Military Review

Ministry of Defense of the Russian Federation has purchased special "secret" flash drives

47
The Ministry of Defense continues to tighten the rules for working with digital information containing secret information News.




Until recently, each part independently resolved issues related to the security of secret electronic data.

From this year, military personnel who have access to classified information began to receive special flash drives with a unique number, for the safety of which personal responsibility was established. They are designed to eliminate data leakage.

The flash drives supplied to the troops have two colors: blue - for documents marked “for official use”, and red - for secret documents. You can access data recorded on removable media only after entering a PIN code. Any contact of the flash drive with the computer is fixed, which allows you to track at what time and where the information was sent.

Loss of the drive, as well as violation of the rules for working with secret digital information, will lead to cancellation of admission and disciplinary punishment, up to and including dismissal. If, in the actions of a serviceman, the corpus delicti specified in art. 283 of the Criminal Code "Disclosure of state secrets", the consequences may be much more serious - up to 7 years in prison.

According to the former head of the analytical department of the KGB of the USSR, Vladimir Rubanov, information protection technologies are constantly evolving. Of course, they increase security, but it is impossible to overestimate technical innovations, since those who want to “merge” information can simply remember it. In his opinion, the main problem in this area is working with people.
Photos used:
https://ru.depositphotos.com
47 comments
Ad

Subscribe to our Telegram channel, regularly additional information about the special operation in Ukraine, a large amount of information, videos, something that does not fall on the site: https://t.me/topwar_official

Information
Dear reader, to leave comments on the publication, you must sign in.
  1. Tank jacket
    Tank jacket 27 November 2018 11: 02
    +2
    A controversial decision - in some organizations in the business, USB ports are disabled.
    1. Svarog
      Svarog 27 November 2018 11: 07
      +6
      laughing Enter the PIN code .. a serious measure .. secrecy rolls over, and who is the manufacturer of these flash drives?
      1. Tank jacket
        Tank jacket 27 November 2018 11: 10
        +2
        Yes ... a good question, I remember the American super destroyer Zumwalt, which also "burned out" on Chinese chips.
      2. Berber
        Berber 27 November 2018 11: 13
        +7
        The decision is right. And they produce them in Russia.
        1. Sergey39
          Sergey39 27 November 2018 11: 41
          +1
          And so far, this has not happened? Strange, in theory, now it would be worth replacing a similar protection system with a more advanced one.
          1. Berber
            Berber 27 November 2018 11: 47
            +1
            Did not have. But media accounting has always been. This is all because unauthorized copying from a flash drive becomes a difficult task.
            1. kakvastam
              kakvastam 27 November 2018 12: 46
              +1
              Accounting was those carriers that issued.
              The problem is unaccounted for.
              And in the qualification of ZGTshnikov.
              1. Berber
                Berber 27 November 2018 12: 51
                +2
                All problems are from insufficient qualifications.
        2. Polite Moose
          Polite Moose 27 November 2018 17: 53
          +1
          Quote: BerBer
          The decision is right. And they produce them in Russia.

          With your permission I’ll insert my 5 kopecks. hi
          The device described in the article is a user's electronic identifier. It is tied to a specific person with certain access rights to the information network. You cannot enter the system without it in the USB port. In addition, a PIN code is requested at the entrance, so that an outsider does not use the identifier. In addition to restrictions on access rights, such an information security system implies recording and saving all user actions after logging into the system. The workstation is also blocked when it tries to connect an unregistered storage medium. You can't even connect a phone for charging with a standard interface cable. In our office (purely civilian), this information protection system has been in use for 4 years. It works very effectively, although, in my opinion, the security measures for the "jackets" are redundant. But for a military man - that's it. But, for a long, long time, they calved.
          1. Berber
            Berber 28 November 2018 14: 08
            0
            Super. We painted almost everything. good
            1. Polite Moose
              Polite Moose 28 November 2018 18: 12
              0
              Quote: BerBer
              We painted almost everything.

              This crap for me 4 years at work, the blood turns off.
    2. The black
      The black 27 November 2018 11: 08
      -2
      And what's the secret? ... The usual "key" ....
      1. Berber
        Berber 27 November 2018 11: 16
        +4
        Protection from the near and irresponsible.
    3. Machito
      Machito 27 November 2018 11: 10
      +6
      The main thing is to work with personnel to maintain secrecy, but in the age of digital technology, digital storage media must be reliably protected.
      Judging by the sanctions, the Kaspersky Lab delivers a lot of CIA inconvenience.
  2. Teberii
    Teberii 27 November 2018 11: 04
    0
    They are also protected from viruses. Or secret information can be carried home.
    1. The black
      The black 27 November 2018 11: 09
      +2
      Quote: Teberii
      They are also protected from viruses. Or secret information can be carried home.

      There is no information on these flash drives ..... As I understand it, we are talking about "flash drives-keys" for accessing a certain infa (databases). With this key, you can enter the database only from a certain computer.
      1. Tank jacket
        Tank jacket 27 November 2018 11: 13
        +4
        Any contact of the USB flash drive with the computer is recorded, which allows you to track at what time and where the information was sent. This is not a key or not only a key.
        1. The black
          The black 27 November 2018 11: 15
          0
          Quote: Tank jacket
          Any contact of the USB flash drive with the computer is recorded, which allows you to track at what time and where the information was sent. This is not a key or not only a key.

          absolutely right hi... just in this matter, the Ministry of Defense lagged behind other security officials. now catch up smile
      2. Genry
        Genry 27 November 2018 13: 18
        +1
        Quote: Black
        There is no information on these flash drives ..... As I understand it, we are talking about "flash drives-keys" for accessing certain infa (bases).

        This is not the key. This is a type of smart card, where access to internal data is provided by an encrypted (signed) command (read-write block).
        Such a flash drive is needed to transfer information between unrelated computer systems.
      3. Polite Moose
        Polite Moose 27 November 2018 18: 01
        0
        Quote: Black
        There is no information on these flash drives ..... As I understand it, we are talking about "flash drives-keys" for accessing certain infe (bases)

        Absolutely right.
        Quote: Black
        Using this key, you can enter the database only from a specific computer.

        You can enter the network from anyone, but from the moment the "big brother" logs in, all user actions (specific to whom the key was registered and who entered the PIN code) writes.
  3. Vanek
    Vanek 27 November 2018 11: 17
    -2
    If everything, ABSOLUTELY EVERYTHING from the case and cogs to the filling (transistors, capacitors and other lamps) domestic - super.

    If at least something foreign is worthless.
    1. KCA
      KCA 27 November 2018 11: 57
      +2
      I very vaguely imagine the possibility of taking information from a computer with a screw or a capacitor, how much power the transmitter can be installed in a screw, and even in a case, so that it can be caught not only in a protected room, but also from outside the protected area, or from -10 floors of an underground reinforced concrete bunker, taking into account the fact that computers either do not have access to external computer networks at all, or go to the networks of the Moscow Region itself
      1. Vinnibuh
        Vinnibuh 27 November 2018 13: 46
        -1
        It is not necessary to remove information with a "cog", it is enough to burn the computer at the right time. And depending on where he stands, the consequences are unpredictable.
      2. Vanek
        Vanek 28 November 2018 03: 19
        0
        Quote: KCA
        how much power can a transmitter be installed in the cog


        From extreme to extreme?

        Like a small child, really.

        I am so. In outline.

        hi
  4. The comment was deleted.
  5. Kapkan
    Kapkan 27 November 2018 11: 19
    +1
    Not a bad decision. A bit like a service weapon. It is issued surname, on admission, to trace the trace.
    But, it’s just like a gun - you need to work with its non-use, both unlawful and negligent, and not after the incident has already happened. But the beginning is not bad.
    In general, we need a control / monitoring service for social networks, for contacts of the military and their families. Up to relatives and their contacts.
  6. rocket757
    rocket757 27 November 2018 11: 21
    +2
    In principle, secure media has been used for a long time and diversely. They are being heard late, you have to keep up with progress and do it yourself, which is undoubtedly a plus!
    1. Polite Moose
      Polite Moose 27 November 2018 18: 04
      +1
      Quote: rocket757
      In principle, secure media has been used for a long time and diversely.

      This is not a carrier. This is the key.
      Quote: rocket757
      They are being heard late, you have to keep up with progress and do it yourself, which is undoubtedly a plus!

      Absolutely right. hi
      1. rocket757
        rocket757 27 November 2018 18: 31
        0
        Quote: Polite Elk
        This is not a carrier. This is the key.

        In the article, about the flash drive is written.
        How to use it, for storing secret information, this "string bag" is. If it contains an access code to a closed network, a specific computer, functionally it can be called a key.
        With flash keys, the story is very interesting, but it's a separate topic.
        According to the article, it's just a flash drive with a high level of protection of stored information .... something like that.
        1. Polite Moose
          Polite Moose 27 November 2018 19: 48
          0
          Quote: rocket757
          In the article, about the flash drive is written.

          We leave this to the conscience of the author of the article. But, I, as a rural doctor, want to tell you that the article describes the properties of an electronic identifier. E-Token is called. He has a form factor like a FLASH drive. But, I admit that perhaps there are devices that combine the functions of a key and a drive. I just did not come across. I will not argue. hi
          1. rocket757
            rocket757 27 November 2018 20: 41
            +1
            We won’t argue, because we already have everything to know, it’s impossible to say, especially since the authors do not always correctly / clearly describe the situation, things, etc. soldier
  7. alexhol
    alexhol 27 November 2018 11: 22
    0
    plus instructions on the CD, which after studying to destroy. bully
    1. rocket757
      rocket757 27 November 2018 12: 30
      0
      No, no, destroy before reading!
  8. KVU-NSVD
    KVU-NSVD 27 November 2018 11: 30
    +2
    I would add the removal of * red "drives outside the working area only with the approval of the relevant authorities, compatibility only with domestic OS and" burning "information on the flash drive after the third incorrect password entry attempt. But still [/ quote] the main problem in this area is working with people.
    [/ Quote]
    1. rocket757
      rocket757 27 November 2018 12: 28
      -1
      Quote: KVU-NSVD
      the main problem in this area is working with people

      The right question! Absolute defense against a fool, for example, was not invented, and even the admin, a lover of hanging out in shooting games, is still an ambush ... for privacy mode, for example.
  9. Nitarius
    Nitarius 27 November 2018 12: 07
    +1
    albeit weak measures .. but at least some kind of movement! than just letting everything go!
    1. rocket757
      rocket757 27 November 2018 12: 22
      0
      Normally, everything can be done. Protection from the fool and not very knowledgeable user, you can provide! Against specialists, protection is very conditional, but specialists are not at every corner.
      1. Polite Moose
        Polite Moose 27 November 2018 18: 19
        +1
        Quote: rocket757
        Against specialists, protection is very conditional

        Misconception. After installing such a system, the danger can only come from their own information security specialists (not even system administrators). Any external influence is blocked. And the entire engine of authorized users is written. In addition, even if a hacker penetrates the network, he ends up in several false information threads with a bunch of files with loud names and empty content. The "honey trap" is called. hi
        1. rocket757
          rocket757 27 November 2018 18: 39
          +1
          Quote: Polite Elk
          Erroneous opinion. After installing such a system, danger can come only from your information security specialists.

          Not like in the movies, of course, where the "specialists" are striped, and others too, I break the protection, codes and all that jazz ... this is a movie.
          In life, it’s more difficult and sometimes easier. ALL make mistakes! And those who should protect Old, and those who get Old! Nothing is predetermined!
          But in the fact that the most significant role is played by betrayal, it is undoubted!
          1. Polite Moose
            Polite Moose 27 November 2018 19: 52
            +1
            Quote: rocket757
            In life, it’s more difficult and sometimes easier.

            I agree. If you take a specialist with a key and hold something in his door, then he will hand over the pin code and tell about the stash from his wife. After that, you can perform any actions in the information network under his account. Within his competence, of course.
  10. egor egor
    egor egor 27 November 2018 12: 16
    -2
    Good flash drives would have thrown a good shoe to the boys, otherwise the bast shoes will last longer than modern boots
  11. Fox
    Fox 27 November 2018 12: 21
    -2
    The programmer reads the contents of the flash drive, and nothing is written anywhere! smile
    But well done - mastered the money! laughing
    1. kakvastam
      kakvastam 27 November 2018 12: 51
      +1
      Quote: Fox
      The programmer reads the contents of the flash drive

      and there according to GOST 84.
      If without this, then the truth is -
      Quote: Fox
      mastered the money
    2. user1212
      user1212 27 November 2018 13: 42
      +1
      Quote: Fox

      The programmer reads the contents of the flash drive, and nothing is written anywhere!

      If the memory chip and the controller are made in one housing and are powered by the same lines, then access is written even if the programmer is used. The data access data block on the memory chip may not have an erase or overwrite function. A flash drive can have hardware encryption on board, bypassing which reading from a flash drive does not make sense. It all depends on the implementation
      1. rocket757
        rocket757 27 November 2018 14: 54
        0
        The flash drive has long been no longer a string bag, into which everything is shoved, and then pulled out. It’s quite an intelligent device that can be protected!
  12. Wened
    Wened 27 November 2018 14: 00
    0
    anyone who wants to "merge" information may simply remember it

    sad
  13. koksalek
    koksalek 27 November 2018 14: 54
    -2
    And all the other "non-special" flash drives will miraculously disappear. Yes, but what about the price modestly kept silent? So as not to shock?
  14. The whistle
    The whistle 27 November 2018 16: 58
    0
    I’m not going to argue and be malicious, but this business needs to be sorted out somehow .. Such a mess is ideal in the sphere of circulation of electronic secret documents .. With what you need to start! And also, where is the Russian operating system and computers on our processors and components, for the state. institutions ..? They shouted and forgot, maybe they are intentionally blotting out this national project?