fbpx
Wikipedia

Joint Worldwide Intelligence Communications System

The Joint Worldwide Intelligence Communication System (JWICS, /ˈwɪks/ JAY-wiks) is the United States Department of Defense's secure[citation needed] intranet system that houses top secret and sensitive compartmented information. JWICS superseded the earlier DSNET2 and DSNET3, the Top Secret and SCI levels of the Defense Data Network based on ARPANET technology.[1][2]

Joint Worldwide Intelligence Communications System
Part of The United States Department of Defense Computer Networks
Based in United States
Site information
OperatorMultiple Operators
Controlled byThe United States Department of Defense
Open to
the public
No

The system deals primarily with intelligence information and was one of the networks accessed by Chelsea Manning, in the leaking of sensitive footage and intelligence during the Afghanistan and Iraq wars to whistleblower organization WikiLeaks in 2010.[3] The video used in WikiLeaks' Collateral Murder and US diplomatic cables were leaked by Manning.[4] In 2023, it was also accessed by Jack Teixeira who leaked information about the war in Ukraine.

Because of the information it houses, JWICS is subject to discussion around cybersecurity and the United States' vulnerability to cyber threats.

Opinions surrounding the Joint Worldwide Intelligence Communication system are varied. Some emphasize its importance as a measure to protect intelligence that helps to ensure the safety of US military interests and personnel. Others scrutinize the system for standing in the way of the transparency and accountability of government.

JWICS in practice Edit

 
Behind the Green Door secure communications center with SIPRNET, NMIS/GWAN, NSANET, and JWICS access

The Joint Worldwide Intelligence Communications System (JWICS) is a secure intranet system utilized by the United States Department of Defense to house "Top Secret/Sensitive Compartmented Information"[5] In day-to-day usage, the JWICS is used primarily by members of the Intelligence Community, such as the DIA within the DoD, and the Federal Bureau of Investigation under the Justice Department. Conversely, SIPRNet and NIPRNet account for the overwhelming bulk of usage within DoD and non-intelligence government agencies and departments.

There are three main router networks operated by the Department of Defense. Each is separated by the types of information they deal with.[6]

At the most open level, the Non-Classified Internet Protocol Router Network (NIPRNET) is the hub for non-classified but still specialized information relating to important logistics and planning.[6]

Above this lies the Secret Internet Protocol Router Network (SIPRNET). SIPRNET deals with information classified as Confidential or Secret.[6] SIPRNET is another of the networks accessed by Chelsea Manning (See Automation bias, #JWICS, WikiLeaks, and Chelsea Manning).[7][8]

Finally, the Joint Worldwide Intelligence Communications System houses the top level of data, consisting primarily of top-secret intelligence information.[6] The system deals with transmissions coming from across the globe. The transmission of information across the JWICS network is summarized by Jeffrey R. Cares in the Encyclopedia of Cyber Warfare:[5] See Joint All-Domain Command and Control

JWICS can utilize satellite network connections, and the traffic moving across the network can be sent in prioritized premarked packets, meaning that the most important and sensitive information can be sent on the fastest and most secure routes ... Once transmitted, the information is housed on JWICS and is accessible from "highly secured rooms known as Secret Compartmentalized Information Facilities. Such rooms are incredibly important facilities, and can be highly vulnerable if compromised.[5][6][8]

JWICS, WikiLeaks, and Chelsea Manning Edit

The vulnerability of secure networks such as JWICS to insider threats was revealed with the leak of hundreds of thousands of secret US intelligence documents, the largest in US history at the time.[8] At the epicenter of these leaks was an intelligence analyst, Chelsea Manning. While serving in Iraq in 2010, Manning accessed JWICS, along with its lower-level counterpart SIPRNET, to leak documents to WikiLeaks, a non-profit platform for whistleblowers headed by Julian Assange.[8][7] Manning was directly involved in the leaks known as "Collateral Murder," "The Iraqi War Logs," "The Afghan War Diary," and "Cablegate".[9] Manning is allegedly responsible for the leaking of over 700,000 files. At the time this was the largest data leak in US military history.[7] Manning was arrested in late 2010 after confiding in fellow hacker, Adrian Lamo, who reported Manning to the Federal Bureau of Investigation.[9]

It is believed that Manning's decision to supply the files to WikiLeaks began partly as a result of directly experiencing "war porn", graphic videos watched by analysts for entertainment. A notable video viewed by Manning that would later also capture public attention involved a US Apache helicopter firing on civilians. This video would be named "Collateral Murder."[7] Manning was also uncomfortable with and perceived censorship of Iraqi citizens in their published opinions on government, and the "don't ask, don't tell" construct surrounding homosexuality in the US military.[9][7] All of this information was contained in secure networks such as JWICS, causing their legitimacy as a form of a protection, rather than censorship, to be widely scrutinized in media and academic discourse.[7][9]

Manning was sentenced in 2013 to 35 years at Fort Leavenworth. This sentence was commuted by the Obama administration for release after 7 years in 2017.[10] Manning was again jailed after refusing to testify at the grand jury investigation against Wikileaks, and was released in March 2020.[11]

The events surrounding Manning led to widespread reforms. Training and monitoring is now in place to identify risk factors in analysts to prevent them using their position to leak documents from secure networks.[8] In addition, more widespread monitoring of the daily use of networks is undertaken.[8] Cybersecurity concerns are often discussed with a focus on hacking and external threats, but Mark Ambidner of The Atlantic highlighted the susceptibility of defense networks to trusted actors:

All it took was one disaffected young man [Sic] with a rudimentary knowledge of computer systems to bring down an entire edifice of code names, secret networks, compartmented channels, and protected information.[8]

Public interest Edit

Some argue from a pro-public interest perspective that JWICS allows government to manipulate releases of information (as occurred in "Collateral Murder") to shirk accountability for wrongdoings.[12]

Others, who take a more conservative approach to information release, cite the importance of protecting troops on the ground and deny the idea that full transparency is essential for democracy.[13]

Arguments Edit

 
A screengrab of footage from the 'Collateral Murder' video obtained and leaked by Chelsea Manning.

With the development of secure intranet networks and the increased use of technology in government and military operations, networks such as JWICS have come under scrutiny due to their perceived capacity to keep public interest information behind closed networks.[12]

At the heart of pro-public interest arguments is the desire to hold governments accountable for their wrongdoings. Academics posit that pre-1991 there was a layer of separation allowing organizations to be selective about what they released to the public. Thus, the advent of the World Wide Web in 1991 was viewed as a triumph of public interest, allowing individuals to "freely share what they knew." Since then, however, the development of secure networks such as JWICS has reinstated levels of separation between individuals and government and has again prevented the public from holding government to account. This has been exacerbated since 9/11 with the war on terror providing a 'scape-goat' for governments in hiding public interest information (such as the shooting of Iraqi journalists in "collateral murder") under the guise of protecting against foreign interests and terrorism.[12]

One of the main pro-protection arguments surrounding JWICS is that JWICS is essential to prevent the identities of individuals from being released. By releasing these documents en-masse without adequate care, leakers are putting these individuals at risk.[14] In the case of military operations, JWICS is also said to protect troops on the ground by safeguarding their strategy and movements.[12]

Pro-protection parties argue that leaking agents such as Wikileaks need to better censor the identities of individuals contained in their leaks to prevent harm.[14]

In several of WikiLeaks' leaks involving JWICS in the Iraq and Afghanistan wars, they worked alongside publications such as the New York Times. In publishing documents, the Times employed censorship efforts, consulting the CIA and the DoD about what to omit from their publication.[15]

The central counterargument to protection is that releases must balance the opposing forces of public interest and potential harm.[15] Pro-public interest speaker Simon Jenkins states that "The Job of Media is not to protect power from embarrassment."[15] Nonetheless, from a pro-protection standpoint, media does have a role in defining the limits of public interest in their publications to protect the safety of certain stakeholders.[14]

Counterterrorism Edit

JWICS operates as the highest level network in the DoD's information cyberspace.[6] It is a controlled network, and the information contained within it is of great importance to both the US, and other parties looking for information.[6][5]

Because of its importance, a key issue surrounding JWICS is the threat of cyberterrorism. Foundations like JWICS present critically important assets that if infiltrated, can lead to information and/or strategic advantages. This is not dissimilar to how strategic points like bases or fortresses would be infiltrated in regular warfare.[6]

The vulnerability of cyber networks lies in their construction. Structures are created through software written by individuals whose mistakes create vulnerabilities for those who want to protect information, and opportunities for those seeking it.[6] In addition, cyberterrorism is not restricted by geographical bounds. Networks can be hacked remotely from across the globe without warning.[6] This creates jurisdictional issues for enforcement.[16]

A key vulnerability for secret level networks such as JWICS is what is described as a 'sneakernet threat.' These systems are designed to be separate from the unclassified internet, creating a protection from malware. However, the systems also rely on users uploading documents from the internet. This creates a risk of viruses being passed on along with the information into the secure system.[6]

An example of this threat came to reality in 2008 when Russian malware made its way into the SIPRNET system by way of a thumb-drive which was plugged into classified-level computers accessing the network. These computers lacked virus protection due to their detachment from the internet, and were compromised as a result. The virus, once gaining access to these networks, acted as a 'beachhead' which allowed the transfer of data to foreign computers[17][6] The hack was, at the time, the largest compromise of US cybersecurity in history, and initially led to a ban on the use of thumb-drives.[17] this was later repealed.[18]

JWICS is structured slightly differently to SIPRNET. JWICS is accessed via "terminals" in protected facilities known as Secret Compartmentalized Information Facilities.[6] These physical facilities are highly protected as physical structures. This is because they present strategic advantage. If one terminal is accessed by an enemy, all of JWICS is available to them until that terminal is disconnected from the network.[6] Because of JWICS' structure, allowing access only through secure facilities, it is relatively protected from outside threats. However, there is an intrinsic vulnerability in JWICS that is summarized by Clarke and Knake in Cyber War: The Next Threat to National Security and What to do About It:

Access to these terminals is more restricted because of their location, but the information flowing on the network still has to go across fiber optic cables and through routers and servers, just as with any other network. Routers can be attacked to cut communications. The hardware used ... can all be compromised at the point of manufacture of later one. Therefore we cannot assume that even this network is reliable.[6]

The mounting threat to US cybersecurity has led to some developments surrounding defense. In 2011, Leon Panetta and other intelligence officials gave statements about the growing vulnerability of the US to cyber attacks. This stemmed from Pentagon Reports about critical security breaches in government and business networks.[16]

Since then the Department of Defense has rolled out and continually developed 'Einstein' software aimed at detecting and preventing intrusion into federal government networks. In addition, "the Department of Homeland Security and the NSA signed a memorandum of understanding the improve collaboration between the agencies."[16]

The 2008 Russian infiltration of SIPRNET led to large reforms in terms of defense strategy. In 2008, then defense Secretary Robert Gates moved to create a dedicated infrastructure dealing specializing with cyber warfare strategy – the Cyber Command. Cyber command was originally designed by Colonel Paul Nakasone, Lieutenant Colonel Jen Easterly, Navy Captain T. J. White, and Air Force Colonel Stephen Davis. These four became colloquially known as 'The Four Horsemen' and set out to create the framework for Cyber Command, the US's dedicated cyber-strategy wing.[19]

In 2016, Cyber Command gained separation from the NSA, elevating it to have a direct line to the White House. The Trump administration has further stretched the team's authority, allowing them to take a more offensive approach to cyber strategy.[19]

See also Edit

References Edit

  1. ^ MARCORSYSCOM – Website Temporarily Suspended 2011-02-20 at the Wayback Machine. Marcorsyscom.usmc.mil. Retrieved on 2014-04-12.
  2. ^ Joint Worldwide Intelligence Communications System (JWICS) 2015-04-09 at the Wayback Machine. Fas.org. Retrieved on 2014-04-12.
  3. ^ "WikiLeaks: From Wales to a US jail, via Iraq, the story of Bradley Manning". the Guardian. 2011-02-01. Retrieved 2022-02-22.
  4. ^ Kevin Poulsen and Kim Zetter (2010-06-06). "U.S. Intelligence Analyst Arrested in Wikileaks Video Probe". Wired. Retrieved 2010-06-15.
  5. ^ a b c d Cares, J. R. (2017). JWICS Network. In Springer, P. J. Encyclopaedia of Cyber Warfare (pp. 162-163). Santa Barbara, California, ABC-CLIO.
  6. ^ a b c d e f g h i j k l m n o Clarke, R. A., Knake, R. K. (2012) Cyber War: The Next Threat to National Security and What to do About it. New York, United States: HarperCollins.
  7. ^ a b c d e f Salera, B. (2017). Manning, Bradley. In Springer, P. J. Encyclopaedia of Cyber Warfare (pp. 175-177). Santa Barbara, California, ABC-CLIO.
  8. ^ a b c d e f g Ambinder, Marc (2010-11-29). "WikiLeaks: One Analyst, So Many Documents". The Atlantic. Retrieved 2023-08-11.
  9. ^ a b c d Maxwell, L. (2019). Chelsea Manning as Transformative Truth-Teller. In Insurgent Truth: Chelsea Manning and the Politics of Outsider Truth-Telling.(pp. 55-80) : Oxford University Press. doi:10.1093/oso/9780190920029.001.0001
  10. ^ Munro, I. (2019). An interview with Chelsea Manning's lawyer: Nancy Hollander on human rights and the protection of whistleblowers. Organization, 26(2), 276–290. doi:10.1177/1350508418779648
  11. ^ "Chelsea Manning Is Ordered Released From Jail (Published 2020)". 2020-03-12. Retrieved 2023-08-11.
  12. ^ a b c d Brevini, B., Murdock, G. (2013) Following the Money: WikiLeaks and the Political Economy of Disclosure. In Brevini, B., Hintz, A., McCurdy, P. (2013) Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society. (pp. 35-55). London, United Kingdom: Palgrave MacMillan
  13. ^ Moore, M. (2011). The Limits of Transparency. The Political Quarterly., 82(4), 506–508. doi:10.1111/j.1467-923X.2011.02248.x
  14. ^ a b c "Is Wikileaks putting people at risk?". BBC News. 2016-08-23. Retrieved 2023-08-11.
  15. ^ a b c Elliot, C. (2013). WikiLeaks and the Public Interest Dilemma: A View from Inside the Media. In Brevini, B., Hintz, A., McCurdy, P. (2013). Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society. (pp. 35-55). London, United Kingdom: Palgrave MacMillan
  16. ^ a b c "CIA Director Leon Panetta Warns of Possible Cyber-Pearl Harbor". ABC News. Retrieved 2023-08-11.
  17. ^ a b III, William J. Lynn (2010-09-01). "Defending a New Domain". Foreign Affairs. No. September/October 2010. ISSN 0015-7120. Retrieved 2023-08-11.
  18. ^ Shachtman, Noah. "Hackers, Troops Rejoice: Pentagon Lifts Thumb-Drive Ban (Updated)". Wired. ISSN 1059-1028. Retrieved 2023-08-11.
  19. ^ a b Matishak, Martin (2018-11-29). "A decade after Russia hacked the Pentagon, Trump unshackles Cyber Command". POLITICO. Retrieved 2023-08-11.

External links Edit

  • DoD USMC JWICS Program
  • DoD DISA Data including JWICS (TS/SCI IP Data)

joint, worldwide, intelligence, communications, system, joint, worldwide, intelligence, communication, system, jwics, wiks, united, states, department, defense, secure, citation, needed, intranet, system, that, houses, secret, sensitive, compartmented, informa. The Joint Worldwide Intelligence Communication System JWICS ˈ dʒ eɪ w ɪ k s JAY wiks is the United States Department of Defense s secure citation needed intranet system that houses top secret and sensitive compartmented information JWICS superseded the earlier DSNET2 and DSNET3 the Top Secret and SCI levels of the Defense Data Network based on ARPANET technology 1 2 Joint Worldwide Intelligence Communications SystemPart of The United States Department of Defense Computer NetworksBased in United StatesSite informationOperatorMultiple OperatorsControlled byThe United States Department of DefenseOpen tothe publicNoThe system deals primarily with intelligence information and was one of the networks accessed by Chelsea Manning in the leaking of sensitive footage and intelligence during the Afghanistan and Iraq wars to whistleblower organization WikiLeaks in 2010 3 The video used in WikiLeaks Collateral Murder and US diplomatic cables were leaked by Manning 4 In 2023 it was also accessed by Jack Teixeira who leaked information about the war in Ukraine Because of the information it houses JWICS is subject to discussion around cybersecurity and the United States vulnerability to cyber threats Opinions surrounding the Joint Worldwide Intelligence Communication system are varied Some emphasize its importance as a measure to protect intelligence that helps to ensure the safety of US military interests and personnel Others scrutinize the system for standing in the way of the transparency and accountability of government Contents 1 JWICS in practice 2 JWICS WikiLeaks and Chelsea Manning 3 Public interest 3 1 Arguments 4 Counterterrorism 5 See also 6 References 7 External linksJWICS in practice Edit nbsp Behind the Green Door secure communications center with SIPRNET NMIS GWAN NSANET and JWICS accessThe Joint Worldwide Intelligence Communications System JWICS is a secure intranet system utilized by the United States Department of Defense to house Top Secret Sensitive Compartmented Information 5 In day to day usage the JWICS is used primarily by members of the Intelligence Community such as the DIA within the DoD and the Federal Bureau of Investigation under the Justice Department Conversely SIPRNet and NIPRNet account for the overwhelming bulk of usage within DoD and non intelligence government agencies and departments There are three main router networks operated by the Department of Defense Each is separated by the types of information they deal with 6 At the most open level the Non Classified Internet Protocol Router Network NIPRNET is the hub for non classified but still specialized information relating to important logistics and planning 6 Above this lies the Secret Internet Protocol Router Network SIPRNET SIPRNET deals with information classified as Confidential or Secret 6 SIPRNET is another of the networks accessed by Chelsea Manning See Automation bias JWICS WikiLeaks and Chelsea Manning 7 8 Finally the Joint Worldwide Intelligence Communications System houses the top level of data consisting primarily of top secret intelligence information 6 The system deals with transmissions coming from across the globe The transmission of information across the JWICS network is summarized by Jeffrey R Cares in the Encyclopedia of Cyber Warfare 5 See Joint All Domain Command and Control JWICS can utilize satellite network connections and the traffic moving across the network can be sent in prioritized premarked packets meaning that the most important and sensitive information can be sent on the fastest and most secure routes Once transmitted the information is housed on JWICS and is accessible from highly secured rooms known as Secret Compartmentalized Information Facilities Such rooms are incredibly important facilities and can be highly vulnerable if compromised 5 6 8 JWICS WikiLeaks and Chelsea Manning EditThe vulnerability of secure networks such as JWICS to insider threats was revealed with the leak of hundreds of thousands of secret US intelligence documents the largest in US history at the time 8 At the epicenter of these leaks was an intelligence analyst Chelsea Manning While serving in Iraq in 2010 Manning accessed JWICS along with its lower level counterpart SIPRNET to leak documents to WikiLeaks a non profit platform for whistleblowers headed by Julian Assange 8 7 Manning was directly involved in the leaks known as Collateral Murder The Iraqi War Logs The Afghan War Diary and Cablegate 9 Manning is allegedly responsible for the leaking of over 700 000 files At the time this was the largest data leak in US military history 7 Manning was arrested in late 2010 after confiding in fellow hacker Adrian Lamo who reported Manning to the Federal Bureau of Investigation 9 It is believed that Manning s decision to supply the files to WikiLeaks began partly as a result of directly experiencing war porn graphic videos watched by analysts for entertainment A notable video viewed by Manning that would later also capture public attention involved a US Apache helicopter firing on civilians This video would be named Collateral Murder 7 Manning was also uncomfortable with and perceived censorship of Iraqi citizens in their published opinions on government and the don t ask don t tell construct surrounding homosexuality in the US military 9 7 All of this information was contained in secure networks such as JWICS causing their legitimacy as a form of a protection rather than censorship to be widely scrutinized in media and academic discourse 7 9 Manning was sentenced in 2013 to 35 years at Fort Leavenworth This sentence was commuted by the Obama administration for release after 7 years in 2017 10 Manning was again jailed after refusing to testify at the grand jury investigation against Wikileaks and was released in March 2020 11 The events surrounding Manning led to widespread reforms Training and monitoring is now in place to identify risk factors in analysts to prevent them using their position to leak documents from secure networks 8 In addition more widespread monitoring of the daily use of networks is undertaken 8 Cybersecurity concerns are often discussed with a focus on hacking and external threats but Mark Ambidner of The Atlantic highlighted the susceptibility of defense networks to trusted actors All it took was one disaffected young man Sic with a rudimentary knowledge of computer systems to bring down an entire edifice of code names secret networks compartmented channels and protected information 8 Public interest EditSome argue from a pro public interest perspective that JWICS allows government to manipulate releases of information as occurred in Collateral Murder to shirk accountability for wrongdoings 12 Others who take a more conservative approach to information release cite the importance of protecting troops on the ground and deny the idea that full transparency is essential for democracy 13 Arguments Edit nbsp A screengrab of footage from the Collateral Murder video obtained and leaked by Chelsea Manning With the development of secure intranet networks and the increased use of technology in government and military operations networks such as JWICS have come under scrutiny due to their perceived capacity to keep public interest information behind closed networks 12 At the heart of pro public interest arguments is the desire to hold governments accountable for their wrongdoings Academics posit that pre 1991 there was a layer of separation allowing organizations to be selective about what they released to the public Thus the advent of the World Wide Web in 1991 was viewed as a triumph of public interest allowing individuals to freely share what they knew Since then however the development of secure networks such as JWICS has reinstated levels of separation between individuals and government and has again prevented the public from holding government to account This has been exacerbated since 9 11 with the war on terror providing a scape goat for governments in hiding public interest information such as the shooting of Iraqi journalists in collateral murder under the guise of protecting against foreign interests and terrorism 12 One of the main pro protection arguments surrounding JWICS is that JWICS is essential to prevent the identities of individuals from being released By releasing these documents en masse without adequate care leakers are putting these individuals at risk 14 In the case of military operations JWICS is also said to protect troops on the ground by safeguarding their strategy and movements 12 Pro protection parties argue that leaking agents such as Wikileaks need to better censor the identities of individuals contained in their leaks to prevent harm 14 In several of WikiLeaks leaks involving JWICS in the Iraq and Afghanistan wars they worked alongside publications such as the New York Times In publishing documents the Times employed censorship efforts consulting the CIA and the DoD about what to omit from their publication 15 The central counterargument to protection is that releases must balance the opposing forces of public interest and potential harm 15 Pro public interest speaker Simon Jenkins states that The Job of Media is not to protect power from embarrassment 15 Nonetheless from a pro protection standpoint media does have a role in defining the limits of public interest in their publications to protect the safety of certain stakeholders 14 Counterterrorism EditJWICS operates as the highest level network in the DoD s information cyberspace 6 It is a controlled network and the information contained within it is of great importance to both the US and other parties looking for information 6 5 Because of its importance a key issue surrounding JWICS is the threat of cyberterrorism Foundations like JWICS present critically important assets that if infiltrated can lead to information and or strategic advantages This is not dissimilar to how strategic points like bases or fortresses would be infiltrated in regular warfare 6 The vulnerability of cyber networks lies in their construction Structures are created through software written by individuals whose mistakes create vulnerabilities for those who want to protect information and opportunities for those seeking it 6 In addition cyberterrorism is not restricted by geographical bounds Networks can be hacked remotely from across the globe without warning 6 This creates jurisdictional issues for enforcement 16 A key vulnerability for secret level networks such as JWICS is what is described as a sneakernet threat These systems are designed to be separate from the unclassified internet creating a protection from malware However the systems also rely on users uploading documents from the internet This creates a risk of viruses being passed on along with the information into the secure system 6 An example of this threat came to reality in 2008 when Russian malware made its way into the SIPRNET system by way of a thumb drive which was plugged into classified level computers accessing the network These computers lacked virus protection due to their detachment from the internet and were compromised as a result The virus once gaining access to these networks acted as a beachhead which allowed the transfer of data to foreign computers 17 6 The hack was at the time the largest compromise of US cybersecurity in history and initially led to a ban on the use of thumb drives 17 this was later repealed 18 JWICS is structured slightly differently to SIPRNET JWICS is accessed via terminals in protected facilities known as Secret Compartmentalized Information Facilities 6 These physical facilities are highly protected as physical structures This is because they present strategic advantage If one terminal is accessed by an enemy all of JWICS is available to them until that terminal is disconnected from the network 6 Because of JWICS structure allowing access only through secure facilities it is relatively protected from outside threats However there is an intrinsic vulnerability in JWICS that is summarized by Clarke and Knake in Cyber War The Next Threat to National Security and What to do About It Access to these terminals is more restricted because of their location but the information flowing on the network still has to go across fiber optic cables and through routers and servers just as with any other network Routers can be attacked to cut communications The hardware used can all be compromised at the point of manufacture of later one Therefore we cannot assume that even this network is reliable 6 The mounting threat to US cybersecurity has led to some developments surrounding defense In 2011 Leon Panetta and other intelligence officials gave statements about the growing vulnerability of the US to cyber attacks This stemmed from Pentagon Reports about critical security breaches in government and business networks 16 Since then the Department of Defense has rolled out and continually developed Einstein software aimed at detecting and preventing intrusion into federal government networks In addition the Department of Homeland Security and the NSA signed a memorandum of understanding the improve collaboration between the agencies 16 The 2008 Russian infiltration of SIPRNET led to large reforms in terms of defense strategy In 2008 then defense Secretary Robert Gates moved to create a dedicated infrastructure dealing specializing with cyber warfare strategy the Cyber Command Cyber command was originally designed by Colonel Paul Nakasone Lieutenant Colonel Jen Easterly Navy Captain T J White and Air Force Colonel Stephen Davis These four became colloquially known as The Four Horsemen and set out to create the framework for Cyber Command the US s dedicated cyber strategy wing 19 In 2016 Cyber Command gained separation from the NSA elevating it to have a direct line to the White House The Trump administration has further stretched the team s authority allowing them to take a more offensive approach to cyber strategy 19 See also EditWorldwide Military Command and Control System Global Command and Control System Classified website Intellipedia NIPRNET SIPRNET TNet WikiLeaks Julian Assange Chelsea ManningReferences Edit MARCORSYSCOM Website Temporarily Suspended Archived 2011 02 20 at the Wayback Machine Marcorsyscom usmc mil Retrieved on 2014 04 12 Joint Worldwide Intelligence Communications System JWICS Archived 2015 04 09 at the Wayback Machine Fas org Retrieved on 2014 04 12 WikiLeaks From Wales to a US jail via Iraq the story of Bradley Manning the Guardian 2011 02 01 Retrieved 2022 02 22 Kevin Poulsen and Kim Zetter 2010 06 06 U S Intelligence Analyst Arrested in Wikileaks Video Probe Wired Retrieved 2010 06 15 a b c d Cares J R 2017 JWICS Network In Springer P J Encyclopaedia of Cyber Warfare pp 162 163 Santa Barbara California ABC CLIO a b c d e f g h i j k l m n o Clarke R A Knake R K 2012 Cyber War The Next Threat to National Security and What to do About it New York United States HarperCollins a b c d e f Salera B 2017 Manning Bradley In Springer P J Encyclopaedia of Cyber Warfare pp 175 177 Santa Barbara California ABC CLIO a b c d e f g Ambinder Marc 2010 11 29 WikiLeaks One Analyst So Many Documents The Atlantic Retrieved 2023 08 11 a b c d Maxwell L 2019 Chelsea Manning as Transformative Truth Teller In Insurgent Truth Chelsea Manning and the Politics of Outsider Truth Telling pp 55 80 Oxford University Press doi 10 1093 oso 9780190920029 001 0001 Munro I 2019 An interview with Chelsea Manning s lawyer Nancy Hollander on human rights and the protection of whistleblowers Organization 26 2 276 290 doi 10 1177 1350508418779648 Chelsea Manning Is Ordered Released From Jail Published 2020 2020 03 12 Retrieved 2023 08 11 a b c d Brevini B Murdock G 2013 Following the Money WikiLeaks and the Political Economy of Disclosure In Brevini B Hintz A McCurdy P 2013 Beyond WikiLeaks Implications for the Future of Communications Journalism and Society pp 35 55 London United Kingdom Palgrave MacMillan Moore M 2011 The Limits of Transparency The Political Quarterly 82 4 506 508 doi 10 1111 j 1467 923X 2011 02248 x a b c Is Wikileaks putting people at risk BBC News 2016 08 23 Retrieved 2023 08 11 a b c Elliot C 2013 WikiLeaks and the Public Interest Dilemma A View from Inside the Media In Brevini B Hintz A McCurdy P 2013 Beyond WikiLeaks Implications for the Future of Communications Journalism and Society pp 35 55 London United Kingdom Palgrave MacMillan a b c CIA Director Leon Panetta Warns of Possible Cyber Pearl Harbor ABC News Retrieved 2023 08 11 a b III William J Lynn 2010 09 01 Defending a New Domain Foreign Affairs No September October 2010 ISSN 0015 7120 Retrieved 2023 08 11 Shachtman Noah Hackers Troops Rejoice Pentagon Lifts Thumb Drive Ban Updated Wired ISSN 1059 1028 Retrieved 2023 08 11 a b Matishak Martin 2018 11 29 A decade after Russia hacked the Pentagon Trump unshackles Cyber Command POLITICO Retrieved 2023 08 11 External links EditDoD USMC JWICS Program DoD DISA Data including JWICS TS SCI IP Data Retrieved from https en wikipedia org w index php title Joint Worldwide Intelligence Communications System amp oldid 1169799436, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.