Tracing Meaning Through
Evidence and Code(s)

From peer-reviewed research to forensic fieldwork, my publications examine how artificial intelligence, digital systems, and power structures reshape law, governance, and risk in the digital age.

Over the past two decades, my written work has focused on the evolving intersections between technology, law, intelligence, and democratic governance. Through academic research, applied guides, editorial analysis, and forensic contributions, I have examined how digital systems generate not only technical vulnerabilities, but also normative, geopolitical, and cognitive asymmetries.

My publications span peer-reviewed journal articles, institutional volumes, legal-technical dictionaries, strategic essays, and field-specific manuals. Together, they reflect a hybrid approach rooted in digital forensics, AI law, cybersecurity, and governance-oriented risk analysis, where evidence is treated as a foundation for accountability and decision legitimacy.


This collection brings together foundational and recent contributions, including high-impact monographs, civic-oriented vademecums, and strategic analyses published by academic presses and national think tanks. Each work represents a step in a broader effort to translate technical complexity into governable knowledge, and intelligence into public and institutional value.

Across different formats and audiences, my publications aim to support informed decision-making under uncertainty, bridging operational evidence with legal reasoning, policy frameworks, and ethical responsibility in AI-amplified risk environments.

This section gathers a curated selection of my works across over two decades of engagement with cybersecurity, digital forensics, AI law, and cyber geopolitical analysis. across over two decades of engagement with cybersecurity, digital forensics, AI law, and cyber geopolitical analysis. It includes peer-reviewed publications, technical and investigative guides, contributions to collective volumes, and articles for both institutional and strategic audiences.

Articolo scientifico peer-reviewed in corso di pubblicazione:

Intelligenza artificiale e sovranità digitale: linee per una dottrina giuridica delle operazioni offensive automatizzate nel dominio cibernetico,
Ciberspazio e Diritto, STEM Mucchi Editore, fasc. 3/2025. (Aggiornamento di stato: 15 dicembre 2025.)

Forthcoming peer-reviewed article:

Artificial intelligence and digital sovereignty: guidelines for a legal doctrine on automated offensive operations in the cyber domain,
Ciberspazio e Diritto , STEM Mucchi Editore, Issue 3/2025 (forthcoming). (Status update: 15 December 2025).


Monografie e pubblicazioni scientifiche

Monographs and Scientific Publications

IT: 

L’impatto dell’intelligenza artificiale sui sistemi di voto elettronico e online nell’epoca delle crisi globali
Monografia scientifica consegnata il 13 luglio 2025. L’opera ha superato un processo di triple-blind peer review accademica con tre referee indipendenti ed è attualmente in fase di revisione editoriale finale con l’editore. (Aggiornamento di stato: 23 dicembre 2025.)
Pubblicazione prevista in open access, con versione cartacea on demand, per Milano University Press, a cura dei Professori Giovanni Ziccardi e Pierluigi Perri (Cattedra di Informatica Giuridica, Università degli Studi di Milano).

EN: 

The Impact of Artificial Intelligence on Electronic and Online Voting Systems in the Age of Global Crises
The Impact of Artificial Intelligence on Electronic and Online Voting Systems in the Age of Global Crises
Scientific monograph submitted on 13 July 2025. The work has successfully passed a triple-blind academic peer review process involving three independent reviewers and is currently undergoing final editorial revisions with the publisher. (Status update: 23 December 2025).

Forthcoming in open access, with a print-on-demand edition, by Milano University Press, edited by Professors Giovanni Ziccardi and Pierluigi Perri (Chair of Legal Informatics, University of Milan).

IT:

Deepfake, ovvero Manipola et impera. Un’analisi sulle cause, gli effetti e gli strumenti per la sicurezza nazionale, nell’ambito dell’utilizzo malevolo dell’intelligenza artificiale ai fini di disinformazione e propaganda, in Ciberspazio e Diritto, STEM Mucchi Editore, vol. 20, n. 62, 2019, pp. 12–28.

EN:

Deepfake: Manipulate and Rule. An Analysis of the Causes, Effects and Countermeasures for National Security in the Context of Malicious AI Use for Disinformation and Propaganda, in Ciberspazio e Diritto, STEM Mucchi Editore, Vol. 20, No. 62, 2019, pp. 12–28.


Guide operative e manuali applicati

Operational Guides & Applied Manuals

  • IT: Cosa fare in caso di ATTACCO RANSOMWARE – Settore sanitario
    EN: What to Do in Case of a RANSOMWARE ATTACK – Healthcare Sector
  • IT: Cosa fare in caso di ATTACCO RANSOMWARE: Vademecum sintetico e operativo per le PMI
    EN: RANSOMWARE Emergency Guide: A Practical Vademecum for SMEs
  • IT: Snapchat Forensics: il caso
    EN: Snapchat Forensics: The Case
  • IT: Il mercato cinese e la Mobile Forensics
    EN: The Chinese Market and Mobile Forensics


Informatica Giuridica e Digital Forensics

Legal Tech & Forensics – Academic Contributions

  • IT: Acquisizione forense, Acquisizione logica, Gabbia di Faraday, Infodemia, Jammer, Physical Dump, Ransomfake
    EN: Forensic Acquisition, Logical Acquisition, Faraday Cage, Infodemic, Jammer, Physical Dump, Ransomfake
  • IT: Deepfake, ovvero Manipola et impera
    EN: Deepfake: Manipulate and Rule
  • IT: Il voto elettronico
    EN: Electronic Voting
  • IT: Il voto elettronico: potenzialità e rischi lungo la strada della democrazia elettronica
    EN: Electronic Voting: Opportunities and Risks on the Path to Digital Democracy
  • IT: Elezioni USA e… getta: quando l’hacking delle macchine vìola la sicurezza delle coscienze
    EN: Disposable Democracy: When Machine Hacking Undermines Electoral Integrity
  • IT: Se la mela si baca… Atto I e II
    EN: If the Apple Is Rotten… Parts I & II
  • IT: E-justice: rotta verso l’online dispute resolution
    EN: E-justice: Heading Towards Online Dispute Resolution


Cyber Policy, Sorveglienza ed Etica – Articoli Editoriali

Cyber Policy, Surveillance & Ethics – Editorial Essays

  • IT: Zero-day: sempre più urgente un codice di condotta per il mercato grigio
    EN: Zero-day: The Urgent Need for a Code of Conduct on the Grey Market
  • IT: L’algoritmo buono contro l’odio online
    EN: The Good Algorithm Against Online Hate
  • IT: Pyongyang fra cyberspionaggio e furti informatici
    EN: Pyongyang Between Cyber Espionage and Digital Theft


Pubblicazioni giuridiche fondative

Foundational Legal Publications

(Titoli parzialmente abbreviati per chiarezza – Titles partially abbreviated for clarity)

  • IT: Il negozio telematico. I profili giuridici di un e-shop
    EN: The E-Shop Contract: Legal Frameworks of Electronic Commerce
  • IT: Sistemi alternativi di risoluzione delle controversie
    EN: Alternative Dispute Resolution Systems in the Information Society
  • IT: Guida al Codice della Pubblica Amministrazione Digitale
    EN: Guide to the Italian Code of Digital Public Administration
  • IT: Privacy e diritto d’accesso nella Pubblica Amministrazione
    EN: Privacy and Access Rights in the Public Sector
  • IT: Pubblica Amministrazione e privacy: istruzioni per l’uso
    EN: Privacy in Public Administration: A Practical Guide


Saggi pioneristici in materia di Cybersecurity- Serie RDEGNT

Early Cybersecurity Essays – RDEGNT Series

  • IT: Let us protect the neutrality of the Net
  • IT: Diritto al rovescio nel recepimento italiano della Direttiva 2004/48/CE
  • IT: Rootkit e la minaccia del software fantasma
  • IT: Voip me soon!
  • IT: Se il futuro della sicurezza si potesse davvero leggere nella mano
  • IT: Digital Master&Commander – Sfida ai confini del Web
  • IT: The phishing job
  • IT: Trojan Horse: a caval donato non si guarda in bocca?!


Commenti strategici – Centro Studi Politici e Stretegici Machiavelli

Strategic Commentary – Centro Studi Politici e Stretegici Machiavelli

  • IT: Il codice rubato: cosa ci insegna il breach F5 sulla sovranità cibernetica e il rischio cinese.
    EN: The stolen code: what the F5 breach teaches us about cyber sovereignty and the China risk
  • IT: Strategia cibernetica iraniana: tra guerra ibrida, disinformazione e sorveglianza
    EN: Iranian Cyber Strategy: Hybrid Warfare, Disinformation and Surveillance
  • IT: Finanza decentralizzata e minacce ibride: il ruolo delle criptovalute nella strategia globale
    EN: DeFi and Hybrid Threats: Cryptocurrencies in Global Strategy
  • IT: Dark Web e minacce spaziali: la nuova convergenza del rischio cibernetico orbitale
    EN: The Dark Web and Space-Based Threats: A New Convergence of Risk
  • IT: La Corea del Nord e la guerra cibernetica del futuro
    EN: North Korea and the Cyber Warfare of the Future
  • IT: Guerra ibrida nel cyberspazio: gli attacchi DDoS di NoName57 contro l’Italia e le loro implicazioni strategiche
    EN: Hybrid Warfare in Cyberspace: NoName57’s DDoS Attacks on Italy and Their Strategic Implications


The complete list of my publications can be provided upon request.

Contact me

Licensed by DMCC – Dubai, UAE

 I engage in governance-focused advisory activities, strategic research exchange, and institutional dialogue related to AI risk, cybersecurity, and digital regulation.

Email: info@toralya.io



 Licensed by DMCC – Dubai, UAE

All messages are read personally. I will get back to you as soon as possible.