PROBLEMS OF THE CRIMINAL LAW PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURE OF THE RUSSIAN FEDERATION

被引:0
|
作者
Mosechkin, Ilya N. [1 ]
机构
[1] Vyatka State Univ, Law Inst, Criminal Law Proc & Natl Secur, Kirov, Russia
来源
RUSSIAN JOURNAL OF CRIMINOLOGY | 2023年 / 17卷 / 01期
关键词
Computer information; virus; malware; unauthorized access; critical informa-tion infrastructure; computer attack; computer incident; ATTACK;
D O I
10.17150/2500-1442.2023.17(1).22-34
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
The article discusses the problems of improving criminal law norms regu-lating liability for unlawful impact on critical information infrastructure of the Russian Federation. The urgency of the research topic is connected with a growing number of such crimes and the recent adoption of Art. 274.1 of the Criminal Code of the Russian Federation. According to statistics, the number of attacks against critical information infrastructure is extremely high, however, a considerably smaller number of incidents are registered as crimes. One of the reasons behind this situation is the inadequacy of Art. 274.1 of the CC of the RF. The author draws attention to the fact that Part 1 of Art. 274.1 of the CC of the RF does not meet the criteria for criminalization, and its legal construction hinders the effective work of investigation and court bodies' employees. As a result, this widespread publicly dangerous act is not duly reflected in judicial and investigation practice. At the same time, the current Art. 273 of the CC of the RF has considerable potential for including unlawful creation, dissemination and (or) use of any computer software in relation to critical information infrastructure or information contained in it. The author notes that the concept used in the current edition of Art. 274.1 of the CC of the RF << harm to the critical information infrastruc-ture of the Russian Federation >> is non-specific, and leads to delays, mistakes and confusion in legal practice. The article proves that Parts 2 and 3 of Art. 274.1 of the CC of the RF could ensure better liaison with other legal acts if their dispositions in-cluded the categories << computer attack >> and << computer incident >>. The introduction of the above-mentioned attributes could also contribute to the consistency of court practice and the elimination of ambiguous interpretations. The analysis of the subjec-tive side of crimes under Art. 274.1 of the CC of the RF allowed the author to con-clude that mercenary motivation and the goal of concealing or aiding another crime should be viewed as qualifying features. To prove this position, the author points out that these features are wide-spread and used for the construction of corpus delicti of other crimes, and also cites the opinions of legal scholars.
引用
收藏
页码:22 / 34
页数:13
相关论文
共 50 条