Ordine pubblico, sicurezza nazionale e sicurezza cibernetica: una prospettiva di sistema

Contributo inviato al Call for papers 2020 del Centro Alti Studi per la Difesa

Benché stia attraversando una fase di normativizzazione, la sicurezza nazionale è ancora un concetto giuridicamente evanescente, che fatica a trovare un proprio spazio fra categorie consolidate come ordine e sicurezza pubblica e difesa dello Stato. La normativizzazione della sicurezza nazionale implica la sua sottoposizione al rule of law e dunque limita il suo uso per interessi di natura strettamente politica che non potrebbero essere garantiti con l’apposizione sistematica e automatica del segreto di Stato e che sono sottoposti ad un accresciuto controllo giurisdizionale. Parallelamente, la dipendenza tecnologica da soggetti stranieri —che ha di fatto consentito una (almeno parziale ma ineliminabile) inclusione di interessi privati nella definizione delle politiche di sicurezza— compromette l’effettiva possibilità di tutelare la sicurezza e gli interessi dello Stato. di Andrea Monti – professore incaricato di diritto dell’ordine e della sicurezza pubblica nell’università di Chieti-Pescara Continue reading “Ordine pubblico, sicurezza nazionale e sicurezza cibernetica: una prospettiva di sistema”

Possibly Related Posts:


Report on cross-border e-commerce in the EU

The report identifies e-commerce trends and potential cross-border obstacles in order to analyse the direction that cross-border e-commerce is taking in the EU. The report is a follow-up to the first edition of the Consumer Markets Scoreboard, adopted on 29 January 2008, as part of the Commission’s broader market monitoring initiative.1 In the context of the Single Market Review, the Commission is currently undertaking an in-depth market monitoring of the retail sector.2 The evidence set out in this report is a contribution to that exercise, providing a factual basis for the e-commerce strand of the wider exercise. As announced in the Commission’s Legislative and Work Programme for 2009, the Commission will present a Communication on the outcome of the retail market monitoring in autumn 2009, which will include an analysis of cross-border e-commerce  (quote from the Executive Summary)

Continue reading “Report on cross-border e-commerce in the EU”

Possibly Related Posts:


Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization

by Paul Ohm University of Colorado Law School
August 13, 2009
University of Colorado Law Legal Studies Research Paper No. 09-12
Abstract:
Computer scientists have recently undermined our faith in the privacy-protecting power of anonymization, the name for techniques for protecting the privacy of individuals in large databases by deleting information like names and social security numbers. These scientists have demonstrated they can often ‘reidentify’ or ‘deanonymize’ individuals hidden in anonymized data with astonishing ease. By understanding this research, we will realize we have made a mistake, labored beneath a fundamental misunderstanding, which has assured us much less privacy than we have assumed. This mistake pervades nearly every information privacy law, regulation, and debate, yet regulators and legal scholars have paid it scant attention. We must respond to the surprising failure of anonymization, and this Article provides the tools to do so.

Continue reading “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization”

Possibly Related Posts:


UK ACPO Computer Based Evidence Guidelines v.3

Le linee guida dell’Association of Chief Police Officers inglesi, per la raccolta e conservazione della prova informatica. – The UK Association of Chief Police Officer Computer-Based Evidence guidelines.

Continue reading “UK ACPO Computer Based Evidence Guidelines v.3”

Possibly Related Posts:


US Federal Communications Commission 06-56 – 2th Report and Order and Memorandum Opinion and Order

Il testo emanato il 12 maggio 2006 dalla US FCC che affronta una serie di problematiche legate all’applicazione del Communications Assistance for Law Enforcement Act (CALEA) ai fornitori di servizi VoIP
The US FCC’s document addressing Communications Assistance for Law Enforcement Act (CALEA) implementation issues for VoIP provider.

Continue reading “US Federal Communications Commission 06-56 – 2th Report and Order and Memorandum Opinion and Order”

Possibly Related Posts:


Case study: A failure success’ clothing

Originally published on Digital Investigation (2005) 2, 247-253 – doi: 10.1016/j.diin.2005_10.002 © 2005 Published by Elsevier Ltd. Continue reading “Case study: A failure success’ clothing”

Possibly Related Posts:


US FCC Order 05-153

In this Order, we conclude that the Communications Assistance for Law Enforcement Act (CALEA) applies to facilities-based broadband Internet access providers and providers of interconnected voice over Internet Protocol (VoIP) service. This Order is the first critical step to apply CALEA obligations to new technologies and services that are increasingly relied upon by the American public to meet their communications needs.

Continue reading “US FCC Order 05-153”

Possibly Related Posts:


Down on the Farm: The Impact of Nano-scale Technologies on Food and Agriculture

Download the pdf from this site

Continue reading “Down on the Farm: The Impact of Nano-scale Technologies on Food and Agriculture”

Possibly Related Posts:


The treatment of Voice over Internet Protocol (VoIP) under the EU Regulatory Framework

Download from this site

Download form the European Commission website

Possibly Related Posts:


Data Retention Directive Proposal 8598/04

Download in PDF

Download from the Public Register of Counci of Europe Register

Possibly Related Posts:


The Effect of File Sharing on Record Sales: An Empirical Analysis

di K. Strumpf – F. Oberholzer

Uno studio sulla non significatività del file-sahring sulla flessione delle vendite di musica.

Clicca qui per aprire il documento.

Testo originale sul sito del prof. Strumpf

Original text on prof. Strumpf’s website

Possibly Related Posts:


IP Voice and associated convergent services

Donload the PDF from this site

Originalon the European Commission Website

Possibly Related Posts:


Handbook of Legislative Procedures of Computer and Network Misusein EU Countries

Download from this site

Original texton the EU Commission website.

Possibly Related Posts:


Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness

The Information Society 18(1):33-45 (January/February 2002) – di J.F. Blanchette – D. Johnson

Clicca qui per aprire il documento. Continue reading “Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness”

Possibly Related Posts:


“SNAKE-OIL SECURITY CLAIMS” THE SYSTEMATIC MISREPRESENTATION OF PRODUCT SECURITY IN THE E-COMMERCE ARENA

Download from this site

Download from the Michigan Telecommunications and Technology Law Review website

Possibly Related Posts:


Drowning in Sewage. SPAM, the curse of the new millennium

scarica il file da questo sito/download file from this site

Continue reading “Drowning in Sewage. SPAM, the curse of the new millennium”

Possibly Related Posts:


US DoJ IP and Computer crime investigation guidelines

Download from this site

Possibly Related Posts:


Ethical Aspects on Patenting Inventions Involving Human Stem Cells

Scarica il file in formato PDF – Download in PDF

Possibly Related Posts:


Communication from the European Commission: “Network and Information Security: Proposal for a European Policy Approach” (COM (2001) 298 (June 6, 2001)

Scarica in formato PDF

Source

Possibly Related Posts:


Draft Convention on Cyber-Crime ver.27

Source: http://conventions.coe.int/treaty/EN/projets/cybercrime27.doc

Continue reading “Draft Convention on Cyber-Crime ver.27”

Possibly Related Posts:


Recovering and Examining Computer Forensic Evidence

Recovering and Examining Computer Forensic Evidence

FORENSIC SCIENCE COMMUNICATIONS OCTOBER 2000 VOLUME 2 NUMBER 4

Continue reading “Recovering and Examining Computer Forensic Evidence”

Possibly Related Posts:


Forensic Computer Analysis: An Introduction

Forensic Computer Analysis: An Introduction

di Dan Farmer – Wietse Venema

Dr. Dobb’s Journal September 2000

Continue reading “Forensic Computer Analysis: An Introduction”

Possibly Related Posts:


The network society as seen from Italy

Italy: a brief note on the background

Italy’s legal and political system doesn’t have a sound tradition of understanding technology, science and innovation. This is a country that started recovery from “practically zero” at the end of World War Two. It was still basically an agricultural economy, its (limited) industrial resources were destroyed. As late as 1960 there was still a high rate of illiteracy. Technological development was far behind most of Western Europe.

Continue reading “The network society as seen from Italy”

Possibly Related Posts:


Digital Imagery in the Courtroom

Original on the Kodak website

Continue reading “Digital Imagery in the Courtroom”

Possibly Related Posts:


WIPO Copyright Treaty

DIPLOMATIC CONFERENCE
ON
CERTAIN COPYRIGHT AND NEIGHBORING RIGHTS QUESTIONS

Geneva, December 2 to 20, 1996

Continue reading “WIPO Copyright Treaty”

Possibly Related Posts: