Recent from talks
Contribute something
Nothing was collected or created yet.
SIPRNet
View on Wikipedia
Key Information
The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment".[1] It also provides services such as hypertext document access and electronic mail.
SIPRNet is a component of the Defense Information Systems Network.[2] Other components handle communications with other security needs, such as the NIPRNet, which is used for nonsecure communications, and the Joint Worldwide Intelligence Communications System (JWICS), which is used for Top Secret communications.
Access
[edit]
According to the U.S. Department of State Web Development Handbook, domain structure and naming conventions are the same as for the open internet, except for the addition of a second-level domain, like, e.g., "sgov" between state and gov: openforum.state.sgov.gov.[3] Files originating from SIPRNet are marked by a header tag "SIPDIS" (SIPrnet DIStribution).[4] A corresponding second-level domain smil.mil exists for DoD users.[5]
Access is also available to a "...small pool of trusted allies, including Australia, Canada, the United Kingdom and New Zealand...".[6] This group (including the US) is known as the Five Eyes.
SIPRNet was one of the networks accessed by Chelsea Manning, convicted of leaking the video used in WikiLeaks' "Collateral Murder" release[7] as well as the source of the US diplomatic cables published by WikiLeaks in November 2010.[8]
Alternate names
[edit]SIPRNet and NIPRNet are referred to colloquially as SIPPERnet and NIPPERnet (or simply sipper and nipper), respectively.[9][10]
See also
[edit]References
[edit]- ^ Us defense information systems agency handbook. [Place of publication not identified]: Intl Business Pubns Usa. 2007. ISBN 978-1-4330-5548-5. OCLC 946756401.
- ^ "Secret Internet Protocol Router Network (SIPRNET)". Federation of American Scientists' Intelligence Resource Program. Archived from the original on July 26, 1997. Retrieved 12 December 2010.
- ^ "U.S. Department of State Foreign Affairs Handbook Volume 5 Handbook 8 - Web Development Handbook: 5 FAH-8 H-342.2 ClassNet Standards". U.S. Department of State. 29 September 2005. Retrieved 12 Jan 2016.
- ^ "Siprnet: Where the leaked cables came from". BBC. 29 November 2010. Retrieved 19 December 2010.
- ^ Grimes, John G. (14 April 2008). "Internet Domain Name Use and Approval" (PDF). Department of Defense. Archived from the original (PDF) on August 21, 2010.
- ^ Field, Michael (2 December 2010). "NZ way down the WikiLeaks queue". Fairfax New Zealand. Retrieved 17 December 2010.
- ^ Poulsen, Kevin; Zetter, Kim (6 June 2010). "U.S. Intelligence Analyst Arrested in Wikileaks Video Probe". Wired. Retrieved 15 June 2010.
- ^ Leigh, David (28 November 2010). "US embassy cables leak sparks global diplomacy crisis". The Guardian. Retrieved 28 November 2010.
- ^ "Definition of NIPRNet". PCMag. n.d. Retrieved 18 August 2021.
- ^ Harold F. Tipton; Micki Krause Nozaki (2010). Information Security Management Handbook, Volume 4 (6th ed.). CRC Press. p. 67. ISBN 9781439819036.
External links
[edit]- DISA Archived 2011-07-23 at the Wayback Machine
- Secret Internet Protocol Router Network (SIPRNET) Archived 1997-07-26 at the Wayback Machine by the Federation of American Scientists' Intelligence Resource Program
- They've Got Learning Locked Down – article detailing U.S. Coast Guard Academy classroom being first to get access to SIPRNet
- BBC Article on SIPRNet
SIPRNet
View on GrokipediaHistory
Origins and Early Development
The Secret Internet Protocol Router Network (SIPRNet) emerged from the U.S. Department of Defense's (DoD) push in the late 1980s and early 1990s to transition classified communications from legacy systems to internet protocol (IP)-based routing, addressing limitations in scalability, interoperability, and data sharing for secret-level information. Prior to SIPRNet, the Defense Data Network (DDN)—operational since 1982—relied on DSNET1 for secret traffic, which used dedicated leased lines, X.25 packet switching, and non-IP protocols that hindered efficient global connectivity and integration with emerging DoD networks.[6] This shift was driven by the need for a unified, router-driven infrastructure capable of supporting command-and-control systems, intelligence dissemination, and logistical coordination amid post-Cold War operational demands.[7] Development of SIPRNet began as the designated secret-level component of the Defense Information Systems Network (DISN), with initial planning tied to DoD directives in the early 1990s to consolidate communications under IP standards while embedding cryptographic protections. The Defense Information Systems Agency (DISA), formerly the Defense Communications Agency, oversaw its architecture, which emphasized a core backbone of high-speed routers connected via encrypted links to ensure end-to-end security for data up to the Secret classification. Establishment milestones included prototype implementations around 1991, marking the operational rollout of IP routing to replace DSNET1's circuit-switched model, enabling features like secure email and file transfers across DoD components.[8] [9] Early expansion in the mid-1990s involved deploying over 100 backbone nodes worldwide, integrating Type 1 inline network encryptors (INEs) compliant with National Security Agency standards, and establishing accreditation processes through the DISN Security Accreditation Working Group to mitigate risks in multidomain operations. By 1996, as DISN formalized its structure, SIPRNet supported approximately 1,000 sites and facilitated interoperability with allied forces under controlled releasability protocols, though initial challenges included bandwidth constraints and vulnerability to insider threats due to its air-gapped design from unclassified networks.[7] [6] This foundational phase laid the groundwork for SIPRNet's role in operations like Desert Storm aftermath planning, prioritizing causal reliability in secure data flows over legacy silos.[10]Expansion and Key Milestones
Following its initial development as an IP-based network for secret-level communications within the Defense Information Systems Network (DISN), SIPRNet expanded rapidly in the early 2000s to support increased demand for secure data sharing amid global military operations.[10] This growth was accelerated after the September 11, 2001, terrorist attacks, when access was broadened across U.S. government agencies to enhance inter-agency collaboration and intelligence dissemination, replacing more fragmented legacy systems like DSNET1 with standardized routing capabilities.[11][10] By the mid-2000s, SIPRNet had become the DoD's primary backbone for classified command-and-control traffic, integrating with joint operations and extending connectivity to forward-deployed units.[12] Key modernization milestones in the 2010s and 2020s focused on infrastructure upgrades to address scalability, cybersecurity vulnerabilities, and compatibility with emerging technologies. In 2013, the U.S. Army initiated migrations of SIPRNet infrastructure at major installations, such as Fort Huachuca, to consolidate and upgrade network endpoints for improved reliability.[13] The 2019 SIPRNet Enterprise Modernization program, contracted to Perspecta (now part of Peraton), streamlined core infrastructure, enhanced management tools, and reduced operational silos to support higher throughput for data-intensive applications.[14] Subsequent efforts integrated zero trust principles per the DoD's 2022 strategy, with phased rollouts emphasizing continuous authentication and reduced lateral movement risks across the network.[3]- Early 2010s: Implementation of public key infrastructure (PKI) enforcement on SIPRNet, mandating token-based access for enhanced encryption and user authentication.[15]
- 2022 onward: Upgrades for Microsoft 365 at Impact Level 6 (IL6) authorization, enabling secure cloud collaboration on classified workflows while expanding endpoint monitoring.[16][3]
- Ongoing: Global Army-led modernization of SIPRNet as the mission command network, prioritizing cybersecurity enhancements and integration with tactical edge systems.[17]
