{"id":6495,"date":"2020-12-29T22:35:00","date_gmt":"2020-12-29T21:35:00","guid":{"rendered":"https:\/\/webhosting.de\/?p=6495"},"modified":"2020-12-28T22:36:36","modified_gmt":"2020-12-28T21:36:36","slug":"state-trojan-authorities-hack-hundreds-of-computers-anualmente","status":"publish","type":"post","link":"https:\/\/webhosting.de\/pt\/staatstrojaner-behoerden-hacken-hunderte-computer-jaehrlich\/","title":{"rendered":"Trojans estaduais - Autoridades hackeiam centenas de computadores por ano"},"content":{"rendered":"<p class=\"wp-block-paragraph\">A <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/SharedDocs\/Publikationen\/Justizstatistik\/Uebersicht_TKUE_2019.pdf?__blob=publicationFile&amp;v=2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Estat\u00edsticas<\/a> (PDF) do <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/Presse\/Archiv\/2020\/20201218.html?nn=3452270\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Departamento Federal de Justi\u00e7a<\/a> (BjV) revela que investigadores federais e estaduais usar\u00e3o computadores e smartphones pertencentes a suspeitos em v\u00e1rias centenas de casos em 2019 <a href=\"https:\/\/webhosting.de\/pt\/wordpress-gehackt-bekommen-sie-es-wieder-sicher\/\">invadido<\/a> ter. Globalmente, de acordo com a primeira publica\u00e7\u00e3o do <a href=\"https:\/\/webhosting.de\/pt\/personenbezogene-daten-sozialen-netzwerken\/\">Dados<\/a> 600 procedimentos para a chamada vigil\u00e2ncia das telecomunica\u00e7\u00f5es de origem (fonte TK\u00dc) e buscas on-line. Destes, 380 foram realmente implementados. As estat\u00edsticas n\u00e3o mostram quantos dispositivos foram hackeados com sucesso.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mecklenburg- Pomer\u00e2nia Ocidental (95), Baixa Sax\u00f4nia (89) e Sax\u00f4nia (76) tiveram o maior n\u00famero de procedimentos. O Minist\u00e9rio P\u00fablico Federal e seis estados federais n\u00e3o utilizaram os ainda relativamente novos m\u00e9todos de investiga\u00e7\u00e3o em 2019. O uso mais frequente da fonte tK\u00dc \u00e9 nas investiga\u00e7\u00f5es de delitos relacionados com drogas.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\"Uma ordem pode ter autorizado o monitoramento de mais de um n\u00famero de telefone ou identificador, de modo que o n\u00famero de ordens mostrado n\u00e3o seja id\u00eantico ao n\u00famero de n\u00fameros de telefone ou outros identificadores monitorados\".<\/p><cite>BfV<\/cite><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-quellen-tk-gegen-verschl-sselte-kommunikation\">Fonte TK\u00dc contra comunica\u00e7\u00e3o criptografada<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">De acordo com <a href=\"https:\/\/www.gesetze-im-internet.de\/stpo\/__100a.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u00a7 100a C\u00f3digo de Processo Penal<\/a> (StPO), o <a href=\"https:\/\/www.bka.de\/DE\/UnsereAufgaben\/Ermittlungsunterstuetzung\/Technologien\/QuellentkueOnlinedurchsuchung\/quellentkueOnlinedurchsuchung_node.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Fonte-TK\u00dc<\/a> \u00e9 usado principalmente para interceptar comunica\u00e7\u00f5es criptografadas. As comunica\u00e7\u00f5es n\u00e3o criptografadas, por outro lado, podem ser avaliadas pelas autoridades investigadoras atrav\u00e9s de ordens de vigil\u00e2ncia convencionais. Em 2019, isto foi autorizado em 5.252 processos criminais em 18.225 casos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-onlinedurchsuchung-kommt-selten-zum-einsatz\">As pesquisas on-line s\u00e3o raramente utilizadas<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">A chamada busca online, por outro lado, \u00e9 utilizada com muito menos frequ\u00eancia, o que se deve ao facto de o limiar de interven\u00e7\u00e3o de acordo com <a href=\"https:\/\/www.gesetze-im-internet.de\/stpo\/__100b.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u00a7 100b<\/a> do StPO \u00e9 significativamente maior. Ao contr\u00e1rio do CCTV de origem, este m\u00e9todo de investiga\u00e7\u00e3o n\u00e3o s\u00f3 monitoriza as comunica\u00e7\u00f5es dos suspeitos, mas tamb\u00e9m l\u00ea os dados armazenados.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">De acordo com a <a href=\"https:\/\/www.bundesjustizamt.de\/DE\/SharedDocs\/Publikationen\/Justizstatistik\/Uebersicht_Online_Durchsuchung_2019.pdf?__blob=publicationFile&amp;v=2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Estat\u00edsticas<\/a> (PDF) do BfJ, as pesquisas online foram aplicadas apenas 20 vezes em 2019 e implementadas 12 vezes. Metade das aplica\u00e7\u00f5es vieram da Baviera. O Minist\u00e9rio P\u00fablico Federal assim como os estados federais de Baden-W\u00fcrttemberg, Berlim, Ren\u00e2nia-Palatinado, Sax\u00f3nia-Anhalt, Schleswig-Holstein e Tur\u00edngia n\u00e3o utilizaram buscas online ou busca de fontes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-keine-details-zur-technischen-umsetzung\">Sem detalhes sobre a implementa\u00e7\u00e3o t\u00e9cnica<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">As estat\u00edsticas n\u00e3o revelam como a pesquisa na fonte e as pesquisas on-line foram tecnicamente implementadas. No entanto, o governo federal respondeu recentemente a uma pergunta escrita do deputado Dieter Dehm (Partido da Esquerda) de que problemas t\u00e9cnicos muitas vezes tornam mais dif\u00edcil a pirataria de dispositivos terminais.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>\"O CCTV de origem e as pesquisas on-line s\u00e3o normalmente limitadas a alguns casos devido a um esfor\u00e7o operacional e dificuldades t\u00e9cnicas muito elevados e, portanto, raramente podem ser realmente utilizados na pr\u00e1tica\".<\/p><cite>Governo Federal<\/cite><\/blockquote><\/figure>","protected":false},"excerpt":{"rendered":"<p>As ag\u00eancias de investiga\u00e7\u00e3o t\u00eam usado a fonte tK\u00dc e as buscas on-line em v\u00e1rias centenas de casos em 2019.<\/p>","protected":false},"author":2,"featured_media":6491,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[709],"tags":[959,960],"class_list":["post-6495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-recht","tag-staatstrojaner","tag-ueberwachung"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"709","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":"709","rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1609191398:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":null,"_oembed_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_03514b67990db061d7c4672de26dc514":null,"_oembed_time_03514b67990db061d7c4672de26dc514":null,"rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4127","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"state-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_lv":"valsts-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"state-trojan-authorities-hack-hundreds-of-computers-annually","_trp_automatically_translated_slug_ja":"%e3%83%88%e3%83%ad%e3%82%a4%e3%81%ae%e6%9c%a8%e9%a6%ac%e3%81%ae%e6%9c%a8%e9%a6%ac%e5%9b%bd%e5%ae%b6%e3%81%af%e6%af%8e%e5%b9%b4%e4%bd%95%e7%99%be%e5%8f%b0%e3%82%82%e3%81%ae%e3%82%b3%e3%83%b3%e3%83%94","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":null,"_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_time_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_59808117857ddf57e478a31d79f76e4d":null,"_oembed_time_59808117857ddf57e478a31d79f76e4d":null,"_oembed_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_81002f7ee3604f645db4ebcfd1912acf":null,"_oembed_time_81002f7ee3604f645db4ebcfd1912acf":null,"_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"492","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":[],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"Ermittlungsbeh\u00f6rden haben 2019 die Quellen-TK\u00dc und Onlinedurchsuchung in mehreren Hunder F\u00e4llen eingesetzt.","_yoast_wpseo_content_score":"60","_yoast_wpseo_focuskeywords":"[]","_yoast_wpseo_keywordsynonyms":"[\"\"]","_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":"Ermittlungsbeh\u00f6rden haben 2019 die Quellen-TK\u00dc und Onlinedurchsuchung in mehreren Hunder F\u00e4llen eingesetzt.","surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"6491","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/posts\/6495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/comments?post=6495"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/posts\/6495\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/media\/6491"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/media?parent=6495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/categories?post=6495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/pt\/wp-json\/wp\/v2\/tags?post=6495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}