dark light

IT for Russian Services

Basic Secure Computer Information Technologies for Russia’s Armed Forces

Valentin Solomatin, General Designer of Information Technologies of the Armed Forces of the Russian Federation

In many countries, modern computer technologies are used to design various information and automated control systems with the technologies’ development level directly affecting the research and technical progress, as well as economic and military potential of these nations.

Modern basic information technologies are a totality of methods of hardware and software applications for information
processing. Simultaneously with this development, new techniques emerge that can be used to disrupt the operation of automated control systems.

This situation sets up a new threat to Russia’s national security and requires an adequate response.

Information as a New Type of Combat Support

Combat operations in the conditions of active enemy counteractions require particular information support to enhance combat capabilities, increase the effectiveness of operational and fire support control.

The role and significance of this factor are so great that it can be considered as an independent type of combat support.

Basic information technologies can be used in two interdependent ways. On the one hand, over the last decade they have been used by the industrialized nations to inflict direct damage (producing destructive, distortion, or disinformation effects) to the enemy’s military and civilian control systems. These technologies have really become means of information warfare. On the other hand, they are also used to protect friendly control systems.

It should be noted that this opposition takes place in the conditions of Russia’s growing technological dependence in the sphere of modern basic information technologies.

In the conditions of limited funding resources, the development of control systems secured from the enemy information implementation of domestically developed basic information technologies.

These technologies must produce an effective software complex capable of functioning in the single information space of
Russia’s Armed Forces and include the following secure components:
• network operating system (OS);
• database management system (DBMS);
• applications software, as well as development and general purpose (text editor, table editor, means of presentation preparation) programs and the information support software to be used by troops and weapons control commanders at the operations and tactical levels.

This complex must comply with the international and domestic standards and be used at all control levels of the Armed Forces of the Russian Federation.

The composition and purpose of basic information technology software indicate that its development represents a complex research and technical problem, and its production, delivery and installation will involve the capacities and infrastructure of a large separate sector of the national economy.

Countering the Threats

The software security must be sufficient to effectively counter the threats presented by the information warfare systems of an opposing side that can be a foreign country, a terrorist group or even an individual.

Modern hi-tech terrorism can cause a systemic crisis of the entire world community. Terrorist attacks against interfaced national computer and telecommunications networks can lead to similar consequences.

Information warfare systems present a wide range of threats. One can name at least two dozens of the most critical ones.

It should also be taken into account that new types of such threats are constantly being developed, thus becoming a part
of the informational warfare. New threats must be systematically detected and timely neutralized.

Secure computer software and hardware, cryptographic tools, as well as secure general-purpose software (operating and database management systems) must be used to disrupt aggressor attempts.

Reaching a Deadlock with Foreign-Made Software

This list of security functions is far from complete, but it is clear that the imported software products do not meet the above mentioned requirements. What is more, these products (operating systems, database management systems, etc.) can be carriers of various threats as well.

It is virtually impossible to guarantee information security of software products made by foreign developers, as they do not supply initial program texts necessary for the detection of possible «implantations». An occasional receipt of initial texts or an important software product does not either solve the problem, as the access to further software versions is not guaranteed. This is a way to a deadlock.

Effective protection from infringements of information space can be guaranteed only if we use Russian-made basic software and information technologies, which are provided with security functions at the development stage.

Domestic Basic Information Technologies

The analysis shows that Russia’s Armed Forces currently use a lot of various operating systems, database management systems and applications development programs. Most of them have been made abroad.

This variety of hardware and software adversely affect:
• compatibility of cooperating military-use automated control systems and the security of information space;
• information security and the organization of information/computation process;
• use and interoperability of previously produced specialpurpose application software.

The lack of a single information system supporting troops and weapons does not allow real-time combat operation planning and control.

In its turn, imported software products present a threat to the information security of Russia’s Armed Forces.

The only way out in this situation is the original development of basic information technologies.

In 1998, in the conditions of Russia’s growing dependence on imported computer software, the All-Russia Research Institute for Control Automation in Non-Productive Sphere (Russian acronym VNIINS) completed the development and testing of the main components of basic information technologies: POSIX-standard MSVS (Mobile System of the Armed
Forces) version 2.0 secure operating system and SQL-standard Linter-VS version 5.0 secure database management system under contract from the Ministry of Defense.

Currently, the new versions of the MSVS 3.0 operating system, Linter-VS 6.0 secure database management system and Office software package have been developed, tested to the state standards and certified.

In the course of development and testing, the MSVS 3.0 OS has been approbated by more than 100 organizations involved in automated control system design.

The comparative analysis of the secure MSVS 3.0 and Microsoft Windows NT 4.0 and Windows 2000 OSs has demonstrated the advantages of the Russian system in terms of security from unauthorized access, virus immunity, reliability, and guarantee services.

The Kholst-S typical secure certified software/hardware set has also been developed. After passing the State tests, the set
and its components (the MSVS operating system and Linter-VS secure database management system with built-in security tools) have been accepted for service with the Armed Forces and certified. They can be used for the development and operation of automated control systems intended for classified information processing.

The Kholst-S complex is being serially produced and delivered to the facilities of Russia’s Ministry of Defense.

Further Development of Basic Information Technologies

To effectively fulfill the Armed Forces’ control tasks, as well as adequately counter the information security threats, Russia is pursuing a coordinated and purposeful program of developing secure basic software and applications technologies as a single unified technological platform for secure integrated automated control systems (including global, territorially distributed information and control systems) with secure telecommunications interfaces.

Secure automated control systems are being developed with the use of Russian serially produced secure computers, the MSVS 3.0 operating system, Linter-VS 6.0 secure database management system and the Office 1.0 software package designed for the automation of routine operations.

The VNIINS Institute is a prime contractor for basic information technologies. The project is scheduled for completion in 2003-2006.

Under the project, three secure operating system versions will be developed. Secure database management systems will comply with international standards. Work on the three DBMS versions will be completed concurrently with the development of MSVS operating system versions.

By 2005, work will also be completed on automated control system design tools, general purpose software (test and table
editors, presentation preparation tools, etc.) and an information security system.

These elements of military-use automated control system will eventually provide a direct control link between mobile (field) control posts of large units & strategic formations and weapons control systems.

Phased Transition to Secure Information Technologies

The Armed Forces’ facilities have already been equipped with the Kholst-S typical secure software/hardware set, MSVS
operating system and Linter-VS DBMS. Software and hardware deliveries planned for 2003 and the subsequent years will create favorable conditions for the preferably phased transition of the existing and future automated control systems to secure information technologies.

Equipping the Armed Forces with secure software will involve:
• approving and implementing the plans of phased reequipment of services and command levels of the Armed Forces (the strategic, theater, operations and tactical levels);
• specifying the amount and time of transition and reequipment of the Armed Forces facilities under the State Defense Order.

These plans should be based on the VNIINS-developed technology of evolutional transition of local computer networks from Windows NT 4.0 to MSVS operating system that provides for network control, information security of databases and user workstations, as well as a capability of operation with the existing and newly developed applications at facilities of
various hierarchy levels.

However, information that must be secured from unauthorized access is processed not only by the Ministry of Defense, but also by other federal ministries and agencies. The experience gained by Russia’s Ministry of Defense should be used by other state structures. This will enable them to master secure computer technologies and cooperate in the single secure information space.

the article is from Military parade …. i hope they might have nearly completed the project as the specified time frame was 2005 …

BTW, i hope a propagated “software power” like India is having secure comm ….

No replies yet.
Sign in to post a reply