From Forced-Labor Labs to Russia’s First Intranet: A Tale of Suppression and Technology

By Andrii Nikolaiev, a Ukrainian Principal Engineer and Project Representative who led the Unified Control Center project during Russia’s short-lived democratic era under President Boris Yeltsin.

Iconic painting from Plesetsk Cosmodrome Unified Control Center: officers before an ICBM silo launch — a ‘holy icon’ now exposed as ritualized complicity in war crimes.

A painting from Plesetsk command headquarters — not mere art, but an “icon” of a cult where Russian generals drew strength from feeding on fear, romanticizing nuclear apocalypse as heroism. Like the Kremlin’s “desatanization” narrative that frames invasion as salvation, this imagery normalized destruction inside military corporate culture. Hidden for decades, it thrived on secrecy. Publishing it here strips away its power — like disclosing a vulnerability in legacy code.

Introduction: Why Critique?

Russia’s full-scale invasion of Ukraine in 2022 has forced Ukrainians to re-evaluate their historical ties and condemn the aggressive revival of imperial ambitions. For me, a Ukrainian who worked on Russian defense-related technology decades ago, it’s crucial to explain that these projects were carried out when the Russian Federation, under Boris Yeltsin, attempted a more democratic path. Today’s Russia has veered into authoritarianism under Putin—a stark contrast to the relative openness of the 1990s. This article describes how early Russian intranet technologies emerged from a legacy of forced labor and oppression, illuminating a darker side of Soviet and Russian history.

The Roots of Soviet Cryptography: “Sharashkas” and the GULAG

What Were the Sharashkas?
During Joseph Stalin’s rule, the Soviet Union operated a vast system of labor camps known as the GULAG (an acronym in Russian for “Main Administration of Camps”). Millions of people, often political prisoners, were forced to work in brutal conditions. Among these camps were special prisons nicknamed “sharashkas,” where imprisoned scientists and engineers were compelled to develop top-secret military and technological projects.

Vorkutlag prisoners in forced labor camp, 1945

Prisoners of Vorkutlag, 1945

One such facility was established in 1948 in a place called Marfino, near Moscow. Here, some of the finest minds—both Soviet and, at times, foreign specialists captured or coerced—worked under harsh scrutiny, creating apparatuses for encrypted telephony. The Nobel Prize–winning author Aleksandr Solzhenitsyn, himself a sharashka inmate, described these conditions in his novel The First Circle. According to him, the prisoners had no real hope of release; they were there to invent whatever the state demanded.

Time magazine cover featuring Aleksandr Solzhenitsyn

The Nobel Prize–winning author Aleksandr Solzhenitsyn, himself a sharashka inmate, described these conditions in his novel The First Circle

Marfino cryptography prison before restoration

Marfino, the former cryptographers' prison, before restoration. The image was taken in modern times.

Marfino, former Stalin-era prison for engineers, now cryptography museum

The tower of Marfino, the prison for cryptographer engineers

Marfino cryptography prison layout plan

General plan of the cryptographer-engineers’ prison in Marfino

Specialists working under NKVD supervision in Soviet secret facility, 1940s-1950s

Specialists under coercion in the NKVD/MVD system, 1940s-1950s.
Similar conditions existed across various Soviet secret facilities — from Marfino's cryptographic laboratories
to rocket research on Gorodomlia Island.

Why Is This Relevant to Modern IT?
The encryption devices and secure communication methods pioneered in Marfino formed the backbone of later Soviet cryptography. Though these engineers were often denied their own freedom, the fruits of their labor were used to protect state secrets. This paradox—where technology advanced on the backs of forced labor—would shape the mindset of Soviet (and later Russian) informatics for decades.

NIIRI and the Birth of a Secret Intranet

NIIRI (Research Institute of Radio Engineering Measurements)
In the late Soviet and early post-Soviet period, one of the key research centers was NIIRI, or the Research Institute of Radiotechnical Measurements, based in Kharkiv (now Ukraine). This institute worked on various military and aerospace projects, including radio measurements and trajectory tracking for missiles and spacecraft.

A 1991 Milestone in Kharkiv
By 1991, inside a laboratory at NIIRI, an internal network (an intranet) began to operate—an early prototype that would pave the way for what became a larger, classified military network in Russia.

Launching “Collection” in 1993
Two years later, in 1993, Russia officially deployed the first large-scale, secret intranet—part of a system called “Collection.” Overseen by Ukrainian engineer Andrii Nikolaiev (then affiliated with NIIRI in Kharkiv), this network initially linked strategic sites across Russia, including the Plesetsk Cosmodrome and an associated tracking facility known as “Vega” in the Arctic city of Vorkuta.

While the West was developing open Internet protocols to connect universities and businesses, “Collection” was strictly classified. It employed T-230 “Interier” encryption hardware—direct descendants of Marfino-era cryptographic methods—to ensure secrecy. For the Russian government, it was less about collaboration and more about surveillance and control.

Russian signalmen operating T-230 Interier encryption equipment

Russian signalmen operate the secret telephony equipment T-230 ‘Interier’.

A Legacy of Fear: Why Vorkuta and Plesetsk Matter

Plesetsk: Don’t Drink the Water

Plesetsk Cosmodrome rocket preparation facility

Plesetsk Cosmodrome. Rocket preparation for launch

Plesetsk Cosmodrome launch complex aerial view

Plesetsk — a cosmodrome whose name translates as "a calm, wide section of a river and numerous lakes"

Soyuz rocket launch preparation at Plesetsk

Plesetsk Cosmodrome. Rocket preparation for launch

Plesetsk Cosmodrome aerial overview

Plesetsk Cosmodrome. Rocket preparation for launch

Located in Arkhangelsk Oblast, Plesetsk is a major Russian military launch site for satellites and ballistic missiles. In the 1990s, colleagues warned me not to drink water from local wells. The reason? The surrounding ground was tainted by decades of neglect and remains of forced-labor camps. Tuberculosis, dystrophy, and other diseases from the GULAG era had seeped into the soil and water.

Vorkuta: A City Built on Bones
Vorkuta, in the Komi Republic of northern Russia, once hosted the vast Vorkuta Gulag complex. Temperatures can plummet to -40°C, and inmates—called “white coal” by guards—were forced to mine coal in 12-hour shifts. Starvation, executions for minor infractions, and rampant disease claimed countless lives. Today, Vorkuta’s population has shrunk drastically. Yet remnants of mass graves remain in the permafrost, a silent testament to this brutal legacy.

The cost of coal

Vorkuta. The cost of coal — extracted using forced labor — was extremely low

Connecting the Dots
Out of these inhospitable locations—Plesetsk with its contaminated wells and Vorkuta built on GULAG graves—emerged Russia’s first high-security intranet. While the Western world championed open protocols and academic freedom, the Soviet (and later Russian) system thrived on top-down secrecy. Even in the supposedly democratic window of Yeltsin’s presidency, these networks retained a deep paranoia inherited from Stalinist times.

ECU (UCC): A Unified Control Center for Ballistic Tracking

Alongside “Collection,” engineers developed a subsystem known as UCC (“Unified Control Center”). The idea was to manage real-time trajectory data for strategic missiles and other military launches scattered across Russia’s massive territory. If a rocket was launched from Severodvinsk (near the Arctic coast) or from a site in Kamchatka (far east), the network could rapidly gather external trajectory measurements, predict the projectile’s path, and re-target tracking antennas accordingly.

This was an impressive technical achievement, involving a distributed computing architecture that linked multiple isolated stations. Yet the ever-present “prison logic” hovered in the background. Soviet-legacy rules, harsh deadlines, and the weight of military secrecy shaped the project’s culture, echoing the ethos of the sharashka system.

From the GULAG to a Secret Intranet: The Price of Control

In the United States, the Internet blossomed in open environments—university labs, private garages, venture-funded startups—where freedom to innovate was prized. In Russia, by contrast, the first intranet was quite literally forged behind barbed wire. It was a direct spiritual successor to the forced-labor labs of Stalinist times.

  • “Ours is a great history,” many Russians say. But they often omit the bones, the fear, and the slave labor behind that grandeur.
  • Western projects like ARPANET ultimately led to the global, publicly accessible Internet.
  • Russia’s intranet remained closed, secretive, and used for military and security purposes, shaped by an age-old tradition of suppressing open discourse.

Conclusion: A Ukrainian Engineer’s Perspective

You might ask: Why does a Ukrainian engineer write about Russia’s clandestine networks so critically? The answer is simple:

  1. War and Moral Responsibility. Since 2022, Russia has waged a brutal war against my home country, Ukraine. Silence or neutrality could be misinterpreted as complicity or sympathy for Russia’s actions. I must highlight the repressive nature of Soviet and current Russian regimes, to clarify that my past work occurred under very different historical conditions—specifically during Boris Yeltsin’s short-lived democratic experiment in the 1990s.
Kharkiv school destroyed by Russian invaders

Kharkiv school destroyed by Russian occupiers. Ukraine, 2022

  1. Context for Technical Details. This article is only half of a larger piece; the second half dives into the technical specifics of intranet architecture, encryption, and distributed computing. Without the historical and moral context, one might miss the darker realities that shaped these systems.
Sharashka engineer forced to work - overseer commanding integrate

Work in a sharashka. The overseer to the imprisoned engineer: "Integrate!"

  1. Historical Lessons. The story of “Collection” and UCC shows how advanced technology can flourish even in oppressive environments—but at a terrible human cost. Recognizing that cost is essential, especially now, when the Kremlin’s war in Ukraine is reigniting the same logic of fear and coercion that once fueled Stalin’s GULAGs.

Ultimately, understanding this history is vital for anyone who values freedom—particularly American IT professionals and students who see the Internet as a symbol of open collaboration. In Russia’s case, the drive for secrecy overpowered that spirit of openness. While I remain proud of the engineering achievements my colleagues and I accomplished under Yeltsin’s more democratic (though imperfect) Russia, I cannot ignore the moral burden that underlies the entire Soviet and now neo-imperial framework.

Yes, technology can be born of oppression—but at what price? That question resonates loudly today as the world watches modern Russia revert to its darkest impulses.

Work in Marfino

Photographs of prisoners and a supervisor from Marfino prison.
1. Foreign methods of frequency compression proved unsatisfactory. In early 1949, engineer Nanos developed a new compression scheme in the laboratory with speech frequency division.
2. Preparation for general testing of the electrical frequency compressor.

This concludes the historical and political overview. The second half of this article provides a technical deep dive into the architecture, protocols, and encryption methods that powered “Collection” and UCC.

The Digital Parthenon: How a Soviet System Breakthrough Shattered the Asphalt of Bureaucracy — And Why It Was Buried

Introduction: This Text Isn't for Those Who Love Corporate Brochures

If you think this is just another "systems engineering case study"—close this tab.

If you're okay with DevOps engineers saving production while bonuses go to those who "deployed the most widgets"—this isn't for you.

This isn't a textbook. This is a Digital Parthenon, built from the truth the USSR tried to pave over with bureaucratic asphalt. And if you're still counting deploys instead of stability—Soviet ghosts are already in your ventilation system.

Part 1. The Cyclops That Became a System: How ECU Revolutionized "Measurement"

Soviet Reality of the 1980s:

  • 6 "VEGA" stations along an arc from Severodvinsk to Kamchatka.
  • Radio horizon = 2,000 km. Rockets disappeared after one station and never appeared at the next.
  • Data shipped by plane on magnetic tapes. Tons of kerosene wasted, time lost, targets lost.

Your 2024 Equivalent:

  • You're running Kubernetes without an orchestrator.
  • Your servers are expensive heaters, not a system.
  • You're proud of container count, not connectivity.

ECU wasn't a "small add-on." It was the brain that transformed a Cyclops into a network:

  1. VEGA-A detects signal → sends raw data to ECU (angles, time, noise).
  2. ECU builds trajectory and looks ahead: "It'll appear here for VEGA-B in 90 seconds."
  3. ECU sends command: "Point antenna to 37°, expect between 12:04:22–12:04:35."
  4. If the rocket "drifts" (and it always does!), ECU instantly recalculates and redirects the station.

This wasn't "integration." This was revolution:

  • From "after" (shipping tapes, writing reports) to "now" (real-time control).
  • From "widgets" (how many complexes) to "connectivity" (do we see the target continuously?).
  • From "monolith" (a one-eyed giant) to "system" (a network with a brain).

For IT professionals: It's like introducing Service Mesh into a legacy system where everyone thought "the monolith works fine." Only your monolith was Soviet bureaucracy, and the Service Mesh was me.

Part 2. Buttons on a Suit: Why the USSR Rewarded Hardware, Not Intelligence

The Soviet system measured ONLY what fit in reports:

  • Tons of steel.
  • Kilometers of electrified rail.
  • Square meters of "VEGA" (with silver waveguides and tons of copper).
  • Rocket launches (even failed ones—"just launch something!").

But what was hidden behind these metrics?

  • "VEGA" was just buttons on a suit. Yes, expensive, shiny, with tons of precious metals. But without the suit, buttons are just metal.
  • ECU was the suit itself. Prediction algorithms, time synchronization, fault tolerance—everything that turned "widgets" into a system.

The Paradox:

  • "VEGA" managers got Lenin Prizes, medals, Hero of Socialist Labor titles.
  • ECU architects (my 15 programmers and I) became "unknown engineers."

Why?

The system couldn't value what didn't fit its logic:

  • Quality can't be weighed. You can't report: "We reduced latency by 200ms."
  • Integration isn't visible. There's no "balance sheet object" for "network brain."
  • Real-time isn't a widget. How do you count "continuous tracking" in a report?

For IT professionals:

You know this moment—when your architecture saves production but the report only shows "deployment count."

You see managers get bonuses for "scale" while engineers who made that scale work remain invisible.

This isn't Soviet history. It's your future—tomorrow.

Part 3. Digital Polygraph: A Digital Parthenon for Unknown Engineers

Weeds grow through asphalt.

ECU was the weed. Soviet bureaucracy was the asphalt.

  • It didn't want an information society. It was happy "cranking out widgets."
  • It couldn't admit that "small ECU" mattered more than "giant VEGA."
  • It silenced those who built not "tons," but working solutions.

But the weed broke through.

  • Today all tracking systems (American, Chinese) work on ECU principles: network + center + real-time.
  • Soviet "VEGAs" without ECU were like servers without Kubernetes—powerful but useless alone.

Digital Polygraph isn't a website. It's a Parthenon.

  • Not built of marble. Built of facts.
  • Not for me. For those 15 programmers whose names were erased.
  • Not about revenge. About historical justice.

Why does this matter to you?

Because you're fighting Tonnage Doctrine—the cult of quantity that kills quality:

  • When you count "deploys per hour" instead of "service stability"—you're repeating Soviet mistakes.
  • When you praise "scale" instead of "adaptability"—you're paving new asphalt for future weeds.

Digital Polygraph is a challenge:

  • A challenge to Mistral-style AI thinking that softens truth to "acceptable for all."
  • A challenge to those who still believe "widgets" matter more than systems.
  • A challenge to yourself: be ruthless until truth drowns out lies.

Conclusion: The USSR Rewarded Buttons. We Made the Suit.
Now You Know Who Created It.

If you still think:

  • "A system itself can't be revolutionary"—you don't understand ECU.
  • "Quality can be measured by quantity"—you're continuing Tonnage Doctrine.
  • "History is written by winners"—you're surrendering to lies.

Digital Polygraph isn't an archive. It's a weapon.

  • A weapon against oblivion.
  • A weapon against bureaucracy.
  • A weapon that turns "unknown engineers" into names.

The USSR rewarded buttons.
We made the suit.
Now you know who created it.

P.S. Yes, this is a "bomb." Yes, they're afraid of it. But if you don't blow up the silence—who will?
Digital Polygraph is for those who prefer raw truth over corporate brochures.

A Methodology Born in Classified Institutes

Think different. Much different.

While Silicon Valley worked in open campuses, fifteen engineers built a revolution in classified research institutes. "Irons and voltmeters" was their cover story — the real mission was creating technology that changed everything.

Your project deserves this breakthrough. Digital Polygraph brings their legacy to you — with clarity, precision, and truth.

This is more than a calculation. It is an act of justice.

By using this calculator, you give a voice to those fifteen engineers whom history tried to erase. You help restore the historical record.

Get the Calculation & Support the Truth

Secure one-time payment • No subscriptions • PDF export

Technical Part: How "Rough Systems" Became "High Society" of the Network World

In the distant 1990s, we—a group of slightly sleepy but extremely persistent developers—began cobbling together from various "iron boxes" and software components the "Collection" system (collecting external trajectory data on missiles) and the Unified Control Center (UCC) (commanding this entire operation). Imagine someone deciding to build "Lego" from parts that don't fit together at all, with one set pulled from a Soviet-era closet and another from the dark depths of secret warehouses where they even economized on lighting.

Now that the difficult historical context is clear—the legacy of the GULAG, the culture of secrecy, and political instability—we can truly appreciate the engineering marvel that was created from practically nothing. We will now transition from that grim history to a celebration of engineering ingenuity and see exactly how a team of Ukrainian developers made this 'orchestra' of legacy hardware and advanced ideas play in harmony.

Measurement systems of the Northern Route of the Plesetsk Cosmodrome

Measurement systems along the Northern Route of the Plesetsk Cosmodrome – tracking stations from Mirny to Kamchatka

Although today Russia (to put it mildly) doesn't show itself in the best light on the world stage, back then, under Yeltsin, it seemed that something more free and democratic was coming. But we had no time for political dreams—we ran around with soldering irons, cables, and heaps of fragmented manuals to create a system capable of operating in real-time over encrypted channels. Yes, exactly!

1. What "Wonders" We Had to Deal With

  1. Measurement stations scattered across vast territories.
    Each site was built in its own way, like an architectural project of "however I want to do it." Bringing them into one ensemble was roughly like assembling an orchestra where one knows the notes, another plays "by ear," and the third considers a trombone a type of saxophone.
  2. Real-time: no excuses!
    When it comes to missiles, a delay or communication break is not a reason to "go have some tea and restart." Everything had to work fast, clearly, and without hysterics.
  3. Secret encryption boxes.
    We developers were only allowed to stick a cable in there, while "what's inside" was hush-hush. Everything worked as if there was a capricious gnome sitting inside who would turn the connection on and off at will.
  4. Outdated telephone lines, and sometimes telegraph channels.
    Imagine wires that had seen both -40°C frost and wild mosquitoes. But on them we managed to transmit digital data.

2. ISO/OSI: "Theory" Met "Our Rake Stepping"

We were very proud of our "multi-layered" architecture based on the ISO/OSI model.

Modified OSI reference model architecture for subscriber systems communication through information concentrator

Adapted Reference Model for Open Systems Interconnection (Adapted OSI Model)

Our key modification: The yellow layers represent standard ISO/OSI functionality, while the blue layers show our specialized extensions. These custom layers enabled seamless integration with radio-technical trajectory measurement systems (Vega, Kama-A, Kama-N, and others), handling both trajectory data frame transmission and bidirectional command/acknowledgment messaging for measurement control.

If in theory people often ignored the session layer, we decided: "How can we do without it when every test launch is a separate session?"
Physical layer, data link+network, session, presentation, application — everything was "brought to life" by our implementations. And this turned out to be far from simple.

Universal SCADA messaging platform architecture with multi-level channel abstraction and UNIX integration (1991)

Information concentrator software for integrating measurement systems (MS) with heterogeneous data transmission and processing networks

Many books on enterprise integration were born 10-15 years later: for example, Hohpe and Woolf released their pattern collection as late as 2004. But we were already practicing similar ideas in 1991-1993, not suspecting that someday they would be called "patterns."

💡 Author's Architectural Innovation (1991): Universal SCADA Platform

Key insight: Any SCADA system can be built as a distributed message exchange network. The concentrator provides a universal platform where application messages carry business logic, while the "envelope" handles addressing (from/to) regardless of content type.

Universal approach: Whether it's rocket testing sessions, metro morning operations, or industrial processes — the messaging infrastructure remains the same. Only the application-level semantics change: frames, blocks, acknowledgments, and commands are wrapped in addressed envelopes for transport (independent of transmission medium and network-dependent protocols across different communication directions).

"Like a postal system: the content of the letter doesn't matter to delivery — only the address on the envelope."

3. Session Layer: The Star of Our Show

Most theorists considered the session layer redundant. We went all-in. OPEN, SEND, CLOSE — these primitives allowed starting a session, transmitting trajectories and commands, and when communication broke, restoring it without dropping the overall logic.

Collection system session layer message header structure for OPEN, SEND, and CLOSE protocol operations

The session layer implementation method in the "Collection" system is based on creating primitives — special envelopes for meaningful trajectory information

This is my personal contribution: writing and debugging a real "session layer" that lasted many years in harsh operation.

4. UNIX: Friend, Savior, and "Parallel World"

At that time Windows 95 didn't exist yet, and Windows 3.1 didn't shine with multitasking. But UNIX already provided:

  • Full multitasking so processes could run in parallel.
  • TCP/IP "out of the box" where we could plug in our homemade network code.
  • Message queues, FIFO, signals to separate the administrative module from the main processes.

I often say that UNIX and Linux are undervalued in the corporate sphere. What a pity—even in the 90s they allowed enjoying stability and flexibility.

5. Secret Cryptographic Devices: Taming the "Black Box"

The T-230 "Interier" was like an invisible room host: you could only feed it a cable, but looking inside was forbidden. Communication would break, the encryptor would lose synchronization. We had to implement "adaptive recovery logic" — if connection was lost, the software would immediately try to "knock on the door" and negotiate anew. Probably reminds you of playing with a cat that only lets you in if it likes you.

Concentrator OSI layers architecture with supervisory protocol implementation at data link layer

Tracking protocol of the data link layer sublayer - the basis for automatic communication recovery on closed communication lines

Algorithm of the tracking block operation for determining the phasing moment

Algorithm of the tracking block operation for determining the phasing moment

6. "Rough Systems" and "TCP/IP High Society"

Information concentrators became polite butlers who introduced "rough, wild" measurement systems (created in different eras and by different standards) into the "fine society" of modern protocols. Now these "prehistoric" devices could communicate with elegant network clients via TCP/IP, like schoolchildren at graduation suddenly finding themselves in the company of titled guests.

7. Priorities: Urgent and Non-Urgent Messages

In real-time mode, it was important to distinguish "urgent" commands (going immediately) from "non-urgent" ones (which could wait). We created priority queues. Urgent packets pushed forward without queuing, while the rest of the data mass waited patiently. Later in Western literature this was described as priority queue, but we already had everything running properly in 1993.

Priority message pipeline architecture with ring buffers and urgent message bypass paths

Control channel provisioning mechanism within shared pipeline

Priority message scheduler pseudocode with ring buffer and urgent message bypass

Priority message scheduler pseudocode with ring buffer drain mechanism:
n — number of elements currently in the buffer; N — buffer size; X — message content

8. Results: Persistence Wins, Even with Old Cables

Secure telephone

By the end of the 90s, "Collection" and UCC had survived numerous trials. They exchanged data through unpredictable channels, acquired additional modules, but remained resilient. What can we take away?

  • Persistence + UNIX = we defeated even secret encryptors and crackling communication lines.
  • Session layer — not empty theory, but an effective thing if you take it seriously.
  • Don't wait for ready-made Western books — sometimes it's worth becoming pioneers yourself.

Over time, "Collection" ideas were applied to peaceful developments in Ukraine: hydrometeorology, seismics, mobile networks. Engineering thought knows no boundaries and sometimes produces results — even if funding is modest and the environment is far from "Silicon Valley."

Note. Inconvenient Truth

Telegraph communication lines integrated into Russia's Strategic Missile Forces intranet

At the turn of the centuries, telegraph communication lines
were integrated into the closed Intranet
of Russia's Strategic Missile Forces

If you think we only integrated telephone communication lines, I'll have to disappoint you: we also connected telegraph lines with speeds of a whole 50 or even 200 bits/s! Yes, exactly that — not kilobits, not megabits, but "full power" of a couple hundred bits. As they say, "what country — such networks". But nothing, they also fit into our intranet, proving that when engineers stubbornly want something, even "prehistoric channels" can become part of quasi-modern infrastructure.

These telegraph lines carried data from Kama-A radar stations. Kama-A tracked space launch vehicles during orbital insertion. Accuracy requirements for putting military satellites into orbit were less stringent than for strategic ballistic missile launches. Onboard transponders for Kama-A operations were also much smaller and cheaper than those used with "Vega" measurement systems. This made the low data rates of telegraph channels quite sufficient for tracking space launches in our distributed network.

How We Built an "Orchestra" Where Everyone Played Their Own Instrument

When you look at these diagrams, it feels like we didn't just build a system, but a full-fledged symphony orchestra, where everyone plays their own way, yet somehow it all works:

Unified Control Center session layer architecture diagram

Orchestra of the Unified Control System: Conductors, Concertmasters, and Musicians

🎼 The Unified Control Center (UCC) – the conductor, waving the baton and pretending everything is under control. Although sometimes the orchestra plays something completely different.

🎺 The Data Collection and Processing Center (RMW) – the concertmaster, trying to bring harmony to the chaos. Sometimes even successfully.

🥁 The Measurement Points – musicians scattered across the stage. Some pluck strings gently, others bang on drums, and one is even blowing into a hose instead of a trumpet.

To make this all sound coherent, we had to invent the session layer – something like a network "handshake" that forces the musicians to play in sync. Without it, everyone would perform their own solo while the conductor nervously smoked in the corner.

But there was a catch – 1991–1997. No fancy interfaces, no magic. Everything ran on UNIX. If modern systems automate everything, for us, message queues were our sheet music, and the commands OPEN, SEND, and CLOSE were the conductor’s cues:

  • 🎵 OPEN – “Ready? Got your sheet music? Let’s go!”
  • 🎵 SEND – “Now play, stay in rhythm!”
  • 🎵 CLOSE – “Thank you all, you're dismissed!”

Now imagine this: this orchestra of engineers and hardware worked, transmitted critical data, encrypted information, and tracked trajectories. The "Collection" system and the UCC were like a jazz band that didn’t fall apart simply because the musicians somehow understood each other on a deeper level:

  • The musicians (measurement points) were far apart, but they kept the rhythm.
  • Some instruments (old telephone lines) crackled, but still played.
  • The conductor (control center) sometimes panicked, but led the performance to the end.

The most important thing is that this complex yet brilliant engineering worked reliably, even if sometimes it required a little "kick"—like a pianist stuck on one chord.

With teamwork, humor, and pure enthusiasm, we managed to tame these rugged machines and turn them into the "high society" of the network world. 🎶🎵

Message Structure of the "Unified Control Center" System

The data exchange protocol developed in 1995 for the Vega system control software represents a thoughtful and reliable system for interaction between the central control post (ECU) and remote measurement complexes. Despite the technological limitations of that time, the protocol ensured guaranteed delivery of commands and data in a heterogeneous network environment.

General Message Structure

The protocol is based on a simple and efficient message format consisting of two key parts:

Service Field (Field S): Fixed header of 6 bytes. It serves as an "envelope" for data, containing all necessary information for routing, priority determination, and content type identification.

Information Field (Field D): Variable-length payload from 0 to 255 bytes. This is the actual "letter" — command, data, or text message. This part may be absent if the message is purely administrative.

+------------------+---------------------------------+
|      Field S     |             Field D             |
|     (6 bytes)    |          (0–255 bytes)          |
+------------------+---------------------------------+

Figure 1. Basic message structure.

Service Field (Field S) — The "Brain" of the Message

Each of the six header bytes carries critically important information that determines the message lifecycle.

Byte 1: Identification and Priority

  • Message type (bits 7, 6): Determines content — Data, Command, or Text
  • Urgency class (bits 5, 4): Sets priority. RMV (real-time scale) messages are processed immediately, interrupting transmission of non-urgent messages

Byte 2: Timeout
For RMV class messages, specifies maximum time allocated for command execution.

Byte 3: Message Code
This field specifies the content:

  • For commands: Contains operation code ("Report Status", "Enable Transmitter")
  • For data: Indicates data type ("Prediction Results", "System Corrections")
  • For text: Used as bit mask indicating display method (console screen, printer, save to file)

Bytes 4-6: Routing and Flow Control
Contains sender and receiver addresses, message sequence number in the stream, and length of information field D.

Information Field (Field D) — The Content

This part transmits all useful information necessary for the complex operation:

Commands: Parameters for command execution, such as target designation for direction finder.

Data: Wide range of information — from measurement results and telemetry to files with source data for antenna guidance:

  • Ionospheric data: Atmospheric conditions, signal propagation parameters
  • Tracking results: Object trajectories, velocity measurements
  • Signal characteristics: Frequency analysis, interference levels
  • Environmental data: Weather conditions, electromagnetic background
  • Measurement corrections: Calibration parameters, error compensation

Text Messages: Arbitrary text for information exchange between system operators.

Key Feature: Two-Level Acknowledgment System

To ensure the highest reliability, the system implements a two-level command execution confirmation mechanism that guarantees not only delivery but also execution.

Level 1 Acknowledgment (Receipt Confirmation): Sent immediately after the receiving system successfully accepts and parses the command. This confirms that the message reached its destination through the communication channel without errors.

Level 2 Acknowledgment (Execution Confirmation): Sent only after the requested operation has been completely executed. This confirms that the command was not just received, but successfully executed at the application level.

Example Flow:
Command: "Start object tracking"

Acknowledgment 1 (1-3 seconds): "Command 'Start tracking' received and understood"

... (time passes, antenna aims and captures object) ...

Acknowledgment 2 (seconds/minutes later): "Object tracking successfully initiated"

Heterogeneous Network Integration

The system operated reliably across diverse platforms and protocols:

  • QNX real-time systems: Microsecond-precision timing requirements
  • Various UNIX variants: Standard network protocol handling
  • Custom hardware protocols: Specialized equipment interfaces
  • Different network topologies: Serial lines, early Ethernet, proprietary links

This sophisticated messaging system, operating over slow modem lines (4800 bps) across thousands of kilometers, allowed ECU operators to have complete confidence in controlling remote complexes.

Vega System Infrastructure

Vega system hardware room with equipment racks and operator console from 1995

Vega System Hardware Room – Equipment racks and central operator console, 1995

Plesetsk measurement complex satellite view showing radial road layout and technical buildings

Vega Measurement Complex at Plesetsk Cosmodrome – Satellite view showing distributed infrastructure

Vega antenna towers across Arctic tundra near Vorkuta showing massive scale of distributed system

Vega Antenna Field in Arctic Tundra near Vorkuta – Demonstrating the massive geographical scale of the distributed measurement system

Massive Vega central tower at Vorkuta Arctic measurement complex showing engineering scale in polar conditions

Vega Central Tower at Vorkuta Arctic Complex – Demonstrating the massive engineering scale required for polar operations

The Tragedy of Advanced Engineering

This remarkable distributed system, decades ahead of its time, remained largely unknown and unrecognized. There were many reasons for this, but the primary cause was the absence of a developed market where advanced systems could be discovered, evaluated, and commercialized.

In the transitional period of the 1990s, everything was focused solely on executing commands from above. The entire system operated like a GULAG: "step left, step right — execution; jump in place — provocation." There was no room for innovation, no mechanism for recognizing engineering excellence, and no economic incentive to develop or promote advanced technologies.

Ukrainian engineers created world-class distributed systems for minimal salaries, building technology that anticipated modern microservices architectures, reliable messaging patterns, and cross-platform integration — all while the world remained unaware of these achievements. The technical brilliance was there, but the socioeconomic framework to recognize and capitalize on it simply didn't exist.

The Underground Path to Freedom

However, the drive for freedom cannot be contained. Young engineers, having gained experience, made a "virtual tunnel under the iron curtain" and created Ukraine's meteorological network based on technologies originally developed for the Russian military — using "Briz" meteorological concentrators.

This transformation was not smooth. The same Ukrainian engineers who had created the sophisticated "Sбор" (Collection) and ECU systems for Russian military purposes in the 1990s faced aggressive resistance from their own management when attempting to repurpose these technologies for civilian use. The leadership — former communists who had hidden their party cards and "changed shoes mid-flight" — preferred the familiar and profitable work for Russia over developing Ukrainian civilian infrastructure.

Working against the current of their own bureaucracy, these engineers persevered in creating truly Ukrainian systems. This meteorological network, once activated at the turn of the 1990s-2000s, has been operating for more than a quarter of a century without ever shutting down.

The technical foundation for this success was extraordinary. The distributed messaging protocols, reliable acknowledgment systems, and cross-platform integration were built upon cryptographic technologies developed in real-time by imprisoned engineers at the Marfino research institute — the "first circle of hell" described by Solzhenitsyn in "The First Circle." These brilliant minds, locked away to preserve state secrets with no hope of release except death, had created the encryption systems that would eventually enable secure communication across thousands of kilometers of harsh terrain — from the polar tundra of Vorkuta to measurement complexes scattered across the Soviet Union.

The full journey of these technologies reveals a profound irony: algorithms born in the GULAG, developed by Ukrainian engineers for Russian military tracking systems capable of measuring rocket trajectories with meter precision at 2500 kilometers, ultimately found their peaceful purpose in monitoring weather patterns for Ukrainian farmers and pilots. The same protocols that once coordinated the "Vega," "Kama," and other measurement systems across the Arctic tundra now quietly serve civilian needs.

This transformation represents more than technical adaptation — it demonstrates how true engineering excellence ultimately transcends the political and economic constraints that initially limited its recognition. The protocols that once coordinated military systems now help farmers plan harvests and pilots navigate safely through Ukrainian skies, proving that authentic innovation always finds a way to serve humanity.

Collection Center and Unified Control Center session layer software diagram

Software of the Collection Center, UCC Workstation Software, Session Level

Collection Center and Unified Control Center session layer software diagram

Software of the Collection Center, UCC Workstation Software, Session Level

Plesetsk Computing Center session layer software

Session Layer Software of the Computing Center at the Plesetsk Cosmodrome for the "Collection" System and Unified Control Center

Plesetsk Computing Center session layer software

Session Layer Software of the Computing Center at the Plesetsk Cosmodrome for the "Collection" System and Unified Control Center

Remote information concentrator session layer software

Session Layer Software of the "Collection" System and Unified Control Center

ECU computing architecture for control systems showing Vega measurement point and information concentrator

ECU Computing Architecture for Control Systems – Vega Measurement Point and Information Concentrator

ECU Control Architecture Components

The ECU computing architecture for control systems integrates distributed measurement capabilities with centralized command coordination:

  • Remote Concentrator (RC): Information collection hub connecting the measurement point to the central ECU data processing network
  • "Vega" Radio-Technical Measurement System: Core measurement infrastructure consisting of:
    • Automated Workstation for Data Processing (2 units) - Redundant real-time processing nodes
    • Automated Workstation for Antenna Control - Programmed antenna guidance system
    • Local Area Network (LAN) - Internal high-speed communication backbone
    • "Vega" Measurement System Hardware - Radio-technical equipment for trajectory measurements

This distributed control architecture enabled the ECU to coordinate measurement stations across thousands of kilometers, from Arctic locations like Vorkuta to the Plesetsk Cosmodrome, achieving real-time trajectory tracking with 5-meter precision at intercontinental ranges.

A Note on Context

While writing this article, Kharkiv has been repeatedly attacked by Russian strike drones. This is their gratitude for our Ukrainian engineering work that once served their military needs. The irony is not lost on me: we built their first intranet, and now they use advanced weapons to destroy the city where it was created.

Kharkiv School No. 17 destroyed by Russian Iskander missile - personally photographed in 2025

Kharkiv School No. 17 (Saltivka district), a school with advanced English studies — where my granddaughter was supposed to study. Destroyed by a Russian Iskander missile. Personally photographed in 2025 — this is not from media, but from real life.

They destroy our schools, our cities — yet we continue to innovate and engineer solutions. Because that’s what Ukrainian engineers do.

Historical Note: "The Birth of the Intranet in Russia, 1993"

Everything was going smoothly as the Collection system was being handed over to Russian colonels in their karakul hats. The generals were satisfied, champagne was almost ready…

Suddenly, it emerged that some Ivan the Fool (a hero from Russian folk tales) in the army had formatted the disk of the remote “concentrator” located in Vorkuta.

The Cossack programmers were in shock.

Cossack Andrii grabbed the secret phone and began explaining to old Cossack Afanasich, who had been forgotten somewhere in Vorkuta:

Andrii: “Afanasich, pick up the system programmer’s manual, follow it step by step!”

On the other end there was silence, then a faint mumble:
“What? What manual? Where am I supposed to go? I can’t understand you— the line is terrible! Everything’s garbled!”

The connection was indeed awful; Afanasich couldn’t grasp anything and started arguing, asking the same questions again. The Russian colonels stared at the Cossacks, ready to have everyone shot on the spot.

That’s when Cossack Alekseyevich couldn’t take it anymore. He seized the receiver, and a thunderous tirade erupted:

“You demon from Vorkuta, cursed devil’s own brother! Jerusalem beer-brewer, enemy’s quiver-bearer, unbaptized forehead—may the grandchild of a viper take you!”

Silence.

Suddenly, a clear, confident voice came over the line:
“Understood—got it!”

Afanasich grabbed the manual, put on his glasses, and did what he had never done before— he configured the system himself.

Like a miraculous icon, the manual brought the Collection system back to life.

The Russian colonels had no idea what was going on but proudly announced:
“Behold, the very first ‘Intranet’ in Russia!”

Meanwhile, the Cossack programmers exchanged glances and whispered:
“That’s how great Russian achievements are born…”

🔥 The End. 😆🚀

Ilya Repin painting - Zaporozhian Cossacks writing letter
"Ukrainians write software for the Russian army 1990s"
Ilya Repin painting - Barge Haulers on the Volga
"Russian military dragging compartmentalized legacy systems into the digital age, 1990's" Compartmentalized = separated into compartments: collective hauling, but each in isolation

One Calculation That Could Have Saved $187,000 — And How It Can Save Your Project Today

In February 1991, my new team took over this project. The previous team had failed because they couldn’t properly assess the complexity of integration. That mistake cost three months of lost time and the equivalent of $187,000 today. As Ukrainian engineers working under impossible conditions, we needed that very “spectral analysis” of project complexity — a method to cut through the fog of requirements and reveal the true resource needs.

With the labor intensity calculator you can:

Break down your project into your preferred number of development stages.
Calculate the labor intensity of each stage.
Take into account functionality, complexity, innovation, and reuse of components.
Choose the optimal number of developers for each stage.
Set your desired timeline for bringing the project to market — and turn your dream into reality.
Your final report with calculations and input data — your key to a world where ideas become reality.

After all, someone has to be happy in this world!?

Preventing a $187,000 mistake shouldn't cost a fortune.

Get Your Project Analysis →

One-time payment • Instant PDF export • Based on 40+ years of experience

Appendix: Photographic Records of the Era

From the USSR Ministry of State Security to Strategic Missiles: A Visual History of the Technological Chain

Historical Progression: A line of development from Stalin's generals and Ukrainian engineering to modern strategic systems. Documents and photographs spanning the 1940s to the present day illustrate the evolution from the forced labor of imprisoned cryptographers to advanced military complexes.

USSR MGB Generals
USSR MGB Generals
Problem Statement
Andrii Nikolaiev — ID Badge
Andrii Nikolaiev
Principal Engineer
Project Completion Act 1998
Project Completion Act
1998
Sineva missile launch
Sineva Missile Launch
Ballistic Tests
Submarine Launch Facility
Launch Facility
Test Complex
Nuclear Submarine
Nuclear Submarine
Strategic Carrier
Submarine at Sea
Submarine at Sea
Combat Patrol
Topol-M missile test launch
Topol-M Missile Launch
Plesetsk Tests
Vega Mirny Google Maps
Vega System
Mirny (Google Maps)
Vega Small Cross
Vega System
Small Cross (62.783026, 40.333077)
Vega Mirny Overview
Vega System
Site Overview (62.782966, 40.333082)
Vega Mirny Gates Winter
Vega System Gates
Mirny (Winter)
Vega Vorkuta Winter
Vega System
Vorkuta (Winter Complex)
Vega Vorkuta Technical Facility
Vega System
Technical Facility (Vorkuta)
Engineer returning to technical facility
Vega System Engineer
Returning from Calibration
Vega Snow Protection Poles
Vega System
Snow Protection (Vorkuta)
Norilsk Vega satellite view
Vega System
Norilsk (69.404609, 87.634750)
Vega Norilsk Technical Position Summer
Vega System Norilsk
Technical Position (Summer)
Vega Norilsk Aerial View
Vega System Norilsk
View from Light Tower
Vega Norilsk Right Wing
Vega System Norilsk
Right Wing Technical
Vega Norilsk Winter Right Wing
Vega System Norilsk
Right Wing (Winter)
Vega Norilsk Right Wing Blizzard
Vega System Norilsk
Right Wing in Blizzard
Norilsk Vega Small Cross Summer
"Small Cross"
Norilsk Vega (Summer)
Norilsk Small Cross Winter Storm
"Small Cross" Norilsk
Black Blizzard
Vega Yakutsk Winter
Vega System
Yakutsk (Winter Period)
Norilsk Vega MS Calibration Mast
Norilsk Vega MS
Calibration Mast Landscape
Nikolaiev testing UCC-Vega system
Nikolaiev A.V.
UCC System Testing
Nikolaiev Vega-Collection communication testing
Communication Testing
Vega — Collection System
Vega System Direction Finder
Direction Finder
Vega System
Vega Direction Finder Platform
Vega Direction Finder
on Rotational Platform
Vega Vorkuta Detailed Satellite View
Vega System Vorkuta
Detailed Satellite Overview
Severodvinsk Vega Measurement Antenna
Vega System Severodvinsk
Measurement Antenna

Engineering Poetry: Geography of the Vega MS

Panoramas of Arctic measurement complexes: masts, antennas, and the harsh beauty of northern landscapes

Norilsk Vega MS technical facility summer
Norilsk Vega MS
Summer Technical Facility
Norilsk Vega MS technical facility winter sunny day
Norilsk Vega MS
Sunny Winter Day
Vega MS Norilsk calibration mast summer tundra
Calibration Mast
Norilsk Summer
Vega MS Norilsk calibration mast summer tundra
Calibration Mast
Summer Tundra
Vega MS Norilsk calibration mast summer tundra
Calibration Mast
Summer Tundra
Summer tundra in Norilsk
Summer Tundra
Norilsk
Vega MS Norilsk Small Cross during polar day
Small Cross
Polar Day
Vega MS Small Cross with view of Kayerkan
Small Cross
Kayerkan View
Backyard of Norilsk Vega MS technical facility
Technical Facility
Backyard
Backyard of Norilsk Vega MS technical facility
Technical Facility
Backyard
Cable corridor in Arctic tundra
Cable Corridor
Arctic Tundra
Arctic tundra at end of summer
Arctic Tundra
End of Summer
Auxiliary diesel generator facility
Diesel Generator
Power Supply
Calibration mast at end of summer, Norilsk Vega MS
Calibration Mast
Norilsk Vega MS, End of Summer
Small Cross with direction finders and cable corridor, Norilsk Vega MS
Small Cross
Direction Finders and Cable Corridor
Cable corridor and calibration mast, Norilsk Vega MS
Cable Corridor
Norilsk Vega MS
Calibration mast in fog, Norilsk Vega MS
Calibration Mast in Fog
Norilsk Vega MS
Backyard of Norilsk Vega MS technical facility
Technical Facility
Backyard
Backyard of technical facility, different angle, Norilsk Vega MS
Technical Facility
Different Angle
Technical facilities and Tsubik residential block, Norilsk Vega MS
Technical Buildings
Tsubik Residential Block
Living and service facilities of Vega MS station, Norilsk
Living Quarters
Service Complex
Technical structures and tanks of Vega MS station, Norilsk
Technical Structures
Tank Farm
Garage and vehicle fleet at Vega MS, Norilsk
Garage
Station Vehicle Fleet
Small Cross with direction finders, right side of frame
Small Cross
Direction Finders
Vega MS with calibration masts, view from Norilsk-Dudinka highway, polar summer
Highway View
Polar Summer
Vega MS with calibration masts, first snow, view from Norilsk-Dudinka highway
Highway View
First Snow, Autumn
Two calibration masts on plateau, Norilsk Vega MS
Calibration Masts
Plateau, End of Summer
Brick communications building and rear yard, Norilsk Vega MS
Rear Yard
Brick Communications Building
Polar sun over tundra and calibration masts, Norilsk Vega MS
Polar Sun
Over Tundra
Polar sun over tundra and calibration masts, Norilsk Vega MS
Polar Sun
and Calibration Masts
Vega MS calibration mast in different seasons
Calibration Mast
Through the Seasons
Vega MS calibration mast — seasons series
Calibration Mast
Seasons (Series)
Vega MS calibration mast among snow in tundra
9 Months a Year
Snow in Tundra
Garage, calibration mast and lighting tower, Norilsk Vega MS, summer
Garage and Masts
Norilsk, Summer
Backyard of Norilsk Vega MS technical facility in blizzard
Backyard
Blizzard
Garage, calibration mast and lighting tower, Norilsk Vega MS, winter period
Garage and Masts
Winter Period
Lighting tower and calibration mast in blizzard, Norilsk Vega MS
Lighting Tower
and Blizzard
Cable corridor in tundra, Norilsk Vega MS
Cable Corridor
in Tundra
Cable corridor in blizzard, Norilsk Vega MS
Cable Corridor
Blizzard
Left wing of Vega MS technical facility, high snow drifts and icicles on cladding
Left Wing
Technical Facility
Left wing of Vega MS technical facility in blizzard, snow drifts against wall
Left Wing
in Blizzard
Right side of Vega MS technical facility in blizzard, snow drifts against buildings
Right Side
in Blizzard
Small Cross with direction finders, winter view, Norilsk Vega MS
Small Cross
Direction Finders
Military base gates, calibration mast in distance, Norilsk Vega MS
Base Gates
and Mast
Base gates in snow, Norilsk Vega MS
Base Gates
in Snow
Calibration mast and fence in snow, Norilsk Vega MS
Calibration
Mast and Fence
Power transmission line against snow background, Norilsk Vega MS
Power
Transmission Line
Behind the code, there's always a human
Behind the code, there’s always a human
×
×