Page 142 - Rassegna 2025-1
P. 142

SCIENTIAE




                  Il buon esito dell’indagine forense sarà tuttavia imprescindibilmente subordinato alla
             disponibilità e alla collaborazione della “catena di intermediari” coinvolti (gestori di connetti-
             vità Internet, proprietari di piattaforme social, società di servizi VPN, ecc.), con necessarie dif-
                                                                                       3
             ferenze di approccio tanto in campo informatico che giuridico a seconda delle contingenze .
                  Infine, sotto il profilo dell’attività giurisdizionale - del potere, cioè, di dare concreta
             applicazione alle norme vigenti nell’ordinamento giuridico statuale - l’efficacia del contrasto
             alle violazioni normative che coinvolgono l’ambito informatico è spesso ostacolata dalla
             natura stessa dei reati, dalla loro transnazionalità e dalla conseguente necessità di una coope-
             razione internazionale non sempre facile da ottenere.

                  The relationship between online anonymity and security, in whatever form, is a highly topi-
             cal issue today. This relationship, which in our opinion may not yet be fully regulated, brings to the
             fore various questions on which the discussion is still open. The values at stake are, moreover, of pri-
             mary importance in a fully-fledged democratic system like ours. On one hand, the privacy of those
             who use computer resources is always strongly at risk, and the use of anonymization techniques can
             serve to protect personal data from undue external interference. However, the use of these increasin-
             gly sophisticated elusive techniques ends up enormously complicating investigative activities when
             those behaviors are aimed at committing criminal acts. In these cases, the effective safeguarding of
             anonymity that prevents the certain attribution of the criminal action to a given subject ends up
             reverberating its effects on the very right and duty of the State to combat all illicit conduct, perpe-
             trated by any means. This is the crux of the dilemma: while the use of pseudonyms and anonymi-
             zation technologies  legitimately allows for the avoidance of undue forms of surveillance and exfil-
             tration of sensitive personal data, it cannot fail to raise questions and perplexities and must be pur-
             sued with determination when it is aimed at ‘covering up’ illegal conduct and criminally relevant
             offenses. From a strictly technical point of view, Internet protocols were not designed with the pur-
             pose of guaranteeing the anonymity of machines or individuals connected to the network. This con-
             cept, although perhaps evident to most, is fundamental to understanding how, in the investigative
             sphere, the reconstruction of the digital identity of a subject is - in theory - always possible. The suc-
             cessful outcome of the forensic investigation will, however, be unavoidably subordinate to the avai-
             lability and collaboration of the “chain of intermediaries” involved (Internet connectivity provi-
             ders, social platform owners, VPN service companies, etc.), with necessary differences in approach
             both in the IT and legal fields depending on the contingencies. Finally, from the perspective of juri-
             sdictional activity - that is, the power to concretely apply the norms in force in the state legal system
             - the effectiveness of countering violations involving the IT sphere is often hampered by the very
             nature of the crimes, their transnationality, and the consequent need for international cooperation
             that is not always easy to obtain.
             3  Che si tratti di analisi relativa a servizi di messaggistica privata quali Whatsapp o Telegram, a pub-
               blicazioni attraverso piattaforme social, a forum di discussione (quali ad esempio Reddit) o persino
               a piattaforme di tipo imageboard (quali ad esempio 4chan e 8chan) che, soprattutto negli Stati
               Uniti, sempre più costituiscono cassa di risonanza di movimenti estremisti e incitanti all’odio.

             140
   137   138   139   140   141   142   143   144   145   146   147