SIPRNet

Computer network used by the United States Government


title: "SIPRNet" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["wide-area-networks", "cryptography", "united-states-government-secrecy", "military-communications-of-the-united-states"] description: "Computer network used by the United States Government" topic_path: "technology/cryptography" source: "https://en.wikipedia.org/wiki/SIPRNet" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0

::summary Computer network used by the United States Government ::

::data[format=table title="Infobox military installation"]

FieldValue
operatorMultiple Operators
controlledbyThe United States Department of Defense
partofThe United States Department of Defense Computer Networks
countryBased in United States
open_to_publicNo
::

|operator = Multiple Operators |controlledby = The United States Department of Defense |partof = The United States Department of Defense Computer Networks |country = Based in United States |open_to_public = No}} ::figure[src="https://upload.wikimedia.org/wikipedia/commons/0/00/USDoS_136760_header.png" caption="Header of an unclassified Department of State telegram with the "SIPDIS" tag marked in red"] ::

The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment". It also provides services such as hypertext document access and electronic mail.

SIPRNet is a component of the Defense Information Systems Network. Other components handle communications with other security needs, such as the NIPRNet, which is used for nonsecure communications, and the Joint Worldwide Intelligence Communications System (JWICS), which is used for Top Secret communications.

Access

::figure[src="https://upload.wikimedia.org/wikipedia/commons/6/6f/Intel_GreenDoor.jpg" caption="JWICS]] access"] ::

According to the U.S. Department of State Web Development Handbook, domain structure and naming conventions are the same as for the open internet, except for the addition of a second-level domain, like, e.g., "sgov" between state and gov: openforum.state.sgov.gov. Files originating from SIPRNet are marked by a header tag "SIPDIS" (SIPrnet DIStribution). A corresponding second-level domain smil.mil exists for DoD users.

Access is also available to a "...small pool of trusted allies, including Australia, Canada, the United Kingdom and New Zealand...". This group (including the US) is known as the Five Eyes.

SIPRNet was one of the networks accessed by Chelsea Manning, convicted of leaking the video used in WikiLeaks' "Collateral Murder" release as well as the source of the US diplomatic cables published by WikiLeaks in November 2010.

Alternate names

SIPRNet and NIPRNet are referred to colloquially as SIPPERnet and NIPPERnet (or simply sipper and nipper), respectively.

References

References

  1. (2007). "Us defense information systems agency handbook.". Intl Business Pubns Usa.
  2. "Secret Internet Protocol Router Network (SIPRNET)". Federation of American Scientists' Intelligence Resource Program.
  3. (29 September 2005). "U.S. Department of State Foreign Affairs Handbook Volume 5 Handbook 8 - Web Development Handbook: 5 FAH-8 H-342.2 ClassNet Standards". U.S. Department of State.
  4. (29 November 2010). "Siprnet: Where the leaked cables came from". BBC.
  5. Grimes, John G.. (14 April 2008). "Internet Domain Name Use and Approval". Department of Defense.
  6. Field, Michael. (2 December 2010). "NZ way down the WikiLeaks queue". [[Fairfax New Zealand]].
  7. (6 June 2010). "U.S. Intelligence Analyst Arrested in Wikileaks Video Probe". [[Wired (magazine).
  8. Leigh, David. (28 November 2010). "US embassy cables leak sparks global diplomacy crisis". [[The Guardian]].
  9. (n.d.). "Definition of NIPRNet".
  10. (2010). "Information Security Management Handbook, Volume 4". CRC Press.

::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::

wide-area-networkscryptographyunited-states-government-secrecymilitary-communications-of-the-united-states