{"id":106835,"date":"2023-06-20T15:07:07","date_gmt":"2023-06-20T19:07:07","guid":{"rendered":"https:\/\/adf-magazine.com\/?p=106835"},"modified":"2023-06-20T15:07:39","modified_gmt":"2023-06-20T19:07:39","slug":"les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines","status":"publish","type":"post","link":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/","title":{"rendered":"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines"},"content":{"rendered":"<p style=\"font-weight: 400;\">PERSONNEL D\u2019ADF<\/p>\n<p style=\"font-weight: 400;\">Lorsque des rapports sont apparus r\u00e9cemment sur des cyberattaques g\u00e9n\u00e9ralis\u00e9es conduites pendant des ann\u00e9es par les hackers chinois contre le gouvernement du Kenya, la Chine s\u2019est pr\u00e9cipit\u00e9e pour formuler un d\u00e9menti standard. Mais les experts d\u00e9clarent que, dans l\u2019environnement num\u00e9rique, il est plus que jamais difficile pour les attaquants de brouiller les pistes.<\/p>\n<p style=\"font-weight: 400;\">Le Dr\u00a0James Shires, Research Fellow principal du Programme international de s\u00e9curit\u00e9, \u00e9crit pour Chatham House que les strat\u00e9gies des actions clandestines ont \u00e9volu\u00e9.<\/p>\n<p style=\"font-weight: 400;\">\u00ab\u00a0L\u2019\u00e2ge du num\u00e9rique a cr\u00e9\u00e9 de nombreuses opportunit\u00e9s nouvelles pour les actions clandestines mais il a aussi rendu les strat\u00e9gies traditionnelles beaucoup plus difficiles \u00e0 dissimuler. [L\u2019une d\u2019elles consiste \u00e0] utiliser la distraction et la d\u00e9sinformation, \u00e0 cacher les faits embarrassants ou sensibles dans une for\u00eat de fausses all\u00e9gations.\u00a0\u00bb<\/p>\n<p style=\"font-weight: 400;\">La Russie et la Chine ont de longs ant\u00e9c\u00e9dents d\u2019op\u00e9rations clandestines et de campagnes de d\u00e9sinformation sur le continent. Dans ses \u00e9tudes, le Dr\u00a0Shires a examin\u00e9 les activit\u00e9s de l\u2019Iran.<\/p>\n<p style=\"font-weight: 400;\">\u00ab\u00a0L\u2019emploi par l\u2019Iran de sa ligne a\u00e9rienne d\u2019\u00e9tat et des petits bateaux pour fournir des drones destin\u00e9s \u00e0 la guerre de la Russie en Ukraine, ainsi que son soutien continu des intervenants dans plusieurs conflits r\u00e9gionaux d\u00e9stabilisants, a mis en \u00e9vidence la question des actions clandestines\u00a0\u00bb, \u00e9crit-il.<\/p>\n<p style=\"font-weight: 400;\">On signale que l\u2019Iran a conduit des op\u00e9rations d\u2019influence cyber-assist\u00e9es dans le monde. \u00c0 l\u2019int\u00e9rieur du pays, il a limit\u00e9 l\u2019acc\u00e8s \u00e0 l\u2019Internet et impos\u00e9 la censure afin de faire taire les dissidents. Mais les preuves num\u00e9riques des actions clandestines fournissent une m\u00e9thode de plus en plus efficace de contrer ces op\u00e9rations.<\/p>\n<p style=\"font-weight: 400;\">John Hultquist, expert de la cybers\u00e9curit\u00e9, a d\u00e9clar\u00e9 au magazine MIT Technology Review\u00a0: \u00ab\u00a0Il y a des \u00e9l\u00e9ments qui caract\u00e9riserons l\u2019op\u00e9rateur ou son sponsor. Ils les montreront dans de multiples op\u00e9rations, quelle que soit la ruse.\u00a0\u00bb<\/p>\n<p style=\"font-weight: 400;\">\u00ab\u00a0Une fois que vous commencez \u00e0 les lier \u00e0 d\u2019autres incidents, la ruse perd son efficacit\u00e9. Il est tr\u00e8s difficile de maintenir la ruse sur de multiples op\u00e9rations.\u00a0\u00bb<\/p>\n<p>Hultquist note un r\u00e9cent exemple o\u00f9 des preuves initiales d\u2019une cyberattaque sugg\u00e9raient que l\u2019Iran en \u00e9tait responsable. Les hackers avaient utilis\u00e9 des outils g\u00e9n\u00e9ralement associ\u00e9s aux Iraniens et avaient \u00e9crit en persan.<\/p>\n<p style=\"font-weight: 400;\">Mais une investigation plus approfondie et des informations recueillies aupr\u00e8s d\u2019autres affaires d\u2019espionnage sur l\u2019Internet au Moyen-Orient ont r\u00e9v\u00e9l\u00e9 qu\u2019il ne s\u2019agissait pas d\u2019une op\u00e9ration iranienne mais d\u2019une op\u00e9ration conduite par des agents chinois se faisant passer pour des hackers de T\u00e9h\u00e9ran.<\/p>\n<p style=\"font-weight: 400;\">Le Dr\u00a0Shires exhorte les pays \u00e0 d\u00e9velopper des outils et des strat\u00e9gies pour contrer ces actions clandestines.<\/p>\n<p style=\"font-weight: 400;\">Les agents \u00e9tatiques et non \u00e9tatiques malveillants s\u2019attendent \u00e0 ce que leurs op\u00e9rations soient r\u00e9v\u00e9l\u00e9es, dit-il. Ils ont d\u00e9j\u00e0 des plans pour semer la confusion avec des d\u00e9mentis et des distractions.<\/p>\n<p style=\"font-weight: 400;\">\u00ab\u00a0Contrer ces strat\u00e9gies changeantes n\u00e9cessite la transparence, la persistance et la coop\u00e9ration internationale\u00a0\u00bb, d\u00e9clare-t-il.<\/p>\n<p style=\"font-weight: 400;\">\u00ab\u00a0Bien que les r\u00e9cits d\u2019attribution soient toujours contest\u00e9s, en particulier dans un monde en ligne avec une surabondance de m\u00e9sinformation et de d\u00e9sinformation, l\u2019importante incr\u00e9mentielle de ces rapports ne devrait pas \u00eatre sous-estim\u00e9e.\u00a0\u00bb<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PERSONNEL D\u2019ADF Lorsque des rapports sont apparus r\u00e9cemment sur des cyberattaques g\u00e9n\u00e9ralis\u00e9es conduites pendant des ann\u00e9es par les hackers chinois contre le gouvernement du Kenya, la Chine s\u2019est pr\u00e9cipit\u00e9e pour formuler un d\u00e9menti standard. Mais les experts d\u00e9clarent que, dans l\u2019environnement num\u00e9rique, il est plus que jamais difficile pour les attaquants de brouiller les pistes.<\/p>\n","protected":false},"author":1,"featured_media":106828,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[331],"tags":[],"class_list":{"0":"post-106835","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-dernieres-nouvelles"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines - Africa Defense Forum<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines - Africa Defense Forum\" \/>\n<meta property=\"og:description\" content=\"PERSONNEL D\u2019ADF Lorsque des rapports sont apparus r\u00e9cemment sur des cyberattaques g\u00e9n\u00e9ralis\u00e9es conduites pendant des ann\u00e9es par les hackers chinois contre le gouvernement du Kenya, la Chine s\u2019est pr\u00e9cipit\u00e9e pour formuler un d\u00e9menti standard. Mais les experts d\u00e9clarent que, dans l\u2019environnement num\u00e9rique, il est plus que jamais difficile pour les attaquants de brouiller les pistes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/\" \/>\n<meta property=\"og:site_name\" content=\"Africa Defense Forum\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ADFmagazine\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-20T19:07:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-20T19:07:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/06\/GettyImages-1228221361.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ADF\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ADFmagazine\" \/>\n<meta name=\"twitter:site\" content=\"@ADFmagazine\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"ADF\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/\"},\"author\":{\"name\":\"ADF\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\"},\"headline\":\"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines\",\"datePublished\":\"2023-06-20T19:07:07+00:00\",\"dateModified\":\"2023-06-20T19:07:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/\"},\"wordCount\":596,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/GettyImages-1228221361.jpg\",\"articleSection\":[\"Actualit\u00e9s du Jour\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/\",\"name\":\"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines - Africa Defense Forum\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/GettyImages-1228221361.jpg\",\"datePublished\":\"2023-06-20T19:07:07+00:00\",\"dateModified\":\"2023-06-20T19:07:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/#primaryimage\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/GettyImages-1228221361.jpg\",\"contentUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/GettyImages-1228221361.jpg\",\"width\":1024,\"height\":683,\"caption\":\"Un membre de la Red Hacker Alliance qui refuse de donner son vrai nom utilise son ordinateur dans les bureaux du groupe \u00e0 Dongguan (Chine). GETTY IMAGES\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2023\\\/06\\\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"page d\u2019accueil\",\"item\":\"https:\\\/\\\/adf-magazine.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#website\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/\",\"name\":\"Africa Defense Forum\",\"description\":\"Africa Defense Forum\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/adf-magazine.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\",\"name\":\"ADF\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"contentUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"caption\":\"ADF\"},\"description\":\"ADF is a professional military magazine published quarterly by U.S. Africa Command to provide an international forum for African security professionals. ADF covers topics such as counter terrorism strategies, security and defense operations, transnational crime, and all other issues affecting peace, stability, and good governance on the African continent.\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/ADFmagazine\"],\"url\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/author\\\/adf\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines - Africa Defense Forum","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/","og_locale":"fr_FR","og_type":"article","og_title":"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines - Africa Defense Forum","og_description":"PERSONNEL D\u2019ADF Lorsque des rapports sont apparus r\u00e9cemment sur des cyberattaques g\u00e9n\u00e9ralis\u00e9es conduites pendant des ann\u00e9es par les hackers chinois contre le gouvernement du Kenya, la Chine s\u2019est pr\u00e9cipit\u00e9e pour formuler un d\u00e9menti standard. Mais les experts d\u00e9clarent que, dans l\u2019environnement num\u00e9rique, il est plus que jamais difficile pour les attaquants de brouiller les pistes.","og_url":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/","og_site_name":"Africa Defense Forum","article_publisher":"https:\/\/www.facebook.com\/ADFmagazine\/","article_published_time":"2023-06-20T19:07:07+00:00","article_modified_time":"2023-06-20T19:07:39+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/06\/GettyImages-1228221361.jpg","type":"image\/jpeg"}],"author":"ADF","twitter_card":"summary_large_image","twitter_creator":"@ADFmagazine","twitter_site":"@ADFmagazine","twitter_misc":{"\u00c9crit par":"ADF","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/#article","isPartOf":{"@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/"},"author":{"name":"ADF","@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025"},"headline":"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines","datePublished":"2023-06-20T19:07:07+00:00","dateModified":"2023-06-20T19:07:39+00:00","mainEntityOfPage":{"@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/"},"wordCount":596,"commentCount":0,"image":{"@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/#primaryimage"},"thumbnailUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/06\/GettyImages-1228221361.jpg","articleSection":["Actualit\u00e9s du Jour"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/","url":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/","name":"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines - Africa Defense Forum","isPartOf":{"@id":"https:\/\/adf-magazine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/#primaryimage"},"image":{"@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/#primaryimage"},"thumbnailUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/06\/GettyImages-1228221361.jpg","datePublished":"2023-06-20T19:07:07+00:00","dateModified":"2023-06-20T19:07:39+00:00","author":{"@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025"},"breadcrumb":{"@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/#primaryimage","url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/06\/GettyImages-1228221361.jpg","contentUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2023\/06\/GettyImages-1228221361.jpg","width":1024,"height":683,"caption":"Un membre de la Red Hacker Alliance qui refuse de donner son vrai nom utilise son ordinateur dans les bureaux du groupe \u00e0 Dongguan (Chine). GETTY IMAGES"},{"@type":"BreadcrumbList","@id":"https:\/\/adf-magazine.com\/fr\/2023\/06\/les-empreintes-numeriques-permettent-de-reveler-les-actions-clandestines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"page d\u2019accueil","item":"https:\/\/adf-magazine.com\/"},{"@type":"ListItem","position":2,"name":"Les empreintes num\u00e9riques permettent de r\u00e9v\u00e9ler les actions clandestines"}]},{"@type":"WebSite","@id":"https:\/\/adf-magazine.com\/#website","url":"https:\/\/adf-magazine.com\/","name":"Africa Defense Forum","description":"Africa Defense Forum","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adf-magazine.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025","name":"ADF","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","contentUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","caption":"ADF"},"description":"ADF is a professional military magazine published quarterly by U.S. Africa Command to provide an international forum for African security professionals. ADF covers topics such as counter terrorism strategies, security and defense operations, transnational crime, and all other issues affecting peace, stability, and good governance on the African continent.","sameAs":["https:\/\/x.com\/ADFmagazine"],"url":"https:\/\/adf-magazine.com\/fr\/author\/adf\/"}]}},"_links":{"self":[{"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/posts\/106835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/comments?post=106835"}],"version-history":[{"count":0,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/posts\/106835\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/media\/106828"}],"wp:attachment":[{"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/media?parent=106835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/categories?post=106835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/tags?post=106835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}