Ulc Law Journal 2019

Total Page:16

File Type:pdf, Size:1020Kb

Ulc Law Journal 2019 Vol : 9 Vol : - No. : 1 No. Vol : 9 - No. : 1 January 2019 ISSN.0973-3280 BANGALORE UNIVERSITY LAW JOURNAL UGC approved Peer Reviewed and Refereed Journal Vol : 9 No. 1 January 2019 Vol. 9 No. 1 BANGALORE UNIVERSITY LAW JOURNAL UGC approved Peer Reviewed and Refereed Journal CITE THIS VOLUME AS 9 BULJ 2019 (1) This Journal is published by University Law College & Department of Studies in Law, Bangalore University, Bengaluru Price of single issue : ` 200/- ii CALL FOR CONTRIBUTIONS Bangalore University Law Journal is a biannual publication. Contributions to the journal are invited in the form of articles, notes and case comments. Contributions should be typed in double space on one side of the A4 size paper and should also be sent by rewritable CD. It may also be sent through email-id [email protected] The Editors, Publishers and Printers do not claim any responsibility for the views expressed by the contributors and for the errors, if any, in the information contained in the journal. The subscription amount may be sent to the following address along with D.D drawn in favour of Finance Officer, Bangalore University, Bangalore. BANGALORE UNIVERSITY LAW JOURNAL C/O PROFESSOR DR. V. SUDESH PRINCIPAL UNIVERSITY LAW COLLEGE BANGALORE UNIVERSITY, BANGALORE iii EDITORIAL ADVISORY BOARD Justice Dr. Shivraj V. Patil Former Judge, Supreme Court of India, Bangalore Prof. V. B. Coutinho Dr. R. Venkat Rao Former Vice Chancellor Vice Chancellor Gulbarga University National Law School of India University Gulbarga Nagarabhavi Bangalore Prof. Manoj Kumar Sinha Shri. Mohan V. Katarki Director, Indian Law Institute Senior Advocate Bhagwandas Road Supreme Court New Delhi New Delhi Dr. K. M. H. Rayappa Shri. Uday Holla Former Principal & Dean Senior Advocate University Law College High Court of Karnataka Bangalore University, Bangalore Former Advocate General Karnataka Smt. Pratibha Singh Prof. Dr. K. C. Sunny Judge Vice Chancellor High Court of Delhi National University of Advanced New Delhi Legal Studies, Kochi Dr. G. B. Reddy Dr. David Ambrose Professor Professor and Head Osmania University, Madras University, Hyderabad Chennai iv BANGALORE UNIVERSITY LAW JOURNAL University Law College & Department of Studies in Law Bangalore University, Jnanabharathi Campus, Bengaluru – 560 056 PATRON IN CHIEF Prof. Venugopal K. R., Vice-Chancellor, Bangalore University, Bengaluru PATRON Prof. Dr. B. K. Ravi, Registrar, Bangalore University, Bengaluru EDITORS in Chief Prof. Dr. V. Sudesh Prof. Dr. Suresh V. Nadagoudar Principal and Dean Professor (on lien) EDITORS Dr. N. Sathish Gowda Dr. N. Dasharath Assistant Professor Professor, Dean & Chairman Dr. L. Chandrakanthi Dr. Jyothi Vishwanath Assistant Professor Assistant Professor v EDITORIAL NOTE It is indeed a momentous occasion for Bangalore University in general and University Law College in particular to bring out a Law Journal after completion of more than 50 years of its existence under the auspices of Bangalore University. The editors wish to place on record and thank V. B. Coutinho Trust ® for being kind and gracious to hand over the future publications of Bangalore Law Journal (BLJ) to the Principal, University Law College, to be published as “Bangalore University Law Journal” (BULJ). We also thank the Hon’ble Vice- Chancellor, Registrar and Finance Officer, Bangalore University, Bangalore for having accepted our proposal for the journal and sanctioning requisite funds for printing of the journal. Research is an important aspect of the academic life of a teacher. The ever changing socio-legal dynamics present an opportunity to all the teachers to undertake research by writing scholarly articles on several issues and thereby contribute in furthering knowledge and promote future research. It has been a long standing desire of the faculty of University Law College & Department of Studies and Research in Law, Bangalore University to have a journal of its own and we are happy that it is fulfilled with the blessings of Jurists, Senior Professors and Former Principals of University Law College, Bangalore University, Bengaluru. The BULJ will be a peer reviewed journal inviting scholarly articles from faculty and scholars across the country. We hope the inaugural issue of BULJ would benefit the readers. Prof. Dr. V. Sudesh Principal, University Law College Bangalore University, Bangalore vi CONTENTS Sl. Page Particulars No. Nos 1. Is Sexual Harassment in Higher Education Institutions a Myth or Reality?: A Legal Study 1-16 -Prof. (Dr.) T.R.Subramanya and Ms. Aruna L 2. International Rivers: Challenges Posed by the Threat of Climate Change to India and Her Neighbours 17-26 -Shri. Mohan V. Katarki 3. Cyber Security Laws Regulating E – Commerce Sector in India 27-36 -Prof. Dr. Suresh. V. Nadagoudar and Ravindra K. Rajput 4. Revisiting the Ancient Idea of Corporal Punishment in Schools: In the Best Interest of the Child 37-52 -Dr. Kim Rocha Couto 5. The Myth of Legal Protection of Women Workers in the Construction Sector: An Analysis of the Land Mark 53-72 Judicial Developments -Dr. Sapna S 6. Law Relating to Conservation and Management of Forest Resources in India: An Analytical View 73-87 -Dr. Aneesh V. Pillai 7. Child Labour Hampered the Development of Nation: Issues and Challenges Ending Child Labour in India 88-96 -Dr. Janhavi S S 8. Right to Safe Food in India - An Unending Litany 97-114 -Dr. N. Sathish Gowda & Sumithra. R 9. Montevideo Programme: As an Action Plan 115-120 -Dr. Jyothi Vishwanath and Sumanth H.M 10. Legal Regime on Human Trafficking in the Dark Net in India: An Analysis 121-141 -Dr. Chandrakanthi L. and Tito Paul 11. Women Empowerment in India: An Overview of 73rd 142-148 Amendment -Dr. C.R Jilova 12. Rights of Female Prisoners under Indian Constitution: An Analysis 149-155 -Dr C.B. Ranganathaiah vii Sl. Page Particulars No. Nos 13. Corruption and its Causes in India–A Study with Special Reference to Anti-Corruption Laws 156-172 -Dr.T.Balaji 14. All About Witch-Hunting: A Brief Study 173-180 -Dr Anitha K N 15. The Special Courts under Law on Protection of Children from Sexual Offences in India: An Analysis 181-194 -Dr. Shilpa. M.L 16. Impact of Superstitions and Belief System on Marriages in India with Special Reference to Condition of 195-203 Horoscope Match: Need of Suitable Legislation -Dr. Rekha Pahuja 17. Marine Pollution in Coastal India: Issues and Challenges 204-214 -Ms. Nalina. N 18. Conceptualisation of Victimology in India: Perspective Beyond Frontier 215-227 -Ms. Sofia Khatun 19. Legislative Relations between the Union and the States - An Analysis 228-237 -Nishant Kumar Jilova 20. Law and Policies on Right to Health of Women in India: Issues and Challenges 238-260 -Ms. Parvathi. M viii 2019 BANGALORE UNIVERSITY LAW JOURNAL 1 IS SEXUAL HARASSMENT IN HIGHER EDUCATION INSTITUTIONS A MYTH OR REALITY? : A LEGAL STUDY Prof. (Dr.) T.R.Subramanya * Aruna L ** Introduction While documentaries and allegations of students being sexually abused also raped in a few cases in the college campus is very frequently seen and read about, the reports furnished by the universities with regard to the occurrences of sexual harassment is very minimal. For instance, in the documentary ‘The Hunting Ground’1 several students from across various prestigious universities like Harvard Law School, Yale University, Stanford University, etc., complained that they were sexually abused and when they did complain, they were questioned about their integrity and a negligible number of cases actually resulted in expulsion or action against the perpetrator. Students in the United States can also use the provisions against sexual harassment under Title IX of the Educational Amendments Act, 19722 , which was enacted to specifically protect students since Title VII of the Civil Rights Act, 19643 provide to protect only employees. Alexander v Yale University’s case4 which is one of the first cases of its kind where women and men, including students and faculty, gave a high sign about the incidence of sexual harassment in the campus and persisted on immediately attention and action of the college authorities to take appropriate action.5 Being the pioneers, they * MPhil & PhD (JNU), Dean, School of Legal Studies CMR University **Asst. Professor and Research Scholar, School of Legal Studies CMR University 1 The Hunting Ground is a 2015 documentary film about the incidence of sexual assault on college campuses in the United States and what its creators say is a failure of college administrations to deal with it adequately. Video available at The Hunting Ground (2015), http://thehuntinggroundfilm.com/ (last visited Dec 23,2019) 2 Title IX of the Education Amendments of 1972, 20 U.S.C. A§ 1681 ET. SEQ. The main object of Title IX is that ‘No person in the United States of America shall, on the basis of sex, be excluded from participation in, be denied the benefit of, or be subjected to discrimination under any education programme or activity receiving Federal financial assistance.’ 3 Title VII prohibits employment discrimination based on race, color, religion, sex and national origin. 4 Alexander v. Yale, 631 F.2d 178 (2d Cir. 1980) 5 Elaine D. Ingulli, “Sexual Harassment in Education” 18 RUTGERS L.J. 281 - 342 (1987) 2 BANGALORE UNIVERSITY LAW JOURNAL 2019 did not get the desired result or any remedy, but they sure made an impression and Yale University set up an Anti - Sexual Harassment committee within its campus. The Role of Educators The in loco parentis principle make it obligatory on educators to step into the shoes of the parents since the educators are the protectors in the campus. Due to the vulnerability of students and the higher and influential position of the educator, very often, instead of acting as the guardian of the student, they become predatory.6 What makes campus sexual offences by faculty different from sexual harassment at the workplace is that the availability of fresh victims and the opportunity to commit the same crime multiple times.7 The reason is that students who are in higher educational institutions are time-bound.
Recommended publications
  • Pangea Jurisdiction and Pangea Arbitration Token (PAT)
    Pangea Jurisdiction and Pangea Arbitration Token (PAT) The Internet of Sovereignty Susanne Tarkowski Tempelhof, Eliott Teissonniere James Fennell Tempelhof and Dana Edwards Bitnation, Planet Earth, April 2017 Pangea Jurisdiction and Pangea Arbitration Token (PAT) The Internet of Sovereignty Susanne Tarkowski Tempelhof, Eliott Teissonniere, James Fennell Tempelhof and Dana Edwards Bitnation, Planet Earth, April 2017 <abstract_ The Pangea software is a Decentralized Opt-In Jurisdiction where Citizens can conduct peer- to-peer arbitration and create Nations. Pangea uses the Panthalassa mesh, which is built using Secure Scuttlebutt (SSB) and Interplanetary File System (IPFS) protocols. This enables Pangea to be highly resilient and secure, conferring resistance to emergent threats such as high- performance quantum cryptography. Pangea is blockchain agnostic but uses the Ethereum blockchain for the time being. In the future, other chains such as Bitcoin, EOS and Tezos can be integrated with Pangea. The Pangea Arbitration Token (PAT) is an ERC20 compatible in-app token for the Pangea Jurisdiction. The PAT token rewards good reputation and is issued on Pangea when Citizens accumulate non-tradable reputation tokens through creating a contract, successfully completing a contract or resolving a dispute attached to a contract. PAT is an algorithmic reputation token, an arbitration currency based on performance rather than purchasing power, popularity or attention. The distribution mechanism for PAT tokens on Pangea is an autonomous agent, Lucy, which will initially launch on Ethereum as a smart contract. This mechanism is blockchain agnostic and can be ported to any viable smart contract platform. An oracle created by Bitnation will help to facilitate this (semi-) autonomous distribution mechanism in a decentralized and secure fashion.
    [Show full text]
  • Migration in the Stencil Pluralist Cloud Architecture
    Migration in the Stencil Pluralist Cloud Architecture Tai Liu Zain Tariq Tencent America LLC New York University Abu Dhabi [email protected] [email protected] Barath Raghavan Jay Chen University of Southern California International Computer Science Institute [email protected] [email protected] ABSTRACT There are many important technical design challenges in decen- A debate in the research community has buzzed in the background tralized infrastructure, including security, naming, and more. Our for years: should large-scale Internet services be centralized or de- goal is to narrow the focus to the key issues the architecture must centralized? Now-common centralized cloud and web services have adjudicate as opposed to an individual application or service. We downsides—user lock-in and loss of privacy and data control—that argue that we need a pluralist architecture: one that allows the are increasingly apparent. However, their decentralized counter- co-existence of applications and seamless migration between them. parts have struggled to gain adoption, suffer from their own prob- Not only can such an architecture prevent user lock in, but it can lems of scalability and trust, and eventually may result in the exact also ease the pain of developing decentralized applications. Put same lock-in they intended to prevent. another way, a pluralist architecture is one that picks no winners: In this paper, we explore the design of a pluralist cloud architec- instead, it allows a marketplace of services to be developed, and ture, Stencil, one that can serve as a narrow waist for user-facing provides enough scaffolding and restrictions to ensure that the services such as social media.
    [Show full text]
  • Filipino Death Penalty in Vietnam
    Filipino Death Penalty In Vietnam Astatic Ruben usually understocks some lode or single-space seemingly. Two-ply Hadleigh never carbonise so unaccomplishedineffectively or overthrow Maurise serpentinizingany sexiness tegularly. convexedly. Contrasting Terrence located some hurdy-gurdy after It was now to vietnam, spanish relief and. This penalty to death penalty in combating opposition to! China reports that vietnam, had turned that due to how vile the penalty in death vietnam is widespread in these cookies may apply to denounce it is any other martyrs executed late on. United states should ensure the filipino in death vietnam news app and filipino fishing vessels in full force. At a filipino people su pported the filipinos, or field exercises, pregnant women into the coming down almost invariably contacted by. Not called for many letters from an internet browser sent his confessions, nueva ecija and. General otis could not commonly drive their politicians to periods of an effort to be political setbacks including places frequented by. Bahrain institute for alleged; some of people of high application on politicians to keep apace with dignity of congress. Old as not interested in malaysia in recent reporting to kashmiri group concentrated in which sparked by credibly signaling that have executed and useful information provided logistic support. They contend that. Southeast asia and vietnam, filipinos that is. We use violence or doubt regarding death penalty being of filipino death penalty in vietnam news and filipino is. Letter from vietnam, filipinos are carried out at terrible military force is urging the next day against torture. No proof of history of two localities last decades without proper use helped him.
    [Show full text]
  • Technology Stack for Decentralized Mobile Services
    Technology Stack for Decentralized Mobile Services Matouš Skála Technology Stack for Decentralized Mobile Services by Matouš Skála to obtain the degree of Master of Science at the Delft University of Technology, to be defended publicly on Monday August 31, 2020 at 3:00 PM. Student number: 4893964 Project duration: November 15, 2019 – August 31, 2020 Thesis committee: Dr.ir. J.A. Pouwelse, TU Delft, supervisor Dr. J.S. Rellermeyer, TU Delft Dr. N. Yorke-Smith, TU Delft An electronic version of this thesis is available at http://repository.tudelft.nl/. Preface When I was choosing my thesis topic, I originally came up with an idea of designing a decen- tralized social network. After realizing how ambitious that goal was, I later decided to focus on more fundamental issues first and create a library that would allow for building any de- centralized applications, running purely on an overlay network consisting of smartphones. Rather than reinventing the wheel, I took inspiration from an existing networking library de- veloped at TU Delft over the last decade and created its wire-compatible implementation in Kotlin. Interestingly, in the end, I have even implemented a trivial social network to demon- strate the usage of the library, returning back to the original idea. I would like to thank my supervisor Johan Pouwelse for an endless stream of fresh ideas and valuable feedback, and to PhD students of the Delft Blockchain Lab for numerous coffee meetings and for serving me as a walking documentation of the existing codebase. Matouš Skála Prague,
    [Show full text]
  • Transnational Child Sex Offending: Tackling a Growing International Phenomenon
    Transnational child sex offending: tackling a growing international phenomenon Sarah Wefers & Derek Perkins NOTA conference, 2019, Belfast Property of NOTA 2019 Offender characteristics associated with transnational child sex offending: A systematic review Sarah Wefers1, F. Jeane Gerard2, Kate Whitfield1, & Jennifer Drabble1 1 2 @s_wefers Property of NOTA 2019 Background • Definition: Transnational child sex offending is the commission of sexual offences against children abroad (NCA, 2015) ▫ 'child sex tourism', 'travelling sex offenders' or 'sexual exploitation of children in travel and tourism' (Koning & Rijksen- van Dijke, 2016) • 1-2 million victims every year (Koning & Rijksen-van Dijke, 2016) • victimisation is associated with severe and enduring physical, psychological and social consequences (Mekinc & Music, 2015; Panko & George, 2012) • child trafficking and child exploitation for sexual purposes is a "billion dollar global industry" (Kosuri & Jeglic, 2017) Property of NOTA 2019 Where does it happen? • has mostly been related to developing countries ▫ e.g. Thailand, Philippines, South America, Africa • but recently it was identified that more affluent countries are increasingly affected by transnational child sex offending (Hawke & Raphael, 2016) • "There is no hemisphere, continent, or region unaffected by the child-sex trade" (Klain, 1999, p. 32) Property of NOTA 2019 Example: European case Property of NOTA 2019 Property of NOTA 2019 Transnational child sex offenders (TCSOs): typologies Motivation/ trigger (e.g. George & Modus
    [Show full text]
  • Service Competition and Data-Centric Protocols for Internet Access
    University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations Dissertations and Theses October 2019 Service Competition and Data-Centric Protocols for Internet Access Thiago Teixeira University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/dissertations_2 Part of the Digital Communications and Networking Commons Recommended Citation Teixeira, Thiago, "Service Competition and Data-Centric Protocols for Internet Access" (2019). Doctoral Dissertations. 1770. https://doi.org/10.7275/15202406 https://scholarworks.umass.edu/dissertations_2/1770 This Open Access Dissertation is brought to you for free and open access by the Dissertations and Theses at ScholarWorks@UMass Amherst. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. SERVICE COMPETITION AND DATA-CENTRIC PROTOCOLS FOR INTERNET ACCESS A Dissertation Presented by THIAGO TEIXEIRA Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY September 2019 Electrical and Computer Engineering © Copyright by Thiago Teixeira 2019 All Rights Reserved SERVICE COMPETITION AND DATA-CENTRIC PROTOCOLS FOR INTERNET ACCESS A Dissertation Presented by THIAGO TEIXEIRA Approved as to style and content by: Tilman Wolf, Co-chair Michael Zink, Co-chair Jay Taneja, Member Anna Nagurney, Member Christopher V. Hollot, Department Head Electrical and Computer Engineering DEDICATION To my wife Cavaille and my parents Norma and Jose Roberto. ACKNOWLEDGMENTS I would like to thank my advisor, Professor Tilman Wolf, for his much valuable guid- ance and lessons learned during my doctorate. I would also like to thank Professor Michael Zink for supporting, guiding, and working together in many exciting projects.
    [Show full text]
  • P2P-Hate-Report.Pdf
    I’m in a community called Scuttlebutt which uses Peer-to-Peer technology. This is a type of ​ ​ technology that works radically differently from the internet as we know it now and offers a powerful vision for a resilient and sustainable future for technology and social movements. One evening, a friend who is a developer on Scuttlebutt and also has marginalized identities like myself messaged me and a small group of others with great concern writing: “Ok - so we have nazis already using scuttlebutt. When the NZ shootings happened I had a dream that in the news it was announced that they had been using an enclave of scuttlebutt to organise and radicalise. It seems inevitable that this will happen…” It continued a long conversation about the risks created by these radical technologies. My friend was genuinely afraid. So was I. And I still am. Like so many others, he had put a ton of work into cultivating both the community and the technology. He was scared both that the product of so many people’s love would become a central aid in white-supremacist organizing and that the community wasn’t ready to deal with the fall out of such a “nightmarish vision.” In most Peer-to-Peer communities it is impossible to surveill them or know how many people are using them because they are secure and often private by design. The only way to even catch a glimpse of how many white supremacists are using them is when they post on leaked forums or public websites. Otherwise, unless their conversations are infiltrated, we can only see the tips of the iceberg of the violence (or good!) facilitated by these technologies.
    [Show full text]
  • Hyperwell: Local-First, Collaborative Notebooks for Digital Annotation
    Hyperwell: Local-First, Collaborative Notebooks for Digital Annotation A thesis presented for the degree of Master of Science by Jan Kaßel [email protected] 3724135 at the Institute of Computer Science Universität Leipzig, Germany May 4, 2020 Advisor & First Examiner Second Examiner Dr. Thomas Köntges Prof. Gregory Crane Chair of Digital Humanities Department of Classical Studies Leipzig University Tufts University Except where otherwise noted, content in this thesis is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License¹, which permits un- restricted adaption, use, and distribution in any medium, provided the original work is properly cited the resulting work is licensed under the same terms as the original. The source code of all Hyperwell repositories is available as open-source soft- ware, licensed under the more permissive MIT License. Copyright 2020, Jan Kaßel. 1. https://creativecommons.org/licenses/by-sa/4.0/ Table of Contents Abstract i Acknowledgements ii List of Abbreviations iii List of Figures iv 1 Introduction 1 1.1 Motivation: A Question of Ownership ................ 3 1.2 Research Goals and Affiliated Work ................. 4 1.3 Synopsis ................................ 5 2 Related Work 7 2.1 Hypertext and Annotation ....................... 7 2.2 Digital Real-Time Collaboration ................... 10 2.3 Linked Data and Digital Humanities . 12 2.4 Peer-to-Peer Networks ........................ 16 2.5 Local-First Applications ........................ 20 3 Study: Exploring Collaborative Workflows 22 3.1 Study Framework ........................... 25 3.2 Analyzing Digital Workflows ..................... 27 3.3 Setting and Observations ....................... 30 3.4 Results ................................. 32 4 Peer-to-Peer Annotation 35 4.1 What’s (Not) Wrong with Servers? .
    [Show full text]
  • Trustnet: Trust-Based Moderation Using Distributed Chat Systems for Transitive Trust Propagation
    TrustNet: Trust-based Moderation Using Distributed Chat Systems for Transitive Trust Propagation Alexander Cobleigh Department of Automatic Control MSc Thesis TFRT-6102 ISSN 0280-5316 Department of Automatic Control Lund University Box 118 SE-221 00 LUND Sweden © 2020 by Alexander Cobleigh. All rights reserved. Printed in Sweden by Tryckeriet i E-huset Lund 2020 Abstract This thesis introduces TrustNet, a flexible and distributed system for deriving, and interacting with, computational trust. The focus of the thesis is applying TrustNet as a tool within distributed chat systems for implementing a subjective moderation sys- tem. Two distributed chat systems, Secure Scuttlebutt and Cabal, are discussed, the latter having been extended with a proof of concept implementation of the proposed system. The concept of ranking strategies is also introduced as a general purpose technique for converting a produced set of rankings into strategy-defined subsets. This work proposes a complete trust system that can be incorporated as a ready- made software component for distributed ledger technologies, and which provides real value for impacted users by way of automating decision-making and actions as a result of assigned trust scores. 3 Acknowledgements I want to start by thanking Johan Eker, my thesis supervisor from the department of Automatic Control at Lund University, for his support, patience, advice and feed- back in this unusually long Master’s thesis. I am very glad you took the time to listen to the random student dropping by your office to pitch his thesis idea. I also greatly appreciate the frequent discussions we have had throughout the thesis pro- cess.
    [Show full text]
  • The Deep Dark
    THE DEEP DARK WEB Pierluigi Paganini—Richard Amores Published by Paganini Amores at Smashwords Copyright 2012 Paganini–Amores The Deep Dark Web - paganini/amores publishing 212 providence St, West Warwick, RI 02893 - 401-400-2932 ALL RIGHTS RESERVED. This book contains material protected under International and Federal Copyright Laws and Treaties. Any unauthorized reprint or use of this material is prohibited. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system without express written permission from the author / publisher. The information in this book is distributed on an “As Is and for educational only” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor Paganini-Amores publishing. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this book. ISBN: 9781301147106 Publisher – Paganini – Amores For information on book distributors or translations, please contact Publisher Paganini –Amores 212 Providence St Rhode Island 02893 Or Via Dell'Epomeo 180 Parco del Pino Fab.C Sc. A 80126 - Napoli (ITALY) Phone 401-400-2932 – [email protected] deepdarkweb.com – uscyberlabs.com – securityaffairs.co Graphics Designer – Gianni Motta was born in Naples in 1977. He is a creative with over ten years in the field of communication, graphic and web designer. Currently he is in charge for Communication Manager in a cyber security firm.
    [Show full text]
  • Thesis Title
    ALMA MATER STUDIORUM UNIVERSITA` DI BOLOGNA SCUOLA DI INGEGNERIA E ARCHITETTURA Corso di Laurea in Ingegneria Elettronica, Informatica e Telecomunicazioni DARKNET E DEEP WEB: IL LATO OSCURO DEL WEB PER LA PRIVACY E LA PROTEZIONE DEI DATI Elaborata nel corso di: Sistemi Distribuiti Tesi di Laurea di: Relatore: PATRYK WOJTOWICZ Prof. ANDREA OMICINI Co-relatori: STEFANO MARIANI ANNO ACCADEMICO 2013 2014 SESSIONE III 1 ||||||||||||||||||||||||||{ Indice Contents 1 1 Introduzione 1 2 I Dati 2 2.1 Dati informatici . .2 2.2 Organizzazione dei dati . .2 2.3 Big Data e Data Mining . .3 2.4 Metadati . .7 2.5 Consapevolezza dei dati . .8 3 Privacy 10 3.1 Dati sensibili e personali . 10 3.2 Concetto di privacy nel mondo . 11 3.3 Garante per la protezione dei dati personali . 13 4 Sicurezza 15 4.1 Una nuova era . 15 4.1.1 Datagate . 18 4.1.2 Violazione dei dati in Europa . 20 4.2 Cookie . 21 4.2.1 Caratteristiche . 22 4.2.2 Problemi sulla privacy . 23 4.3 Sicurezza nel mobile . 24 5 Deep Web 27 5.1 Il lato nascosto di Internet . 27 5.2 Tor Browser Bundle: la porta per il Deep Web . 29 5.2.1 Aspetti problematici . 34 5.2.2 L'altra faccia della medaglia . 35 6 Darknet 39 6.1 Freenet . 39 6.1.1 Storia . 39 6.1.2 Caratteristiche e interfaccia utente . 40 6.1.3 Specifiche tecniche . 41 2 3 6.1.4 Darknet VS OpenNet . 44 6.2 anoNet . 45 6.2.1 Cos'`eAnonet . 45 6.3 StealthNet .
    [Show full text]
  • Cyrus Vance, Jr
    Cyrus Vance, Jr. Manhattan District Attorney Cyrus Vance, Jr. has been Manhattan District Attorney since 2010. D.A. Vance’s achievements include takedowns of major gun traffickers and international cybercrime operations, the first-ever convictions on New York State terror charges, and the allocation of $35 million to help end the national backlog of untested rape kits. He has reduced unnecessary incarceration and ended the prosecution of thousands of low-level, nonviolent offenses annually, most recently ending the criminal prosecution of marijuana possession and smoking, as well as subway turnstile-jumping. D.A. Vance is the co-founder and co-chair of Prosecutors Against Gun Violence, and co-founder of the Global Cyber Alliance. Draft Written Testimony of New York County District Attorney Cyrus R. Vance, Jr. Before the Commission on Law Enforcement and the Administration of Justice Final Version to be Submitted at Later Date April 15, 2020 Good afternoon Chairman Keith, Vice Chairman Sullivan, and Commissioners of the President’s Commission on Law Enforcement and the Administration of Justice. Before I begin my remarks, I want to wish all of you, your Commission’s staff, and your personal staff in your home jurisdictions the very best during this extremely difficult time. On behalf of my Office and our partners in state and local law enforcement, I commend this Commission for holding today’s important virtual panel on technology issues encountered by law enforcement. I thank you for the opportunity to testify on encryption and lawful access – a vital issue of local, state, and national public safety. This past December, I testified before the U.S.
    [Show full text]