Military Review

Digital Cyber ​​Shield

12
The armed forces of the Russian Federation will acquire their own digital shield to protect against various cyber threats. The Russian Defense Ministry plans to complete the formation of a special structure by 2017, the main task of which will be the protection of critical facilities for the Russian armed forces from hacker attacks. In 2013, the Russian Ministry of Defense has already announced its plans to create a new branch of service, designed to combat various cyber threats. And Defense Minister Sergei Shoigu even made statements about the start of a “big hunt” for domestic programmers, which was dictated by the large volume of software that the army needed in the very near future.


Questions about the creation in Russia of an analogue of American cyber command periodically get into the media. According to sources of the Russian agency Interfax, which are familiar with the situation in the Russian Defense Ministry, at the first stage of its development, this structure will function as the main department of the Russian Defense Ministry, acting as part of the East-Kazakhstan region troops. Gradually, the list of tasks that Russian cyber command will have to solve will emerge.

For example, in an interview with Russia 24 channel, Russian Deputy Prime Minister Dmitry Rogozin, who oversees the development of the defense industry, noted that the unit that is being created to ensure Russia's security in the electronic environment, along with reflection and protection from cyber attacks, will also be engaged in developing Russian BY. As Dmitry Rogozin noted, if all the software is imported, we simply will not know what may be in this “black box”, in this case it will be impossible to say anything about cybersecurity. From the lips of Russian officials sound quite serious statements. But how to solve the problem with the selection and training of specialists, and most importantly, with their retention at work in government agencies, is still not entirely clear.

Digital Cyber ​​Shield

The terms of the Russian cyber command formation were called different: until the end of the 2013 of the year and in the 2014 of the year. Now, apparently, the final date of their formation will be 2017 year. According to the 2017 year, according to the Chief of the 8 Department of the General Staff of the Russian Federation, Yuri Kuznetsov, the Ministry of Defense expects to create a special structure designed to ensure the security of military facilities from various computer attacks from the outside. According to Yuri Kuznetsov, work in this direction is carried out in stages and should be completed by 2017 year.

Recall that a year ago, Russian President Vladimir Putin signed a decree "On the creation of a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation." This system was supposed to be one of the structures of the FSB. In the summer of 2013, it was reported that the Russian Ministry of Defense plans to create in the country a separate branch of troops to effectively combat cyber threats. These troops were to be created by analogy with the American cyber command and engage in the fight against cyber threats and monitoring and processing information coming from outside. Dmitry Rogozin wrote for the first time about the creation of his own cyber command in Russia back in March 2013.

It is worth noting that the emergence of a separate cyber security structure within the Russian Defense Ministry is quite a logical continuation of the modernization of the entire national information security system of our state. In particular, the emergence of this structure in the Russian Armed Forces contributes to the gradual transition of our army to military equipment, armaments, and combat control systems with a very high proportion of modern digital components, said Yevgeny Yushchuk, who is an expert in competitive intelligence.

Yuschuk notes that, looking at photos of any modern exercises of our army, you can see a large number of laptops that are protected from dirt, shock, dust, combat control systems, which are based on modern computer technology, etc. Nowadays there are many so-called smart systems that are able to coordinate the actions of units and individual soldiers on the battlefield. So, if these systems exist today and are actively used, then there will be attempts to hack them. In particular, information has already appeared about how the Iranians managed to intercept the American UAV, simply hacking into its system and taking over control.


How exactly the new Russian structure of cyber defense will look like, the experts still find it difficult to answer, which is explainable in principle, since such systems can most likely be classified as state secrets. But the approximate composition of the components and the list of objects that need protection can be predicted. This, in particular, was taken up by Viktor Litovkin, executive editor of the popular newspaper “Independent Military Review”. According to him, the structure being created in Russia will consist of a number of layers of cryptographic, technical, electronic protection, as well as a large number of other systems that can duplicate each other, as well as protect critical structures for the Russian Defense Ministry. First of all, we can talk about control points for various types of weapons, especially the Strategic Missile Forces, anti-missile and air defense systems, main headquarters and command posts.

At the same time, Litovkin stressed that a certain element of protection against cybernetic threats exists in the Russian army quite a long time ago - unlike the armies of some foreign states. For example, none of the channels of transmission of official information of the Ministry of Defense of the Russian Federation has access to the Internet, which, in turn, significantly reduces the possibility of a potential adversary to conduct cyber attacks.

As Sergey Oznobishchev, a member of the Council on Foreign and Defense Policy, noted that today, heightened attention to cybernetic threats is a feature that is characteristic of all developed armed forces in the world who show proper care about their military power. This threat is natural enough and easy to understand - this is the kind of impact that can completely or partially disable entire systems of modern armaments, the Strategic Missile Forces, cause disruption of interaction on the battlefield. That is why today each country decides for itself on what scale to deal with this problem, understanding that this problem is serious enough, which means that it needs appropriate attention.

Information sources:
http://rus.ruvr.ru/2014_02_02/Minoboroni-formiruet-cifrovuju-zashhitu-5309
http://eurasian-defence.ru/node/26569
http://finam.fm/read/11578
http://polit.ru/news/2014/01/30/defence
Author:
12 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. Zubr
    Zubr 7 February 2014 11: 05
    +3
    According to him, the structure being created in Russia will be a series of layers of cryptographic, technical, electronic defense, as well as a large number of other systems that can duplicate each other, as well as protect critical structures for the Russian Ministry of Defense. First of all, we can talk about control centers for various types of weapons, especially the Strategic Missile Forces, missile and air defense systems, main headquarters and command posts.


    Think right. In the future, this will be the most painful place.
    1. brainkiller
      brainkiller 7 February 2014 15: 54
      -1
      Quote: Zubr
      First of all, we can talk about control centers for various types of weapons, especially the Strategic Missile Forces, missile and air defense systems, main headquarters and command posts.

      I don’t understand from which organ these systems became vulnerable to cyber threats in general? They are isolated. As well as all means of ZAS.
  2. And Us Rat
    And Us Rat 7 February 2014 11: 28
    +2
    information about how the Iranians managed to intercept an American UAV by simply breaking into its system and taking control.

    Damn, zhurnalyugi quite people already keep for fools, if only consulted with experts before writing nonsense. sad It seems that they have a mandatory full-time internship on REN-TV. No.

    Headings in pers:
    "Archaeologists have discovered a primeval car parking lot"
    "Toads explode in Germany"
    "A boy raised by a candelabrum is found in Monte Carlo"
    "A chainsaw fish started up in Pripyat"
    "A group of lost schoolchildren was led out of the forest by an earthworm"
    "Irkutsk misanthrope raped anthills"
    "The bugs ate the border guard"
    "The hairdresser made his panties out of his hair"
    "The Easter Bunny killed the father of seven children"
    "The court fined the rooster for crowing too loudly"
    "Three unknown assailants attacked an unidentified"
    "Scientists have identified a gene from which sperm turns green and glows"
    "The royal family was shot from a secret blaster"
    Etc. etc. fool
  3. rolik2
    rolik2 7 February 2014 11: 52
    0
    Yushchuk notes that by looking at photographs of any modern exercises of our army, you can see a large number of laptops that are protected from dirt, shock, dust, combat control systems that are based on modern computer technologies, etc.

    This phrase was finished off completely, the author probably does not know that army laptops work through closed communication channels, which hackers simply do not have access to.

    At the same time, Litovkin stressed that a certain element of protection against cybernetic threats exists in the Russian army quite a long time ago - unlike the armies of some foreign states. For example, none of the channels of transmission of official information of the Ministry of Defense of the Russian Federation has access to the Internet, which, in turn, significantly reduces the possibility of a potential adversary to conduct cyber attacks.

    Which is partly not true, for the reason that the majority of channels are leased to various companies.
  4. abrakadabre
    abrakadabre 7 February 2014 12: 55
    0
    the formation of a special structure whose main task will be to protect objects critical for the Russian armed forces from hacker attacks.

    Which one does it write? Since when have at least some of the Sun's channels been connected to the Internet? In addition to personal cell phones of military personnel and office computers of former profyursetki Serdyukova. Here, hackers can hack something only by armed assault on a KP or communication center.
  5. Duke
    Duke 7 February 2014 13: 42
    0
    It is gratifying to hear about planned developments of our own.
    1. AVV
      AVV 7 February 2014 21: 02
      0
      Quote: Duke
      It is gratifying to hear about planned developments of our own.

      Quote: Duke
      It is gratifying to hear about planned developments of our own.

      It’s necessary not only to create your own software, but generally to replace imported software, by definition. The first to be replaced is windows, and then in order !!! Our Russian network should be a network on the network where it would be easier for the user to work and protect themselves against the same NBA threats, protect yourself from viewing your data with foreign eyes and ears !!!
  6. Net
    Net 7 February 2014 13: 55
    +1
    I see few here are aware of the scale of cyber threats from our "partners". I suggest you read the materials from Snowden http://habrahabr.ru/post/209746/
    1. brainkiller
      brainkiller 7 February 2014 16: 03
      +1
      Quote: Netto
      I see few here are aware of the scale of cyber threats from our "partners".
      For us, he did not say anything new, in our special departments that check all foreign equipment in the BEC entire buckets of these spy stuff soldier
      1. Meteor
        Meteor 8 February 2014 12: 47
        0
        Quote: brainkiller
        He said nothing new to us, in our special departments, checking the entire foreign equipment in BEC whole buckets of these spy stuff soldier

        The introduction of trojans at the hardware level through a change in the polarity of the dopant
        “In recent years, the topic of hardware trojans has attracted the attention of governments of different countries, and manufacturers, and the scientific community.”

        “A group of researchers from the United States, the Netherlands, Switzerland and Germany published a scientific paper describing an exceptionally secretive method of introducing trojans into a microcircuit - in such a way that malicious changes cannot be detected either under a microscope or using functional tests. "

        “The method consists in changing the polarity of the dopant in certain sections of the transistor in such a way as to change the properties of the transistor in a predictable way.”

        “Dopant is a modifying additive that increases the electrical conductivity of a material, a standard part of the chip manufacturing process.”

        More details in the article: http://www.xakep.ru/post/61264/
  7. Meteor
    Meteor 7 February 2014 14: 35
    0
    information about how the Iranians managed to intercept an American UAV by simply breaking into its system and taking control.

    COMMERCIAL BREAK
  8. I think so
    I think so 7 February 2014 20: 41
    +1
    While they are going to form a "digital shield", there may already be no one to defend ...
  9. studentmati
    studentmati 7 February 2014 22: 27
    +1
    The effectiveness of cyber weapons is beyond doubt.
  10. studentmati
    studentmati 7 February 2014 22: 43
    0
    I'm not afraid to be mistaken, but the most recent example of a cyber attack is the disaster at the Sayano-Shushenskaya hydroelectric power station. "Stuxnet"
  11. konvalval
    konvalval 7 February 2014 23: 38
    0
    Quote: studentmati
    I'm not afraid to be mistaken, but the most recent example of a cyber attack is the disaster at the Sayano-Shushenskaya hydroelectric power station. "Stuxnet"

    It was a criminal negligence under the guidance of a rusty bit, but he got out of here too.
    1. studentmati
      studentmati 7 February 2014 23: 46
      0
      Quote: konvalval
      criminal negligence


      Article 293. Negligence

      [Criminal Code of the Russian Federation] [Chapter 30] [Article 293]

      1. Negligence, that is, failure to perform or improper performance by an official of his duties as a result of an unfair or careless attitude to the service, if this entailed causing serious damage or a substantial violation of the rights and legitimate interests of citizens or organizations or the interests of society or the state protected by law,

      And I basically say the same thing - criminal negligence, in the form of assuming the possibility of a cyber attack.
  12. scientist
    scientist 8 February 2014 15: 00
    0
    The Russian Defense Ministry has already announced its plans to create a new type of troops designed to combat a variety of cyber threats
    If this is a branch of the army, then what will they take into service? In principle, of course, you can buy good sniffers and scanners, but there will be much more doubt about the reliability of these commercial products. But seriously speaking, the pace of development of information technology in the troops is very high, and we still do the security certification in the old fashioned way. For example, if foreign electronics, then only the customer paid. No one delves into the functionality of the element base, where 100% there are hundreds of undeclared functions. One condition - it works, okay, the main thing is not to connect to the Internet. Of course, there is also its own electronics and software, but it is very small and expensive, because it is single. The main reason is that the numerous private firms and molds that the RF Ministry of Defense has grown in earn huge profits for certification, without bearing any personal responsibility and not particularly straining.
    Therefore, the Ministry of Defense needs to create not troops with strange weapons, but serious research institutes and design bureaus, where professionals (scientists and engineers) will work in the field of information security, where they will be engaged in verification of security systems on a scientific basis (and not a finger to the ceiling). For this, first of all, it is necessary to take away licenses for the certification of computer technology and information products from all kinds of left-wing private firms and organizations, which, thanks to excess profits, attract specialists to themselves. Then begin training in military schools, and not catch programmers and hackers like in the movies.