SlideShare a Scribd company logo
1 of 10
Download to read offline
Remigiusz ROSICKI
Adam Mickiewicz University in Poznañ
INFORMATION SECURITY AS EXEMPLIFIED BY
CLANDESTINE COLLABORATION AND INFLUENCE
EXERTED BY THE POLISH INTERNAL SECURITY
AGENCY OFFICERS ON JOURNALISTS – DE LEGE
LATA AND DE LEGE FERENDA REGULATIONS
OBJECTIVE SCOPE
The aim of the analysis is information security which will be illustrated with the ex-
ample of the de lege lata and de lege ferenda regulations as part of the legal acts setting
down the operation of the Internal Security Agency (ABW) in Poland. The analysis of
the issues of information security, from the perspective of the activity of one of the Pol-
ish special services, is of particular importance given the relevance of continual institu-
tional changes of individual special services in Poland since the 1990s, as well as with
regard to the abuse of the services for political purposes.
The starting point for the analysis is the category of information security which
should be approached objectively (Rosicki, 2010: 24–32; Ziêba, 2008: 15–39). Given
the escalation of manifold threats of international and national character, the plane
of objective approaches to security is expanding; all the more so because of the
ever-broadening spectrum of security studies, which have long surpassed the issues of
military threat (Czaputowicz, 2012; Rosicki, 2010: 24–32). Still, the military paradigm
is so sturdy that even information security is looked into from the angle of national se-
curity (Lidel, 2005) – with the recommendation and/or substantiation of significant pre-
rogatives of the State in this scope. The discourse on the way information is acquired by
both the State and the citizens may serve as an example. As for the former, state institu-
tions invoke the priority of security, which came to be particularly noticeable in the case
of war on terrorism or other kinds of asymmetrical threats (Koziej, 2011: 21–49;
Madej, 2007). As for the latter, activities undertaken by such persons as Edward
Snowden or Julian Assange are of major importance. The activities engaged in by these
two persons, and aimed at information freedom follow from various problems, and yet
they share a common core that can be boiled down to the following questions:
(1) Where are the global and national security boundaries that can be invoked by the
State and/or international community? (2) How much freedom can be sacrificed for the
sake of security? (3) How much information can the State gather about its own (and not
only its own) citizens? (4) On what principles and within what scope may the citizens
break the restrictions imposed on the access to confidential, top secret and other kinds
of classified information?
Przegl¹d Strategiczny 2014, nr 7
DOI 10.14746/ps.2014.1.11
On the one hand, we are dealing here with the issue of the infringement of the princi-
ples related to the functioning of contemporary democratic systems, that is the evalua-
tion of the abuse of state structures (Edward Snowden); on the other hand, we are
dealing with transparency and the fight for access to information, which takes on the
form of hacktivism (Julian Assange). These issues are very interesting because of the
clash of two values – freedom and security; nevertheless, they will not come under
closer scrutiny. Still, it is worthy of note that the problems, particularly within the con-
text of activism, have already been addressed in academic literature and literature di-
rected at the general public, as well as in opinion journalism (Cf. Jordan, 2008;
J. Assange et al., 2012; J. Assange, 2013).1
Also, it is worth mentioning the significance
of information within the context of the reconfiguration of tools of governance against
the backdrop of historical development of societies, which was put forward by
M. Foucault as part of his concept of discipline, as well as critiqued by, inter alia,
Mathiesen (Foucault, 1975; Mathiesen, 1997: 215–234; Wêgrzecki, 2011: 331–484;
Herer, 2012: 237–264).
INFORMATION SECURITY EXEMPLIFIED BY POLAND
The issue of information security as exemplified by Poland will be reduced to the re-
lation between the Internal Security Agency officers and journalists. Hence, the text
will only address a fragment of the question in hand, which thus will not represent all
the complex issues related to the circulation of information within the context of the ac-
tivities of the Polish special services. In particular, the issues raised here will not be ex-
amined in connection with the applicability of the Classified Information Protection
Act (Journal of Laws of the Republic of Poland, 2010),2
the Personal Data Protection
Act (Journal of Laws of the Republic of Poland, 1997) or the Act on Access to Public In-
formation (Journal of Laws of the Republic of Poland, 2001; Aleksandrowicz, 2002;
Jab³oñski, Wygoda, 2002; Taradejna, Taradejna, 2003).
Therefore, the approach presented in this article will not be characterized by sys-
tematic analysis – in any case such an analysis might only demonstrate the dispersion of
the issues related to the “circulation” of information as illustrated by various legal acts,
which is the ramification of poor legislative culture of the Polish lawmakers. A lack of
transparency and a proliferation of various institutions have been characteristic traits of the
Polish lawmaking processes since the beginning of the 1990s. It neither positively affects
the transparency of the law, nor – what is more important – the ease of its application.
The objective scope of the analysis concernes the de lege lata and de lege ferenda
regulations as part of the activity of the Internal Security Agency. With regard to the de
lege lata regulations, we are dealing with the Internal Security Agency and Foreign In-
telligence Agency Act of 2002 (Journal of Laws of the Republic of Poland, 2002),
146 Remigiusz ROSICKI
1
It is also worth mentioning the program featuring J. Assange, entitled “The Julian Assange
Show: Cypherpunks”, which was broadcast by the Russian TV station Russia Today in 2012.
2
Dziennik Ustaw [Journal of Laws of the Republic of Poland] 2010, No. 182, Item 1228, as
amended.
whereas in the case of the de lege ferenda regulations, we are dealing with the Bill of In-
ternal Security Agency of 1 August 2013 (hereandafter: 2013 Bill). As for the former,
the penal provisions of the Act, that is Articles 153b–153d (Chapter 10a) are applicable,
whereas as for the latter, the applicable regulations are the Bill Articles numbered
197–199 (Chapter 10). In broad outline, these regulations concern the issues related to
the special service officers’ (or former officers’) responsibility for the use of informa-
tion gathered while fulfilling official duties and engaging in the so-called clandestine
collaboration.
POLISH SPECIAL SERVICES
– THE CONTEXT OF STATUTORY CHANGES
The official reason for the changes to the regulations concerned with the structure
and operation of the Internal Security Agency is the “Amber Gold” scandal. Neverthe-
less, this excuse should be recognized as rather implausible, since by all accounts the
services kept the executive (including Prime Minister D. Tusk) advised about the po-
tential threats following from the operation of this company (a peculiar pyramid
scheme). The accusation levelled at the Polish special services that they neglected to
take any action in this respect must be viewed as an attempt at excusing the inaction on
the part of other state authorities, including the executive (the Council of Ministers and
the Prime Minister); all the more so because the “Amber Gold” case and the airlines that
belonged to the company were connected with the Prime Minister’s son (at least in the
media accounts). The “Amber Gold” case tarnished the Prime Minister’s image, as well
as undermined his veracity regarding the information he obtained from the Internal Se-
curity Agency.
Another major issue that might have affected the government’s decision concerned
with the work on the changes to the regulations on the Internal Security Agency (ABW)
is the case of J. K. Bielecki (one of the advisers to Prime Minister Tusk), who was ac-
cused by a newspaper of lobbying for a Russian company Acron, which was reputedly
vying to take over the Grupa Azoty – a Polish company of strategic significance. Ac-
cording to a newspaper, the Prime Minister was informed about this by the head of
ABW. The Agency itself denies the existence of such a report (Cf. Lobbing, 2013).
The year 2013 witnessed a problem with the workings of another special service
– the Military Counterintelligence Service (SKW). The problem concerned a personal-
ity clash between two generals: the head of the Military Counterintelligence Service
(J. Nosek) and the deputy minister of national defence (W. Skrzypczak). The mass me-
dia announced that the action taken by SKW against General W. Skrzypczak might
have been tinged with personal prejudice, and not merely have been driven by willing-
ness to take care of state security: the revocation of Skrzypczak’s security certificate,
pointing to the likelihood that he might have earned an illegitimate income, accusations
of swaying armament sector tenders organized by the Ministry of Defence (Wroñski,
2013).
With regard to the above-quoted cases, two problems emerge. The one is the acqui-
sition of information by journalists; the other is the possibilities that the special services
Information security as exemplified by clandestine collaboration and influence... 147
have of collecting information and/or keeping under surveillance both public figures
and ordinary citizens. From the perspective of this text’s analysis, the first problem is
of overriding importance, that is the penal regulations concerned with the flow of in-
formation between former and/or current officers of the Polish special services and
journalists.
THE INFLUENCE EXERTEDBY INTERNAL SECURITY AGENCY
OFFICERS ON JOURNALISTS’ ACTIVITY AND CLANDESTINE
COLLABORATION BETWEEN OFFICERS AND JOURNALISTS
A teleological-functional justification for the introduction of regulations
contained in Chapter 10a of the Internal Security Agency
and Foreign Intelligence Agency Act of 24 May 2002
The necessity of introducing the regulations presently contained in Chapter 10a (Ar-
ticles 153a–153d) of the 2002 Act was highlighted, inter alia, in the justification for
statutory changes prepared by the representatives of the Senate in 2006. The justifica-
tion reads that the work on the changes is driven by the need to implement transparency
regarding holding extra positions by special services officers. This means that the legis-
lators wanted to impose restrictions on holding offices in the business and public
spheres by special services officers. Still, it must be pointed out that 3 out of 4 articles in
Chapter 10a concern the relations with the media and not the ban on holding offices in
specific circles. This in turn means that the justification invoked by the Senators, in
the course of legislative changes, is at least dubious as far as its argumentative value is
concerned.
It must be noted that the object and function of the implemented regulations are
rather connected with “pathologies” concerning informal “links” and relations between
officers and the political sphere. The fact of having access to “deficit” information
alone might have enabled special services to use the mass media for swaying current
politics; for the same reason they might have become the object of political
“horse-trading”. This served as the rationale for the attempted statutory restriction of
easy transfer of all the information that the Internal Security Agency and Foreign Intel-
ligence Agency (AW) were in possession of.
In the case of the proposed changes of 2006 the Polish legislators did not even try to
refer to the existing laws concerned with the circulation of information bearing special
clauses (e.g. top secret, secret, confidential, classified) – that is, to the Classified Infor-
mation Protection Act (Journal of Laws of the Republic of Poland, 2010). Following
down the “easy path” and leaving aside the systematic approach, the legislator created
another type of information, whose circulation has been penalized. It seems that with
this “simple” legislative move, the legislator expected to broaden the scope of criminal
responsibility, in comparison to the regulations on the responsibility for the breach of
state and professional secrecy, and which are addressed in Chapter XXXIII of the Penal
Code (Journal of Laws of the Republic of Poland, 1997). The expected result of this so-
148 Remigiusz ROSICKI
lution is greater discipline among the officers of the Internal Security Agency and For-
eign Intelligence Agency.
From the perspective of the reason of the State, attention should drawn to the signifi-
cance of the institution itself – the Internal Security Agency. Pursuant to the Classified
Information Protection Act, its head serves as “national security authority” (Art. 11). In
the same vein, the remit of the Internal Security Agency delineated in Art. 5, Sec. 1,
Para. 3 and 4 of the Act on the Internal Security Agency and Foreign Intelligence
Agency of 2002 should be highlighted. Hence special criminal responsibility of the In-
ternal Security Agency officers who look after the system that safeguards information
– including classified information – would be advisable.
The influence exerted on journalists’ activity by
Internal Security Agency officers
Art. 153b of the 2002 Act and Art. 197 of the 2013 Bill penalize the use by the officers
of the information acquired either while fulfilling or in connection with their duties for
the purpose of affecting the operation of public authority bodies, entrepreneurs or broad-
casters – within the meaning of the Act on Radio and Television Broadcasting, chief edi-
tors, journalists and persons conducting publishing activity. An Internal Security Agency
officer who commits such a deed in contravention of the provisions of the Act is liable to
imprisonment for the term between 6 months and 8 years. However, if he or she acts with
a view to receiving a personal or material benefit, they are liable to imprisonment for the
term between 2 and 12 years. As regards the understanding of the term “journalist”, the
legislator refers the reader to the Act on Press Law, which defines the journalist as a per-
son who edits, creates and prepares press materials, and who remains in an employment
relationship with the editorial board, or who engages in such activity on behalf of and
with the authorization of the editorial board (Cf. Dobosz, 2006: 73–90; Ferenc-Szyde³ko,
2008: 77–86; Sobczak, 2008: 312–347; Sobczak, 1993: 48–49).
Art. 197 of the 2013 Bill does not only differ from the former regulation in respect of
the way it is edited, for the said Bill carries “its own definition” of a journalist (Art. 26,
Sec. 1, Para. 9): a person who edits and prepares press materials, and who remains in an
employment relationship with the editorial board (a unit governing the preparation pro-
cess, that is gathering, evaluation and development of the materials to be published in
the press), or who engages in such activity on behalf of and with the authorization of the
editorial board, on the basis of a contract for specific work or a contract of mandate.
Given the above-mentioned legal solution, many questions arise as for its applica-
tion. The solutions included in the 2013 Bill will give rise to a problem concerned with
persons who are not on an employment contract, either for specific work or of mandate,
since they are, e.g. student interns or trainees, which – given the Polish reality – is
a standard practice rather than an isolated case. This means that in the case of a student
who writes a current affairs commentary for an editorial board, and this commentary is
later on published without any contract being signed, but the text contents having been
affected by an officer, the person’s action cannot be penalized (Cf. Ferenc-Szyde³ko,
2008: 83–84; Sobczak, 1993: 48–49).
Information security as exemplified by clandestine collaboration and influence... 149
Some other issues that ought to be connected with the deed defined in Art. 153b of
the 2002 Act and Art. 197 of the 2013 Bill are: (1) What intent will be taken into consid-
eration (a direct intent)?; (2) Will the character taken into account be of material or for-
mal nature?; (3) How in practice will it be possible to point to the feature of a prohibited
act in the form of “the use of information to exert influence” on e.g. a journalist? Be-
sides, it is essential to maintain a broad sense of information that an officer obtained
while fulfilling or in connection with his official duties.
As for the above-invoked crime, it is worth mentioning its main elements: (1) the sub-
ject of a crime (an Internal Security Agency/Foreign Intelligence Agency officer); (2) the
objective aspect (the use of information obtained while fulfilling or in connection with of-
ficial duties to influence individuals); (3) the object of the crime (the good that must be
protected for the sake of the reason of the State – information itself, that is information se-
curity, but also the individuals mentioned in the article: inter alia, journalists).
As regards the definition of the crime subject, we shall say that in Article 153b of the
2002 Act and in Article 197 of the 2013 Bill the subject is defined individually (an indi-
vidual crime). In the case when the kind of intent is defined, it must be pointed out that
in a case like this we are dealing with a direct intent (an officer wants to commit a pro-
hibited act, which means that he is aware of it and is willing to accomplish it). The
crime defined above is of material character, so there must be an effect in the form of an
exertion of influence. In the case of a journalist this effect will take the form of an ac-
ceptance of the press material as fit for being published as a press article. It is also worth
mentioning Art 128, Clause 3 of the Penal Code, which defines the crime as an exertion
of influence on “official activities of a constitutional authority of the Republic of Po-
land” – here the scope of activities has been partially defined though. However, in the
case of Art. 153b (of the 2002 Act) and Art. 197 (of the 2013 Bill), the influence scope
is quite broad, given the use of the expression of the “influence on activity”, inter alia,
of the public authority body, journalists. In the case of journalists it would be advisable
to consider the quite narrow notion of activity, that is the actions of editing, creating and
preparing press materials.
Art. 135c of the 2002 Act and accordingly Art 198 of the 2013 Bill penalize the use
by a former Internal Security Agency and/or Office for State Protection (a predecessor
of ABW and AW) of the information gathered while fulfilling or in connection with
official duties for the purpose of affecting the operation of public authority bodies, en-
trepreneurs or broadcasters, editors-in-chief, journalists and persons conducting pub-
lishing activity. Any person engaging in such an act will be liable to imprisonment for
the term between 6 months and 8 years, whereas if they act with a view to receiving
a personal or material benefit, they will be liable to imprisonment for the term between
2 and 12 years.
As for Article 153c of the 2002 Act and Art. 198 of the 2013 Bill, it is necessary to
point out the same doubts which were raised in relation to Art 153b of the 2002 Act and
Art 197 of the 2013 Bill. Besides, one should draw attention to the Polish legislator’s in-
consistency, since while defining ‘the former officer’, the legislator refers to the offi-
cers of the Office for State Protection and of the Internal Security Agency, whereas he
does not refer to former officers of the Security Service (a main security organization in
the People’s Republic of Poland). There might emerge a hypothetical situation con-
150 Remigiusz ROSICKI
cerned with possession of “valuable” information, e.g. information about the intelli-
gence agent network under operation or another form of services cooperation which
might be continued in the Third Republic of Poland (this only serves as an example of
a possible situation, however more cases might be invoked).
Clandestine collaboration between Internal Security Agency officers
and journalists
Clandestine collaboration between an Internal Security Agency officer and
a broadcaster, an editor-in-chief, a journalist or a person conducting publishing activ-
ity was penalized in Art. 153d of the 2002 Act, and in Art. 199 of the 2013 Bill. An In-
ternal Security Agency officer who chooses to collaborate with the individual entities is
liable to imprisonment for the term between 6 months and 8 years. In section 2 of this
Article the legislator introduces an exclusion of culpability – the above-mentioned
crime is not committed by an Internal Security Agency officer who has been granted the
Agency Head’s permission, which is defined in Art. 37, Section 2 of the 2002 Act. As
such, the Act does not contain a definition of clandestine collaboration, not to mention
the notion of collaboration itself. Still, Art. 37, Section 1 features “a list of persons of
various professions or in specific positions, with whom Internal Security Agency and
Foreign Intelligence Agency officers must not engage in clandestine collaboration, e.g.
judges, prosecutors, attorneys-at-law, directors general at ministries, central government
offices or province authority offices, broadcasters, editors-in-chief, journalists or per-
sons conducting publishing activity. At this point, it is worth noting that for a long time
the legislator did not include in the “list” – say – legal advisers, who – just like attor-
neys-at-law – represent, in the Polish legal system, a profession of public trust (changes in
this respect are due to come into force as late as 2015). The list also does not feature the
authorities of the Polish Press Agency, of the Polish Television (the supervisory board, the
management board, the directors), that is – the persons who directly and/or indirectly ex-
ercise influence on the broadcast programming and communication of information. In
case of Art. 199 of the 2013 Bill, we are dealing with the same solutions as far as clandes-
tine collaboration is concerned; as far as the exclusion of clandestine collaboration is con-
cerned, the authorities of the Polish Press Agency, and of the Polish Television (the
supervisory board, the management board and the directors) are not included either.
The crime mentioned in Art. 153d (of the 2002 Act) and Art. 199 (of the 2013 Bill)
is of individual character – the subject of the crime is defined. The good protected in
these articles is the activity of individual entities, including journalists. Clandestine
collaboration with a journalist may in practice turn into the enlistment of journalists to
cooperate as “intelligence agents” for the benefit of the Internal Security Agency/For-
eign Intelligence Agency.
It is also worth noting that in the 2013 Bill, the Polish legislator extends the scope of
possible collaboration – the obligation to collaborate, as defined in the existing regula-
tions, essentially used to exist on paper only. The 2013 Bill includes regulations con-
cerned with the collaboration obligation incumbent on government officials and
entrepreneurs who “conduct activity of public utility.”
Information security as exemplified by clandestine collaboration and influence... 151
* * *
More often than not, information security is analyzed on account of State security.
Because it is the State that is in possession of knowledge that is amassed with the aid of
special instruments and entitlements. This comes to be reflected in the operation of spe-
cial services, for whom any occurrence that might constitute a threat to internal or ex-
ternal security, and the constitutional order falls within the scope of interest. Of special
significance for the operation of special services is the information which is classified;
in the case of Poland this issue is regulated by the Classified Information Protection Act
as well as acts that govern the operation of individual special services.
The issue of classified information protection has not been the subject matter under
consideration in the present article. The article, for that matter, focuses on specific legal
solutions which came within the purview of the 24 May 2002 Act on the Internal Secu-
rity Agency and Foreign Intelligence Agency, as well as the 1 August 2013 Bill of the
Internal Security Agency. In the analysis, only the problem of the relations between the
ABW officers and journalists comes under close scrutiny. Hence, the text does not
touch upon all the aspects of collaboration or exertion of influence on persons holding
public offices or offices of similar nature (for more on this see Art. 37 of the 2002 Act
and Art. 26 of the 2013 Bill).
It must be pointed out that the changes which were proposed by the Polish legislator
in 2006, and which are reflected in the Act on ABW and AW (Chapter 10a), and which
in essence recur in the ABW Bill (Chapter 10), are intended to eliminate the use of spe-
cial services for current politics. They were also intended to diminish the influence ex-
erted by officers upon political, public and economic life on the mere grounds of being
in possession of information that is valuable on account of the way it is acquired. Much
too often the public opinion gained access – with the aid of mass media – to classified
information. In order to put an end to all kinds of collaboration and the undesirable
“transfer” of information – for the sake of the reason of the State – a solution that was
resorted to was the one which curbed possibilities for clandestine collaboration with
journalists, as well as a possibility of employing information acquired while fulfilling
or in connection with official duties performed by the Internal Security Agency officers
in order to affect the operation of public authority bodies, entrepreneurs or broadcasters,
editors-in-chief, journalists and persons conducting publishing activity. The official in-
tent was transparency of the workings of the public sphere, and yet it must be noted that it
was thanks to the so-called “leaks” from special services that the general public was able
to learn about politicians’ illegitimate actions. With these regulations in effect, the offi-
cer-journalist “game” appears to be quite “costly” on account of criminal liability.
Bibliography
Act of 6 June 1997 – Penal Code, Official Journal 1997, No. 88, Item 553 as amended.
Act of 26 January 1984 – Press Law, Official Journal 1984, No. 5, Item 24 as amended.
Act of 24 May 2002 on the Internal Security Agency and Foreign Intelligence Agency, Official Journal
2002, No. 74, Item 676 as amended.
152 Remigiusz ROSICKI
Act of 6 September 2001 on Access to Public Information, Official Journal 2001, No. 112, Item 1198
as amended.
Act of 29 August 1997 on Personal Data Protection, Official Journal 1997, No. 133, Item 883 as
amended.
Act of 5 August 2010 on Classified Information Protection, Official Journal 2010, No. 182, Item 1228
as amended.
Act of 29 December 1992 on Radio and Television Broadcasting, Official Journal 1993, No. 7, Item 34
as amended.
Aleksandrowicz T. R. (2002), Komentarz do ustawy o dostêpie do informacji publicznej, Wroc³aw.
Assange J. (2013), How cryptography is a key weapon in the fight against empire states, “The Guard-
ian”, 9 July 2013.
Assange J., Appelbaum J., Muller-Maguhn A., Zimmermann J. (2012), Cypherpunks: Freedom and
the Future of the Internet, New York.
Bill of the Internal Security Agency of 1 August 2013.
Czaputowicz J. (2012), Bezpieczeñstwo miêdzynarodowe. Wspó³czesne koncepcje, Warszawa.
Dobosz I. (2006), Prawo prasowe. Podrêcznik, Warszawa.
Ferenc-Szyde³ko E. (2008), Prawo prasowe. Komentarz, Warszawa.
Foucault M.(1975), Surveiller et punir: Naissance de la prison, Paris.
Herer M. (2012), Filozofia aktualnoœci, Warszawa.
Jab³oñski M., Wygoda K. (2002), Ustawa o dostêpie do informacji publicznej. Komentarz, Wroc³aw.
Jordan T.(2008), Hacking. Digital Media and Technological Determinism, Cambridge.
Koziej S. (2011), Triada globalnych zagro¿eñ asymetrycznych: konsekwencja proliferacji terroryzmu,
broni nuklearnej i technologii rakietowych, “Bezpieczeñstwo Narodowe”, No. 19.
The Julian Assange Show: Cypherpunks (2012), broadcast by the Russian TV station Russia Today
(RT) in 2012.
Liedel K. (2005), Bezpieczeñstwo informacyjne w dobie terrorystycznych i innych zagro¿eñ bez-
pieczeñstwa narodowego, Toruñ.
Lobbing na rzecz Rosjan? Bielecki odpiera ataki, a PiS chce komisji œledczej (2013), “Dziennik
Gazeta Prawna” 13.05.2013, http://wiadomosci.dziennik.pl/polityka/artykuly/427439,lob-
bing-na-rzecz-rosjan-bielecki-odpiera-ataki-a-pis-chce-komisji-sledczej.html(access:18.08.2013).
Madej M. (2007), Zagro¿enia asymetryczne bezpieczeñstwa pañstw obszaru transatlantyckiego,
PISM, Warszawa.
Mathiesen T. (1997), The Viewer Society: Michel Foucault’s ‘Panopticon’ Revisited, “Theoretical
Criminology”, Vol. 1, No. 2.
Rosicki R. (2010), O pojêciu i istocie bezpieczeñstwa, “Przegl¹d Politologiczny”, No. 3.
Sobczak J. (2008), Prawo prasowe. Komentarz, Warszawa.
Sobczak J. (1993), Polskie prawo prasowe, Poznañ.
Taradejna M., Taradejna R. (2003), Dostêp do informacji publicznej, a prawna ochrona informacji do-
tycz¹cych dzia³alnoœci gospodarczej, spo³ecznej i zawodowej oraz ¿ycia prywatnego, Toruñ.
Ziêba R. (2008), Pozimnowojenny paradygmat bezpieczeñstwa miêdzynarodowego, in: Bezpieczeñ-
stwo miêdzynarodowe po zimnej wojnie, (ed.) R. Ziêba, Warszawa.
Wêgrzecki J. (2011), Wp³yw, autorytet, dominacja. Teorie w³adzy i ich struktura, Warszawa.
Wroñski P. (2013), Wojna genera³ów. Genera³ Nosek musi odejœæ, bo przeœwietli³ wydatki wicemi-
nistra?, “Gazeta Wyborcza”, 24.11.2013, http://wyborcza.pl/2029020,75478,14664625.html
(access: 25.11.2013).
Information security as exemplified by clandestine collaboration and influence... 153
ABSTRACT
The text addresses the issue of information security as exemplified by clandestine collabora-
tion and the influence exerted by the Internal Security Agency officers upon journalists. The
texts analyzes the de lege lata regulations as well as the de lege ferenda ones. As for the former,
the penal provisions of the Act, that is Articles 153b–153d (Chapter 10a) are applicable, whereas
as for the latter, the applicable regulations are the 2013 Bill Articles numbered 197–199 (Chapter
10). In both the 2002 Act on the Internal Security Agency and Foreign Intelligence Agency as
well as in the 2013 draft Bill of the Internal Security Agency, the legislator penalizes the employ-
ment by the officers of the information acquired while fulfilling or in connection with official du-
ties for the purpose of affecting the operation of public authority bodies, entrepreneurs or
broadcasters, editors-in-chief, journalists and persons conducting publishing activity. Also, the
text analyzes regulations concerned with the penalization of clandestine collaboration engaged
in by ABW officers with a broadcaster, editor-in-chief, a journalist and a person conducting pub-
lishing activity.
BEZPIECZEÑSTWO INFORMACJI NA PRZYK£ADZIE TAJNEJ WSPÓ£PRACY
I WYWIERANIA WP£YWU PRZEZ FUNKCJONARIUSZY AGENCJI
BEZPIECZEÑSTWA WEWNÊTRZNEGO NA DZIENNIKARZY
– PRZEPISY DE LEGE LATA I DE LEGE FERENDA
STRESZCZENIE
Tekst podejmuje problematykê bezpieczeñstwa informacji na przyk³adzie tajnej wspó³pracy
i wywierania wp³ywu przez funkcjonariuszy Agencji Bezpieczeñstwa Wewnêtrznego na dzien-
nikarzy. W tekœcie analizowane bêd¹ przepisy de lege lata (Ustawa z dnia 24 maja 2002 r.
o Agencji Bezpieczeñstwa Wewnêtrznego oraz Agencji Wywiadu) i de lege ferenda (Projekt
ustawy o Agencji Bezpieczeñstwa Wewnêtrznego z 1 sierpnia 2013 r.). W pierwszym przypadku
znaczenie maj¹ przepisy karne ustawy, czyli art. 153b–153d (Rozdzia³ 10a), natomiast w drugim
przypadku adekwatne regulacje od art. 197 do art. 199 Projektu z 2013 r. (Rozdzia³ 10). Zarówno
w Ustawie o Agencji Bezpieczeñstwa Wewnêtrznego i Agencji Wywiadu z 2002 r., jak i w projek-
cie ustawy o ABW z 2013 r. ustawodawca penalizuje wykorzystanie przez funkcjonariuszy in-
formacji uzyskanych podczas lub w zwi¹zku z pe³nieniem obowi¹zków s³u¿bowych do
wp³ywania na dzia³alnoœæ organów w³adzy publicznej, przedsiêbiorców lub nadawców, redakto-
rów naczelnych, dziennikarzy i osób prowadz¹cych dzia³alnoœæ wydawnicz¹. W tekœcie analizo-
wane s¹ równie¿ regulacje dotycz¹ce penalizacji tajnej wspó³pracy funkcjonariuszy ABW
z nadawc¹, redaktorem naczelnym, dziennikarzem i osob¹ prowadz¹c¹ dzia³alnoœæ wydawnicz¹.
154 Remigiusz ROSICKI

More Related Content

What's hot

Statement of Criminal Offenses Committed by Officials of the National Anti-Co...
Statement of Criminal Offenses Committed by Officials of the National Anti-Co...Statement of Criminal Offenses Committed by Officials of the National Anti-Co...
Statement of Criminal Offenses Committed by Officials of the National Anti-Co...NABU Leaks
 
Collusion between politicians and journalists in the context of wiretapping o...
Collusion between politicians and journalists in the context of wiretapping o...Collusion between politicians and journalists in the context of wiretapping o...
Collusion between politicians and journalists in the context of wiretapping o...Środkowoeuropejskie Studia Polityczne
 
Collusion between politicians and journalists in the context of wiretapping o...
Collusion between politicians and journalists in the context of wiretapping o...Collusion between politicians and journalists in the context of wiretapping o...
Collusion between politicians and journalists in the context of wiretapping o...Środkowoeuropejskie Studia Polityczne
 
Investigative reporting
Investigative  reportingInvestigative  reporting
Investigative reportingLydia Kumb
 
Consensus against all odds: explaining the persistence of EU sanctions on Russia
Consensus against all odds: explaining the persistence of EU sanctions on RussiaConsensus against all odds: explaining the persistence of EU sanctions on Russia
Consensus against all odds: explaining the persistence of EU sanctions on RussiaPaulina Pospieszna
 

What's hot (7)

Politics this week
Politics this weekPolitics this week
Politics this week
 
Statement of Criminal Offenses Committed by Officials of the National Anti-Co...
Statement of Criminal Offenses Committed by Officials of the National Anti-Co...Statement of Criminal Offenses Committed by Officials of the National Anti-Co...
Statement of Criminal Offenses Committed by Officials of the National Anti-Co...
 
Collusion between politicians and journalists in the context of wiretapping o...
Collusion between politicians and journalists in the context of wiretapping o...Collusion between politicians and journalists in the context of wiretapping o...
Collusion between politicians and journalists in the context of wiretapping o...
 
The Dutch Referendum on the EU Association Agreement with Ukraine
The Dutch Referendum on the EU Association Agreement with UkraineThe Dutch Referendum on the EU Association Agreement with Ukraine
The Dutch Referendum on the EU Association Agreement with Ukraine
 
Collusion between politicians and journalists in the context of wiretapping o...
Collusion between politicians and journalists in the context of wiretapping o...Collusion between politicians and journalists in the context of wiretapping o...
Collusion between politicians and journalists in the context of wiretapping o...
 
Investigative reporting
Investigative  reportingInvestigative  reporting
Investigative reporting
 
Consensus against all odds: explaining the persistence of EU sanctions on Russia
Consensus against all odds: explaining the persistence of EU sanctions on RussiaConsensus against all odds: explaining the persistence of EU sanctions on Russia
Consensus against all odds: explaining the persistence of EU sanctions on Russia
 

Viewers also liked

Development of Social Sciences in Dissertations of Immanuel Wallerstein - Imp...
Development of Social Sciences in Dissertations of Immanuel Wallerstein - Imp...Development of Social Sciences in Dissertations of Immanuel Wallerstein - Imp...
Development of Social Sciences in Dissertations of Immanuel Wallerstein - Imp...RemigiuszRosicki
 
The protection of internal security and constitutional order as exemplified b...
The protection of internal security and constitutional order as exemplified b...The protection of internal security and constitutional order as exemplified b...
The protection of internal security and constitutional order as exemplified b...RemigiuszRosicki
 
Transmission corridors – selected problems
Transmission corridors – selected problemsTransmission corridors – selected problems
Transmission corridors – selected problemsRemigiuszRosicki
 
O przedmiocie badan politologii. Czy mozliwa jest ogolna teoria polityki?
O przedmiocie badan politologii. Czy mozliwa jest ogolna teoria polityki?O przedmiocie badan politologii. Czy mozliwa jest ogolna teoria polityki?
O przedmiocie badan politologii. Czy mozliwa jest ogolna teoria polityki?RemigiuszRosicki
 
Processes of change in academia – the impact of government and market
Processes of change in academia – the impact of government and marketProcesses of change in academia – the impact of government and market
Processes of change in academia – the impact of government and marketRemigiuszRosicki
 
The crisis of the formula of liberal democracy
The crisis of the formula of liberal democracyThe crisis of the formula of liberal democracy
The crisis of the formula of liberal democracyRemigiuszRosicki
 
Uniwersalizm i partykularyzm
Uniwersalizm i partykularyzmUniwersalizm i partykularyzm
Uniwersalizm i partykularyzmRemigiuszRosicki
 
The Energy Policy of Poland till 2050 - a critical analysis
The Energy Policy of Poland till 2050 - a critical analysisThe Energy Policy of Poland till 2050 - a critical analysis
The Energy Policy of Poland till 2050 - a critical analysisRemigiuszRosicki
 
Wymiary bezpieczeństwa energetycznego Unii Europejskiej
Wymiary bezpieczeństwa energetycznego Unii EuropejskiejWymiary bezpieczeństwa energetycznego Unii Europejskiej
Wymiary bezpieczeństwa energetycznego Unii EuropejskiejRemigiuszRosicki
 
Bezpieczenstwo energetyczne i ekologiczne na przykladzie wegla brunatnego w P...
Bezpieczenstwo energetyczne i ekologiczne na przykladzie wegla brunatnego w P...Bezpieczenstwo energetyczne i ekologiczne na przykladzie wegla brunatnego w P...
Bezpieczenstwo energetyczne i ekologiczne na przykladzie wegla brunatnego w P...RemigiuszRosicki
 
Public sphere and private sphere - masculinity and femininity
Public sphere and private sphere - masculinity and femininityPublic sphere and private sphere - masculinity and femininity
Public sphere and private sphere - masculinity and femininityRemigiuszRosicki
 
Rzecz o nepotyzmie i kumoterstwie
Rzecz o nepotyzmie i kumoterstwieRzecz o nepotyzmie i kumoterstwie
Rzecz o nepotyzmie i kumoterstwieRemigiuszRosicki
 

Viewers also liked (13)

Development of Social Sciences in Dissertations of Immanuel Wallerstein - Imp...
Development of Social Sciences in Dissertations of Immanuel Wallerstein - Imp...Development of Social Sciences in Dissertations of Immanuel Wallerstein - Imp...
Development of Social Sciences in Dissertations of Immanuel Wallerstein - Imp...
 
The protection of internal security and constitutional order as exemplified b...
The protection of internal security and constitutional order as exemplified b...The protection of internal security and constitutional order as exemplified b...
The protection of internal security and constitutional order as exemplified b...
 
Transmission corridors – selected problems
Transmission corridors – selected problemsTransmission corridors – selected problems
Transmission corridors – selected problems
 
Poland’s Gas Security
Poland’s Gas SecurityPoland’s Gas Security
Poland’s Gas Security
 
O przedmiocie badan politologii. Czy mozliwa jest ogolna teoria polityki?
O przedmiocie badan politologii. Czy mozliwa jest ogolna teoria polityki?O przedmiocie badan politologii. Czy mozliwa jest ogolna teoria polityki?
O przedmiocie badan politologii. Czy mozliwa jest ogolna teoria polityki?
 
Processes of change in academia – the impact of government and market
Processes of change in academia – the impact of government and marketProcesses of change in academia – the impact of government and market
Processes of change in academia – the impact of government and market
 
The crisis of the formula of liberal democracy
The crisis of the formula of liberal democracyThe crisis of the formula of liberal democracy
The crisis of the formula of liberal democracy
 
Uniwersalizm i partykularyzm
Uniwersalizm i partykularyzmUniwersalizm i partykularyzm
Uniwersalizm i partykularyzm
 
The Energy Policy of Poland till 2050 - a critical analysis
The Energy Policy of Poland till 2050 - a critical analysisThe Energy Policy of Poland till 2050 - a critical analysis
The Energy Policy of Poland till 2050 - a critical analysis
 
Wymiary bezpieczeństwa energetycznego Unii Europejskiej
Wymiary bezpieczeństwa energetycznego Unii EuropejskiejWymiary bezpieczeństwa energetycznego Unii Europejskiej
Wymiary bezpieczeństwa energetycznego Unii Europejskiej
 
Bezpieczenstwo energetyczne i ekologiczne na przykladzie wegla brunatnego w P...
Bezpieczenstwo energetyczne i ekologiczne na przykladzie wegla brunatnego w P...Bezpieczenstwo energetyczne i ekologiczne na przykladzie wegla brunatnego w P...
Bezpieczenstwo energetyczne i ekologiczne na przykladzie wegla brunatnego w P...
 
Public sphere and private sphere - masculinity and femininity
Public sphere and private sphere - masculinity and femininityPublic sphere and private sphere - masculinity and femininity
Public sphere and private sphere - masculinity and femininity
 
Rzecz o nepotyzmie i kumoterstwie
Rzecz o nepotyzmie i kumoterstwieRzecz o nepotyzmie i kumoterstwie
Rzecz o nepotyzmie i kumoterstwie
 

Similar to Information Security as Exemplified by Clandestine Collaboration and Influence Exerted by the Polish Internal Security Agency Officers on Journalists - De Lege Lata and De Lege Ferenda Regulations

IR4099 - Outsourcing of US Intelligence dissertation v2
IR4099 - Outsourcing of US Intelligence dissertation v2IR4099 - Outsourcing of US Intelligence dissertation v2
IR4099 - Outsourcing of US Intelligence dissertation v2Robert Akira Watson
 
Original Article‘Acting like chameleons’ On the McDonaldi.docx
Original Article‘Acting like chameleons’ On the McDonaldi.docxOriginal Article‘Acting like chameleons’ On the McDonaldi.docx
Original Article‘Acting like chameleons’ On the McDonaldi.docxgerardkortney
 
Practical recommendations on the draft-law Uzbekistan/Unesco 06042013 10072013
Practical recommendations on the draft-law Uzbekistan/Unesco 06042013 10072013Practical recommendations on the draft-law Uzbekistan/Unesco 06042013 10072013
Practical recommendations on the draft-law Uzbekistan/Unesco 06042013 10072013Jarmo Koponen
 
Media audiovizualne. konflikt regulacyjny w dobie cyfryzacji a book review
Media audiovizualne. konflikt regulacyjny w dobie cyfryzacji   a book reviewMedia audiovizualne. konflikt regulacyjny w dobie cyfryzacji   a book review
Media audiovizualne. konflikt regulacyjny w dobie cyfryzacji a book reviewMichal
 
Surveillance and data retention in Poland
Surveillance and data retention in PolandSurveillance and data retention in Poland
Surveillance and data retention in PolandRemigiuszRosicki
 
A Case-Specific Instance of Media Capture: the Gorilla Case of Slovakia
A Case-Specific Instance of Media Capture: the Gorilla Case of SlovakiaA Case-Specific Instance of Media Capture: the Gorilla Case of Slovakia
A Case-Specific Instance of Media Capture: the Gorilla Case of SlovakiaŚrodkowoeuropejskie Studia Polityczne
 
Estonia After the 2007 Cyber Attacks Legal, Strategic and O
Estonia After the 2007 Cyber Attacks Legal, Strategic and OEstonia After the 2007 Cyber Attacks Legal, Strategic and O
Estonia After the 2007 Cyber Attacks Legal, Strategic and OBetseyCalderon89
 
Estonia After the 2007 Cyber Attacks Legal, Strategic and O.docx
Estonia After the 2007 Cyber Attacks Legal, Strategic and O.docxEstonia After the 2007 Cyber Attacks Legal, Strategic and O.docx
Estonia After the 2007 Cyber Attacks Legal, Strategic and O.docxgitagrimston
 
2013 02 22_w_wiewiorowski_epsi
2013 02 22_w_wiewiorowski_epsi2013 02 22_w_wiewiorowski_epsi
2013 02 22_w_wiewiorowski_epsiePSI Platform
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Capstone Presentation
Capstone PresentationCapstone Presentation
Capstone Presentationjlevy
 
Warsaw Insight #4 - key policy developments in Poland - July 2014
Warsaw Insight #4 - key policy developments in Poland - July 2014Warsaw Insight #4 - key policy developments in Poland - July 2014
Warsaw Insight #4 - key policy developments in Poland - July 2014Lukasz Jachowicz
 
The Two Per Cent Solution - An Alternative Strategic Defence and Security Rev...
The Two Per Cent Solution - An Alternative Strategic Defence and Security Rev...The Two Per Cent Solution - An Alternative Strategic Defence and Security Rev...
The Two Per Cent Solution - An Alternative Strategic Defence and Security Rev...Rowan Allport
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016cacds_ukraine
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Klamberg
 

Similar to Information Security as Exemplified by Clandestine Collaboration and Influence Exerted by the Polish Internal Security Agency Officers on Journalists - De Lege Lata and De Lege Ferenda Regulations (20)

Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)Russia vs Estonia_First Cyber War (2007)
Russia vs Estonia_First Cyber War (2007)
 
IR4099 - Outsourcing of US Intelligence dissertation v2
IR4099 - Outsourcing of US Intelligence dissertation v2IR4099 - Outsourcing of US Intelligence dissertation v2
IR4099 - Outsourcing of US Intelligence dissertation v2
 
Original Article‘Acting like chameleons’ On the McDonaldi.docx
Original Article‘Acting like chameleons’ On the McDonaldi.docxOriginal Article‘Acting like chameleons’ On the McDonaldi.docx
Original Article‘Acting like chameleons’ On the McDonaldi.docx
 
Practical recommendations on the draft-law Uzbekistan/Unesco 06042013 10072013
Practical recommendations on the draft-law Uzbekistan/Unesco 06042013 10072013Practical recommendations on the draft-law Uzbekistan/Unesco 06042013 10072013
Practical recommendations on the draft-law Uzbekistan/Unesco 06042013 10072013
 
Media audiovizualne. konflikt regulacyjny w dobie cyfryzacji a book review
Media audiovizualne. konflikt regulacyjny w dobie cyfryzacji   a book reviewMedia audiovizualne. konflikt regulacyjny w dobie cyfryzacji   a book review
Media audiovizualne. konflikt regulacyjny w dobie cyfryzacji a book review
 
Surveillance and data retention in Poland
Surveillance and data retention in PolandSurveillance and data retention in Poland
Surveillance and data retention in Poland
 
A Case-Specific Instance of Media Capture: the Gorilla Case of Slovakia
A Case-Specific Instance of Media Capture: the Gorilla Case of SlovakiaA Case-Specific Instance of Media Capture: the Gorilla Case of Slovakia
A Case-Specific Instance of Media Capture: the Gorilla Case of Slovakia
 
La seguridad privada en Brasil: Algunos aspectos relacionados con las motivac...
La seguridad privada en Brasil: Algunos aspectos relacionados con las motivac...La seguridad privada en Brasil: Algunos aspectos relacionados con las motivac...
La seguridad privada en Brasil: Algunos aspectos relacionados con las motivac...
 
s4c.paper2010
s4c.paper2010s4c.paper2010
s4c.paper2010
 
Estonia After the 2007 Cyber Attacks Legal, Strategic and O
Estonia After the 2007 Cyber Attacks Legal, Strategic and OEstonia After the 2007 Cyber Attacks Legal, Strategic and O
Estonia After the 2007 Cyber Attacks Legal, Strategic and O
 
Estonia After the 2007 Cyber Attacks Legal, Strategic and O.docx
Estonia After the 2007 Cyber Attacks Legal, Strategic and O.docxEstonia After the 2007 Cyber Attacks Legal, Strategic and O.docx
Estonia After the 2007 Cyber Attacks Legal, Strategic and O.docx
 
2013 02 22_w_wiewiorowski_epsi
2013 02 22_w_wiewiorowski_epsi2013 02 22_w_wiewiorowski_epsi
2013 02 22_w_wiewiorowski_epsi
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Capstone Presentation
Capstone PresentationCapstone Presentation
Capstone Presentation
 
Warsaw Insight #4 - key policy developments in Poland - July 2014
Warsaw Insight #4 - key policy developments in Poland - July 2014Warsaw Insight #4 - key policy developments in Poland - July 2014
Warsaw Insight #4 - key policy developments in Poland - July 2014
 
The Two Per Cent Solution - An Alternative Strategic Defence and Security Rev...
The Two Per Cent Solution - An Alternative Strategic Defence and Security Rev...The Two Per Cent Solution - An Alternative Strategic Defence and Security Rev...
The Two Per Cent Solution - An Alternative Strategic Defence and Security Rev...
 
Smart intelligence
Smart intelligenceSmart intelligence
Smart intelligence
 
148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016148x210 inform front-eng_07-11-2016
148x210 inform front-eng_07-11-2016
 
Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)Surveillance of communication by the National Defence Radio Establishment (FRA)
Surveillance of communication by the National Defence Radio Establishment (FRA)
 
Peacebuilding
PeacebuildingPeacebuilding
Peacebuilding
 

More from RemigiuszRosicki

The Institution of Transmission Easement in Poland
The Institution of Transmission Easement in PolandThe Institution of Transmission Easement in Poland
The Institution of Transmission Easement in PolandRemigiuszRosicki
 
"Pornographic content related to presentation of violence" - art. 202 § 3 of ...
"Pornographic content related to presentation of violence" - art. 202 § 3 of ..."Pornographic content related to presentation of violence" - art. 202 § 3 of ...
"Pornographic content related to presentation of violence" - art. 202 § 3 of ...RemigiuszRosicki
 
Kryzys demokracji liberalnej - wybrane problemy rządzenia, legitymizacji i re...
Kryzys demokracji liberalnej - wybrane problemy rządzenia, legitymizacji i re...Kryzys demokracji liberalnej - wybrane problemy rządzenia, legitymizacji i re...
Kryzys demokracji liberalnej - wybrane problemy rządzenia, legitymizacji i re...RemigiuszRosicki
 
Instrumentalisation and Objectification of Human Sexuality
Instrumentalisation and Objectification of Human SexualityInstrumentalisation and Objectification of Human Sexuality
Instrumentalisation and Objectification of Human SexualityRemigiuszRosicki
 
Biogas, agricultural biogas and biogas plants in Poland - selected statistica...
Biogas, agricultural biogas and biogas plants in Poland - selected statistica...Biogas, agricultural biogas and biogas plants in Poland - selected statistica...
Biogas, agricultural biogas and biogas plants in Poland - selected statistica...RemigiuszRosicki
 
Analiza interesów w polityce bezpieczeństwa energetycznego w UE
Analiza interesów w polityce bezpieczeństwa energetycznego w UEAnaliza interesów w polityce bezpieczeństwa energetycznego w UE
Analiza interesów w polityce bezpieczeństwa energetycznego w UERemigiuszRosicki
 

More from RemigiuszRosicki (7)

The Institution of Transmission Easement in Poland
The Institution of Transmission Easement in PolandThe Institution of Transmission Easement in Poland
The Institution of Transmission Easement in Poland
 
"Pornographic content related to presentation of violence" - art. 202 § 3 of ...
"Pornographic content related to presentation of violence" - art. 202 § 3 of ..."Pornographic content related to presentation of violence" - art. 202 § 3 of ...
"Pornographic content related to presentation of violence" - art. 202 § 3 of ...
 
O suwerenności
O suwerennościO suwerenności
O suwerenności
 
Kryzys demokracji liberalnej - wybrane problemy rządzenia, legitymizacji i re...
Kryzys demokracji liberalnej - wybrane problemy rządzenia, legitymizacji i re...Kryzys demokracji liberalnej - wybrane problemy rządzenia, legitymizacji i re...
Kryzys demokracji liberalnej - wybrane problemy rządzenia, legitymizacji i re...
 
Instrumentalisation and Objectification of Human Sexuality
Instrumentalisation and Objectification of Human SexualityInstrumentalisation and Objectification of Human Sexuality
Instrumentalisation and Objectification of Human Sexuality
 
Biogas, agricultural biogas and biogas plants in Poland - selected statistica...
Biogas, agricultural biogas and biogas plants in Poland - selected statistica...Biogas, agricultural biogas and biogas plants in Poland - selected statistica...
Biogas, agricultural biogas and biogas plants in Poland - selected statistica...
 
Analiza interesów w polityce bezpieczeństwa energetycznego w UE
Analiza interesów w polityce bezpieczeństwa energetycznego w UEAnaliza interesów w polityce bezpieczeństwa energetycznego w UE
Analiza interesów w polityce bezpieczeństwa energetycznego w UE
 

Recently uploaded

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 

Recently uploaded (20)

Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 

Information Security as Exemplified by Clandestine Collaboration and Influence Exerted by the Polish Internal Security Agency Officers on Journalists - De Lege Lata and De Lege Ferenda Regulations

  • 1. Remigiusz ROSICKI Adam Mickiewicz University in Poznañ INFORMATION SECURITY AS EXEMPLIFIED BY CLANDESTINE COLLABORATION AND INFLUENCE EXERTED BY THE POLISH INTERNAL SECURITY AGENCY OFFICERS ON JOURNALISTS – DE LEGE LATA AND DE LEGE FERENDA REGULATIONS OBJECTIVE SCOPE The aim of the analysis is information security which will be illustrated with the ex- ample of the de lege lata and de lege ferenda regulations as part of the legal acts setting down the operation of the Internal Security Agency (ABW) in Poland. The analysis of the issues of information security, from the perspective of the activity of one of the Pol- ish special services, is of particular importance given the relevance of continual institu- tional changes of individual special services in Poland since the 1990s, as well as with regard to the abuse of the services for political purposes. The starting point for the analysis is the category of information security which should be approached objectively (Rosicki, 2010: 24–32; Ziêba, 2008: 15–39). Given the escalation of manifold threats of international and national character, the plane of objective approaches to security is expanding; all the more so because of the ever-broadening spectrum of security studies, which have long surpassed the issues of military threat (Czaputowicz, 2012; Rosicki, 2010: 24–32). Still, the military paradigm is so sturdy that even information security is looked into from the angle of national se- curity (Lidel, 2005) – with the recommendation and/or substantiation of significant pre- rogatives of the State in this scope. The discourse on the way information is acquired by both the State and the citizens may serve as an example. As for the former, state institu- tions invoke the priority of security, which came to be particularly noticeable in the case of war on terrorism or other kinds of asymmetrical threats (Koziej, 2011: 21–49; Madej, 2007). As for the latter, activities undertaken by such persons as Edward Snowden or Julian Assange are of major importance. The activities engaged in by these two persons, and aimed at information freedom follow from various problems, and yet they share a common core that can be boiled down to the following questions: (1) Where are the global and national security boundaries that can be invoked by the State and/or international community? (2) How much freedom can be sacrificed for the sake of security? (3) How much information can the State gather about its own (and not only its own) citizens? (4) On what principles and within what scope may the citizens break the restrictions imposed on the access to confidential, top secret and other kinds of classified information? Przegl¹d Strategiczny 2014, nr 7 DOI 10.14746/ps.2014.1.11
  • 2. On the one hand, we are dealing here with the issue of the infringement of the princi- ples related to the functioning of contemporary democratic systems, that is the evalua- tion of the abuse of state structures (Edward Snowden); on the other hand, we are dealing with transparency and the fight for access to information, which takes on the form of hacktivism (Julian Assange). These issues are very interesting because of the clash of two values – freedom and security; nevertheless, they will not come under closer scrutiny. Still, it is worthy of note that the problems, particularly within the con- text of activism, have already been addressed in academic literature and literature di- rected at the general public, as well as in opinion journalism (Cf. Jordan, 2008; J. Assange et al., 2012; J. Assange, 2013).1 Also, it is worth mentioning the significance of information within the context of the reconfiguration of tools of governance against the backdrop of historical development of societies, which was put forward by M. Foucault as part of his concept of discipline, as well as critiqued by, inter alia, Mathiesen (Foucault, 1975; Mathiesen, 1997: 215–234; Wêgrzecki, 2011: 331–484; Herer, 2012: 237–264). INFORMATION SECURITY EXEMPLIFIED BY POLAND The issue of information security as exemplified by Poland will be reduced to the re- lation between the Internal Security Agency officers and journalists. Hence, the text will only address a fragment of the question in hand, which thus will not represent all the complex issues related to the circulation of information within the context of the ac- tivities of the Polish special services. In particular, the issues raised here will not be ex- amined in connection with the applicability of the Classified Information Protection Act (Journal of Laws of the Republic of Poland, 2010),2 the Personal Data Protection Act (Journal of Laws of the Republic of Poland, 1997) or the Act on Access to Public In- formation (Journal of Laws of the Republic of Poland, 2001; Aleksandrowicz, 2002; Jab³oñski, Wygoda, 2002; Taradejna, Taradejna, 2003). Therefore, the approach presented in this article will not be characterized by sys- tematic analysis – in any case such an analysis might only demonstrate the dispersion of the issues related to the “circulation” of information as illustrated by various legal acts, which is the ramification of poor legislative culture of the Polish lawmakers. A lack of transparency and a proliferation of various institutions have been characteristic traits of the Polish lawmaking processes since the beginning of the 1990s. It neither positively affects the transparency of the law, nor – what is more important – the ease of its application. The objective scope of the analysis concernes the de lege lata and de lege ferenda regulations as part of the activity of the Internal Security Agency. With regard to the de lege lata regulations, we are dealing with the Internal Security Agency and Foreign In- telligence Agency Act of 2002 (Journal of Laws of the Republic of Poland, 2002), 146 Remigiusz ROSICKI 1 It is also worth mentioning the program featuring J. Assange, entitled “The Julian Assange Show: Cypherpunks”, which was broadcast by the Russian TV station Russia Today in 2012. 2 Dziennik Ustaw [Journal of Laws of the Republic of Poland] 2010, No. 182, Item 1228, as amended.
  • 3. whereas in the case of the de lege ferenda regulations, we are dealing with the Bill of In- ternal Security Agency of 1 August 2013 (hereandafter: 2013 Bill). As for the former, the penal provisions of the Act, that is Articles 153b–153d (Chapter 10a) are applicable, whereas as for the latter, the applicable regulations are the Bill Articles numbered 197–199 (Chapter 10). In broad outline, these regulations concern the issues related to the special service officers’ (or former officers’) responsibility for the use of informa- tion gathered while fulfilling official duties and engaging in the so-called clandestine collaboration. POLISH SPECIAL SERVICES – THE CONTEXT OF STATUTORY CHANGES The official reason for the changes to the regulations concerned with the structure and operation of the Internal Security Agency is the “Amber Gold” scandal. Neverthe- less, this excuse should be recognized as rather implausible, since by all accounts the services kept the executive (including Prime Minister D. Tusk) advised about the po- tential threats following from the operation of this company (a peculiar pyramid scheme). The accusation levelled at the Polish special services that they neglected to take any action in this respect must be viewed as an attempt at excusing the inaction on the part of other state authorities, including the executive (the Council of Ministers and the Prime Minister); all the more so because the “Amber Gold” case and the airlines that belonged to the company were connected with the Prime Minister’s son (at least in the media accounts). The “Amber Gold” case tarnished the Prime Minister’s image, as well as undermined his veracity regarding the information he obtained from the Internal Se- curity Agency. Another major issue that might have affected the government’s decision concerned with the work on the changes to the regulations on the Internal Security Agency (ABW) is the case of J. K. Bielecki (one of the advisers to Prime Minister Tusk), who was ac- cused by a newspaper of lobbying for a Russian company Acron, which was reputedly vying to take over the Grupa Azoty – a Polish company of strategic significance. Ac- cording to a newspaper, the Prime Minister was informed about this by the head of ABW. The Agency itself denies the existence of such a report (Cf. Lobbing, 2013). The year 2013 witnessed a problem with the workings of another special service – the Military Counterintelligence Service (SKW). The problem concerned a personal- ity clash between two generals: the head of the Military Counterintelligence Service (J. Nosek) and the deputy minister of national defence (W. Skrzypczak). The mass me- dia announced that the action taken by SKW against General W. Skrzypczak might have been tinged with personal prejudice, and not merely have been driven by willing- ness to take care of state security: the revocation of Skrzypczak’s security certificate, pointing to the likelihood that he might have earned an illegitimate income, accusations of swaying armament sector tenders organized by the Ministry of Defence (Wroñski, 2013). With regard to the above-quoted cases, two problems emerge. The one is the acqui- sition of information by journalists; the other is the possibilities that the special services Information security as exemplified by clandestine collaboration and influence... 147
  • 4. have of collecting information and/or keeping under surveillance both public figures and ordinary citizens. From the perspective of this text’s analysis, the first problem is of overriding importance, that is the penal regulations concerned with the flow of in- formation between former and/or current officers of the Polish special services and journalists. THE INFLUENCE EXERTEDBY INTERNAL SECURITY AGENCY OFFICERS ON JOURNALISTS’ ACTIVITY AND CLANDESTINE COLLABORATION BETWEEN OFFICERS AND JOURNALISTS A teleological-functional justification for the introduction of regulations contained in Chapter 10a of the Internal Security Agency and Foreign Intelligence Agency Act of 24 May 2002 The necessity of introducing the regulations presently contained in Chapter 10a (Ar- ticles 153a–153d) of the 2002 Act was highlighted, inter alia, in the justification for statutory changes prepared by the representatives of the Senate in 2006. The justifica- tion reads that the work on the changes is driven by the need to implement transparency regarding holding extra positions by special services officers. This means that the legis- lators wanted to impose restrictions on holding offices in the business and public spheres by special services officers. Still, it must be pointed out that 3 out of 4 articles in Chapter 10a concern the relations with the media and not the ban on holding offices in specific circles. This in turn means that the justification invoked by the Senators, in the course of legislative changes, is at least dubious as far as its argumentative value is concerned. It must be noted that the object and function of the implemented regulations are rather connected with “pathologies” concerning informal “links” and relations between officers and the political sphere. The fact of having access to “deficit” information alone might have enabled special services to use the mass media for swaying current politics; for the same reason they might have become the object of political “horse-trading”. This served as the rationale for the attempted statutory restriction of easy transfer of all the information that the Internal Security Agency and Foreign Intel- ligence Agency (AW) were in possession of. In the case of the proposed changes of 2006 the Polish legislators did not even try to refer to the existing laws concerned with the circulation of information bearing special clauses (e.g. top secret, secret, confidential, classified) – that is, to the Classified Infor- mation Protection Act (Journal of Laws of the Republic of Poland, 2010). Following down the “easy path” and leaving aside the systematic approach, the legislator created another type of information, whose circulation has been penalized. It seems that with this “simple” legislative move, the legislator expected to broaden the scope of criminal responsibility, in comparison to the regulations on the responsibility for the breach of state and professional secrecy, and which are addressed in Chapter XXXIII of the Penal Code (Journal of Laws of the Republic of Poland, 1997). The expected result of this so- 148 Remigiusz ROSICKI
  • 5. lution is greater discipline among the officers of the Internal Security Agency and For- eign Intelligence Agency. From the perspective of the reason of the State, attention should drawn to the signifi- cance of the institution itself – the Internal Security Agency. Pursuant to the Classified Information Protection Act, its head serves as “national security authority” (Art. 11). In the same vein, the remit of the Internal Security Agency delineated in Art. 5, Sec. 1, Para. 3 and 4 of the Act on the Internal Security Agency and Foreign Intelligence Agency of 2002 should be highlighted. Hence special criminal responsibility of the In- ternal Security Agency officers who look after the system that safeguards information – including classified information – would be advisable. The influence exerted on journalists’ activity by Internal Security Agency officers Art. 153b of the 2002 Act and Art. 197 of the 2013 Bill penalize the use by the officers of the information acquired either while fulfilling or in connection with their duties for the purpose of affecting the operation of public authority bodies, entrepreneurs or broad- casters – within the meaning of the Act on Radio and Television Broadcasting, chief edi- tors, journalists and persons conducting publishing activity. An Internal Security Agency officer who commits such a deed in contravention of the provisions of the Act is liable to imprisonment for the term between 6 months and 8 years. However, if he or she acts with a view to receiving a personal or material benefit, they are liable to imprisonment for the term between 2 and 12 years. As regards the understanding of the term “journalist”, the legislator refers the reader to the Act on Press Law, which defines the journalist as a per- son who edits, creates and prepares press materials, and who remains in an employment relationship with the editorial board, or who engages in such activity on behalf of and with the authorization of the editorial board (Cf. Dobosz, 2006: 73–90; Ferenc-Szyde³ko, 2008: 77–86; Sobczak, 2008: 312–347; Sobczak, 1993: 48–49). Art. 197 of the 2013 Bill does not only differ from the former regulation in respect of the way it is edited, for the said Bill carries “its own definition” of a journalist (Art. 26, Sec. 1, Para. 9): a person who edits and prepares press materials, and who remains in an employment relationship with the editorial board (a unit governing the preparation pro- cess, that is gathering, evaluation and development of the materials to be published in the press), or who engages in such activity on behalf of and with the authorization of the editorial board, on the basis of a contract for specific work or a contract of mandate. Given the above-mentioned legal solution, many questions arise as for its applica- tion. The solutions included in the 2013 Bill will give rise to a problem concerned with persons who are not on an employment contract, either for specific work or of mandate, since they are, e.g. student interns or trainees, which – given the Polish reality – is a standard practice rather than an isolated case. This means that in the case of a student who writes a current affairs commentary for an editorial board, and this commentary is later on published without any contract being signed, but the text contents having been affected by an officer, the person’s action cannot be penalized (Cf. Ferenc-Szyde³ko, 2008: 83–84; Sobczak, 1993: 48–49). Information security as exemplified by clandestine collaboration and influence... 149
  • 6. Some other issues that ought to be connected with the deed defined in Art. 153b of the 2002 Act and Art. 197 of the 2013 Bill are: (1) What intent will be taken into consid- eration (a direct intent)?; (2) Will the character taken into account be of material or for- mal nature?; (3) How in practice will it be possible to point to the feature of a prohibited act in the form of “the use of information to exert influence” on e.g. a journalist? Be- sides, it is essential to maintain a broad sense of information that an officer obtained while fulfilling or in connection with his official duties. As for the above-invoked crime, it is worth mentioning its main elements: (1) the sub- ject of a crime (an Internal Security Agency/Foreign Intelligence Agency officer); (2) the objective aspect (the use of information obtained while fulfilling or in connection with of- ficial duties to influence individuals); (3) the object of the crime (the good that must be protected for the sake of the reason of the State – information itself, that is information se- curity, but also the individuals mentioned in the article: inter alia, journalists). As regards the definition of the crime subject, we shall say that in Article 153b of the 2002 Act and in Article 197 of the 2013 Bill the subject is defined individually (an indi- vidual crime). In the case when the kind of intent is defined, it must be pointed out that in a case like this we are dealing with a direct intent (an officer wants to commit a pro- hibited act, which means that he is aware of it and is willing to accomplish it). The crime defined above is of material character, so there must be an effect in the form of an exertion of influence. In the case of a journalist this effect will take the form of an ac- ceptance of the press material as fit for being published as a press article. It is also worth mentioning Art 128, Clause 3 of the Penal Code, which defines the crime as an exertion of influence on “official activities of a constitutional authority of the Republic of Po- land” – here the scope of activities has been partially defined though. However, in the case of Art. 153b (of the 2002 Act) and Art. 197 (of the 2013 Bill), the influence scope is quite broad, given the use of the expression of the “influence on activity”, inter alia, of the public authority body, journalists. In the case of journalists it would be advisable to consider the quite narrow notion of activity, that is the actions of editing, creating and preparing press materials. Art. 135c of the 2002 Act and accordingly Art 198 of the 2013 Bill penalize the use by a former Internal Security Agency and/or Office for State Protection (a predecessor of ABW and AW) of the information gathered while fulfilling or in connection with official duties for the purpose of affecting the operation of public authority bodies, en- trepreneurs or broadcasters, editors-in-chief, journalists and persons conducting pub- lishing activity. Any person engaging in such an act will be liable to imprisonment for the term between 6 months and 8 years, whereas if they act with a view to receiving a personal or material benefit, they will be liable to imprisonment for the term between 2 and 12 years. As for Article 153c of the 2002 Act and Art. 198 of the 2013 Bill, it is necessary to point out the same doubts which were raised in relation to Art 153b of the 2002 Act and Art 197 of the 2013 Bill. Besides, one should draw attention to the Polish legislator’s in- consistency, since while defining ‘the former officer’, the legislator refers to the offi- cers of the Office for State Protection and of the Internal Security Agency, whereas he does not refer to former officers of the Security Service (a main security organization in the People’s Republic of Poland). There might emerge a hypothetical situation con- 150 Remigiusz ROSICKI
  • 7. cerned with possession of “valuable” information, e.g. information about the intelli- gence agent network under operation or another form of services cooperation which might be continued in the Third Republic of Poland (this only serves as an example of a possible situation, however more cases might be invoked). Clandestine collaboration between Internal Security Agency officers and journalists Clandestine collaboration between an Internal Security Agency officer and a broadcaster, an editor-in-chief, a journalist or a person conducting publishing activ- ity was penalized in Art. 153d of the 2002 Act, and in Art. 199 of the 2013 Bill. An In- ternal Security Agency officer who chooses to collaborate with the individual entities is liable to imprisonment for the term between 6 months and 8 years. In section 2 of this Article the legislator introduces an exclusion of culpability – the above-mentioned crime is not committed by an Internal Security Agency officer who has been granted the Agency Head’s permission, which is defined in Art. 37, Section 2 of the 2002 Act. As such, the Act does not contain a definition of clandestine collaboration, not to mention the notion of collaboration itself. Still, Art. 37, Section 1 features “a list of persons of various professions or in specific positions, with whom Internal Security Agency and Foreign Intelligence Agency officers must not engage in clandestine collaboration, e.g. judges, prosecutors, attorneys-at-law, directors general at ministries, central government offices or province authority offices, broadcasters, editors-in-chief, journalists or per- sons conducting publishing activity. At this point, it is worth noting that for a long time the legislator did not include in the “list” – say – legal advisers, who – just like attor- neys-at-law – represent, in the Polish legal system, a profession of public trust (changes in this respect are due to come into force as late as 2015). The list also does not feature the authorities of the Polish Press Agency, of the Polish Television (the supervisory board, the management board, the directors), that is – the persons who directly and/or indirectly ex- ercise influence on the broadcast programming and communication of information. In case of Art. 199 of the 2013 Bill, we are dealing with the same solutions as far as clandes- tine collaboration is concerned; as far as the exclusion of clandestine collaboration is con- cerned, the authorities of the Polish Press Agency, and of the Polish Television (the supervisory board, the management board and the directors) are not included either. The crime mentioned in Art. 153d (of the 2002 Act) and Art. 199 (of the 2013 Bill) is of individual character – the subject of the crime is defined. The good protected in these articles is the activity of individual entities, including journalists. Clandestine collaboration with a journalist may in practice turn into the enlistment of journalists to cooperate as “intelligence agents” for the benefit of the Internal Security Agency/For- eign Intelligence Agency. It is also worth noting that in the 2013 Bill, the Polish legislator extends the scope of possible collaboration – the obligation to collaborate, as defined in the existing regula- tions, essentially used to exist on paper only. The 2013 Bill includes regulations con- cerned with the collaboration obligation incumbent on government officials and entrepreneurs who “conduct activity of public utility.” Information security as exemplified by clandestine collaboration and influence... 151
  • 8. * * * More often than not, information security is analyzed on account of State security. Because it is the State that is in possession of knowledge that is amassed with the aid of special instruments and entitlements. This comes to be reflected in the operation of spe- cial services, for whom any occurrence that might constitute a threat to internal or ex- ternal security, and the constitutional order falls within the scope of interest. Of special significance for the operation of special services is the information which is classified; in the case of Poland this issue is regulated by the Classified Information Protection Act as well as acts that govern the operation of individual special services. The issue of classified information protection has not been the subject matter under consideration in the present article. The article, for that matter, focuses on specific legal solutions which came within the purview of the 24 May 2002 Act on the Internal Secu- rity Agency and Foreign Intelligence Agency, as well as the 1 August 2013 Bill of the Internal Security Agency. In the analysis, only the problem of the relations between the ABW officers and journalists comes under close scrutiny. Hence, the text does not touch upon all the aspects of collaboration or exertion of influence on persons holding public offices or offices of similar nature (for more on this see Art. 37 of the 2002 Act and Art. 26 of the 2013 Bill). It must be pointed out that the changes which were proposed by the Polish legislator in 2006, and which are reflected in the Act on ABW and AW (Chapter 10a), and which in essence recur in the ABW Bill (Chapter 10), are intended to eliminate the use of spe- cial services for current politics. They were also intended to diminish the influence ex- erted by officers upon political, public and economic life on the mere grounds of being in possession of information that is valuable on account of the way it is acquired. Much too often the public opinion gained access – with the aid of mass media – to classified information. In order to put an end to all kinds of collaboration and the undesirable “transfer” of information – for the sake of the reason of the State – a solution that was resorted to was the one which curbed possibilities for clandestine collaboration with journalists, as well as a possibility of employing information acquired while fulfilling or in connection with official duties performed by the Internal Security Agency officers in order to affect the operation of public authority bodies, entrepreneurs or broadcasters, editors-in-chief, journalists and persons conducting publishing activity. The official in- tent was transparency of the workings of the public sphere, and yet it must be noted that it was thanks to the so-called “leaks” from special services that the general public was able to learn about politicians’ illegitimate actions. With these regulations in effect, the offi- cer-journalist “game” appears to be quite “costly” on account of criminal liability. Bibliography Act of 6 June 1997 – Penal Code, Official Journal 1997, No. 88, Item 553 as amended. Act of 26 January 1984 – Press Law, Official Journal 1984, No. 5, Item 24 as amended. Act of 24 May 2002 on the Internal Security Agency and Foreign Intelligence Agency, Official Journal 2002, No. 74, Item 676 as amended. 152 Remigiusz ROSICKI
  • 9. Act of 6 September 2001 on Access to Public Information, Official Journal 2001, No. 112, Item 1198 as amended. Act of 29 August 1997 on Personal Data Protection, Official Journal 1997, No. 133, Item 883 as amended. Act of 5 August 2010 on Classified Information Protection, Official Journal 2010, No. 182, Item 1228 as amended. Act of 29 December 1992 on Radio and Television Broadcasting, Official Journal 1993, No. 7, Item 34 as amended. Aleksandrowicz T. R. (2002), Komentarz do ustawy o dostêpie do informacji publicznej, Wroc³aw. Assange J. (2013), How cryptography is a key weapon in the fight against empire states, “The Guard- ian”, 9 July 2013. Assange J., Appelbaum J., Muller-Maguhn A., Zimmermann J. (2012), Cypherpunks: Freedom and the Future of the Internet, New York. Bill of the Internal Security Agency of 1 August 2013. Czaputowicz J. (2012), Bezpieczeñstwo miêdzynarodowe. Wspó³czesne koncepcje, Warszawa. Dobosz I. (2006), Prawo prasowe. Podrêcznik, Warszawa. Ferenc-Szyde³ko E. (2008), Prawo prasowe. Komentarz, Warszawa. Foucault M.(1975), Surveiller et punir: Naissance de la prison, Paris. Herer M. (2012), Filozofia aktualnoœci, Warszawa. Jab³oñski M., Wygoda K. (2002), Ustawa o dostêpie do informacji publicznej. Komentarz, Wroc³aw. Jordan T.(2008), Hacking. Digital Media and Technological Determinism, Cambridge. Koziej S. (2011), Triada globalnych zagro¿eñ asymetrycznych: konsekwencja proliferacji terroryzmu, broni nuklearnej i technologii rakietowych, “Bezpieczeñstwo Narodowe”, No. 19. The Julian Assange Show: Cypherpunks (2012), broadcast by the Russian TV station Russia Today (RT) in 2012. Liedel K. (2005), Bezpieczeñstwo informacyjne w dobie terrorystycznych i innych zagro¿eñ bez- pieczeñstwa narodowego, Toruñ. Lobbing na rzecz Rosjan? Bielecki odpiera ataki, a PiS chce komisji œledczej (2013), “Dziennik Gazeta Prawna” 13.05.2013, http://wiadomosci.dziennik.pl/polityka/artykuly/427439,lob- bing-na-rzecz-rosjan-bielecki-odpiera-ataki-a-pis-chce-komisji-sledczej.html(access:18.08.2013). Madej M. (2007), Zagro¿enia asymetryczne bezpieczeñstwa pañstw obszaru transatlantyckiego, PISM, Warszawa. Mathiesen T. (1997), The Viewer Society: Michel Foucault’s ‘Panopticon’ Revisited, “Theoretical Criminology”, Vol. 1, No. 2. Rosicki R. (2010), O pojêciu i istocie bezpieczeñstwa, “Przegl¹d Politologiczny”, No. 3. Sobczak J. (2008), Prawo prasowe. Komentarz, Warszawa. Sobczak J. (1993), Polskie prawo prasowe, Poznañ. Taradejna M., Taradejna R. (2003), Dostêp do informacji publicznej, a prawna ochrona informacji do- tycz¹cych dzia³alnoœci gospodarczej, spo³ecznej i zawodowej oraz ¿ycia prywatnego, Toruñ. Ziêba R. (2008), Pozimnowojenny paradygmat bezpieczeñstwa miêdzynarodowego, in: Bezpieczeñ- stwo miêdzynarodowe po zimnej wojnie, (ed.) R. Ziêba, Warszawa. Wêgrzecki J. (2011), Wp³yw, autorytet, dominacja. Teorie w³adzy i ich struktura, Warszawa. Wroñski P. (2013), Wojna genera³ów. Genera³ Nosek musi odejœæ, bo przeœwietli³ wydatki wicemi- nistra?, “Gazeta Wyborcza”, 24.11.2013, http://wyborcza.pl/2029020,75478,14664625.html (access: 25.11.2013). Information security as exemplified by clandestine collaboration and influence... 153
  • 10. ABSTRACT The text addresses the issue of information security as exemplified by clandestine collabora- tion and the influence exerted by the Internal Security Agency officers upon journalists. The texts analyzes the de lege lata regulations as well as the de lege ferenda ones. As for the former, the penal provisions of the Act, that is Articles 153b–153d (Chapter 10a) are applicable, whereas as for the latter, the applicable regulations are the 2013 Bill Articles numbered 197–199 (Chapter 10). In both the 2002 Act on the Internal Security Agency and Foreign Intelligence Agency as well as in the 2013 draft Bill of the Internal Security Agency, the legislator penalizes the employ- ment by the officers of the information acquired while fulfilling or in connection with official du- ties for the purpose of affecting the operation of public authority bodies, entrepreneurs or broadcasters, editors-in-chief, journalists and persons conducting publishing activity. Also, the text analyzes regulations concerned with the penalization of clandestine collaboration engaged in by ABW officers with a broadcaster, editor-in-chief, a journalist and a person conducting pub- lishing activity. BEZPIECZEÑSTWO INFORMACJI NA PRZYK£ADZIE TAJNEJ WSPÓ£PRACY I WYWIERANIA WP£YWU PRZEZ FUNKCJONARIUSZY AGENCJI BEZPIECZEÑSTWA WEWNÊTRZNEGO NA DZIENNIKARZY – PRZEPISY DE LEGE LATA I DE LEGE FERENDA STRESZCZENIE Tekst podejmuje problematykê bezpieczeñstwa informacji na przyk³adzie tajnej wspó³pracy i wywierania wp³ywu przez funkcjonariuszy Agencji Bezpieczeñstwa Wewnêtrznego na dzien- nikarzy. W tekœcie analizowane bêd¹ przepisy de lege lata (Ustawa z dnia 24 maja 2002 r. o Agencji Bezpieczeñstwa Wewnêtrznego oraz Agencji Wywiadu) i de lege ferenda (Projekt ustawy o Agencji Bezpieczeñstwa Wewnêtrznego z 1 sierpnia 2013 r.). W pierwszym przypadku znaczenie maj¹ przepisy karne ustawy, czyli art. 153b–153d (Rozdzia³ 10a), natomiast w drugim przypadku adekwatne regulacje od art. 197 do art. 199 Projektu z 2013 r. (Rozdzia³ 10). Zarówno w Ustawie o Agencji Bezpieczeñstwa Wewnêtrznego i Agencji Wywiadu z 2002 r., jak i w projek- cie ustawy o ABW z 2013 r. ustawodawca penalizuje wykorzystanie przez funkcjonariuszy in- formacji uzyskanych podczas lub w zwi¹zku z pe³nieniem obowi¹zków s³u¿bowych do wp³ywania na dzia³alnoœæ organów w³adzy publicznej, przedsiêbiorców lub nadawców, redakto- rów naczelnych, dziennikarzy i osób prowadz¹cych dzia³alnoœæ wydawnicz¹. W tekœcie analizo- wane s¹ równie¿ regulacje dotycz¹ce penalizacji tajnej wspó³pracy funkcjonariuszy ABW z nadawc¹, redaktorem naczelnym, dziennikarzem i osob¹ prowadz¹c¹ dzia³alnoœæ wydawnicz¹. 154 Remigiusz ROSICKI