Two recent leaks reveal the European Union’s choices on cryptography. Child protection and national security are the reasons for the impossible mission of ensuring security through weakened encryption. By Andrea Monti, Adjunct Professor of Law and Order at the University of Chieti-Pescara – Originally published in Italian by Formiche.net Continue reading “The EU contradictions on cryptography”
A Real-Life Case of Inefficient Profiling
Amazon knows in extreme detail – thanks to the analysis of purchases – my interests and – thanks to the analysis of how I use my Kindle – my reading habits. Yet he sends me an email to suggest, on the basis of my profiling, to buy a book that I wrote.
If all a giant with a limitless computing might like Amazon is able to extract from my personal data is a suggestion to buy my own books either I’m not actually monitored or profiling just doesn’t work.
Public security, powers of the public security authority and information technology
Master of Science in Cybersecurity – Prof. Luigi V. Mancini
CYBERSURE
CYBERsecurity at Sapienza University of Rome Events
Public security, powers of the public security authority and information technology
Andrea Monti – Lawyer
?Affiliation: Adjunct Professor of Public Policy and Public Security Law at the University of Chieti-Pescara.
?May 13, 2019, from 16:15 to 18:30
?Aula II, ground floor of the building “ex-Facoltà di Scienze Statistiche” in “Città Universitaria”, Piazzale Aldo Moro, 5 (Rome).
?
Part 1. Technological public order and information security |
Part 2. Public security and information technology |
? The pervasiveness of information technologies has repercussions not solely in terms of judicial activity, but also affects the management of public order – and therefore the exercise of powers attributed to the Ministry of the Interior in different areas and before the Judiciary intervention. A modern notion of public order must necessarily take into account the issue of information security as its own constitutive element. |
This seminar describes, starting from the analysis of the Consolidated Law on public security, the structure of the public security authority, and defines roles and powers and analyses the way in which this structure deals with the subjects of the information society. ? ? ? ? ? ? ? ? ? ? ? ? ? ? In particular, it highlights the possible interactions between the State Police, Internet providers and platform operators Over the top. |
Participation is free, however registration is required on Eventbrite by searching “Public security, powers of the public security authority and information technology”.
Upcoming Seminars at https://cybersecurity.uniroma1.it/cybersecurity-seminars
For any questions or further info, please visit https://cybersecurity.uniroma1.it or write to cybersecurity_info@uniroma1.it
LinkedIn: ? ? ? ? ? ? ? ? ?Master of Science Cybersecurity Sapienza
Instagram: ? ? ? ? ? ? ? ? @cybersecurity_sapienza
Protecting Personal Information
Protecting Personal Information is a book I co-authored with Prof. Raymond Wacks. As the sub-title says, this is an attempt to reconsider the right to privacy from a different perspective. Continue reading “Protecting Personal Information”
A contribution to the analysis of the legal status of cryptocurrencies
Andrea Monti, A contribution to the analysis of the legal status of cryptocurrencies, in “Ragion pratica, Rivista semestrale” 2/2018, pp. 361-378, doi: 10.1415/91544
This paper advocates that cryptocurrencies such as Bitcoin or Ethereum don’t challenge the current legal system, since they fit comfortably enough into the immaterial asset legal definition. As such, while a blockchain-based cryptocurrency can’t be considered as legal tender or electronic money, it can be exchanged on a contractual basis as it happens with every other kind of good. As per the alleged crime-supporting role of cryptocurrencies by way of the anonymity of the blockchain transactions, this article demonstrates that the anonymity granted herein is not absolute. Therefore it is not correct to claim that this technology has been built, by design, to foster illegal behaviour. This is an important finding because, in the opposite case, there would have been room to affirm the impossibility to use a cryptocurrency as part of an agreement because of its intrinsic illegal nature.
Keywords: Legal Tender; Private Money; Electronic Money; Asymmetric Encryption; Blockchain Forensic; Cryptocurrencies.