{"id":3198,"date":"2025-03-20T08:09:02","date_gmt":"2025-03-20T07:09:02","guid":{"rendered":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/"},"modified":"2025-03-20T08:09:02","modified_gmt":"2025-03-20T07:09:02","slug":"guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi","status":"publish","type":"post","link":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/","title":{"rendered":"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi"},"content":{"rendered":"<p>En avril 2024, l\u2019Australian Federal Police a ouvert une enqu\u00eate mettant en lumi\u00e8re des vols de donn\u00e9es op\u00e9r\u00e9s sur plusieurs vols int\u00e9rieurs. Le mis en cause utilisait un dispositif Wi-Fi Evil Twin afin de r\u00e9cup\u00e9rer les donn\u00e9es personnelles des voyageurs.\u00a0Encore largement m\u00e9connu, les Wi-fi Evil Twin pourraient bien devenir une menace \u00e9mergente et un outil de collecte de donn\u00e9es tr\u00e8s efficaces dans un contexte d\u2019espionnage industriel.\u00a0<br \/>\nL\u2019article Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi est apparu en premier sur Portail de l&rsquo;IE.\u00a0<a href=\"https:\/\/www.portail-ie.fr\/univers\/2025\/guerre-informationnelle\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\">Read More<\/a>\u00a0Portail de l&rsquo;IE\u00a0<\/p>\n<p>\u200b\u00a0\u00a0<\/p>\n<p>\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>En avril 2024, l\u2019Australian Federal Police a ouvert une enqu\u00eate mettant en lumi\u00e8re des vols de donn\u00e9es op\u00e9r\u00e9s sur plusieurs vols int\u00e9rieurs. Le mis en cause utilisait un dispositif Wi-Fi Evil Twin afin de r\u00e9cup\u00e9rer les donn\u00e9es personnelles des voyageurs.\u00a0Encore largement m\u00e9connu, les Wi-fi Evil Twin pourraient bien devenir une menace \u00e9mergente et un outil&#8230;<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-3198","post","type-post","status-publish","format-standard","hentry","category-portail-de-lintelligence-economique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi - Revue Internationale d&#039;Intelligence Economique<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi - Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"og:description\" content=\"En avril 2024, l\u2019Australian Federal Police a ouvert une enqu\u00eate mettant en lumi\u00e8re des vols de donn\u00e9es op\u00e9r\u00e9s sur plusieurs vols int\u00e9rieurs. Le mis en cause utilisait un dispositif Wi-Fi Evil Twin afin de r\u00e9cup\u00e9rer les donn\u00e9es personnelles des voyageurs.\u00a0Encore largement m\u00e9connu, les Wi-fi Evil Twin pourraient bien devenir une menace \u00e9mergente et un outil...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/\" \/>\n<meta property=\"og:site_name\" content=\"Revue Internationale d&#039;Intelligence Economique\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-20T07:09:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi\",\"datePublished\":\"2025-03-20T07:09:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/\"},\"wordCount\":127,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"articleSection\":[\"Portail de l'intelligence \u00e9conomique\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/\",\"url\":\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/\",\"name\":\"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi - Revue Internationale d&#039;Intelligence Economique\",\"isPartOf\":{\"@id\":\"https:\/\/www.r2ie.org\/#website\"},\"datePublished\":\"2025-03-20T07:09:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.r2ie.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.r2ie.org\/#website\",\"url\":\"https:\/\/www.r2ie.org\/\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.r2ie.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.r2ie.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.r2ie.org\/#organization\",\"name\":\"Revue Internationale d&#039;Intelligence Economique\",\"url\":\"https:\/\/www.r2ie.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"contentUrl\":\"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp\",\"width\":654,\"height\":251,\"caption\":\"Revue Internationale d&#039;Intelligence Economique\"},\"image\":{\"@id\":\"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi - Revue Internationale d&#039;Intelligence Economique","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/","og_locale":"fr_FR","og_type":"article","og_title":"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi - Revue Internationale d&#039;Intelligence Economique","og_description":"En avril 2024, l\u2019Australian Federal Police a ouvert une enqu\u00eate mettant en lumi\u00e8re des vols de donn\u00e9es op\u00e9r\u00e9s sur plusieurs vols int\u00e9rieurs. Le mis en cause utilisait un dispositif Wi-Fi Evil Twin afin de r\u00e9cup\u00e9rer les donn\u00e9es personnelles des voyageurs.\u00a0Encore largement m\u00e9connu, les Wi-fi Evil Twin pourraient bien devenir une menace \u00e9mergente et un outil...","og_url":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/","og_site_name":"Revue Internationale d&#039;Intelligence Economique","article_published_time":"2025-03-20T07:09:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/#article","isPartOf":{"@id":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/"},"author":{"name":"","@id":""},"headline":"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi","datePublished":"2025-03-20T07:09:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/"},"wordCount":127,"commentCount":0,"publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"articleSection":["Portail de l'intelligence \u00e9conomique"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/","url":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/","name":"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi - Revue Internationale d&#039;Intelligence Economique","isPartOf":{"@id":"https:\/\/www.r2ie.org\/#website"},"datePublished":"2025-03-20T07:09:02+00:00","breadcrumb":{"@id":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.r2ie.org\/index.php\/2025\/03\/20\/guerre-informationnelle-et-vol-de-donnees-lusage-meconnu-des-evils-twins-en-wi-fi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.r2ie.org\/"},{"@type":"ListItem","position":2,"name":"Guerre informationnelle et vol de donn\u00e9es : l\u2019usage m\u00e9connu des\u00a0Evils Twins en Wi-Fi"}]},{"@type":"WebSite","@id":"https:\/\/www.r2ie.org\/#website","url":"https:\/\/www.r2ie.org\/","name":"Revue Internationale d&#039;Intelligence Economique","description":"","publisher":{"@id":"https:\/\/www.r2ie.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.r2ie.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.r2ie.org\/#organization","name":"Revue Internationale d&#039;Intelligence Economique","url":"https:\/\/www.r2ie.org\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","contentUrl":"https:\/\/www.r2ie.org\/wp-content\/uploads\/2023\/01\/cropped-cropped-logo-r2ie-dc3a9gradc3a9.webp","width":654,"height":251,"caption":"Revue Internationale d&#039;Intelligence Economique"},"image":{"@id":"https:\/\/www.r2ie.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/3198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/comments?post=3198"}],"version-history":[{"count":0,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/posts\/3198\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/media?parent=3198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/categories?post=3198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.r2ie.org\/index.php\/wp-json\/wp\/v2\/tags?post=3198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}