It was during last year’s scorching summer that the Hacking Team case emerged. It’s only really thanks to this attack on the computer system of the Milanese company that created the Galileo Suite remote control software that public opinion began to understand the concept of “computer thieves” that up to then had been relegated to a small circle of IT and legal experts. During the intervention, the technical modus operandi of the tools involved and how the criminal code defines their use wil be discussed, as well as the qualifying criteria as defined in the most recent sentences issued by the Court of Cassation. Finally, the most recent draft bills will be discussed – drafted in the wake of the recent terrorist attacks in Europe – in order to give investigators new and more powerful tools for prevention and repression.
Cybersecurity
The Web is structured like a close-knit weft of data and relations and so captures traces, evidence and information that can reveal hidden identities, reconstruct movements and reveal illegal dealings. This is the land of the Web that extends beyond the confines that we all know and in which we are used to move with ease. This is the land navigated by secret services and terrorists, hackers and traffickers, investigators and organised crime. A journey into the depths of the Web, that stretches from the crime novel to cyberwar.
Get in touch