Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [135]

By Root 1220 0
by financial institutions. The 18th CRI employed approximately 5,700 people in 2010.

27th Central Research Institute of the Russian Defense Ministry (27th CRI MOD)—Military Unit (Vch) 01168


The 27th CRI is the MOD’s lead institute on information technology and command and control systems. The 27th CRI’s full title includes the subtitle “Scientific and Research Testing Center Communication Systems,” reflecting the 2010 merger with the 16th Central Research and Testing Institute (16th TSNIII—Vch 25871) done under Ministry of Defense Order No. 551. The 27th CRI headquarters is in Moscow; the test center is in Mytishchi, northeast of Moscow.

According to an unclassified history, the 27th CRI was founded in 1954 as the MOD’s Computer Center No. 1. As the country’s first computer center, the 27th CRI recruited personnel from the military academies and from Russia’s most prestigious schools, including Moscow State University (MGU) and the Moscow State Engineering Physics Institute (MEPHI). 27th CRI software personnel worked on the Soviet space program and military missile programs. The 27th also provided support to the GRU. According to General of the Army Aleksandr Starovoytov (a KGB SIGINT officer), Vch 01168 examined ways to use computer networks to spread disinformation.

The 27th CRI also provided the Russian MOD’s initial Internet access. According to Russian press, prior to 2004 the 27th CRI formed the Strategiya Agency as an experimental Internet program for connecting the MOD. The connections provided service for a variety of MOD components, including the General Staff Main Operations Directorate and Electronic Warfare Directorate. The connections provided access to global information resources for research purposes. The 27th CRI works closely with Vch 49456, a MOD center for automation listed on MOD computer contracts. Vch 49456 might be directly subordinate to the 27th CRI; however, we cannot be certain.

The 27th CRI employed at least 1,700 personnel in 2010. Vch 49456 employed at least another 700.

* * *

[84] There is an unstated tension between the FSB and MOD on IO responsibility. Russian law assigns the FSB lead information security responsibility. The MOD, however, sees IO as a military responsibility. MOD and government structures related to IO are usually filled by former FSB/KGB officers. During the 2008 Russia-Georgia conflict, the MOD Press Officer was transferred from the FSB. It seems that the FSB is making sure MOD plans don’t hinder FSB prerogatives.

[85] Noncontact Wars was published in January 2000 while the Security Council was working on the new doctrine.

[86] Russian military commentators, including Ivanov, have speculated since 2005 that the EW Troops would become a separate combat arm. This had not occurred as of July 2011. Ivanov, whose last rank was Major-General, and who as a 2006 General Staff Academy Honors Graduate was seen as a rising star, was one of three General Staff officers who requested retirement in July 2011 for as-yet unspecified reasons.

[87] Dr. Horev’s web page also states he received an award from FSTEC in 2003 while serving in this position.

[88] Moscow Military University’s distinguished alumni include arms dealer Viktor Bout and “former” FSB officers Andrey Lugovoy and Dmitriy Kovtun, implicated in the Alexander Litvinenko assassination.

[89] FSTEC states that responsibilities include only “key” networks. However, the definition of key is broad enough to allow FSTEC to operate anywhere.

[90] The same postings normally list VAIU and VAIU predecessors under education.

[91] The English translation is approximate. The Cyrillic name is ФeдepaльHый гocyдapcTBeHHый HayчHo-иccлeдoBaTeльcкий иcпыTaTeльHый цeHTp paдиoэлeкTpoHHoй бopьбы и oцeHки эффeкTиBHocTи cHижeHия зaMeTHocTи (ФГHИИЦ РЭБ ОЭСЗ).

[92] It seems the ambiguity was designed to avoid drawing attention to the merger between VAIU and the 5th TSNIII.

[93] A former Vch 11135 employee is now a prominent Russian IT security expert who writes frequently on SCADA security. FSTEC documents show its role

Return Main Page Previous Page Next Page

®Online Book Reader