Tabla de Contenidos:
  • Intro
  • Table of Contents
  • 1 Security Architecture and the Interceptionof Telecommunication
  • 1.1 National Security Architecture
  • Two Frameworks of Interception
  • 1.2 Powers for interception of telecommunication
  • Legislative grounds
  • 1.2.1 The law of criminal procedure
  • 1.2.2 Law of intelligence agencies
  • 1.2.3 Financial and Customs Investigation Service
  • 1.3 Responsibility for the technical performance of interception measures
  • a general overview
  • 1.4 Legitimacy of data transfers between different security services
  • 1.5 Statistics on Telecommunication Interception
  • 2 Constitutional and Statutory Safeguards of Telecommunications
  • 2.1 Areas of constitutional protection
  • 2.2 Proportionality of access to data
  • 2.2.1 Secrecy of telecommunications
  • 2.2.2 Secrecy of retained traffic data
  • 2.2.3 Secrecy of information systems
  • 2.3 Statutory consequences of constitutional protection
  • 2.3.1 Protection of the secrecy of telecommunications
  • 2.3.2 Protection of the confidentiality and integrity of information systems
  • 2.3.3 Protection of the core area of privacy
  • 2.3.4 Criminal liability for the unlawful infringement of the telecommunication secrecy
  • 2.3.5 Protection of professional secrets in criminal procedural law
  • 2.3.6 The principle of the "purpose limitation of personal data"
  • 3 Powers for Accessing Telecommunication Data
  • 3.1 Overview
  • 3.2 Requirement of (reasonable) clarity for powers in the law of criminal procedure
  • 3.3 Differentiation and classification of powers in the law of criminal procedure
  • 4 Interception of Content Data
  • 4.1 Object of interception
  • 4.2 Special protection of confidential communication content
  • 4.3 Execution of telecommunication interception
  • 4.4 Duties of telecommunication service providers to cooperate
  • 4.5 Formal prerequisites of interception orders
  • 4.6 Substantive prerequisites of interception orders
  • 4.7 Consent by a communication participant to the measure
  • 4.8 Duties to record, report, and destroy
  • 4.9 Notification duties and remedies
  • 4.10 Confidentiality requirements
  • 5 Collection and Use of Traffic and Subscriber Data
  • 5.1 Collection of traffic data
  • 5.2 Collection of subscriber data
  • 5.3 "Data retention"
  • 6 Access to (Temporarily) Stored Communication Data
  • 6.1 Online searches with the help of remote forensic software
  • 6.2 Search and seizure of stored communication data
  • 6.3 Duties to cooperate: production and decryption orders
  • 7 Use of Electronic Communicati on Data in Judicial Proceedings
  • 7.1 Use of electronic communication data in the law of criminal procedure
  • 7.2 Inadmissibility of evidence as a consequence of inappropriate collection
  • 7.3 Use of data outside the main proceedings
  • 7.3.1 Data from other criminal investigations
  • 7.3.2 Data from preventive investigations
  • 7.3.3 Data from foreign jurisdictions