The Joint Worldwide Intelligence Communication System (JWICS, ) is the United States government's secure
intranet
An intranet is a computer network for sharing information, easier communication, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders. The term is used in ...
for the storage of
top secret
Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
and
sensitive compartmented information
Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems ...
, primarily for use in intelligence. It is the most secure of three separate
router networks operated by the U.S. government for the handling and transmission of classified materials and is designed to safeguard the most sensitive materials. Operated by the
Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an executive department of the U.S. federal government charged with coordinating and supervising the six U.S. armed services: the Army, Navy, Marines, Air Force, Space Force, ...
, JWICS superseded DSNET2 and DSNET3, the Top Secret and SCI levels of the earlier
Defense Data Network.
[MARCORSYSCOM – Website Temporarily Suspended](_blank)
. Marcorsyscom.usmc.mil. Retrieved on 2014-04-12.
. Fas.org. Retrieved on 2014-04-12.
Most of the publicly known compromises of JWICS have been perpetrated by leakers who had legitimate authorization to access the system at the time of their disclosures, including:
Chelsea Manning
Chelsea Elizabeth Manning (born Bradley Edward Manning, December 17, 1987) is an American activist and whistleblower. She is a former United States Army soldier who was convicted by court-martial in July 2013 of violations of the Espionage ...
in 2010,
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs.
Born in 1983 in Elizabeth ...
in 2013, and
Jack Teixeira in 2023.
Because of the sensitivity of its contents, JWICS remains a frequent subject of discussion and concern surrounding the United States' vulnerability to cyber threats.
JWICS in practice

The Joint Worldwide Intelligence Communications System (JWICS) is a secure intranet system utilized by the United States Department of Defense to house "Top Secret/Sensitive Compartmented Information"
[Cares, J. R. (2017). JWICS Network. In Springer, P. J. ''Encyclopaedia of Cyber Warfare'' (pp. 162-163). Santa Barbara, California, ABC-CLIO.] In day-to-day usage, the JWICS is used primarily by members of the
Intelligence Community, such as the DIA within the DoD, and the
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
under the Justice Department. Conversely,
SIPRNet
The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information ...
and
NIPRNet account for the overwhelming bulk of usage within DoD and non-intelligence government agencies and departments.
There are three main router networks operated by the Department of Defense. Each is separated by the types of information they deal with.
[Clarke, R. A., Knake, R. K. (2012) ''Cyber War: The Next Threat to National Security and What to do About it.'' New York, United States: HarperCollins.]
At the most open level, the
Non-Classified Internet Protocol Router Network (NIPRNET) is the hub for non-classified but still specialized information relating to important logistics and planning.
Above this lies the
Secret Internet Protocol Router Network (SIPRNET). SIPRNET deals with information classified as Confidential or Secret.
SIPRNET is another of the networks accessed by Chelsea Manning ''(See
Automation bias,
JWICS, WikiLeaks, and Chelsea Manning).''
[Salera, B. (2017). Manning, Bradley. In Springer, P. J. ''Encyclopaedia of Cyber Warfare'' (pp. 175-177). Santa Barbara, California, ABC-CLIO.][ ]
Finally, the Joint Worldwide Intelligence Communications System houses the top level of data, consisting primarily of top-secret intelligence information.
The system deals with transmissions coming from across the globe. The transmission of information across the JWICS network is summarized by Jeffrey R. Cares in the ''Encyclopedia of Cyber Warfare'':
''See
Joint All-Domain Command and Control''
JWICS, WikiLeaks, and Chelsea Manning
The vulnerability of secure networks such as JWICS to insider threats was revealed with the leak of hundreds of thousands of secret US intelligence documents, the largest in US history at the time.
At the epicenter of these leaks was an intelligence analyst,
Chelsea Manning
Chelsea Elizabeth Manning (born Bradley Edward Manning, December 17, 1987) is an American activist and whistleblower. She is a former United States Army soldier who was convicted by court-martial in July 2013 of violations of the Espionage ...
. While serving in Iraq in 2010, Manning accessed JWICS, along with its lower-level counterpart
SIPRNET
The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information ...
, to leak documents to WikiLeaks, a non-profit platform for whistleblowers headed by
Julian Assange
Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. He came to international attention in 2010 after WikiLeaks published a series of News leak, leaks from Chels ...
.
Manning was directly involved in the leaks known as "
Collateral Murder
On July 12, 2007, a series of air-to-ground attacks were conducted by a team of two U.S. AH-64 Apache helicopters in Al-Amin al-Thaniyah, New Baghdad, during the Iraqi insurgency which followed the invasion of Iraq. On April 5, 2010, the att ...
," "
The Iraqi War Logs," "
The Afghan War Diary," and "
Cablegate".
[Maxwell, L. (2019). Chelsea Manning as Transformative Truth-Teller. In ''Insurgent Truth: Chelsea Manning and the Politics of Outsider Truth-Telling.''(pp. 55-80) : Oxford University Press. ] Manning is allegedly responsible for the leaking of over 700,000 files. At the time this was the largest data leak in US military history.
Manning was arrested in late 2010 after confiding in fellow hacker,
Adrian Lamo
Adrián Alfonso Lamo Atwood (February 20, 1981 – March 14, 2018) was an American threat analyst and Hacker (computer security), hacker. Lamo first gained media attention for breaking into several high-profile computer networks, including those ...
, who reported Manning to the Federal Bureau of Investigation.
It is believed that Manning's decision to supply the files to WikiLeaks began partly as a result of directly experiencing "war porn", graphic videos watched by analysts for entertainment. A notable video viewed by Manning that would later also capture public attention involved a
US Apache helicopter firing on civilians. This video would be named "Collateral Murder."
Manning was also uncomfortable with and perceived censorship of Iraqi citizens in their published opinions on government, and the "don't ask, don't tell" construct surrounding homosexuality in the US military.
All of this information was contained in secure networks such as JWICS, causing their legitimacy as a form of a protection, rather than censorship, to be widely scrutinized in media and academic discourse.
Manning was sentenced in 2013 to 35 years at
Fort Leavenworth
Fort Leavenworth () is a United States Army installation located in Leavenworth County, Kansas, in the city of Leavenworth, Kansas, Leavenworth. Built in 1827, it is the second oldest active United States Army post west of Washington, D.C., an ...
. This sentence was commuted by the Obama administration for release after 7 years in 2017. Manning was again jailed after refusing to testify at the grand jury investigation against Wikileaks, and was released in March 2020.
The events surrounding Manning led to widespread reforms. Training and monitoring is now in place to identify risk factors in analysts to prevent them using their position to leak documents from secure networks.
In addition, more widespread monitoring of the daily use of networks is undertaken.
Cybersecurity concerns are often discussed with a focus on hacking and external threats, but Mark Ambidner of ''The Atlantic'' highlighted the susceptibility of defense networks to trusted actors:
Public interest
Some argue from a pro-public interest perspective that JWICS allows government to manipulate releases of information (as occurred in "Collateral Murder") to shirk accountability for wrongdoings.
[Brevini, B., Murdock, G. (2013) Following the Money: WikiLeaks and the Political Economy of Disclosure. In Brevini, B., Hintz, A., McCurdy, P. (2013) ''Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society''. (pp. 35-55). London, United Kingdom: Palgrave MacMillan]
Others, who take a more conservative approach to information release, cite the importance of protecting troops on the ground and deny the idea that full transparency is essential for democracy.
Arguments

With the development of secure intranet networks and the increased use of technology in government and military operations, networks such as JWICS have come under scrutiny due to their perceived capacity to keep public interest information behind closed networks.
At the heart of pro-public interest arguments is the desire to hold governments accountable for their wrongdoings. Academics posit that pre-1991 there was a layer of separation allowing organizations to be selective about what they released to the public. Thus, the advent of the World Wide Web in 1991 was viewed as a triumph of public interest, allowing individuals to "freely share what they knew." Since then, however, the development of secure networks such as JWICS has reinstated levels of separation between individuals and government and has again prevented the public from holding government to account. This has been exacerbated since 9/11 with the war on terror providing a 'scape-goat' for governments in hiding public interest information (such as the shooting of Iraqi journalists in "collateral murder") under the guise of protecting against foreign interests and terrorism.
One of the main pro-protection arguments surrounding JWICS is that JWICS is essential to prevent the identities of individuals from being released. By releasing these documents en-masse without adequate care, leakers are putting these individuals at risk.
[ ] In the case of military operations, JWICS is also said to protect troops on the ground by safeguarding their strategy and movements.
Pro-protection parties argue that leaking agents such as Wikileaks need to better censor the identities of individuals contained in their leaks to prevent harm.
In several of WikiLeaks' leaks involving JWICS in the Iraq and Afghanistan wars, they worked alongside publications such as the New York Times. In publishing documents, the ''Times'' employed censorship efforts, consulting the CIA and the DoD about what to omit from their publication.
[Elliot, C. (2013). WikiLeaks and the Public Interest Dilemma: A View from Inside the Media. In Brevini, B., Hintz, A., McCurdy, P. (2013). ''Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society''. (pp. 35-55). London, United Kingdom: Palgrave MacMillan]
The central counterargument to protection is that releases must balance the opposing forces of public interest and potential harm.
Pro-public interest speaker Simon Jenkins states that "The Job of Media is not to protect power from embarrassment."
Nonetheless, from a pro-protection standpoint, media does have a role in defining the limits of public interest in their publications to protect the safety of certain stakeholders.
Counterterrorism
JWICS operates as the highest level network in the DoD's information cyberspace.
It is a controlled network, and the information contained within it is of great importance to both the US, and other parties looking for information.
Because of its importance, a key issue surrounding JWICS is the threat of cyberterrorism. Foundations like JWICS present critically important assets that if infiltrated, can lead to information and/or strategic advantages. This is not dissimilar to how strategic points like bases or fortresses would be infiltrated in regular warfare.
The vulnerability of cyber networks lies in their construction. Structures are created through software written by individuals whose mistakes create vulnerabilities for those who want to protect information, and opportunities for those seeking it.
In addition, cyberterrorism is not restricted by geographical bounds. Networks can be hacked remotely from across the globe without warning.
This creates jurisdictional issues for enforcement.
[ ]
A key vulnerability for secret level networks such as JWICS is what is described as a 'sneakernet threat.' These systems are designed to be separate from the unclassified internet, creating a protection from malware. However, the systems also rely on users uploading documents from the internet. This creates a risk of viruses being passed on along with the information into the secure system.
An example of this threat came to reality in 2008 when
Russian malware made its way into the SIPRNET system by way of a thumb-drive which was plugged into classified-level computers accessing the network. These computers lacked virus protection due to their detachment from the internet, and were compromised as a result. The virus, once gaining access to these networks, acted as a 'beachhead' which allowed the transfer of data to foreign computers
[ ] The hack was, at the time, the largest compromise of US cybersecurity in history, and initially led to a ban on the use of thumb-drives.
this was later repealed.
[ ]
JWICS is structured slightly differently to SIPRNET. JWICS is accessed via "terminals" in protected facilities known as Secret Compartmentalized Information Facilities.
These physical facilities are highly protected as physical structures. This is because they present strategic advantage. If one terminal is accessed by an enemy, all of JWICS is available to them until that terminal is disconnected from the network.
Because of JWICS' structure, allowing access only through secure facilities, it is relatively protected from outside threats. However, there is an intrinsic vulnerability in JWICS that is summarized by Clarke and Knake in ''Cyber War: The Next Threat to National Security and What to do About It'':
The mounting threat to US cybersecurity has led to some developments surrounding defense. In 2011,
Leon Panetta
Leon Edward Panetta (born June 28, 1938) is an American retired politician and government official who has served under several Democratic administrations as secretary of defense (2011–2013), director of the CIA (2009–2011), White House chi ...
and other intelligence officials gave statements about the growing vulnerability of the US to cyber attacks. This stemmed from Pentagon Reports about critical security breaches in government and business networks.
Since then the Department of Defense has rolled out and continually developed 'Einstein' software aimed at detecting and preventing intrusion into federal government networks. In addition, "The Department of Homeland Security and the NSA signed a memorandum of understanding to improve collaboration between the agencies."
The 2008 Russian infiltration of SIPRNET led to large reforms in terms of defense strategy. In 2008, then defense Secretary
Robert Gates
Robert Michael Gates (born September 25, 1943) is an American intelligence analyst and university president who served as the 22nd United States secretary of defense from 2006 to 2011. He was appointed by President George W. Bush and retained b ...
moved to create a dedicated infrastructure dealing specializing with cyber warfare strategy – the Cyber Command. Cyber command was originally designed by Colonel
Paul Nakasone, Lieutenant Colonel
Jen Easterly
Jen Easterly is an American cybersecurity expert and former government official who served as the Director of the Cybersecurity and Infrastructure Security Agency in the Biden administration. She was confirmed by a voice vote in the Senate on Jul ...
, Navy Captain T. J. White, and Air Force Colonel Stephen Davis. These four became colloquially known as 'The Four Horsemen' and set out to create the framework for Cyber Command, the US's dedicated cyber-strategy wing.
[ ]
In 2016, Cyber Command gained separation from the NSA, elevating it to have a direct line to the White House. The Trump administration has further stretched the team's authority, allowing them to take a more offensive approach to cyber strategy.
See also
*
Worldwide Military Command and Control System
The Worldwide Military Command and Control System, or WWMCCS , was a military command and control system implemented for the United States Department of Defense. It was created in the days following the Cuban Missile Crisis. WWMCCS was a comple ...
*
Global Command and Control System
Global Command and Control System (GCCS) is the United States' armed forces DoD joint command and control (C2) system used to provide accurate, complete, and timely information for the operational command hierarchy, chain of command for U.S. armed ...
*
Classified website
*
Intellipedia
Intellipedia is an online system for collaborative data sharing used by the United States Intelligence Community (IC). It was established as a pilot project in late 2005 and formally announced in April 2006. Intellipedia consists of three wik ...
*
NIPRNET
*
SIPRNET
The Secret Internet Protocol Router Network (SIPRNet) is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information ...
*
TNet
*
WikiLeaks
WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
*
Julian Assange
Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. He came to international attention in 2010 after WikiLeaks published a series of News leak, leaks from Chels ...
*
Chelsea Manning
Chelsea Elizabeth Manning (born Bradley Edward Manning, December 17, 1987) is an American activist and whistleblower. She is a former United States Army soldier who was convicted by court-martial in July 2013 of violations of the Espionage ...
References
External links
DoD USMC JWICS ProgramDoD DISA Dataincluding JWICS
TS/SCI IP Data
{{Authority control
Military computer systems of the U.S. Department of Defense
Defense Intelligence Agency
Wide area networks
Computer network security
Intelligence assessment