287,296 Pages

Header of an unclassified Department of State telegram with the "SIPDIS" tag marked in red

The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the United States Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the TCP/IP protocols in a 'completely secure' environment".[1] It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD's classified version of the civilian Internet.

SIPRNet is the SECRET component of the Defense Information Systems Network.[2]

Access[edit | edit source]

Behind the Green Door secure communications center with SIPRNET, GWAN, NSANET, and JWICS access

According to the U.S. Department of State Web Development Handbook, domain structure and naming conventions are the same as for the open internet, except for the addition of a second-level domain, like, e.g., "sgov" between state and gov: openforum.state.sgov.gov.[3] Files originating from SIPRNET are marked by a header tag "SIPDIS" (SIPrnet DIStribution).[4] A corresponding second-level domain smil.mil exists for DoD users.[5]

According to the Pentagon, SIPRNet has approximately 4.2 million users.[6] Access is also available to a "...small pool of trusted allies, including Australia, Canada, the United Kingdom and New Zealand..."[7]

SIPRNet was one of the networks accessed by Bradley Manning, convicted of leaking the video used in WikiLeaks' "Collateral Murder" release[8] as well as the source of the US diplomatic cables published by WikiLeaks in November 2010.[9]

See also[edit | edit source]

References[edit | edit source]

  1. "2005 Defense Base Closure and Realignment Commission Report: Fort Monmouth, New Jersey Recommendation # 5". U.S. Department of Defense. 28 December 2007. http://www.defense.gov/brac/pdf/Report-Closure-FortMonmouth.pdf. Retrieved 17 December 2010. 
  2. "Secret Internet Protocol Router Network (SIPRNET)". Federation of American Scientists' Intelligence Resource Program. http://www.fas.org/irp/program/disseminate/siprnet.htm. Retrieved 12 December 2010. 
  3. "U.S. Department of State Foreign Affairs Handbook Volume 5 Handbook 8 - Web Development Handbook: 5 FAH-8 H-342.2 ClassNet Standards". U.S. Department of State. 29 September 2005. http://www.state.gov/documents/organization/89220.pdf. Retrieved 15 December 2010. 
  4. "Siprnet: Where the leaked cables came from". BBC. 29 November 2010. http://www.bbc.co.uk/news/world-us-canada-11863618. Retrieved 19 December 2010. 
  5. Grimes, John G. (14 April 2008). "Internet Domain Name Use and Approval". Department of Defense. Archived from the original on 15 July 2013. http://web.archive.org/web/20130715100339/http://cryptome.org/dodi/dodi-8410-01.pdf. 
  6. Miller, Hayley (September 23, 2011). "Security Clearances: 4.2 Million People Have Access To The Government's Classified Information". Huffington Post. http://www.huffingtonpost.com/2011/09/20/security-clearances-government-classified-information_n_972492.html. Retrieved 23 August 2011. 
  7. Field, Michael (2 December 2010). "NZ way down the WikiLeaks queue". Fairfax New Zealand. http://www.stuff.co.nz/national/4415037/NZ-way-down-the-WikiLeaks-queue. Retrieved 17 December 2010. 
  8. Poulsen, Kevin; Zetter, Kim (6 June 2010). "U.S. Intelligence Analyst Arrested in Wikileaks Video Probe". http://www.wired.com/threatlevel/2010/06/leak/. Retrieved 15 June 2010. 
  9. Leigh, David (28 November 2010). "US embassy cables leak sparks global diplomacy crisis". The Guardian. http://www.guardian.co.uk/world/2010/nov/28/us-embassy-cable-leak-diplomacy-crisis. Retrieved 28 November 2010. 

External links[edit | edit source]

This page uses Creative Commons Licensed content from Wikipedia (view authors).
Community content is available under CC-BY-SA unless otherwise noted.