{"guid":"236e5191-40f6-4c07-820e-2c5796bcdd20","title":"Regulating Law Enforcement use of Trojans","subtitle":"Implementing a Law to juridically, operationally and technically regulate the uses of Trojan in Italy","slug":"SHA2017-68-regulating_law_enforcement_use_of_trojans","link":"https://c3voc.de","description":"The complexity of implementing a policy (law) and related operational and technical procedures to regulate the uses of Trojan by Law Enforcement in a way that protect civil rights while not preventing investigations from going on with the right balance of juridical/technical implementation. \n\n#Legal #Politics #Society","original_language":"eng","persons":["Fabio Pietrosanti (naif)"],"tags":["SHA2017","68"],"view_count":92,"promoted":false,"date":"2017-08-07T00:00:00.000+02:00","release_date":"2017-08-07T02:00:00.000+02:00","updated_at":"2025-01-20T04:30:03.445+01:00","length":2954,"duration":2954,"thumb_url":"https://static.media.ccc.de/media/events/SHA2017/68-hd.jpg","poster_url":"https://static.media.ccc.de/media/events/SHA2017/68-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/SHA2017/236e5191-40f6-4c07-820e-2c5796bcdd20-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/SHA2017/236e5191-40f6-4c07-820e-2c5796bcdd20-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/SHA2017-68-regulating_law_enforcement_use_of_trojans","url":"https://api.media.ccc.de/public/events/236e5191-40f6-4c07-820e-2c5796bcdd20","conference_title":"SHA2017: Still Hacking Anyway","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017","related":[{"event_id":4240,"event_guid":"dec63dd2-d66b-419d-863d-c20fd5ce91dd","weight":5},{"event_id":4247,"event_guid":"2dd16bb3-657b-41b6-bdec-987ada3f285c","weight":4},{"event_id":4249,"event_guid":"98f8267c-cad1-4d04-8a52-f7e979e68c00","weight":4},{"event_id":4258,"event_guid":"ce7ba341-f44e-4f82-9f67-45e2df6b9c67","weight":4},{"event_id":4261,"event_guid":"3852e448-f6cf-4bfe-8b14-12d590075bd6","weight":4},{"event_id":4273,"event_guid":"abd8b143-a3d8-4655-bd1c-a355a0bd5d8d","weight":3},{"event_id":4299,"event_guid":"63b79857-ca2c-4fb4-b56c-b7807f947c01","weight":8},{"event_id":4300,"event_guid":"d48d1713-333b-4515-b56d-bc12fa2d3c44","weight":5},{"event_id":4310,"event_guid":"98a24995-17aa-415a-9cf5-906faa0d1475","weight":3},{"event_id":4311,"event_guid":"1159379e-b387-4660-a160-d996c7383c5a","weight":3},{"event_id":4322,"event_guid":"e41aee32-a8c0-4dce-b55a-a13aac7b5cad","weight":6},{"event_id":4323,"event_guid":"df804417-58b7-42fa-a626-83ed1663677f","weight":3},{"event_id":4336,"event_guid":"962f467f-8c6b-44cc-98cd-673128a9aef5","weight":4},{"event_id":4338,"event_guid":"62a4c312-72d1-42da-a84e-99f97b52d0f6","weight":3},{"event_id":4371,"event_guid":"509a87d3-75dd-4ea1-b2ca-79b03ff90749","weight":4},{"event_id":4374,"event_guid":"22c3d7ca-e490-40d1-b0e4-d321392d53ad","weight":3}],"recordings":[{"size":269,"length":2954,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-07T17:42:38.329+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-hd/SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_hd.mp4","url":"https://api.media.ccc.de/public/recordings/18034","event_url":"https://api.media.ccc.de/public/events/236e5191-40f6-4c07-820e-2c5796bcdd20","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":92,"length":2954,"mime_type":"video/mp4","language":"eng","filename":"SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-07T17:53:00.587+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/h264-sd/SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_sd.mp4","url":"https://api.media.ccc.de/public/recordings/18042","event_url":"https://api.media.ccc.de/public/events/236e5191-40f6-4c07-820e-2c5796bcdd20","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":44,"length":2939,"mime_type":"audio/mpeg","language":"eng","filename":"SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-07T18:10:16.899+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/mp3/SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans.mp3","url":"https://api.media.ccc.de/public/recordings/18064","event_url":"https://api.media.ccc.de/public/events/236e5191-40f6-4c07-820e-2c5796bcdd20","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":34,"length":2939,"mime_type":"audio/opus","language":"eng","filename":"SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-08-07T18:10:32.100+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/opus/SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans.opus","url":"https://api.media.ccc.de/public/recordings/18065","event_url":"https://api.media.ccc.de/public/events/236e5191-40f6-4c07-820e-2c5796bcdd20","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":123,"length":2954,"mime_type":"video/webm","language":"eng","filename":"SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-08-07T18:28:37.770+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-sd/SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/18070","event_url":"https://api.media.ccc.de/public/events/236e5191-40f6-4c07-820e-2c5796bcdd20","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"},{"size":347,"length":2954,"mime_type":"video/webm","language":"eng","filename":"SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-08-07T20:36:19.461+02:00","recording_url":"https://cdn.media.ccc.de/events/SHA2017/webm-hd/SHA2017-68-eng-Regulating_Law_Enforcement_use_of_Trojans_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/18109","event_url":"https://api.media.ccc.de/public/events/236e5191-40f6-4c07-820e-2c5796bcdd20","conference_url":"https://api.media.ccc.de/public/conferences/SHA2017"}]}