Services on Demand
Journal
Article
Indicators
- Cited by SciELO
- Access statistics
Related links
- Similars in SciELO
Share
Tékhne - Revista de Estudos Politécnicos
Print version ISSN 1645-9911
Tékhne no.9 Barcelos June 2008
A intercepção legal de comunicações em redes IP
Irene Portela[1]
Resumo. No âmbito das vigilâncias electrónicas, o conceito tradicional de escutas telefónicas está desadequado à realidade criminal. O uso do ciberespaço pelas células do terrorismo internacional, torna imprescindível a intercepção de comunicações em redes IP. Mas a utilização das novas tecnologias envolve riscos e tem impactos consideráveis nos meios e na operacionalidade da segurança nacional, além de elevados custos inerentes à sua utilização indiscriminada. No âmbito do terrorismo internacional, não só a intelligence, como as investigações criminais, implicam uma elevada concentração de recursos orientados para o combate, mas especialmente para a prevenção. Neste contexto, o uso como meio de prova do material interceptado através das novas tecnologias de informação implica profundas alterações no regime legal das provas admissíveis em julgamento.
Palavras-chave: provas processuais, Internet, terrorismo, vigilância electrónica, escutas.
Abstract. The traditional concept of wiretapping or eavesdroppingwithin the scope of electronic surveillance is inadequate to current criminal reality. The use of the cyberspace by international terrorists cells have made indispensable the intersection of IP communication net. But using new technologies involves risks and have a significant impact in National Security, as well in the high costs related to its indiscrimated use. As far as International Terrorism is concerned not only the intelelligence but also the law enforcement imply a high concentration of resources in order to the fight and, especially to the prevention. In this context, the utilization as evidence of the material intercepted by the new Information Tecknologies means profound changes in the legal model of the evidences admited on trial.
Keywords: Evidence, Internet, Security, terrorism, surveillance technology, eavesdropping.
Texto completo disponível apenas em PDF.
Full text only available in PDF format.
Bibliografia
Branch, P (2003) Lawful Interception of the Internet, Australian Journal of Emerging Technologies and Society, Vol. 1, No. 1. [ Links ]
Branch, P., Pavlicic, A. and Armitage, G. (2004) Using MAC Addresses in the Lawful Interception of IP Traffic, Australian Telecommunications Networks & Applications Conference 2004, Sydney, Australia, December 8-10, from http://caia.swin.edu.au/pubs/ATNAC04/branch-pavlicic-armitage-ATNAC2004.pdf
Brown, Tina (2005) Death by Error, The Washington Post from http://www.washingtonpost.com/wp-dyn/content/article/2005/05/18/AR2005051802083.html
Capeller, W. (2001) Not such a Neat Net: Some Comments on Virtual Criminality, Social and Legal Sttudies, 10; pp. 229-249
Centro de Estudos Judiciários (2003) Contributos para a reflexão sobre o Sistema Penal Português, Lisboa, Centro de Estudos Judiciários
Chemerinsky, E. (2004) Losing Liberties, Applying a Foreign Intelligence Model to Domestic Law Enforcement, 51 UCLA L. Rev. 1619 From http://eprints.law.duke.edu/archive/00001136/01/51_UCLA_L._Rev._1619_(2003-2004).pdf
Comer, D. E (2000) Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architectures, Fourth Edition, Prentice Hall PTR, Upper Saddle River, NJ
Costa Andrade, M. (1992) Sobre as Proibições de Prova em Processo Penal, Coimbra, Coimbra Editora, pp. 272, 275, 281, 283 e 285.
Costa, F.(1998) Direito Penal da Comunicação, Coimbra, Coimbra Editora, pp. 63 e ss., e 143 .
Davis, L. E (2002) Organizing for Homeland Security, from http://www.rand.org/pubs/issue_papers/IP220/index2.html
Doyle, C. (2001) Best Intelligence and Law Enforcement cooperation: Countering Transnational Threats to the U.S, CRS REP. Nº RL30252 from http://www.faz.org
Doyle,C. (2002) Administrative Subpoenas and National Security Letters in Criminal and Foreign Intelligence Investigations: Background and Proposed Adjustments, CRS Report RL32880 from www.fas.org/sgp/crs/natsec/RS22122.pdf
Doyle, C. (2006) National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments, RS22406, March 21, 2006, from http://www.fas.org/sgp/crs/intel/RS22406.pdf
Furnell, S.M and Warren, M.J. (1999) Computer Haching and Cyber Terrorism: The Real Threats in the New Millennium? Computers & Security, 18; Elsevier Science Ltd. pp.28-34
Garcia, F.P. (2008) O que há de novo na intelligence? from www.jornaldefesa.com.pt/conteudos/view_txt.asp?id=560-42k
Grabosky, P and Smith, R. ( 2001) Digital Crime in the Twenty-First Century, Journal of Information Ethics, 10; pp. 8-26
Jancsewski, L. and Colarik, A. (2005) Managerial Guide for Handling Cyber-Terrorism and Information Warfare, USA: Ida Group Publishing, pp.223225.
Kerr, O. S. (2003), Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't . Northwestern University Law Review, Vol. 97, from http://ssrn.com/=317501
Malik, I. (1996) Computer Hacking: detection and protection. Sigma Press, UK, ISBN 1-85058-538-5
Poole, P.S (2001) Inside Americas Secret Court: the Foreign Intelligence Surveillance Court, from http://www.digits.com.
Poore, R.S. (2002) Computer forensics and privacy: at what price do we police the internet, in R. Herold (Ed). The Privacy Papers Managing Technology, Consumer, Employee and Legislative Actions, USA: CRC Press LLC, pp.3334.
Privy Council (2008) Review of Intercept as Evidence Report to the Prime Minister and the Home Secretary, from www.tsoshop.co.uk
Ramasastry A.(2006) The National Security Letter Provision of the USA Patriot Act: Why It Ought to Be Amended during the Reauthorization Debates from http://writ.news.findlaw.com/ramasastry/20060109.html#continue
Silva, G.M. (2001) Direito Processo Penal, Tomo II, 2ª Edição, Lisboa, Verbo Editora, pp. 201-202
Smith, M. S. (2003) Internet Privacy: Overview and Pending Legislation, CRS, REP. Nº RL 31408 disponível em http://www.faz.org
Veiga, P. (2004) Tecnologias e sistemas de informação, redes e segurança, Porto, SPI Sociedade Portuguesa de Inovação, Consultadoria Empresarial e Fomento da Inovação, S.A, ISBN 972-8589-39-5
Venâncio, P. D (2006) Breve Introdução da Questão da Investigação e Meios de Prova na Criminalidade Informática: 27, from http://www.verbojuridico.net/
Vitorino, A. (2007) aqui tão perto, Diário de Notícias from http://dn.sapo.pt/2007/04/20/opiniao/aqui_perto.html
Zanini, M. and Edwards, J.A. (2001) The Networking of Terror in the Information Age in Arquilla, J. and Ronfeldt, D. (orgs.),Networks and Netwars: The Future of Terror, Crime and Militancy,Santa Monica, CA: RAND, 2001, MR-1382-OSD, p. 43.
Wall, D.S (2001) Maintaining order and law on the internet. In Wall, D. (Ed) Crime and the Internet, London: Routledge
Watney, M. (2007) State surveillance of the internet: human rights infringement or e-security mechanism? Int. J. of Electronic Security and Digital Forensics, Vol. 1, No. 1, pp.4254.
Wisniewski, D. J (2001) Homeland Security: Under Organized and Over Involved, National Defense University, Nacional War College, Disponível em http://www.stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA4451
[1] Escola Superior de Gestão - Instituto Politécnico do Cávado e do Ave.