|Article Title||SECURITY FIRST, TECHNOLOGY SECOND: BACK TO THE FUTURE FOR RUSSIAN I.T.|
|Source||Current Digest of the Russian Press, The , No.48, Vol.68, November 28, 2016, page(s):13-14|
|Place of Publication||Minneapolis, USA|
SECURITY FIRST, TECHNOLOGY SECOND: BACK TO THE FUTURE FOR RUSSIAN I.T.
Author: Andrei Soldatov
(By Andrei Soldatov, journalist and information security specialist. The Moscow Times, Dec. 8, 2016, p. 2. Condensed text:). .. The new Information Security Doctrine signed by President Vladimir Putin on Dec. 6 is the very embodiment of the concept of state security. The list of threats listed in the document includes "hostile coverage of Russian state policy" by foreign media; destabilization of Russian regions by "informational-psychological means" (i.e., by foreign intelligence services); the use of IT to disrupt the sovereignty, territorial integrity and political stability of Russia, and so on.
On the one hand, none of this is particularly new. Many of the terms were already used in the first Information Security Doctrine, signed in 2000 [see Current Digest, Vol. 52, No. 37, p. 6], while others came into use after the "Arab Spring" and the Moscow protests in 2011 - 2012, when the Kremlin was awakened to the potential of social media.
But the new document has also an unmistakably new/old Soviet touch. Here, security comes first, and technology comes second. The authors of the doctrine are not happy with "the practice of introducing information technologies without first providing for information security"; they think it increases risks. As far as they are concerned, telecom and IT companies should always consult with secret services ahead of introducing new services and technologies for their customers.
The doctrine questions the very essence of the modern information society: the free flow of information across borders. "The possibilities of cross-border flow of information are used increasingly for geopolitical or military-political goals in conflict with international law," reads the "Threats" chapter of the doctrine, a thinly veiled hint at so-called "Twitter revolutions." There are mentions of ominous forces building the means to disrupt "critical infrastructure" of the Internet.
What this means in practice is that telecom companies will have to ask secret services where to have ...
|This is an article from EVXpress, a service of East View Information Services that allows you to search across more than 12 million journals and news publications for fee and immediately download full text using your credit card.|
Price: $7.95 The article you selected has been added to your shopping cart The issue you selected has been added to your shopping cart
Delivery: immediate download or e-mail attachment
This content appears in EVXpress under license from the publisher. Inquiries regarding the content should be directed to the publisher directly.