Italy, too, is equipped with a regulatory instrument that allows offensive operations on foreign soil, even without a formally declared state of war. The new normality of international arrangements also requires Italy to speed up the adoption of a comprehensive regulatory framework. The analysis by Andrea Monti, Adjunct Professor of Digital Law at the University of Chieti-Pescara, initially published in Italian by Formiche.net Continue reading “How the Italian government’s new offensive power in the cyber sector works”
State offensive cybersecurity requires an organized regulatory framework
The upcoming Decree Law ‘Aiuti’ seeks to equip Italy with the reactive capacity to cyber attacks. Nevertheless, “Article 37” is only the first step. The analysis by Andrea Monti, professor of Digital Law in the Digital Marketing degree program at the University of Chieti-Pescara. Originally published in Italian on Formiche.net Continue reading “State offensive cybersecurity requires an organized regulatory framework”
Does National Security reshape Internet Governance?
The DNS4EU project – a European DNS resolver – discreetly continues to develop. Depending on one’s perspective, it is a tool for the Union’s technological independence or centralised citizens’ control. Either way, it represents a caesura in the global Internet governance chain. The speech by Andrea Monti, Professor of Digital Law in the Master’s degree course in Digital Marketing at the University of Chieti-Pescara Initially published in Italian by Formiche.net Continue reading “Does National Security reshape Internet Governance?”
Do We Need Hacker in Cybersecurity?
Trying to make the generalist media understand the difference between ‘hackers’ on the one hand and common criminals, intelligence operators and military, and security experts on the other is a losing battle. Many have tried over the years but without success. The cliché of the acne-ridden 15-year-old who ‘hacks’ NASA or the Pentagon moved on to the ‘hooded sociopath’ iconised by Mr Robot. There are many variations on the theme because the phenomenon is made even more complex by a certain unscrupulousness of those operating in the market that is now called ‘cybersecurity’ by Andrea Monti – Initially published in Italian on Strategikon – an Italian Tech Blog Continue reading “Do We Need Hacker in Cybersecurity?”
The Difference Between (Ordinary) Computer Crimes and Acts of War
Obviously, the (Russian-Ukrainian) conflict is also fought by hitting technological infrastructures. It is not surprising, then, that, on the one hand, Ukraine is pushing for the ‘recruitment’ of a ‘foreign legion’ of people capable of using computers offensively. Also, it is not suprising that, on the other hand (more or less), spontaneous aggregations of groups are springing up that fight for one or the other side using information technology. Lastly, the cunning subject of actions committed by so-called ‘state-sponsored’ subjects or criminal groups comes into play. They take advantage of the institutions’ ‘accidental distractions’ —if not blind eye— and commit crimes to the detriment, as it happens, of hostile countries. In this case, it is often difficult to draw a line between a state’s inability to prosecute offenders and its interest in creating a confused and uncertain situation, of which it can indirectly take advantage by Andrea Monti – Initially published in Italian on Strategikon – an Italian Tech blog Continue reading “The Difference Between (Ordinary) Computer Crimes and Acts of War”