Session:Regulating Law Enforcement uses of Trojans

From SHA2017 Wiki
Jump to: navigation, search
Description Implementing a Law to juridically, operationally and technically regulate the uses of Trojan in Italy

The complexity of implementing a policy (law) and related operational and technical procedures to regulate the uses of Trojan by Law Enforcement in a way that protect civil rights while not preventing investigations from going on with the right balance of juridical/technical implementation.

Website(s)
Type Talk
Kids session No
Keyword(s)
Tags transparency, Government
Processing village Village:ItalianEmbassy, Village:ItalianEmbassy-Talks
Person organizing
Language en - English
en - English
Other sessions...

refresh

Starts at 2017/08/05 16:30
Ends at 2017/08/05 17:30
Duration 60 minutes
Location Village:ItalianEmbassy-Talks

About the talk

This talk will explain which are the juridical and related technical and operation problems in the uses of Trojan by law enforcement (note: only LEA, we are not speaking of intelligence/NSA/GCHQ/etc).

We’ve setup in Italy a team of a technologist MP, a IT-skilled Lawyers and an Hacker/Privacy Activists, to goes trough the difficult trip to achieve the implementation of a Legislation that works either on paper, either technically that can have a shared consensus among usually opposing parties such as civil rights organization and security apparatus (law enforcement & prosecutors).

We’ll explain the bit of history and experience in setting up such a law (how to do it in your own country!), which are the logical framework, the juridical framework, the operational framework and the technical choices to do it.

We hope that this experience represent a milestone in regulating something (the Trojan) that are here to stay, given the increase of default IP encryption with the corresponding decrease in investigative power trough passive IP surveillance system.

All of this in the context of privacy activism where part of the community fully reject any instance of accepting government hacking instances and in turn criticize this effort.