top of page

Russia and China: Convergence of Cyber Control. The Rise of Centralized Cyber Security Models (FSB and CCP) and the New Frontiers of Preventive Surveillance


Both China and Russia are significantly strengthening their respective cybersecurity regulatory frameworks. A comparative analysis of the amendments to China's Cybersecurity Law (CSL) (effective January 2026) and the new Russian FSB ordinances (draft regulatory proposals currently under public consultation, slated to take effect in January 2026) reveals strong analogies in their strategies for cyberspace control. These reflect common geopolitical trends oriented toward centralizing power, preventive surveillance, and protecting critical assets.



Key Analogies and Common Strategies

Both sets of regulations exhibit distinctive similarities, particularly concerning State control and the management of Critical Information Infrastructure (CII):

Feature

China (CSL 2025/2026)

Russia (FSB Ordinances 2026 – Drafts under consultation)

Analogy

Centralized Control

The CSL introduces the mandatory requirement to "adhere to the Leadership of the Chinese Communist Party" (New Art. 3).

The FSB coordinates all actions and expands its control functions, positioning the National Coordination Center for Computer Incidents (NCCCA) as the central collection/response entity


Centralization of Power: The key intelligence/security body (FSB/NCCCA) or the guiding party (CCP) is explicitly placed at the apex of the cybersecurity strategy.

Expanded Scope

The CSL addresses not only incidents but also the supervision of AI risks and the control over prohibited information traffic.


The new ordinances explicitly include the concept of "cyberattacks" in addition to incidents, extending the regulatory scope.



Proactive and Preventive Approach: Both countries move beyond merely responding to incidents, including prevention and the detection of imminent threats as key objectives.


Mandatory Interaction

CII Subjects must undergo a national security review for product procurement and face mega-fines for non-compliance.


Continuous interaction with the NCCCA’s technical infrastructure via personal accounts is enforced, and CII subjects must report on measures taken in response to warnings within 24 hours.



Obligation for Continuous Engagement: A centralized, mandatory cooperation mechanism is imposed (via state infrastructure or the FSB) for data collection and the receipt/execution of alerts.


Reporting Timelines

CII operators must provide a report on adopted measures within 24 hours of receiving a cyberattack notification.


The time to inform the NCCCA is reduced: up to 3 hours for incidents and up to 24 hours for attacks.



Speed Requirements: Drastic reduction of response and reporting times, critical for real-time intelligence.


Accreditation/Vendor Control

The CSL introduces severe penalties for selling non-certified or non-approved network products after a security review.


The FSB introduces the accreditation procedure for centers of the State System, which must comply with requirements and pass a practical cyber training phase.



Standardization and Filtering: Centralized control over the quality and compliance of actors operating in the CII space, acting as a security filter.



Geopolitical and Intelligence Implications

These analogies are not coincidental; they point to a strategic convergence between Beijing and Moscow in constructing a cyberspace governance model that distinctly deviates from the Western (multilateral and open governance) approach.


Reinforcement of Digital Sovereignty and Cyber-Isolation

Both countries are consolidating their digital sovereignty, ensuring that ultimate control over data, critical infrastructure, and information flows remains within national borders and under the control of State or Party entities (CCP and FSB). This aligns with the "cyberspace sovereignty" doctrine, which prioritizes internal control over global connectivity.


Centralization of Intelligence Control

Both the FSB (security/intelligence service) in Russia and the Chinese Communist Party (with the CSL mandating technical support to national security organs) are positioning their security structures as the focal points for cyber defense and offense.

The Russian draft package is significant because, if approved, it will formalize the extended powers of the FSB. The FSB is set to gain expanded powers to acquire information not only on past incidents but also on imminent attacks, transforming the NCCCA into a true predictive alert and intelligence center. Similarly, China, with its mega-fines (up to RMB 10 million), ensures its critical assets are protected according to CCP dictates, a move that is both defensive and a means to impose State surveillance over networks.


Emphasis on Cyber-Resilience and Mandated Interaction

The Russian proposals push CII subjects toward continuous interaction via the NCCCA's technical infrastructure, an obligation which, if approved, will ensure the State has total and near-real-time visibility into the security posture of its vital infrastructure. This rapid and mandatory reporting system (up to 3 hours for incidents) is a core requirement for real-time intelligence. Correspondingly, Chinese regulations on the national security review for CII products and the rapid incident reporting obligation aim to build a resilient defense chain completely under State control.


Legislative Convergence and Strategic Signaling

The fact that both China (with an approved law) and Russia (with an imminent package of drafts) are legislating almost simultaneously (both regulatory sets are scheduled for entry into force in January 2026) in ways that expand intelligence powers and centralize cyber-governance is highly significant. This convergence indicates not only similar internal challenges but also the potential adoption of shared best control practices or strategic consultation between partners who perceive themselves as counterpoints to a globally dominant Western cyber system.


In conclusion, the legislative initiatives in China and Russia mark a decisive step toward models of centralized, intelligence-driven "cyber-control." The priority is not liberty or multilateral governance, but State stability and national security ensured through total visibility of critical infrastructure and the subordination of private actors to the central authority (CCP or FSB). The fundamental difference lies in the status of implementation: in China, the law is approved, whereas in Russia, it remains in the final consultation phase.


6 commenti


bhoomika saini
bhoomika saini
25 nov 2025

fairplay  is a trusted platform offering smooth and secure access for users. With  fairplay login , fairplay id , and the fairplay app , everything becomes easier and more convenient. Thefairplay club adds exclusive rewards, making fairplay  a reliable choice for many. https://fairpplay.com/

Mi piace

bhoomika saini
bhoomika saini
25 nov 2025

For new users, the fairplay 24 Register process is quick and simple, allowing instant account creation and access to various games. Returning users can easily continue their journey through fairplay24 login or fair play app , where all your personal settings, transaction history, and preferences are stored safely. With these convenient options fairplay 24.in makes sure both beginners and experienced players enjoy a seamless experience.https://fairplay24.agency/

Mi piace

bhoomika saini
bhoomika saini
25 nov 2025

For new users, the Laser247 Register process is quick and simple, allowing instant account creation and access to various games. Returning users can easily continue their journey through Laser247 Login or Laser247 Club Login, where all your personal settings, transaction history, and preferences are stored safely. With these convenient options,Laser247 makes sure both beginners and experienced players enjoy a seamless experience.https://lasser247.in/

Mi piace

sabarima146th157
25 nov 2025

skyexchange is a well-known platform offering smooth and secure access for its users. With SkyExchange, everything becomes easier through the skyexchange login . The Sky Exchange VIP option provides additional benefits, and skyexchange ID ensures engaging features. The Sky Exchange App further adds convenience, making sky exchange a reliable choice for many. know more :- https://skyexchange.social/

Mi piace

BeektA KanI
BeektA KanI
25 nov 2025

Mahadev Book is a trusted and fast-growing platform offering smooth, secure, and seamless access for its users. With the Mahadev Book login, players can instantly explore a wide range of betting options. The Mahadev Book Club feature provides exclusive benefits, while a Mahadev Book ID unlocks premium gaming and betting experiences. The Mahadev Book App adds even more convenience, making Mahadev Book a reliable and preferred choice for many users.

Mi piace

©2020 di extrema ratio. Creato con Wix.com

bottom of page