Is the US military secret network SIPRNet physically or cryptographicaly separated/secured?

According to this Web page, SIPRNet and NIPRNet are supposed to be air gapped (both from each other, and from the rest of the World). However, they are also accessible from various locations around the World, under control of several countries (it is documented that some services from a pool of countries, which includes Australia, New Zealand, Canada and United Kingdom, have access to SIPRNet and NIPRNet).

If SPIRNet and NIPRNet were really, physically air gapped worldwide, then this would imply that:

  • all communications are over wires (no radio, no satellite link);
  • there are dedicated wires just for that, including both worldwide submarine communications cable and terrestrial cables.

Considering that installing a submarine communication cable cannot be discreet in any way (and the list of such cables appears to be public knowledge), that the cost would be tremendous, and that Bradley Manning, alleged source of some classified information which was published on WikiLeaks, had access to SIPRNet from a facility located in Baghdad, one can deduce that the air gap is not thorough. It probably means that within a given facility the networks are physically apart from each other, and no computer is ever connected to both SIPRNet or NIPRNet, and some other network; on the other hand, data which exits such secured facilities is most probably heavily encrypted and conveyed over links which are shared with the rest of the World (at least US tax payers fervently hope that encryption is properly applied).


I've decided to answer my own question with my own speculation and digging.

Can the SIPRNet be physically distinct? Of course. Small networks can spring into existence without needing existing infrastructure all the time. Large networks are more of an issue. Telecomm companies around the world will lay a physically distinct cable for an outrageous fee. Something tells me that any significant military can also get the appropriate permits to lay their own cabling. Google is trying to purchase the rights to unused so-called "dark fibre" -- though that article is 6 years old, the thought remains the same.

But, for a network with global reach -- and as @TomLeek points out -- there are things that cabling cannot be used for. Satellite networks, mobile forces, and physically separated environments will need some form of through-the-air communications channel.

Because of the need for wireless communications and possibly because laying their own wires is cost-prohibitive (really?), not possible, provides no additional physical security over wireless, etc. a significant military power could share "public" infrastructure resources. It is likely such usage is only for low classified information transfer. In any event, any communications is going to be heavily encrypted using encryption algorithms and techniques that may not even be known (public/private key encryption was developed by signal intelligence researchers before DH and RSA were produced).

What I was really more interested in -- and the question was unfortunately worded -- was whether two separate networks -- SIPRNet and NIPRNet -- are technologically incompatible. All evidence points to "no, but". Any technological incompatibility would have to occur at the network edges (and definitely in layers, at that). The existence of products like a certified one-way cable hints at other physical mechanisms to ensure that non-secret and secret networks remain in a one-way relationship (information can be easily classified, but classified information is very difficult to declassify; eg. Bell-LaPadula: no read up, no write down). The existence of data-loss prevention software is a commercial realization of something that is likely already in effect in military organizations.

I think possibly more interesting is how three computers sitting on a desk remain separated. Are SIPR data cables physically locked into the data jack in the NIC? Do SIPR computers have no peripherals? I'd hazard a guess and say "yes" and "yes". Are the SIPR data jacks physically different? Maybe. I'd be interested to know the true answer to this which I don't think is classified information since there appears to be some reference to "SPIRNet RJ45" connectors in publically available military spec hardware products.

The following doc points to perhaps more of a policy-driven behaviour for attaching SIPRNet computers rather than a technological one. I also found that the following doc to be very interesting from a holistic view and this one to be interesting from a full design perspective of an installation.

All of these links and docs were found via Google. None are marked as classified which tells me that the separation mechanisms are probably working. ;-)


NIPRnet is its own discrete network, using leased dedicated lines and encrypting all traffic before it hits the demarcation. SIPRnet may be encrypted and tunneled over NIPRnet or have its own discrete dedicated line that is encrypted.

SIPRnet on a local installation is encrypted on each line going to each building and decrypted there. JWICS can be tunneled over SIPRnet or have its own discrete dedicated and encrypted line. There are a lot of specifics involved that are sensitive in nature and irrelevant to the discussion at hand.

The long and short is, NIPRnet is encrypted and all traffic to the Internet passes through DISA routers, firewalls, and IPS/IDS systems at the national level at various locations. DISA could easily disconnect Internet access from NIPRnet if it became necessary, and the network would be exclusively military and government, with no Internet communication possible. So, DoD networks CAN be physically their own network or be tunneled by certain specified encryption methods over another network. However, all DoD traffic travels over DoD circuits, which are dedicated line based, frequently fiber lines.

All of this is available unclassified in the public domain, but there is no central information repository.