INFORMATION SECURITY DOCTRINE OF THE RUSSIAN FEDERATION Ian Leigh

advertisement
INFORMATION SECURITY DOCTRINE OF THE RUSSIAN
FEDERATION
Ian Leigh
The Doctrine gives an analysis the existing state of policy and law governing ‘information
security’ in the Russian Federation and makes suggestions for areas where reform is
necessary. ‘Information security’, while not actually defined, is conceived very widely. It
covers not only individuals’, but also societal and state, interests. In scope the doctrine
ranges over many policy areas, from data protection, personal privacy, copyright and
computer misuse (hacking) through to state secrets, access to information and the control of
the media.
Inevitably, in view of the wide compass, the policy is in places highly
generalized.
Part I (“Information Security of the Russian Federation”) describes in detail the individual,
social and state interests underlying the policy. Individual interests focus on the importance
of civil rights and the benefits of access to information in terms of personal development.
Social interests include consolidating the democratic process and strengthening social
consent. The national interests are described in greater detail and they focus on four issues:
strengthening democratic values as the rule of law in this policy field; using information
technology to keep Russian people informed of government policy; promotion of domestic
developments and capabilities in information technology; and providing a secure
environment for information in the public and private sectors.
Threats to information security are identified. With commendable frankness, the Doctrine
acknowledges government policy and legislation can pose a threat, just as much as private
monopolies and organised criminals. The Doctrine distinguishes between foreign threats
(mentioning particularly aggressive foreign corporations and international terrorists) and
domestic threats. Among the latter it rightly stresses that the under-development of the legal
regime can constitute a barrier to full exploitation of information technology – particularly,
where e-commerce s concerned.
It is acknowledged that, despite legal progress in laws concerned with state information,
much remains to be done, both in giving individuals access to information and protection for
their personal privacy and in creating the legal and technical infrastructure to allow an
information society to flourish.
Part II describes the “Methods of Ensuring Information Security of the Russian Federation”
and focuses on legal and economic reform. Some domestic aspects of this analysis suggest
that freedom of expression has not been fully embraced as a democratic value.
For
example, ‘public unions’ are identified as a threat because of ‘stirring up social, racial,
national and religious hostilities, as well as dissemination of these ideas in mass media’
(sic). Consequently, ‘activation of counter-propagation (sic, propaganda?) activities, aimed
at the prevention of negative consequences of dissemination of misinformation about home
policy’ is suggested as a main means of ensuring information security.
Similarly, it is
suggested that a contribution to ensuring information security in the spiritual sphere can be
made by countering the spreading growth of mass consumerism through the media,
censorship of broadcasting propagating anti-social behaviour and ‘opposition to negative
influence of foreign religious organizations and missionaries’. This degree of control over
the media that these comments envisage would be unacceptable in many democracies,
which leave such decisions to the individual recipient of the information, rather than to the
state. Other aspects of Part II deal with policies for the protection of telecommunications
and security from so-called ‘cyber-warfare’ for government bodies.
Parts III and IV deal with the contribution of government. Part III sets out – at a high level of
generality – the policy of government.
This ranges from observing the Constitution to
supporting the development of new technologies. Part IV maps the broad contributions of
different constitutional actors to the policy.
Overall, the Doctrine is a comprehensive document.
It enunciates many aspects of
information policy. It fails, however, to give concrete examples of specific reforms to address
the various dangers and shortcomings that it identifies.
In view of the broad range of
information security under review little practical guidance is given of how the state intends to
resolve potentially conflicting policy objectives. For example, is access to information or
privacy to take priority in relation to access to personal files, containing sensitive details on
other people? Will individuals be permitted unrestricted use of cryptology to protect their
privacy, but potentially sheltering illegal or fraudulent computer activities? Will legislation on
intellectual property rights in information technology encourage innovation or be act as a
barrier to the benefits of new technologies? Hard questions like these receive no analysis or
discussion.
It appears that more specific policies on the range of issues covered, such as
telecommunications, broadcasting, intellectual property rights, electronic commerce, the use
of personal files and so on, would be more useful than an all-enforcing policy document
which attempts- somewhat unsuccessfully- to cover every aspect of information policy.
Download