—тать€ 'ћесто криптографии в обеспечении компьютерной (кибер-) безопасности и охране информации о технологи€х стратегического и опережающего развити€ в контексте защиты научно-технических достижений в странах Ѕ–» — ' - журнал 'ёридические исследовани€' - NotaBene.ru
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of editors > Redaction > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Open access publishing costs > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Back to contents
Legal Studies

The role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries

Belikova Ksenia Michailovna

Doctor of Law

Professor, the department of Civil Law and Procedure and International Private Law, Peoples' Friendship University of Russia

117198, Russia, g. Moscow, ul. Miklukho-Maklaya, 6, of. 359

ƒругие публикации этого автора




Review date:


Publish date:


Abstract: The subject of this research is the role of cryptography in ensuring cybersecurity and protecting information about technologies of strategic and advanced development in the context of protection of sci-tech achievements in the BRICS countries. The relevance of the selected topic is substantiated by the fact that modern countries, for example, the founder of computer industry – the United States along with the BRICS member-states, realize the importance and practical significance of cryptography in different spheres (military, civil) and aim to develop the means and systems of information security, establishing legal regulation for various aspect of its application. Such approach needs elaboration on the development and implementation of cryptography from the perspective of supranational and international law. It is determined that the currently used encryption methods are essentially based on the methods that use special mathematical algorithms built in computer software. Such methods are a substantial  but surmountable obstacle for acquiring copyright and patent protection. The examined legal orders evolve by encouraging the development of national cryptographic and software systems, and ensuring its protection by patent law under certain conditions and based on a number of principles that are taken into account in national legislation of the BRICS countries. Correlation of the effectiveness of ensuring information security using only patented encryption or with application of additional protection based on the provisions on commercial secret, demonstrated futility of using the latter. From the perspective of international (or supranational) law, cryptographic software is controlled within the framework of international agreements on distribution of technical data, military and dual-purpose products.

Keywords: computer programs, intellectual property, scientific and technical achievements, technologies of advanced development, trade secrets, patent protection, BRICS countries, encryption, cryptography, mathematical algorithms
This article written in Russian. You can find full text of article in Russian here .

Érik van der Vyver. Protection of Software and Computer Implemented Inventions. March 2008. Ц 34 p. URL: http://www.rci.uct.ac.za/usr/rcips/ip/compinv.pdf (data obrashcheniya: 11.09.2021)
Alferov A.P., Zubov A.Yu., Kuz'min A.S., Cheremushkin A.V. Osnovy Kriptografii.-M.: Gelios, 2005. Ц S. 5-53.
Zhel'nikov V. Kriptografiya ot papirusa do komp'yutera.-M.: ABF, 1996. URL: https://textarchive.ru/c-1905418-pall.html (data obrashcheniya: 21.08.2021)
What Are the Different Types of Encryption? / HP Online Store. December 04, 2020. URL: https://www.hp.com/in-en/shop/tech-takes/post/what-are-the-different-types-of-encryption (data obrashcheniya: 08.09.2021)
Charles H. Bennett, Francois Bessette, Gilles Brassard, Louis Salvail, and John Smolin. Experimental Quantum Cryptography. August 2015. Journal of Cryptology 5(1). DOI: 10.1007/3-540-46877-3_23 URL: https://www.researchgate.net/publication/2630685_Experimental_Quantum_Cryptography (data obrashcheniya: 21.08.2021)
Artur K. Ekert. Quantum Cryptography Based on Bell's Theorem. // Phys. Rev. Lett. 1991. Vol. 67. Num. 6. P. 661-663. URL: https://cqi.inf.usi.ch/qic/91_Ekert.pdf (data obrashcheniya: 21.08.2021)
Bennett, C.H., УQuantum cryptography using any two non-orthogonal statesФ, Phys. Rev. Letts. 68, pp. 3121-3124, 1992.
Zapechnikov S.V. Kriptograficheskie metody zashchity informatsii: ucheb. posobie dlya akademicheskogo bakalavriata / S.V. Zapechnikov, O.V. Kazarin, A.A. Tarasov.-M.: Izdatel'stvo Yurait, 2018. Ч 309 s.-(Seriya: Bakalavr. Akademicheskii kurs). URL: https://mx3.urait.ru/uploads/pdf_review/C95081E2-D817-463F-B5DB-49FE1912DF90.pdf (data obrashcheniya: 10.09.2021)
Quantum computers will disrupt existing systems. URL: https://www.huawei.com/za/trust-center/post-quantum-cryptography (data obrashcheniya: 11.09.2021)
Uchenye iz Rossii obnovili mirovoi rekord v oblasti kvantovoi kriptografii. 17.02.2021. URL: https://ria.ru/20210217/rekord-1597773434.html (data obrashcheniya: 22.08.2021)
Uchenye nashli sposob povysit' bezopasnost' kvantovoi kriptografii. 06 aprelya 2020. URL: https://www.cnews.ru/news/line/2020-04-06_uchenye_nashli_sposob_povysit (data obrashcheniya: 22.08.2021)
Rossiiskie uchenye znachitel'no povysili bezopasnost' kvantovogo shifrovaniya. 14 apr 2020. URL: https://vk.com/wall-117903599_3826 (data obrashcheniya: 22.08.2021)
Kvantovaya kriptografiya / shifrovanie. 2021/02/17. URL: https://www.tadviser.ru/index.php/Stat'ya:Kvantovaya_kriptografiya_(shifrovanie) (data obrashcheniya: 22.08.2021)
Lyubashevskii V. Kvantovo-bezopasnaya kriptografiya. // ЂKommersant'' Naukaї.-є6 ot 24.03.2020.-S. 33. URL: https://www.kommersant.ru/doc/4292008 (data obrashcheniya: 22.08.2021)
Belikova K.M. Razvitie iskusstvennogo intellekta v Brazilii: aktsent na voennuyu sferu i voprosy intellektual'noi sobstvennosti // Pravo i politika. Ц 2021. Ц є 10. Ц S. 1-21. DOI: 10.7256/2454-0706.2021.10.36096 URL: https:// nbpublish.com/library_read_article.php?id=36096 (data obrashcheniya: 16.07.2021)
Belikova K.M. Napravleniya i perspektivy razvitiya i primeneniya iskusstvennogo intellekta v voennoi sfere v YuAR // Pravo i politika. Ц 2021. Ц є 9. DOI: 10.7256/2454-0706.2021.9.36076 URL: https://nbpublish.com/library_read_article.php?id=36076 (data obrashcheniya: 10.07.2021)
Belikova, K. M. (2021). Marco legal para o uso da inteligência artificial na esfera militar da Índia no contexto da proteção dos direitos de patente (Legal framework for the use of artificial intelligence in IndiaТs military sphere in the context of patent rights protection). Laplage Em Revista, 7(2), p.671-690. https://doi.org/10.24115/S2446-62202021721051p.671-690 URL: https://laplageemrevista.editorialaar.com/index.php/lpg1/article/view/1051 (data obrashcheniya: 06.07.2021)
Belikova K.M. Osnova pravovogo regulirovaniya razvitiya i primeneniya iskusstvennogo intellekta v voennoi sfere Kitaya v kontekste gosudarstvennoi strategii i okhrany avtorskikh i patentnykh prav. // Probely v rossiiskom zakonodatel'stve. 2020. T. XIII. є5. S. 223-234.
Shurkhovetskii G.N. Kriptostoikost' algoritmov shifrovaniya [Elektronnyi resurs] / G.N. Shurkhovetskii // Molodaya nauka Sibiri: elektron. nauch. zhurn. Ц 2018. Ц є2. Ц Rezhim dostupa: http://mnv.irgups.ru/toma/22-2018, svobodnyi. Ц Zagl. s ekrana. Ц Yaz. rus., angl. (data obrashcheniya: 06.08.2021)
Bruce Schneier. Why Cryptography Is Harder Than It Looks. // Information Security Bulletin. 1997. URL: https://www.schneier.com/essays/archives/1997/01/why_cryptography_is.html (data obrashcheniya: 06.08.2021)
Aktual'nye voprosy obespecheniya kiberbezopasnosti bespilotnykh letatel'nykh apparatov. // Voennoe obozrenie. 10.01.2016. URL: http://militaryreview.ru/aktualnye-voprosy-obespecheniya-kiberbezopasnosti-bespilotnyx-letatelnyx-apparatov.html (data obrashcheniya: 13.08.2021)
Glavnoe o bezopasnosti dronov. URL: https://www.kaspersky.ru/resource-center/threats/can-drones-be-hacked (data obrashcheniya: 13.08.2021)
Testova A. Chto ugrozhaet blokchein-setyam: rassmatrivaem ataki i sposoby zashchity. 15 yanvarya 2018. URL: https://habr.com/ru/company/bitfury/blog/346656/ (data obrashcheniya: 11.08.2021)
Allouch, A.; Cheikhrouhou, O.; Koub, A.; Toumi, K.; Khalgui, M.; Nguyen Gia, T. UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones. Sensors 2021, 21, 3049. https://doi.org/10.3390/s21093049 URL: https://www.mdpi.com/1424-8220/21/9/3049 (data obrashcheniya: 13.08.2021)
Jerbi, W.; Guermazi, A.; Cheikhrouhou, O.; Trabelsi, H. CoopECC: A Collaborative Cryptographic Mechanism for the Internet of Things. J. Sensors 2021, 2021, 8878513
Md Samsul Haque, Morshed U. Chowdhury. A New Cyber Security Framework Towards Secure Data Communica-tion for Unmanned Aerial Vehicle (UAV). // Security and Privacy in Communication Networks. Serie УLecture Notes of the Institute for Computer SciencesФ. October 2018. P. 113-122. DOI: 10.1007/978-3-319-78816-6_9. URL: https://www.researchgate.net/publication/324722005_A_New_Cyber_Security_Framework_Towards_Secure_Data_Communication_for_Unmanned_Aerial_Vehicle_UAV (data obrashcheniya: 13.08.2021)
Popov N.I., Efimov S.V. K voprosu obespecheniya informatsionnoi bezopasnosti bespilotnykh aviatsionnykh sistem s letatel'nymi apparatami malogo i legkogo klassa v spetsializirovannykh ASU. // T-Comm-Telekommunikatsii i Transport. Ц 2013. URL: https://masters.donntu.org/2017/etf/nizhenets/library/article3.htm (data obrashcheniya: 05.08.2021)
Jean-Paul Yaacoub, Hassan Noura, Ola Salman, Ali Chehab. Security analysis of drones systems: Attacks, limitations, and recommendations. // Internet of Things. Volume 11, September 2020, 100218. P. 3 (1-40). URL: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7206421/pdf/main.pdf (data obrashcheniya: 11.08.2021).
Tutubalin P.I., Kirpichnikov A.P. Obespechenie informatsionnoi bezopasnosti funktsionirovaniya kompleksov bespilotnoi razvedki. // Vestnik tekhnologicheskogo universiteta.-2017.-T.20.-є 21. Ц S. 86-92.
Sputnikovyi shpionazh. // Khaker. 07.03.2008. URL: https://xakep.ru/2008/03/07/42680/ (data obrashcheniya: 13.08.2021)
Patrick T. Muffo. The Patentability of Encryption Inventions. Oct 27, 2015. URL: https://www.seyfarth.com/news-insights/the-patentability-of-encryption-inventions.html (data obrashcheniya: 08.09.2021)
Martin Campbell-Kelly, Not All Bad: An Historical Perspective on Software Patents, 11 Mich. Telecomm. & Tech. L. Rev. 191 (2005). Available at: http://repository.law.umich.edu/mttlr/vol11/iss2/2 (data obrashcheniya: 11.09.2021)
Simson Garfinkel. 4.4. Legal Restrictions on Cryptography. // Web Security, Privacy & Commerce. O'Reilly Media, Inc. 2nd Ed. 2001. Ц P. 118 (877 p.) https://www.oreilly.com/library/view/web-security-privacy/0596000456/ch04s04.html (data obrashcheniya: 06.09.2021)
Yevgeniy Sverdlik. IBM scientists patent homomorphic encryption method. December 20, 2013. URL: https://www.datacenterdynamics.com/en/news/ibm-scientists-patent-homomorphic-encryption-method/ (data obrashcheniya: 08.09.2021)
Greg Vetter, Patenting Cryptographic Technology, 84 Chi.-Kent L. Rev. 757 (2010). Available at: https://scholarship.kentlaw.iit.edu/cklawreview/vol84/iss3/5 (data obrashcheniya: 08.09.2021)
Quantum cryptography key distribution system and method (US20030169880A1). URL: https://patents.google.com/patent/US20030169880 (data obrashcheniya: 06.09.2021) i dr.
Lei 9.279/1996 (Lei Ordinária) 14.05.1996, regula direitos e obrigações relativos a propriedade industrial. // D.O. de 15/05/1996. P. 8353. URL: http://www.planalto.gov.br/ccivil_03/leis/l9279.htm (data obrashcheniya: 10.05.2019)
José Roberto Cunha. Articles 10 and 18 of Brazilian IP Law. 11 de May de 2020. URL: https://vlgbrazil.com/news/why-to-register-a-trademark-in-brazil/ (data obrashcheniya: 10.09.2021)
Matematika dlya programmista: sovety, razdely, literatura. 19 yanvarya 2018. URL: https://proglib.io/p/how-to-learn-maths (data obrashcheniya: 11.09.2021)
Levin A. Kak abstraktnaya matematika pomogaet konkretnoi fizike. 19 dekabrya 2017. URL: https://yandex.ru/turbo/popmech.ru/s/science/13451-bolshie-kalibry-fiziki/ (data obrashcheniya: 10.09.2021)
Gustavo Sartori Guimarães. Can you patent a software in Brazil? June 29 2021. URL: https://www.lexology.com/library/detail.aspx?g=a7162f21-2430-4f55-a8c0-e5999f60b8b1 (data obrashcheniya: 10.09.2021)
Guidelines for the Examination of Patent Applications Covering Software Implemented Inventions / Ed. by Brazilian PTO (BRPTO). December 29, 2020. Tsit. po: Inventions / VIPmarketing. January 12, 2021. URL: https://www.venturini-ip.com/news/new-brazilian-guidelines-for-the-examination-of-patent-applications-covering-software-implemented-inventions/ (data obrashcheniya: 11.09.2021)
Portaria / INPI/ PR є 404 de 28 de Dezembro de 2020. URL: https://www.gov.br/inpi/pt-br/servicos/patentes/legislacao/legislacao/PPHIIPortiaria404de21.12.20RPI2608de29.12.20.pdf (data obrashcheniya: 11.09.2021)
Inventions / VIPmarketing. January 12, 2021. URL: https://www.venturini-ip.com/news/new-brazilian-guidelines-for-the-examination-of-patent-applications-covering-software-implemented-inventions/ (data obrashcheniya: 11.09.2021)
P. Andrew Riley, Jonathan R.K. Stroud, and Jeffrey Totten. The Surprising Breadth of Post-Grant Review for Covered-Business-Method Patents: A New Way to Challenge Patent. Ц The Columbia Science & Technology Law Review, Vol. XV, Spring 2014, pages 235Ц292. Tsit. po: Fedorov S.V. Patentovanie algoritmov komp'yuternykh programm. 2 iyulya 2018 (Mat-ly doklada, sdelannogo avtorom na patentnoi konferentsii ЂPeterburgskie kollegial'nye chteniya Ц 2018ї 27 iyunya 2018 g.). URL: https://habr.com/ru/post/415789/ (data obrashcheniya: 07.09.2021)
Grazhdanskii kodeks Rossiiskoi Federatsii. Chast' chetvertaya Grazhdanskogo kodeksa Rossiiskoi Federatsii ot 18 dekabrya 2006 g. є 230-FZ. Prinyata Gosudarstvennoi Dumoi 24 noyabrya 2006 g. // SZ RF. 2006. є 52 (1 ch.). St. 5496.
Prikaz Rospatenta ot 31.12.2009 N 199 Ob utverzhdenii Rekomendatsii po voprosam ekspertizy zayavok na izobreteniya>Prilozhenie. Rekomendatsii po voprosam ekspertizy zayavok na izobreteniya>3. Proverka printsipial'noi patentosposobnosti zayavlennogo v kachestve izobreteniya ob''ekta>Matematicheskie metody. URL: https://sudact.ru/law/prikaz-rospatenta-ot-31122009-n-199-ob/prilozhenie/3/matematicheskie-metody/ (data obrashcheniya: 06.09.2021)
Fedorov S.V. Patentovanie algoritmov komp'yuternykh programm. 2 iyulya 2018 (Mat-ly doklada, sdelannogo avtorom na patentnoi konferentsii ЂPeterburgskie kollegial'nye chteniya Ц 2018ї 27 iyunya 2018 g.). URL: https://habr.com/ru/post/415789/ (data obrashcheniya: 07.09.2021)
Sposob shifrovaniya informatsii, predstavlennoi dvoichnym kodom (RU2581772C2). URL: https://yandex.ru/patents/doc/RU2581772C2_20160420 (data obrashcheniya: 06.09.2021)
Sposob shifrovaniya dvoichnoi informatsii (RU2701128C1). URL: https://patenton.ru/patent/RU2701128C1 (data obrashcheniya: 06.09.2021)
Cposob potochnogo shifrovaniya dannykh (RU2291578C1). URL: https://yandex.ru/patents/doc/RU2291578C1_20070110 (data obrashcheniya: 06.09.2021) i t.d.
Patent na sposob / ЂGardiumї. URL: https://legal-support.ru/services/patent/patent-na-sposob/ (data obrashcheniya: 07.09.2021)
Bashuk A., Tokarev R. IT-patenty dlya rossiiskikh razrabotchikov softa: pol'za, problemy, podvodnye kamni. 11 noyabrya 2020. URL: https://habr.com/ru/post/527484/ (data obrashcheniya: 08.09.2021)
Bashuk A. Kak zashchitit' komp'yuternuyu programmu ot plagiata. Pyat' zakonnykh sposobov. 18.03.20. URL: https://journal.tinkoff.ru/programm-files/ (data obrashcheniya: 08.09.2021)
Patents Act, 1970 (The e-Version incorporates all the amendments in the Patents Act, 1970 and the Patent Rules, 2003 and is updated till 11-03-2015). http://www.ipindia.nic.in/writereaddata/Portal/IPOAct/1_31_1_patent-act-1970-11march2015.pdf (data obrashcheniya: 16.02.2020)
AIR 1982 SC 1444. Tsit. po: Guidelines for Examination of Computer Related Inventions (CRIs) / Office of the Controller General of Patents, Designs and Trademarks of India. 2017. Ц P. 9 (18 p.) URL: https://ipindia.gov.in/writereaddata/Portal/IPOGuidelinesManuals/1_86_1_Revised__Guidelines_for_Examination_of_Computer-related_Inventions_CRI__.pdf (data obrashcheniya: 12.09.2021)
Reports of Patent, Design and Trade Mark Cases, Volume 83, Issue 14, 7 July 1966, Pages 319Ц356, https://doi.org/10.1093/rpc/83.14.319 URL: https://academic.oup.com/rpc/article/83/14/319/1600681 (data obrashcheniya: 13.09.2021)
Mumbai Central, ... on 7 September, 2012. Tsit. po: Guidelines for Examination of Computer Related Inventions (CRIs) / Office of the Controller General of Patents, Designs and Trademarks of India. 2017. Ц P. 10 (18 p.). URL: https://ipindia.gov.in/writereaddata/Portal/IPOGuidelinesManuals/1_86_1_Revised__Guidelines_for_Examination_of_Computer-related_Inventions_CRI__.pdf (data obrashcheniya: 12.09.2021)
Guidelines for Examination of Computer Related Inventions (CRIs) / Office of the Controller General of Patents, Designs and Trademarks of India. 2017. 18 p. URL: https://ipindia.gov.in/writereaddata/Portal/IPOGuidelinesManuals/1_86_1_Revised__Guidelines_for_Examination_of_Computer-related_Inventions_CRI__.pdf (data obrashcheniya: 12.09.2021)
中华人民共和国密码法 (2019年10月26日第十三届全国人民代表大会常务委员会第十四次会议通过 ). URL: http://www.npc.gov.cn/npc/c30834/201910/6f7be7dd5ae5459a8de8baf36296bc74.shtml (data obrashcheniya: 10.09.2021)
V Kitae prinyat zakon o kriptografii / Redaktsiya. 28.10.2019. URL: https://d-russia.ru/v-kitae-prinyat-zakon-o-kriptografii.html (data obrashcheniya: 10.09.2021)
Methods and apparatus for cryptography (CN106663389A). URL: https://patents.google.com/patent/CN106663389A/en (data obrashcheniya: 06.09.2021)
Patent Law of the PeopleТs Republic of China (as amended up to the Decision of December 27, 2008, regarding the Revision of the Patent Law of the PeopleТs Republic of China). URL: https://wipolex.wipo.int/ru/text/178664 (data obrashcheniya: 06.09.2021)
Lin Li, Yujie Jin and Yali Shao. Protecting AI-related innovations in China. June 26 2020. URL: https://www.managingip.com/article/b1m92lbg3th9w0/protecting-ai-related-innovations-in-china (data obrashcheniya: 06.09.2021)
Revised Patent Examination Guidelines (I): China Loosening Rules on Patent Invalidation. // Newsletters. March 2017. / Lung Tin IP Attorneys. URL: http://www.lungtin.com/UpLoadFile/Files/2019/5/21/15152074733ac4b32-c.pdf (data obrashcheniya: 09.09.2021)
Xiaowei Wei. China: Obtaining Patents for Software-Related Inventions in China. 30 August 2017. URL: https://www.mondaq.com/china/patent/624420/obtaining-patents-for-software-related-inventions-in-china (data obrazshcheniya: 08.09.2021)
Li Hui. Patent eligibility for software in China. // China Business Law Journal. 19 June 2019. URL: https://law.asia/china-patent-eligibility-software/ (data obrashcheniya: 08.09.2021)
Dragileva I.P. Patentovanie komp'yuternykh programm i metodov predprinimatel'stva v stranakh Azii. // Patentnoe delo. Ц 2011.-є 5. Ц S. 12-15.
Amy Bray. April 1, 2017 Revision of Chinese Patent Examination Guidelines May be Good News for Patentees. // The National Law Review. May 8, 2017. Volume VII, Number 128. URL: https://www.natlawreview.com/article/april-1-2017-revision-chinese-patent-examination-guidelines-may-be-good-news (data obrashcheniya: 09.09.2021)
Patents Act, 1978 [Act No; 57, 1978]. // Government Gazette. Cape Town, 17 May 1978. Vol. 155. No. 6012. URL: https://www.gov.za/sites/default/files/gcis_document/201504/act-57-1978.pdf (data obrashcheniya: 06.05.2019)
Inventions which cannot be Patented in South Africa / Smit & Van Wyk. URL: https://www.svw.co.za/patents/patent-exclusions/ (data obrashcheniya: 06.09.2021)
Guidelines for Examination in the European Patent Office. March 2021 edition. // OJ EPO 2021, A6. URL: https://www.epo.org/law-practice/legal-texts/guidelines.html i http://documents.epo.org/projects/babylon/eponet.nsf/0/C4B20952A0A7EF6BC125868B002A5C61/$File/epo_guidelines_for_examination_2021_hyperlinked_en.pdf (data obrashcheniya: 11.07.2021)
Peregudova Yu.B. Okhranosposobnost' reshenii, otnosyashchikhsya k metodam khozyaistvennoi ili intellektual'noi deyatel'nosti. Diss. kand. yurid. nauk. M., 2006. Ц 185 s.
Tazetdinova L.D. O patentovanii programmnogo obespecheniya (sravnitel'nyi analiz RF i zapadnykh stran). // Voprosy rossiiskogo i mezhdunarodnogo prava. Ц 2018.-є 9A. Ц S. 360-369.
Robert B. Bigelow, Legal Aspects of Proprietary Software, DATAMATION, Oct. 1968, at 32-39.
Kak rabotaet "paket Yarovoi". 1 iyul 2018, obnovleno 26 sen 2018. URL: https://tass.ru/ekonomika/5335719 (data obrashcheniya: 09.09.2021)
Pochti lyuboi sait mozhet popast' v reestr Roskomnadzora. 08.02.18. URL: https://journal.tinkoff.ru/news/ori/ (data obrashcheniya: 10.09.2021)
"Chernyi den' dlya Rossii": Putin podpisal antiterroristicheskii "paket Yarovoi". // Nastoyashchee vremya. 7 iyulya 2016 g. URL: https://www.currenttime.tv/a/27817452.html (data obrashcheniya: 09.09.2021)
Shchet'ko N. FSB opredelilas' s trebovaniyami po rasshifrovke dannykh. Pyat' voprosov o tom, chem eto grozit internetu i messendzheram v Rossii. // Nastoyashchee vremya. 16 avgusta 2016 g. URL: https://www.currenttime.tv/a/russia-messengers-fate/27845129.html (data obrashcheniya: 09.09.2021)
World map of encryption laws and policies. URL: https://www.gp-digital.org/world-map-of-encryption/# (data obrashcheniya: 08.09.2021)
Encryption laws and policies: human rights assessment tool / Ed. Global Partners Digital. December 2020. P. 4. URL: https://www.gp-digital.org/wp-content/uploads/2020/12/encryption-human-rights-assessment-tool.pdf (data obrashcheniya: 09.09.2021)
Bhairav Acharya. Breaking ranks with Asia: The case for encrypting India. Feb 21 2017. URL: https://www.orfonline.org/expert-speak/breaking-ranks-with-asia-the-case-for-encrypting-india/ (data obrashcheniya: 12.09.2021)
China Enacts Encryption Law. October 31, 2019. URL: https://www.cov.com/-/media/files/corporate/publications/2019/10/china_enacts_encryption_law.pdf (data obrashcheniya: 10.09.2021)
Gabriel Aleixo, Andrea Guimaraes Gobbato, Natalia Langennegger, Ronaldo Lemos, Isabela Garcia de Souza, and Fabro Steibel. The Encryption Debate in Brazil. May 2019.-Carnegie Endowment for International Peace. Ц P. 4-5 (15 p.). URL: https://carnegieendowment.org/2019/05/30/encryption-debate-in-brazil-pub-79219 (data obrashcheniya: 10.09.2021)
PL 471/2008 i PL 474/2008. Tsit. po: Gabriel Aleixo, Andrea Guimaraes Gobbato, Natalia Langennegger, Ronaldo Lemos, Isabela Garcia de Souza, and Fabro Steibel. Op. cit. P. 7.
PL 4906-A/2001. Gabriel Aleixo, Andrea Guimaraes Gobbato, Natalia Langennegger, Ronaldo Lemos, Isabela Garcia de Souza, and Fabro Steibel. Op. cit. P. 7.
PL 3279/2012. Gabriel Aleixo, Andrea Guimaraes Gobbato, Natalia Langennegger, Ronaldo Lemos, Isabela Garcia de Souza, and Fabro Steibel. Op. cit. P. 7.
Priscilla Silva, Ana Lara Mangeth, and Christian Perrone. The Encryption Debate in Brazil: 2021 Update. March 2021.-Carnegie Endowment for International Peace. Ц 11 p. URL: https://carnegieendowment.org/2021/03/31/encryption-debate-in-brazil-2021-update-pub-84238 (data obrashcheniya: 11.09.2021) 88. Regulations on Administration of Commercial Encryption (1999); Administrative Rules on the Use of Commercial Encryption Products (2007). Tsit. po: China Enacts Encryption Law. October 31, 2019. URL: https://www.cov.com/-/media/files/corporate/publications/2019/10/china_enacts_encryption_law.pdf (data obrashcheniya: 10.09.2021)
CrPC Schedule 1 Ц The First Schedule. Updated with Criminal Law (Amendment) Act, 2018. URL: http://devgan.in/crpc/chapter_38.php (data obrashcheniya: 09.09.2021)
R. Halevy, УFAQ: Blackberry Messenger and PIN Messages are Not Encrypted,Ф Berry Review, August 6, 2010, http://www.berryreview.com/2010/08/06/faq-blackberry-messenger-pin-messages-are-not-encrypted/ Tsit. po: Bhairav Acharya. Op. cit.
C. Parsons, УDecrypting Blackberry Security, Decentralizing the Future,Ф Citizen Lab, November 29, 2010, https://citizenlab.org/2010/11/decrypting-blackberry-security-decentralizing-the-future/ Tsit. po: Tsit. po: Bhairav Acharya. Op. cit.
RIM CEO calls a halt to BBC Click interview. // BBC, April 13, 2011. URL: http://news.bbc.co.uk/2/hi/programmes/click_online/9456798.stm (data obrashcheniya: 13.09.2021)
Interception of Communications and Provision of Communication-related Information Act of 2002 (УRICAФ). Tsit. po: Ryszard Lisinski. End-To-End Encryption Ц A South African Perspective. 14 Nov 2016. URL: https://www.golegal.co.za/end-end-encryption-south-african-perspective/ (data obrashcheniya: 11.09.2021)
Cory Farmer, Judson L. Jeffries. Telecommunications Surveillance and Cryptography Regulatory Policy in Africa. May 16, 2013. URL: https://apj.hkspublications.org/telecommunications-surveillance-and-cryptography-regulatory-policy-in-africa/ (data obrashcheniya: 12.09.2021)
International Forum Pages. URL: https://www.gp-digital.org/series/encryption-policy-hub/international-forums/ (data obrashcheniya: 09.09.2021)
Vassenaarskie dogovorennosti (spravka). 6.07.17. URL: https://www.mid.ru/eksportnyj-kontrol/-/asset_publisher/UhKoSvqyDFGv/content/id/80354 (data obrashcheniya: 10.09.2021)
Recommendation R (95) 13 Concerning Problems of Criminal Procedure Law Connected with Information Technology (Adopted by the Committee of Ministers on 11 September 1995 at the 543 meeting of the Ministers' Deputies). URL: https://www.aip-bg.org/lichnidanni/pdf/r_95_13.pdf (data obrashcheniya: 10.09.2021)
Council Regulation (EC) No 1334/2000 of 22 June 2000 setting up a Community regime for the control of exports of dual-use items and technology. // OJ L 159, 30.6.2000, p. 1Ц215. URL: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32000R1334 (data obrashcheniya: 10.09.2021) (utratil silu).
Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a Community regime for the control of exports, transfer, brokering and transit of dual-use items // OJ L 134. 29.05.2009. P. 1-269. URL: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32009R0428 (data obrashcheniya: 10.09.2021)
Slepak V. Yu. Pravovye osnovy eksporta tovarov dvoinogo naznacheniya iz Evropeiskogo Soyuza // Lex russica.-2021.-T. 74.-є 1.-S. 44Ц56. DOI: 10.17803/1729-5920.2021.170.1.044-056
Federal'nyi zakon ot 27.07.2006 є 149-FZ "Ob informatsii, informatsionnykh tekhnologiyakh i o zashchite informatsii". // SZ RF ot 31 iyulya 2006 g. є 31 (chast' I) st. 3448)
Link to this article

You can simply select and copy link from below text field.

Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website