Bestand wählen
Merken

Italy's surveillance toolbox

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
the act of and
and the the the the the the the good morning everyone imagine you're in a position where you decide that well you want to know the surveillance capabilities of your government this is nice well everyone wants to know that but no imagine that if you ask questions and the law required to be uncertain that would be even nicer that's what freedom of information requests are for and here to tell you about how this can be a collapse applied in Italy to determine what the Italian government has capability wise is but a couple Coluccini and look at how the player 1 I methodical change I'm a freelance journalist in easily writing merely for motherboard neatly and also a member of the and the Center for transparency in which the human rights what about to introduce it today it's a project for monitoring government surveillance capabilities the means of transparency tools some
the ground of this in histories peculiar due to all organized crime and Mafia there are specific transparency and anti-corruption those that can help to understand better what is going on for this kind of projects but so when we talk about civilians
easily variance are well known from abroad would why due to some companies such as Aria and hacking team there well known for exporting surveillance technologies to authoritarian regimes for the work and also continued for the huge act which suffers and my question was OK of the
surrealist ecology developing funny our famous abroad but what's going on in Italy or that the colleges that the government is using to intercept and surveil heat some citizens the where did it's basically a sudden from
some open sourcing tail of it will line so from 2 great websites like up the surveillance industry index and by blind in looking for which gathers information on of several civilians companies from all over the world as specifically I look forward the trial on the mean once of from that's II turn
to Google searching for the value the tax numbers which gave me of some interesting results what I got where for spread sheets detailing the payments but the means of interior to each company so why did happen because due to the transparency pseudo number 53 of 2015 our the public sector is obliged to publish their payments from the spreadsheets what I got also of the the money in the there was also this this subject tender it invocation code of what they were paying for using the tenant efficient code I turn back to together again good and what I found was some XML files in which it was detailed all the public requirement that the sets of the public sectors these again did to anti-corruption low each public sector so the mainstream certainty of resembled the means of defense the minister of justice and all other public offices are obliged to publish on these XML formats the information regarding the public procurement that sets so whatever they're interesting in buying in a public tender is of published online this is the form of and given these data this is my
reaction I had all the ingredients to start monitoring exactly what the government was buying how much was paying for it and which were the companies involved
so i yi constructed this workflow which is basically something from the public procurement set XML files I can get the tenant addition code and the list of companies participating in the 10 this is only the company that won the tender there or the participants which pretty interesting because you can discover new companies that you weren't unaware of before the given the data then the tenant ification going in the list of companies thanks to the freedom of information access no reason to introducing a 30 at the beginning of the 20 17 I can ask for documents regarding invoices you should buy the several of companies and technical and economic offers of the public tenders In this way at accumulated expenditures anything at information on the software technologies and the devices that these companies are selling to the Government the so this sort through some of the results of this monitoring of the table on the right are where the companies which together from the province of single website so I was able to more than double the number of companies in the US more to odds deterred I alighted are like some degree 1 there's 1 which is called an idea which is that if funding for a company a in this also pedicle Italian which is the 2nd most larger of telecommunication company in Italy which is well known just be in which is where to find in in a database of companies selling civilians technologies and device but we see later why now I want to focus better on 2 other companies the 1st 1 is sigh
foregate suffered itself pretty reason you company belongs to the group of it electronica finally tenant companies and among the products 2 of them are the wife a catcher which is basically a Wi-Fi network monitoring system able to joke collides and it is defined the nodes and provide some of traffic flow analysis do the instead the left in it's basically uh an integrated platform which provides you the possibility to surveil phone calls are the same as gene chats up positive make on social media and even voice over IP calls up and going to look on the future accounts it's interesting that some interesting features
In the company is CPM these 1 basically sales of jammers of dualism was also but of looking to the tenders
there was a tender regarding in the catches end us again and try again uh is said to be the seller of that sent some company which is a In use company selling it in the caches so this is 1 of the size that we can get with this approach we can discover also offer sellers of companies that are based abroad they can somehow are sitting devices that the government detaining government is interested in still remaining and often the topic of into catches the seas so objects that said that she gets regarding the the tender so on top that's the subject they're providing an instigation system then there are the list of participants there of some of well known names and there's also Telecom Digest of Technical idea our to condition company that interconnectedness company participated intended in 2015 for owning signature system they is going to becoming that 1 at the time was the telomerase that the force on top regarding sketches of still you can get some information from the technical specification that the government is requesting for this companies so all the uh they're asking for debt downgrades so passing from 3 G 2 to G from 4 GUT so to weaken the security of the communications and their bridal so a scheme of what it would like to the been suggested to provide to to authority so easy to this with the truck comprise some application targeting following around the specific targets collecting as you see up at the center of data in the in the evening numbers
this is regarding into catches so let's try to build the real the proper to box of what they they're interesting and what about surveillance in event interception when I found that are
there was a project of which belongs to the national imperative plan which is a lot of the plan to to foster the development of companies and so for weekly which is using the European money and Italian public money to fund this kind of purchase these products which was the held by the company CS which is another well-known surveillance company in uh easily from easily was visited to provide some of the Internet probes tools provide the lawful interception of that some traffic deception regarding a specific user or even intercepting traffic here from or to work towards specific site what was we here is that the the tag of this project a higher in yellow it's for cultural activities so the basic save this project regards of the cultures here but the other it's not the and probe 4 interceptions the cost of this project was a little bit more than 100 thousand euros 0 it was approved in 2006 and received 150 thousand euros of public funding and the last payment was due on the Jerry 2015 I further requests of information request to receive in obtaining all the documents regarding this project this was funded by public money but the answer I got was unknown huge no due to intellectual property issues for the company and 2 of the secrecy of the technology itself the for a national security standpoint the which is a peak next let's think about
the the social media and the old positive we do a line
the minister here has boat the system for socially the project the code name Project it's crime which is this what is the system do its basically are its aim is to allow provided in media monitoring system to gather all your files available online from social media also Facebook Google YouTube and their thing basically doing that the are crawling scraping the is web pages transcribed John defined the get identified speakers and straw that the base of voice fingerprints the which our critical serving in the the prediction authority that that under the protection Authority as open an investigation into this and it's has requested the more documents information to year goes to the specific the system would have to be implemented all to fight terrorism but clearly the power of these instruments regarding the distributed crawls grave and also how bodies voice fingerprints storing another based on what this safeguards what is not happen this is not clear the likely I found a few information request access which was granted specially what happened did our we've company don't up on the right won the tender but they refused to provide a technical office due to Internet of property issues but receive some other for example from yes because she said there are well known companies and this is an excerpt from
the the addresses of the technical offers and you see on the left side the all departed channels including and you know yahoo google credits and basically how they would like to see so the know was there and then to pass through good use of our knowledge and understanding what's the meaning and the system also translates the gets only from several languages or this that we obtain will be published of probably at the beginning of the 2018 daring Italian so we have to understand how to properly + lead them or make them available to all the community but as move on our
recently here in Germany are in article only governing train station there were not test of physical vision system well Italy was the same or actually leave is a bit more
of what they did is of the beginning of this year their border system OfficeVision system for a particle sorry which is basically all OfficeVision system this is the architecture that picture taken from their of taking the specs required so you have these basically on the right the AFI yes it did in the base of the policy the dimensions shows the old the image and they really have all of our criminals they would like to have a lot of these server application we several engines using several of face-recognition algorithms to find the the specific personal containing the image of the system is
split into 2 different parts and as an enterprise version which of has to deal we've 10 million images in which is basically aside aggression so you you have haven't given image you would like to know if the person that image is presenting it as a base the other 1 is a real time 1 which is to work together and we've 10 CCTV cameras the big boats in the standard as well to be deployed but according to the necessities around Italy our the system we spot the the person the of time comparing to watch list of 10 thousand images which er concerning numbers both from the for the 10 new images in it and thousands um and so
yeah the we uh we find out information requests so for those of that in office and we you with some issues of
close they only provided the technical 1st of the company that won the tender but sort of obscure data redacted some some passages so it's not completely clear what's the engine use but again also for this system Data and the Protection Authority of an investigation asking for more information to they got to the means interior the I but let's move on what we can request we've often informational in Italy going through this invoices so this is an example of the uninvited I request for the company an area that is you become redacted so they wanted to remove some specific detail regarding investigations but the basically provide us with documents so these are this is good this is the leverage goes we have a president they provide the summer voices who I'm keeping asking you knew invoices so they're coming recollecting them we would like to understand how much they expand this the colleges the
so far I've been talking about the Ministry of Interior the this project can be applied also to the use of defense and minister of justice with an ensuing you know there are some carriers because the transparency those of the fares are not so powerful as in other cases but still we can have some information this is the PDF documents detailing the expenses of them for the defense a regarding some some condition intelligence that the empowerment of women in condition vision systems it's pretty interesting 1 is on I like to do which of a bigger system developed by the company expert system and the legal system itself are it's used to select the intercept the traffic and to both of them provided a sort of speech to text translation so to test and you can see more details that we would like to think about it as some sort of a weaker version of it's the store but there could this be of some searching for Critias parameters you can search connect and provided a comprehensive understanding of the the target of the target
the so know was my initial question wanted to know what's inside the box on the government the it looks like that environment as acquired
everything they needs everything that are the bigger nations use such as physical socially intelligence an internet interception and suggestions but what's
next but what we would like to keep of finding this film information requests to get all the more the syntactical economic forces we would like to expand the destinies of companies cos there's some missing companies for example acting team there was no information regarding that by way of trying to find companies connecting to them and this would be really helpful colors before find the companies that participating tenders we know more companies are trying to sell this kind of technology so we can somehow linked him to a canteen where other more important companies in our point interesting point is to push the Government on expenditures so how much it is spending not only on the privacy concerning point of view but also on the expanded this point of view how much does it cost to reveal your citizens and with this in this way we can somehow understanding what is missing so far is to analyze the legal framework the but I that's led the government use such technologies so far it's quite blurred dismal for the physical initial there was no the dimension of terrorism threats it was like yeah we want to buy dispersive nation system I use it in public key events which is concerning which is not even like the social media intelligence system only for terrorism-related issues and some more we would like to and involve activists from other countries because we think that this framework could could be could be applied to be exported to other countries and to do that specifically about the the the
workshop right after this talk at 2 PM address inference us in the so other work days uh arise in 2020 funded project which is called the issue with this the with the which is providing a platform of for accountability mechanisms to understand what this edition of the nation's in Europe but then other worshippers if anyone is interested we can discuss all that other nations and from this the upcoming to do what should we now we can see how the bond requirement that the sets are available how which provides in those countries there you possibility to apply the same framework to understand how would your country ease of acquiring such technologies and techniques so I I invite you to if you're interested to come to the workshop please MIT there
and thank you very much recoverable now we have 4 microphones here in the hall so that you can line up behind 4 questions and we have plenty of time for questions are there questions from the internet no questions in decades microphone 1 place high bound to when you start here investigation you said you want to book planet and the website for Italian companies providing turns equipment at all of other laws initially specifying that's supposed have to come from domestic suppliers or why was the judge's focused solely on legally Italian companies I Noshir on the laws regarding the domestic supplies for at least and the thing that for the Museo into your there are any constraints such kind of constraints we wanted to know was like Karim a basic itself to from that because they were like do you do when known companies and it's the then I found that in my hand so if you miss the devil and so was like OK list of digging deeper so it's yeah I don't want to focus on designing company CI for any pouring comets proverbs independence always surely followed that the the trail for sure so yeah there was no specific reason why I did that 1 question from the internet while signal it completes it's um our moon these tools under secrecy of under supersede them well when I request information to the police this the values were being used how how many times often and the stuff they didn't reply say anything so what I hope to the the the prediction authority can understand better what's going on and of course I wiIl with to to see if there's been a or if they if it's already been used so we program secrecy kind microphone to these allow that did you ask the ministry what is relation between the culture and to surveillance I II requested that's in the film from all information request mean to I did that to the Minister of economic development because it was the 1 on the holding that the kind of project but didn't reply in that so microphone number 4 please and don't get out of hand entering in the to the
vendor and right is something limited to offers higher than 80 or 100 thousand euros so do you do you know do you have the feeling that there is some obfuscation by going below the tender line in order to not go into the public 4 into those databases i.e. idea specifically check on that but that's certainly a point I mean from the east of the study clearly there is something about missing for example the Trojans do they're not appearing they're not there but also because probably need to dig deeper into means of justice because it's they are of buying beast ecology sold yeah I'm not sure if they're doing that on porpoise like lowering the demand for for defenders but differently there is something missing so this is not comprehensive is still an ongoing this thing to search for another question from the internet and this is a three-part question are there any big newspapers in Italy interested in Europe research results and all the Italians conscious of the surveillance and is there a public debate about it well of the defense the defense recognition system got some attention are 6 of his own money is running from 1 everybody I basically wrote some articles on that that's the media are not so intercom users on this kind of research yet I hope they would have they we'll quizzes and health for sure if anyone wants to dig deeper to find something else we we to design it's not the public available online so on the the poly getting the on privacy it's quite tough because we're is introduce and other potential which selects the the the time of retention up to 6 years which is and all and which doesn't make completely sense regarding to what are the principles and I and European level sold he then people are concerned about this but probably not enough do we have any more questions it does not look like it so the very warm and pleasant the what of and you need to put in a few say was to what is
that and this and this and that and that is the the if that cut back
Arithmetisches Mittel
Ortsoperator
Rechter Winkel
Güte der Anpassung
Mathematisierung
Projektive Ebene
Hauptplatine
Information
Gesetz <Physik>
Flächeninhalt
Projektive Ebene
Hacker
Varianz
Arithmetisches Mittel
Automatische Indexierung
Ablöseblase
Information
Information
Steuerwerk
Systemidentifikation
Resultante
Decodierung
Zahlenbereich
Elektronische Publikation
Dateiformat
Code
Office-Paket
Arithmetisches Mittel
SLAM-Verfahren
Tabellenkalkulation
Menge
Zahlenbereich
Statistische Analyse
Dateiformat
Information
Innerer Punkt
Systemidentifikation
Resultante
Telekommunikation
Web Site
Stoß
Gruppenkeim
Polarkoordinaten
Zahlenbereich
Computerunterstützte Übersetzung
Systemplattform
Code
Mailing-Liste
Internettelefonie
Gewicht <Mathematik>
Software
Code
Analysis
Eindringerkennung
Addition
Datennetz
Datenhaltung
Einfache Genauigkeit
Systemaufruf
Mailing-Liste
Physikalisches System
Biprodukt
Ultraviolett-Photoelektronenspektroskopie
Datenfluss
Quick-Sort
Minimalgrad
Rechter Winkel
SALEM <Programm>
Hypermedia
Hill-Differentialgleichung
Information
Brennen <Datenverarbeitung>
Tabelle <Informatik>
Telekommunikation
Große Vereinheitlichung
Dongle
Kartesische Koordinaten
Befehl <Informatik>
Gradient
Identitätsverwaltung
Extrempunkt
Dualität
TUNIS <Programm>
XML
Mobiles Internet
Gauss <Rechenmaschine>
Normalvektor
Inklusion <Mathematik>
Umwandlungsenthalpie
Autorisierung
Internetworking
Computersicherheit
Graphiktablett
Mailing-Liste
Nummerung
Physikalisches System
Elektronische Unterschrift
Objekt <Kategorie>
Gerade Zahl
Caching
Konditionszahl
Information
Bitrate
Zentraleinheit
Web Site
Bit
Quader
Kategorie <Mathematik>
Computersicherheit
Algebraisches Modell
Automatische Handlungsplanung
Biprodukt
Ereignishorizont
EINKAUF <Programm>
Internetworking
OISC
Strahlensätze
Einheit <Mathematik>
Projektive Ebene
Information
Softwareentwickler
Kartesische Koordinaten
Systemidentifikation
Facebook
Mathematische Logik
Gradient
Web-Seite
Code
Internetworking
Komponente <Software>
Hypermedia
Hardware-in-the-loop
Prognoseverfahren
Elektronischer Fingerabdruck
Broadcastingverfahren
System-on-Chip
Gerade
Leistung <Physik>
Autorisierung
Kategorie <Mathematik>
Profil <Strömung>
Physikalisches System
Elektronische Publikation
Office-Paket
Videokonferenz
Hypermedia
Elektronischer Fingerabdruck
Projektive Ebene
Hill-Differentialgleichung
Information
YouTube
Spider <Programm>
Softwaretest
Bit
Adressraum
Formale Sprache
Physikalismus
Physikalisches System
Tablet PC
Coprozessor
Arithmetisches Mittel
Open Source
Komponente <Software>
Analogieschluss
Dezimalsystem
Speicherabzug
System-on-Chip
Maschinelles Sehen
Gammafunktion
Architektur <Informatik>
Hausdorff-Dimension
Versionsverwaltung
Zahlenbereich
Mailing-Liste
Physikalisches System
Unternehmensarchitektur
Physikalisches System
Modallogik
Algorithmus
Echtzeitsystem
Rechter Winkel
Heegaard-Zerlegung
Server
Reelle Zahl
Computerarchitektur
Partikelsystem
Sigma-Algebra
Mustererkennung
Unternehmensarchitektur
Bildgebendes Verfahren
Standardabweichung
Drucksondierung
VIC 20
Kardinalzahl
Profil <Strömung>
Physikalisches System
Quick-Sort
Office-Paket
Arithmetisches Mittel
Unternehmensarchitektur
Physikalisches System
Flächeninhalt
Reelle Zahl
Information
Mustererkennung
Quader
Versionsverwaltung
Sprachsynthese
Intranet
Extrempunkt
TOE
Pi <Zahl>
Quellcode
Translation <Mathematik>
Speicher <Informatik>
Maschinelles Sehen
Expertensystem
Softwaretest
Expertensystem
Parametersystem
Freier Ladungsträger
Dichte <Stochastik>
Physikalisches System
Sichtenkonzept
Quick-Sort
Kombinatorische Gruppentheorie
Gesetz <Physik>
Strahlensätze
Suite <Programmpaket>
Einheit <Mathematik>
Konditionszahl
Projektive Ebene
Information
Versionsverwaltung
Programmierumgebung
Avatar <Informatik>
Benutzerführung
Datenmissbrauch
Sichtenkonzept
Dispersion <Welle>
Punkt
Hausdorff-Dimension
Physikalisches System
Ereignishorizont
Framework <Informatik>
Datenhaltung
Internetworking
Strahlensätze
Wärmeausdehnung
Framework <Informatik>
Forcing
Hypermedia
Kantenfärbung
Information
Autorisierung
Kraftfahrzeugmechatroniker
Nebenbedingung
Web Site
Inferenz <Künstliche Intelligenz>
Benutzerfreundlichkeit
Stochastische Abhängigkeit
Relativitätstheorie
Adressraum
Zahlenbereich
Mailing-Liste
Gesetz <Physik>
Systemplattform
Framework <Informatik>
Internetworking
Prognoseverfahren
Menge
Rechter Winkel
Projektive Ebene
Information
Softwareentwickler
Optimierung
Resultante
Punkt
Dienst <Informatik>
Gradient
Information
Polygon
Internetworking
Übergang
Hypermedia
Medianwert
Systemprogrammierung
Open Source
Dijkstra-Algorithmus
t-Test
Schnitt <Graphentheorie>
Gerade
Beobachtungsstudie
Datenmissbrauch
Datenhaltung
Trägheitsmoment
Physikalisches System
Mustererkennung
TLS
Arithmetisches Mittel
Rechter Winkel
Hypermedia
Leistung <Physik>
Ordnung <Mathematik>

Metadaten

Formale Metadaten

Titel Italy's surveillance toolbox
Untertitel Research on Monitoring Italian Government Surveillance Capabilities by means of Transparency tools
Serientitel 34th Chaos Communication Congress
Autor boter
Lizenz CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34790
Herausgeber Chaos Computer Club e.V.
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract This project aims to take advantage of the availability of public procurement data sets, required by anticorruption transparency laws, to discover government surveillance capabilities in Italy.
Schlagwörter Ethics, Society & Politics

Zugehöriges Material

Folgende Ressource ist Begleitmaterial zum Video
Video wird in der folgenden Ressource zitiert

Ähnliche Filme

Loading...
Feedback