How our army is waiting for its Stuxnet

    On New Year's Eve, 2012, the press service of the Ministry of Defense of Russia became generous and invited a dozen bloggers to one of the key nodes of the missile defense of our Motherland, a circular radar station with a phased array " Don-2N ".
    This unique station provides control of the outer space of Russia and the CIS from attacks by ballistic missiles, at an altitude of up to 40,000 km, tracking up to 100 targets and simultaneously guiding several dozen anti-ballistic missiles at them. In 1989, it was adopted, and in 1996 it was put on combat duty.



    The management system for all these facilities is built on the basis of the domestic Elbrus-2 microprocessor ,Elbrus-90mikro "(allegedly). From the moment of construction, the complex still copes with its tasks (more than 20 years!), For which there is a low bow to Soviet electronic engineers. Elbrus should have OS MSVS , which is quite logical, because the enemy doesn’t sleep, but, it seems, the wallpapers are too boring, so they called MS Windows to help.Well, it’s not a sin to put a flash drive with your own warez into it ...

    First, the tour passes through the Central command post of the Moscow missile defense system A-135 :



    Familiar windows on the real-time monitoring screen:



    This report clearly shows that Windows XP is on duty stations, with beautiful animated screensavers (which, by the way, are executable files and, of course, are not certified):



    In principle, Windows XP and 7 themselves are certified by FTEK and can be used to process information constituting state secrets, there are no questions. Move on.

    Command station radar Don-2N:



    Oh, what is this?



    Total Commander .. ???

    It seemed? We rub our eyes with the help of other bloggers:







    Judging by the hologram-sealed monitor, the computer passed a special check and it is officially allowed to process state secrets, only certified programs should be there (otherwise, what's the point in certification of iron). Total Commander does not have any certificates, which, in principle, is understandable. The abundance of icons on the taskbar and the 7-s desktop suggests bad thoughts about the abundance of trash installed on the machine.

    It seems that it was from her that a beautiful picture was displayed on the main screen of the KP:



    I hope that this really was just a demonstration for bloggers, and in combat mode it looks something like this, and really works under the control of the MSVS OS:



    In any case, even if this computer is not directly tied to radar control, secret information circulates on it, because he is certified for this, but no one is watching what soldiers are installing there. Judging by the photos and videos from the CP, it is very likely that Windows-based machines are used to render beautiful three-dimensional images, which means that all the secret information about the situation flows onto them.

    The problem is that at this stage in the development of our army, its total computerization, and the officers responsible for ensuring the regime of secrecy, as a rule, are mature people who generally hardly understand what a computer is. For them, the main thing is that appropriate certificates and other paperwork should be drawn up on these boxes, cases will be sealed, the software fate of the iron does not bother them at all. At the same time, young soldiers working on these machines drag anything on them, install their software, connect their drives and devices. With the introduction of information technology, gouging in the army goes to a new level, when even an innocent attempt by an attendant to play Angry Birds on an office computer can derail all national security. At the same time, our presidents are loudly matronizing the US State Department and are looking for spies around.

    Everyone remembers the Stuxnet virus story well, which was able to disable the Iranian uranium processing plant. To do this, he did not need remote access to the system, an Internet connection, or even administrator privileges on the machine. Enough of one single connection of the infected flash drive to the factory computer ...

    Another story when the control system of American drones was infected, again with the help of removable drives and all kinds of varez on them. And this is happening in a country with a high culture of information security, because such technologies have been used there for decades!

    I'm not paranoid and I don’t think that the CIA has a backdoor in every program. I know very well how they relate to the secret in our valiant army, but it’s one thing to have some general staff kilometers that no one needs for a long time, and completely different information on the KP of the key missile defense link !!!
    Waiting for your Stuxnet, gentlemen generals ???

    PS

    It will be interesting to see in the comments other photos / videos with a similar mess on sensitive objects.

    PPS

    Recently, a group of diggers (it’s not clear how to correctly name them) climbed onto the most secret facility in Moscow, NPO Energomash named after Academician V.P. Glushko, which is the leading company in the world in the development of powerful liquid-propellant rocket engines for space launch vehicles. Just walked through a hole in the fence ! Went there for 5 nights. No one noticed them, although there were cameras until beautiful photos appeared in LiveJournal .

    Also popular now: