The role of software and technological dependence in US geopolitical strategies in the Far East and beyond

The control over software is the leverage of the US strategy of expansion in the Far East. This strategy includes the sale, in anti-Chinese function, of armaments to countries in the Indo-Pacific area qualified as “like-minded partners” or “allies” also in the absence of formalisation in treaties such as, for example, that of NATO by Andrea Monti

The software has become a central element of national security protection (or vulnerability) because the functioning of the equipment and systems that make a country’s network work depends on it. Its robustness, however, besides being the first line of defence in technical terms, is also a very efficient geopolitical control tool. Continue reading “The role of software and technological dependence in US geopolitical strategies in the Far East and beyond”

Critical Issues of the Conte-Huawei decree

TIM may use 5G equipment produced by Huawei, provided that it follows the rules dictated by the Presidency of the Council. Is national security safe? by Andrea Monti – originally published in Italian by Infosec.News

Background


On 7 August 2020, the Prime Minister’s Office issued a decree setting out the conditions under which Huawei can provide Italy, through former network monopolist TIM S.p.a., with its 5G infrastructure.

Apart from constitutional issues (yet another ‘creative’ use of the Prime Minister’s Decree, after the management of the COVID-19 lockdown) and political aspects (the decree would neither be a ‘surrender’ to China nor, therefore, a ‘betrayal’ of the Atlantic allies), the Conte-Huawei Decree raises several legal and technical doubts about its real effectiveness. Continue reading “Critical Issues of the Conte-Huawei decree”

The TIM-Huawei Decree and the Chinese’knot untangling

The Italian Presidency of the Council sets the conditions to include Huawei’s technology in the Italian 5G network and might ease the overcoming tensions between the USA and China by Andrea Monti

The Prime Ministerial Decree of August 7, 2020, allows TIM (the former Italian telco monopolist) to use Huawei’s 5G technology, having identified adequate measures to prevent the risks of using Chinese equipment for Italy’s new generation network. This news follows, and contradicts, the exclusion of Huawei from the tender to provide TIM with the same 5G devices because of the need for “diversification of partners” (a requirement lately imposed by the Conte-Huawei Decree). Originally published in Italian by Formiche.net Continue reading “The TIM-Huawei Decree and the Chinese’knot untangling”

GDPR compliance needs more incidents than fines

By Andrea Monti – originally published in Italian by Infosec News

I write this article in one of those rare moments when I indulge in the belief that computer security is something that should be taken seriously. I do not want to disrespect the many professionals who try to work by seriously helping customers and employers to “keep the ship going”. Nor, however, can I pretend to ignore what the cybersecurity market was and has become. Without many hackers, there would not even be the slightest improvement in security caused by these stunts.

Crime’s apology? Incitement to commit a crime? No, merely stating an objective fact: in the field of computer security, it is not the fines that induce legal compliance.

Project Gutenberg and the Crusader of Copyright

In the name of the new crusade against the “pirates of copyright” the public prosecutor of Rome seizes gutenberg.org, the site of the cultural project that digitizes and puts online copyright-free books. But neither the court nor the Guardia di Finanza has noticed. Is it a justifiable mistake? by Andrea Monti – originally published in Italian by Infosec.News
Continue reading “Project Gutenberg and the Crusader of Copyright”