📜 ⬆️ ⬇️

How our army is waiting for your Stuxnet

On the eve of New, 2012, the press service of the Ministry of Defense of Russia became generous and invited a dozen bloggers to one of the key anti-missile defense units of our Motherland, a circular viewing radar station with a phased antenna array Don-2N .
This unique station provides control of the space of Russia and the CIS from attacks of ballistic missiles at an altitude of up to 40,000 km, tracking up to 100 targets and simultaneously targeting several dozen antimissiles. In 1989, it was put into service, and in 1996 it was put on combat duty.



The control system of all these facilities is built on the basis of the domestic Elbrus-2 microprocessor; Elbrus-90 micros are used as workstations for control terminals directly by the radar station (allegedly). From the moment of construction, the complex still copes with its tasks (more than 20 years!), For which I bow before the Soviet electronics engineers. On Elbrusy should be OS MSVS , which is quite logical, because the enemy does not sleep, but, you see, there is too boring wallpaper, so they called for help MS Windows. Well, and here it is not a sin to put a flash drive into it with your warez ...

First, the tour passes through the Central Command Post of the Moscow A-135 missile defense system:
')


Familiar windows on the live monitoring screen:



Here in this report you can clearly see that it is Windows XP on the workstations of the attendants, with beautiful animated screensavers (which, by the way, are executable files and, of course, not certified):



In principle, Windows XP and 7 themselves are certified by FTEC and can be used to process information that makes up a state secret; there are no questions here. Go ahead.

Command Post Radar Don-2N:



Oh, what is it?



Total Commander .. ???

It seemed? We wipe our eyes with the help of other bloggers:







Judging by the hologram sealed monitor, the computer has passed a special inspection and is officially allowed to process state secrets, there should be only certified programs (otherwise, what's the point in certification of iron). Total Commander has no certificates, which, in principle, is understandable. The abundance of icons on the taskbar and desktop 7-ki leads to bad thoughts about the abundance of trash installed on the machine.

It seems that it was from her that a beautiful picture was displayed on the main KP screen:



I would like to hope that this was really only a demonstration for bloggers, and in combat mode it looks something like this, and really works under the control of OS MSVS:



In any case, even if this computer is not tied directly to the control of the radar, secret information circulates on it, because He is certified for this, but no one watches what the soldiers put there. Judging by the photos and videos from KP, it is very likely that Windows-based machines are used to render beautiful three-dimensional images, which means that all the secret information about the situation flows to them.

The problem is that at this stage of development of our army, its total computerization takes place, and the officers responsible for ensuring secrecy, as a rule, are mature people who generally have difficulty understanding what a computer is. For them, the main thing is that the corresponding certificates and other paperwork are drawn up on these boxes, the cases are sealed, the program fate of the hardware does not bother them at all. At the same time, young soldiers, working on these machines, drag them into anything, install their software, connect their disks and devices. With the introduction of information technology, a breach in the army is reaching a new level, when even an innocent attempt by a person on duty to play Angry Birds on a service computer can derail all national security. At the same time, our presidents loudly swear at the US Department of State and search for spies.

Everyone well remembers the story of the Stuxnet virus , which was able to disable the Iranian uranium processing plant. For this, he did not need remote access to the system, internet connection, or even administrative privileges on the machine. One single connection of the infected flash drive to the factory computer was enough ...

Another story , when the control system of American drones was infected, again with the help of removable drives and all kinds of storage for them. And this is happening in the country, with a high culture of information security, because such technologies have been used there for decades!

I am not paranoid and do not think that a backdoor is built into every CIA program. I know very well how they treat the secret service in our valiant army, but one thing is some kind of General Staff kilometers that no one needs for a long time, and completely different information on the command line of the key link PRO ... !!!
We are waiting for your Stuxnet, gentlemen generals ???

PS

It will be interesting to see in the comments other photos / videos with a similar mess on sensitive sites.

Pps

Recently a group of diggers (it’s really not clear how to call them correctly) climbed to the most secret facility in Moscow, NPO Energomash named after academician V.P.Glushko, which is the world's leading enterprise for the development of powerful liquid-propellant rocket engines for space launch vehicles. Just went through the hole in the fence ! We went there for 5 nights. No one noticed them, although the cameras were there until beautiful photos appeared in LiveJournal .

Source: https://habr.com/ru/post/135681/


All Articles