Classified Networks Cannot Receive Threat Intelligence Feeds in Real Time

defense+20 views
The DoD's classified networks (SIPRNet, JWICS) operate in isolation from the commercial internet by design. This air gap protects them from direct attack but creates a critical problem: threat intelligence generated by commercial cybersecurity firms, CERTs, and allied nations cannot flow into classified defensive systems in real time. When CrowdStrike, Mandiant, or Microsoft publishes indicators of compromise (IOCs) for an active Chinese hacking campaign, those indicators must be manually reviewed, reformatted, classified at the appropriate level, and then loaded into classified defensive tools. This process takes hours to days. This matters because modern cyber attacks move in minutes. A nation-state adversary who has compromised a defense contractor's unclassified network can pivot to classified enclaves through trusted connections, VPN tunnels, or supply chain access. If the indicators of compromise for that adversary's tools are available commercially but not yet loaded into SIPRNet's defensive sensors, the attack succeeds during the gap. The real-world pain is that DoD cyber defenders often learn about attacks on their own networks from commercial security firms and news reports rather than from their own defensive tools. The Cyber Protection Teams monitoring SIPRNet may be watching for yesterday's threats while today's attack walks past their sensors. This information latency means that classified networks are paradoxically less well-defended than many commercial networks that receive threat feeds in real time. Attempts to solve this with cross-domain solutions (CDS) have been slow and limited. Every CDS must go through a years-long accreditation process, and each one only handles specific data formats and classification levels. The result is a patchwork of narrow pipelines rather than a broad, real-time threat intelligence flow. The structural cause is that the classification system was designed to prevent information from leaking out of classified networks, not to enable information to flow in. The security architecture assumes that anything entering a classified network could be a Trojan horse, so every inbound data flow requires extensive review. This defensive posture made sense for documents and files but is fundamentally incompatible with the speed requirements of real-time cyber defense.

Evidence

NSA Cybersecurity Directorate (established 2019) was created partly to address the gap between classified and unclassified threat intelligence. CISA's Automated Indicator Sharing (AIS) program processes millions of IOCs but feeds only to unclassified systems. Cross-domain solution accreditation takes an average of 2-3 years per DSCA guidance. DoD Inspector General report DODIG-2020-098 found 'delays in sharing cyber threat information between classified and unclassified environments.' Former CYBERCOM deputy Gen. Charles Moore noted at AFCEA West 2023 that 'commercial threat intelligence often reaches defenders faster than our own classified channels.' Joint Force Headquarters-DODIN acknowledged in its 2023 strategy that 'information sharing speed must improve to match adversary operational tempo.'

Comments