:::

詳目顯示

回上一頁
題名:取得加密通訊內容因應對策--從通訊監察技術觀點出發
書刊名:警專學報
作者:林國翔沈士豪李鎮宇
作者(外文):Lin, Kuo-hsiangShen, Shih HaoLi, Chen-yu
出版日期:2021
卷期:7:6
頁次:頁25-48
主題關鍵詞:通訊監察科技偵查通訊軟體加密Lawful interceptionCommunication surveillanceTechnology crime investigationCommunication applicationsEncryption
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:19
  • 點閱點閱:4
期刊論文
1.王士帆(20160600)。網路之刑事追訴--科技與法律的較勁。政大法學評論,145,339-390。new window  延伸查詢new window
2.劉文斌、孔懷瑞(20101000)。中共網際網路控制作為研析。展望與探索,8(10),24-49。  延伸查詢new window
3.李榮耕(20180100)。初探遠端電腦搜索。東吳法律學報,29(3),49-87。new window  延伸查詢new window
4.Zöller, Mark A.、王士帆(20190800)。來源端電信監察與線上搜索--德國刑事追訴機關之新手段。司法新聲,130,106-123。  延伸查詢new window
5.王士帆(20191200)。當科技偵查駭入語音助理--刑事訴訟準備好了嗎?。臺北大學法學論叢,112,191-242。new window  延伸查詢new window
6.施育傑(20201100)。科技時代的偵查干預處分--兼論我國法方向。月旦法學,306,154-174。new window  延伸查詢new window
7.林鈺雄(20210200)。科技偵查概論--干預屬性及授權基礎。月旦法學教室,220,46-57。  延伸查詢new window
8.林鈺雄(20210300)。科技偵查概論--干預屬性及授權基礎。月旦法學教室,221,42-52。  延伸查詢new window
9.Diffie, W.、Landau, S.(2009)。Communications surveillance: Privacy and security at Risk。Communications of the ACM,52,42-47。  new window
10.Goodwin, B.(20210310)。Police crack world's largest cryptophone network ascriminals swap EncroChat for Sky ECC。Computer Weekly。  new window
11.Goodwin, B.(20210329)。UK courts face evidence 'black hole' over police EncroChat mass hacking。Computer Weekly。  new window
12.Landau, S.(2005)。CALEA and Network Security: Security, wiretapping, and the Internet。IEEE Security & Privacy,52(11),26-33。  new window
圖書
1.Wetherall, David J.、Tanenbaum, Andrew S.(2010)。Computer Networks。Pearson。  new window
2.Hoffmann, P.、Terplan, K.(2006)。Intelligence support systems: technologies for lawful intercepts。Auerbach Publications。  new window
3.(2020)。Surveillance Devices Act 2004 Annual Report 2019-20。  new window
其他
1.朱翊瑄(2019)。美國《雲端法》(CLOUD Act),https://stli.iii.org.tw/article-detail.aspx?no=67&tp=5&d=8291。  new window
2.(20210608)。800 criminals arrested in biggest ever law enforcement operation against encrypted communication,https://www.europol.europa.eu/newsroom/news/800-criminals-arrested-in-biggest-ever-law-enforcement-operation-against-encrypted-communication。  new window
3.(2021)。App stores--Statistics & Facts,https://www.statista.com/topics/1729/app-stores/#topicHeader__wrapper。  new window
4.Assistance and Access: Overview,https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/lawful-access-telecommunications/assistance-and-access-overview。  new window
5.(20160420)。Bundesverfassungsgericht-Decisions-Constitutional complaints against the investigative Powers of the Federal Criminal Police Office for fighting international terrorism partially successful,https://www.bundesverfassungsgericht.de/SharedDocs/Entscheidungen/EN/2016/04/rs20160420_1bvr096609en.html。  new window
6.Caproni, V.(2011)。FBI--Going Dark: Lawful Electronic Surveillance in the Face of New Technologies,https://archives.fbi.gov/archives/news/testimony/going-dark-lawful-electronic-surveillance-in-the-face-of-new-technologies。  new window
7.(20111008)。Chaos Computer Club analyzes government malware,https://ccc.de/en/updates/2011/staatstrojaner。  new window
8.(2021)。China: number of mobile apps available on app stores 2020,https://www.statista.com/statistics/1058715/china-mobile-applications-available-app-stores/。  new window
9.Corpuz, J.(20210517)。The best encrypted messaging apps in 2021,https://www.tomsguide.com/reference/best-encrypted-messaging-apps。  new window
10.(20200702)。Dismantling of an encrypted network sends shockwaves through organised crime groups across Europe,https://www.eurojust.europa.eu/dismantling-encrypted-network-sends-shockwaves-through-organised-crime-groups-across-europe。  new window
11.Hymas, C.,Kirk, A.(20190113)。Crime victims wait half an hour for police to respond to 999 calls as response times double,https://www.telegraph.co.uk/news/2019/01/13/crime-victims-wait-half-hour-police-respond-999-calls-response/。  new window
12.(20160413)。Intelligence Committee Leaders Release Discussion Draft of Encryption Bill,https://www.feinstein.senate.gov/public/index.cfm/press-releases?ID=EA927EA1-E098-4E62-8E61-DF55CBAC1649。  new window
13.(20191023)。Joint meeting of Five Country Ministerial and quintet of Attorneys-General: communiqué, London 2019,https://www.gov.uk/government/publications/five-country-ministerial-communique/joint-meeting-of-five-country-ministerial-and-quintet-of-attorneys-general-communique-london-2019。  new window
14.(20190729)。Judgment in investigatory powers legal challenge,https://homeofficemedia.blog.gov.uk/2019/07/29/judgment-in-investigatory-powers-legal-challenge/。  new window
15.Karantzoulidis, S.(20181120)。The Best and Worst Police Response Times of 10 Major U.S. Cities,https://www.securitysales.com/news/best-worst-police-response-times/。  new window
16.Koops, B.-J.(1995)。Crypto Law Survey,ftp://ftp.cerias.purdue.edu/pub/doc/cryptography/Crypto_Law_Survey/CryptoLawSurvey.html。  new window
17.Kravets, D.(20150113)。UK prime minister wants backdoors into messaging apps or he'll ban them,https://arstechnica.com/tech-policy/2015/01/uk-prime-minister-wants-backdoors-into-messaging-apps-or-hell-ban-them/。  new window
18.Law Enforcement Guidelines US,https://www.documentcloud.org/documents/4254995-Law-Enforcement-Guidelines-Us.html#document/p10/a3。  new window
19.(2017)。Lawful Interception (LI); Requirements of Law Enforcement Agencies,http://www.etsi.org/standards-search。  new window
20.LINE responding to law enforcement agencies,https://linecorp.com/en/security/article/35。  new window
21.Marquis-Boire, M.,Marczak, B.,Guarnieri, C.,Scott-Railton, J.(20130313)。You Only Click Twice: FinFisher's Global Proliferation--Citizen Lab,https://citizenlab.ca/2013/03/you-only-click-twice-finfishers-global-proliferation-2/。  new window
22.Meister, A.(20180626)。Geheime Dokumente: Das Bundeskriminalamt kann jetzt drei Staatstrojaner einsetzen,https://netzpolitik.org/2018/geheime-dokumente-das-bundeskriminalamt-kann-jetzt-drei-staatstrojaner-einsetzen/。  new window
23.(20210310)。New major interventions to block encrypted communications of criminal networks,https://www.europol.europa.eu/newsroom/news/new-major-interventions-to-block-encrypted-communications-of-criminal-networks。  new window
24.(19930729)。NIST Proposes Voluntary Federal Standard for Key Escrow Encryption,https://www.nist.gov/news-events/news/1993/07/nist-proposes-voluntary-federal-standard-key-escrow-encryption。  new window
25.Quellen-TKÜ und Online-Durchsuchung,https://www.bka.de/DE/UnsereAufgaben/Ermittlungsunterstuetzung/Technologien/QuellentkueOnlinedurchsuchung/quellentkueOnlinedurchsuchung_node.html。  new window
26.Quinlan, S.,Wilson, A.(2016)。A brief history of law enforcement hacking in the United States,New America。,https://na-production.s3.amazonaws.com/documents/History_Hacking.pdf。  new window
27.Thomson, I.(20210408)。Belgian police seize 28 tons of cocaine after "cracking" Sky ECC's chat app encryption,https://www.theregister.com/2021/04/08/sky_ecc_drugs/。  new window
28.Tumblr Law Enforcement Guidelines,https://www.tumblr.com/docs/en/law_enforcement。  new window
29.Beuth, Von Patrick,Biermann, Kai(20170623)。Staatstrojaner: Dein trojanischer Freund und Helfer,http://www.zeit.de/digital/datenschutz/2017-06/staatstrojaner-gesetz-bundestag-beschluss。  new window
30.WeChat law enforcement data request guidelines,https://www.wechat.com/en/law_enforcement_data_request.html。  new window
31.WhatsApp FAQ--Information for Law Enforcement Authorities,https://faq.whatsapp.com/en/26000050/?category=5245250。  new window
32.Wray, C.(20191004)。Finding a Way Forward on Lawful Access: Bringing Child Predators out of the Shadows,https://www.fbi.gov/news/speeches/finding-a-way-forward-on-lawful-access。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
QR Code
QRCODE