{"id":5390,"date":"2025-06-29T00:05:06","date_gmt":"2025-06-29T00:05:06","guid":{"rendered":"https:\/\/cisanewsletter.com\/index.php\/lutte-contre-le-terrorisme-se-concentrer-sur-lexterieur-tout-en-negligeant-le-diable-a-linterieur\/"},"modified":"2025-06-01T06:00:21","modified_gmt":"2025-06-01T06:00:21","slug":"lutte-contre-le-terrorisme-se-concentrer-sur-lexterieur-tout-en-negligeant-le-diable-a-linterieur","status":"publish","type":"post","link":"https:\/\/cisanewsletter.com\/fr\/index.php\/lutte-contre-le-terrorisme-se-concentrer-sur-lexterieur-tout-en-negligeant-le-diable-a-linterieur\/","title":{"rendered":"Lutte contre le terrorisme : Se concentrer sur l&rsquo;ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l&rsquo;int\u00e9rieur"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n<p><strong>L&rsquo;analogie troyenne<\/strong><\/p>\n\n<p>Dans <em>L&rsquo;\u00c9n\u00e9ide<\/em>, le po\u00e8te romain Virgile raconte la chute de Troie avec force d\u00e9tails. Apr\u00e8s dix ans de si\u00e8ge, l&rsquo;arm\u00e9e grecque semble battre en retraite, laissant derri\u00e8re elle un colossal cheval de bois aux portes. Malgr\u00e9 les avertissements du pr\u00eatre Laoco\u00f6n &#8211;<em> \u00ab\u00a0Time\u014d Dana\u014ds et d\u014dna ferent\u0113s\u00a0\u00bb,<\/em> ou <em>\u00ab\u00a0Je crains les Grecs, m\u00eame lorsqu&rsquo;ils apportent des cadeaux\u00a0\u00bb &#8211; les<\/em>Troyens accueillent le cheval dans leur ville fortifi\u00e9e. \u00c0 l&rsquo;int\u00e9rieur se cachaient des soldats grecs d&rsquo;\u00e9lite qui, \u00e0 la faveur de l&rsquo;obscurit\u00e9, ouvrirent les portes aux forces grecques qui revenaient. Troie, qui s&rsquo;\u00e9tait endormie sur ses lauriers, fut d\u00e9truite non pas de l&rsquo;ext\u00e9rieur, mais de l&rsquo;int\u00e9rieur <sup>[1]<\/sup>.    <\/p>\n\n<p><strong>Le parall\u00e8le moderne : La strat\u00e9gie nordique du Ghana<\/strong><\/p>\n\n<p>Dans le contexte s\u00e9curitaire actuel, cette parabole ancienne constitue un avertissement opportun pour le Ghana, qui \u00e9labore et met en \u0153uvre sa strat\u00e9gie de lutte contre le terrorisme. Le dispositif antiterroriste actuel du Ghana se concentre en grande partie sur le nord, ce qui est justifi\u00e9 compte tenu de l&rsquo;intensification des crises s\u00e9curitaires dans la r\u00e9gion du Sahel. <\/p>\n\n<p>Les groupes arm\u00e9s affili\u00e9s \u00e0 Al-Qa\u00efda et \u00e0 l&rsquo;\u00c9tat islamique ont multipli\u00e9 les op\u00e9rations au Mali, au Burkina Faso et au Niger voisins <sup>[2]<\/sup>. Le Ghana, qui partage ses fronti\u00e8res avec le Burkina Faso et le Togo, est expos\u00e9 \u00e0 un risque accru d&rsquo;infiltration en raison de la porosit\u00e9 des fronti\u00e8res, des liens ethniques et des espaces non gouvern\u00e9s dans les r\u00e9gions frontali\u00e8res <sup>[3]<\/sup>. Le gouvernement ghan\u00e9en a r\u00e9agi en lan\u00e7ant des initiatives telles que l&rsquo;am\u00e9lioration de la surveillance des fronti\u00e8res, des m\u00e9canismes de coordination inter-agences et des programmes d&rsquo;engagement communautaire visant la r\u00e9silience et l&rsquo;alerte pr\u00e9coce <sup>[4]<\/sup>.  <\/p>\n\n<p>Ces efforts sont importants et n\u00e9cessaires. Mais comme les Troyens l&rsquo;ont appris trop tard, il est dangereux de penser que la menace la plus visible est la seule contre laquelle il faille se pr\u00e9munir. <\/p>\n\n<p><strong>La menace n\u00e9glig\u00e9e : Les acteurs solitaires radicalis\u00e9s<\/strong><\/p>\n\n<p>Si le Ghana se concentre sur les menaces ext\u00e9rieures provenant du Sahel, il risque de sous-estimer la menace que repr\u00e9sentent les individus radicalis\u00e9s ou \u00ab acteurs solitaires \u00bb op\u00e9rant \u00e0 l&rsquo;int\u00e9rieur de ses fronti\u00e8res. Ces acteurs sont souvent des citoyens radicalis\u00e9s par des r\u00e9seaux en ligne ou des canaux id\u00e9ologiques locaux, qui agissent ind\u00e9pendamment des groupes organis\u00e9s <sup>[5]<\/sup>. <\/p>\n\n<p>Au niveau mondial, la menace pos\u00e9e par les individus auto-radicalis\u00e9s, souvent inspir\u00e9s par la propagande en ligne, s&rsquo;est intensifi\u00e9e, avec plusieurs attentats r\u00e9cents perp\u00e9tr\u00e9s par des acteurs isol\u00e9s dans des contextes o\u00f9 les services de renseignement traditionnels n&rsquo;ont pas r\u00e9ussi \u00e0 d\u00e9tecter une planification pr\u00e9alable<sup> [6]<\/sup>. Le Ghana a re\u00e7u de nombreuses alertes concernant des citoyens soup\u00e7onn\u00e9s de se rendre dans des zones de conflit ou d&rsquo;en provenir, et certains ont \u00e9t\u00e9 intercept\u00e9s ou expuls\u00e9s<sup> [7]<\/sup>. <\/p>\n\n<p>En outre, les institutions religieuses, les \u00e9tablissements p\u00e9nitentiaires et les communaut\u00e9s urbaines d\u00e9favoris\u00e9es, en particulier parmi les jeunes, ont \u00e9t\u00e9 identifi\u00e9s comme des sites potentiels de radicalisation<sup> [8].<\/sup><\/p>\n\n<p><strong>Une approche \u00e0 double objectif : Vigilance externe et interne<\/strong><\/p>\n\n<p>Pour contrer ces menaces en constante \u00e9volution, la strat\u00e9gie de s\u00e9curit\u00e9 du Ghana doit int\u00e9grer \u00e0 la fois des \u00e9l\u00e9ments tourn\u00e9s vers l&rsquo;ext\u00e9rieur et vers l&rsquo;int\u00e9rieur. Quelques changements strat\u00e9giques pourraient \u00eatre envisag\u00e9s : <\/p>\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>D\u00e9velopper les<\/strong> capacit\u00e9s de <strong>renseignement humain (HUMINT)<\/strong> au-del\u00e0 des fronti\u00e8res, dans les centres urbains et p\u00e9riurbains, o\u00f9 des indicateurs pr\u00e9coces de radicalisation peuvent appara\u00eetre<sup> [9].<\/sup><\/li>\n\n\n\n<li><strong>Investir dans le renseignement cybern\u00e9tique<\/strong> pour surveiller la propagation en ligne des id\u00e9ologies extr\u00e9mistes, des communications crypt\u00e9es et des r\u00e9seaux de haine<sup> [10].<\/sup><\/li>\n\n\n\n<li><strong>Renforcer la r\u00e9silience des communaut\u00e9s<\/strong> en am\u00e9liorant la collaboration avec les chefs religieux, les acteurs de la soci\u00e9t\u00e9 civile et les groupes de jeunes dans les zones vuln\u00e9rables \u00e0 l&rsquo;infiltration id\u00e9ologique <sup>[11].<\/sup><\/li>\n\n\n\n<li><strong>Mettre en place des programmes de d\u00e9radicalisation<\/strong> pour les personnes incarc\u00e9r\u00e9es, les rapatri\u00e9s et les personnes expos\u00e9es au risque de radicalisation, en particulier dans les communaut\u00e9s mal desservies<sup> [12].<\/sup><\/li>\n<\/ol>\n\n<p><strong>Qu&rsquo;est-ce que le terrorisme du loup solitaire ?<\/strong><\/p>\n\n<p>Le terrorisme du loup solitaire d\u00e9signe les actes de terreur perp\u00e9tr\u00e9s par des individus qui agissent de mani\u00e8re ind\u00e9pendante, sans soutien direct ni participation op\u00e9rationnelle de la part d&rsquo;organisations terroristes. Ces individus planifient, lancent et ex\u00e9cutent des attaques de leur propre chef, mus par des motivations et des id\u00e9ologies personnelles plut\u00f4t que par des directives \u00e9manant d&rsquo;un groupe plus important <sup>[13] [14] [15]<\/sup>. <\/p>\n\n<p><strong>  Caract\u00e9ristiques principales :<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>L&rsquo;<strong>ind\u00e9pendance<\/strong>: Les loups solitaires agissent seuls, sans le soutien op\u00e9rationnel d&rsquo;organisations terroristes <sup>[13] [14].<\/sup><\/li>\n\n\n\n<li><strong>Motivations<\/strong>: Leurs motivations peuvent \u00eatre diverses : politiques, religieuses, id\u00e9ologiques, frustrations personnelles ou troubles psychologiques <sup>[15] [16].<\/sup><\/li>\n\n\n\n<li><strong>Difficult\u00e9s de<\/strong><strong>d\u00e9tection<\/strong>: Les m\u00e9thodes traditionnelles d&rsquo;application de la loi, telles que l&rsquo;infiltration ou la mise sur \u00e9coute, sont inefficaces contre les loups solitaires en raison de leur nature solitaire. La d\u00e9tection repose souvent sur l&rsquo;identification de signaux faibles ou de traces num\u00e9riques laiss\u00e9es dans les forums extr\u00e9mistes <sup>[17] [18]<\/sup>. <\/li>\n\n\n\n<li><strong>Armement<\/strong>: Ils peuvent utiliser une vari\u00e9t\u00e9 d&rsquo;armes, y compris des bombes, des armes \u00e0 feu, des couteaux, des v\u00e9hicules et des agents biologiques, ce qui entra\u00eene souvent des pertes massives <sup>[15] [19].<\/sup><\/li>\n\n\n\n<li><strong>Profil<\/strong><strong>psychologique<\/strong>: Les terroristes solitaires ont tendance \u00e0 \u00eatre socialement isol\u00e9s et peuvent pr\u00e9senter des taux \u00e9lev\u00e9s de troubles psychologiques <sup>[16] [20].<\/sup><\/li>\n<\/ul>\n\n<p><strong>Contexte historique<\/strong><\/p>\n\n<p>Le terrorisme du loup solitaire a une longue histoire, avec des cas remontant \u00e0 plus de 150 ans. Les motivations et les contextes ont \u00e9volu\u00e9, notamment avec l&rsquo;essor d&rsquo;Internet, qui a facilit\u00e9 la diffusion d&rsquo;id\u00e9ologies extr\u00e9mistes <sup>[22].<\/sup> <\/p>\n\n<p><strong>Implications pour la s\u00e9curit\u00e9<\/strong><\/p>\n\n<p><strong>D\u00e9tection et pr\u00e9vention<\/strong>: Pour \u00eatre efficaces, les contre-mesures doivent se concentrer sur les caract\u00e9ristiques et les activit\u00e9s comportementales plut\u00f4t que sur les seules id\u00e9ologies extr\u00e9mistes. Le renseignement financier et les mesures de pr\u00e9vention de la criminalit\u00e9 situationnelle peuvent aider \u00e0 identifier et \u00e0 pr\u00e9venir les attaques de loups solitaires <sup>[23] [24]<\/sup>. <\/p>\n\n<p><strong>R\u00e9ponse politique<\/strong>: Des r\u00e9ponses politiques muscl\u00e9es peuvent s&rsquo;av\u00e9rer contre-productives. Il est essentiel de comprendre les motivations et les profils psychologiques des loups solitaires pour \u00e9laborer des strat\u00e9gies antiterroristes efficaces <sup>[18] [25]<\/sup>. <\/p>\n\n<p>En r\u00e9sum\u00e9, le terrorisme des loups solitaires se caract\u00e9rise par l&rsquo;ind\u00e9pendance des attaquants, la diversit\u00e9 de leurs motivations et des d\u00e9fis importants en mati\u00e8re de d\u00e9tection et de pr\u00e9vention. Il est essentiel de comprendre les aspects psychologiques et comportementaux de ces individus pour \u00e9laborer des contre-mesures efficaces. <\/p>\n\n<p>Comme l&rsquo;indique le titre, il s&rsquo;agit d&rsquo;un pr\u00e9lude. Dans les publications suivantes, le terroriste solitaire sera sur la table d&rsquo;op\u00e9ration et \u00e9tudi\u00e9 en profondeur de telle sorte que, au mieux, un scanner sera fourni pour l&rsquo;identification du contenu du cheval de Troie ou, au pire, qu&rsquo;il faudra se m\u00e9fier des cadeaux envoy\u00e9s par les Grecs.<\/p>\n\n<p><strong>Apprendre de Troy<\/strong><\/p>\n\n<p>La chute de Troie n&rsquo;a pas \u00e9t\u00e9 le r\u00e9sultat d&rsquo;une force sup\u00e9rieure, mais d&rsquo;une d\u00e9faillance de la s\u00e9curit\u00e9 caus\u00e9e par une attention mal cibl\u00e9e. L&rsquo;accent mis par le Ghana sur les menaces du Nord, s&rsquo;il est justifi\u00e9, ne doit pas se faire au d\u00e9triment de la vigilance \u00e0 l&rsquo;int\u00e9rieur de ses propres fronti\u00e8res. La radicalisation peut prendre racine silencieusement dans les salles de classe, sur les m\u00e9dias sociaux, dans les prisons ou dans le c\u0153ur des personnes d\u00e9sabus\u00e9es.  <\/p>\n\n<p>Comme les Troyens, nous risquons d&rsquo;\u00eatre vaincus non pas par ce qui vient de l&rsquo;ext\u00e9rieur, mais par ce qui est d\u00e9j\u00e0 entr\u00e9 sans \u00eatre d\u00e9tect\u00e9. La le\u00e7on demeure : <em>M\u00e9fiez-vous des Grecs qui apportent des cadeaux.<\/em> <\/p>\n\n<p>R\u00e9f\u00e9rences<\/p>\n\n<ol class=\"wp-block-list\">\n<li>Virgile. (2008). <em>L&rsquo;En\u00e9ide<\/em> (R. Fagles, Trans.). Penguin Classics. (\u0152uvre originale publi\u00e9e vers 19 avant notre \u00e8re)   <\/li>\n\n\n\n<li>Institut pour l&rsquo;\u00e9conomie et la paix. (2024). <em>Indice mondial du terrorisme 2024.<\/em> <a href=\"https:\/\/www.visionofhumanity.org\">https:\/\/www.visionofhumanity.org<\/a> <\/li>\n\n\n\n<li>Centre africain pour l&rsquo;\u00e9tude et la recherche sur le terrorisme. (2022). <em>\u00c9valuations trimestrielles des menaces r\u00e9gionales<\/em>. <\/li>\n\n\n\n<li>Minist\u00e8re de la s\u00e9curit\u00e9 nationale, Ghana. (2021). <em>Cadre national pour la pr\u00e9vention et la lutte contre l&rsquo;extr\u00e9misme violent (P\/CVE)<\/em>. <\/li>\n\n\n\n<li>Bureau des Nations unies pour la lutte contre le terrorisme. (2023). <em>Manuel sur la lutte contre l&rsquo;appel au terrorisme en ligne et hors ligne<\/em>. <\/li>\n\n\n\n<li>Direction ex\u00e9cutive du Comit\u00e9 contre le terrorisme des Nations unies (CTED). (2023). <em>Trends Alert : Online Extremism and the Lone Actor Threat (Alerte aux tendances : l&rsquo;extr\u00e9misme en ligne et la menace de l&rsquo;acteur solitaire<\/em>). <\/li>\n\n\n\n<li>Service d&rsquo;immigration du Ghana. (2023). <em>Briefing annuel de s\u00e9curit\u00e9 sur les mouvements frontaliers et les interceptions<\/em>. <\/li>\n\n\n\n<li>Institut d&rsquo;\u00e9tudes de s\u00e9curit\u00e9 (ISS Afrique). (2021). <em>Comprendre la radicalisation en Afrique de l&rsquo;Ouest<\/em>. <\/li>\n\n\n\n<li>PNUD Ghana. (2023). <em>Vuln\u00e9rabilit\u00e9 des jeunes et extr\u00e9misme violent dans les zones urbaines du Ghana<\/em>. <\/li>\n\n\n\n<li>Centre international d&rsquo;\u00e9tude de la radicalisation (ICSR). (2022). <em>Encrypted Messaging and the Evolution of the Lone Wolf Threat (Messagerie crypt\u00e9e et \u00e9volution de la menace du loup solitaire<\/em>). <\/li>\n\n\n\n<li>Institut Tony Blair pour le changement mondial. (2021). <em>Lutter contre l&rsquo;extr\u00e9misme gr\u00e2ce \u00e0 des partenariats confessionnels en Afrique subsaharienne<\/em>. <\/li>\n\n\n\n<li>Organisation internationale pour les migrations (OIM) Ghana. (2022). <em>\u00c9valuation des programmes de r\u00e9int\u00e9gration communautaire et de d\u00e9radicalisation<\/em>. <\/li>\n\n\n\n<li>Perspectives sur le terrorisme. (2021). Comprendre les motivations des terroristes \u00ab loups solitaires \u00bb : Le mod\u00e8le de la \u00ab baignoire \u00bb. <em>Perspectives on Terrorism, 15<\/em>(6), 85-97.<\/li>\n\n\n\n<li>Ganor, B. (2023). Comprendre les motivations des terroristes \u00ab loups solitaires \u00bb : The \u00ab bathtub \u00bb model. In M. Ranstorp (Ed.), <em>Routledge Handbook of Transnational Terrorism<\/em> (pp. 342-355).   Routledge.<\/li>\n\n\n\n<li>Gordon, T., Sharan, Y. et Florescu, E. (2015). Prospects for lone wolf and SIMAD terrorism (Perspectives pour le loup solitaire et le terrorisme SIMAD). <em>Technological Forecasting and Social Change, 95<\/em>, 234-256.  https:\/\/doi.org\/10.1016\/j.techfore.2014.10.009<\/li>\n\n\n\n<li>Spaaij, R. (2010). L&rsquo;\u00e9nigme du terrorisme du loup solitaire : An assessment. <em>Studies in Conflict &amp; Terrorism, 33<\/em>(9), 854-870.  https:\/\/doi.org\/10.1080\/1057610X.2010.501426<\/li>\n\n\n\n<li>Cohen, K., Johansson, F., Kaati, L. et Mork, J. C. (2014). D\u00e9tecter les marqueurs linguistiques de la violence radicale dans les m\u00e9dias sociaux. <em>Terrorism and Political Violence, 26<\/em>(1), 246-256.  https:\/\/doi.org\/10.1080\/09546553.2014.849948<\/li>\n\n\n\n<li>Barnes, B. D. (2012). Faire face \u00e0 la meute de loups solitaires : Adapting law enforcement and prosecution responses to the threat of lone wolf terrorism. <em>Boston University Law Review, 92<\/em>(5), 1613-1662. <\/li>\n\n\n\n<li>McCulloch, J., Walklate, S., Maher, J. M., Fitz-Gibbon, K. et McGowan, J. (2019). Le terrorisme du loup solitaire \u00e0 travers une lentille sexu\u00e9e : Des hommes qui deviennent violents ou des hommes violents qui se comportent de mani\u00e8re violente ? <em>Critical Criminology, 27<\/em>, 437-450.  https:\/\/doi.org\/10.1007\/s10612-018-9401-3<\/li>\n\n\n\n<li>Smith, B. L., Gruenewald, J., Roberts, P. et Damphousse, K. R. (2015). L&rsquo;\u00e9mergence du terrorisme du loup solitaire : Patterns of behavior and implications for intervention. <em>Sociology of Crime, Law and Deviance, 20<\/em>, 89-110.  https:\/\/doi.org\/10.1108\/S1521-613620150000020004<\/li>\n\n\n\n<li>Phillips, P. J. (2011). Lone wolf terrorism. <em>Peace Economics, Peace Science and Public Policy, 17<\/em>(1), 1-15.  https:\/\/doi.org\/10.2202\/1554-8597.1206<\/li>\n\n\n\n<li>Feldman, M. (2013). Comparative lone wolf terrorism : Toward a heuristic definition. <em>Democracy and Security, 9<\/em>(1-2), 52-70.  https:\/\/doi.org\/10.1080\/17419166.2013.747928<\/li>\n\n\n\n<li>Tierney, M. (2017). Rep\u00e9rer l&rsquo;acteur solitaire : Combating lone wolf terrorism through financial investigations. <em>Journal of Financial Crime, 24<\/em>(2), 292-298.  https:\/\/doi.org\/10.1108\/JFC-03-2016-0015<\/li>\n\n\n\n<li>Perry, S., Hasisi, B. et Perry, G. (2019). Lone terrorists : Une \u00e9tude des attaques par \u00e9crasement en Isra\u00ebl. <em>European Journal of Criminology, 16<\/em>(1), 102-123.  https:\/\/doi.org\/10.1177\/1477370818764143<\/li>\n\n\n\n<li>Al-Bayati, A. T. H. (2017). <em>Une nouvelle strat\u00e9gie de lutte contre le terrorisme : Pourquoi le monde n&rsquo;a pas r\u00e9ussi \u00e0 arr\u00eater Al-Qa\u00efda et ISIS\/ISIL, et comment vaincre les terroristes<\/em>. Praeger Security International. <\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Introduction L&rsquo;analogie troyenne Dans L&rsquo;\u00c9n\u00e9ide, le po\u00e8te romain Virgile raconte la chute de Troie avec force d\u00e9tails. Apr\u00e8s dix ans de si\u00e8ge, l&rsquo;arm\u00e9e grecque semble battre en retraite, laissant derri\u00e8re elle un colossal cheval de bois aux portes. Malgr\u00e9 les avertissements du pr\u00eatre Laoco\u00f6n &#8211; \u00ab\u00a0Time\u014d Dana\u014ds et d\u014dna ferent\u0113s\u00a0\u00bb, ou \u00ab\u00a0Je crains les Grecs, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jnews-multi-image_gallery":[],"jnews_single_post":{"subtitle":"","format":"standard","video":"","gallery":"","source_name":"CISA ANALYST","source_url":"cisanewsletter.com","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"0","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":"","disable_ad":"0"},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_review":[],"enable_review":"0","type":"percentage","name":"","summary":"","brand":"","sku":"","good":[{"good_text":""}],"bad":[{"bad_text":""}],"score_override":"","override_value":"","rating":[{"rating_text":"","rating_number":"10"}],"price":[{"shop":"","price":"","link":"","icon":""}],"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"jnews_post_split":{"enable_post_split":"0","post_split":[{"template":"1","tag":"h2","numbering":"asc","mode":"normal","first":"0","enable_toc":"0","toc_type":"normal"}]},"footnotes":""},"categories":[187],"tags":[226,240],"class_list":["post-5390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analyse","tag-2025-fr","tag-6th-edition-2025-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lutte contre le terrorisme : Se concentrer sur l&#039;ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l&#039;int\u00e9rieur - CISA NEWSLETTER<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lutte contre le terrorisme : Se concentrer sur l&#039;ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l&#039;int\u00e9rieur - CISA NEWSLETTER\" \/>\n<meta property=\"og:description\" content=\"Introduction L&rsquo;analogie troyenne Dans L&rsquo;\u00c9n\u00e9ide, le po\u00e8te romain Virgile raconte la chute de Troie avec force d\u00e9tails. Apr\u00e8s dix ans de si\u00e8ge, l&rsquo;arm\u00e9e grecque semble battre en retraite, laissant derri\u00e8re elle un colossal cheval de bois aux portes. Malgr\u00e9 les avertissements du pr\u00eatre Laoco\u00f6n &#8211; \u00ab\u00a0Time\u014d Dana\u014ds et d\u014dna ferent\u0113s\u00a0\u00bb, ou \u00ab\u00a0Je crains les Grecs, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/\" \/>\n<meta property=\"og:site_name\" content=\"CISA NEWSLETTER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61558173539135\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-29T00:05:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2025\/05\/counter-terrorism.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"638\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CISA EDITORIAL\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CisaSocial\" \/>\n<meta name=\"twitter:site\" content=\"@CisaSocial\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"CISA EDITORIAL\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/\"},\"author\":{\"name\":\"CISA EDITORIAL\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/person\\\/a0e04c9eece75fa21ae2273867968b01\"},\"headline\":\"Lutte contre le terrorisme : Se concentrer sur l&rsquo;ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l&rsquo;int\u00e9rieur\",\"datePublished\":\"2025-06-29T00:05:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/\"},\"wordCount\":1999,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/counter-terrorism.jpg\",\"keywords\":[\"2025\",\"6th Edition 2025\"],\"articleSection\":[\"ANALYSE\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/\",\"name\":\"Lutte contre le terrorisme : Se concentrer sur l'ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l'int\u00e9rieur - CISA NEWSLETTER\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/counter-terrorism.jpg\",\"datePublished\":\"2025-06-29T00:05:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/counter-terrorism.jpg\",\"contentUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/counter-terrorism.jpg\",\"width\":1000,\"height\":638},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cisanewsletter.com\\\/index.php\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lutte contre le terrorisme : Se concentrer sur l&#8217;ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l&#8217;int\u00e9rieur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#website\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/\",\"name\":\"CISA NEWSLETTER\",\"description\":\"Headlining West African News\",\"publisher\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cisanewsletter.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#organization\",\"name\":\"Centre for Intelligence & Security Analysis Ghana\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cisaghana.png\",\"contentUrl\":\"https:\\\/\\\/cisanewsletter.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cisaghana.png\",\"width\":1055,\"height\":1063,\"caption\":\"Centre for Intelligence & Security Analysis Ghana\"},\"image\":{\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61558173539135\",\"https:\\\/\\\/x.com\\\/CisaSocial\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cisanewsletter.com\\\/#\\\/schema\\\/person\\\/a0e04c9eece75fa21ae2273867968b01\",\"name\":\"CISA EDITORIAL\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g\",\"caption\":\"CISA EDITORIAL\"},\"sameAs\":[\"http:\\\/\\\/cisanewsletter.com\"],\"url\":\"https:\\\/\\\/cisanewsletter.com\\\/fr\\\/index.php\\\/author\\\/cisa-editorial\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lutte contre le terrorisme : Se concentrer sur l'ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l'int\u00e9rieur - CISA NEWSLETTER","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/","og_locale":"fr_FR","og_type":"article","og_title":"Lutte contre le terrorisme : Se concentrer sur l'ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l'int\u00e9rieur - CISA NEWSLETTER","og_description":"Introduction L&rsquo;analogie troyenne Dans L&rsquo;\u00c9n\u00e9ide, le po\u00e8te romain Virgile raconte la chute de Troie avec force d\u00e9tails. Apr\u00e8s dix ans de si\u00e8ge, l&rsquo;arm\u00e9e grecque semble battre en retraite, laissant derri\u00e8re elle un colossal cheval de bois aux portes. Malgr\u00e9 les avertissements du pr\u00eatre Laoco\u00f6n &#8211; \u00ab\u00a0Time\u014d Dana\u014ds et d\u014dna ferent\u0113s\u00a0\u00bb, ou \u00ab\u00a0Je crains les Grecs, [&hellip;]","og_url":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/","og_site_name":"CISA NEWSLETTER","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61558173539135","article_published_time":"2025-06-29T00:05:06+00:00","og_image":[{"width":1000,"height":638,"url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2025\/05\/counter-terrorism.jpg","type":"image\/jpeg"}],"author":"CISA EDITORIAL","twitter_card":"summary_large_image","twitter_creator":"@CisaSocial","twitter_site":"@CisaSocial","twitter_misc":{"\u00c9crit par":"CISA EDITORIAL","Dur\u00e9e de lecture estim\u00e9e":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/#article","isPartOf":{"@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/"},"author":{"name":"CISA EDITORIAL","@id":"https:\/\/cisanewsletter.com\/#\/schema\/person\/a0e04c9eece75fa21ae2273867968b01"},"headline":"Lutte contre le terrorisme : Se concentrer sur l&rsquo;ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l&rsquo;int\u00e9rieur","datePublished":"2025-06-29T00:05:06+00:00","mainEntityOfPage":{"@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/"},"wordCount":1999,"commentCount":0,"publisher":{"@id":"https:\/\/cisanewsletter.com\/#organization"},"image":{"@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/#primaryimage"},"thumbnailUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2025\/05\/counter-terrorism.jpg","keywords":["2025","6th Edition 2025"],"articleSection":["ANALYSE"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/","url":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/","name":"Lutte contre le terrorisme : Se concentrer sur l'ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l'int\u00e9rieur - CISA NEWSLETTER","isPartOf":{"@id":"https:\/\/cisanewsletter.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/#primaryimage"},"image":{"@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/#primaryimage"},"thumbnailUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2025\/05\/counter-terrorism.jpg","datePublished":"2025-06-29T00:05:06+00:00","breadcrumb":{"@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/#primaryimage","url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2025\/05\/counter-terrorism.jpg","contentUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2025\/05\/counter-terrorism.jpg","width":1000,"height":638},{"@type":"BreadcrumbList","@id":"https:\/\/cisanewsletter.com\/index.php\/counterterrorism-focusing-on-the-outside-while-neglecting-the-devil-within\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cisanewsletter.com\/index.php\/home\/"},{"@type":"ListItem","position":2,"name":"Lutte contre le terrorisme : Se concentrer sur l&#8217;ext\u00e9rieur tout en n\u00e9gligeant le \u00ab diable \u00bb \u00e0 l&#8217;int\u00e9rieur"}]},{"@type":"WebSite","@id":"https:\/\/cisanewsletter.com\/#website","url":"https:\/\/cisanewsletter.com\/","name":"CISA NEWSLETTER","description":"Headlining West African News","publisher":{"@id":"https:\/\/cisanewsletter.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cisanewsletter.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/cisanewsletter.com\/#organization","name":"Centre for Intelligence & Security Analysis Ghana","url":"https:\/\/cisanewsletter.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cisanewsletter.com\/#\/schema\/logo\/image\/","url":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/08\/cisaghana.png","contentUrl":"https:\/\/cisanewsletter.com\/wp-content\/uploads\/2024\/08\/cisaghana.png","width":1055,"height":1063,"caption":"Centre for Intelligence & Security Analysis Ghana"},"image":{"@id":"https:\/\/cisanewsletter.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61558173539135","https:\/\/x.com\/CisaSocial"]},{"@type":"Person","@id":"https:\/\/cisanewsletter.com\/#\/schema\/person\/a0e04c9eece75fa21ae2273867968b01","name":"CISA EDITORIAL","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5b5396e9e972117bf9689978858ad932691d8aea505d34cd928f27f4a3d94d0?s=96&d=mm&r=g","caption":"CISA EDITORIAL"},"sameAs":["http:\/\/cisanewsletter.com"],"url":"https:\/\/cisanewsletter.com\/fr\/index.php\/author\/cisa-editorial\/"}]}},"_links":{"self":[{"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/posts\/5390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/comments?post=5390"}],"version-history":[{"count":1,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/posts\/5390\/revisions"}],"predecessor-version":[{"id":5391,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/posts\/5390\/revisions\/5391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/media\/5398"}],"wp:attachment":[{"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/media?parent=5390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/categories?post=5390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisanewsletter.com\/fr\/index.php\/wp-json\/wp\/v2\/tags?post=5390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}