Archives for WikiLeaks

The Joint Worldwide Intelligence Communications System (JWICS)

The Joint Worldwide Intelligence Communications System (JWICS) is a Top Secret/SCI network. Just like the Secret Internet Protocol Router Network (SIPRNet) and the Nonsecure Internet Protocol Router Network (NIPRNet), JWICS is basically the same thing with the exception of what it is used for. The JWICS is primarily used for file sharing to transmit information that is classified up to and including the “Top Secret” level of the United States government classification system. Information that is classified at this level would cause “exceptionally grave damage” to national security if disclosed to the public. There are about 1.4 million Americans who
Read More

Categories: Information Technology, IT Security, and Preston Hood.

The Secret Internet Protocol Router Network (SIPRNet)

The Secret Internet Protocol Router Network (SIPRNet) is basically a secure network that is used by the United States Department of Defense (DoD) and the United States Department of State (DoS) to distribute classified information and communicate amongst each other. SIPRNet is nearly identical to any other standard TCP/IP network; it originated from the same predecessor as the internet, the Advanced Research Projects Agency Network (ARPANET). Of course there are major enhancements in the security design of the network such as the implementation of strong crypto throughout the whole network but for the most part SIPRNet and the Internet are
Read More

Categories: Information Technology, IT Security, and Preston Hood.

Surveillance in the Modern Age

As you may have heard there are many different security agencies and people trying to spy on our every move. Luckily there is still hope for our society. We need to use VERY strong mathematics (cryptography) to put an end to mass surveillance at least at the network level. We can use tools such as the Onion router (Tor), I2P, and Freenet for avoiding someone monitoring your upstream and to provide end-to-end encryption (as long as you don’t exit the Tor network). We also need to use tools such as PGP and OTR messaging to protect our communications that might
Read More

Categories: Information Technology, IT Security, and Preston Hood.