<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1645-9199</journal-id>
<journal-title><![CDATA[Relações Internacionais (R:I)]]></journal-title>
<abbrev-journal-title><![CDATA[Relações Internacionais]]></abbrev-journal-title>
<issn>1645-9199</issn>
<publisher>
<publisher-name><![CDATA[IPRI-UNL]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1645-91992024000200093</article-id>
<article-id pub-id-type="doi">10.23906/ri2024.82a07</article-id>
<title-group>
<article-title xml:lang="pt"><![CDATA[Ordem e progresso? Analisando as respostas brasileiras aos cibercrimes]]></article-title>
<article-title xml:lang="en"><![CDATA[Order and progress? An analysis of Brazilian responses to cybercrime]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Belinotte]]></surname>
<given-names><![CDATA[Mariana Grilli]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Goldoni]]></surname>
<given-names><![CDATA[Luiz Rogério Franco]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Devanny]]></surname>
<given-names><![CDATA[Joe]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Coelho]]></surname>
<given-names><![CDATA[Carlos Frederico]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidade Federal de Minas Gerais Instituto Meira Mattos ]]></institution>
<addr-line><![CDATA[Praia Vermelha Rio de Janeiro]]></addr-line>
<country>Brazil</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Escola de Comando e Estado-Maior do Exército  ]]></institution>
<addr-line><![CDATA[Praia Vermelha Rio de Janeiro]]></addr-line>
<country>Brazil</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,King&#8217;s College London  ]]></institution>
<addr-line><![CDATA[Londres ]]></addr-line>
<country>United Kingdom</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Escola de Comando e Estado-Maior do Exército  ]]></institution>
<addr-line><![CDATA[Praia Vermelha Rio de Janeiro]]></addr-line>
<country>Brazil</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>07</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>07</month>
<year>2024</year>
</pub-date>
<numero>82</numero>
<fpage>93</fpage>
<lpage>107</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_arttext&amp;pid=S1645-91992024000200093&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_abstract&amp;pid=S1645-91992024000200093&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.pt/scielo.php?script=sci_pdf&amp;pid=S1645-91992024000200093&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo A ameaça cibernética tornou-se questão cada vez mais proeminente nos últimos anos. Embora global, o problema afeta alguns países mais do que outros. Este é o caso do Brasil, que se tornou um ponto focal para ataques cibernéticos. O principal objetivo do artigo é analisar as reações do Estado brasileiro a cibercrimes de alto perfil. O artigo fornece uma visão contextual de como incidentes significativos moldaram a resposta legislativa do Brasil ao cibercrime, principalmente na Lei Geral de Proteção de Dados e na Lei Carolina Dieckmann. Contribui para uma agenda de pesquisa focada em analisar como e por que algumas atividades são criminalizadas, enquanto outras não o são, ajudando também a compreender as prioridades e percepções de diferentes Estados.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The cyber threat has become an increasingly important issue in recent years. Although the problem is global, it affects some countries more than others. This is the case in Brazil, which has become a focal point for cyber attacks. The main goal of this article is to analyze the Brazilian state&#8217;s responses to high-profile cybercrimes. The article provides a contextual overview of how significant incidents have shaped Brazil&#8217;s legislative response to cybercrime, particularly in the General Data Protection Law and the Carolina Dieckmann Law. It contributes to a research agenda focused on analyzing how and why some activities are criminalized while others are not, and also helps to understand the priorities and perceptions of different states.]]></p></abstract>
<kwd-group>
<kwd lng="pt"><![CDATA[cibersegurança]]></kwd>
<kwd lng="pt"><![CDATA[cibercrime]]></kwd>
<kwd lng="pt"><![CDATA[Lei Geral de Proteção de Dados]]></kwd>
<kwd lng="pt"><![CDATA[Lei Carolina Dieckmann]]></kwd>
<kwd lng="pt"><![CDATA[Brasil]]></kwd>
<kwd lng="en"><![CDATA[cybercrime]]></kwd>
<kwd lng="en"><![CDATA[General Data Protection Law]]></kwd>
<kwd lng="en"><![CDATA[Carolina Dieckmann Law]]></kwd>
<kwd lng="en"><![CDATA[Brazil]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<collab>Conselho da Europa</collab>
<source><![CDATA[ASSINATURAS E ratificações da Convenção de Cibercrimes]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[ATRIZ CAROLINA Dieckmann é chantageada]]></article-title>
<source><![CDATA[O Estado de S. Paulo]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BAUMAN]]></surname>
<given-names><![CDATA[Zygmunt]]></given-names>
</name>
<name>
<surname><![CDATA[BIGO]]></surname>
<given-names><![CDATA[didier]]></given-names>
</name>
<name>
<surname><![CDATA[ESTEVES]]></surname>
<given-names><![CDATA[Paulo]]></given-names>
</name>
<name>
<surname><![CDATA[GUILD]]></surname>
<given-names><![CDATA[Elspeth]]></given-names>
</name>
<name>
<surname><![CDATA[JABRI]]></surname>
<given-names><![CDATA[Vivienne]]></given-names>
</name>
<name>
<surname><![CDATA[LYON]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
<name>
<surname><![CDATA[WALKER]]></surname>
<given-names><![CDATA[R. B. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[After Snowden]]></article-title>
<source><![CDATA[International Political Sociology]]></source>
<year>2014</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>121-44</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BERGER]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
<name>
<surname><![CDATA[LUCKMANN]]></surname>
<given-names><![CDATA[Thomas]]></given-names>
</name>
</person-group>
<source><![CDATA[The Social Construction of Reality]]></source>
<year>1966</year>
<edition>1</edition>
<publisher-loc><![CDATA[Nova Iorque ]]></publisher-loc>
<publisher-name><![CDATA[Open Road]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BIONI]]></surname>
<given-names><![CDATA[Bruno Ricardo]]></given-names>
</name>
<name>
<surname><![CDATA[RIELLI]]></surname>
<given-names><![CDATA[Mariana Marques]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A construção multissetorial da LGPD: história e aprendizado]]></article-title>
<source><![CDATA[Proteção de Dados: Contexto, Narrativas e Elementos Fundantes]]></source>
<year>2021</year>
<publisher-loc><![CDATA[São Paulo ]]></publisher-loc>
<publisher-name><![CDATA[B. R. Bioni Sociedade Individual de Advocacia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[BORGER]]></surname>
<given-names><![CDATA[Julian]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Brazilian president: US surveillance a &#8220;breach of international law&#8221;]]></article-title>
<source><![CDATA[The Guardian]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DAVID]]></surname>
<given-names><![CDATA[René]]></given-names>
</name>
</person-group>
<source><![CDATA[Major Legal Systems in the World Today]]></source>
<year>1985</year>
<publisher-loc><![CDATA[Milwaukee ]]></publisher-loc>
<publisher-name><![CDATA[Stevens]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DEVANNY]]></surname>
<given-names><![CDATA[Joe]]></given-names>
</name>
<name>
<surname><![CDATA[GOLDONI]]></surname>
<given-names><![CDATA[Luiz]]></given-names>
</name>
<name>
<surname><![CDATA[MEDEIROS]]></surname>
<given-names><![CDATA[Breno]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Strategy in an uncertain domain: threat and response in cyberspace]]></article-title>
<source><![CDATA[Journal of Strategic Security]]></source>
<year>2022</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>34-47</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DEVANNY]]></surname>
<given-names><![CDATA[Joe]]></given-names>
</name>
<name>
<surname><![CDATA[GOLDONI]]></surname>
<given-names><![CDATA[Luiz]]></given-names>
</name>
<name>
<surname><![CDATA[MEDEIROS]]></surname>
<given-names><![CDATA[Breno]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The rise of cyber power in Brazil]]></article-title>
<source><![CDATA[Revista Brasileira de Política Internacional]]></source>
<year>2022</year>
<volume>65</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-21</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DEVANNY]]></surname>
<given-names><![CDATA[Joe]]></given-names>
</name>
<name>
<surname><![CDATA[MARTIN]]></surname>
<given-names><![CDATA[Ciaran]]></given-names>
</name>
<name>
<surname><![CDATA[STEVENS]]></surname>
<given-names><![CDATA[Tim]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the strategic consequences of digital espionage]]></article-title>
<source><![CDATA[Journal of Cyber Policy]]></source>
<year>2021</year>
<volume>3</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>429-50</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[DILMA DECIDE cancelar visita de Estado aos EUA, diz jornal]]></article-title>
<source><![CDATA[G1]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[EBERT]]></surname>
<given-names><![CDATA[Hannes]]></given-names>
</name>
<name>
<surname><![CDATA[MAURER]]></surname>
<given-names><![CDATA[Tim]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Contested cyberspace and rising powers]]></article-title>
<source><![CDATA[Third World Quarterly]]></source>
<year>2013</year>
<volume>34</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1054-74</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[EDDY]]></surname>
<given-names><![CDATA[Melissa]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[File is said to confirm NSA spied on Merkel]]></article-title>
<source><![CDATA[Nytimes.com]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[GORDON]]></surname>
<given-names><![CDATA[Sarah]]></given-names>
</name>
<name>
<surname><![CDATA[FORD]]></surname>
<given-names><![CDATA[Richard]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the definition and classification of cybercrime]]></article-title>
<source><![CDATA[Journal of Computer Virology]]></source>
<year>2006</year>
<volume>13</volume>
<page-range>13-20</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[GUTWIRTH]]></surname>
<given-names><![CDATA[Serge]]></given-names>
</name>
<name>
<surname><![CDATA[DE HERT]]></surname>
<given-names><![CDATA[Paul]]></given-names>
</name>
<name>
<surname><![CDATA[DE SUTTER]]></surname>
<given-names><![CDATA[Laurent]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The trouble with technology regulation from a legal perspective]]></article-title>
<source><![CDATA[Regulating Technologies]]></source>
<year>2008</year>
<page-range>193-218</page-range><publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Hart Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[IRAMINA]]></surname>
<given-names><![CDATA[Aline]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[RGPD v. LGPD: adoção estratégica da abordagem responsivo na elaboração da Lei Geral de Proteção de Dados no Brasil e do Regulamento Geral de Proteção de Dados da União Europeia]]></article-title>
<source><![CDATA[Revista de Direito, Estado e Telecomunicações]]></source>
<year>2020</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>91-117</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="">
<collab>INTERNATIONAL TELECOMMUNICATION UNION</collab>
<source><![CDATA[Global Cybersecurity Index 2020]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[JOHNSON]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
<name>
<surname><![CDATA[POST]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Law and borders]]></article-title>
<source><![CDATA[Stanford Law Review]]></source>
<year>1996</year>
<volume>48</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1367-402</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[JORNAIS INTERNACIONAIS destacam ataque &#8220;feroz&#8221; de Dilma à espionagem dos EUA]]></article-title>
<source><![CDATA[BBC News Brasil]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[LANCY]]></surname>
<given-names><![CDATA[Nicola]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Historicising criminalisation]]></article-title>
<source><![CDATA[The Modern Law Review]]></source>
<year>2009</year>
<volume>72</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>936-60</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<source><![CDATA[LEI GERAL de Proteção de Dados. Presidência da República. Brasil]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[LIMBERGER]]></surname>
<given-names><![CDATA[Têmis]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lei Geral de Proteção de Dados (LGPD) e a Lei de Acesso à Informação Pública (LAI)]]></article-title>
<source><![CDATA[Revista de Direito Administrativo]]></source>
<year>2022</year>
<volume>281</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>113-44</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[LYON]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Surveillance, Snowden, and big data]]></article-title>
<source><![CDATA[Big Data &amp; Society]]></source>
<year>2014</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[MADUEÑO]]></surname>
<given-names><![CDATA[Denise]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Caso Carolina faz Câmara aprovar lei do crime cibernético]]></article-title>
<source><![CDATA[O Estado de S. Paulo]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[MANZANO]]></surname>
<given-names><![CDATA[Gabriel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Documentos indicam que Petrobrás é espionada por agência americana]]></article-title>
<source><![CDATA[Estadão]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[MEDEIROS]]></surname>
<given-names><![CDATA[Breno]]></given-names>
</name>
<name>
<surname><![CDATA[GOLDONI]]></surname>
<given-names><![CDATA[Luiz]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The fundamental conceptual trinity of cyberspace]]></article-title>
<source><![CDATA[Contexto Internacional]]></source>
<year>2020</year>
<volume>42</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>31-54</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<collab>Gabinete de Segurança Institucional da Presidência da República</collab>
<source><![CDATA[MINUTA DA PNCiber]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[REGAN]]></surname>
<given-names><![CDATA[James]]></given-names>
</name>
<name>
<surname><![CDATA[JOHN]]></surname>
<given-names><![CDATA[Mark]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[NSA spied on French presidents]]></article-title>
<source><![CDATA[WikiLeaks]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[RONFELDT]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberocracy is coming]]></article-title>
<source><![CDATA[The Information Society]]></source>
<year>1992</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>243-96</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[SEGAL]]></surname>
<given-names><![CDATA[Adam]]></given-names>
</name>
</person-group>
<source><![CDATA[The Hacked World Order]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Hachette]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[SMITH]]></surname>
<given-names><![CDATA[Stephen]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Communication and the Constitution in cyberspace]]></article-title>
<source><![CDATA[Com- munication Education]]></source>
<year>1994</year>
<volume>43</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>87-101</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="">
<collab>Câmara dos Deputados</collab>
<source><![CDATA[TRAMITAÇÃO DA Lei 12.737/2012]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="">
<collab>Câmara dos Deputados</collab>
<source><![CDATA[TRAMITAÇÃO DA Lei 13709/2018]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<collab>Câmara dos Deputados</collab>
<source><![CDATA[TRAMITAÇÃO DE Projetos de Lei - crimes cibernéticos]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[VALLE]]></surname>
<given-names><![CDATA[Sabrina]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Carolina Dieckmann teve as fotos roubadas por hackers]]></article-title>
<source><![CDATA[O Estado de S. Paulo. São Paulo]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[VIRILIO]]></surname>
<given-names><![CDATA[Paul]]></given-names>
</name>
</person-group>
<source><![CDATA[El Cibermundo, la política de lo peor]]></source>
<year>1997</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Cultura Libre]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[WATTS]]></surname>
<given-names><![CDATA[Jonathan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Brazil demands explanation from US over nsa spying]]></article-title>
<source><![CDATA[The Guardian]]></source>
<year>2024</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
