Internet Governance in Russia Trend on Sovereignization

Slides:



Advertisements
Similar presentations
2006 Pan American Health Organization.... Capacity of the National Health Authority to Regulate/Enforce Health Systems Strengthening Seminar Monitoring.
Advertisements

ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
Pakistan Nuclear Regulatory Authority
GOVERNMENT OF THE REPUBLIC OF MOLDOVA CENTRAL PUBLIC ADMINISTRATION REFORM ( ): concept and results December 2007 Chisinau.
1 Management of Civil Service in Albania Filloreta Kodra Former Head of Department of Public Administration.
“Reform of the Child Care System: Taking Stock and Accelerating Action” South East Europe 3 – 6 July 2007, Sofia.
INSAG DEVELOPMENT OF A DOCUMENT ON HIGH LEVEL SAFETY RECOMMENDATIONS FOR NUCLEAR POWER Milestone Issues: Group C. Nuclear Safety. A. Alonso (INSAG Member)
Europol’s tailor-made data protection framework
Estonia-Latvia-Russia Cross Border Cooperation Programme Unda Ozoliņa Head of the Joint Technical Secretariat Launching Conference Riga, July 14, 2010.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Asta Sihvonen-Punkka Director General of EMA Vice-Chair of ERGEG Baltic Electricity Mini-Forum 24 th of April, 2009 Riga The 3 rd Package – implied changes.
Personal Data Protection in Russia: Trends of the Last Decade State University – Higher School of Economics, Russia Software Engineering Department Alexandra.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Compliance with IOSCO requirements AMEDA Leadership Forum Alexandria Egypt Monday 27 th April 2009 by Dr. Ashraf EL Sharkawy Senior Advisor to the CMA.
A National approach to Cyber security/CIIP: Raising awareness.
1 Ensuring the protection of bidders’ rights.  The Federal Law of № 94-FZ "On placing orders for goods, works and services for state and municipal.
Transmitted by the representative of JAPAN Toward Realization of the “Mutual Recognition of International Whole Vehicle Type Approval (IWVTA)” under the.
Environmental Management System Definitions
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
Directorate General for Energy and Transport European Commission Directorate General for Energy and Transport Regulation of electricity markets in the.
PRESENTATION TO THE NCOP ON THE CONVENTION ON INTERNATIONAL INTERESTS IN MOBILE EQUIPMENT BILL, MARCH 2007.
Fukushima Lessons Learnt and Follow-up Activities of Rostechnadzor Alexey Ferapontov, Acting Chairman Second European Nuclear Safety Conference
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
FEDERAL ANTIMONOPOLY SERVICE Moscow 2006 New Antimonopoly Law of the Russian Federation.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
European Labour Law Institutions and their Competencies JUDr. Jana Komendová, Ph.D.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
ERCOT IT Update Ken Shoquist VP, CIO Information Technology Board Meeting February 2004.
 Cooperation and information exchange amongst financial supervisors and regulators are essential for effective oversight in an integrated financial system.
Lecturer: Lina Vladimirovna Zhornyak, associated professor.
Reforms in the Albanian Public Procurement System 7 th Regional Public Procurement Forum Tbilisi, Georgia May 16-19, 2011 PUBLIC PROCUREMENT AGENCY 1.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Export licensing of dual-use and military goods in the Russian Federation.
On the Project Budget Literacy for High School Students
HIPSSA Project PRESENTATION ON SADC DATA PROTECTION MODEL LAW
SPECIALTIES OF LEGAL AND CONTRACT WORK IN EPC/EPC(m)-PROJECTS
The activities of the state tax authorities
The Acceptable Use of Technology
HUMR5140 Introduction to Human Rights Law Autumn 2013
key regulatory issues in the Republic of Moldova 3rd Meeting of the Benchmarking Expert Working Group (BEWG) February 2017 Ladies.
Cybersecurity - What’s Next? June 2017
Institutions Acting in the Social Policy and their Competencies
International Accounting, 6/e
Network Security Basics: Malware and Attacks
Technological and administrative aspects of the formation of the Internet critical infrastructure Yuri Kargapolov CEO of the Ukrainian Numbering, Addressing.
DoD Cyberspace Workforce Definitions
CHILD PROTECTION IN INFOMEDIA
Palace of the Parliament
Montenegro Internet eXchange Point (MIXP) – a success story
Establishing the Infrastructure for Radiation Safety Preparatory Actions and Initial Regulatory Activities.
8 Building Blocks of National Cyber Strategies
Afef Abrougui and Koliwe Majama Internet Freedom Festival, March 2017
DoD Cyberspace Workforce Definitions
Internet Interconnection
The usage of ICT in the election process in Bulgaria
GMD Data Request NERC Rules of Procedure Section 1600
RCF Plenary Session 21 September 2018
progress of the water reform in bulgaria
Implementation of ENUM on telecommunication networks
Cyber security Policy development and implementation
President of the Russian Association of International Law
Cyber Security Ecosystem of Georgia. Experience and Challenges
Importance of Law and Policies in the Environmental Management System
PRESENTATION OF MONTENEGRO
Ministry of National Economy of The Republic of Kazakhstan
Treasury of Russia INTERACTION BETWEEN INFORMATION SYSTEMS USED IN PUBLIC PROCUREMENT AND PUBLIC FINANCE MANAGEMENT – THE CASE OF RUSSIA. Alexandr.
GMP Legal Framework in Kyrgyzstan
Presentation transcript:

Internet Governance in Russia Trend on Sovereignization Ilona Stadnik Saint-Petersburg State University, Russia

Theoretical framework Methods to implement alignment Cyberspace alignment to national borders instead of Internet fragmentation (Mueller 2017) 1. National securitization Reframing Cybersecurity as a national security issue Militarization of cyberspace Nationalization of threat intelligence Reliance on national standards and technologies Reassertion of legal authority for network kill switches 2. Territorialization of information flows Content filtering Data localization 3. Efforts to structure control of critical Internet resources along national lines Theoretical framework  Methods to implement alignment 

National Securitization 2000, 2016 Doctrine on information security “information operations troops” since 2013 GOSSOPKA, NCCCI, and public/private CERTs Import substitution program for software 2015 Discourse of external kill switch local shutdowns of mobile Internet in Ingushetia Republic and Moscow Reframing cybersecurity as a national security issue Militarization of cyberspace Nationalization of threat intelligence Reliance on national standards and technologies Reassertion of legal authority for network kill switches

Territorialization of information flows filtering practices since 2012 through adoption of specific laws. child pornography, information promoting drugs and suicide, calls for mass riots, extremist activities, participation in mass public events that violate the established procedure, unlicensed content – buy a court decision or by request of federal executive agency “Blacklist” is maintained by Roskomnadzor system “Revizor” checks the operator’s compliance to block the banned Internet resources search engines must connect to the federal “blacklist” to automatically filter search results Google fined for incompliance in December 2018 Localization of personal data storage and processing (FZ-242) in 2016 LinkedIn is the first victim Civil proceedings against Facebook and Twitter in 2019, fines + new draft law on higher fines Content filtering Data localization

Control over critical Internet resources along national lines (1) General distrust in ICANN’s work among the Russian leadership Cyber drills tested the external shutdown in 2014 Draft law (2016-2017) on the basic elements of the critical infrastructure of the Internet in Russia and its regulation introduced by the Ministry of Communication State Information System aimed to ensure the integrity, stability and security of the Russian national segment of the Internet, called “GIS Svyaz”: Traffic exchange points, including telecom operators and organizers of information distribution Network addresses and information on individuals who own these network addresses Numbers of autonomous systems of the Internet, and also data on persons/entities to whom such identifiers are provided, and date of their providing Routing policies for Internet packets

Control over critical Internet resources along national lines (2) Second draft law (December 2018) on “sovereign Runet” “to protect RUnet from external shutdown by hostile actors” 6 (!!!) months later it was signed as a Law FZ-90, will come into force on 1 Nov 2019 - The law gives unprecedented powers to Roskomnadzor, initially a supervising agency - Failure to make Telegram messenger to comply with the anti-terrorist law and inability to block it for the Russian users - one of the main reasons for Roskomnadzor to take a big stake in the law enforcement

Control over critical Internet resources along national lines (2) It is a set of amendments to two existing laws "on Communications" and "on Information": The main subjects responsible for stable operation of the Internet in Russia are telecom operators and owners and/or proprietors of: (1) technical communication networks (used for operations of transport/energy and other infrastructures, not connected to the public communication network), (2) traffic exchange points, (3) communication lines crossing the state border and (4) autonomous system numbers (ASN). Roskomnadzor will keep registries for the last three categories. All subjects must participate in the regular exercises for testing the stability of Runet. Roskomnadzor will execute the centralized management of communication networks in the event of threats to the stability and security of the Runet, by defining routing policies for telecom operators and other subjects and coordinating their connections. Telecom operators are required to ensure the installation in their networks of technical means for countering threats to the stability, security and integrity of Internet operation on the territory of Russia ("black boxes" with deep packet inspection functions). These technical means will also serve the purpose of traffic filtering and blocking access to prohibited Internet resources. The law creates a Center for monitoring and control of public communication networks under the Roskomnadzor supervision. The law creates a National Domain Name System

Control over critical Internet resources along national lines (2) What is going on until November 1? ~ 40 regulatory acts to fill executive gaps: present a list of threats to the Runet present principles of centralized traffic management define technical parameters and rules for governing the "black boxes” define how the registry of traffic exchange points will be formed define rules for providing information from operators and owners of ASN for maintaining various information systems, figure out how the national DNS will be formed and used by providers establish a Center for monitoring and control of the public communications network and define its powers

Control over critical Internet resources along national lines (2) Up to date: only 5 regulatory acts passed approval Out of 28 prepared for consideration 17 violated the procedure of introducing new regulatory acts for public discussion, got a negative evaluation for its regulative power.  Tests of filtering capacity of “technical means for countering threats” in the Ural region

The political intention to align Internet with the state borders of Russia is very strong. The most important technical part is still under consideration Unique discourse – keep Internet accessible despite the external shutdown, but make it independent from the current Internet governance system created around ICANN and other related organizations Despite this, filtering of traffic is a priority In case of success, an example for other states with similar internet infrastructure composition? Conclusions

Ilona.st94@gmail.com Questions?