SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Avv. Giovanni Battista Gallus @gbgallus
Trojans and Backdoors for investigative
purposes and fundamental rights and
freedoms: is it possible to find a balance?
International Conference
Preventing and Combating Cybercrime
Babeş-Bolyai University - Cluj-Napoca, 20-21 May, 2016
Avv. Giovanni Battista GALLUS, LL.M., Ph.D - gallus@array.eu
Hermes Center for Transparency and Digital Human Rights
Nexa Center for Internet and Society
05/20/16 3
Avv. Giovanni Battista Gallus @gbgallus
How can you seize the
data, when
communications and
devices are encrypted?
05/20/16 4
Avv. Giovanni Battista Gallus @gbgallus
“Equipment
interference”“Network
investigative
techniques ”
“Captatore
informatico”
"The easiest way for someone to
eavesdrop on your communications
isn’t to intercept them in transit
anymore; it’s to hack your computer.
And there’s a lot of government
hacking going on.”
Bruce Schneier, Data and Goliath,
2015
Avv. Giovanni Battista Gallus @gbgallus
Back in 2008, we
discovered the
“Bundestrojaner”
(aka State Trojan)
Photo by Leralle
Avv. Giovanni Battista Gallus @gbgallus
Photo by Leralle
National law of Land
Nordrhein-Westfalen,
12/20/2006 - Constitutional
Protection Act
Undercover activity
“Covertly observe [...] the
Internet, especially the covert
participation in its
communication devices and
the search for these, as well as
the clandestine access to
information-technological
systems among others by
technical means”
Paragraph 5, n. 11
Avv. Giovanni Battista Gallus @gbgallus
German Constitutional
Court, Decision
27/2/2008
BvR 370/07 - BvR 595/07
05/20/16 8
Avv. Giovanni Battista Gallus @gbgallus
An existing right to freedom in telecommunications was tooAn existing right to freedom in telecommunications was too
narrow; legal protections surrounding a private home includednarrow; legal protections surrounding a private home included
home computers but not laptops carried in public, electronichome computers but not laptops carried in public, electronic
organizers or mobile phones. The right to 'protection of theorganizers or mobile phones. The right to 'protection of the
private sphere' and 'informational self-determination' haveprivate sphere' and 'informational self-determination' have
protected computer users so far, but insufficiently.protected computer users so far, but insufficiently.
So the verdict in the online-surveillance case has created aSo the verdict in the online-surveillance case has created a
whole new basic right … In shorthand (it might be called) the 'ITwhole new basic right … In shorthand (it might be called) the 'IT
right'right'
Dietmar Hipp, Spiegel onlineDietmar Hipp, Spiegel online
A new fundamental
right is born
05/20/16 9
Avv. Giovanni Battista Gallus @gbgallus
A new fundamental
right is born
Constitutional Court
creates a new
personality right: the
right to the integrity
and confidentiality
of information
technological
systems
05/20/16 10
Avv. Giovanni Battista Gallus @gbgallus
Fast Forward 7 years
05/20/16 11
Avv. Giovanni Battista Gallus @gbgallus
What does Galileo
do?It collects e-mails, text
messages, call history,
address books, search
history data, and
keystrokes.
It can take screenshots,
record audio to monitor
either calls or ambient
noise, snap photos, and
monitor the phone’s GPS
coordinates.
05/20/16 12
Avv. Giovanni Battista Gallus @gbgallus
The idea is not new,
why was it so
successful?
A simple dashboard
to perform
complicated task
User friendly
interface
Good support
05/20/16 13
Avv. Giovanni Battista Gallus @gbgallus
All over Europe...
Avv. Giovanni Battista Gallus @gbgallus
UK Draft Investigatory
powers bill
05/20/16 15
Avv. Giovanni Battista Gallus @gbgallus
Thorny issue: State
shopping for 0 days
and vulnerabilities
05/20/16 16
Avv. Giovanni Battista Gallus @gbgallus
Doug Brown
Trojan horses
Encryption
Fundamental
Rights
05/20/16 17
Avv. Giovanni Battista Gallus @gbgallus
Can fundamental
rights survive?
05/20/16 18
Avv. Giovanni Battista Gallus @gbgallus
The Italian Supreme
Court tries to answer
The feature which allows to listen to any conversation, by turning the
microphone of the smartphone on, allows to listen to every
conversation wherever the target will bring his phone.
Such feature, according to the Court, is not admissable.
It cannot be deemed as a different tecnique for performing "normal"
interception, but it is a different tool altogether, making possible to
gather every conversation in any place the target is located.
The Court finds this feature in breach not only of the criminal
procedure Code, but also in breach of art. 15 of the Italian
Constitution (right to freedom in communications)
05/20/16 19
Avv. Giovanni Battista Gallus @gbgallus
However...
The Italian “Corte di Cassazione a sezioni Unite”
(Supreme Court, Grand Chamber), on the 28th of
April, 2016, upheld the use of a trojan horse
“wherever the smartphone or tablet or computer
of the indicted person is”, but only with regard to
facts related to organized crime and terrorism
Can such decision be deemed compatible with
E.C.H.R. case law?
05/20/16 20
Avv. Giovanni Battista Gallus @gbgallus
Minimum safeguards, according to the European Court of
Human Rights:
●
the nature of the offences which may give rise to an
interception order;
●
a definition of the categories of people liable to have their
telephones tapped;
●
a limit on the duration of telephone tapping;
●
the procedure to be followed for examining, using and storing
the data obtained;
●
the precautions to be taken when communicating the data to
other parties
●
the circumstances in which recordings may or must be erased
or the tapes destroyed
E.C.H.R.
Weber and Saravia v. Germany
Iordachi and others v. Moldova
Avv. Giovanni Battista Gallus @gbgallus
We may have the
answer thanks to the
“Bundestrojaner”
Photo by Leralle
So, can fundamental
rights survive?
05/20/16 22
Avv. Giovanni Battista Gallus @gbgallus
The approach followed by the German Constitutional Court may still be
appropriate
Very strict exceptions:
Only if there are "factual indications for a concrete danger" in a specific
case for the life, body and freedom of persons or for the foundations of the
State or the existence of humans, government agencies may use these
measures after approval by a judge.
"If there are concrete indications in the specific case that a certain measure
for gathering data will touch the core area of the conduct of private life,
it has to remain principally undone." (margin number 281)
If data from this core area is accidentally collected, it must be deleted
immediately and can not be used or forwarded in any case.
Even fundamental
rights may suffer
some limitations
05/20/16 23
Avv. Giovanni Battista Gallus @gbgallus
Key issues
Strict rules of procedure & guidelines
Auditability
Proportionality (serious crimes)
Strict necessity
Transparency
Accountability
05/20/16 26
Avv. Giovanni Battista Gallus @gbgallus
"51. While some governments continue with ill-conceived,
ill-advised, ill-judged, ill-timed and occasionally ill-
mannered attempts to legitimise or otherwise hang on to
disproportionate, unjustifiable privacy-intrusive
measures such as bulk collection, bulk hacking,
warrantless interception etc. other governments led, in
this case by the Netherlands and the USA have moved
more openly towards a policy of no back doors to
encryption. The SRP would encourage many more
governments to coalesce around this position.”
Report of the Special Rapporteur
on the right to privacy, Joseph A.
Cannataci, 8 march 2016
05/20/16 27
Avv. Giovanni Battista Gallus @gbgallus
The road from
habeas corpus
to habeas data
is twisty and
dangerous
05/20/16 29
Avv. Giovanni Battista Gallus @gbgallus
Questions?Questions?
Avv. Giovanni Battista Gallus @gbgallus
Thank you
Avv. Giovanni Battista Gallus
gallus@array.eu @gbgallus
Unless stated otherwise,
all texts are distributed
under a Creative Commons
Attribution – non
commercial – sharealike
3.0 Unported license

Mais conteúdo relacionado

Semelhante a Trojans and criminal investigation: is it possibile to find a balance with fundamental rights

Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceblogzilla
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
Monitoring European Police
Monitoring European PoliceMonitoring European Police
Monitoring European Policeguestf52d3a
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoTech and Law Center
 
Sitel, ETI A/S, “Lawful” interception in Spain and Europe
Sitel, ETI A/S, “Lawful” interception in Spain and EuropeSitel, ETI A/S, “Lawful” interception in Spain and Europe
Sitel, ETI A/S, “Lawful” interception in Spain and EuropeClaudio C.
 
Privacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory PowersPrivacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory Powersrcorrigan
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxDIPESH30
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of PrivacyDiane Allen
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Matthew MacNabb
 
Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Felicia Barker
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillanceskimkiper
 

Semelhante a Trojans and criminal investigation: is it possibile to find a balance with fundamental rights (20)

CIAR_8_1_3.pdf
CIAR_8_1_3.pdfCIAR_8_1_3.pdf
CIAR_8_1_3.pdf
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
Wired-feature
Wired-featureWired-feature
Wired-feature
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Un may 28, 2019
Un may 28, 2019Un may 28, 2019
Un may 28, 2019
 
Monitoring European Police
Monitoring European PoliceMonitoring European Police
Monitoring European Police
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 
Privacy in the developing world
Privacy in the developing worldPrivacy in the developing world
Privacy in the developing world
 
Privacy in the Modern World. thesis Leiden University
Privacy in the Modern World. thesis Leiden UniversityPrivacy in the Modern World. thesis Leiden University
Privacy in the Modern World. thesis Leiden University
 
Surveilance documents
Surveilance documentsSurveilance documents
Surveilance documents
 
Sitel, ETI A/S, “Lawful” interception in Spain and Europe
Sitel, ETI A/S, “Lawful” interception in Spain and EuropeSitel, ETI A/S, “Lawful” interception in Spain and Europe
Sitel, ETI A/S, “Lawful” interception in Spain and Europe
 
Privacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory PowersPrivacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory Powers
 
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docxKrempley 1POL 300GoogleMulti-National Corporations, Inter.docx
Krempley 1POL 300GoogleMulti-National Corporations, Inter.docx
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
 
Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...
 
80223977 school surveillance
80223977 school surveillance80223977 school surveillance
80223977 school surveillance
 

Mais de Giovanni Battista Gallus

Robotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentationRobotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentationGiovanni Battista Gallus
 
Presentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di TorinoPresentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di TorinoGiovanni Battista Gallus
 
Free/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issuesFree/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issuesGiovanni Battista Gallus
 
I droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallusI droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallusGiovanni Battista Gallus
 
Presentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista GallusPresentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista GallusGiovanni Battista Gallus
 
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...Giovanni Battista Gallus
 
Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Giovanni Battista Gallus
 

Mais de Giovanni Battista Gallus (11)

Robotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentationRobotics law: Ada-Europe 2017 presentation
Robotics law: Ada-Europe 2017 presentation
 
Presentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di TorinoPresentazione sul Drone Journalism - Master Giornalismo di Torino
Presentazione sul Drone Journalism - Master Giornalismo di Torino
 
Free/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issuesFree/open source software and drones Security and privacy issues
Free/open source software and drones Security and privacy issues
 
Gallus presentazione droni_cortina
Gallus presentazione droni_cortinaGallus presentazione droni_cortina
Gallus presentazione droni_cortina
 
I droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallusI droni e la legge - presentazione SINNOVA15 - gallus
I droni e la legge - presentazione SINNOVA15 - gallus
 
Ijf14 tutela fonti_anonime_gallus
Ijf14 tutela fonti_anonime_gallusIjf14 tutela fonti_anonime_gallus
Ijf14 tutela fonti_anonime_gallus
 
Presentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista GallusPresentazione all'Open Data Day 2014 - Giovanni Battista Gallus
Presentazione all'Open Data Day 2014 - Giovanni Battista Gallus
 
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
Presentazione Eprivacy Winter Edition - Bocconi - http://e-privacy.winstonsmi...
 
Presentazione_linuxday
Presentazione_linuxdayPresentazione_linuxday
Presentazione_linuxday
 
Gallus oristano 25.2.12
Gallus oristano 25.2.12Gallus oristano 25.2.12
Gallus oristano 25.2.12
 
Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008Presentazione sulla computer forensics, dopo la L. 48/2008
Presentazione sulla computer forensics, dopo la L. 48/2008
 

Último

一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理A AA
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptRRR Chambers
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理bd2c5966a56d
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理A AA
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Dr. Oliver Massmann
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringSteering Law
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 

Último (20)

一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 

Trojans and criminal investigation: is it possibile to find a balance with fundamental rights

  • 1. Avv. Giovanni Battista Gallus @gbgallus Trojans and Backdoors for investigative purposes and fundamental rights and freedoms: is it possible to find a balance? International Conference Preventing and Combating Cybercrime Babeş-Bolyai University - Cluj-Napoca, 20-21 May, 2016 Avv. Giovanni Battista GALLUS, LL.M., Ph.D - gallus@array.eu Hermes Center for Transparency and Digital Human Rights Nexa Center for Internet and Society
  • 2. 05/20/16 3 Avv. Giovanni Battista Gallus @gbgallus How can you seize the data, when communications and devices are encrypted?
  • 3. 05/20/16 4 Avv. Giovanni Battista Gallus @gbgallus “Equipment interference”“Network investigative techniques ” “Captatore informatico” "The easiest way for someone to eavesdrop on your communications isn’t to intercept them in transit anymore; it’s to hack your computer. And there’s a lot of government hacking going on.” Bruce Schneier, Data and Goliath, 2015
  • 4. Avv. Giovanni Battista Gallus @gbgallus Back in 2008, we discovered the “Bundestrojaner” (aka State Trojan) Photo by Leralle
  • 5. Avv. Giovanni Battista Gallus @gbgallus Photo by Leralle National law of Land Nordrhein-Westfalen, 12/20/2006 - Constitutional Protection Act Undercover activity “Covertly observe [...] the Internet, especially the covert participation in its communication devices and the search for these, as well as the clandestine access to information-technological systems among others by technical means” Paragraph 5, n. 11
  • 6. Avv. Giovanni Battista Gallus @gbgallus German Constitutional Court, Decision 27/2/2008 BvR 370/07 - BvR 595/07
  • 7. 05/20/16 8 Avv. Giovanni Battista Gallus @gbgallus An existing right to freedom in telecommunications was tooAn existing right to freedom in telecommunications was too narrow; legal protections surrounding a private home includednarrow; legal protections surrounding a private home included home computers but not laptops carried in public, electronichome computers but not laptops carried in public, electronic organizers or mobile phones. The right to 'protection of theorganizers or mobile phones. The right to 'protection of the private sphere' and 'informational self-determination' haveprivate sphere' and 'informational self-determination' have protected computer users so far, but insufficiently.protected computer users so far, but insufficiently. So the verdict in the online-surveillance case has created aSo the verdict in the online-surveillance case has created a whole new basic right … In shorthand (it might be called) the 'ITwhole new basic right … In shorthand (it might be called) the 'IT right'right' Dietmar Hipp, Spiegel onlineDietmar Hipp, Spiegel online A new fundamental right is born
  • 8. 05/20/16 9 Avv. Giovanni Battista Gallus @gbgallus A new fundamental right is born Constitutional Court creates a new personality right: the right to the integrity and confidentiality of information technological systems
  • 9. 05/20/16 10 Avv. Giovanni Battista Gallus @gbgallus Fast Forward 7 years
  • 10. 05/20/16 11 Avv. Giovanni Battista Gallus @gbgallus What does Galileo do?It collects e-mails, text messages, call history, address books, search history data, and keystrokes. It can take screenshots, record audio to monitor either calls or ambient noise, snap photos, and monitor the phone’s GPS coordinates.
  • 11. 05/20/16 12 Avv. Giovanni Battista Gallus @gbgallus The idea is not new, why was it so successful? A simple dashboard to perform complicated task User friendly interface Good support
  • 12. 05/20/16 13 Avv. Giovanni Battista Gallus @gbgallus All over Europe...
  • 13. Avv. Giovanni Battista Gallus @gbgallus UK Draft Investigatory powers bill
  • 14. 05/20/16 15 Avv. Giovanni Battista Gallus @gbgallus Thorny issue: State shopping for 0 days and vulnerabilities
  • 15. 05/20/16 16 Avv. Giovanni Battista Gallus @gbgallus Doug Brown Trojan horses Encryption Fundamental Rights
  • 16. 05/20/16 17 Avv. Giovanni Battista Gallus @gbgallus Can fundamental rights survive?
  • 17. 05/20/16 18 Avv. Giovanni Battista Gallus @gbgallus The Italian Supreme Court tries to answer The feature which allows to listen to any conversation, by turning the microphone of the smartphone on, allows to listen to every conversation wherever the target will bring his phone. Such feature, according to the Court, is not admissable. It cannot be deemed as a different tecnique for performing "normal" interception, but it is a different tool altogether, making possible to gather every conversation in any place the target is located. The Court finds this feature in breach not only of the criminal procedure Code, but also in breach of art. 15 of the Italian Constitution (right to freedom in communications)
  • 18. 05/20/16 19 Avv. Giovanni Battista Gallus @gbgallus However... The Italian “Corte di Cassazione a sezioni Unite” (Supreme Court, Grand Chamber), on the 28th of April, 2016, upheld the use of a trojan horse “wherever the smartphone or tablet or computer of the indicted person is”, but only with regard to facts related to organized crime and terrorism Can such decision be deemed compatible with E.C.H.R. case law?
  • 19. 05/20/16 20 Avv. Giovanni Battista Gallus @gbgallus Minimum safeguards, according to the European Court of Human Rights: ● the nature of the offences which may give rise to an interception order; ● a definition of the categories of people liable to have their telephones tapped; ● a limit on the duration of telephone tapping; ● the procedure to be followed for examining, using and storing the data obtained; ● the precautions to be taken when communicating the data to other parties ● the circumstances in which recordings may or must be erased or the tapes destroyed E.C.H.R. Weber and Saravia v. Germany Iordachi and others v. Moldova
  • 20. Avv. Giovanni Battista Gallus @gbgallus We may have the answer thanks to the “Bundestrojaner” Photo by Leralle So, can fundamental rights survive?
  • 21. 05/20/16 22 Avv. Giovanni Battista Gallus @gbgallus The approach followed by the German Constitutional Court may still be appropriate Very strict exceptions: Only if there are "factual indications for a concrete danger" in a specific case for the life, body and freedom of persons or for the foundations of the State or the existence of humans, government agencies may use these measures after approval by a judge. "If there are concrete indications in the specific case that a certain measure for gathering data will touch the core area of the conduct of private life, it has to remain principally undone." (margin number 281) If data from this core area is accidentally collected, it must be deleted immediately and can not be used or forwarded in any case. Even fundamental rights may suffer some limitations
  • 22. 05/20/16 23 Avv. Giovanni Battista Gallus @gbgallus Key issues Strict rules of procedure & guidelines Auditability Proportionality (serious crimes) Strict necessity Transparency Accountability
  • 23. 05/20/16 26 Avv. Giovanni Battista Gallus @gbgallus "51. While some governments continue with ill-conceived, ill-advised, ill-judged, ill-timed and occasionally ill- mannered attempts to legitimise or otherwise hang on to disproportionate, unjustifiable privacy-intrusive measures such as bulk collection, bulk hacking, warrantless interception etc. other governments led, in this case by the Netherlands and the USA have moved more openly towards a policy of no back doors to encryption. The SRP would encourage many more governments to coalesce around this position.” Report of the Special Rapporteur on the right to privacy, Joseph A. Cannataci, 8 march 2016
  • 24. 05/20/16 27 Avv. Giovanni Battista Gallus @gbgallus The road from habeas corpus to habeas data is twisty and dangerous
  • 25. 05/20/16 29 Avv. Giovanni Battista Gallus @gbgallus Questions?Questions?
  • 26. Avv. Giovanni Battista Gallus @gbgallus Thank you Avv. Giovanni Battista Gallus gallus@array.eu @gbgallus Unless stated otherwise, all texts are distributed under a Creative Commons Attribution – non commercial – sharealike 3.0 Unported license