Military Review

A secure communication system is being created for the Russian defense industry.

34
The United Instrument-Making Corporation is creating a secure communication system for defense enterprises and a number of departments, such as the Ministry of Defense and the Ministry of Industry and Trade, the newspaper reports MIC with reference to the press service of the enterprise.


A secure communication system is being created for the Russian defense industry.


“The system supports all data transfer functions that are necessary in modern enterprises: IP-telephony, mobile communications, video conferencing, trusted e-mail and remote access to information and computing resources. It is planned that the development will be implemented in such large companies of the military-industrial complex as UAC, Uralvagonzavod, Russian Helicopters, OPK, etc., ”the release says.

According to the press service, “the system is interdepartmental in nature, its task is to ensure the reliability and protection of data transmission (including classified as“ top secret ”), the integration of information systems of enterprises participating in the state defense order. It is designed to simplify document flow and increase the efficiency of contract performance within the framework of the state defense order. ”

It is noted that "the development is based on domestic telecommunications equipment, computing equipment, means of cryptographic protection and trusted software of Russian production."

At the first stage, which should be completed before the end of this year, more than 250 enterprises are planned to be included in the system.
Photos used:
Donat Sorokin / TASS
34 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. Mountain shooter
    Mountain shooter 19 January 2016 15: 01 New
    +3
    Finally. And then such information is sent over the network - no spies are needed. Download yourself ...
    1. An64
      An64 19 January 2016 15: 18 New
      +7
      I wonder what kind of information is being sent? Are you saying this just like that or competently?
      If the company has a license and works with secrets, there will be no fools (and if it is, it’s hard) to send closed information on an open network. More expensive for yourself. The security guards will figure it out (and this is calculated elementarily), eat it with giblets and put it out with a wolf ticket.
      And what is on the network is balabol from home computers pour. So no secure network will help.
      1. Dembel77
        Dembel77 19 January 2016 15: 24 New
        +1
        Probably the OS will be ROSA. Doesn't hack.
        The distribution for the servers is called Rosa Enterprise Linux Server (RELS), based on Red Hat Enterprise Linux.

        The main products of the company are distributions certified by the FSTEC and the Ministry of Defense of the Russian Federation, which bear the names of metals - “Cobalt”, “Nickel”, “Chrome”, their support and layout by software. These options are not in the public domain.

        Initially, the ROSA group of companies was formed. 18.02.2010/10.08.2011/11.03.2012 ROSA CJSC was registered. 2014/XNUMX/XNUMX a subsidiary of ROSA LAB LLC was registered. XNUMX/XNUMX/XNUMX created by STC IT ROSA. As a result of the reorganization of the group of companies in XNUMX, ROSA CJSC and ROSA Lab LLC were liquidated. Currently, the development of the ROSA OS line is concentrated in the NTC IT ROSA LLC (Scientific and Technical Center for Information Technologies "Russian Operating Systems").
        1. Sunseich
          Sunseich 19 January 2016 15: 28 New
          0
          the OS that the military spit on because of putrefaction (that is, buggy)))
      2. Sunseich
        Sunseich 19 January 2016 15: 27 New
        +2
        the best defense is the one that is not known
        I don’t understand, why ring the bell about it in all the villages and villages?
        you can hack everything. It takes only time. This is the emphasis: when hacked - = already this information is irrelevant
      3. Starover_Z
        Starover_Z 19 January 2016 19: 18 New
        0
        Quote: An64
        If the company has a license and works with secrets, there will be no fools (and if they are, then) to send fools closed information over an open network. More expensive for yourself.

        I work in the IVC ... (hereinafter I am simply silent). From Soviet times, on some walls, metallized foil remained under special perforated gypsum plates. They say for shielding, protection against reading. Own PBX network for communication with all subscribers.
        And the second department was, say secretaries, and now there is, but .. It's good, but everything is already past ...
        And I am writing this against the backdrop of an optimistic article because, for example, we have all the long-distance, interstate communication, probably for the sake of economy, for the so-called reliability and increase in the exchange rate, they were given to MOBILE OPERATORS!
        That's all secrecy to you !!
      4. user
        user 19 January 2016 21: 40 New
        0
        So no secure network will help.


        So the other day, the Minister of Communications with foam at the mouth argued that the Russian Federation does not need its own operating system. And taking into account that all OSs are not written by us and we don’t have them open (except LInux) and if we add to this that all communication equipment and network software are also with the same problems and not produced by us, then what kind of secrecy in telecommunication networks you can speak.
        The only thing now being done is physically disconnect computer networks from Internet connections.
    2. vodolaz
      vodolaz 19 January 2016 15: 24 New
      0
      This is good, as I understand it, the same Americans have a closed network for defense.
      1. cap
        cap 19 January 2016 19: 21 New
        0
        link
        Quote: SanSeich
        the best defense is the one that is not known
        I don’t understand, why ring the bell about it in all the villages and villages?
        you can hack everything. It takes only time. This is the emphasis: when hacked - = already this information is irrelevant

        Quote: vodolaz
        This is good, as I understand it, the same Americans have a closed network for defense.

        Quote: Sura
        Under the USSR, this was called the ZAS cabinet in the army and was subordinate to the Special Department.


        Three opinions and all three are correct. Since a person realized that using smoke it is possible to transmit information, it is possible to count down the birth of the communications forces. The mammoth skin with signals is the first document with a signature stamp. This is a joke. Hello to the Specialists.
        In my memory, they fell silent in the presence of strangers, even if the conversation was about the weather.
        "Shut up, shut up" is about them.
        I am sure the traditions are the same today.
        Therefore, if they write something, this is already the property of yesterday.
        But such news is good. Because, the service is alive, the traditions are alive hi .
    3. Sura
      Sura 19 January 2016 15: 26 New
      +2
      Under the USSR, this was called the ZAS cabinet in the army and was subordinate to the Special Department.
      1. Dembel77
        Dembel77 19 January 2016 15: 30 New
        +2
        Here is the information from the office. site
        For processing information constituting a state secret
        The ROSA CHROM family of operating systems is certified by the FSTEC of Russia in the desktop and server versions. It is recommended for processing information constituting a state secret with a signature stamp no higher than “secret”.

        OS ROSA DX "CHROME" 1.0 for desktop systems. Certified by the FSTEC (certificate No. 3194 until 24.01.2017/4/3) with built-in means of protection against unauthorized access to information - for compliance with RD SVT in class XNUMX and RD NDV in level XNUMX control.

        ROSA DX OS CHROME 1.0 is available for Intel i686 and Intel x86-64 architectures.

        OS ROSA SX "CHROME" 1.0 for servers. Certified by the FSTEC (certificate No. 3193 until 24.01.2017/4/3) with built-in means of protection against unauthorized access to information - for compliance with RD SVT in class XNUMX and RD NDV in level XNUMX control.

        ROSA SX CHROME OS 1.0 is available for Intel x86-64 architecture.

        ROSA DX NICKEL 1.0 operating system is certified by the Eighth Directorate of the General Staff of the Armed Forces of the Russian Federation. Currently exists only in the desktop version. It is recommended for processing information constituting a state secret with a signature stamp no higher than “secret”.

        ROSA DX NICKEL OS 1.0 for desktop systems. Certified (until the spring of 2017) by the Eighth Directorate of the General Staff of the Armed Forces of the Russian Federation, with built-in means of protection against unauthorized access to information - for compliance with RD SVT in class 4 and RD NDV in level 3 control.

        ROSA DX NICKEL OS 1.0 is available for Intel i686 and Intel x86-64 architectures.
        Everything is. ROSA Fresh Custom OS - for home use. Link
        http://www.rosalinux.ru
        1. Vita vko
          Vita vko 19 January 2016 15: 46 New
          +1
          Quote: Dembel 77
          http://www.rosalinux.ru

          I wonder how things are with the drivers for this OC or the standard ones for Linux.
          1. Ajent cho
            Ajent cho 19 January 2016 16: 48 New
            +1
            what is the situation with the drivers for this OC or the standard ones for Linux
            This OS is based on Mandriva, incl. with drivers the order. The problems are different.
    4. gormih
      gormih 19 January 2016 16: 05 New
      +2
      There is nothing to transmit here ...
      One of the top managers of a rather large enterprise on a computer with documents had Skype secretly, I personally saw this.
      The question is - where did the FSB look ...
      1. scientist
        scientist 19 January 2016 18: 11 New
        +1
        Quote: gormih
        One of the top managers of a rather large enterprise on a computer with documents had Skype secretly, I personally saw this.
        The question is - where did the FSB look ...

        A similar question may be asked of you. Article 190 of the Criminal Code of the Russian Federation “Failure to report crimes” may be supplemented in view of special circumstances.
  2. BaLaLaykin
    BaLaLaykin 19 January 2016 15: 01 New
    +1
    It’s time, something dragged on with this issue
  3. Monos
    Monos 19 January 2016 15: 02 New
    +4
    And on what axis will it all "fly"? winked On the "Windows", or what?
    1. BaLaLaykin
      BaLaLaykin 19 January 2016 15: 06 New
      +3
      on Raidix (SHD), Elbrus (workstations, servers), Zarya (workstations, servers), Astra Linux (workstations, servers, switching equipment, mainframes), and Windows completely sucks
      1. Monos
        Monos 19 January 2016 15: 19 New
        +8
        Quote: Lalaika
        on Raidix (SHD), Elbrus (workstations, servers), Zarya (workstations, servers), Astra Linux (workstations, servers, switching equipment, mainframes), and Windows completely sucks


        And there is money to develop and support a unified system, to finalize it in real time, to support the wild number of new equipment, to support millions of illiterate users in the system, to be compatible with a wild number of third-party formats, to support or create unique applications after at microsoft ...? To safety in the end?
        Does the example of Germany tell you anything? After two years of ordeals, they still returned ... Where? Right. To small ones. hi
        1. BaLaLaykin
          BaLaLaykin 19 January 2016 15: 27 New
          +1
          Linux already has a bunch of prog
          Astra Linux (workstations, servers, switching equipment, mainframes)

          The Russian company Rusbitech launches the Astra Linux OS family. The company's product portfolio is quite wide. There are versions that work on standard x86 hardware, there are distributions for ARM architectures and the mainframe.
          The company singles out as the main vector of development the provision of safe work with information up to the level of “top secret”. All special-purpose distributions — Smolensk, Tula, Novorossiysk, and Murmansk — include software components that expand their functionality from a security point of view.

          These OSs are certified by the FSB, FSTEC and the Ministry of Defense. The systems have a mandatory access model, plus support for Russian cryptographic standards and hardware. The developers pay special attention to the fact of creating information protection means on their own, and not on the basis of foreign
          th prototype.
          The Eagle release serves as a general-purpose operating system. If the distribution of special-purpose OSs is limited, then the distribution kit for the general-purpose version is available for free download. The distribution itself is based on the popular Linux Debian version. The system has added its own window manager. Most of the libraries available in the OS are fairly recent, which together gives a good
          compatibility with modern hardware and software and high performance.
          250 already found, but Germany is not credible in this matter hi
        2. Ajent cho
          Ajent cho 19 January 2016 16: 51 New
          0
          Does the example of Germany mean anything to you? After two years of ordeals, they still returned ... Where? Right. To small
          Germany (Munich, I think?) Has returned, many others have jumped off and are not going to return. This is not an example, especially when rollbacks are mentioned.
      2. Monos
        Monos 19 January 2016 15: 33 New
        +4
        Yes! And by the way:
        You don’t need any Russian operating systems that journalists like to ask about. We need global projects, we need integration, at least with our BRICS counterparts.


        Who do you think stated this? Nikolai Nikiforov - Minister of Communications and Mass Media! No illusions needed. In order to create a fully protected native "web", you must either reformat the entire industry, or build it on a fundamentally and ideologically new equipment.
        1. BaLaLaykin
          BaLaLaykin 19 January 2016 15: 37 New
          0
          and what has Nikiforov to do with it? We are talking about defense industry enterprises, these are different things
          1. Monos
            Monos 19 January 2016 15: 53 New
            +4
            Nikiforov is the minister. Do you think state institutions are not included in this area?

            Good. Let's talk about industry. CNC machines and robots, GLONAS and other launched satellites, CAD systems, hundreds of thousands of units of smart and not-so-technically advanced chips, Fleet and Aviation, oil production and nuclear power ... Do you want to list more? All this will need to be paired and reflashed. Is it possible now?
            1. BaLaLaykin
              BaLaLaykin 19 January 2016 15: 57 New
              0
              the minister is not from that area, we are talking about defense enterprises. now we are talking about 250 enterprises where this will be done and once again I will repeat to you, your Windows is AWAY !!!
              1. Monos
                Monos 19 January 2016 16: 22 New
                +5
                First, you misunderstood me: I didn’t protect Windu (and it’s not mine), I’m just skeptical about her; secondly, I talked about the impossibility of building an open network without the development and implementation of an absolutely unique software product, which, in turn, is impossible for the above reasons.
                So, at this stage - a good, old paper workflow! This is the only way to keep secrets.

                Remember why the states spoiled the Crimean spring? Because Putin did not discuss these issues by telephone! And did not advise others. laughing
    2. Maxom75
      Maxom75 19 January 2016 15: 28 New
      +1
      most likely good old Linux.
  4. Mihalich17
    Mihalich17 19 January 2016 15: 07 New
    0
    Oh, I'm sure that we powdered our enemies' brains and "have" them in full! )))
    Who is this genius in our leadership, huh?
    I can imagine how the neocons are raging in the west now; "This cannot be! Russia is torn to shreds! Where did they get THIS ALL ???")))
    I love you, my Motherland, Mother Russia !!!
    With all my heart I love !!!
    - Yes, at least MINUSE to death! Morons b ... be! )))))))
    1. 3 Gorynych
      3 Gorynych 19 January 2016 15: 18 New
      0
      dust the wrong word! Vorogi probably do not remember how the secret packages look - they are used to everything on flash drives ... but now they will generally fall into the support! Russians also have computers !?
    2. Boos
      Boos 19 January 2016 15: 18 New
      +3
      I envy you kindly ...))) I would like your confidence!))
      1. Mihalich17
        Mihalich17 19 January 2016 15: 19 New
        +2
        You can only BELIEVE and LOVE in Russia!
        ... We have one, comrade! One ...
  5. _Alexei_
    _Alexei_ 19 January 2016 15: 28 New
    0
    Only now it is a relief that it is vryatli, as we wrote on paper and we write it in electronic format.
  6. vladimir1958
    vladimir1958 19 January 2016 15: 32 New
    0
    Will it not work out like the Americans with Snowden?
  7. gormih
    gormih 19 January 2016 16: 08 New
    0
    Quote: Vita VKO
    Quote: Dembel 77
    http://www.rosalinux.ru

    I wonder how things are with the drivers for this OC or the standard ones for Linux.

    Suitable. Only she ceases to be a Dew, and you lose the security guaranteed by the state. acceptance.
  8. antiexpert
    antiexpert 19 January 2016 16: 11 New
    0
    still would have created a domestic operating system, so as not to feed the melkosoftov)))
  9. Gunther
    Gunther 19 January 2016 16: 15 New
    0
    Well, better late than never. The creation of a local, secure network is long overdue.
    I hope everything will be done as it should, and not on the black chalk.
    Quote: An64
    ... And what is on the network is balabol from home computers pour. So no secure network will help with this.

    A couple of times, when searching, I myself found service information with the first data (((
    If the entire data stream is encrypted "on the fly", then when you try, for example, at home, to copy from a stranded hard drive (you are a teenage mutant ninja turtle and screwed up a server with a screwdriver), you will be unpleasantly surprised. I'm talking about a railway disk. Copying to flash drives, etc. devices should be blocked by default.
  10. chelovektapok
    chelovektapok 19 January 2016 16: 52 New
    0
    What's the news about? More Tov. Stalin and L.P. Beria attached great importance to the protection of communications. Rare devices that use encoding in amplitude and frequency can be viewed in special museums. They have forgotten about the protection of information today7 As if not a sabakashvili to post a disposition map on the internet. Although the jumpers still may not have this. Miserabli relict, even sitting in the boilers of Ilovaisk, Debaltsevsk and others, had intercourse with each other through social networks. Dofiga of such "selfies", where in the morning they have a bite and in the afternoon militiamen with supplements for their parents post them in the form of a bloody rag, they say, take them away for burial of your "super-stupid".
  11. gridasov
    gridasov 19 January 2016 16: 59 New
    -1
    Only the transition to radial mathematical structures. and if we talk about a more fundamental level, then the transition to a function of a constant value of a number can make information that remains in the public domain and make it inaccessible for contact with it. Otherwise, there will always be ways to “calculate” very quickly and find information hidden as its “package”. In mathematics, concepts such as infinite series of numbers are still considered. But on the basis of only nine numbers, a series cannot be infinite in the combination of these numbers. It's just that there is not enough brains to know how to turn any series into an algorithm of these numbers, and therefore to build it as cyclically repeating combinations of the numbers themselves and their algorithmic components. However, the whole problem is solved by using the radial principles of constructing a mathematical number space. Then, in a combination of numbers, it becomes practically and theoretically even impossible to determine the required algorithm.
    Even a series of prime numbers can be expressed as a systemic combination of numbers, but not in a series, but in a spatial system of laws for constructing these primes.
  12. Gunther
    Gunther 19 January 2016 18: 32 New
    0
    Quote: gridasov
    ... Then, in a combination of numbers, it becomes practically and theoretically even impossible to determine the required algorithm.
    Even a series of prime numbers can be expressed as a systemic combination of numbers, but not in a series, but in a spatial system of laws for constructing these primes.

    Alas, Master, from the moment of the loss of the criteria of absolute truth (K. Gödel and G. Weil - outstanding mathematicians wrote about this), we are directly faced with a lack of certainty, from now on 2 + 2 is not equal to 4, and parallel lines intersect (!!!) ...
    The criteria of correctness became ephemeral and unsteady (((
    1. gridasov
      gridasov 19 January 2016 19: 33 New
      0
      To begin with. that two plus two equals four in the system of that technique. which we ourselves have chosen and whose answer we ourselves mean. Why? Because, based on the theory of analysis, everything looks completely different. That is, the individuality and polysemy of each component in such a calculation is absolutely not taken into account, which means that we neglect a huge number of parametric properties only in the name of the calculation and the result. All this means that mathematics is not only computation, but also the ability to perform complex analysis based on the use of numbers.
      Further. If you are a little more attentive to natural phenomena and processes, then parallel lines are an illusion imposed on oneself. Therefore, there are no direct events in nature. that it’s energetically impossible to sustain the process in the sense of how we imagine it in a straight line. It is always energetically impossible. Therefore, I would say, even differently, that there can be no parallelism since any straight line is part of a circle, and accordingly it is impossible to construct two circles with the same radii, so that they are parallel. Otherwise, we can also say that it is not the parallelism of straight lines that should be sought, but the regularities of the geometric interactions of spheres with the same radii. Therefore, we cannot but agree with you that it is necessary to build "castles on new foundations." Unfortunately, people are not all capable of feeling this, much less agreeing with new fundamental ideas. One of them is the function of constant value of a number, which is the basis of the mathematical theory of analysis.
      1. user
        user 20 January 2016 10: 14 New
        0
        then parallel lines are an illusion imposed on oneself


        Unfortunately, people are not all capable of feeling this, much less agreeing with new fundamental ideas.


        The thieves have completely confused us.

        All truth is guilty. hi
        1. gridasov
          gridasov 20 January 2016 10: 39 New
          -1
          See for yourself. The straight line is identified with the vector. In a real physical process, such a straight line should be considered as a process of interaction of the length of this straight line and its cross section, namely, that conciguration, which is energetically optimal, and hence the radial circle. And no matter how small it is, the relation will always be considered. Energetically, a straight line cannot be a reality, since it will always have a potential difference at its ends. This will be caused by external processes of influence relative to gravitational forces and temperatures and rotation speed relative to the Earth's precession axis, and much more. Therefore, in order to talk about a straight line as a system of energy transfer, for example, electricity or light, etc., you need to understand in which algorithms the amplitude of momentum transfer from one radius of the cross section to another along this vector will narrow and expand. This is why lines cannot be parallel. Because if we consider them from an energy point of view, then it is impossible to recreate an identical energy process in two straight lines in reality. Or am I wrong?
  13. Vlad5307
    Vlad5307 19 January 2016 19: 15 New
    0
    Quote: 3
    Thieves probably don’t remember how the secret packages look, they’re used to everything on flash drives ... and now they’ll fall into the support!

    In fact, I do not recommend getting into the support - this is part of the lathe, you can get injuries incompatible with life! But to fall into a stupor - m. and safe! laughing
  14. jonht
    jonht 20 January 2016 07: 57 New
    0
    Linux is a very good system, BSD systems have been created on the basis of its kernel, and it is not a little important that the stub (apple) has also been working on the Linux kernel (BSD) for 8 years already. As they say, take the core and hang on it whatever your heart desires or write it yourself.
    1. user
      user 20 January 2016 10: 18 New
      0
      As they say, take the core and hang whatever your heart desires on it, or write yourself.


      What the conversation is about, but the minister claims the opposite, but in order to hang whatever your heart desires, you need money, and the minister is against it, which means there is no funding for this idea, so the circle has closed.