Page 142 - Rassegna 2025-1
P. 142
SCIENTIAE
Il buon esito dell’indagine forense sarà tuttavia imprescindibilmente subordinato alla
disponibilità e alla collaborazione della “catena di intermediari” coinvolti (gestori di connetti-
vità Internet, proprietari di piattaforme social, società di servizi VPN, ecc.), con necessarie dif-
3
ferenze di approccio tanto in campo informatico che giuridico a seconda delle contingenze .
Infine, sotto il profilo dell’attività giurisdizionale - del potere, cioè, di dare concreta
applicazione alle norme vigenti nell’ordinamento giuridico statuale - l’efficacia del contrasto
alle violazioni normative che coinvolgono l’ambito informatico è spesso ostacolata dalla
natura stessa dei reati, dalla loro transnazionalità e dalla conseguente necessità di una coope-
razione internazionale non sempre facile da ottenere.
The relationship between online anonymity and security, in whatever form, is a highly topi-
cal issue today. This relationship, which in our opinion may not yet be fully regulated, brings to the
fore various questions on which the discussion is still open. The values at stake are, moreover, of pri-
mary importance in a fully-fledged democratic system like ours. On one hand, the privacy of those
who use computer resources is always strongly at risk, and the use of anonymization techniques can
serve to protect personal data from undue external interference. However, the use of these increasin-
gly sophisticated elusive techniques ends up enormously complicating investigative activities when
those behaviors are aimed at committing criminal acts. In these cases, the effective safeguarding of
anonymity that prevents the certain attribution of the criminal action to a given subject ends up
reverberating its effects on the very right and duty of the State to combat all illicit conduct, perpe-
trated by any means. This is the crux of the dilemma: while the use of pseudonyms and anonymi-
zation technologies legitimately allows for the avoidance of undue forms of surveillance and exfil-
tration of sensitive personal data, it cannot fail to raise questions and perplexities and must be pur-
sued with determination when it is aimed at ‘covering up’ illegal conduct and criminally relevant
offenses. From a strictly technical point of view, Internet protocols were not designed with the pur-
pose of guaranteeing the anonymity of machines or individuals connected to the network. This con-
cept, although perhaps evident to most, is fundamental to understanding how, in the investigative
sphere, the reconstruction of the digital identity of a subject is - in theory - always possible. The suc-
cessful outcome of the forensic investigation will, however, be unavoidably subordinate to the avai-
lability and collaboration of the “chain of intermediaries” involved (Internet connectivity provi-
ders, social platform owners, VPN service companies, etc.), with necessary differences in approach
both in the IT and legal fields depending on the contingencies. Finally, from the perspective of juri-
sdictional activity - that is, the power to concretely apply the norms in force in the state legal system
- the effectiveness of countering violations involving the IT sphere is often hampered by the very
nature of the crimes, their transnationality, and the consequent need for international cooperation
that is not always easy to obtain.
3 Che si tratti di analisi relativa a servizi di messaggistica privata quali Whatsapp o Telegram, a pub-
blicazioni attraverso piattaforme social, a forum di discussione (quali ad esempio Reddit) o persino
a piattaforme di tipo imageboard (quali ad esempio 4chan e 8chan) che, soprattutto negli Stati
Uniti, sempre più costituiscono cassa di risonanza di movimenti estremisti e incitanti all’odio.
140