Latest news with #SIPRNet


Express Tribune
25-04-2025
- Politics
- Express Tribune
Hegseth bypasses Pentagon security with unsecured internet line for Signal: AP
Listen to article US Defense Secretary Pete Hegseth had an unsecured internet line installed in his Pentagon office to access the encrypted messaging app Signal on a personal computer, bypassing government cybersecurity protocols, two officials familiar with the matter told the Associated Press. The so-called 'dirty' line directly connected to the public internet, sidestepping the Pentagon's secure systems like the Non-classified Internet Protocol Router Network (NIPRNet) and Secure Internet Protocol Router Network (SIPRNet). Experts warn that such lines expose users to potential hacking and surveillance and may violate federal recordkeeping requirements. The connection was reportedly used so Hegseth could use Signal more conveniently, including for chats in which he allegedly shared sensitive operational details about US airstrikes in Yemen. These messages, according to sources, included launch times and bomb drop information — data that would typically be classified. While Pentagon spokesperson Sean Parnell confirmed Hegseth has not used Signal on a government device, he declined to comment on specific communication setups, citing classification. Hegseth has denied leaking classified information, saying he never shared war plans. The Pentagon's inspector general is investigating Hegseth's communications after bipartisan concern from the Senate Armed Services Committee. Hegseth has recently dismissed multiple advisors and drawn scrutiny over his handling of sensitive military operations. The controversy has drawn comparisons to past incidents, including Hillary Clinton's use of a private email server — which Hegseth himself harshly criticized in 2016. The Trump administration continues to defend Hegseth, with Vice President JD Vance stating, 'I have 100% confidence in the secretary.' The potential breach comes amid broader concerns from US intelligence agencies about foreign actors targeting encrypted apps like Signal to access government communications.
Yahoo
25-04-2025
- Politics
- Yahoo
Report: Hegseth had an unsecured internet line set up in his Pentagon office
The Brief Defense Secretary Pete Hegseth reportedly used an unsecured internet line in his office to access Signal, an encrypted messaging app. The line bypassed Pentagon cybersecurity protocols, posing potential national security risks, according to sources familiar with the matter. The Department of Defense inspector general is investigating Hegseth's communications, following bipartisan concerns on Capitol Hill. WASHINGTON - New reporting has raised fresh concerns about Defense Secretary Pete Hegseth's handling of sensitive information after two people familiar with his office setup told the Associated Press that he used an unsecured internet connection—commonly referred to as a "dirty" line—to access the encrypted messaging app Signal on a personal device. The news follows ongoing scrutiny over Hegseth's sharing of military strike details in Signal chats, prompting an investigation by the Pentagon's acting inspector general. The backstory According to sources who spoke on condition of anonymity, Hegseth had the unsecured connection installed directly at his desk inside the Pentagon. The line bypassed the Defense Department's secure systems and linked directly to the public internet—leaving it more vulnerable to hacking and surveillance. Such lines are sometimes used in other Pentagon offices to monitor blocked websites or external information, but experts warn they lack the protections and oversight required for top-level national security officials. A senior U.S. official familiar with military network security said a key risk of a "dirty" line is that activity isn't linked to a DoD IP address—masking the user while also potentially circumventing federal recordkeeping laws. What they're saying The unsecured line was reportedly used by Hegseth to access Signal, an app that has become a flashpoint following revelations that he posted sensitive airstrike details in two separate group chats—one of which included his wife and brother, the other, senior national security officials. Those posts reportedly included classified launch and bomb-drop times. The Pentagon has not denied the line's existence, but spokesman Sean Parnell said Hegseth "has never used and does not currently use Signal on his government computer." He added that the secretary's communications systems are classified. Why you should care The Defense Department uses a tiered system of networks to protect information at varying levels of sensitivity. These include NIPRNet for sensitive but unclassified data, SIPRNet for classified communications, and JWICS for handling top-secret and compartmentalized intelligence. NIPRNet: Handles sensitive but unclassified info with firewall protections. SIPRNet: Used for classified communications. JWICS: Reserved for top-secret and compartmentalized intel. Officials are typically required to leave personal devices outside secure areas. In Hegseth's office, a cabinet is available to store electronics—but sources say he used his personal computer at his desk via the unsecured line. What's next The House and Senate Armed Services Committees have called for further oversight, and the Defense Department's inspector general is now reviewing Hegseth's Signal usage. The controversy comes amid broader concerns over staffing turmoil at the Pentagon, following a wave of firings and resignations. Despite the backlash, Vice President JD Vance told reporters: "I have 100% confidence in the secretary. I know the president does and, really, the entire team does." The Source This article is based on reporting from the Associated Press, including firsthand details from two sources familiar with the matter. This story was reported from Los Angeles.


Techday NZ
22-04-2025
- Techday NZ
So, what does secure file sharing actually look like?
There's a long, troubled history of security breaches involving sensitive information shared via messaging apps. Few incidents have captured public attention like the recent revelations involving US military attack plans leaking via high-ranking politicians on the popular messaging app Signal. Such high-profile breaches underscore the pressing need for organisations globally to reassess their methods of securely exchanging confidential data. For many outside the world of classified information, there's one big question left unanswered - how does this happen? The US government already operates several highly secure messaging platforms, such as SIPRNet, JWICS, and NIPRNet, specifically designed for classified or sensitive communications. However, the primary vulnerability often isn't technological; rather, it's the humans who use these systems. Convenience frequently drives the selection of communication tools, overshadowing critical security considerations. This tendency creates "shadow IT" scenarios, where employees resort to unofficial and less secure applications because authorised platforms are cumbersome, slow, or difficult to access remotely. Popular apps like Signal, WhatsApp, and even standard emails attract users with their user-friendly interfaces, rapid setup, and seamless integration into daily digital workflows. Data shared in high-pressure situations often carries transient value—such as precise timings for military operations—rendering cumbersome security processes seemingly unnecessary or impractical in the moment. This classic security-usability trade-off pushes users toward quicker, simpler solutions, unintentionally opening doors to significant breaches. Yet, ease of use alone does not account for all leaks. Many incidents stem from inadequate encryption standards, absence of comprehensive audit trails, or lack of integration with existing secure systems. Leaks can also occur inadvertently when sensitive files mix with unsecured data-sharing methods or when files are mistakenly forwarded without proper access controls. Metadata leakage—details such as sender identity, timestamps, or frequency of communications—can also inadvertently expose sensitive patterns, particularly in intelligence environments. Cross-agency or external collaboration further complicates matters. When partners lack secure communication channels or clearance, secure and insecure tools inevitably merge, increasing the likelihood of breaches. The risk escalates with insider threats—intentional or accidental—when employees bypass security protocols, using personal devices or unsecured cloud services for convenience. These informal practices deprive organisations of visibility and control over their sensitive data, making it nearly impossible to enforce policy compliance or track information flows. Addressing these challenges demands a thoughtful approach, considering the reasons employees opt for unsecured consumer apps. Robust, secure file-sharing systems must deliver not just high-grade encryption and security but also user-friendly integration into familiar digital environments, supporting mobile and remote workflows. One example of such a system is SureDrop by Senetas, a sovereign secure filesharing platform which integrates seamlessly with familiar apps like Microsoft 365, Active Directory, and Azure, offering users a secure yet user-friendly experience. SureDrop ensures files are encrypted both at rest and in transit, employing FIPS-certified encryption standards, and provides organisations with complete sovereignty compliance by allowing full control over data residency and encryption keys. SureDrop also features robust auditing capabilities, including detailed activity logs and the ability to integrate with external monitoring systems like Splunk, enabling strict oversight of classified information. The Signal breach serves as a critical reminder for both governments and private sectors. Sensitive information requiring protection extends far beyond classified government communications—financial records, intellectual property, strategic plans, legal documents, and personal information are all susceptible to exploitation. Industries such as healthcare, defence contracting, legal services, critical infrastructure, and media organisations regularly handle information of significant sensitivity and value. The most secure platform in the world is useless if nobody wants to use it. The goal is to bridge the gap between stringent security requirements and real-world usability. Effective solutions like SureDrop can align with operational realities, offering seamless user experiences without sacrificing essential security. By taking active steps to integrate a secure but user-friendly file share solution, organisations can mitigate risks associated with sharing sensitive information, safeguarding their operations against potentially catastrophic leaks.
Yahoo
31-03-2025
- Business
- Yahoo
Bamboo Eagle and Project Convergence Capstone: Immersive Wisdom Delivers Enduring Ultra-Low Bandwidth Digital War Rooms in Back-to-Back Exercise Success
Leave-Behind Low-Bandwidth and No-Bandwidth Digital War Room collaboration software shines in US Army's Project Convergence Capstone 25 and US Air Force's Bamboo Eagle 25-1; remains operational post-exercises on SIPRNet BOCA RATON, Fla., March 31, 2025 /PRNewswire/ -- Immersive Wisdom, Inc., provider of a proven TRL-9 distributed communications and ops center software platform for Digital War Rooms in Denied, Degraded, Intermittent, and Limited-Bandwidth (DDIL) environments achieved breakthrough performance in two consecutive U.S. Department of Defense exercises with the U.S. Air Force and U.S. Army. The company's Ultra-Low Bandwidth Digital War Room software, deployed worldwide and accessible via SIPRNet, enabled seamless collaboration among geographically dispersed joint force users. Throughout Bamboo Eagle 25-1 and Project Convergence Capstone 25, Immersive Wisdom successfully enabled resilient communications across multiple global locations. The software demonstrated its value not only during the exercises but as a persistent, leave-behind capability — continuing to support operational readiness and mission continuity beyond the events. Significantly, Army, Air Combat Command, PACAF, and AFSOC units can now seamlessly collaborate in Ultra-Low Bandwidth Digital War Rooms using the same standard Immersive Wisdom software which is immediately available. "These back-to-back exercises confirmed that Immersive Wisdom delivers lasting impact — an enduring joint capability that remains available post event, worldwide, across missions and users," said Michael Appelbaum, CEO of Immersive Wisdom. "By delivering Ultra-Low Bandwidth Digital War Rooms on SIPRNet, we empower warfighters to make faster, more effective decisions together, regardless of location or network conditions." Designed to thrive in disconnected, contested, and bandwidth-constrained environments, Immersive Wisdom's software ensures secure and resilient collaboration. Its deployment on SIPRNet during the exercises bridged service-specific systems and workflows — marking a significant milestone for joint force interoperability. No VR/XR or special hardware. Uses existing Government Issued Laptops. Collaborate at 100 kilobits per sec/user in digital rooms. Works offline with no comms. About Immersive Wisdom Immersive Wisdom Inc., based in Boca Raton, Florida, founded in 2016, offers a patented remote communications and ops center platform for distributed & disaggregated operations that allows geographically dispersed personnel to effectively work together and act in digital rooms without having to be physically present, even in severely bandwidth-limited environments, using existing desktops and laptops. Immersive Wisdom's software is available for diverse industries, including Government, Logistics, and Telecommunications. Additional information on Immersive Wisdom's other successes, including our work with the U.S. Army and U.S. Air Force, can be found under the News section at We are an In-Q-Tel portfolio company. The Immersive Wisdom trademark is the exclusive property of Immersive Wisdom, Inc. and is registered with the U.S. Patent and Trademark Office. All other Immersive Wisdom trademarks, service marks, and logos may be common law marks or are registered or pending registration. © 2025 Immersive Wisdom, Inc. MEDIA CONTACTS:Brian BehlingEVPImmersive Wisdom Inc.202.355.4425brian@ View original content to download multimedia: SOURCE Immersive Wisdom Inc. Sign in to access your portfolio

Associated Press
31-03-2025
- Business
- Associated Press
Bamboo Eagle and Project Convergence Capstone: Immersive Wisdom Delivers Enduring Ultra-Low Bandwidth Digital War Rooms in Back-to-Back Exercise Success
Leave-Behind Low-Bandwidth and No-Bandwidth Digital War Room collaboration software shines in US Army's Project Convergence Capstone 25 and US Air Force's Bamboo Eagle 25-1; remains operational post-exercises on SIPRNet BOCA RATON, Fla., March 31, 2025 /PRNewswire/ -- Immersive Wisdom, Inc., provider of a proven TRL-9 distributed communications and ops center software platform for Digital War Rooms in Denied, Degraded, Intermittent, and Limited-Bandwidth (DDIL) environments achieved breakthrough performance in two consecutive U.S. Department of Defense exercises with the U.S. Air Force and U.S. Army. The company's Ultra-Low Bandwidth Digital War Room software, deployed worldwide and accessible via SIPRNet, enabled seamless collaboration among geographically dispersed joint force users. Throughout Bamboo Eagle 25-1 and Project Convergence Capstone 25, Immersive Wisdom successfully enabled resilient communications across multiple global locations. The software demonstrated its value not only during the exercises but as a persistent, leave-behind capability — continuing to support operational readiness and mission continuity beyond the events. Significantly, Army, Air Combat Command, PACAF, and AFSOC units can now seamlessly collaborate in Ultra-Low Bandwidth Digital War Rooms using the same standard Immersive Wisdom software which is immediately available. 'These back-to-back exercises confirmed that Immersive Wisdom delivers lasting impact — an enduring joint capability that remains available post event, worldwide, across missions and users,' said Michael Appelbaum, CEO of Immersive Wisdom. 'By delivering Ultra-Low Bandwidth Digital War Rooms on SIPRNet, we empower warfighters to make faster, more effective decisions together, regardless of location or network conditions.' Designed to thrive in disconnected, contested, and bandwidth-constrained environments, Immersive Wisdom's software ensures secure and resilient collaboration. Its deployment on SIPRNet during the exercises bridged service-specific systems and workflows — marking a significant milestone for joint force interoperability. No VR/XR or special hardware. Uses existing Government Issued Laptops. Collaborate at 100 kilobits per sec/user in digital rooms. Works offline with no comms. About Immersive Wisdom Immersive Wisdom Inc., based in Boca Raton, Florida, founded in 2016, offers a patented remote communications and ops center platform for distributed & disaggregated operations that allows geographically dispersed personnel to effectively work together and act in digital rooms without having to be physically present, even in severely bandwidth-limited environments, using existing desktops and laptops. Immersive Wisdom's software is available for diverse industries, including Government, Logistics, and Telecommunications. Additional information on Immersive Wisdom's other successes, including our work with the U.S. Army and U.S. Air Force, can be found under the News section at We are an In-Q-Tel portfolio company. The Immersive Wisdom trademark is the exclusive property of Immersive Wisdom, Inc. and is registered with the U.S. Patent and Trademark Office. All other Immersive Wisdom trademarks, service marks, and logos may be common law marks or are registered or pending registration. © 2025 Immersive Wisdom, Inc. Brian Behling Immersive Wisdom Inc. 202.355.4425