Infringements on Digital Information: Modern State of the Problem

. Continuous expansion of the scope of network information technologies application permanently create the background for the appearance of new threats to the security of individuals, society and the state, including information security. Especially dangerous are terrorist acts potential threats by using information resources in the appropriate infrastructure of society and the state individual institutions. The current state of the problem of criminal liability for trespass to digital information, their dynamics and impact on Russia's technological and industrial potential, as well as the negative consequences of committing crimes in the sphere of digital information are considered in the article. A wide use of information and communication technologies (ICT) is an integral requirement of time representing an indicator of the development of a modern economy, both private and national, i.e. state. However, an increase in the share of information crime interferes with the progressive development of ICT. When using the methodological approach in science, measures of general prevention, as well as measures of special prevention aimed at digital crime countering are singled out. The most effective of them are special preventive measures, such as the current criminal, criminal procedure and information legislation improvement; the judicial practice improvement; the creation of new and improvement of existing methods of investigation and prevention of digital security crimes; the qualified personnel training in the field of information security (including specialized research institutes and government agencies of the relevant areas); as well as the need to keep within the necessary information security limits by the users themselves, both in the workplace and in everyday communication. This article is devoted to discussing some of these special preventive measures.


Introduction
Strengthening of the country's defence capacity and its national security largely depends on the active development of the informative society, both globally and nationally. Contemporary information and telecommunication devices have a truly large potential, but the process of their active use in all spheres of society has inevitably entailed a number of negative phenomena, such as a steady increase in the number of digital information offences.

Problem Statement
It seems necessary to analyze the current state of the problem of criminal liability for offences against digital information. In addition, the related issues of criminal responsibility for committing crimes with the use of computer and telecommunication technologies require consideration as well.

Research Questions
We consider it expedient to research social relations evolving in the sphere of criminal legal regulation of offences against digital information. Study the practice of rules applying on criminal liability for crimes in the sphere of digital information and on the basis of the data obtained, to determine the effectiveness of mentioned standards.

Purpose of the study
The purpose of the research is to clarify the criminal legal nature of infringements on digital information. Furthermore, it is necessary to provide rationale for proposals for improvement and enhancement of penal legislation efficiency in the field of criminal liability regulation for separate types of crimes in the sphere of digital information and practice of application of punishment for the crimes of this kind.

Research methods
Research methods are traditional for works of this kind. They cover both general scientific methods -dialectical, formal logic, analysis and synthesis and specific scientific ones -comparatively legal, logically legal, analysis of the documents, printed and electronic publications, as well as statistical methods.

Findings
The Criminal Code of the Russian Federation uses the term "crimes in the field of computer information", but it seems to us that this definition is excessively narrow due to the fact that modern development of science and technology has resulted in the widespread use of digital rather than computer information. One can support I.R. Begishev's opinion that "digital information refers to information (messages, data) circulating in informative and telecommunication devices, their systems and networks" [1]. It should be noted that regulatory legal acts of the Russian Federation contain synonymous terms, such as "computer information", "digital information" and "electronic information", that inevitably leads to certain confusion in terminology. We should also have in mind that the content of these concepts, despite their undoubted similarity, is different. At the same time, the most complete of these terms is exactly the "digital information" we use, since eventually all the information used in data and telecommunication networks comes down to the use of zeros and ones specific sequence.
There is a similar instability in interpreting this concept in criminology, where the terms "computer crimes", "high technologies crimes", "computer information crimes" are used [2]. One can state that at present the concept of "information security" goes through only its development stage [3], and the concept itself is only being formed and filled with specific content.
In our opinion, the acts provided for in Art. 138.1 ("Illegal circulation of special technical tools intended for secret receipt of information"), 159.6 ("Computer information fraud"), 272 ("Illegal access to computer information"), 273 ("Creation, use and distribution of harmful computer programs"), 274 (Violation of the operating rules of the means of storing, processing or transmitting computer information and data and telecommunication networks") and 274.1 ("Illegal impact on the critical informative infrastructure of the Russian Federation") of the Criminal Code of the Russian Federation should be attributed to infringements on digital information. It should be noted that the last of these offences (Art. 274.1 of the Criminal Code of the Russian Federation) was introduced into the Criminal Code of the Russian Federation only on July 26, 2017 (Federal Law No. 194 -FL) [4]. It should also be borne in mind that digital information can be used for committing crimes of other kinds as well [5], for example, bringing to suicide [6,7], sexual harassment against minors or other persons [8,9,10] and some others. In particular, insurance fraud can also be committed by means of information and telecommunication technologies [11], Illegal drug trafficking has become widespread through information and telecommunication networks [12]. The use of ICT for the purpose of the ideology of terrorism, xenophobia, extremism propaganda, distribution of the ideas of national exclusivity, destabilization of the social political situation in the country, etc. can be referred to infringements on digital information as well.
Even the Doctrine of Information Security of the Russian Federation indicates the sophisticated methods, manners and means of committing digital information infringements, that is confirmed by statistical data [13]. Thus, only 23 computer information crimes were registered in Russia as of 1997, whereas in 2016 there were 1,748 of them, however, the actual figures far exceed the official statistics data [1].
According to the official data, in 2017, 90 587 computers and telecommunication technologies crimes were committed, 20424 of which were solved, meanwhile, 62404 obligatory preliminary investigation crimes were registered among them, but only 15 986 of which were solved. The crime detection was only 28,1%, which confirms our conclusion about the significant latency of the researched infringements. Were committed 1 883 crimes connected with computer information, 726 of which were revealed. As to non-obligatory preliminary investigation crimes, 28183 of which were committed connected with computer and telecommunication technologies, 98,2% of which were solved (27680 crimes), i.e. almost all acts committed in this way.
For the first eight months of 2018 (January-August), 107980 computer and telecommunication technologies crimes were committed, 20075 of which were solved. During this period were committed 80419 obligatory preliminary investigation crimes, 21081 of which were revealed. Directly in the sphere of computer information 1 653 crimes were committed, 383 of which were revealed, i.e. the detection rate was 28,1%. As to the non-obligatory preliminary investigation crimes, were committed 27561 crimes related to computer and telecommunication technologies, 27126 of which were solved, i.e. 98,4%, which is consistent with the data for 2017.
To predict digital information crime, one can use mathematical formulas proposed by some authors, who fairly notes that mathematical prediction methods enjoy objectivity, reliability and accuracy of the results obtained, provided that the mathematical model is chosen correctly [14].
An infringement on digital information should be understood as a required by criminal law, guilty committed socially dangerous act, violating the confidentiality, integrity, reliability and availability of protected by law digital information. This provision is supported by I.R. Begishev, who reasonably indicates that the protected properties of limited access digital information are its confidentiality, integrity and reliability, and publicly available information -its integrity, reliability and availability [1].
In particular, AVIRA, the producer of antivirus software, claims that more than 4,4 million web attacks are being committed daily in the world, therefore every Internet user needs reliable security and offers a new software antivirus product Internet Security Suite.
The use of forced, corrective or compulsory work in relation to persons who commit encroachment on digital information is interesting and promising. Note that forced labor has proven itself as a means of effective correctional impact not only in Russia, but in foreign countries as well [15,16]. The use of the denial to engage in specified activities as an additional punishment seems to be also efficient [17], as well as compulsory labor [18], which, unfortunately, have not found practical application yet. With regard to public servants who have committed offenses against digital information, it is necessary to provide for a procedure of bringing to disciplinary liability [19].
At the same time, it is essential to avoid bringing persons who may have committed an infringement on digital information by chance, i.e. innocently, to criminal responsibility, as long as frequently the person committed such an offense does not acknowledge the very possibility of committing it [20], however, due to elementary imprudence, still creates such a delict. For example, this may relate to downloading a program or application from GooglePlay or the AppStore.
Unfortunately, the user, unaware of anything, quite often downloads malicious software when he acquires the necessary one in the AppStore or Google Play. Such software application can, for example, activate the speakers and listen to the sounds around, transmitting the received information to interested persons, for example, advertisers; either remove the user's data about his online cards, passwords, logins, etc., wherewith dishonest persons can attack the user's phone, or withdraw money from his electronic cards. Applications can collect fairly detailed information about the user, right up to the browser history or the user's home address and location, that, in principle, can be used to offer the client the so-called targeted advertising.
Certain problems arise in relation to metadata that are collected by separate messengers (for example, WhatsApp, Google and others) and then transfer these data in a generalized form to publicity companies. SEO -experts consider it to be a standard practice, which the user is informed of when reading these messengers privacy policies, only with the consent of which the user is able to continue working with a specific messenger. During operation a search engine analyzes the text sent by the user.
WhatsApp, for example, explains: "We collaborate with third-party organizations that help us to provide work, make available, improve, analyze, configure, maintain and promote our services. Providing information to these organizations, we require them to use your data in accordance with our instructions." An obligatory requirement is the need to impersonalize the transmitted information, that excludes the possibility of obtaining information about a specific addressee, however, it should be noted there is some intersection between the use of digital information and the user's personal security [21], as well as the potential commission of religious, extremist [22] and terrorist crimes by using digital information [23][24][25][26].
Note that despite the fact that developers transmit data in an impersonal and encoded form on a server, wrongdoers can intercept the necessary information and decipher it. Such attacks are referred to as MITM (Man in the middle), and in order to counteract them, the developers have to check their applications to prevent wrongdoers' possible attacks.

Conclusion
The dominant factor of the development of information and telecommunication technologies is the current legislation of the country, including criminal laws, which reflects both the state policy in this area and the rules of conduct for legal entities and individuals in Russia. We believe that the whole complex of public relations connected with production of information proper, its distribution, use and access, both free and limited (confidentiality of information), can be attributed to information computer technologies legislation.
We consider it necessary to change the name of art. 159.6 "Fraud in the field of computer information" into "Fraud with the use of digital information", more appropriate to its content. This proposal has been expressed by theoretical scientists more than once (for example, by I.R. Begishev [1]), but legislators have not accepted it yet.
It is necessary to work out a mathematical model to prevent infringements on digital information to realize the possibility of determining the future and predict the results of social, economic and political changes. This provision is supported by the conclusions of S.V. Maksimov, Yu.G. Vasin and K.A. Utarov [27]. The growing ICT potential of foreign states and as a result arising challenges and threats to the science, state authorities, industrial complex, etc. prove this.