You do not have permission to edit this page, for the following reason:
You are not allowed to execute the action you have requested.
Please read before you start to fill in the form!
Please enter a basic description for the planned self-organized session. For more information about self-organized sessions head to Self-organized Sessions.
Add times where you like to run your activities here by just pressing "Add another". You can add multiple times, if you like to split your event over multiple timeslots. A self-organized session should have at least one timeslot though ;)
Enter a full description of the event here. The field allows using the full mediawiki syntax for text formating.
=About the talk=
This talk will explain which are the juridical and related technical and operation problems in the uses of Trojan by law enforcement (note: only LEA, we are not speaking of intelligence/NSA/GCHQ/etc).
We’ve setup in Italy a team of a technologist MP, a IT-skilled Lawyers and an Hacker/Privacy Activists, to goes trough the difficult trip to achieve the implementation of a Legislation that works either on paper, either technically that can have a shared consensus among usually opposing parties such as civil rights organization and security apparatus (law enforcement & prosecutors).
We’ll explain the bit of history and experience in setting up such a law (how to do it in your own country!), which are the logical framework, the juridical framework, the operational framework and the technical choices to do it.
We hope that this experience represent a milestone in regulating something (the Trojan) that are here to stay, given the increase of default IP encryption with the corresponding decrease in investigative power trough passive IP surveillance system.
All of this in the context of privacy activism where part of the community fully reject any instance of accepting government hacking instances and in turn criticize this effort.
This is a minor edit
Watch this page