User:Catmaster10/sandbox
This is my sandbox!!
I am writing an expansion for the Stub article for MILNET for my university class.

Internet history timeline |
Early research and development:
Merging the networks and creating the Internet:
Commercialization, privatization, broader access leads to the modern Internet:
Examples of Internet services:
|
In computer networking, MILNET (fully Military Network) was the name given to the part of the ARPANET internetwork designated for unclassified United States Department of Defense traffic.[1][2]
History
[edit]Background and split from ARPANET
[edit]In 1980, the TCP/IP protocol was adopted as a Defense Standard, enabling the eventual separation of MILNET from the ARPANET. The ARPANET remained in service for the academic research community, but direct connectivity between the networks was severed for security reasons. The MILNET and the ARPANET used very similar technology. Cite error: A <ref>
tag is missing the closing </ref>
(see the help page).
MILNET was officially established on April 4, 1983, as a dedicated network for U.S. Department of Defense (DoD) communications. Upon its creation, the Computer Science Institute billing system for ARPANET service was discontinued for DoD nodes and TACs designated to migrate to MILNET.[3]
The split was planned years in advance by researchers and companies funded by the DARPA. BBN, a DARPA contractor, built and maintained both ARPANET and MILNET.[4]
Early infrastructure
[edit]After the split, MILNET nodes were relocated to secured military sites, unlike ARPANET’s nodes, which remained in academic and research laboratories.[5] Initially, MILNET shared ARPANET’s infrastructure, using IMPs (Interface Message Processors) with separate gateways to enforce isolation between the two networks.[6]
At its launch, MILNET connected 68 primary sites, including DoD bases and defense contractors. Though smaller than ARPANET initially, MILNET continued to expand over time.[7] The network was officially managed by the Defense Communications Agency (DCA), and later absorbed into the DISA.
Integration into the Defense Data Network
[edit]By 1982, MILNET was incorporated into the Defense Data Network (DDN), a larger framework for military communications. It remained a key component until its eventual absorption into the DISN in the 1990s.[8]
Technical Design and Operations
[edit]Network Protocols and Access
[edit]MILNET users accessed the network through host-to-host connections, primarily using the TELNET protocol for remote login and the FTP for file transfers.[9]
To connect to a remote host, a user first logged into a local MILNET node, then invoked TELNET by specifying the target host’s address or hostname. Authentication required a valid username and password. TELNET also supported direct connections to specific port numbers (sockets) for dedicated services. Sessions terminated upon logout.[9]
FTP enabled cross-platform file transfers, including between systems with different operating systems. Users needed either a valid account on the remote host, or for public files, the "anonymous" login convention. Anonymous FTP only permitted downloads. Uploads required privileged credentials. Files also needed explicit "read access" permissions to be transferred.[9]
Security Infrastructure
[edit]MILNET was designed for non-classified military communications up to the "Confidential" level. More sensitive data used segregated systems like SPIRNET.[10]
The network initially shared IMPs with ARPANET but enforced isolation through dedicated gateways. It employed encryption for sensitive traffic, though specific mechanisms remained classified.[11] Access required military authorization, and the TACACS authentication system was deployed to manage terminal connections.[12]

Management and Expansion
[edit]MILNET was managed by the Defense Communications Agency (DCA), later part of the DISA. By the 1990s, it was absorbed into the DISN, with its architecture influencing successors like NIPRNet (unclassified) and SIPRNet (classified).[13]
Security Incidents
[edit]Markus Hess Espionage (1986–1987)
[edit]From 1986 to 1987, Lawrence Berkeley National Laboratory (LBL) detected unauthorized intrusions into military and academic systems via MILNET and ARPANET. The attacker, later identified as German hacker Markus Hess, was found to be extracting sensitive data for the Soviet KGB. The investigation, led by LBL systems administrator Clifford Stoll, involved monitoring Hess's activities for ten months before collaborating with German and U.S. authorities to apprehend him. Hess was convicted of espionage in Germany in 1990 but received a suspended sentence.[14]
The breach was first detected due to a minor accounting discrepancy in an LBL system account lacking a billing address. The National Computer Security Center later alerted LBL to suspicious MILNET activity originating from the lab. Researchers deployed line printers and serial port monitors to log the intruder’s keystrokes and network traffic offline. Surveillance revealed Hess had exploited LBL’s systems as a gateway to attack approximately 450 military and academic computers, with successful intrusions into over 30.[15]
Methods Used
[edit]Hess employed:
- Brute-force attacks guessing default credentials like "root" or "guest".
- Exploitation of a privilege-escalation flaw in GNU Emacs’ `movemail` utility.
- Dictionary attacks on cracked UNIX password files harvested from poorly secured systems.
- X.25 networks and compromised dial-up modems to obscure his location.[16]
LBL researchers created decoy files purportedly related to the Strategic Defense Initiative (SDI). When Hess accessed these, German telecom technicians identified his physical location, leading to his arrest.[17]
Julian Assange Hack (Early 1990s)
[edit]In the early 1990s, Julian Assange (then a "black hat hacker") claimed to have infiltrated the Pentagon’s Security Coordination Center (SCC), a MILNET security hub in Chantilly, Virginia. Assange stated:
We had a backdoor in the U.S. military Security Coordination Center –- this is the peak security for controlling the security of MILNET… U.S. military internet. We had total control over this for two years.[18]
Legacy
[edit]MILNET played a pivotal role in the evolution of U.S. military networking infrastructure. By the 1990s, MILNET was absorbed fully into the Defense Information Systems Network (DISN), serving as the foundation for modern United States military networks.[19]
Successor Networks and Influence
[edit]MILNET's architecture directly influenced:
- The NIPRNet (Non-Classified Internet Protocol Router Network), which inherited its unclassified communication functions.
- The SIPRNet (Secret Internet Protocol Router Network), designed for classified data transmission.[20]
- Early adoption of TCP/IP as a military standard, which later became the global internet standard.
- Development of gateway isolation techniques between classified and unclassified networks.
- Implementation of the TACACS authentication model, which evolved into modern network access control systems.[21]
References
[edit]- ^ DEFENSE DATA NETWORK NEWSLETTER DDN-NEWS 26, 6 May 1983
- ^ Harris, Dr. Thomas G., et al., "Development of the MILNET," 15th Annual Electronics and Aerospace Systems Conference, Eascon 82, IEEE CH1828 Conference Record, 1982, pp. 77-80.
- ^ "DDN Newsletter, Vol. 1, No. 1". RFC Editor. April 1983.
- ^ "MILNET Split: The History of Domain Names". History of Domain Names.
- ^ "The Evolution of Military Networking". ACM SIGCOMM Computer Communication Review. 1985.
- ^ "Design and Operation of MILNET". ACM SIGCOMM Computer Communication Review. 1986.
- ^ "Design and Operation of MILNET". ACM SIGCOMM Computer Communication Review. 1986.
- ^ "MILNET Split: The History of Domain Names". History of Domain Names.
- ^ a b c MILNET User Handbook (Report). Defense Technical Information Center. 1986.
- ^ "Design and Operation of MILNET". ACM SIGCOMM Computer Communication Review. 1986.
- ^ "Design and Operation of MILNET". ACM SIGCOMM Computer Communication Review. 1986.
- ^ "DDN Newsletter, Vol. 1, No. 1". RFC Editor. April 1983.
- ^ "Design and Operation of MILNET". ACM SIGCOMM Computer Communication Review. 1986.
- ^ "Stoll, Clifford. The Cuckoo's Egg (excerpt)" (PDF). Textfiles.com.
- ^ "Stoll, Clifford. The Cuckoo's Egg (excerpt)" (PDF). Textfiles.com.
- ^ "Stoll, Clifford. The Cuckoo's Egg (excerpt)" (PDF). Textfiles.com.
- ^ "Stoll, Clifford. The Cuckoo's Egg (excerpt)" (PDF). Textfiles.com.
- ^ "Documentary on Julian Assange's Early Hacking". YouTube.
- ^ "Design and Operation of MILNET". ACM SIGCOMM Computer Communication Review. 1986.
- ^ "Design and Operation of MILNET". ACM SIGCOMM Computer Communication Review. 1986.
- ^ "DDN Newsletter, Vol. 1, No. 1". RFC Editor. April 1983.