<s>
The	O
Joint	O
Worldwide	O
Intelligence	O
Communication	O
System	O
(	O
JWICS	B-General_Concept
,	O
)	O
is	O
the	O
United	O
States	O
Department	O
of	O
Defense	O
's	O
secure	O
intranet	O
system	O
that	O
houses	O
top	O
secret	O
and	O
sensitive	O
compartmented	O
information	O
.	O
</s>
<s>
JWICS	B-General_Concept
superseded	O
the	O
earlier	O
DSNET2	O
and	O
DSNET3	O
,	O
the	O
Top	O
Secret	O
and	O
SCI	O
levels	O
of	O
the	O
Defense	O
Data	O
Network	O
based	O
on	O
ARPANET	O
technology	O
.	O
</s>
<s>
Because	O
of	O
the	O
information	O
it	O
houses	O
,	O
JWICS	B-General_Concept
is	O
subject	O
to	O
discussion	O
around	O
cybersecurity	O
and	O
the	O
United	O
States	O
 '	O
vulnerability	O
to	O
cyber	O
threats	O
.	O
</s>
<s>
The	O
Joint	B-General_Concept
Worldwide	I-General_Concept
Intelligence	I-General_Concept
Communications	I-General_Concept
System	I-General_Concept
(	O
JWICS	B-General_Concept
)	O
is	O
a	O
secure	O
intranet	O
system	O
utilized	O
by	O
the	O
United	O
States	O
Department	O
of	O
Defense	O
to	O
house	O
"	O
Top	O
Secret/Sensitive	O
Compartmented	O
Information	O
"	O
In	O
day-to-day	O
usage	O
,	O
the	O
JWICS	B-General_Concept
is	O
used	O
primarily	O
by	O
members	O
of	O
the	O
Intelligence	O
Community	O
,	O
such	O
as	O
the	O
DIA	O
within	O
the	O
DoD	O
,	O
and	O
the	O
Federal	O
Bureau	O
of	O
Investigation	O
under	O
the	O
Justice	O
Department	O
.	O
</s>
<s>
Conversely	O
,	O
SIPRNet	O
and	O
NIPRNet	B-General_Concept
account	O
for	O
the	O
overwhelming	O
bulk	O
of	O
usage	O
within	O
DoD	O
and	O
non-intelligence	O
government	O
agencies	O
and	O
departments	O
.	O
</s>
<s>
At	O
the	O
most	O
open	O
level	O
,	O
the	O
Non-Classified	B-General_Concept
Internet	I-General_Concept
Protocol	I-General_Concept
Router	I-General_Concept
Network	I-General_Concept
(	O
NIPRNET	B-General_Concept
)	O
is	O
the	O
hub	O
for	O
non-classified	O
but	O
still	O
specialized	O
information	O
relating	O
to	O
important	O
logistics	O
and	O
planning	O
.	O
</s>
<s>
SIPRNET	O
is	O
another	O
of	O
the	O
networks	O
accessed	O
by	O
Chelsea	O
Manning	O
(	O
See	O
Automation	O
bias	O
,	O
#JWICS	O
,	O
WikiLeaks	O
,	O
and	O
Chelsea	O
Manning	O
)	O
.	O
</s>
<s>
Finally	O
,	O
the	O
Joint	B-General_Concept
Worldwide	I-General_Concept
Intelligence	I-General_Concept
Communications	I-General_Concept
System	I-General_Concept
houses	O
the	O
top	O
level	O
of	O
data	O
,	O
consisting	O
primarily	O
of	O
top-secret	O
intelligence	O
information	O
.	O
</s>
<s>
The	O
vulnerability	O
of	O
secure	O
networks	O
such	O
as	O
JWICS	B-General_Concept
to	O
insider	O
threats	O
was	O
revealed	O
with	O
the	O
leak	O
of	O
hundreds	O
of	O
thousands	O
of	O
secret	O
US	O
intelligence	O
documents	O
,	O
the	O
largest	O
in	O
US	O
history	O
at	O
the	O
time	O
.	O
</s>
<s>
While	O
serving	O
in	O
Iraq	O
in	O
2010	O
,	O
Manning	O
accessed	O
JWICS	B-General_Concept
,	O
along	O
with	O
its	O
lower-level	O
counterpart	O
SIPRNET	O
,	O
to	O
leak	O
documents	O
to	O
WikiLeaks	O
,	O
a	O
non-profit	O
platform	O
for	O
whistleblowers	O
headed	O
by	O
Julian	O
Assange	O
.	O
</s>
<s>
All	O
of	O
this	O
information	O
was	O
contained	O
in	O
secure	O
networks	O
such	O
as	O
JWICS	B-General_Concept
,	O
causing	O
their	O
legitimacy	O
as	O
a	O
form	O
of	O
a	O
protection	O
,	O
rather	O
than	O
censorship	O
,	O
to	O
be	O
widely	O
scrutinized	O
in	O
media	O
and	O
academic	O
discourse	O
.	O
</s>
<s>
Some	O
argue	O
from	O
a	O
pro-public	O
interest	O
perspective	O
that	O
JWICS	B-General_Concept
allows	O
government	O
to	O
manipulate	O
releases	O
of	O
information	O
(	O
as	O
occurred	O
in	O
"	O
Collateral	O
Murder	O
"	O
)	O
to	O
shirk	O
accountability	O
for	O
wrongdoings	O
.	O
</s>
<s>
With	O
the	O
development	O
of	O
secure	O
intranet	O
networks	O
and	O
the	O
increased	O
use	O
of	O
technology	O
in	O
government	O
and	O
military	O
operations	O
,	O
networks	O
such	O
as	O
JWICS	B-General_Concept
have	O
come	O
under	O
scrutiny	O
due	O
to	O
their	O
perceived	O
capacity	O
to	O
keep	O
public	O
interest	O
information	O
behind	O
closed	O
networks	O
.	O
</s>
<s>
Since	O
then	O
,	O
however	O
,	O
the	O
development	O
of	O
secure	O
networks	O
such	O
as	O
JWICS	B-General_Concept
has	O
reinstated	O
levels	O
of	O
separation	O
between	O
individuals	O
and	O
government	O
and	O
has	O
again	O
prevented	O
the	O
public	O
from	O
holding	O
government	O
to	O
account	O
.	O
</s>
<s>
One	O
of	O
the	O
main	O
pro-protection	O
arguments	O
surrounding	O
JWICS	B-General_Concept
is	O
that	O
JWICS	B-General_Concept
is	O
essential	O
to	O
prevent	O
the	O
identities	O
of	O
individuals	O
from	O
being	O
released	O
.	O
</s>
<s>
In	O
the	O
case	O
of	O
military	O
operations	O
,	O
JWICS	B-General_Concept
is	O
also	O
said	O
to	O
protect	O
troops	O
on	O
the	O
ground	O
by	O
safeguarding	O
their	O
strategy	O
and	O
movements	O
.	O
</s>
<s>
In	O
several	O
of	O
WikiLeaks	O
 '	O
leaks	O
involving	O
JWICS	B-General_Concept
in	O
the	O
Iraq	O
and	O
Afghanistan	O
wars	O
,	O
they	O
worked	O
alongside	O
publications	O
such	O
as	O
the	O
New	O
York	O
Times	O
.	O
</s>
<s>
JWICS	B-General_Concept
operates	O
as	O
the	O
highest	O
level	O
network	O
in	O
the	O
DoD	O
's	O
information	O
cyberspace	O
.	O
</s>
<s>
Because	O
of	O
its	O
importance	O
,	O
a	O
key	O
issue	O
surrounding	O
JWICS	B-General_Concept
is	O
the	O
threat	O
of	O
cyberterrorism	O
.	O
</s>
<s>
Foundations	O
like	O
JWICS	B-General_Concept
present	O
critically	O
important	O
assets	O
that	O
if	O
infiltrated	O
,	O
can	O
lead	O
to	O
information	O
and/or	O
strategic	O
advantages	O
.	O
</s>
<s>
A	O
key	O
vulnerability	O
for	O
secret	O
level	O
networks	O
such	O
as	O
JWICS	B-General_Concept
is	O
what	O
is	O
described	O
as	O
a	O
'	O
sneakernet	O
threat.	O
'	O
</s>
<s>
JWICS	B-General_Concept
is	O
structured	O
slightly	O
differently	O
to	O
SIPRNET	O
.	O
</s>
<s>
JWICS	B-General_Concept
is	O
accessed	O
via	O
"	O
terminals	O
"	O
in	O
protected	O
facilities	O
known	O
as	O
Secret	O
Compartmentalized	O
Information	O
Facilities	O
.	O
</s>
<s>
If	O
one	O
terminal	O
is	O
accessed	O
by	O
an	O
enemy	O
,	O
all	O
of	O
JWICS	B-General_Concept
is	O
available	O
to	O
them	O
until	O
that	O
terminal	O
is	O
disconnected	O
from	O
the	O
network	O
.	O
</s>
<s>
Because	O
of	O
JWICS	B-General_Concept
 '	O
structure	O
,	O
allowing	O
access	O
only	O
through	O
secure	O
facilities	O
,	O
it	O
is	O
relatively	O
protected	O
from	O
outside	O
threats	O
.	O
</s>
<s>
However	O
,	O
there	O
is	O
an	O
intrinsic	O
vulnerability	O
in	O
JWICS	B-General_Concept
that	O
is	O
summarized	O
by	O
Clarke	O
and	O
Knake	O
in	O
Cyber	O
War	O
:	O
The	O
Next	O
Threat	O
to	O
National	O
Security	O
and	O
What	O
to	O
do	O
About	O
It	O
:	O
</s>
