This site collects anonymous statistical data on navigation through cookies installed by authorized third parties, respecting privacy of your personal data and in accordance with standards established by law. By continuing to browse this site, clicking on links in it or simply shaking the page down, you agree to the service and the same cookie.

A+ A A-
11-11-2013

WHO CONTROLS CONTROLLERS - DATAGATE DOCET

Rate this item
(33 votes)

At this time a news release is really important: (http://www.repubblica.it/politica/2013/11/11/news/privacy_pi_tutele_dal_governo_dopo_datagate-70761612/) "The Italian secret services, from now on, every time you have to deal with sensitive data of their citizens, must notify the all'Autority for privacy. It is the pivot around which the Memorandum of Understanding between the Guarantor and the Delegated Authority for the security of the Republic Dis signed today in Palazzo Chigi. "

In practice, it speaks of an already planned control of the Guarantor on "intelligence activities". As performing at Il Gattopardo Tancredi Falconeri "If we want things to stay as they are , things will change". According to the disclosed so far on the matter Datagate , it would seem that Italy would not be involved in a direct manner in any of the events listed ... or , perhaps worked better. Expectations and public perceptions are important elements to analyze a fact which in itself is clear , but in fact is very chameleon-like . How many of you who read these lines are working towards an anti-malware software (better known as antivirus) Free or Paid ? Have you ever wondered who is behind these big companies who offer to protect us and protect us from viruses? Still reading the news of these hours, on a particular article, shows the statements of the note Kaspersky ( http://punto-informatico.it/3928844/PI/News/datagate-spie-mascherate.aspx ) declares that " the be able to identify and remedy any malware attack, including those conducted by the NSA or other government agencies".

Have you ever wondered or worried about the permissions that attach to anti-virus software to protect our pc? What passes through the open doors and dialoguing with the network, used to perform automatic updates? Can we really trust of all the software that make us feel safe? What kind of information they know or may know the producers? Well maybe better to stop here the questions. As one of my teachers at the university, the computer safest in the world was produced for a long time: it is not connected to the network nor it is made with electronic components indeed! Recycled paperboard without the need of electrical current. How to use it? Well at the time as an ornament is fine, then you are free to experiment with other uses.

© All rights reserved.

Claudio Sciarma

Degree in Investigation and Security Sciences cum laude. He developed a thesis in collaboration with Ra.C.I.S. of Rome and the company Leica Geosystems on the reconstruction of the crime scene using the laser scanner. 

Master degree in Social Research for Internal and External Security developing a thesis called "investigate with search engine - Google as mean of business intelligence"

Postgraduate master degree in Security Languages.

Certificate of arab language and culture at the Foreign Languages School of the Italian Army.

Intelligence analyst.

Webmaster, webdesigner and expert SEO. Specialized in telecommunication fraud detection, he worked with the GAO of the Italian Finance Police. Expert in P.P.A. (advanced personal protection), terrorist attacks analysis, international security, transport security, events planning, personal protection devices analysis. Volunteer in the Italian Army (2010-2012), assigned to the Foreign Languages School of the Italian Army. 

Founding member of the Italian Association of Investigation and Security Sciences.

Codirector of the monthly magazine on line "ConVincere".

 

Website: claudio.sciarma.it

Geoeconomia

Eversione e Terrorismo

Geopolitica

Risorse Energetiche

Cyber Warfare

Copyright CEOS 2012 - 2015. All rights reserved.