SIPRNet, NIPRNet, RIPRNet

No explicit questions like "how do I hack xxx.com" please!
Post Reply
User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

SIPRNet, NIPRNet, RIPRNet

Post by DNR »

The Secret Internet Protocol Router Network (SIPRNET) is the Department of Defense's largest network for the exchange of classified information and messages at the SECRET level. It supports the Global Command and Control System, the Defense Message System, and numerous other classified warfighting and planning applications. Although the SIPRNET uses the same communications procedures as the Internet, it has dedicated and encrypted lines that are separate from all other communications systems. It is the classified counterpart of the Unclassified but Sensitive Internet Protocol Router Network (NIPRNET), which provides seamless interoperability for unclassified combat support applications and controlled access to the Internet.

Access to the SIPRNET requires a SECRET level clearance or higher and a need to have information that is available only on the SIPRNET. Because the SIPRNET is an obvious target for hostile penetration, a number of strict security procedures are applied. All users must be approved and registered. Passwords must be changed at least every 150 days and must have at least 10 characters including two upper case letters, two lower case letters, two numbers, and two special characters. When a person is using the SIPRNET, he/she must not leave the workstation unattended.

A computer with a non-removable hard drive used to access the SIPRNET must be located in an area approved for open storage of SECRET information. A computer with a removable hard drive does not have to be in an open storage location, but the hard drive must be appropriately marked with the classification of the material it contains and, when not in use, must be removed and stored in a container approved for the storage of SECRET information. If physical keys are used, they will be numbered and stored in a container approved for the storage of SECRET material.

Linking a computer with access to the SIPRNET to the Internet or to any other computer or media storage device that has not been approved for use with SECRET information is a serious security violation. Once any media storage device such as a CD, floppy disk, or memory stick has been connected to a computer with access to the SIPRNET, it becomes classified at the SECRET level. It must be protected accordingly and shall not be used on any unclassified computer. Classified information retrieved from the SIPRNET should not be accessed via NIPRNET

Technological advances in storage devices are making it easier for classified information to be removed from secure areas. Data-storage devices such as Personal Digital Assistants (PDA), Key-chain drives, Memory watches etc, should not be allowed in an environment where classified information is processed because of their infrared and similar recording capabilities. For computers used to process classified information, it is recommended that infrared (IR) port beaming capability be disabled. If the IR port is unable to be disabled, cover the IR port with metallic tape.

A SIPRNET workstation cannot be attached to a shared or networked NIPRNET printer. It can only be attached to a local printer directly connected to the workstation in a secure area. You are responsible for ensuring that all classified printed material is properly marked and for complying with appropriate procedures for removing that material from the vaulted or other secure area. Personnel with access to the SIPRNET must receive security awareness training at least once a year tailored to the SIPRNET system and the kinds of information accessed on that system.

The SIPRNET system maintains an audit trail of all users. This includes the identity of all persons accessing or attempting to access the SIPRNET, date and time of logon/logoff, and any noteworthy activities that might indicate an attempt to modify, bypass, or negate security safeguards.

http://rf-web.tamu.edu/security/Securit ... %20SIPRNET


http://public.afca.af.mil/shared/media/ ... 0P-028.jpg
----

SIPRNET replaces the DDN DSNET1 as the SECRET portion of DISN. Its complete architecture will be achieved by constructing a new worldwide backbone router system. The primary method for secret-level network connectivity is via Base secret-level networks which in turn provide Base Router connectivity to SIPRNET. Various DOD router services and systems will migrate onto the SIPRNET backbone router network to serve the long-haul data transmission needs of the users. Transmission services will use smart multiplexer and 512 kilobits per second (kbps) channels. Other transmission services will be acquired or leased as needed. Future expansion will progress to the T1 circuit data rate of 1.544 Megabits (Mbps) and potentially to the T3 data rate of 45 Mbps. High speed packet switched service will be provided through the use of IP routers. This SECRET router layer of the DISN is intended to support national defense C3I requirements, to include the issuing of COMSEC keys used with the STU-III to make secure dial-up SIPRNET comm server connections.
The Secret Internet Protocol Router Network (SIPRNET) has matured to be the core of our warfighting command and control capability. Many expeditionary commanders ask for SIPRNET ahead of secure voice when deploying their forces. SIPRNET is fast becoming the defacto standard of preferred data services, even over NIPRNET. The SIPRNET is the new, worldwide router-based network replacing the older X.25-based packet switched network (the Defense Secure Network One (DSNET1) of the Defense Data Network (DDN)). The initial SIPRNET backbone router network went online 3 March 1994. Subscribers started coming on line shortly thereafter. The SIPRNET WAN (as of 31 May 1995) consisted of a collection of 31 backbone routers interconnected by high-speed serial links to serve the long-haul data transport needs of secret-level DoD subscribers. Additional SIPRNET backbone routers are being planned to meet increased customer requirements. SIPRNET supports the DoD standard Transmission Control Protocol/Internet Protocol (TCP/IP) protocol service. Subscribers within the DoD and other Government Agencies are able to use the SIPRNET for passing datagrams at the Secret-Not Releasable to Foreign Nationals (SECRET-NOFORN) classification level.

http://www.fas.org/irp/program/disseminate/siprnet.htm

Article and photo
http://securitycritics.org/tag/niprnet/

more
http://www.usmilcom.com/military.htm
----

NIPRNet (Unclassified but Sensitive Internet Protocol Router Network) (formerly called the Non-Classified Internet Protocol Router Network). NIPRNET is used to exchange unclassified but sensitive information between "internal" users as well as providing users access to the Internet. NIPRNet is composed of Internet Protocol routers owned by the United States Department of Defense (DOD). It was created by the Defense Information Systems Agency (DISA) to supersede the earlier MILNET.

NIPRNet is, by design, a parallel airgapped analogue to the SIPRNET, providing seamless interoperability for unclassified combat support applications, as well as providing a gateway to the public Internet. While the two networks are not intended to logically intersect, occasionally it is seen as necessary to tunnel the encrypted SIPRNET over NIPRNet ("SIPR over NIPR").

SIPRNet and NIPRNet are referred to colloquially as sipper-net and nipper-net, respectively.

Data rates range from 56 kb/s to 622 Mb/s, along with remote dial-up services, also at 56 kbit/s

http://en.wikipedia.org/wiki/NIPRNet

DISA moves NIPRNET to Sprint
http://www.fcw.com/print/2_18/news/63758-1.html
"Under the plan, DISA's continental United States backbone and 10 major nodes of NIPRNET will be moved, probably in October, from the AT&T Defense Commercial Telecommunications Network (DCTN) to an ATM network operated by Sprint. "


http://www.iiimef.usmc.mil/wx/metoc.htm

----

RIPRNet (Radio over Internet Protocol Routed Network) is a United States military network that allows users to exchange radio voice data over an IP routed network. In 2007, RIPRNet is still being installed in Iraq for use by US and Coalition forces.

It is a Tactical System, used by trucks or mobile forces. Part of the network is routed over Strategic systems to increase connectivity.

As of July 2007, 14 core sites and 37 ground station consoles were operational, costing "less than $10 million (US dollars) to implement, and is expected to cost 300,000 a year to maintain."

http://en.wikipedia.org/wiki/RIPRNet
-----
https://www.afcea.org/signal/articles/t ... 7&zoneid=4

Internet Protocol Network Protects Troop Convoys

This feat is accomplished using the radio over Internet protocol routed network (RIPRNET), which sends the audio signal from a radio into the Vega IP-223, manufactured by Telex Communications Incorporated, Burnsville, Minnesota. The IP-223 converts the analog signal into an Internet protocol (IP) data stream so that a dedicated IP-based network can be established among command and control centers. A joint capability, the RIPRNET allows users of a single radio or multiple radios to communicate with others thousands of miles away in the same way computer users link to Web sites worldwide.

Warfighters access the RIPRNET using radios that are connected to the network through a console comprising a computer, headset and microphone. By digitizing the signal, ultrahigh frequency (UHF), very high frequency (VHF) and high frequency networks are fused into a common network for command and control (C2).
-------


Convoys rely on line-of-site radio for most of their connectivity. Before RIPRNet, there were a number of relay points, positioned about every 15 to 20 miles along the main supply routes. Many of these radio relay points were "outside the wire" and posed additional force protection concerns for units operating along the supply routes.

Additionally, there were points along the routes where convoy vehicles were out of radio range. This limited communications capability left convoys out of range for medical evacuation and close-air support should they be attacked or hit an improvised explosive device.

To overcome this and extend the relay points, the Air Force flew E-8C Joint STARS and later C-130 Hercules to relay radio traffic between convoy commanders and check points. The completion of the construction of RIPRnet towers reduced the need for these airborne assets.
http://www.af.mil/news/story.asp?id=123077865

-------

Senior Airman Daniel Urbanski, 319th Communications Squadron was recognized as a member of the award-winning Radio-Over-Internet Protocol Routed Network team he was on during a deployment to Iraq from September 2005 to January 2006.

Part of his job on the team was installing RIPRNET radios in theater. RIPRNET provides a new technology for use in the combat environment--leveraging the ability to convert radio signaling to an IP-based transmission.

http://public.grandforks.amc.af.mil/new ... =123028481
------
http://public.afca.af.mil/shared/media/ ... 0P-011.jpg
------
More later

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
ph1l1st3r
Newbie
Newbie
Posts: 1
Joined: 05 Sep 2008, 16:00
15
Contact:

Post by ph1l1st3r »

thanx! good info!

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Land Mobile Radio system, Radio over IP (RIPRnet)

Post by DNR »

http://www.cisco.com/en/US/docs/ios/12_ ... lmrip.html

"Land Mobile Radio over IP Enhancement Document by Cisco

The Land Mobile Radio over IP Enhancement feature allows Cisco multiservice routers to transport Land Mobile Radio (LMR) traffic over IP networks by modifying voice gateway functionality. LMR over IP enables LMR systems to extend beyond their traditional geographic limitations created by transmitter signal strength and enables interoperability, allowing public safety personnel in different agencies or jurisdictions to communicate with each other by radio on demand, in real time.

Note Some support restrictions apply to use of the Cisco Land Mobile Radio (LMR) over IP feature. See the "DISCLAIMER" section for important information regarding Cisco support for this feature.

Throughout this document, references to LMR radios apply to all types of radios, including LMR, military, amateur, and others.
"
Lots of great graphics and technical data on the LMR system, get it before its pulled :lol:

------------------------
http://www.cisco.com/en/US/docs/wireles ... rover.html

LMR over IP Overview

A Land Mobile Radio (LMR) system is a collection of portable and stationary radio units designed to communicate with each other over predefined frequencies. They are deployed wherever organizations need to have instant communication between geographically dispersed and mobile personnel. Typical LMR system users include public safety organizations such as police departments, fire departments, and medical personnel. However, LMR systems also find use in the private sector for activities like construction, building maintenance, and site security.

In typical LMR systems, a central dispatch console or base station controls communications to the disparate handheld or mobile units in the field. The systems might also employ repeaters to extend the range of communications for the mobile users. LMR systems can be as simple as two handheld units communicating between themselves and a base station over preset channels. Or, they can be quite complex, consisting of hundreds of remote units, multiple dispatch consoles, dynamic channel allocation, and other elements.

Issues
LMR systems have proven a very useful tool to many types of organizations. However, recent events have exposed limitations in the ability of LMR systems to fulfill certain communications needs, particularly system interoperability. By combining LMR systems with the connectivity of IP networks, we can solve many limitation problems.

Interoperability
Within an organization, the radio systems tend to be homogenous, with most elements typically purchased from the same manufacturer. Although the electromagnetic spectrum is rather vendor agnostic, signaling mechanisms and other control aspects of individual radio systems can be quite proprietary. This proprietary factor means that adding equipment generally means purchasing from the same manufacturer or finding compatible equipment, assuming that it still manufactures that particular model of radio. If organizations merge or need to consolidate operations that were previously using different LMR systems, issues with interoperability could require workarounds to bridge the existing systems or ultimately require the purchase of all new equipment.

Interoperability issues within an organization are one aspect of the problem. Consider the situation in which multiple public safety organizations are involved with the same incident. Organizations enjoy the autonomy of using their own radio systems with their own channels. But autonomy implies that the radios for one group will not be able to communicate with radios used by other groups. So, coordinating the activities of the field personnel from these different groups at one site requires some sort of workaround, either redeploying radios, or some sort of custom cross-patching at dispatch consoles to bring parties together.

Extending Command and Control
Closely associated with interoperability issue is the ability to extend the command and control function of radio systems. Generally, providing someone with the ability to participate in a radio talk group means giving that person a radio. However, if the radio user is out of range of the radio system or is an infrequent user of this capability, that solution might be physically or economically unfeasible. Today, radio systems can be linked through leased lines or over the public telephone network to extend their reach. These lines can be expensive and are often in addition to the communication services run for data purposes.

LMR over IP Service
With the LMR over IP service, standards-based VoIP technology voice gateways are used in combination with additional LMR specific features to address interoperability, extending command and control, and other issues. Base stations, repeaters, and dispatch consoles generally possess a wired interface that can be used to monitor audio received from their air interface, and as input for audio to be transmitted on their air interface. Although this wired interface may contain other control capabilities as well, as long as it has some sort of speaker output and microphone input, it can be connected to a voice port on a router.

The audio received on the voice port is encoded with a standard audio codec, such as G.711 or G.729. Those audio samples are packaged in standards-based Real-Time Transport Protocol (RTP) packets suitable for transport on an IP network. At this point, the communication element is abstracted from the distinctive characteristics of each radio system, thus providing a solution for the interoperability problem. Now, these audio packets can be sent across the network to other LMR gateways with different brands of radio systems either individually (unicast) or as a group (multicast).

The recipient of the audio packets need not be another LMR gateway. It can be any device capable of receiving and decoding the RTP stream, such as an IP telephone or PC with appropriate software. The IP network and IP-enabled devices can be used to allow users to monitor or transmit on a particular radio channel from a desk without issuing another radio. This can be done locally, nationally, or internationally, assuming the IP network has been properly designed.

------


DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

T-Sat, Sat-Com, Advanced EHF

Post by DNR »

http://www.enterprisenetworkingplanet.c ... hp/3633211

The mobile Internet you'll be using in 10 years
The US military's new space based communications network opens a glimpse at the sort of data rates and network that you might be using on mobile devices within the next decade.
Carl Jongsma 22/09/2008 14:29:00

The Advanced EHF communications satellites are an enhanced version of the existing Milstar constellation, which they are scheduled to replace, but they aren't without their problems.

Although the EHF band is a relatively lightly used part of the electromagnetic spectrum (30-300 GHz), it is for good reason.

Atmospheric attenuation is the biggest problem faced in this band, especially around 60 GHz, however the frequencies are viable for short distance terrestrial based communication links, such as microwave Internet and telecommunication links (which already operate in this band). Millimetre wave radar, probably best known as the radar that can see through your clothes but not your skin, also operates in this band.

Designed to avoid problematic frequencies that are more susceptible to attenuation, but accepting increased overall atmospheric attenuation, are an increasing number of military and civil satellite systems that are using this band for uplink and downlink, as well as inter-satellite communication. Inter-satellite communication is really where EHF equipment shines (no atmosphere, small antennas, high data rates).

Civilian systems are currently around the Ku band (Intelsat), providing data rates of up to 2-4 Mbps (14 GHz uplink, 12 GHz
downlink) however these rates have still to trickle into everyday user's hands for remote and mobile Internet access. It is more common that an aggregator will access this link/rate and use that to then portion out local Internet access. Systems such as this are in use for remote Australian territories like Cocos and Christmas Islands, and formed the backbone of Boeing's stillborn Connexion in-flight Internet access. High ongoing access costs (basically a share of the overall cost of the satellite) and limited access slots help keep the technology away from everyday use at this time. Militaries and governments around the globe also lease access on these circuits when they need the added capability, with Intelsat and Inmarsat systems being used in the first Gulf War.

Advanced EHF is designed to provide 24 hour coverage from 65 North, to 65 South across the K and Ka sub bands, and when combined with the prototyped Extended Data Rate (XDR) terminals and systems, will offer up to 8.2 Mbps data rates for around 4,000 terminals in concurrent use per satellite footprint (whether that scales to 12,000 systems in concurrent use globally
isn't clear from source material).

Within the tri-satellite constellation, inter-satellite EHF links will allow terminals on opposite sides of the globe to communicate in near real-time without the use of a terrestrial link. Combined with smaller, directional antennas and the various options for anti-jamming technology, it represents a significant military capability for the US.

Network Centric Warfare advocates are looking forward to the capability that these systems will provide their pet theories, but if civil use of the Internet has shown anything, it is that data traffic will expand to fill the links available to it, so the overall added benefit will have to wait to be seen (of course it will mean that even in a warzone you won't be immune to 100MB PowerPoint presentations clogging up your network).
Already plans are being drawn up for the Transformational Satellite Communications System (T-Sat) which will replace Advanced EHF starting sometime in 2013, however it is already facing funding troubles. This could be problematic, with Advanced EHF still struggling to reach capability and the final launch not scheduled until April 2010. Dropping the fourth satellite of the Advanced EHF constellation has been planned to give the USAF time to implement T-Sat more rapidly.


DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
F4LSE
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 236
Joined: 02 Jul 2007, 16:00
16
Location: My Lab
Contact:

Post by F4LSE »

copy paste? or u write alllll that?

User avatar
Gogeta70
^_^
^_^
Posts: 3275
Joined: 25 Jun 2005, 16:00
18

Post by Gogeta70 »

I have a secret clearance. Surprisingly enough, the password for SIPRnet is actually set through the less-secure AKO (army knowledge online) website, though they also require 2 uppercase, 2 lower case, 2 symbols, and 2 numbers in your password, with a minimum length of 10 characters. It took me a few minutes to pick a password like that that i can easily remember :lol: . Because i will be working on computers with classified information and applications (called tactical computers), they search us every day for ANY electronics, even a cell phone is not allowed, they will smash it on the ground right in front of you and tell you to go to class... :cry:
¯\_(ツ)_/¯ It works on my machine...

User avatar
Stavros
ΜΟΛΩΝ ΛΑΒΕ
ΜΟΛΩΝ ΛΑΒΕ
Posts: 1098
Joined: 02 Jan 2006, 17:00
18
Location: Mississippi, U.S.A.

Post by Stavros »

The guy that taught my computer maintenance class at the junior college used to work in the same area you work in gog. He used to fly choppers in 'Nam and did something about computers on the ground. He told us the same thing about minimum of 2 upper case, 2 lower case, 2 numbers and 2 special characters. He also said that he knew of software that could crack those passwords in under 2 hours. Never gave a name to the sofware, however.

Post Reply