1 00:00:00,420 --> 00:00:04,140 this clothesline in Long Island New York\h was the U.S government's first ever system\h\h 2 00:00:04,140 --> 00:00:08,460 for transmitting top secret data it was the\h Revolutionary War and the Americans needed\h\h 3 00:00:08,460 --> 00:00:12,000 a way to get information from New York City to\h George Washington's headquarters in Morristown\h\h 4 00:00:12,000 --> 00:00:17,160 New Jersey without the British intercepting it\h so they wrote down 763 words assigned each a\h\h 5 00:00:17,160 --> 00:00:22,440 number between 1 and 763 and bada bing bada boom\h you've got the worst Cipher in military history\h\h 6 00:00:22,440 --> 00:00:26,940 but whatever people's brains were too riddled with\h dysentery or something and somehow this seemed to\h\h 7 00:00:26,940 --> 00:00:30,960 do the trick these encrypted letters would travel\h along this route from New York City to here in\h\h 8 00:00:30,960 --> 00:00:35,580 Setauket where they would be stashed in one of\h five locations a local woman and a strong would\h\h 9 00:00:35,580 --> 00:00:39,480 then hang up a black Petticoat on her clothesline\h to signal to nearby ships that the letter was\h\h 10 00:00:39,480 --> 00:00:43,320 ready to be picked up with between one and five\h white handkerchiefs to indicate which location\h\h 11 00:00:43,320 --> 00:00:47,220 the letter was hidden in from there the letter\h would then be secretly picked up and make the\h\h 12 00:00:47,220 --> 00:00:51,120 rest of the journey to Morristown unfortunately\h we're no longer allowed to distribute information\h\h 13 00:00:51,120 --> 00:00:55,380 about British warships and the US Department\h of Defense has since updated its methods for\h\h 14 00:00:55,380 --> 00:00:59,940 securely transmitting government secrets today the\h US uses three different networks each designed for\h\h 15 00:00:59,940 --> 00:01:04,200 different levels of classification to send\h sensitive data across the globe here's how\h\h 16 00:01:04,200 --> 00:01:09,300 they work the first and least secure of the three\h is called necromant the non-classified Internet\h\h 17 00:01:09,300 --> 00:01:14,040 Protocol router Network basically nevernet is\h a private interconnected network of government\h\h 18 00:01:14,040 --> 00:01:18,720 computers that is attached through secure gateways\h to the rest of the internet technically you could\h\h 19 00:01:18,720 --> 00:01:22,740 access it using the same connection you're using\h to watch this video but you probably wouldn't get\h\h 20 00:01:22,740 --> 00:01:26,880 very far think of it like a gated community they\h might be connected to the wider system of roads\h\h 21 00:01:26,880 --> 00:01:31,020 but if you go there without the right credentials\h you'll wind up in prison or shot you can't access\h\h 22 00:01:31,020 --> 00:01:34,800 never Nets unless you're part of a government\h agency or approved government contractor that's\h\h 23 00:01:34,800 --> 00:01:39,060 giving you access but it's used pretty widely and\h isn't monitored too closely none of the data on\h\h 24 00:01:39,060 --> 00:01:42,420 nippernet is technically classified it's just\h stuff that the government doesn't want floating\h\h 25 00:01:42,420 --> 00:01:46,980 around in public data like tax records internal\h schedules or these photos of Obama paddle boarding\h\h 26 00:01:46,980 --> 00:01:50,520 for data that's actually classified and not\h just too titillating for public consumption\h\h 27 00:01:50,520 --> 00:01:54,300 the Department of Defense uses a network\h called sipper net or with a secure Internet\h\h 28 00:01:54,300 --> 00:01:58,260 Protocol router Network this is the network that\h deals with any information that's been labeled\h\h 29 00:01:58,260 --> 00:02:03,540 confidential or secret the first two levels of DOD\h classification examples of confidential or secret\h\h 30 00:02:03,540 --> 00:02:07,860 information might be say lists of War reserves\h scientific studies relevant to military Tech\h\h 31 00:02:07,860 --> 00:02:12,060 information about enemy weaknesses this video of\h two U.S Apache helicopters firing on civilians\h\h 32 00:02:12,060 --> 00:02:16,080 that got leaked when supernet was compromised in\h 2010. oh whoops how did that get in there oh well\h\h 33 00:02:16,080 --> 00:02:20,340 you get the idea this network unlike neighbor\h Nets is completely disconnected from the rest\h\h 34 00:02:20,340 --> 00:02:23,640 of the internet and only connects government\h computers to one another it does this with\h\h 35 00:02:23,640 --> 00:02:27,540 a fairly standard method of data transfer called\h packet switching where your messages split up into\h\h 36 00:02:27,540 --> 00:02:31,560 pieces all of which take different routes along\h the network before reaching their destination\h\h 37 00:02:31,560 --> 00:02:35,640 now keeping all the classified data contained\h within this network separate and unsullied by\h\h 38 00:02:35,640 --> 00:02:39,900 the evils of public internet is more complicated\h than just isolating the network itself you also\h\h 39 00:02:39,900 --> 00:02:43,920 need to isolate every single device that has\h ever touched the network if you connect your\h\h 40 00:02:43,920 --> 00:02:48,600 computer to supernet it is permanently considered\h classified at the secret level that means it can\h\h 41 00:02:48,600 --> 00:02:52,680 only be used or stored in locations that have been\h approved by the government to have secret level\h\h 42 00:02:52,680 --> 00:02:57,600 data in plain sight anything that's ever been\h plugged into that computer is now also considered\h\h 43 00:02:57,600 --> 00:03:02,220 classified technically if you plug this USB rock\h into to separinet the Department of Defense would\h\h 44 00:03:02,220 --> 00:03:07,260 be bound by federal law to protect its secrecy\h forever but despite all those headaches cybernet\h\h 45 00:03:07,260 --> 00:03:13,020 is not even the government's most secure network\h now that would be the joint worldwide intelligence\h\h 46 00:03:13,020 --> 00:03:18,120 Communication System the network used to transmit\h top secret data for some reason the government has\h\h 47 00:03:18,120 --> 00:03:21,780 been a little vague about exactly how this\h network works but on a technical level it\h\h 48 00:03:21,780 --> 00:03:26,220 functioned pretty similarly to say Burnet data\h is transmitted by a satellite across a closed\h\h 49 00:03:26,220 --> 00:03:30,720 network of government computers with the ability\h to denote which packets of data are most sensitive\h\h 50 00:03:30,720 --> 00:03:35,220 those then take the fastest and most secure route\h through the network so they spend the least amount\h\h 51 00:03:35,220 --> 00:03:39,720 of time flying through space where anyone could\h NAB them with a really tiny butterfly net any data\h\h 52 00:03:39,720 --> 00:03:45,180 on jwics can only be stored or accessed in highly\h specialized rooms called sensitive compartmented\h\h 53 00:03:45,180 --> 00:03:48,900 information facilities there are quite a few of\h these around the globe that can be as small as a\h\h 54 00:03:48,900 --> 00:03:52,800 closet or as large as an office building but some\h notable examples would be the Situation Room in\h\h 55 00:03:52,800 --> 00:03:56,880 the White House or the cabin of Air Force One in\h order to keep the top secret data contained within\h\h 56 00:03:56,880 --> 00:04:01,980 jwics both top and secret these rooms have some\h very very specific technical requirements that\h\h 57 00:04:01,980 --> 00:04:06,180 you would think would be kept Under Wraps but are\h actually all written out in excruciating detail in\h\h 58 00:04:06,180 --> 00:04:10,620 this seemingly not very top secret document since\h publicizing this is apparently not considered a\h\h 59 00:04:10,620 --> 00:04:15,120 national security risk here's exactly how these\h facilities are constructed standard seif walls are\h\h 60 00:04:15,120 --> 00:04:19,620 composed of 5 8 inch gypsum wall board buffered\h by three and a half inches of sound attenuated\h\h 61 00:04:19,620 --> 00:04:23,100 material and sealed with acoustic sealant\h to ensure the secrets don't slip through the\h\h 62 00:04:23,100 --> 00:04:27,420 cracks each perimeter wall is installed with radio\h frequency protection as well as optional speakers\h\h 63 00:04:27,420 --> 00:04:32,220 that play vibrations louder than any conversations\h being held inside the room what doors need to\h\h 64 00:04:32,220 --> 00:04:36,120 follow these specifications steel doors need to\h follow these specifications windows are a bad\h\h 65 00:04:36,120 --> 00:04:40,140 idea monitors must be faced away from the doorways\h and no one from any country we've recently pissed\h\h 66 00:04:40,140 --> 00:04:44,400 off is allowed to build any of this so that's how\h you keep top secret secret or you could just use a\h\h 67 00:04:44,400 --> 00:04:49,020 clothesline because nobody cracked that either\h but hey you know what's not a highly sensitive\h\h 68 00:04:49,020 --> 00:04:53,340 government secret the amount of absurdly Good\h original content that's been piling up on nebula\h\h 69 00:04:53,340 --> 00:04:57,000 recently if you're out of the loop nebula is the\h create your own educational streaming service that\h\h 70 00:04:57,000 --> 00:05:01,260 I started with my friends it's become this amazing\h opportunity for us to create the videos that we've\h\h 71 00:05:01,260 --> 00:05:05,100 always wanted to create but couldn't because\h the constraints of YouTube the team and I have\h\h 72 00:05:05,100 --> 00:05:09,120 already produced four on-site documentaries for\h nebula as well as a trivia show a bizarre piece of\h\h 73 00:05:09,120 --> 00:05:13,380 self-referential fiction and a travel show where\h I break laws across the country but that's just\h\h 74 00:05:13,380 --> 00:05:17,400 us navya also has channels like City beautiful\h producing a whole series on the greatest cities\h\h 75 00:05:17,400 --> 00:05:21,600 on Earth or real life lore taking a deep dive on\h Modern conflicts around the world that's not to\h\h 76 00:05:21,600 --> 00:05:25,320 mention all the content that you can watch early\h on nebula before your favorite creators bring\h\h 77 00:05:25,320 --> 00:05:28,980 those videos to YouTube if you've been following\h our other channel just like the game you can watch\h\h 78 00:05:28,980 --> 00:05:34,200 those videos a week in advance on nebula and say\h a full episode ahead of everyone watching on here\h\h 79 00:05:34,200 --> 00:05:38,280 the best way to get access to it is through the\h Curiosity stream never the bundle deal especially\h\h 80 00:05:38,280 --> 00:05:42,600 right now because they're running a holiday sale\h to their lowest price ever offered less than\h\h 81 00:05:42,600 --> 00:05:47,760 twelve dollars for the whole year that's less than\h Netflix cost per month and even for that crazy low\h\h 82 00:05:47,760 --> 00:05:51,960 price you also get access to curiosity stream\h the phenomenal documentary streaming site with\h\h 83 00:05:51,960 --> 00:05:55,800 its own whole Suite of incredible original shows\h and documentaries all you have to do is click\h\h 84 00:05:55,800 --> 00:06:00,300 the button on the screen or sign up with our link\h curiositystream.com Hai you'll be supporting all\h\h 85 00:06:00,300 --> 00:06:05,100 of our channels while simultaneously getting the\h best feeling of streaming at its lowest price ever