The Secret Internet Protocol Router Network ( SIPRNet ) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET ) by packet switching over the 'completely secure' environment". It also provides services such as hypertext document access and electronic mail . As such, SIPRNet is the DoD's classified version of the civilian Internet .
19-659: SIPRNet is the secret component of the Defense Information Systems Network . Other components handle communications with other security needs, such as the NIPRNet , which is used for nonsecure communications, and the Joint Worldwide Intelligence Communications System (JWICS), which is used for Top Secret communications. According to the U.S. Department of State Web Development Handbook, domain structure and naming conventions are
38-521: A severe cyberattack in 2008, in the form of a computer virus which spread through military computer networks. As a result, the US Strategic Command banned all forms of removable media , including thumb drives , DVDs , and floppy disks . At the time, the GIG contained about 17 million military computers, and it was scanned millions of times daily. The Department of Defense Information Enterprise
57-553: Is defined as the DoD information resources, assets, and processes required to achieve an information advantage and share information across the Department of Defense and with mission partners. It includes: The Network-Centric Warfare (NCW) doctrine represents a fundamental shift in military culture, away from compartmentalized war machines and toward interconnected units operating cohesively. The tenets of Network Centric Warfare are: At
76-478: Is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA) , and Command & Control (C2) that the Commander (CDR) of United States Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate and defend the GIG to ensure information superiority. The specifications for the GIG were published by the DoD on 22 September 1999, and
95-560: Is not, and will not be, connected to the enterprise network. This new definition removes references to the National Security Systems as defined in section 5142 of the Clinger-Cohen Act of 1996 . Further, this new definition removes the references to the GIG providing capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites). And lastly, this definition removes
114-716: Is the most visible manifestation of network-centric warfare . It is the combination of technology and human activity that enables warfighters to access information on demand. It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel". The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems . Non-GIG Information Technology (IT) includes stand-alone, self-contained, or embedded IT that
133-569: The United States Department of Defense 's enterprise telecommunications network for providing data, video, and voice services for 40 years. The DISN end-to-end infrastructure is composed of three major segments: The DISN provides the following multiple networking services: The Organizational Messaging Service provides a range of assured services to the customer community that includes the military services, DoD agencies, combatant commands (CCMDs), non-DoD U.S. government activities, and
152-600: The United States Department of Defense . It is a worldwide network of information transmission, of associated processes, and of personnel serving to collect, process, safeguard, transmit, and manage this information. It is an all-encompassing communications project of the United States Department of Defense . The GIG makes this immediately available to military personnel, to those responsible for military politics, and for support personnel. It includes all infrastructure, bought or loaned, of communications, electronics, informatics (including software and databases), and security. It
171-399: The assistant secretary of defense officially mandated it on 19 September 2002 to carry out the project. Although in 2008, the ambitious objectives of the program had not been realized, informatic communications between soldiers and commanders on the battlefield had been successfully realized, the most well-known examples having occurred during the 2003 invasion of Iraq . The GIG underwent
190-707: The DISA-provided infrastructure. Additionally, information confidentiality and integrity are guaranteed through the use of NSA-approved Fortezza-based encryption and signature between the Automated Message Handling Systems (AMHSs) operated/maintained by the Services/agencies/COCOMs. Dedicated service is a private-line-transport service that provides point-to-point connectivity to mission partner locations. DISA mission partners require dedicated point-to-point layer 1 and layer 2 circuits because of
209-576: The GIG-BE program achieved the milestone of full operational capability at all of the almost 100 Joint Staff approved sites. As defined in CJCSI 6211.02C, Defense Information Systems Network (DISN) Policy and Responsibilities, 9 July 2008, end-to-end is defined as the fusion of requisite components to deliver a defined capability. For the GIG , this implies components from the user access and display devices and sensors to
SECTION 10
#1733085977418228-639: The Intelligence Community (IC). These services include the ability to exchange official information between military organizations and to support interoperability with allied nations, non-DoD activities, and the IC operating in both the strategic/fixed-base and the tactical/deployed environments. Organizational Messaging supports the assured secure delivery of organizational messages within strict service parameters. This includes delivery times of three minutes or less for high precedence (flash and above) messages across
247-879: The United Kingdom and New Zealand...". This group (including the US) is known as the Five Eyes . SIPRNet was one of the networks accessed by Chelsea Manning , convicted of leaking the video used in WikiLeaks ' " Collateral Murder " release as well as the source of the US diplomatic cables published by WikiLeaks in November 2010. SIPRNet and NIPRNet are referred to colloquially as SIPPERnet and NIPPERnet (or simply sipper and nipper ), respectively. Defense Information Systems Network The Defense Information Systems Network (DISN) has been
266-811: The United States. As one of few on time, within budget, to required performance standard DoD ACAT 1AM programs, GIG-BE shows how a government integrated, contractor assisted acquisition can achieve transformational results. The $ 877 million programs was the largest DoD information technology transport structure ever built. GIG-BE created a ubiquitous "bandwidth-available" environment to improve national security intelligence, surveillance, reconnaissance, information assurance, and command and control at locations worldwide. After extensive component integration and operational testing, implementation began in early 2004 and extended through 2005. GIG-BE achieved initial operational capability (IOC) at six sites 30 Sept. 2004. On 20 Dec. 2005,
285-612: The enterprise level, forging new paths with whom components of the military communicate will ease logistics burdens, improve communication and combat effectiveness of the war fighter, decrease instances of confusion-related fratricide , accelerate the trend in minimizing collateral damage, and hasten the flow of business. For the warfighter , situational awareness would be improved tremendously by linking what he sees with what an overhead satellite sees. The fog of war would be lifted by seamless communication between unit members, off site detection devices, and commanders operating behind
304-538: The inherent simplicity and security. To satisfy this demand, Dedicated services are currently offered and are available in a variety of bit rates and interfaces. The technical core of the DISN is provided by the capabilities built by DISA from 2002–2006 called the Global Information Grid-Bandwidth Expansion (GIG-BE). This program remains to this day the core of the services provided by DISA to serve
323-421: The part of the definition that discusses the interfaces to coalition, allied, and non-Department of Defense users and systems. The DoD's use of the term "GIG" is undergoing changes as the Department deals with new concepts such as Cyberspace Operations, GIG 2.0 (A Joint Staff J6 Initiative), and the Department of Defense Information Enterprise (DIE). The GIG is managed by a construct known as NetOps . NetOps
342-407: The same as for the open internet, except for the addition of a second-level domain , like, e.g., "sgov" between state and gov: openforum.state.sgov.gov. Files originating from SIPRNet are marked by a header tag "SIPDIS" (SIPrnet DIStribution). A corresponding second-level domain smil.mil exists for DoD users. Access is also available to a "...small pool of trusted allies, including Australia, Canada,
361-531: The various levels of networking and processing, associated applications, and related transport and management services. For DISN services, end-to-end encompasses service user to service user (e.g., PC-to-PC, phone-to-phone). Global Information Grid The Global Information Grid ( GIG ), now referred to as the Department of Defense Information Network ( DODIN ), refers to the entire network of information transmission and processing capabilities maintained by
#417582