SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Smuggling Anthologies 
“Pretty Good Privacy": 
smuggling in the “Information Age” 
“Pretty Good Privacy”: 
il contrabbando nell’età dell’informazione 
Federico Costantini 
“Pretty Good Privacy”: 
krijumčarenje u doba informacija 
Università di Udine / University of Udine / Sveučilište Udine 
Trieste, Auditorium Museo Revoltella Trieste, Museo Revoltella Auditorium Trst, Auditorium muzeja Revoltella 
Venerdì, 7/11/2014 Friday, 7/11/2014 Petak, 7.11.2014
2 
<index> 
<FirstPart> 
The «Pretty Good Privacy» case and its main issues 
</index> 
</FirstPart> 
<SecondPart> 
The problem of smuggling in the «Information Age» 
</SecondPart> 
<Conclusion> 
Smuggling and the control of information 
</Conclusion>
<FirstPart> <The «Pretty Good Privacy» case and its main issues> 
3 
(1) PREMISES 
(2) FACTS 
(3) AFTERMATH 
(4) LEGAL ISSUES
<The «Pretty Good Privacy» case and its main issues> 
4 
<FirstPart> 
(1) PREMISES 
COLD WAR: US Goverment divides export in two 
main categories: 
- MUNITIONS -> Department of State 
- DUAL USE TECHNOLOGIES -> Department of 
Commerce 
1976: US Government provides a very strict regime 
for arms export 
AECA (Arm Export Control ACT) 
-> ITAR (International Traffic in Arms Regulations) 
-> USML (United States Military List) 
-> «cryptographic systems» 
Title 22 C.F.R. 121.1 (XIII)(b)(1) (1994) 
ENIGMA MACHINE 
http://it.wikipedia.org/wiki/Enigm 
a_%28crittografia%29
<The «Pretty Good Privacy» case and its main issues> 
5 
<FirstPart> 
(1) PREMISES 
EXPORT OF CRYPTOGRAPHY = CONTRABAND OF WAR 
«Any person that knowingly violates the Export Administration Act (EAA) or the 
regulations of, is subject to a fine of up to five times the value of the exports 
involved or $ 50,000 whichever is greater, or imprisonment of up to five years or 
both» 50 U.S.C. 2410(a) (1994); 
«Any person that willfully violates the EAA or the regulations of, is subject to five 
times the value of the exports up to $ 1,000,000 ($ 250,000 for an individual), or 
up to ten years of imprisonment, or both» 50 U.S.C. 2410(b)(1)(A)(B); 
«The violation of the Arms Export Control Act (AECA) or the International Traffic in 
Arms Regulation (ITAR) is punishable by a fine up to $ 1,000,000, or 
imprisonment of up to ten years, or both» 22 U.S.C. 2778 (c) (1994).
<The «Pretty Good Privacy» case and its main issues> 
6 
(2) FACTS 
24th of January 1991: Senate Bill 266 
«Comprehensive Counter-Terrorism Act» 
1991: Pretty Good Privacy version 1.0 
DOS, distributed on US soil (and Internet) 
4th of November 1993, arrested for 
infringement of AECA and ITAR 
PHILIP R. ZIMMERMANN 
http://it.wikipedia.org/wiki/Phil_Zimmermann 
<FirstPart>
<The «Pretty Good Privacy» case and its main issues> 
PGP Source Code and Internals 
7 
<FirstPart> 
(2) FACTS 
1995: Zimmermann published worldwide 
his book «PGP Source Code and 
Internals» 
http://www.amazon.com/PGP-Internals-Philip-R-Zimmermann/ 
dp/0262240394 
«The genie of guerrilla 
cryptography is out of the bottle. No 
one, not even its maker, can stuff it 
back in or keep it within what America 
laughably calls its borders. The genie 
is all over the Net. It's in your hands as 
you hold this book. Summon it with a 
conscience. But be prepared to 
summon it if you must» 
(Barlow, John Perry. 1995. Introduction to The official 
PGP user's guide by Philip R. Zimmermann, 
Cambridge, Mass., MIT Press).
<The «Pretty Good Privacy» case and its main issues> 
8 
(2) FACTS 
11th of January 1996: 
The federal investigation against Zimmermann ended with archiving the charges 
PRESS STATEMENT OF ASSISTANT ATTORNEY GENERAL: 
«no change in the law, no change in policy. If you're planning 
on making encryption available over the Internet, or other 
means, better check with the State Department first» 
(…“Better check”???) 
<FirstPart>
<The «Pretty Good Privacy» case and its main issues> 
9 
(3) AFTERMATH 
1996: 
Zimmermann yield the rights on his algorithm 
to a company named Network Associates Inc. 
2001: 
Zimmermann was inducted into the Internet 
Hall of Fame 
2002: 
Network Associates was acquired by PGP 
Inc. 
2010: 
PGP Inc. was merged with Symantec 
Corporation. http://www.internethalloffame.org/i 
nductees/philip-zimmermann 
<FirstPart>
<The «Pretty Good Privacy» case and its main issues> 
10 
(3) AFTERMATH 
July 1996, the US 
government signed an 
international agreement, 
the «Wassenaar 
Arrangement on Export 
Controls for Conventional 
Arms and Dual-Use 
Goods and Technologies» 
(Encryption is contained in 
Annex I, “List of dual-use 
items”, Category 5 – Part 2 
″Information security″). 
www.wassenaar.org 
-> EUROPEAN UNION 
Council Regulation (EC) No 428/2009 
Regulation (EU) No 599/2014 
<FirstPart>
<The «Pretty Good Privacy» case and its main issues> 
11 
<FirstPart> 
(4) LEGAL ISSUES 
Three most important legal profiles of the case: 
(1) First amendment 
-> freedom of expression 
(2) Fourth amendment 
-> right to privacy 
(3) Fifth amendment 
-> privilege against self-incrimination
<The «Pretty Good Privacy» case and its main issues> 
12 
<FirstPart> 
(4) LEGAL ISSUES 
(1) first amendment -> freedom of expression 
Two main grounding arguments for defense: 
(1) Zimmermann’s software was distributed only on national soil 
-> NO EXPORT -> NO INCRIMINATION 
(2) Zimmermann’s book was included in «public domain», so it was a justified 
conduct 
-> EXCEPTION TO PROHIBITION -> NO INCRIMINATION 
BUT (arguments of the US government): 
(against 1) the software was uploaded on internet by Zimmermann’s friends and 
activists (so he said…), and it was spread Worldwide (as Internet is) 
(against 2) can a software be considered as an expression of «free thought»? It is 
just an algorithm (objection: yes, but the act of spreading in itself was an 
expression of freedom)
<The «Pretty Good Privacy» case and its main issues> 
13 
<FirstPart> 
(4) LEGAL ISSUES 
(2) Fourth amendment -> right to privacy 
Zimmermann did not insist on this profile, since eavesdropping is quite 
«tolerated» (Echelon, Snowden, etc…) and involves all Internet users in the 
world. 
SEE: 
(Warren and Brandeis 1890) 
Olmstead v. United States, 277 U.S. 438 (1928) 
Dissenting opinion of Justice Brandeis 
Katz v. United States, 389 U.S. 347 (1967) 
Overruling OLMSTEAD decision.
<The «Pretty Good Privacy» case and its main issues> 
14 
<FirstPart> 
(4) LEGAL ISSUES 
(3) Fifth amendment -> privilege against self-incrimination 
This is very actual problem also for us: can someone be (legally) compelled to 
reveal the passwords of his devices? 
A Virginia Court stated that this does not applies to I.D. fingerprints, because they 
are like DNA samples, a feature of the body not involving moral freedom. 
(… have you got an iPhone6 or a new iPad?)
<The «Pretty Good Privacy» case and its main issues> 
15 
<FirstPart> 
(Question): 
«YES (INTERESTING), 
BUT… What is the 
meaning of this case for 
us, after twenty years, 
here in Europe?»
<The «Pretty Good Privacy» case and its main issues> 
(Answer) 
«MAYBE there are some 
reasons why this case 
could be considered in a 
‘Smuggling Anthology’» 
16 
<FirstPart> 
</FirstPart>
<SecondPart> 
The problem of smuggling in 
the «Information Age» 
17
<The problem of smuggling in the «Information Age»> 
18 
<SecondPart> 
What is the meaning of the frontier? 
What is the meaning of smuggling? 
Why smuggling is so severely punished? 
-> in ancient times (natural order) 
-> in modernity (rational system) 
-> in the «Information Age» (control of information)
<The problem of smuggling in the «Information Age»> 
19 
In ancient times 
Frontier = medium with 
divinities 
(mundus/pomerium in 
Rome) 
Smuggling = breaking a 
natural order, doing evil 
Punishment = castigation of 
an impious 
Heinrich Füger, Prometheus bringt der 
Menschheit das Feuer (circa 1817) oil on 
canvas, Liechtenstein Museum 
<SecondPart>
<The problem of smuggling in the «Information Age»> 
20 
In modern age 
Frontier = phisical limit of 
the Sovereign’s power 
Smuggling = 
disenchantment against 
legal system 
Punishment = prevention 
against rebellion of other 
individuals MAV Villagrasa, Sanctus Al Caponis (2010) 
(t-shirt, particular) 
<SecondPart>
<The problem of smuggling in the «Information Age»> 
21 
In «Information Age»? 
Frontier = domain of 
available resources 
Smuggling = concealing 
information 
Punishment = exclusion from 
shared information 
http://internet-map.net/ 
<SecondPart>
<The problem of smuggling in the «Information Age»> 
22 
<SecondPart> 
ANCIENT TIMES / MODERNITY 
Smuggling -> Deception 
(by the smuggler to the customs officer) 
«Information asymmetry»: show appearance / hide reality 
- Physically 
(sneaking through solitary paths, concealing trafficked goods in worthless objects) 
- Symbolically 
(forging shipping documents, corrupting customs officers)
<SecondPart> <The problem of smuggling in the «Information Age»> 
23 
«INFORMATION AGE» 
Deception -> Encryption 
(prevention of access by third parties) 
Encoding = hide reality / create appearance 
Decoding = hide appearence / show reality
<The problem of smuggling in the «Information Age»> 
24 
PLAINTEXT 
(resources 
available) 
Encoding 
(hide reality) 
CYPHERTEXT 
(resources 
unavailable) 
How Encryption works (basically) 
Decoding 
(show 
appearence) 
<SecondPart>
<SecondPart> <The problem of smuggling in the «Information Age»> 
25 
(Question): 
«YES (INTERESTING), 
BUT… What is the 
problem? Encryption 
should be granted as a 
protection for freedom!»
<SecondPart> <The problem of smuggling in the «Information Age»> 
26 
(Answer) 
«(also Zimmermann was 
convinced of it) but 
MAYBE there are some 
reasons for doubting in 
some cases»
<SecondPart> <The problem of smuggling in the «Information Age»> 
First example: «THE REASON», the first metal gun entirely 3D-printed 
With 3d printers you don’t need to carry a phyisical thing through a custom (you just need to 
download a file, to buy a printer and some «ink cartridges») 
27 
http://gizmodo.com/the-world-just-got-its-second-all-3d-printed-metal-gun-1651348942.
<SecondPart> <The problem of smuggling in the «Information Age»> 
First example: Deep Web and cryptocurrencies 
You can buy anonymously what you want (EVERYTHING!), thanks to Zimmermann 
http://www.forbes.com/sites/andygreenberg/2013/04/16/founder-of-drug-site-silk-road-says-bitcoin- 
28 
booms-and-busts-wont-kill-his-black-market/
<SecondPart> <The problem of smuggling in the «Information Age»> 
The «Information Age» reveals the problems 
hidden in the contrast between individual and 
State, between two opposite ideologies: 
libertarism and autoritarism. 
29 
Each part claims to have power to control 
information. But this power is exclusive and 
absolute. 
</SecondPart>
30 
<Conclusion> 
Smuggling and the control 
of information 
</Conclusion>
<Conclusion> <Smuggling and the control of information> 
31 
Few final remarks: 
(1) the «Information Age» has weakened past physical boundaries, but has raised 
higher barriers, called «cyberborders» 
(2) Internet has been Weaponized, so theoretically there is no difference between 
«contraband of war», mere «smuggling» and siimple «comunication»: everything 
that is out of control, it is a threath. 
-> Tallin Manual 
(3) there is no substantial difference between traditional «smugglers» and 
«customs offices»: everyone bows to the power of information.
<Conclusion> <Smuggling and the control of information> 
(Question): 
«YES (INTERESTING), 
BUT… is there still room 
for smuggling in the 
«Information Age»?» 
32
<Conclusion> <Smuggling and the control of information> 
(Answer) 
«MAYBE YES. Perharps we 
should think that smuggling 
is an «art» and try to 
«smuggle» ourselves, with 
creativity» 
33
<Conclusion> <Smuggling and the control of information> 
34 
Hugo van der Groot, 
philosopher of law, 
sentenced to death, 
escaped from 
Loevestein Castle in 
the Netherlands 
hiding himself in a 
trunk of books 
(22nd March 1621). 
Hugo de Groot klimt in de boekenkist, (Hugo Grotius 
climbs into the book chest) (circa 1800)
35 
Many #thanks for your #time, 
#patience & #attention 
Federico Costantini 
[name].[surname]@uniud.it

Weitere ähnliche Inhalte

Andere mochten auch

Gnu Privacy Guard - Intro
Gnu Privacy Guard - IntroGnu Privacy Guard - Intro
Gnu Privacy Guard - Intro
O. R. Kumaran
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
Clint Walker
 

Andere mochten auch (20)

Handson 1 (5/6)
Handson 1 (5/6)Handson 1 (5/6)
Handson 1 (5/6)
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
PGP based social network
PGP based social networkPGP based social network
PGP based social network
 
E mail security
E   mail securityE   mail security
E mail security
 
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
Tutorial Certificate Authority (CA) Public Key Infrastructure (PKI)
 
Gnu Privacy Guard - Intro
Gnu Privacy Guard - IntroGnu Privacy Guard - Intro
Gnu Privacy Guard - Intro
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
PGP and Enigmail
PGP and EnigmailPGP and Enigmail
PGP and Enigmail
 
Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9Symantec Brightmail Gateway 9
Symantec Brightmail Gateway 9
 
DataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryptionDataMotion-IG1-TheEvolutionofEncryption
DataMotion-IG1-TheEvolutionofEncryption
 
Pgp
PgpPgp
Pgp
 
PGP presentation 2014
PGP presentation 2014PGP presentation 2014
PGP presentation 2014
 
PGP - Pretty Good Privacy
PGP - Pretty Good PrivacyPGP - Pretty Good Privacy
PGP - Pretty Good Privacy
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Pgp
PgpPgp
Pgp
 
Pgp security mule
Pgp security   mulePgp security   mule
Pgp security mule
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 

Ähnlich wie "Pretty Good Privacy": smuggling in the "Information Age"

Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
Matthew MacNabb
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
Mathias Klang
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
Ana Meskovska
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
Jacqueline Fick
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
q3XKFc5XR
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
ClubHack
 
Legal History Of Spam
Legal  History Of SpamLegal  History Of Spam
Legal History Of Spam
legal5
 

Ähnlich wie "Pretty Good Privacy": smuggling in the "Information Age" (20)

Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
Faraday Cages, Marbled Palaces and Humpty Dumpty: the Reality of Internet Gov...
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
 
Social media, surveillance and censorship
Social media, surveillance  and censorshipSocial media, surveillance  and censorship
Social media, surveillance and censorship
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
Whistleblowing and the Right to Freedom of Expression and Information under t...
Whistleblowing and the Right to Freedom of Expression and Information under t...Whistleblowing and the Right to Freedom of Expression and Information under t...
Whistleblowing and the Right to Freedom of Expression and Information under t...
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Media piracy
Media piracyMedia piracy
Media piracy
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
"Retention & Online Search: How Current Challenges for Privacy Become New Thr...
"Retention & Online Search: How Current Challenges for Privacy Become New Thr..."Retention & Online Search: How Current Challenges for Privacy Become New Thr...
"Retention & Online Search: How Current Challenges for Privacy Become New Thr...
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Legal History Of Spam
Legal  History Of SpamLegal  History Of Spam
Legal History Of Spam
 

Mehr von Federico Costantini

Mehr von Federico Costantini (20)

L’ETICA COME “DESIGN” NELL’INTELLIGENZA ARTIFICIALE
L’ETICA COME “DESIGN” NELL’INTELLIGENZA ARTIFICIALEL’ETICA COME “DESIGN” NELL’INTELLIGENZA ARTIFICIALE
L’ETICA COME “DESIGN” NELL’INTELLIGENZA ARTIFICIALE
 
Digital transformation: Smart Working, sicurezza e dati personali
Digital transformation: Smart Working, sicurezza e dati personaliDigital transformation: Smart Working, sicurezza e dati personali
Digital transformation: Smart Working, sicurezza e dati personali
 
COVID19 vs GDPR: the case of “Immuni” Italian app
COVID19 vs GDPR: the case of “Immuni” Italian appCOVID19 vs GDPR: the case of “Immuni” Italian app
COVID19 vs GDPR: the case of “Immuni” Italian app
 
20191004 Gamification PA
20191004 Gamification PA20191004 Gamification PA
20191004 Gamification PA
 
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...
 
20181012 Intelligenza artificiale e soggezione all'azione amministrativa: il ...
20181012 Intelligenza artificiale e soggezione all'azione amministrativa: il ...20181012 Intelligenza artificiale e soggezione all'azione amministrativa: il ...
20181012 Intelligenza artificiale e soggezione all'azione amministrativa: il ...
 
20180327 Intelligenza artificiale e “computabilità giuridica” tra diritto civ...
20180327 Intelligenza artificiale e “computabilità giuridica” tra diritto civ...20180327 Intelligenza artificiale e “computabilità giuridica” tra diritto civ...
20180327 Intelligenza artificiale e “computabilità giuridica” tra diritto civ...
 
20180914 “Inaction is not an option”. Informazione, diritto e società nella p...
20180914 “Inaction is not an option”. Informazione, diritto e società nella p...20180914 “Inaction is not an option”. Informazione, diritto e società nella p...
20180914 “Inaction is not an option”. Informazione, diritto e società nella p...
 
20180220 PROFILI GIURIDICI DELLA SICUREZZA INFORMATICA NELL’INDUSTRIA 4.0
20180220 PROFILI GIURIDICI DELLA SICUREZZA INFORMATICA NELL’INDUSTRIA 4.020180220 PROFILI GIURIDICI DELLA SICUREZZA INFORMATICA NELL’INDUSTRIA 4.0
20180220 PROFILI GIURIDICI DELLA SICUREZZA INFORMATICA NELL’INDUSTRIA 4.0
 
20171031 Cosa vuol dire «essere avvocato» oggi? Il giurista tra «complessità ...
20171031 Cosa vuol dire «essere avvocato» oggi? Il giurista tra «complessità ...20171031 Cosa vuol dire «essere avvocato» oggi? Il giurista tra «complessità ...
20171031 Cosa vuol dire «essere avvocato» oggi? Il giurista tra «complessità ...
 
20170928 A (very short) introduction
20170928 A (very short) introduction20170928 A (very short) introduction
20170928 A (very short) introduction
 
20170927 Introduzione ai problemi concernenti prova come “informazione” e “in...
20170927 Introduzione ai problemi concernenti prova come “informazione” e “in...20170927 Introduzione ai problemi concernenti prova come “informazione” e “in...
20170927 Introduzione ai problemi concernenti prova come “informazione” e “in...
 
Social network, social profiling, predictive policing. Current issues and fut...
Social network, social profiling, predictive policing. Current issues and fut...Social network, social profiling, predictive policing. Current issues and fut...
Social network, social profiling, predictive policing. Current issues and fut...
 
Collecting Evidence in the «Information Society»: Theoretical Background, Cur...
Collecting Evidence in the «Information Society»: Theoretical Background, Cur...Collecting Evidence in the «Information Society»: Theoretical Background, Cur...
Collecting Evidence in the «Information Society»: Theoretical Background, Cur...
 
"Società dell'Informazione", organizzazione del lavoro e "Risorse Umane"
"Società dell'Informazione", organizzazione del lavoro e "Risorse Umane""Società dell'Informazione", organizzazione del lavoro e "Risorse Umane"
"Società dell'Informazione", organizzazione del lavoro e "Risorse Umane"
 
Problemi inerenti la “sicurezza” negli “autonomous vehicles”
Problemi inerenti la “sicurezza” negli “autonomous vehicles”Problemi inerenti la “sicurezza” negli “autonomous vehicles”
Problemi inerenti la “sicurezza” negli “autonomous vehicles”
 
Introduzione generale ai problemi della prova digitale
Introduzione generale ai problemi della prova digitaleIntroduzione generale ai problemi della prova digitale
Introduzione generale ai problemi della prova digitale
 
«Information Society» and MaaS in the European Union: current issues and futu...
«Information Society» and MaaS in the European Union: current issues and futu...«Information Society» and MaaS in the European Union: current issues and futu...
«Information Society» and MaaS in the European Union: current issues and futu...
 
POSTER: "When an algorithm decides «who has to die». Security concerns in “A...
POSTER: "When an algorithm decides «who has to die».  Security concerns in “A...POSTER: "When an algorithm decides «who has to die».  Security concerns in “A...
POSTER: "When an algorithm decides «who has to die». Security concerns in “A...
 
Società dell’Informazione e “diritto artificiale”. Il problema del “controll...
Società dell’Informazione e “diritto artificiale”.  Il problema del “controll...Società dell’Informazione e “diritto artificiale”.  Il problema del “controll...
Società dell’Informazione e “diritto artificiale”. Il problema del “controll...
 

Kürzlich hochgeladen

Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
A AA
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 

Kürzlich hochgeladen (20)

MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 

"Pretty Good Privacy": smuggling in the "Information Age"

  • 1. Smuggling Anthologies “Pretty Good Privacy": smuggling in the “Information Age” “Pretty Good Privacy”: il contrabbando nell’età dell’informazione Federico Costantini “Pretty Good Privacy”: krijumčarenje u doba informacija Università di Udine / University of Udine / Sveučilište Udine Trieste, Auditorium Museo Revoltella Trieste, Museo Revoltella Auditorium Trst, Auditorium muzeja Revoltella Venerdì, 7/11/2014 Friday, 7/11/2014 Petak, 7.11.2014
  • 2. 2 <index> <FirstPart> The «Pretty Good Privacy» case and its main issues </index> </FirstPart> <SecondPart> The problem of smuggling in the «Information Age» </SecondPart> <Conclusion> Smuggling and the control of information </Conclusion>
  • 3. <FirstPart> <The «Pretty Good Privacy» case and its main issues> 3 (1) PREMISES (2) FACTS (3) AFTERMATH (4) LEGAL ISSUES
  • 4. <The «Pretty Good Privacy» case and its main issues> 4 <FirstPart> (1) PREMISES COLD WAR: US Goverment divides export in two main categories: - MUNITIONS -> Department of State - DUAL USE TECHNOLOGIES -> Department of Commerce 1976: US Government provides a very strict regime for arms export AECA (Arm Export Control ACT) -> ITAR (International Traffic in Arms Regulations) -> USML (United States Military List) -> «cryptographic systems» Title 22 C.F.R. 121.1 (XIII)(b)(1) (1994) ENIGMA MACHINE http://it.wikipedia.org/wiki/Enigm a_%28crittografia%29
  • 5. <The «Pretty Good Privacy» case and its main issues> 5 <FirstPart> (1) PREMISES EXPORT OF CRYPTOGRAPHY = CONTRABAND OF WAR «Any person that knowingly violates the Export Administration Act (EAA) or the regulations of, is subject to a fine of up to five times the value of the exports involved or $ 50,000 whichever is greater, or imprisonment of up to five years or both» 50 U.S.C. 2410(a) (1994); «Any person that willfully violates the EAA or the regulations of, is subject to five times the value of the exports up to $ 1,000,000 ($ 250,000 for an individual), or up to ten years of imprisonment, or both» 50 U.S.C. 2410(b)(1)(A)(B); «The violation of the Arms Export Control Act (AECA) or the International Traffic in Arms Regulation (ITAR) is punishable by a fine up to $ 1,000,000, or imprisonment of up to ten years, or both» 22 U.S.C. 2778 (c) (1994).
  • 6. <The «Pretty Good Privacy» case and its main issues> 6 (2) FACTS 24th of January 1991: Senate Bill 266 «Comprehensive Counter-Terrorism Act» 1991: Pretty Good Privacy version 1.0 DOS, distributed on US soil (and Internet) 4th of November 1993, arrested for infringement of AECA and ITAR PHILIP R. ZIMMERMANN http://it.wikipedia.org/wiki/Phil_Zimmermann <FirstPart>
  • 7. <The «Pretty Good Privacy» case and its main issues> PGP Source Code and Internals 7 <FirstPart> (2) FACTS 1995: Zimmermann published worldwide his book «PGP Source Code and Internals» http://www.amazon.com/PGP-Internals-Philip-R-Zimmermann/ dp/0262240394 «The genie of guerrilla cryptography is out of the bottle. No one, not even its maker, can stuff it back in or keep it within what America laughably calls its borders. The genie is all over the Net. It's in your hands as you hold this book. Summon it with a conscience. But be prepared to summon it if you must» (Barlow, John Perry. 1995. Introduction to The official PGP user's guide by Philip R. Zimmermann, Cambridge, Mass., MIT Press).
  • 8. <The «Pretty Good Privacy» case and its main issues> 8 (2) FACTS 11th of January 1996: The federal investigation against Zimmermann ended with archiving the charges PRESS STATEMENT OF ASSISTANT ATTORNEY GENERAL: «no change in the law, no change in policy. If you're planning on making encryption available over the Internet, or other means, better check with the State Department first» (…“Better check”???) <FirstPart>
  • 9. <The «Pretty Good Privacy» case and its main issues> 9 (3) AFTERMATH 1996: Zimmermann yield the rights on his algorithm to a company named Network Associates Inc. 2001: Zimmermann was inducted into the Internet Hall of Fame 2002: Network Associates was acquired by PGP Inc. 2010: PGP Inc. was merged with Symantec Corporation. http://www.internethalloffame.org/i nductees/philip-zimmermann <FirstPart>
  • 10. <The «Pretty Good Privacy» case and its main issues> 10 (3) AFTERMATH July 1996, the US government signed an international agreement, the «Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies» (Encryption is contained in Annex I, “List of dual-use items”, Category 5 – Part 2 ″Information security″). www.wassenaar.org -> EUROPEAN UNION Council Regulation (EC) No 428/2009 Regulation (EU) No 599/2014 <FirstPart>
  • 11. <The «Pretty Good Privacy» case and its main issues> 11 <FirstPart> (4) LEGAL ISSUES Three most important legal profiles of the case: (1) First amendment -> freedom of expression (2) Fourth amendment -> right to privacy (3) Fifth amendment -> privilege against self-incrimination
  • 12. <The «Pretty Good Privacy» case and its main issues> 12 <FirstPart> (4) LEGAL ISSUES (1) first amendment -> freedom of expression Two main grounding arguments for defense: (1) Zimmermann’s software was distributed only on national soil -> NO EXPORT -> NO INCRIMINATION (2) Zimmermann’s book was included in «public domain», so it was a justified conduct -> EXCEPTION TO PROHIBITION -> NO INCRIMINATION BUT (arguments of the US government): (against 1) the software was uploaded on internet by Zimmermann’s friends and activists (so he said…), and it was spread Worldwide (as Internet is) (against 2) can a software be considered as an expression of «free thought»? It is just an algorithm (objection: yes, but the act of spreading in itself was an expression of freedom)
  • 13. <The «Pretty Good Privacy» case and its main issues> 13 <FirstPart> (4) LEGAL ISSUES (2) Fourth amendment -> right to privacy Zimmermann did not insist on this profile, since eavesdropping is quite «tolerated» (Echelon, Snowden, etc…) and involves all Internet users in the world. SEE: (Warren and Brandeis 1890) Olmstead v. United States, 277 U.S. 438 (1928) Dissenting opinion of Justice Brandeis Katz v. United States, 389 U.S. 347 (1967) Overruling OLMSTEAD decision.
  • 14. <The «Pretty Good Privacy» case and its main issues> 14 <FirstPart> (4) LEGAL ISSUES (3) Fifth amendment -> privilege against self-incrimination This is very actual problem also for us: can someone be (legally) compelled to reveal the passwords of his devices? A Virginia Court stated that this does not applies to I.D. fingerprints, because they are like DNA samples, a feature of the body not involving moral freedom. (… have you got an iPhone6 or a new iPad?)
  • 15. <The «Pretty Good Privacy» case and its main issues> 15 <FirstPart> (Question): «YES (INTERESTING), BUT… What is the meaning of this case for us, after twenty years, here in Europe?»
  • 16. <The «Pretty Good Privacy» case and its main issues> (Answer) «MAYBE there are some reasons why this case could be considered in a ‘Smuggling Anthology’» 16 <FirstPart> </FirstPart>
  • 17. <SecondPart> The problem of smuggling in the «Information Age» 17
  • 18. <The problem of smuggling in the «Information Age»> 18 <SecondPart> What is the meaning of the frontier? What is the meaning of smuggling? Why smuggling is so severely punished? -> in ancient times (natural order) -> in modernity (rational system) -> in the «Information Age» (control of information)
  • 19. <The problem of smuggling in the «Information Age»> 19 In ancient times Frontier = medium with divinities (mundus/pomerium in Rome) Smuggling = breaking a natural order, doing evil Punishment = castigation of an impious Heinrich Füger, Prometheus bringt der Menschheit das Feuer (circa 1817) oil on canvas, Liechtenstein Museum <SecondPart>
  • 20. <The problem of smuggling in the «Information Age»> 20 In modern age Frontier = phisical limit of the Sovereign’s power Smuggling = disenchantment against legal system Punishment = prevention against rebellion of other individuals MAV Villagrasa, Sanctus Al Caponis (2010) (t-shirt, particular) <SecondPart>
  • 21. <The problem of smuggling in the «Information Age»> 21 In «Information Age»? Frontier = domain of available resources Smuggling = concealing information Punishment = exclusion from shared information http://internet-map.net/ <SecondPart>
  • 22. <The problem of smuggling in the «Information Age»> 22 <SecondPart> ANCIENT TIMES / MODERNITY Smuggling -> Deception (by the smuggler to the customs officer) «Information asymmetry»: show appearance / hide reality - Physically (sneaking through solitary paths, concealing trafficked goods in worthless objects) - Symbolically (forging shipping documents, corrupting customs officers)
  • 23. <SecondPart> <The problem of smuggling in the «Information Age»> 23 «INFORMATION AGE» Deception -> Encryption (prevention of access by third parties) Encoding = hide reality / create appearance Decoding = hide appearence / show reality
  • 24. <The problem of smuggling in the «Information Age»> 24 PLAINTEXT (resources available) Encoding (hide reality) CYPHERTEXT (resources unavailable) How Encryption works (basically) Decoding (show appearence) <SecondPart>
  • 25. <SecondPart> <The problem of smuggling in the «Information Age»> 25 (Question): «YES (INTERESTING), BUT… What is the problem? Encryption should be granted as a protection for freedom!»
  • 26. <SecondPart> <The problem of smuggling in the «Information Age»> 26 (Answer) «(also Zimmermann was convinced of it) but MAYBE there are some reasons for doubting in some cases»
  • 27. <SecondPart> <The problem of smuggling in the «Information Age»> First example: «THE REASON», the first metal gun entirely 3D-printed With 3d printers you don’t need to carry a phyisical thing through a custom (you just need to download a file, to buy a printer and some «ink cartridges») 27 http://gizmodo.com/the-world-just-got-its-second-all-3d-printed-metal-gun-1651348942.
  • 28. <SecondPart> <The problem of smuggling in the «Information Age»> First example: Deep Web and cryptocurrencies You can buy anonymously what you want (EVERYTHING!), thanks to Zimmermann http://www.forbes.com/sites/andygreenberg/2013/04/16/founder-of-drug-site-silk-road-says-bitcoin- 28 booms-and-busts-wont-kill-his-black-market/
  • 29. <SecondPart> <The problem of smuggling in the «Information Age»> The «Information Age» reveals the problems hidden in the contrast between individual and State, between two opposite ideologies: libertarism and autoritarism. 29 Each part claims to have power to control information. But this power is exclusive and absolute. </SecondPart>
  • 30. 30 <Conclusion> Smuggling and the control of information </Conclusion>
  • 31. <Conclusion> <Smuggling and the control of information> 31 Few final remarks: (1) the «Information Age» has weakened past physical boundaries, but has raised higher barriers, called «cyberborders» (2) Internet has been Weaponized, so theoretically there is no difference between «contraband of war», mere «smuggling» and siimple «comunication»: everything that is out of control, it is a threath. -> Tallin Manual (3) there is no substantial difference between traditional «smugglers» and «customs offices»: everyone bows to the power of information.
  • 32. <Conclusion> <Smuggling and the control of information> (Question): «YES (INTERESTING), BUT… is there still room for smuggling in the «Information Age»?» 32
  • 33. <Conclusion> <Smuggling and the control of information> (Answer) «MAYBE YES. Perharps we should think that smuggling is an «art» and try to «smuggle» ourselves, with creativity» 33
  • 34. <Conclusion> <Smuggling and the control of information> 34 Hugo van der Groot, philosopher of law, sentenced to death, escaped from Loevestein Castle in the Netherlands hiding himself in a trunk of books (22nd March 1621). Hugo de Groot klimt in de boekenkist, (Hugo Grotius climbs into the book chest) (circa 1800)
  • 35. 35 Many #thanks for your #time, #patience & #attention Federico Costantini [name].[surname]@uniud.it