SciELO - Scientific Electronic Library Online

 
 número9O Governo Electrónico, a sua aposta em Portugal e a importância das Tecnologias de Comunicação para a sua estratégia.A new MDA approach based on BPM and SOA to improve software development process índice de autoresíndice de assuntosPesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Journal

Artigo

Indicadores

Links relacionados

  • Não possue artigos similaresSimilares em SciELO

Compartilhar


Tékhne - Revista de Estudos Politécnicos

versão impressa ISSN 1645-9911

Tékhne  n.9 Barcelos jun. 2008

 

A intercepção legal de comunicações em redes IP

Irene Portela[1]

 

Resumo. No âmbito das vigilâncias electrónicas, o conceito tradicional de “escutas telefónicas” está desadequado à realidade criminal. O uso do ciberespaço pelas células do terrorismo internacional, torna imprescindível a intercepção de comunicações em redes IP. Mas a utilização das novas tecnologias envolve riscos e tem impactos consideráveis nos meios e na operacionalidade da segurança nacional, além de elevados custos inerentes à sua utilização indiscriminada. No âmbito do terrorismo internacional, não só a intelligence, como as investigações criminais, implicam uma elevada concentração de recursos orientados para o combate, mas especialmente para a prevenção. Neste contexto, o uso como meio de prova do material interceptado através das novas tecnologias de informação implica profundas alterações no regime legal das provas admissíveis em julgamento.

Palavras-chave: provas processuais, Internet, terrorismo, vigilância electrónica, escutas.

 

 

Abstract. The traditional concept of “wiretapping” or “eavesdropping”within the scope of electronic surveillance is inadequate to current criminal reality. The use of the cyberspace by international terrorists’ cells have made indispensable the intersection of IP communication net. But using new technologies involves risks and have a significant impact in National Security, as well in the high costs related to its indiscrimated use. As far as International Terrorism is concerned not only the intelelligence but also the law enforcement imply a high concentration of resources in order to the fight and, especially to the prevention. In this context, the utilization as evidence of the material intercepted by the new Information Tecknologies means profound changes in the legal model of the   evidences admited on trial.

Keywords: Evidence, Internet, Security, terrorism, surveillance technology, eavesdropping.

 

 

Texto completo disponível apenas em PDF.

Full text only available in PDF format.

 

 

Bibliografia

Branch, P (2003) Lawful Interception of the Internet, Australian Journal of Emerging Technologies and Society, Vol. 1, No. 1.        [ Links ]

Branch, P., Pavlicic, A. and Armitage, G. (2004) Using MAC Addresses in the Lawful Interception of IP Traffic, Australian Telecommunications Networks & Applications Conference 2004, Sydney, Australia, December 8-10, from http://caia.swin.edu.au/pubs/ATNAC04/branch-pavlicic-armitage-ATNAC2004.pdf

Brown, Tina (2005) Death by Error, The Washington Post from http://www.washingtonpost.com/wp-dyn/content/article/2005/05/18/AR2005051802083.html

Capeller, W. (2001) Not such a Neat Net: Some Comments on Virtual Criminality, Social and Legal Sttudies, 10; pp. 229-249

Centro de Estudos Judiciários (2003) Contributos para a reflexão sobre o Sistema Penal Português, Lisboa, Centro de Estudos Judiciários

Chemerinsky, E. (2004) Losing Liberties, Applying a Foreign Intelligence Model to Domestic Law Enforcement, 51 UCLA L. Rev. 1619 From http://eprints.law.duke.edu/archive/00001136/01/51_UCLA_L._Rev._1619_(2003-2004).pdf

Comer, D. E (2000) Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architectures, Fourth Edition, Prentice Hall PTR, Upper Saddle River, NJ

Costa Andrade, M. (1992) Sobre as Proibições de Prova em Processo Penal, Coimbra, Coimbra Editora, pp. 272, 275, 281, 283 e 285.

Costa, F.(1998) Direito Penal da Comunicação, Coimbra, Coimbra Editora,  pp. 63 e ss., e 143 .

Davis, L. E (2002) Organizing for Homeland Security, from http://www.rand.org/pubs/issue_papers/IP220/index2.html

Doyle, C. (2001) Best Intelligence and Law Enforcement cooperation: Countering Transnational Threats to the U.S, CRS REP. Nº RL30252 from http://www.faz.org

 Doyle,C. (2002) Administrative Subpoenas and National Security Letters in Criminal and Foreign Intelligence Investigations: Background and Proposed Adjustments, CRS Report RL32880 from www.fas.org/sgp/crs/natsec/RS22122.pdf

Doyle, C. (2006) National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments,  RS22406, March 21, 2006, from http://www.fas.org/sgp/crs/intel/RS22406.pdf

Furnell, S.M and Warren, M.J. (1999) Computer Haching and Cyber Terrorism: The Real Threats in the New Millennium? Computers & Security, 18; Elsevier Science Ltd. pp.28-34

Garcia, F.P. (2008) O que há de novo na “intelligence”?  from www.jornaldefesa.com.pt/conteudos/view_txt.asp?id=560-42k

Grabosky, P and Smith, R. ( 2001) Digital Crime in the Twenty-First Century, Journal of Information Ethics, 10; pp. 8-26

Jancsewski, L. and Colarik, A. (2005) Managerial Guide for Handling Cyber-Terrorism and Information Warfare, USA: Ida Group Publishing, pp.223–225.

Kerr, O. S. (2003), Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't . Northwestern University Law Review, Vol. 97, from  http://ssrn.com/=317501

Malik, I. (1996) Computer Hacking: detection and protection. Sigma Press, UK, ISBN 1-85058-538-5

Poole, P.S (2001) Inside America’s Secret Court: the Foreign Intelligence Surveillance Court, from http://www.digits.com.

Poore, R.S. (2002) Computer forensics and privacy: at what price do we police the internet, in R. Herold (Ed). The Privacy Papers Managing Technology, Consumer, Employee and Legislative Actions, USA: CRC Press LLC, pp.33–34.

Privy Council   (2008) Review of Intercept as Evidence Report to the Prime Minister and the Home Secretary, from www.tsoshop.co.uk

Ramasastry A.(2006) The National Security Letter Provision of the USA Patriot Act: Why It Ought to Be Amended during the Reauthorization Debates from http://writ.news.findlaw.com/ramasastry/20060109.html#continue

Silva, G.M. (2001)  Direito  Processo Penal, Tomo II, 2ª Edição, Lisboa, Verbo Editora, pp. 201-202

Smith, M. S. (2003) Internet Privacy: Overview and Pending Legislation, CRS, REP. Nº  RL 31408 disponível em http://www.faz.org

Veiga, P. (2004) Tecnologias e sistemas de informação, redes e segurança, Porto, SPI – Sociedade Portuguesa de Inovação, Consultadoria Empresarial e Fomento da Inovação, S.A,  ISBN 972-8589-39-5

Venâncio, P. D (2006) Breve Introdução da Questão da Investigação e Meios de Prova na Criminalidade Informática: 27, from http://www.verbojuridico.net/

Vitorino, A. (2007) “aqui tão perto”, Diário de Notícias from http://dn.sapo.pt/2007/04/20/opiniao/aqui_perto.html

Zanini, M. and  Edwards, J.A. (2001) The Networking of Terror in the Information Age in Arquilla, J. and Ronfeldt, D. (orgs.),Networks and Netwars: The Future of Terror, Crime and Militancy,Santa Monica, CA: RAND, 2001, MR-1382-OSD, p. 43.

Wall, D.S (2001) Maintaining order and law on the internet. In Wall, D. (Ed) Crime and the Internet, London: Routledge

Watney, M. (2007) ‘State surveillance of the internet: human rights infringement or e-security mechanism?’ Int. J. of Electronic Security and Digital Forensics, Vol. 1, No. 1, pp.42–54.

Wisniewski, D. J (2001) “Homeland Security: Under Organized and  Over Involved”, National Defense University, Nacional  War College, Disponível em http://www.stinet.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA4451

 

[1] Escola Superior de Gestão - Instituto Politécnico do Cávado e do Ave.