{"id":1481,"date":"2016-07-06T09:56:09","date_gmt":"2016-07-06T07:56:09","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=1481"},"modified":"2023-03-14T08:57:17","modified_gmt":"2023-03-14T07:57:17","slug":"terroristen-im-cyberraum","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/terroristen-im-cyberraum\/","title":{"rendered":"Les terroristes dans le cyberespace"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1482 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg\" width=\"680\" height=\"444\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security-375x245.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>M\u00eame si, contrairement aux cybercriminels et aux espions, les terroristes en ligne accordent une grande importance \u00e0 la visibilit\u00e9 sur Internet et sur les canaux sociaux, ils utilisent des services et des outils de cryptage et d'anonymisation pour ne pas \u00eatre localis\u00e9s et attrap\u00e9s. Il s'agit bien s\u00fbr de Tor pour l'acc\u00e8s anonyme au web, de Cloudfare pour masquer les adresses web, de SIGAINT, Ruggedinbox et Mail2Tor comme services de messagerie s\u00e9curis\u00e9s, mais aussi des services de messagerie instantan\u00e9e Wickr, Surespot, Signal, Threema et Telegram, ce dernier semblant \u00eatre le favori absolu des terroristes en ligne avec un taux d'utilisation de 34%. Pour l'\u00e9change s\u00e9curis\u00e9 de fichiers, ils utilisent top4top.net, Sendspace et SecureDrop. Ce comportement correspond \u00e0 celui que l'on attendrait des cybercriminels et des espions.<\/p>\n<p>En revanche, il y a aussi des \u00e9carts. Celles-ci refl\u00e8tent l'\u00e9volution selon laquelle les terroristes en ligne doivent apparemment mieux se cacher sur Internet qu'il y a quelques ann\u00e9es. C'est pourquoi ils recourent de plus en plus \u00e0 des outils d\u00e9velopp\u00e9s par leurs soins. Il semble que cette \u00e9volution soit li\u00e9e \u00e0 la pression et au succ\u00e8s accrus des enqu\u00eates men\u00e9es par les autorit\u00e9s internationales sur les milieux cybercriminels. Le site <a href=\"https:\/\/blog.trendmicro.de\/der-lange-arm-des-gesetzes-mehrere-cyberkriminelle-hinter-gitter\/\" target=\"_blank\" data-cke-saved-href=\"https:\/\/blog.trendmicro.de\/der-lange-arm-des-gesetzes-mehrere-cyberkriminelle-hinter-gitter\/\" rel=\"noopener\">Arrestations et condamnations<\/a> de ces derniers temps parlent d'eux-m\u00eames ici.<\/p>\n<p>Parmi les principaux outils sp\u00e9ciaux utilis\u00e9s notamment par les terroristes \u00e0 motivation islamiste, on peut citer<\/p>\n<ul>\n<li><em>Les secrets de Mojahedeen :<\/em> Il s'agit d'une application de cryptage consid\u00e9r\u00e9e comme \"professionnelle\" pour la communication par e-mail, disponible depuis 2007 et apparemment d\u00e9velopp\u00e9e comme alternative \u00e0 PGP 2.<\/li>\n<li><em>Tashfeer al-Jawwal :<\/em> Cette application a \u00e9t\u00e9 d\u00e9velopp\u00e9e et publi\u00e9e en 2013 par le Global Islamic Media Front (GIMF). En tant qu'application de cryptage, elle sert \u00e0 s\u00e9curiser les t\u00e9l\u00e9phones portables, l'un des principaux moyens de communication des terroristes.<\/li>\n<li><em>Asrar al-Dardashah :<\/em> Il est ainsi possible de crypter des \"messages instantan\u00e9s\" en appuyant sur un bouton et de les envoyer via l'application de messagerie instantan\u00e9e Pidgin.<\/li>\n<li><em>Amn al-Mujahed :<\/em> Ce logiciel, disponible depuis 2013 et toujours en cours de d\u00e9veloppement, crypte les messages pour diff\u00e9rentes plateformes, pour le courrier \u00e9lectronique, les SMS et la messagerie instantan\u00e9e. L'auteur est le comit\u00e9 technique Al-Fajr (ATC).<\/li>\n<li><em>Alemarah :<\/em> Cette application Android sert \u00e0 diffuser des informations sur les attentats terroristes. Les utilisateurs re\u00e7oivent des flux d'informations, des sites web et des entr\u00e9es de calendrier contenant des informations sur les op\u00e9rations terroristes en cours.<\/li>\n<li><em>Amaq v 1.1 :<\/em> Cette application Android sert \u00e9galement \u00e0 la propagande, \u00e0 la diff\u00e9rence que la version 2.1 actuelle permet de modifier sans probl\u00e8me l'URL sous laquelle l'application est h\u00e9berg\u00e9e. Par cons\u00e9quent, m\u00eame si un site Web est d\u00e9connect\u00e9, la communication n'est pas totalement interrompue, mais seulement temporairement - une tactique \u00e9galement appr\u00e9ci\u00e9e des cybercriminels.<\/li>\n<li><em>Outil DDOS :<\/em> Il s'agit manifestement de l'\u0153uvre d'un sympathisant d'un groupe terroriste particulier. Elle permet des attaques par d\u00e9ni de service limit\u00e9es via la technique SYN-Flood.<\/li>\n<\/ul>\n<p>M\u00eame si les terroristes utilisent des outils d\u00e9velopp\u00e9s par leurs soins, les techniques utilis\u00e9es, comme le cryptage ou les attaques DoS, se recoupent. Les principales diff\u00e9rences avec les cybercriminels se situent donc toujours au niveau des motivations et de leur rapport \u00e0 la propagande. Cela ne facilite certes pas le travail des enqu\u00eateurs. En effet, plus les gangsters et les espions en ligne font des progr\u00e8s techniques, plus il faut s'attendre \u00e0 ce que les terroristes en ligne profitent \u00e9galement de ces \u00e9volutions, que ce soit sous la forme d'outils d\u00e9velopp\u00e9s en interne ou non. Mais savoir quels outils et techniques ils utilisent est certainement le premier pas dans la bonne direction.<\/p>\n<p>Pour plus de d\u00e9tails sur les conclusions de Trend-Micro sur les similitudes et les diff\u00e9rences dans l'utilisation des techniques et des outils entre les criminels et les terroristes en ligne, voir <a href=\"https:\/\/www.trendmicro.de\/media\/wp\/dunkle-absichten-online-whitepaper-de.pdf\" target=\"_blank\" data-cke-saved-href=\"https:\/\/www.trendmicro.de\/media\/wp\/dunkle-absichten-online-whitepaper-de.pdf\" rel=\"noopener\">ici<\/a>.<\/p>\n<p><em>Commentaire de l'expert en s\u00e9curit\u00e9 Udo Schneider, porte-parole du fournisseur japonais de s\u00e9curit\u00e9 informatique <a href=\"https:\/\/www.trendmicro.de\" target=\"_blank\" data-cke-saved-href=\"https:\/\/www.trendmicro.de\" rel=\"noopener\">Trend Micro<\/a><\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Auch wenn Online-Terroristen im Gegensatz zu Cyberkriminellen und -spionen im Internet und auf sozialen Kan\u00e4len Wert auf eine m\u00f6glichst hohe Sichtbarkeit legen, nutzen sie Verschl\u00fcsselungs- sowie Anonymisierungsdienste und -werkzeuge, um nicht lokalisiert und gefasst zu werden. Dazu z\u00e4hlen nat\u00fcrlich Tor f\u00fcr den anonymen Webzugang, Cloudfare zur Verschleierung von Webadressen, SIGAINT, Ruggedinbox und Mail2Tor als sichere [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1482,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[63,43],"class_list":["post-1481","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-it-security","tag-terrorismus"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Cyberraum","_yoast_wpseo_opengraph-image":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","_yoast_wpseo_opengraph-description":"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen. Wer ihn also bek\u00e4mpfen will, muss verstehen, welche Werkzeuge und Techniken er nutzt. Ein Team des \u201eForward Looking Threat Research\u201c hat deshalb untersucht, wo es Gemeinsamkeiten, aber auch Unterschiede zwischen \u201egew\u00f6hnlichen\u201c Cyberkriminellen und Online-Terroristen gibt. Eine der wichtigsten Erkenntnisse ist: Die Professionalit\u00e4t ist bei beiden Gruppen mittlerweile gleich hoch und steigt weiter.","_yoast_wpseo_opengraph-title":"Terroristen im Cyberraum","enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Terroristen im Cyberraum - Save<\/title>\n<meta name=\"description\" content=\"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/terroristen-im-cyberraum\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Terroristen im Cyberraum\" \/>\n<meta property=\"og:description\" content=\"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen. Wer ihn also bek\u00e4mpfen will, muss verstehen, welche Werkzeuge und Techniken er nutzt. Ein Team des \u201eForward Looking Threat Research\u201c hat deshalb untersucht, wo es Gemeinsamkeiten, aber auch Unterschiede zwischen \u201egew\u00f6hnlichen\u201c Cyberkriminellen und Online-Terroristen gibt. Eine der wichtigsten Erkenntnisse ist: Die Professionalit\u00e4t ist bei beiden Gruppen mittlerweile gleich hoch und steigt weiter.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/terroristen-im-cyberraum\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-06T07:56:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"Terroristen im Cyberraum\",\"datePublished\":\"2016-07-06T07:56:09+00:00\",\"dateModified\":\"2023-03-14T07:57:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\"},\"wordCount\":550,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Terroristen-im-Cyberraum-it-security.jpg\",\"keywords\":[\"IT-SECURITY\",\"Terrorismus\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\",\"name\":\"Terroristen im Cyberraum - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Terroristen-im-Cyberraum-it-security.jpg\",\"datePublished\":\"2016-07-06T07:56:09+00:00\",\"dateModified\":\"2023-03-14T07:57:17+00:00\",\"description\":\"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Terroristen-im-Cyberraum-it-security.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Terroristen-im-Cyberraum-it-security.jpg\",\"width\":1000,\"height\":653},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/terroristen-im-cyberraum\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Terroristen im Cyberraum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les terroristes dans le cyberespace - Save","description":"Le terrorisme international d'aujourd'hui d\u00e9pend essentiellement de sa pr\u00e9sence dans le cyberespace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/terroristen-im-cyberraum\/","og_locale":"fr_FR","og_type":"article","og_title":"Terroristen im Cyberraum","og_description":"Der internationale Terrorismus von heute ist wesentlich auf seine Pr\u00e4senz im Cyberraum angewiesen. Wer ihn also bek\u00e4mpfen will, muss verstehen, welche Werkzeuge und Techniken er nutzt. Ein Team des \u201eForward Looking Threat Research\u201c hat deshalb untersucht, wo es Gemeinsamkeiten, aber auch Unterschiede zwischen \u201egew\u00f6hnlichen\u201c Cyberkriminellen und Online-Terroristen gibt. Eine der wichtigsten Erkenntnisse ist: Die Professionalit\u00e4t ist bei beiden Gruppen mittlerweile gleich hoch und steigt weiter.","og_url":"https:\/\/news.save.ch\/fr\/terroristen-im-cyberraum\/","og_site_name":"Save","article_published_time":"2016-07-06T07:56:09+00:00","article_modified_time":"2023-03-14T07:57:17+00:00","og_image":[{"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"Terroristen im Cyberraum","datePublished":"2016-07-06T07:56:09+00:00","dateModified":"2023-03-14T07:57:17+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/"},"wordCount":550,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","keywords":["IT-SECURITY","Terrorismus"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/","url":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/","name":"Les terroristes dans le cyberespace - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","datePublished":"2016-07-06T07:56:09+00:00","dateModified":"2023-03-14T07:57:17+00:00","description":"Le terrorisme international d'aujourd'hui d\u00e9pend essentiellement de sa pr\u00e9sence dans le cyberespace.","breadcrumb":{"@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/terroristen-im-cyberraum\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Terroristen-im-Cyberraum-it-security.jpg","width":1000,"height":653},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/terroristen-im-cyberraum\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Terroristen im Cyberraum"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=1481"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1481\/revisions"}],"predecessor-version":[{"id":17608,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/1481\/revisions\/17608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/1482"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=1481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=1481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=1481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}