Blog
The acquisition of BlackBerry “pin-to-pin” messages does not require international letters rogatory
- Friday 20 July 2018
- Cyber security, Digital Forensics
The 4th Chamber of the Italian Supreme Court (hereinafter: S.C.), recently returned, with its Judgment No. 46968, to the matter of pin-to-pin chat tapping between BlackBerry users, strengthening the already well-established legal principle according to which chat tapping does not require ...
Interception by means of an electronic sensor: the ups and downs of Legislative Decree n. 216/2017
- Friday 11 May 2018
- Cyber security, Digital Forensics, Diritto Penale
More than four months from the launch of the decree with which the Government disciplined the interceptions of communications between the present by inserting an electronic sensor on a portable electronic device, the failure to issue a timely enacting technical regulation, entrusted to - ex art. ...
The extraction of data stored in the computer does not constitute unrepeatable technical assessment
- Tuesday 03 April 2018
- Digital Forensics, Diritto Penale
- Italia
Considering the fragile nature of the computer evidence, subjected to easy modifications, alterations and damages, the Third Criminal Chamber of the Supreme Court, with ruling n. 9684 of February 28th 2017, addressed the problem, left unresolved by the Law n. 48 of March 18th 2008, of the secure ...
Whatsapp conversations: do not constitute proof without the material device
- Tuesday 27 February 2018
- Digital Forensics
This is the opinion of the 5th Criminal Chamber of the Italian Supreme Court in its decision n. 49016 of October 25th, 2017, where it analyze the issues relating to the role whatsapp conversation can play in trials. In the specific case, the defendant indicted for the crime of stalking &ndash...
The Legislative Decree n. 216/2017 on the interception through the use of the trojan software
- Friday 16 February 2018
- Cyber security, Digital Forensics, Novità legislative
Legislative Decree n. 216/2017 introduces the use of the trojan software during investigations. The new rules certainly allow to make use of it in respect to the criminal offenses of organized crime and terrorism. But doubts remain on the concrete possibility of making use of the newly introduced...