{"id":553,"date":"2019-10-08T16:11:02","date_gmt":"2019-10-08T14:11:02","guid":{"rendered":"https:\/\/lab52.es\/blog\/?p=553"},"modified":"2024-10-11T09:54:44","modified_gmt":"2024-10-11T07:54:44","slug":"cyber-gru-ix-structure-other-units","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/cyber-gru-ix-structure-other-units\/","title":{"rendered":"(Cyber) GRU (IX): structure. Other units"},"content":{"rendered":"\n<p>In addition to the two previous units, which have gained prominence from the information brought to light in 2018, the GRU has other Military Units linked to signal intelligence, cybersecurity or information warfare. Some of which we can find data in public sources are the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Military Unit&nbsp;<strong>11135<\/strong>&nbsp;(<em>18th Central Research Institute<\/em>). Historically ([1]) the Central Scientific Research Institute has been identified within the GRU, which from Moscow designs SIGINT equipment for the GRU and which is perhaps currently this Military Unit, focused today not only on interception of radio and satellite communications but also on wireless devices, SCADA systems or protection of communications ([2]).<\/li><li>Military Unit&nbsp;<strong>40904<\/strong>, known as the \u201c177th Independent Center for the Management of Technological Development\u201d. Located in Meshcheryakova, 2 (Moscow), with high probability, this unit specializes in signal intelligence processing ([3]).<\/li><li>Military Unit&nbsp;<strong>36360<\/strong>. Apparently it is a training unit of the GRU in which advanced intelligence courses are taught, at least since January 1949. This training, also apparently and according to open sources, includes topics closely linked to the cyber domain such as the following:<ul><li>Telecommunications Engineering (communication by radio, radio broadcasting and television).<\/li><li>Technologies, networks and communication systems.<\/li><li>Information systems and technologies: information and analysis.<\/li><li>Software Engineering.<\/li><li>Applied Mathematics and Computer Science.<\/li><li>Information security.<\/li><li>Computer software.<\/li><li>Automated information processing and control systems.<\/li><li>Translation and translation studies (linguistics).<\/li><\/ul><\/li><li>Military Unit&nbsp;<strong>54726<\/strong>&nbsp;(<em>46th Central Research Institute<\/em>), a center focused on military technical information, especially on the capabilities of foreign countries, which potentially includes research in the cyber field.<\/li><\/ul>\n\n\n\n<p>Finally, it is necessary to remember that the GRU is one more piece \u2013 important, very important, but one more piece \u2013 in the cyber structure of the Russian Ministry of Defense (MOD); thus, in addition to the previous ones in the Russian Armed Forces, other Military Units whose work has something to do with the cyber field in question; some of them, also on the basis of the information available in public sources, are the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Military Unit&nbsp;<strong>31659<\/strong>, we do not know if it is linked to the GRU or directly to the Russian MOD, but it is a recipient of items for the cyber protection (for example, through antivirus software) of the MOD. Personnel of this unit have participated in public scientific publications related to cybersecurity, especially in the defensive and protection field (such as the detection of anomalies).<\/li><li>Military Unit&nbsp;<strong>01168<\/strong>&nbsp;(<em>27th Central Research Institute<\/em>), created in 1954 and converted into CRI in 1961, was the first Soviet data center ([2]). It is not a military unit of the GRU but belongs directly to the Russian Ministry of Defense and according to open sources has worked on disinformation through the Internet.<\/li><li>Military Unit&nbsp;<strong>96010<\/strong>&nbsp;(<em>Federal Service for Technical and Export Control<\/em>, FSTEC), which controls the export of sensitive technology and protects computer networks and systems ([2]).<\/li><li>Military Units&nbsp;<strong>21882<\/strong>,&nbsp;<strong>77111&nbsp;<\/strong>and&nbsp;<strong>33872<\/strong>, which make up the electronic warfare structure of the MOD.<\/li><li>Military Unit&nbsp;<strong>40056<\/strong>&nbsp;of the Russian MOD, a curious Unit known as \u201cMain Directorate of Underwater Research\u201d, which analyzes, among others, foreign civil capabilities in underwater cabling ([4]) and develops its own capabilities to violate said wiring.<\/li><\/ul>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>[1] Desmond Ball, Robert Windrem.&nbsp;<em>Soviet signals intelligence (SIGINT): Organization and management.<\/em>&nbsp;Intelligence and National Security. Volumen 4, Issue 4. 1989.<\/p>\n\n\n\n<p>[2] Jeffrey Carr.&nbsp;<em>Inside Cyber Warfare: Mapping the Cyber Underworld.<\/em>&nbsp;<em>2nd edition.<\/em>&nbsp;Ed. O\u2019Reilly, 2011.<\/p>\n\n\n\n<p>[3] RFE\/RL. I<em>nvestigative Report: On The Trail Of The 12 Indicted Russian Intelligence Officers<\/em>. July, 2018.&nbsp;<a href=\"https:\/\/www.rferl.org\/a\/investigative-report-on-the-trail-of-the-12-indicted-russian-intelligence-officers\/29376821.html\">https:\/\/www.rferl.org\/a\/investigative-report-on-the-trail-of-the-12-indicted-russian-intelligence-officers\/29376821.html<\/a><\/p>\n\n\n\n<p>[4] Keir Giles.&nbsp;<em>Handbook of Russian Information Warfare<\/em>. NATO Defense College. November, 2016.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In addition to the two previous units, which have gained prominence from the information brought to light in 2018, the GRU has other Military Units linked to signal intelligence, cybersecurity or information warfare. Some of which we can find data in public sources are the following: Military Unit&nbsp;11135&nbsp;(18th Central Research Institute). Historically ([1]) the Central [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-553","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorised","8":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/30559839810_e981e2ba91_b-600x400.jpg","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/10\/30559839810_e981e2ba91_b-600x600.jpg","author_info":{"display_name":"BigBoss","author_link":"https:\/\/lab52.io\/blog\/author\/bigboss\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/553"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=553"}],"version-history":[{"count":2,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/553\/revisions"}],"predecessor-version":[{"id":555,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/553\/revisions\/555"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/557"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}