This site collects anonymous statistical data on navigation through cookies installed by authorized third parties, respecting privacy of your personal data and in accordance with standards established by law. By continuing to browse this site, clicking on links in it or simply shaking the page down, you agree to the service and the same cookie.

A+ A A-
Claudio Sciarma

Claudio Sciarma

Degree in Investigation and Security Sciences cum laude. He developed a thesis in collaboration with Ra.C.I.S. of Rome and the company Leica Geosystems on the reconstruction of the crime scene using the laser scanner. 

Master degree in Social Research for Internal and External Security developing a thesis called "investigate with search engine - Google as mean of business intelligence"

Postgraduate master degree in Security Languages.

Certificate of arab language and culture at the Foreign Languages School of the Italian Army.

Intelligence analyst.

Webmaster, webdesigner and expert SEO. Specialized in telecommunication fraud detection, he worked with the GAO of the Italian Finance Police. Expert in P.P.A. (advanced personal protection), terrorist attacks analysis, international security, transport security, events planning, personal protection devices analysis. Volunteer in the Italian Army (2010-2012), assigned to the Foreign Languages School of the Italian Army. 

Founding member of the Italian Association of Investigation and Security Sciences.

Codirector of the monthly magazine on line "ConVincere".

 

Website URL: http://claudio.sciarma.it

Hacking Team and collateral damage

Sunday, 02 August 2015 23:54 Published in Italy

In Italy, the citizens, have no real perception of what happened with the violation of the computer systems of a private company that provides "services" in many countries. If he had spoken for example, a company that dealt with unwinding of data from cameras, on behalf of a municipal police, maybe it would be all hell broke loose, "there is a penalty for data processed by persons who have not the qualification of PG ", etc.

This is about (according to what we can read on-line) control devices that are not only computers but also smartphone or tablet. Check is not just observe or acquire it also means blocking, use, write, erase and then act on behalf of the user! Imagine if someone could deposit files whose detention is prohibited and prosecuted by law such as child abuse images ... or if you think the device of the subject X involved in proceedings, infected with this malware until a month ago to the unknown Most software, was polluted with material overwhelming.

Turkey attacks the Isis on Syrian border

Saturday, 25 July 2015 18:34 Published in Middle East

With improper delay the turkish government decides to get serious in contrast to the militias Isis heavily bombarding a column of terrorists on the border turkish Syrian. So far so explicit action never happened; We are therefore faced with a watershed political: today Turkey has a more ambiguous position of opposition Daesh.

Sono passate molte ore dalla notizia del rapimento dei 4 dipendenti italiani in Libia e le informazioni continuano ad essere confuse oltre che contaminate da personali punti di vista e riflessioni di vari esponenti. Quattro soggetti che senza scorta si muovono tranquillamente in un determinato teatro come quello libico devono obbligatoriamente avere una preparazione o un addestramento che gli consenta quella libertà. Chi di voi andrebbe ad operare in un ambiente ostile senza avere un briciolo di tutela personale?

Mosques closed in Tunis

Monday, 06 July 2015 01:39 Published in Africa

The Tunisian government closed 80 mosques hoping this is the more effective response to the terrorist attack of Sousse. The measure actually looks superficial and of little use to contrast ISIS right now. Mosques should instead remain open and be monitored absolutely right to rebuild the network of potential affiliates and supporters of Daesh.

Tunisia is totally lacking an intelligence apparatus that can prevent isolated actions and group of terrorists, information is lacking direct and precise, lack undercover agents even in the sidelines of the dangers subversive.

Geoeconomia

Eversione e Terrorismo

Geopolitica

Risorse Energetiche

Cyber Warfare

Copyright CEOS 2012 - 2015. All rights reserved.