{"id":6495,"date":"2020-12-29T22:35:00","date_gmt":"2020-12-29T21:35:00","guid":{"rendered":"https:\/\/webhosting.de\/?p=6495"},"modified":"2020-12-28T22:36:36","modified_gmt":"2020-12-28T21:36:36","slug":"state-trojan-authorities-hack-hack-cientos-de-computadoras-anualmente","status":"publish","type":"post","link":"https:\/\/webhosting.de\/es\/staatstrojaner-behoerden-hacken-hunderte-computer-jaehrlich\/","title":{"rendered":"Troyanos de Estado - Las autoridades piratean cientos de ordenadores al a\u00f1o"},"content":{"rendered":"<p class=\"wp-block-paragraph\">A <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/SharedDocs\/Publikationen\/Justizstatistik\/Uebersicht_TKUE_2019.pdf?__blob=publicationFile&amp;v=2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Estad\u00edsticas<\/a> (PDF) de la <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/Presse\/Archiv\/2020\/20201218.html?nn=3452270\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Oficina Federal de Justicia<\/a> (BjV) revela que los investigadores federales y estatales usar\u00e1n computadoras y tel\u00e9fonos inteligentes pertenecientes a los sospechosos en varios cientos de casos en 2019 <a href=\"https:\/\/webhosting.de\/es\/wordpress-gehackt-bekommen-sie-es-wieder-sicher\/\">hacke\u00f3<\/a> tienen. En general, seg\u00fan la primera publicaci\u00f3n de la <a href=\"https:\/\/webhosting.de\/es\/personenbezogene-daten-sozialen-netzwerken\/\">Datos<\/a> 600 procedimientos para la llamada vigilancia de las telecomunicaciones en la fuente (source TK\u00dc) y las b\u00fasquedas en l\u00ednea. De ellos, 380 se aplicaron realmente. Las estad\u00edsticas no muestran cu\u00e1ntos dispositivos fueron hackeados con \u00e9xito.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mecklemburgo-Pomerania Occidental (95), Baja Sajonia (89) y Sajonia (76) fueron las que m\u00e1s procedimientos tuvieron. El Ministerio P\u00fablico Federal y seis estados federales no utilizaron en absoluto los a\u00fan relativamente nuevos m\u00e9todos de investigaci\u00f3n en 2019. El uso m\u00e1s frecuente de la fuente tK\u00dc es en las investigaciones de delitos de drogas.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\"Una orden puede haber autorizado la vigilancia de m\u00e1s de un n\u00famero de tel\u00e9fono o identificador, de modo que el n\u00famero de \u00f3rdenes que se muestran no es id\u00e9ntico al n\u00famero de n\u00fameros de tel\u00e9fono u otros identificadores vigilados\".<\/p><cite>BfV<\/cite><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-quellen-tk-gegen-verschl-sselte-kommunikation\">Fuente TK\u00dc contra la comunicaci\u00f3n encriptada<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">De acuerdo con <a href=\"https:\/\/www.gesetze-im-internet.de\/stpo\/__100a.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u00a7 100a del C\u00f3digo de Procedimiento Penal<\/a> (StPO), el <a href=\"https:\/\/www.bka.de\/DE\/UnsereAufgaben\/Ermittlungsunterstuetzung\/Technologien\/QuellentkueOnlinedurchsuchung\/quellentkueOnlinedurchsuchung_node.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Fuente-TK\u00dc<\/a> se utiliza principalmente para interceptar comunicaciones cifradas. Por otra parte, las comunicaciones no codificadas pueden ser evaluadas por las autoridades investigadoras mediante \u00f3rdenes de vigilancia convencionales. En 2019, se autoriz\u00f3 en 5.252 procedimientos penales en 18.225 casos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-onlinedurchsuchung-kommt-selten-zum-einsatz\">Las b\u00fasquedas en l\u00ednea se utilizan raramente<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Por otra parte, la llamada b\u00fasqueda en l\u00ednea se utiliza con mucha menos frecuencia, lo que se debe a que el umbral de intervenci\u00f3n seg\u00fan <a href=\"https:\/\/www.gesetze-im-internet.de\/stpo\/__100b.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u00a7 100b<\/a> del StPO es significativamente mayor. A diferencia de la CCTV de origen, este m\u00e9todo de investigaci\u00f3n no s\u00f3lo monitoriza las comunicaciones de los sospechosos, sino que tambi\u00e9n lee los datos almacenados.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">De acuerdo con el <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/SharedDocs\/Publikationen\/Justizstatistik\/Uebersicht_Online_Durchsuchung_2019.pdf?__blob=publicationFile&amp;v=2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Estad\u00edsticas<\/a> (PDF) de la BfJ, las b\u00fasquedas en l\u00ednea se solicitaron s\u00f3lo 20 veces en 2019 y se implementaron 12 veces. La mitad de las solicitudes proced\u00edan de Baviera. El Fiscal Federal, as\u00ed como los estados federales de Baden-W\u00fcrttemberg, Berl\u00edn, Renania-Palatinado, Sajonia-Anhalt, Schleswig-Holstein y Turingia no utilizaron b\u00fasquedas en l\u00ednea o la escucha de fuentes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keine-details-zur-technischen-umsetzung\">No hay detalles sobre la aplicaci\u00f3n t\u00e9cnica<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Las estad\u00edsticas no revelan la forma en que se aplicaron t\u00e9cnicamente la escucha de fuentes y las b\u00fasquedas en l\u00ednea. Sin embargo, el gobierno federal respondi\u00f3 recientemente a una pregunta escrita del diputado Dieter Dehm (Partido de Izquierda) que los problemas t\u00e9cnicos a menudo hacen m\u00e1s dif\u00edcil la pirater\u00eda de los dispositivos terminales.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\"Las b\u00fasquedas de fuentes de CCTV y en l\u00ednea suelen limitarse a unos pocos casos debido a un esfuerzo operacional muy elevado y a dificultades t\u00e9cnicas, por lo que rara vez pueden utilizarse realmente en la pr\u00e1ctica\".<\/p><cite>Gobierno Federal<\/cite><\/blockquote><\/figure>","protected":false},"excerpt":{"rendered":"<p>Los organismos de investigaci\u00f3n han utilizado la fuente tK\u00dc y las b\u00fasquedas en l\u00ednea en varios cientos de casos en 2019.<\/p>","protected":false},"author":2,"featured_media":6491,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[709],"tags":[959,960],"class_list":["post-6495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-recht","tag-staatstrojaner","tag-ueberwachung"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"709","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":"709","rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1609191398:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":null,"_oembed_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_03514b67990db061d7c4672de26dc514":null,"_oembed_time_03514b67990db061d7c4672de26dc514":null,"rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4125","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"state-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_lv":"valsts-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"state-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_ja":"%e3%83%88%e3%83%ad%e3%82%a4%e3%81%ae%e6%9c%a8%e9%a6%ac%e3%81%ae%e6%9c%a8%e9%a6%ac%e5%9b%bd%e5%ae%b6%e3%81%af%e6%af%8e%e5%b9%b4%e4%bd%95%e7%99%be%e5%8f%b0%e3%82%82%e3%81%ae%e3%82%b3%e3%83%b3%e3%83%94","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":null,"_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_time_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_59808117857ddf57e478a31d79f76e4d":null,"_oembed_time_59808117857ddf57e478a31d79f76e4d":null,"_oembed_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_81002f7ee3604f645db4ebcfd1912acf":null,"_oembed_time_81002f7ee3604f645db4ebcfd1912acf":null,"_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"492","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":[],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"Ermittlungsbeh\u00f6rden haben 2019 die Quellen-TK\u00dc und Onlinedurchsuchung in mehreren Hunder F\u00e4llen eingesetzt.","_yoast_wpseo_content_score":"60","_yoast_wpseo_focuskeywords":"[]","_yoast_wpseo_keywordsynonyms":"[\"\"]","_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":"Ermittlungsbeh\u00f6rden haben 2019 die Quellen-TK\u00dc und Onlinedurchsuchung in mehreren Hunder F\u00e4llen eingesetzt.","surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"6491","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/6495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/comments?post=6495"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/posts\/6495\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media\/6491"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/media?parent=6495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/categories?post=6495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/es\/wp-json\/wp\/v2\/tags?post=6495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}