The news is gaining momentum: Osumane Bah, a student that has been charged of multiple theft in Apple stores located in several cities of the United States, filed a suit against the Cupertino-based company seeking for a compensation of one billion USD for having been wrongly identified by Apple as the author of these crimes. The decisive evidence that lead to his involvement in the investigations, this is Mr. Bah’s basis of the claim, is that he has been wrongly identified by a facial recognition system operated either by Apple or a security company hired for the job. Continue reading “Apple, Facial Recognition and the Right of Defense (plus, a sting at the GDPR)”
Master of Science in Cybersecurity – Prof. Luigi V. Mancini
CYBERsecurity at Sapienza University of Rome Events
Public security, powers of the public security authority and information technology
Andrea Monti – Lawyer
Affiliation: Adjunct Professor of Public Policy and Public Security Law at the University of Chieti-Pescara.
May 13, 2019, from 16:15 to 18:30
Aula II, ground floor of the building “ex-Facoltà di Scienze Statistiche” in “Città Universitaria”, Piazzale Aldo Moro, 5 (Rome).
Part 1. Technological public order and information security
Part 2. Public security and information technology
The pervasiveness of information technologies has repercussions not solely in terms of judicial activity, but also affects the management of public order – and therefore the exercise of powers attributed to the Ministry of the Interior in different areas and before the Judiciary intervention.
A modern notion of public order must necessarily take into account the issue of information security as its own constitutive element.
This seminar describes, starting from the analysis of the Consolidated Law on public security, the structure of the public security authority, and defines roles and powers and analyses the way in which this structure deals with the subjects of the information society.
In particular, it highlights the possible interactions between the State Police, Internet providers and platform operators Over the top.
Participation is free, however registration is required on Eventbrite by searching “Public security, powers of the public security authority and information technology”.
Upcoming Seminars at https://cybersecurity.uniroma1.it/cybersecurity-seminars
LinkedIn: Master of Science Cybersecurity Sapienza
Even if true, where is the beef? That HwaWei got funded by Chinese military and intelligence is not an issue. Do we already forgot the “Fritz Chip”, the use of (Western-sponsored) State malware in intelligence and criminal investigation and so on?
From a national security and public policy perspective, it is logic that a sovereign state explores all the possibilities to obtain superiority over its foes and “friend” too. Thus – if confirmed – the proof offered by CIA of HwaWei involvement with the national security apparatus shouldn’t surprise. Continue reading “The CIA to provide evidence of HwaWei involvement with Chinese Military and Intelligence”
The Datenschutzkonference (DSK) the body that gathers the German Data Protection Authorities has published a document on the relationship between the Recital 33 of the GDPR and its application to scientific research. And as often happens when this topics is involved, the results are useless, inconsistent and inapplicable. A more detailed analysis will allow us to understand the reason for such a harsh judgment on this document. Continue reading “The German DatenschutzKonferenze to issue non viable GDPR compliance hints for medical research”