{"id":58380,"date":"2026-03-09T10:45:03","date_gmt":"2026-03-09T09:45:03","guid":{"rendered":"https:\/\/ihedn.fr\/?p=58380"},"modified":"2026-03-09T11:44:03","modified_gmt":"2026-03-09T10:44:03","slug":"general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere","status":"publish","type":"post","link":"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/","title":{"rendered":"General Bonnemaison: cyberspace \u00aba field of operations in its own right\u00bb"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"58380\" class=\"elementor elementor-58380\" data-elementor-post-type=\"post\">\n\t\t\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-996fc96 e-flex e-con-boxed e-con e-parent\" data-id=\"996fc96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be8755d elementor-widget elementor-widget-heading\" data-id=\"be8755d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Les Lundis de l'IHEDN sont maintenant disponibles en version audio !<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12bc3a6 elementor-widget elementor-widget-text-editor\" data-id=\"12bc3a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cliquez ci-dessous pour \u00e9couter :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-191a3b6 elementor-widget elementor-widget-html\" data-id=\"191a3b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n.player-container-1 {\n  width: 100%;\n  padding: 10px;\n  border-radius: 20px;\n  backdrop-filter: blur(15px);\n  background: rgba(255,255,255,0.15);\n  box-shadow: 0 3px 30px rgba(0,0,0,0.2);\n  display: flex;\n  flex-direction: inline;\n  align-items: flex-start;\n  color: #fff;\n  margin: 0 auto;\n  background-color: #053973;\n}\n\n#waveform-1 {\n  width: 100%;\n  height: 50px;\n  margin-bottom: 20px;\n}\n\n.controls-1 {\n  display: flex;\n  flex-direction: column;\n  align-items: center;\n  gap: 5px;\n}\n\n#playPause-1 {\n  width: 45px;\n  height: 45px;\n  border: none;\n  background: rgba(255,255,255,0.3);\n  backdrop-filter: blur(5px);\n  border-radius: 50%;\n  cursor: pointer;\n  display: flex;\n  justify-content: center;\n  align-items: center;\n  transition: background 0.2s;\n  padding: 0;\n}\n\n#playPause-1:hover {\n  background: rgba(255,255,255,0.5);\n}\n\n#playPause-1 svg {\n  width: 20px;\n  height: 20px;\n  fill: #fff;\n}\n\n#time-1 {\n  font-size: 16px;\n  text-align: center;\n  min-width: 80px;\n}\n\n.top-controls-1 {\n  width: 100%;\n  display: flex;\n  justify-content: space-between; \/* Play \u00e0 gauche \/ Time \u00e0 droite *\/\n  align-items: center;\n  margin-bottom: 5px;\n}\n\n.player-container-1 {\n  display: flex;\n  flex-direction: column;\n}\n\n#time-1 {\n  font-size: 16px;\n  text-align: right;\n}\n\n.player-container-1 {\n  width: 100%;\n  padding: 20px;\n  border-radius: 20px;\n  backdrop-filter: blur(15px);\n  background: rgba(255,255,255,0.15);\n  box-shadow: 0 3px 30px rgba(0,0,0,0.2);\n  display: flex;                   \/* LAYOUT EN LIGNE *\/\n  flex-direction: row;             \/* tout sur une seule ligne *\/\n  align-items: center;             \/* vertical alignment *\/\n  gap: 20px;                       \/* espace entre \u00e9l\u00e9ments *\/\n  color: #fff;\n  margin: 0 auto;\n  background-color: #053973;\n}\n\n#waveform-1 {\n  flex: 1;                         \/* prend toute la place disponible *\/\n  height: 50px;\n  align-items: center;\n}\n\n#time-1 {\n  min-width: 80px;\n  text-align: right;\n} \n<\/style>\n\n<script src=\"https:\/\/unpkg.com\/wavesurfer.js\"><\/script>\n\n<section>\n<div class=\"player-container-1\">\n\n  <button id=\"playPause-1\">\n    <!-- ton SVG Play -->\n    <svg version=\"1.1\" id=\"playSVG-1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" x=\"0px\" y=\"0px\" viewBox=\"0 0 330 330\">\n      <path d=\"M37.728,328.12c2.266,1.256,4.77,1.88,7.272,1.88c2.763,0,5.522-0.763,7.95-2.28l240-149.999\n      c4.386-2.741,7.05-7.548,7.05-12.72c0-5.172-2.664-9.979-7.05-12.72L52.95,2.28c-4.625-2.891-10.453-3.043-15.222-0.4\n      C32.959,4.524,30,9.547,30,15v300C30,320.453,32.959,325.476,37.728,328.12z\"\/>\n    <\/svg>\n  <\/button>\n\n  <div id=\"waveform-1\"><\/div>\n\n  <span id=\"time-1\">00:00 \/ 00:00<\/span>\n\n<\/div>\n\n  <!-- waveform en dessous -->\n  <div id=\"waveform-1\"><\/div>\n\n\n<\/section>\n\n<section>\n<script>\n\nconst wavesurfer1 = WaveSurfer.create({\n    container: '#waveform-1',\n    waveColor: 'rgba(255,255,255,0.4)',\n    progressColor: '#fff',\n    cursorColor: '#fff',\n    barWidth: 3,\n    barRadius: 3,\n    height: 50,\n    responsive: true,\n    normalize: true\n});\n\n\/\/ Charge ton fichier audio depuis le site WordPress\nwavesurfer1.load('https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/02\/audio-2026-03-09-cyberespace.mp3');\n\nconst playBtn1 = document.getElementById('playPause-1');\nconst timeDisplay1 = document.getElementById('time-1');\n\n\/\/ SVGs\nconst playSVG1 = `<svg version=\"1.1\" id=\"playSVG-1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" x=\"0px\" y=\"0px\" viewBox=\"0 0 330 330\">\n<path d=\"M37.728,328.12c2.266,1.256,4.77,1.88,7.272,1.88c2.763,0,5.522-0.763,7.95-2.28l240-149.999\nc4.386-2.741,7.05-7.548,7.05-12.72c0-5.172-2.664-9.979-7.05-12.72L52.95,2.28c-4.625-2.891-10.453-3.043-15.222-0.4\nC32.959,4.524,30,9.547,30,15v300C30,320.453,32.959,325.476,37.728,328.12z\"\/>\n<\/svg>`;\n\nconst pauseSVG1 = `<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 330 330\" width=\"100%\" height=\"100%\" fill=\"#fff\">\n  <rect x=\"60\" y=\"30\" width=\"80\" height=\"270\"\/>\n  <rect x=\"190\" y=\"30\" width=\"80\" height=\"270\"\/>\n<\/svg>`;\n\n\/\/ Play\/Pause switch\nplayBtn1.addEventListener('click', () => {\n    wavesurfer1.playPause();\n    playBtn1.innerHTML = wavesurfer1.isPlaying() ? pauseSVG1 : playSVG1;\n});\n\n\/\/ Update time display\nfunction formatTime(sec) {\n    const m = Math.floor(sec \/ 60);\n    const s = Math.floor(sec % 60);\n    return m.toString().padStart(2,'0') + ':' + s.toString().padStart(2,'0');\n}\n\nwavesurfer1.on('audioprocess', () => {\n    const current = wavesurfer1.getCurrentTime();\n    const duration = wavesurfer1.getDuration();\n    timeDisplay1.textContent = formatTime(current) + ' \/ ' + formatTime(duration);\n});\n\nwavesurfer1.on('ready', () => {\n    const duration = wavesurfer1.getDuration();\n    timeDisplay1.textContent = '00:00 \/ ' + formatTime(duration);\n});\n<\/script>\n<\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-b21a8ab e-con-full e-flex e-con e-parent\" data-id=\"b21a8ab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23593b8 elementor-widget elementor-widget-text-editor\" data-id=\"23593b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le num\u00e9rique constitue un bouleversement majeur pour le renseignement. Acc\u00e9l\u00e9ration des flux d\u2019information, d\u00e9mat\u00e9rialisation des interactions, exploitation massive des donn\u00e9es et usage croissant des technologies num\u00e9riques par les adversaires modifient en profondeur les conditions d\u2019exercice de la protection des forces, des personnels, des informations et des capacit\u00e9s strat\u00e9giques nationales.<\/p><p>Aux actions traditionnelles d\u2019espionnage ou d\u2019ing\u00e9rence s\u2019ajoutent d\u00e9sormais des menaces hybrides m\u00ealant cyberattaques, manipulations informationnelles, intrusions num\u00e9riques et usages d\u00e9tourn\u00e9s de technologies civiles, comme les drones. La fronti\u00e8re entre les champs militaire, \u00e9conomique, technologique et informationnel devient plus poreuse, complexifiant l\u2019identification, l\u2019attribution et la neutralisation des risques.<\/p><p>L\u2019une des h\u00e9riti\u00e8res du \u00ab\u00a0Deuxi\u00e8me bureau\u00a0\u00bb de l\u2019\u00e9tat-major g\u00e9n\u00e9ral de l\u2019arm\u00e9e fran\u00e7aise cr\u00e9\u00e9 en 1871, la Direction du renseignement et de la s\u00e9curit\u00e9 de la d\u00e9fense (DRSD) est charg\u00e9e de prot\u00e9ger la France contre les menaces visant les forces arm\u00e9es et l&rsquo;industrie de d\u00e9fense. Avec la Direction g\u00e9n\u00e9rale de la s\u00e9curit\u00e9 ext\u00e9rieure (DGSE) et la Direction du renseignement militaire (DRM), elle est l\u2019un des trois services du premier cercle du renseignement fran\u00e7ais \u00e0 d\u00e9pendre du minist\u00e8re des Arm\u00e9es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eb4223 elementor-widget elementor-widget-text-editor\" data-id=\"7eb4223\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Son directeur depuis le 1<sup>er<\/sup> ao\u00fbt 2025, le g\u00e9n\u00e9ral de corps d\u2019arm\u00e9e Aymeric Bonnemaison, a conduit sa carri\u00e8re au sein des forces arm\u00e9es fran\u00e7aises dans les domaines du renseignement et de la cyberd\u00e9fense. Premier chef de la DRSD issu du commandement de la cyberd\u00e9fense, il incarne l\u2019adaptation du service aux nouveaux champs de conflictualit\u00e9.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-34f6859 e-con-full e-flex e-con e-parent\" data-id=\"34f6859\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47a0236 elementor-widget elementor-widget-heading\" data-id=\"47a0236\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">LE NUM\u00c9RIQUE CONSTITUE-T-IL UN CHANGEMENT DE PARADIGME POUR LE RENSEIGNEMENT MILITAIRE DE CONTRE-ING\u00c9RENCE, FORT DE PLUS DE 150 ANS D\u2019HISTOIRE ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b02bcd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1b02bcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-03142eb e-con-full e-flex e-con e-child\" data-id=\"03142eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b8bbe6 elementor-widget elementor-widget-text-editor\" data-id=\"2b8bbe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le num\u00e9rique constitue en effet un v\u00e9ritable changement de paradigme pour le renseignement, y compris celui de contre-ing\u00e9rence, avec des cons\u00e9quences majeures sur nos modes d\u2019action, nos capacit\u00e9s et la nature m\u00eame des menaces auxquelles nous faisons face.<\/p><p>Chaque avanc\u00e9e technologique apporte des opportunit\u00e9s qui renforcent notre efficacit\u00e9 op\u00e9rationnelle, mais g\u00e9n\u00e8re \u00e9galement de nouvelles vuln\u00e9rabilit\u00e9s, exploit\u00e9es par nos adversaires pour mener des actions d\u2019ing\u00e9rence. L\u2019\u00e9volution de nos missions s\u2019inscrit ainsi dans une transformation globale, structur\u00e9e autour de plusieurs axes fondamentaux.<\/p><p>Le cyberespace s\u2019est impos\u00e9 comme un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re, dans lequel les attaques informatiques et les actions de d\u00e9sinformation constituent d\u00e9sormais des instruments de renseignement et de guerre sous le seuil. Cette \u00e9volution a profond\u00e9ment transform\u00e9 le contre-espionnage militaire, qui repose aujourd\u2019hui sur une approche hybride associant les m\u00e9thodes traditionnelles, fond\u00e9es sur le terrain et les sources humaines, avec l\u2019exploitation de technologies num\u00e9riques avanc\u00e9es.<\/p><p>De plus, la distance entre les attaquants et leurs cibles dans le cyberespace leur offre une plus grande libert\u00e9 d\u2019action et rend l\u2019identification et l\u2019attribution des attaques plus complexes. Enfin, l\u2019accessibilit\u00e9 croissante des outils num\u00e9riques \u00e9largit le nombre d\u2019acteurs capables d\u2019agir, y compris sans expertise avanc\u00e9e, ce qui contribue \u00e0 la multiplication des menaces et complique leur caract\u00e9risation.<\/p><p>La num\u00e9risation des donn\u00e9es permet de collecter, structurer et exploiter des volumes tr\u00e8s importants d\u2019informations issues de sources vari\u00e9es et de multiples moyens de communication, qu\u2019il s\u2019agisse des r\u00e9seaux satellitaires, des r\u00e9seaux mobiles, des r\u00e9seaux sociaux, des objets connect\u00e9s ou des environnements <em>Cloud<\/em>. L\u2019appui de traitements automatis\u00e9s, fond\u00e9s notamment sur l\u2019intelligence artificielle et le <em>machine learning<\/em>, permet d\u2019analyser ces donn\u00e9es \u00e0 une vitesse et \u00e0 une \u00e9chelle in\u00e9dite.<\/p><p>Cette capacit\u00e9 nouvelle s\u2019accompagne toutefois de risques accrus. La concentration de grandes masses de donn\u00e9es constitue une cible privil\u00e9gi\u00e9e pour les attaques, les tentatives de captation ou les actions de divulgation. Le num\u00e9rique a ainsi profond\u00e9ment renouvel\u00e9 les m\u00e9thodes de la contre-ing\u00e9rence, en offrant des outils plus performants tout en imposant une adaptation constante face \u00e0 des modes d\u2019action adverses qui exploitent ces m\u00eames technologies. Cela nous entraine collectivement dans une course \u00e0 l\u2019innovation, dans une \u00ab\u00a0\u00e9volution cr\u00e9atrice\u00a0\u00bb\u00a0!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-09ebcd3 e-con-full e-flex e-con e-parent\" data-id=\"09ebcd3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f359ef9 elementor-widget elementor-widget-heading\" data-id=\"f359ef9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">COMMENT LA DRSD ADAPTE-T-ELLE SON FONCTIONNEMENT \u00c0 CE CHANGEMENT ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-887cac3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"887cac3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-094d652 e-con-full e-flex e-con e-child\" data-id=\"094d652\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-837d8c0 elementor-widget elementor-widget-text-editor\" data-id=\"837d8c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Historiquement, la DRSD intervenait principalement dans le champ de la contre-ing\u00e9rence physique, notamment au profit de la base industrielle et technologique de d\u00e9fense (BITD), \u00e0 travers la pr\u00e9vention des intrusions et le contr\u00f4le de la conformit\u00e9 r\u00e9glementaire.<\/p><p>L\u2019\u00e9volution de la menace cyber a conduit le Service \u00e0 \u00e9largir son champ d\u2019action afin d\u2019assurer \u00e9galement une mission de contre-ing\u00e9rence cyber au b\u00e9n\u00e9fice de ces acteurs. La DRSD a ainsi d\u00e9velopp\u00e9 ses capacit\u00e9s en cybers\u00e9curit\u00e9 et en surveillance r\u00e9putationnelle sur les r\u00e9seaux, lui permettant d\u2019assurer un continuum de protection entre les domaines physique et num\u00e9rique. L\u2019une de ses forces r\u00e9side dans sa capacit\u00e9 \u00e0 corr\u00e9ler des signaux faibles issus de champs diff\u00e9rents afin d\u2019\u00e9clairer une situation dans sa globalit\u00e9.<\/p><p>Cette adaptation s\u2019est notamment traduite par la cr\u00e9ation du <a href=\"https:\/\/www.defense.gouv.fr\/drsd\/ressources-entreprises\/cert-entreprises-defense\">CERT [ED]<\/a>, inaugur\u00e9 en 2023, destin\u00e9 \u00e0 contribuer \u00e0 la protection des entreprises de la BITD, en particulier les plus vuln\u00e9rables d\u2019entre elles\u00a0: les PME et TPE de la <em>supplychain<\/em>. Le CERT [ED] propose des actions de sensibilisation, une veille sur les vuln\u00e9rabilit\u00e9s et un accompagnement dans la gestion des incidents cyber. Il s\u2019appuie sur le maillage territorial de la DRSD, qui garantit une proximit\u00e9 et une connaissance fine des entreprises, ainsi qu\u2019une r\u00e9activit\u00e9 accrue dans l\u2019appui cyber.<\/p><p>Les capacit\u00e9s cyber de la DRSD sont r\u00e9parties sur l\u2019ensemble du territoire national. Environ 10% de nos agents, soit 160 civils et militaires, travaillent aujourd\u2019hui dans le domaine cyber. Les profils recherch\u00e9s sont vari\u00e9s, allant du jeune ing\u00e9nieur en cyberd\u00e9fense \u00e0 l\u2019officier analyste du renseignement d\u2019int\u00e9r\u00eat cyber, en passant par des experts en investigation num\u00e9rique.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-0a3b581 e-con-full e-flex e-con e-parent\" data-id=\"0a3b581\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-229cd9b elementor-widget elementor-widget-heading\" data-id=\"229cd9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VOUS \u00caTES LE PREMIER CHEF DE LA DRSD \u00c0 AVOIR AUPARAVANT COMMANDE LA CYBERD\u00c9FENSE. EST-CE LE SIGNE D\u2019UNE \u00c9VOLUTION DE LA MENACE CYBER, ET DONC DES PRIORIT\u00c9S DE VOTRE SERVICE ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0de59c4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0de59c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-e0bfa39 e-con-full e-flex e-con e-child\" data-id=\"e0bfa39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-467e955 elementor-widget elementor-widget-text-editor\" data-id=\"467e955\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mon parcours cyber n\u2019est sans doute pas totalement \u00e9tranger au choix qui a \u00e9t\u00e9 fait de me confier la direction de la DRSD. La menace cyber est d\u00e9sormais omnipr\u00e9sente et constitue l\u2019axe sur lequel se b\u00e2tissent les strat\u00e9gies hybrides mises en \u0153uvre par nos comp\u00e9titeurs. J\u2019avais d\u00e9j\u00e0 pu en observer l\u2019\u00e9volution lorsqu\u2019il m\u2019\u00e9tait donn\u00e9 de commander la cyberd\u00e9fense des arm\u00e9es. Je la constate aujourd\u2019hui quotidiennement \u00e0 la t\u00eate de la DRSD.<\/p><p>La BITD repr\u00e9sente une cible de premier ordre pour les cyberattaquants, ce qui justifie une attention et des efforts renforc\u00e9s. Il existe ainsi une coh\u00e9rence entre mon exp\u00e9rience dans le domaine cyber et l\u2019adaptation continue du Service pour faire face \u00e0 cette menace croissante.<\/p><p>Cependant, la menace demeurant multifactorielle, il me semblerait r\u00e9ducteur de limiter ce choix \u00e0 cette seule dimension. Mon parcours complet en renseignement op\u00e9rationnel et technique dans les forces arm\u00e9es, \u00e0 l\u2019OTAN, dans le domaine capacitaire et enfin, \u00e0 la DGSE a certainement contribu\u00e9 \u00e0 cette trajectoire. J\u2019imagine que c\u2019est bien la compl\u00e9mentarit\u00e9 de ces exp\u00e9riences qui m\u2019a conduit \u00e0 prendre le commandement des contre-espions de la DRSD.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-a0bdf87 e-con-full e-flex e-con e-parent\" data-id=\"a0bdf87\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2dda8c2 elementor-widget elementor-widget-heading\" data-id=\"2dda8c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CES DERNIERS MOIS, LES SURVOLS D\u2019INFRASTRUCTURES SENSIBLES FRAN\u00c7AISES PAR DES DRONES SE MULTIPLIENT. COMMENT Y FAITES-VOUS FACE ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3ce34b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d3ce34b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-52b8dd5 e-con-full e-flex e-con e-child\" data-id=\"52b8dd5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db5c7cb elementor-widget elementor-widget-text-editor\" data-id=\"db5c7cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La DRSD observe en effet une recrudescence des incursions de drones au-dessus de sites sensibles en France, avec une hausse significative des signalements depuis le d\u00e9but de l\u2019automne. Les survols concernant des sites d\u2019int\u00e9r\u00eat d\u00e9fense ont nettement augment\u00e9 entre 2024 et 2025, et concernent des appareils tr\u00e8s vari\u00e9s, allant de drones grand public \u00e0 des syst\u00e8mes plus \u00e9labor\u00e9s.<\/p><p>\u00c0 la diff\u00e9rence des th\u00e9\u00e2tres de conflit, o\u00f9 des dispositifs de d\u00e9tection et de neutralisation sont d\u00e9ploy\u00e9s de mani\u00e8re permanente et intensive, la France agit dans un cadre juridique \u00ab\u00a0de temps de paix\u00a0\u00bb face \u00e0 une menace \u00e9mergente, diffuse et r\u00e9partie sur l\u2019ensemble du territoire. M\u00eame lorsque des unit\u00e9s disposent de moyens de lutte anti-drone, les entraves effectives restent limit\u00e9es, la neutralisation n\u00e9cessitant la combinaison de plusieurs technologies complexes.<\/p><p>La lutte contre les drones repose sur trois piliers compl\u00e9mentaires : la d\u00e9tection, l\u2019identification et la neutralisation. La d\u00e9tection peut s\u2019appuyer sur des capteurs radar ou acoustiques ; l\u2019identification n\u00e9cessite des moyens optiques ou \u00e9lectromagn\u00e9tiques, de jour comme de nuit ; la neutralisation, enfin, peut recourir \u00e0 des solutions telles que le brouillage, les filets ou les lasers, dans le respect du cadre l\u00e9gal en vigueur. L\u2019efficacit\u00e9 repose sur l\u2019int\u00e9gration de ces capacit\u00e9s face \u00e0 des drones toujours plus innovants.<\/p><p>Les investigations conduites par la DRSD se poursuivent afin de caract\u00e9riser ces survols, qu\u2019il s\u2019agisse d\u2019actions malveillantes ou, dans certains cas, de comportements involontaires d\u2019op\u00e9rateurs insuffisamment inform\u00e9s.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-73e5b65 e-con-full e-flex e-con e-parent\" data-id=\"73e5b65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e5b5cba elementor-widget elementor-widget-heading\" data-id=\"e5b5cba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OUTRE LES FORCES ARM\u00c9ES, LEURS FAMILLES ET LES BASES MILITAIRES, LA DRSD PROT\u00c8GE LES ENTIT\u00c9S PRIV\u00c9ES DE L\u2019INDUSTRIE DE D\u00c9FENSE. SONT-ELLES AU FAIT DES MENACES CONTEMPORAINES ET \u00c0 VENIR ? COMMENT LES SENSIBILISEZ-VOUS ?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d561988 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d561988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-element elementor-element-ca38f5f e-con-full e-flex e-con e-child\" data-id=\"ca38f5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f72797d elementor-widget elementor-widget-text-editor\" data-id=\"f72797d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans le cadre de sa mission de protection de la sph\u00e8re d\u00e9fense, la DRSD accompagne l\u2019ensemble des acteurs de la BITD, quelle que soit leur taille, des grands ma\u00eetres d\u2019\u0153uvre industriels aux PME, start-ups et laboratoires de recherche. Cet accompagnement repose notamment sur des actions de sensibilisation personnalis\u00e9es.<\/p><p>Ces actions sont men\u00e9es sur l\u2019ensemble du territoire, soit \u00e0 la demande des entit\u00e9s concern\u00e9es, soit \u00e0 l\u2019initiative du Service lorsque la sensibilit\u00e9 de leurs activit\u00e9s le justifie, notamment au regard des programmes d\u2019armement ou \u00e0 l\u2019issue d\u2019audits r\u00e9glementaires li\u00e9s \u00e0 la protection du secret. Chaque sensibilisation int\u00e8gre une \u00e9valuation actualis\u00e9e de la menace, qu\u2019elle soit humaine, physique, cyber, juridique, capitalistique ou r\u00e9putationnelle.<\/p><p>Les sensibilisations sont con\u00e7ues sur mesure, en fonction du secteur d\u2019activit\u00e9, du profil des participants et de l\u2019environnement de l\u2019entit\u00e9. Elles peuvent \u00e9galement \u00eatre propos\u00e9es en amont d\u2019\u00e9v\u00e9nements sp\u00e9cifiques, tels que des salons, des visites de d\u00e9l\u00e9gations \u00e9trang\u00e8res ou des d\u00e9placements \u00e0 l\u2019international. Ces actions s\u2019appuient syst\u00e9matiquement sur des cas concrets et d\u00e9bouchent sur des recommandations op\u00e9rationnelles.<\/p><p>Chaque ann\u00e9e, la DRSD sensibilise plus de 20 000 personnes dans ce cadre. Ces actions sont compl\u00e9t\u00e9es par des publications th\u00e9matiques, comme la Lettre d\u2019information \u00e9conomique (LIE), diffus\u00e9e plusieurs fois par an, ainsi que par les nombreuses interactions rendues possibles par la proximit\u00e9 du Service avec l\u2019\u00e9cosyst\u00e8me qu\u2019il est charg\u00e9 de prot\u00e9ger.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Lieutenant General Aymeric Bonnemaison, Director of Defence Intelligence and Security, analyses the far-reaching changes in counter-intelligence in the digital age: changing threats, hybridisation of opposing modes of action, the rise of cyber and the proliferation of both state and non-state actors. Interview.<\/p>","protected":false},"author":14,"featured_media":58408,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41,171],"tags":[],"class_list":["post-58380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lundis-de-lihedn","category-notre-selection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale<\/title>\n<meta name=\"description\" content=\"Deux semaines apr\u00e8s la capture de Nicol\u00e1s Maduro, le chercheur Thomas Posado, sp\u00e9cialiste de la r\u00e9publique bolivarienne et de Cuba, analyse le contexte et les cons\u00e9quences possibles de l\u2019op\u00e9ration ordonn\u00e9e par Donald Trump, qui pourrait \u00ab aggraver les difficult\u00e9s et nourrir les axes migratoires qu\u2019il d\u00e9nonce \u00bb.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb\" \/>\n<meta property=\"og:description\" content=\"Deux semaines apr\u00e8s la capture de Nicol\u00e1s Maduro, le chercheur Thomas Posado, sp\u00e9cialiste de la r\u00e9publique bolivarienne et de Cuba, analyse le contexte et les cons\u00e9quences possibles de l\u2019op\u00e9ration ordonn\u00e9e par Donald Trump, qui pourrait \u00ab aggraver les difficult\u00e9s et nourrir les axes migratoires qu\u2019il d\u00e9nonce \u00bb.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/\" \/>\n<meta property=\"og:site_name\" content=\"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ihedn\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-09T09:45:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T10:44:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/01\/BANDEAU_LIH_AFP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Coline Dassonville\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb\" \/>\n<meta name=\"twitter:description\" content=\"Deux semaines apr\u00e8s la capture de Nicol\u00e1s Maduro, le chercheur Thomas Posado, sp\u00e9cialiste de la r\u00e9publique bolivarienne et de Cuba, analyse le contexte et les cons\u00e9quences possibles de l\u2019op\u00e9ration ordonn\u00e9e par Donald Trump, qui pourrait \u00ab aggraver les difficult\u00e9s et nourrir les axes migratoires qu\u2019il d\u00e9nonce \u00bb.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/01\/BANDEAU_LIH_AFP.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:site\" content=\"@IHEDN\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Coline Dassonville\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/\"},\"author\":{\"name\":\"Coline Dassonville\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/7a52e81319c373f5462ade39e81a7f19\"},\"headline\":\"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb\",\"datePublished\":\"2026-03-09T09:45:03+00:00\",\"dateModified\":\"2026-03-09T10:44:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/\"},\"wordCount\":1876,\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Bandeau_ITW_BONNEMAISON_BIS2.jpg\",\"articleSection\":[\"Lundis de l'IHEDN\",\"Notre s\u00e9lection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/\",\"name\":\"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb - L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Bandeau_ITW_BONNEMAISON_BIS2.jpg\",\"datePublished\":\"2026-03-09T09:45:03+00:00\",\"dateModified\":\"2026-03-09T10:44:03+00:00\",\"description\":\"Deux semaines apr\u00e8s la capture de Nicol\u00e1s Maduro, le chercheur Thomas Posado, sp\u00e9cialiste de la r\u00e9publique bolivarienne et de Cuba, analyse le contexte et les cons\u00e9quences possibles de l\u2019op\u00e9ration ordonn\u00e9e par Donald Trump, qui pourrait \u00ab aggraver les difficult\u00e9s et nourrir les axes migratoires qu\u2019il d\u00e9nonce \u00bb.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Bandeau_ITW_BONNEMAISON_BIS2.jpg\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Bandeau_ITW_BONNEMAISON_BIS2.jpg\",\"width\":1920,\"height\":960,\"caption\":\"Lundi de l'IHEDN : G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/lundis-de-lihedn\\\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/ihedn.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#website\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"name\":\"IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale |\",\"description\":\"Site officiel de l&#039;IHEDN plac\u00e9 sous la tutelle du Premier ministre.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ihedn.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#organization\",\"name\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"contentUrl\":\"https:\\\/\\\/ihedn.fr\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/BLOC_RF_IHEDN_WEB.png\",\"width\":500,\"height\":237,\"caption\":\"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale\"},\"image\":{\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ihedn\\\/\",\"https:\\\/\\\/x.com\\\/IHEDN\",\"https:\\\/\\\/www.instagram.com\\\/ihedn\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/ihedn\\\/\",\"https:\\\/\\\/fr.wikipedia.org\\\/wiki\\\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ihedn.fr\\\/#\\\/schema\\\/person\\\/7a52e81319c373f5462ade39e81a7f19\",\"name\":\"Coline Dassonville\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc7cbc6297b987d7cbee36041f952619e584620b919eb849c804adf789c1147?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc7cbc6297b987d7cbee36041f952619e584620b919eb849c804adf789c1147?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abc7cbc6297b987d7cbee36041f952619e584620b919eb849c804adf789c1147?s=96&d=mm&r=g\",\"caption\":\"Coline Dassonville\"},\"url\":\"https:\\\/\\\/ihedn.fr\\\/en\\\/author\\\/coline\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"General Bonnemaison: cyberspace, \u00aba field of operations in its own right\u00bb - L'IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","description":"Two weeks after the capture of Nicol\u00e1s Maduro, researcher Thomas Posado, a specialist in the Bolivarian Republic and Cuba, analyses the context and possible consequences of the operation ordered by Donald Trump, which could \u00abexacerbate the difficulties and feed the migratory axes that he denounces\u00bb.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/","og_locale":"en_GB","og_type":"article","og_title":"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb","og_description":"Deux semaines apr\u00e8s la capture de Nicol\u00e1s Maduro, le chercheur Thomas Posado, sp\u00e9cialiste de la r\u00e9publique bolivarienne et de Cuba, analyse le contexte et les cons\u00e9quences possibles de l\u2019op\u00e9ration ordonn\u00e9e par Donald Trump, qui pourrait \u00ab aggraver les difficult\u00e9s et nourrir les axes migratoires qu\u2019il d\u00e9nonce \u00bb.","og_url":"https:\/\/ihedn.fr\/en\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/","og_site_name":"L&#039;IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale","article_publisher":"https:\/\/www.facebook.com\/ihedn\/","article_published_time":"2026-03-09T09:45:03+00:00","article_modified_time":"2026-03-09T10:44:03+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/01\/BANDEAU_LIH_AFP.jpg","type":"image\/jpeg"}],"author":"Coline Dassonville","twitter_card":"summary_large_image","twitter_title":"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb","twitter_description":"Deux semaines apr\u00e8s la capture de Nicol\u00e1s Maduro, le chercheur Thomas Posado, sp\u00e9cialiste de la r\u00e9publique bolivarienne et de Cuba, analyse le contexte et les cons\u00e9quences possibles de l\u2019op\u00e9ration ordonn\u00e9e par Donald Trump, qui pourrait \u00ab aggraver les difficult\u00e9s et nourrir les axes migratoires qu\u2019il d\u00e9nonce \u00bb.","twitter_image":"https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/01\/BANDEAU_LIH_AFP.jpg","twitter_creator":"@IHEDN","twitter_site":"@IHEDN","twitter_misc":{"Written by":"Coline Dassonville","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/#article","isPartOf":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/"},"author":{"name":"Coline Dassonville","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/7a52e81319c373f5462ade39e81a7f19"},"headline":"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb","datePublished":"2026-03-09T09:45:03+00:00","dateModified":"2026-03-09T10:44:03+00:00","mainEntityOfPage":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/"},"wordCount":1876,"publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"image":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/02\/Bandeau_ITW_BONNEMAISON_BIS2.jpg","articleSection":["Lundis de l'IHEDN","Notre s\u00e9lection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/","url":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/","name":"General Bonnemaison: cyberspace, \u00aba field of operations in its own right\u00bb - L'IHEDN : Institut des hautes \u00e9tudes de d\u00e9fense nationale (Graduate Institute of National Defence)","isPartOf":{"@id":"https:\/\/ihedn.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/#primaryimage"},"image":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/#primaryimage"},"thumbnailUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/02\/Bandeau_ITW_BONNEMAISON_BIS2.jpg","datePublished":"2026-03-09T09:45:03+00:00","dateModified":"2026-03-09T10:44:03+00:00","description":"Two weeks after the capture of Nicol\u00e1s Maduro, researcher Thomas Posado, a specialist in the Bolivarian Republic and Cuba, analyses the context and possible consequences of the operation ordered by Donald Trump, which could \u00abexacerbate the difficulties and feed the migratory axes that he denounces\u00bb.","breadcrumb":{"@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/#primaryimage","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/02\/Bandeau_ITW_BONNEMAISON_BIS2.jpg","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2026\/02\/Bandeau_ITW_BONNEMAISON_BIS2.jpg","width":1920,"height":960,"caption":"Lundi de l'IHEDN : G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb"},{"@type":"BreadcrumbList","@id":"https:\/\/ihedn.fr\/lundis-de-lihedn\/general-bonnemaison-le-cyberespace-un-champ-doperations-a-part-entiere\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ihedn.fr\/"},{"@type":"ListItem","position":2,"name":"G\u00e9n\u00e9ral Bonnemaison : le cyberespace, \u00ab un champ d\u2019op\u00e9rations \u00e0 part enti\u00e8re \u00bb"}]},{"@type":"WebSite","@id":"https:\/\/ihedn.fr\/#website","url":"https:\/\/ihedn.fr\/","name":"IHEDN: Institut des hautes \u00e9tudes de d\u00e9fense nationale (Institute for Higher National Defence Studies)","description":"Official website of the IHEDN under the supervision of the Prime Minister.","publisher":{"@id":"https:\/\/ihedn.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ihedn.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ihedn.fr\/#organization","name":"IHEDN - Institute for Higher National Defence Studies","url":"https:\/\/ihedn.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/","url":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","contentUrl":"https:\/\/ihedn.fr\/wp-content\/uploads\/2020\/11\/BLOC_RF_IHEDN_WEB.png","width":500,"height":237,"caption":"IHEDN - Institut des Hautes Etudes de D\u00e9fense Nationale"},"image":{"@id":"https:\/\/ihedn.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ihedn\/","https:\/\/x.com\/IHEDN","https:\/\/www.instagram.com\/ihedn\/","https:\/\/www.linkedin.com\/school\/ihedn\/","https:\/\/fr.wikipedia.org\/wiki\/Institut_des_hautes_\u00e9tudes_de_D\u00e9fense_nationale"]},{"@type":"Person","@id":"https:\/\/ihedn.fr\/#\/schema\/person\/7a52e81319c373f5462ade39e81a7f19","name":"Coline Dassonville","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/abc7cbc6297b987d7cbee36041f952619e584620b919eb849c804adf789c1147?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/abc7cbc6297b987d7cbee36041f952619e584620b919eb849c804adf789c1147?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/abc7cbc6297b987d7cbee36041f952619e584620b919eb849c804adf789c1147?s=96&d=mm&r=g","caption":"Coline Dassonville"},"url":"https:\/\/ihedn.fr\/en\/author\/coline\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-08 02:16:39","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/58380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/comments?post=58380"}],"version-history":[{"count":15,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/58380\/revisions"}],"predecessor-version":[{"id":58701,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/58380\/revisions\/58701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media\/58408"}],"wp:attachment":[{"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/media?parent=58380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/categories?post=58380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ihedn.fr\/en\/wp-json\/wp\/v2\/tags?post=58380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}