https://preprod.orishas-finance.com/index.php/actualite/3627?lang=fr

NewsController :: show

Request

GET Parameters

Key Value
lang
"fr"

POST Parameters

No POST parameters

Uploaded Files

No files were uploaded

Request Attributes

Key Value
_controller
"App\Controller\Site\NewsController::show"
_firewall_context
"security.firewall.map.context.main"
_route
"site_news_show"
_route_params
[
  "id" => "3627"
]
_security_firewall_run
"_security_main"
id
"3627"
news
App\Entity\News {#571
  -id: 3627
  -type: Doctrine\ORM\PersistentCollection {#582 …}
  -user: Proxies\__CG__\App\Entity\User {#678 …}
  -titre: "Cameroun : près de 2 milliards de dollars dans le blanchiment de capitaux"
  -description: """
    <p>Le risque de blanchiment de capitaux et de financement de terrorisme est &eacute;lev&eacute; au Cameroun. Selon l&rsquo;Agence nationale d&rsquo;investigation financi&egrave;re (ANIF), entre 2006 et 2017, plus de 1050 milliards de FCFA, environ 1,8 milliard de dollars ont &eacute;t&eacute; blanchis au Cameroun d&rsquo;apr&egrave;s les chiffres publi&eacute;s lors de la premi&egrave;re Evaluation Nationale des Risques (ENR) de Blanchiment des capitaux (BC) et de Financement du terrorisme (FT).</p>\r\n
    \r\n
    <p>Cette &eacute;valuation qui a b&eacute;n&eacute;fici&eacute; de l&rsquo;appui technique de la Banque Mondiale (BM), s&rsquo;est faite dans le respect des recommandations du Groupe d&rsquo;action financi&egrave;re (GAFI) en la mati&egrave;re ainsi que des dispositions du r&egrave;glement de la Communaut&eacute; Economique et Mon&eacute;taire de l&rsquo;Afrique Centrale (CEMAC) du 16 avril 2016 portant pr&eacute;vention et r&eacute;pression du blanchiment des capitaux et le financement du terrorisme. D&rsquo;apr&egrave;s le rapport, les montants en termes de blanchiment de capitaux sont plus importants &agrave; travers les d&eacute;tournements de deniers publics et la corruption.</p>\r\n
    \r\n
    <p>L&rsquo;ANIF qui a comptabilis&eacute; pr&egrave;s de 5000 d&eacute;nonciations et enregistr&eacute;es 700 dossiers transf&eacute;r&eacute;s en 2018 devant les instances juridictionnelles renseigne que ce travail a permis d&rsquo;identifier les menaces, de mieux appr&eacute;hender les vuln&eacute;rabilit&eacute;s et d&rsquo;appr&eacute;cier le risque de blanchiment de capitaux et de financement du terrorisme auquel le pays est expos&eacute;.</p>\r\n
    \r\n
    <p>Il ressort que niveau le risque de blanchiment de capitaux est plus &eacute;lev&eacute; dans les secteurs de la banque, de l&rsquo;immobilier, des bureaux de change, des n&eacute;gociants de m&eacute;taux et pierres pr&eacute;cieuses, des notaires, des casinos et vendeurs de mat&eacute;riaux de construction. De leur c&ocirc;t&eacute;, les soci&eacute;t&eacute;s des transferts de fonds, des institutions financi&egrave;res sp&eacute;cialis&eacute;es, des marchands d&rsquo;&oelig;uvres d&rsquo;art et des organismes &agrave; but non lucratif constituent le deuxi&egrave;me niveau de risque de blanchiment, tandis que le march&eacute; des titres, le secteur des assurances, les comptables et auditeurs, les entreprises de location-vente et les soci&eacute;t&eacute;s de transport de fonds constituent le troisi&egrave;me niveau de risque.</p>
    """
  -source: "financialafrik.com"
  -date: DateTime @1611187200 {#568
    date: 2021-01-21 00:00:00.0 UTC (+00:00)
  }
  -heure: null
  -image: "ed6120094d5f5cdc76030873f47bc5af.jpeg"
  -created_at: DateTime @1611316018 {#569
    date: 2021-01-22 11:46:58.0 UTC (+00:00)
  }
  -updated_at: null
  -status: true
  -premium: false
  -titreimage: null
  -commentaires: Doctrine\ORM\PersistentCollection {#667 …}
  -notify_at: null
  -bookmarks: Doctrine\ORM\PersistentCollection {#656 …}
  -titre_en: "Cameroon: nearly 2 billion dollars in money laundering"
  -description_en: """
    <p>The risk of money laundering and terrorist financing is high in Cameroon. According to the National Financial Investigation Agency (ANIF), between 2006 and 2017, more than 1,050 billion FCFA, approximately 1.8 billion dollars were laundered in Cameroon according to figures published during the first National Risk Assessment (ENR) of Money Laundering (BC) and Terrorist Financing (</p>FT).\r\n
    \r\n
    <p>This evaluation, which received technical support from the World Bank (WB), was carried out in compliance with the recommendations of the Financial Action Task Force (FATF) in this area as well as the provisions of the regulation of the Economic and Monetary Community of Central Africa (CEMAC) of 16 April 2016 on the prevention and repression of money laundering and the financing of terrorism. According to the report, the amounts in terms of money laundering are greater through embezzlement of public funds and corruption</p>.\r\n
    \r\n
    <p>The ANIF, which recorded nearly 5000 denunciations and registered 700 cases transferred to the judicial authorities in 2018, reports that this work has made it possible to identify threats, better understand vulnerabilities and assess the risk of money laundering and terrorist financing to which the country is exposed.</p>\r\n
    \r\n
    <p>It appears that the level of risk of money laundering is higher in the banking, real estate, exchange offices, metals and precious stones traders, notaries, casinos and building materials sellers. For their part, money transfer companies, specialized financial institutions, art dealers, and non-profit organizations represent the second level of money laundering risk, while the securities market, the insurance sector, accountants and auditors, rental firms, and money transport companies constitute the third level of</p> risk.
    """
  -atTop: null
}

Request Headers

Header Value
accept
"*/*"
accept-encoding
"gzip, br"
cdn-loop
"cloudflare; loops=1"
cf-connecting-ip
"51.222.253.17"
cf-ipcountry
"CA"
cf-ray
"94c0b1d20898aeb6-YYZ"
cf-visitor
"{"scheme":"https"}"
content-length
"0"
host
"preprod.orishas-finance.com"
user-agent
"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)"
x-forwarded-for
"51.222.253.17"
x-forwarded-proto
"https"
x-php-ob-level
"1"

Request Content

Request content not available (it was retrieved as a resource).

Response

Response Headers

Header Value
cache-control
"no-cache, private"
content-type
"text/html; charset=UTF-8"
date
"Sat, 07 Jun 2025 14:03:55 GMT"
x-debug-token
"d02b3d"

Cookies

Request Cookies

No request cookies

Response Cookies

No response cookies

Session

Session Metadata

Key Value
Created
"Sat, 07 Jun 25 14:03:54 +0000"
Last used
"Sat, 07 Jun 25 14:03:54 +0000"
Lifetime
0

Session Attributes

Attribute Value
_csrf/https-commentaire
"-nJHOeoJj10IgpVS7Ce5cMiOBgzCEhuRKrtwcXkX5dM"

Session Usage

0 Usages
Stateless check enabled

Session not used.

Flashes

Flashes

No flash messages were created.

Server Parameters

Server Parameters

Defined in .env

Key Value
APP_DEBUG
"0"
APP_ENV
"dev"
APP_SECRET
"9de8079f7569b7a032b4fc97c90f9b73"
AWS_ACCESS_KEY_ID
"AKIAQJVOFBC5W2QDSS64"
AWS_DEFAULT_REGION
"us-east-1"
AWS_SECRET_ACCESS_KEY
"0h6QkMXkBB+rbfyrkVbzQ1zZapzig4tBDjIrhVBV"
BUGSNAG_API_KEY
""
DATABASE_URL
"mysql://admin:CLn&[email protected]:3306/orishas_test"
FCM_KEY
"AAAA_gbvFKM:APA91bFuiGUF-FhlVn3DlUMgF-zy8yx2Xuf5QuBiha4y7a-idtt_7ImIKjbAZx808oC-CjAzMSWj6qkiOynLPsSDUSE-v7brGRApQxS3aliBgguvcAk0IJAYYfkwsKPYlJ4WjuJKOe2p"
JWT_PASSPHRASE
"35ca3228fe00eaa64b0825b42fe433e7"
JWT_PUBLIC_KEY
"%kernel.project_dir%/config/jwt/public.pem"
JWT_SECRET_KEY
"%kernel.project_dir%/config/jwt/private.pem"
MAILER_DSN
"smtp://[email protected]:sm3Y}[email protected]:587"
MESSENGER_TRANSPORT_DSN
"doctrine://default?auto_setup=0"

Defined as regular env variables

Key Value
ALLUSERSPROFILE
"C:\ProgramData"
APPDATA
"C:\Windows\system32\config\systemprofile\AppData\Roaming"
APPL_MD_PATH
"/LM/W3SVC/4/ROOT"
APPL_PHYSICAL_PATH
"D:\web\site-preprod\public\"
APP_POOL_CONFIG
"C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config"
APP_POOL_ID
"DefaultAppPool"
AUTH_PASSWORD
""
AUTH_TYPE
""
AUTH_USER
""
CERT_COOKIE
""
CERT_FLAGS
""
CERT_ISSUER
""
CERT_SERIALNUMBER
""
CERT_SUBJECT
""
COMPUTERNAME
"NS517659"
CONTENT_LENGTH
"0"
CONTENT_TYPE
""
ChocolateyInstall
"C:\ProgramData\chocolatey"
ComSpec
"C:\Windows\system32\cmd.exe"
CommonProgramFiles
"C:\Program Files\Common Files"
CommonProgramFiles(x86)
"C:\Program Files (x86)\Common Files"
CommonProgramW6432
"C:\Program Files\Common Files"
DOCUMENT_ROOT
"D:\web\site-preprod\public"
FCGI_ROLE
"RESPONDER"
FP_NO_HOST_CHECK
"NO"
GATEWAY_INTERFACE
"CGI/1.1"
HTTPS
"on"
HTTPS_KEYSIZE
"256"
HTTPS_SECRETKEYSIZE
"3072"
HTTPS_SERVER_ISSUER
"C=US, O=Let's Encrypt, CN=R10"
HTTPS_SERVER_SUBJECT
"CN=preprod.orishas-finance.com"
HTTP_ACCEPT
"*/*"
HTTP_ACCEPT_ENCODING
"gzip, br"
HTTP_CDN_LOOP
"cloudflare; loops=1"
HTTP_CF_CONNECTING_IP
"51.222.253.17"
HTTP_CF_IPCOUNTRY
"CA"
HTTP_CF_RAY
"94c0b1d20898aeb6-YYZ"
HTTP_CF_VISITOR
"{"scheme":"https"}"
HTTP_HOST
"preprod.orishas-finance.com"
HTTP_USER_AGENT
"Mozilla/5.0 (compatible; AhrefsBot/7.0; +http://ahrefs.com/robot/)"
HTTP_X_FORWARDED_FOR
"51.222.253.17"
HTTP_X_FORWARDED_PROTO
"https"
IIS_UrlRewriteModule
"7,1,1993,2351"
INSTANCE_ID
"4"
INSTANCE_META_PATH
"/LM/W3SVC/4"
INSTANCE_NAME
"PREPROD SITE ORISHAS"
LOCALAPPDATA
"C:\Windows\system32\config\systemprofile\AppData\Local"
LOCAL_ADDR
"192.99.7.167"
LOGON_USER
""
NUMBER_OF_PROCESSORS
"8"
NVM_HOME
"C:\Users\armel\AppData\Roaming\nvm"
NVM_SYMLINK
"C:\Program Files\nodejs"
OPENSSL_CONF
"C:\Program Files\PostgreSQL\psqlODBC\etc\openssl.cnf"
ORIG_PATH_INFO
"/index.php/actualite/3627"
OS
"Windows_NT"
PATHEXT
".COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.PY;.PYW"
PATH_INFO
"/actualite/3627"
PATH_TRANSLATED
"D:\web\site-preprod\public\index.php\actualite\3627"
PHP_FCGI_MAX_REQUESTS
"10000"
PHP_SELF
"/index.php/actualite/3627"
PROCESSOR_ARCHITECTURE
"AMD64"
PROCESSOR_IDENTIFIER
"Intel64 Family 6 Model 26 Stepping 5, GenuineIntel"
PROCESSOR_LEVEL
"6"
PROCESSOR_REVISION
"1a05"
PSModulePath
"C:\Windows\system32\WindowsPowerShell\v1.0\Modules\;C:\Program Files (x86)\Microsoft SQL Server\120\Tools\PowerShell\Modules\;C:\Program Files\WindowsPowerShell\Modules\;C:\Program Files (x86)\Microsoft SDKs\Azure\PowerShell\ResourceManager\AzureResourceManager\;C:\Program Files (x86)\Microsoft SDKs\Azure\PowerShell\ServiceManagement\;C:\Program Files (x86)\Microsoft SDKs\Azure\PowerShell\Storage\"
PUBLIC
"C:\Users\Public"
Path
"C:\Python310\Scripts\;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\Microsoft\Web Platform Installer\;C:\Program Files\MariaDB 10.6\bin;C:\ProgramData\ComposerSetup\bin;C:\ProgramData\chocolatey\bin;C:\Program Files\Git\cmd;C:\Program Files\MariaDB 10.6\bin;C:\Program Files\7-Zip;C:\Python310\;C:\Program Files\PHP\php-8.2.3-nts-Win32-vs16-x64;C:\Program Files\Microsoft SQL Server\120\Tools\Binn\;C:\Program Files\Microsoft SQL Server\Client SDK\ODBC\110\Tools\Binn\;C:\Program Files (x86)\Microsoft SQL Server\120\Tools\Binn\;C:\Program Files\Microsoft SQL Server\120\DTS\Binn\;C:\Program Files (x86)\Microsoft SQL Server\120\Tools\Binn\ManagementStudio\;C:\Program Files (x86)\Microsoft SQL Server\120\DTS\Binn\;C:\Program Files\Microsoft SQL Server\150\Tools\Binn\;C:\Program Files\Microsoft SQL Server\Client SDK\ODBC\170\Tools\Binn\;C:\Program Files\dotnet\;C:\Users\armel\AppData\Roaming\nvm;C:\Program Files\nodejs;C:\Program Files\Redis\;"
ProgramData
"C:\ProgramData"
ProgramFiles
"C:\Program Files"
ProgramFiles(x86)
"C:\Program Files (x86)"
ProgramW6432
"C:\Program Files"
QUERY_STRING
"lang=fr"
REMOTE_ADDR
"108.162.241.224"
REMOTE_HOST
"108.162.241.224"
REMOTE_PORT
"42184"
REMOTE_USER
""
REQUEST_METHOD
"GET"
REQUEST_TIME
1749305034
REQUEST_TIME_FLOAT
1749305034.4053
REQUEST_URI
"/index.php/actualite/3627?lang=fr"
SCRIPT_FILENAME
"D:\web\site-preprod\public\index.php"
SCRIPT_NAME
"/index.php"
SERVER_NAME
"preprod.orishas-finance.com"
SERVER_PORT
"443"
SERVER_PORT_SECURE
"1"
SERVER_PROTOCOL
"HTTP/1.1"
SERVER_SOFTWARE
"Microsoft-IIS/8.5"
SYMFONY_DOTENV_VARS
"APP_ENV,APP_DEBUG,APP_SECRET,MAILER_DSN,MESSENGER_TRANSPORT_DSN,DATABASE_URL,JWT_SECRET_KEY,JWT_PUBLIC_KEY,JWT_PASSPHRASE,FCM_KEY,AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY,AWS_DEFAULT_REGION,BUGSNAG_API_KEY"
SystemDrive
"C:"
SystemRoot
"C:\Windows"
TEMP
"C:\Windows\TEMP"
TMP
"C:\Windows\TEMP"
URL
"/index.php"
USERDOMAIN
"WORKGROUP"
USERNAME
"NS517659$"
USERPROFILE
"C:\Windows\system32\config\systemprofile"
WEBSOCKET_VERSION
"13"
_FCGI_X_PIPE_
"\\.\pipe\IISFCGI-003aeb29-f341-4d5f-98dc-425d132595b0"
php
"C:\Program Files\PHP\php-8.2.3-Win32-vs16-x64"
windir
"C:\Windows"