%2C%22item_desc%22%3A%22Gestion%20des%20bases%20de%20donn%C3%A9es%20(DB)%20des%20sessions%20intercept%C3%A9es%2Fenregistr%C3%A9es.%22%7D%2C%7B%22item_title%22%3A%22Carte%20num%C3%A9rique%22%2C%22item_desc%22%3A%22L&#8217;emplacement%20de%20la%20cible%20peut%20%C3%AAtre%20cartographi%C3%A9%20sur%20la%20carte%20num%C3%A9rique.%22%7D%2C%7B%22item_title%22%3A%22Identification%22%2C%22item_desc%22%3A%22Traitement%20des%20segments%20et%20commandes%20re%C3%A7us%20en%20vue%20de%20l&#8217;identification%20dans%20les%20flux%20re%C3%A7us%20du%20d%C3%A9but%2Ffin%20des%20sessions.%22%7D%2C%7B%22item_title%22%3A%22Classification%20%22%2C%22item_desc%22%3A%22Classification%20des%20sessions%20s%C3%A9lectionn%C3%A9es%20par%20types%20de%20charge%20utile%20(voix%2C%20services%20de%20messages%20courts%2C%20messages%20de%20pagination%2Fcontr%C3%B4le).%22%7D%2C%7B%22item_title%22%3A%22Outils%20d&#8217;analyse%20en%20ligne%20et%20hors%20ligne%22%2C%22item_desc%22%3A%22Le%20syst%C3%A8me%20peut%20%C3%AAtre%20int%C3%A9gr%C3%A9%20aux%20syst%C3%A8mes%20d%E2%80%99analyse%20de%20Strating%2C%20tels%20que%20le%20syst%C3%A8me%20de%20reconnaissance%20vocale%2C%20le%20syst%C3%A8me%20d%E2%80%99analyse%20des%20liens%2C%20l%E2%80%99OSINT%2C%20etc.%22%7D%2C%7B%22item_title%22%3A%22S%C3%A9lection%20de%20sessions%20de%20base%20de%20donn%C3%A9es%22%2C%22item_desc%22%3A%22S%C3%A9lection%20de%20sessions%20DB%20par%20plusieurs%20attributs%20et%20param%C3%A8tres.%22%7D%5D&#8221; custom_css=&#8221;LnRtLWxpc3Quc3R5bGUtY2hlY2stMDIlMjAuZGVzYyUyMCU3QiUwQSUyMCUyMCUyMCUyMG1hcmdpbi10b3AlM0ElMjAxMHB4JTNCJTBBJTIwJTIwJTIwJTIwbWFyZ2luLWJvdHRvbSUzQSUyMDEwcHglM0IlMEElN0Q=&#8221;][tm_spacer size=&#8221;xs:30;sm:60;lg:120&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;none&#8221; lg_spacing=&#8221;margin_bottom:10&#8243; md_spacing=&#8221;margin_bottom:10&#8243;][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221; css=&#8221;.vc_custom_1702534293059{margin-top: 10px !important;}&#8221;]En savoir plus[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fcontact-us%2F|title:Nous%20contacter%20&#8243; el_id=&#8221;Contact-us-other&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_heading tag=&#8221;h4&#8243; custom_google_font=&#8221;&#8221;]T\u00e9l\u00e9charger la brochure[\/tm_heading][\/vc_column][vc_column width=&#8221;1\/4&#8243;][tm_button button=&#8221;url:https%3A%2F%2Fwww.stratign.com%2Fbrochures%2F|title:T%C3%A9l%C3%A9charger&#8221; el_id=&#8221;Brochure-other&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Stratign\u2019s LI system is a turnkey solution for the monitoring, processing, decoding distribution and presentation of intercepted data of Targets from circuit switched networks.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3336","page","type-page","status-publish","hentry","post-no-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI) - Stratign<\/title>\n<meta name=\"description\" content=\"Le syst\u00e8me d&#039;interception l\u00e9gale (LI) permet de surveiller, de traiter, de d\u00e9coder et de pr\u00e9senter les donn\u00e9es intercept\u00e9es de cibles \u00e0 partir de r\u00e9seaux \u00e0 commutation de circuits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI) - Stratign\" \/>\n<meta property=\"og:description\" content=\"Le syst\u00e8me d&#039;interception l\u00e9gale (LI) permet de surveiller, de traiter, de d\u00e9coder et de pr\u00e9senter les donn\u00e9es intercept\u00e9es de cibles \u00e0 partir de r\u00e9seaux \u00e0 commutation de circuits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratign\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stratignfb\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-05T05:33:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@stratign\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/lawful-interception-system\\\/\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/lawful-interception-system\\\/\",\"name\":\"SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI) - Stratign\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\"},\"datePublished\":\"2021-09-23T07:57:48+00:00\",\"dateModified\":\"2024-03-05T05:33:10+00:00\",\"description\":\"Le syst\u00e8me d'interception l\u00e9gale (LI) permet de surveiller, de traiter, de d\u00e9coder et de pr\u00e9senter les donn\u00e9es intercept\u00e9es de cibles \u00e0 partir de r\u00e9seaux \u00e0 commutation de circuits.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/lawful-interception-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stratign.com\\\/fr\\\/lawful-interception-system\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/lawful-interception-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/\",\"name\":\"Stratign\",\"description\":\"Military Defense Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stratign.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI) - Stratign","description":"Le syst\u00e8me d'interception l\u00e9gale (LI) permet de surveiller, de traiter, de d\u00e9coder et de pr\u00e9senter les donn\u00e9es intercept\u00e9es de cibles \u00e0 partir de r\u00e9seaux \u00e0 commutation de circuits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/","og_locale":"en_US","og_type":"article","og_title":"SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI) - Stratign","og_description":"Le syst\u00e8me d'interception l\u00e9gale (LI) permet de surveiller, de traiter, de d\u00e9coder et de pr\u00e9senter les donn\u00e9es intercept\u00e9es de cibles \u00e0 partir de r\u00e9seaux \u00e0 commutation de circuits.","og_url":"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/","og_site_name":"Stratign","article_publisher":"https:\/\/www.facebook.com\/stratignfb\/","article_modified_time":"2024-03-05T05:33:10+00:00","twitter_card":"summary_large_image","twitter_site":"@stratign","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/","url":"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/","name":"SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI) - Stratign","isPartOf":{"@id":"https:\/\/www.stratign.com\/fr\/#website"},"datePublished":"2021-09-23T07:57:48+00:00","dateModified":"2024-03-05T05:33:10+00:00","description":"Le syst\u00e8me d'interception l\u00e9gale (LI) permet de surveiller, de traiter, de d\u00e9coder et de pr\u00e9senter les donn\u00e9es intercept\u00e9es de cibles \u00e0 partir de r\u00e9seaux \u00e0 commutation de circuits.","breadcrumb":{"@id":"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratign.com\/fr\/lawful-interception-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratign.com\/fr\/lawful-interception-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratign.com\/fr\/"},{"@type":"ListItem","position":2,"name":"SYST\u00c8ME D\u2019INTERCEPTION L\u00c9GALE (LI)"}]},{"@type":"WebSite","@id":"https:\/\/www.stratign.com\/fr\/#website","url":"https:\/\/www.stratign.com\/fr\/","name":"Stratign","description":"Military Defense Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratign.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/comments?post=3336"}],"version-history":[{"count":8,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3336\/revisions"}],"predecessor-version":[{"id":15119,"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/pages\/3336\/revisions\/15119"}],"wp:attachment":[{"href":"https:\/\/www.stratign.com\/fr\/wp-json\/wp\/v2\/media?parent=3336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}