其他1. | 朱翊瑄(2019)。美國《雲端法》(CLOUD Act),https://stli.iii.org.tw/article-detail.aspx?no=67&tp=5&d=8291。 |
2. | (20210608)。800 criminals arrested in biggest ever law enforcement operation against encrypted communication,https://www.europol.europa.eu/newsroom/news/800-criminals-arrested-in-biggest-ever-law-enforcement-operation-against-encrypted-communication。 |
3. | (2021)。App stores--Statistics & Facts,https://www.statista.com/topics/1729/app-stores/#topicHeader__wrapper。 |
4. | Assistance and Access: Overview,https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/lawful-access-telecommunications/assistance-and-access-overview。 |
5. | (20160420)。Bundesverfassungsgericht-Decisions-Constitutional complaints against the investigative Powers of the Federal Criminal Police Office for fighting international terrorism partially successful,https://www.bundesverfassungsgericht.de/SharedDocs/Entscheidungen/EN/2016/04/rs20160420_1bvr096609en.html。 |
6. | Caproni, V.(2011)。FBI--Going Dark: Lawful Electronic Surveillance in the Face of New Technologies,https://archives.fbi.gov/archives/news/testimony/going-dark-lawful-electronic-surveillance-in-the-face-of-new-technologies。 |
7. | (20111008)。Chaos Computer Club analyzes government malware,https://ccc.de/en/updates/2011/staatstrojaner。 |
8. | (2021)。China: number of mobile apps available on app stores 2020,https://www.statista.com/statistics/1058715/china-mobile-applications-available-app-stores/。 |
9. | Corpuz, J.(20210517)。The best encrypted messaging apps in 2021,https://www.tomsguide.com/reference/best-encrypted-messaging-apps。 |
10. | (20200702)。Dismantling of an encrypted network sends shockwaves through organised crime groups across Europe,https://www.eurojust.europa.eu/dismantling-encrypted-network-sends-shockwaves-through-organised-crime-groups-across-europe。 |
11. | Hymas, C.,Kirk, A.(20190113)。Crime victims wait half an hour for police to respond to 999 calls as response times double,https://www.telegraph.co.uk/news/2019/01/13/crime-victims-wait-half-hour-police-respond-999-calls-response/。 |
12. | (20160413)。Intelligence Committee Leaders Release Discussion Draft of Encryption Bill,https://www.feinstein.senate.gov/public/index.cfm/press-releases?ID=EA927EA1-E098-4E62-8E61-DF55CBAC1649。 |
13. | (20191023)。Joint meeting of Five Country Ministerial and quintet of Attorneys-General: communiqué, London 2019,https://www.gov.uk/government/publications/five-country-ministerial-communique/joint-meeting-of-five-country-ministerial-and-quintet-of-attorneys-general-communique-london-2019。 |
14. | (20190729)。Judgment in investigatory powers legal challenge,https://homeofficemedia.blog.gov.uk/2019/07/29/judgment-in-investigatory-powers-legal-challenge/。 |
15. | Karantzoulidis, S.(20181120)。The Best and Worst Police Response Times of 10 Major U.S. Cities,https://www.securitysales.com/news/best-worst-police-response-times/。 |
16. | Koops, B.-J.(1995)。Crypto Law Survey,ftp://ftp.cerias.purdue.edu/pub/doc/cryptography/Crypto_Law_Survey/CryptoLawSurvey.html。 |
17. | Kravets, D.(20150113)。UK prime minister wants backdoors into messaging apps or he'll ban them,https://arstechnica.com/tech-policy/2015/01/uk-prime-minister-wants-backdoors-into-messaging-apps-or-hell-ban-them/。 |
18. | Law Enforcement Guidelines US,https://www.documentcloud.org/documents/4254995-Law-Enforcement-Guidelines-Us.html#document/p10/a3。 |
19. | (2017)。Lawful Interception (LI); Requirements of Law Enforcement Agencies,http://www.etsi.org/standards-search。 |
20. | LINE responding to law enforcement agencies,https://linecorp.com/en/security/article/35。 |
21. | Marquis-Boire, M.,Marczak, B.,Guarnieri, C.,Scott-Railton, J.(20130313)。You Only Click Twice: FinFisher's Global Proliferation--Citizen Lab,https://citizenlab.ca/2013/03/you-only-click-twice-finfishers-global-proliferation-2/。 |
22. | Meister, A.(20180626)。Geheime Dokumente: Das Bundeskriminalamt kann jetzt drei Staatstrojaner einsetzen,https://netzpolitik.org/2018/geheime-dokumente-das-bundeskriminalamt-kann-jetzt-drei-staatstrojaner-einsetzen/。 |
23. | (20210310)。New major interventions to block encrypted communications of criminal networks,https://www.europol.europa.eu/newsroom/news/new-major-interventions-to-block-encrypted-communications-of-criminal-networks。 |
24. | (19930729)。NIST Proposes Voluntary Federal Standard for Key Escrow Encryption,https://www.nist.gov/news-events/news/1993/07/nist-proposes-voluntary-federal-standard-key-escrow-encryption。 |
25. | Quellen-TKÜ und Online-Durchsuchung,https://www.bka.de/DE/UnsereAufgaben/Ermittlungsunterstuetzung/Technologien/QuellentkueOnlinedurchsuchung/quellentkueOnlinedurchsuchung_node.html。 |
26. | Quinlan, S.,Wilson, A.(2016)。A brief history of law enforcement hacking in the United States,New America。,https://na-production.s3.amazonaws.com/documents/History_Hacking.pdf。 |
27. | Thomson, I.(20210408)。Belgian police seize 28 tons of cocaine after "cracking" Sky ECC's chat app encryption,https://www.theregister.com/2021/04/08/sky_ecc_drugs/。 |
28. | Tumblr Law Enforcement Guidelines,https://www.tumblr.com/docs/en/law_enforcement。 |
29. | Beuth, Von Patrick,Biermann, Kai(20170623)。Staatstrojaner: Dein trojanischer Freund und Helfer,http://www.zeit.de/digital/datenschutz/2017-06/staatstrojaner-gesetz-bundestag-beschluss。 |
30. | WeChat law enforcement data request guidelines,https://www.wechat.com/en/law_enforcement_data_request.html。 |
31. | WhatsApp FAQ--Information for Law Enforcement Authorities,https://faq.whatsapp.com/en/26000050/?category=5245250。 |
32. | Wray, C.(20191004)。Finding a Way Forward on Lawful Access: Bringing Child Predators out of the Shadows,https://www.fbi.gov/news/speeches/finding-a-way-forward-on-lawful-access。 |