Share to: share facebook share twitter share wa share telegram print page

Joint Worldwide Intelligence Communications System

Joint Worldwide Intelligence Communications System
Part of The United States Department of Defense Computer Networks
Based in United States
Site information
OperatorMultiple Operators
Controlled byThe United States Department of Defense
Open to
the public
No

The Joint Worldwide Intelligence Communication System (JWICS, /ˈwɪks/ JAY-wiks) is the United States Department of Defense's secure[citation needed] intranet system that houses top secret and sensitive compartmented information. JWICS superseded the earlier DSNET2 and DSNET3, the Top Secret and SCI levels of the Defense Data Network based on ARPANET technology.[1][2]

The system deals primarily with intelligence information and was one of the networks accessed by Chelsea Manning, in the leaking of sensitive footage and intelligence during the Afghanistan and Iraq wars to whistleblower organization WikiLeaks in 2010,[3] primarily the video used in WikiLeaks' Collateral Murder prior to leaking a trove of US diplomatic cables.[4] In 2023, it was also accessed by Jack Teixeira who leaked information about the war in Ukraine.

Because of the information it houses, JWICS is subject to discussion around cybersecurity and the United States' vulnerability to cyber threats.

Opinions surrounding the Joint Worldwide Intelligence Communication system are varied. Some emphasize its importance as a measure to protect intelligence that helps to ensure the safety of US military interests and personnel. Others [who?] scrutinize the system for standing in the way of the transparency and accountability of government.

JWICS in practice

Behind the Green Door secure communications center with SIPRNET, NMIS/GWAN, NSANET, and JWICS access

The Joint Worldwide Intelligence Communications System (JWICS) is a secure intranet system utilized by the United States Department of Defense to house "Top Secret/Sensitive Compartmented Information"[5] In day-to-day usage, the JWICS is used primarily by members of the Intelligence Community, such as the DIA within the DoD, and the Federal Bureau of Investigation under the Justice Department. Conversely, SIPRNet and NIPRNet account for the overwhelming bulk of usage within DoD and non-intelligence government agencies and departments.

There are three main router networks operated by the Department of Defense. Each is separated by the types of information they deal with.[6]

At the most open level, the Non-Classified Internet Protocol Router Network (NIPRNET) is the hub for non-classified but still specialized information relating to important logistics and planning.[6]

Above this lies the Secret Internet Protocol Router Network (SIPRNET). SIPRNET deals with information classified as Confidential or Secret.[6] SIPRNET is another of the networks accessed by Chelsea Manning (See Automation bias, #JWICS, WikiLeaks, and Chelsea Manning).[7][8]

Finally, the Joint Worldwide Intelligence Communications System houses the top level of data, consisting primarily of top-secret intelligence information.[6] The system deals with transmissions coming from across the globe. The transmission of information across the JWICS network is summarized by Jeffrey R. Cares in the Encyclopedia of Cyber Warfare:[5] See Joint All-Domain Command and Control

JWICS can utilize satellite network connections, and the traffic moving across the network can be sent in prioritized premarked packets, meaning that the most important and sensitive information can be sent on the fastest and most secure routes ... Once transmitted, the information is housed on JWICS and is accessible from "highly secured rooms known as Secret Compartmentalized Information Facilities. Such rooms are incredibly important facilities, and can be highly vulnerable if compromised.[5][6][8]

JWICS, WikiLeaks, and Chelsea Manning

The vulnerability of secure networks such as JWICS to insider threats was revealed with the leak of hundreds of thousands of secret US intelligence documents, the largest in US history at the time.[8] At the epicenter of these leaks was an intelligence analyst, Chelsea Manning. While serving in Iraq in 2010, Manning accessed JWICS, along with its lower-level counterpart SIPRNET, to leak documents to WikiLeaks, a non-profit platform for whistleblowers headed by Julian Assange.[8][7] Manning was directly involved in the leaks known as "Collateral Murder," "The Iraqi War Logs," "The Afghan War Diary," and "Cablegate".[9] Manning is allegedly responsible for the leaking of over 700,000 files. At the time this was the largest data leak in US military history.[7] Manning was arrested in late 2010 after confiding in fellow hacker, Adrian Lamo, who reported Manning to the Federal Bureau of Investigation.[9]

It is believed that Manning's decision to supply the files to WikiLeaks began partly as a result of directly experiencing "war porn", graphic videos watched by analysts for entertainment. A notable video viewed by Manning that would later also capture public attention involved a US Apache helicopter firing on civilians. This video would be named "Collateral Murder."[7] Manning was also uncomfortable with and perceived censorship of Iraqi citizens in their published opinions on government, and the "don't ask, don't tell" construct surrounding homosexuality in the US military.[9][7] All of this information was contained in secure networks such as JWICS, causing their legitimacy as a form of a protection, rather than censorship, to be widely scrutinized in media and academic discourse.[7][9]

Manning was sentenced in 2013 to 35 years at Fort Leavenworth. This sentence was commuted by the Obama administration for release after 7 years in 2017.[10] Manning was again jailed after refusing to testify at the grand jury investigation against Wikileaks, and was released in March 2020.[11]

The events surrounding Manning led to widespread reforms. Training and monitoring is now in place to identify risk factors in analysts to prevent them using their position to leak documents from secure networks.[8] In addition, more widespread monitoring of the daily use of networks is undertaken.[8] Cybersecurity concerns are often discussed with a focus on hacking and external threats, but Mark Ambidner of The Atlantic highlighted the susceptibility of defense networks to trusted actors:

All it took was one disaffected young man [Sic] with a rudimentary knowledge of computer systems to bring down an entire edifice of code names, secret networks, compartmented channels, and protected information.[8]

Public interest

Some argue from a pro-public interest perspective that JWICS allows government to manipulate releases of information (as occurred in "Collateral Murder") to shirk accountability for wrongdoings.[12]

Others, who take a more conservative approach to information release, cite the importance of protecting troops on the ground and deny the idea that full transparency is essential for democracy.[13]

Arguments

A screengrab of footage from the 'Collateral Murder' video obtained and leaked by Chelsea Manning.

With the development of secure intranet networks and the increased use of technology in government and military operations, networks such as JWICS have come under scrutiny due to their perceived capacity to keep public interest information behind closed networks.[12]

At the heart of pro-public interest arguments is the desire to hold governments accountable for their wrongdoings. Academics posit that pre-1991 there was a layer of separation allowing organizations to be selective about what they released to the public. Thus, the advent of the World Wide Web in 1991 was viewed as a triumph of public interest, allowing individuals to "freely share what they knew." Since then, however, the development of secure networks such as JWICS has reinstated levels of separation between individuals and government and has again prevented the public from holding government to account. This has been exacerbated since 9/11 with the war on terror providing a 'scape-goat' for governments in hiding public interest information (such as the shooting of Iraqi journalists in "collateral murder") under the guise of protecting against foreign interests and terrorism.[12]

One of the main pro-protection arguments surrounding JWICS is that JWICS is essential to prevent the identities of individuals from being released. By releasing these documents en-masse without adequate care, leakers are putting these individuals at risk.[14] In the case of military operations, JWICS is also said to protect troops on the ground by safeguarding their strategy and movements.[12]

Pro-protection parties argue that leaking agents such as Wikileaks need to better censor the identities of individuals contained in their leaks to prevent harm.[14]

In several of WikiLeaks' leaks involving JWICS in the Iraq and Afghanistan wars, they worked alongside publications such as the New York Times. In publishing documents, the Times employed censorship efforts, consulting the CIA and the DoD about what to omit from their publication.[15]

The central counterargument to protection is that releases must balance the opposing forces of public interest and potential harm.[15] Pro-public interest speaker Simon Jenkins states that "The Job of Media is not to protect power from embarrassment."[15] Nonetheless, from a pro-protection standpoint, media does have a role in defining the limits of public interest in their publications to protect the safety of certain stakeholders.[14]

Counterterrorism

JWICS operates as the highest level network in the DoD's information cyberspace.[6] It is a controlled network, and the information contained within it is of great importance to both the US, and other parties looking for information.[6][5]

Because of its importance, a key issue surrounding JWICS is the threat of cyberterrorism. Foundations like JWICS present critically important assets that if infiltrated, can lead to information and/or strategic advantages. This is not dissimilar to how strategic points like bases or fortresses would be infiltrated in regular warfare.[6]

The vulnerability of cyber networks lies in their construction. Structures are created through software written by individuals whose mistakes create vulnerabilities for those who want to protect information, and opportunities for those seeking it.[6] In addition, cyberterrorism is not restricted by geographical bounds. Networks can be hacked remotely from across the globe without warning.[6] This creates jurisdictional issues for enforcement.[16]

A key vulnerability for secret level networks such as JWICS is what is described as a 'sneakernet threat.' These systems are designed to be separate from the unclassified internet, creating a protection from malware. However, the systems also rely on users uploading documents from the internet. This creates a risk of viruses being passed on along with the information into the secure system.[6]

An example of this threat came to reality in 2008 when Russian malware made its way into the SIPRNET system by way of a thumb-drive which was plugged into classified-level computers accessing the network. These computers lacked virus protection due to their detachment from the internet, and were compromised as a result. The virus, once gaining access to these networks, acted as a 'beachhead' which allowed the transfer of data to foreign computers[17][6] The hack was, at the time, the largest compromise of US cybersecurity in history, and initially led to a ban on the use of thumb-drives.[17] this was later repealed.[18]

JWICS is structured slightly differently to SIPRNET. JWICS is accessed via "terminals" in protected facilities known as Secret Compartmentalized Information Facilities.[6] These physical facilities are highly protected as physical structures. This is because they present strategic advantage. If one terminal is accessed by an enemy, all of JWICS is available to them until that terminal is disconnected from the network.[6] Because of JWICS' structure, allowing access only through secure facilities, it is relatively protected from outside threats. However, there is an intrinsic vulnerability in JWICS that is summarized by Clarke and Knake in Cyber War: The Next Threat to National Security and What to do About It:

Access to these terminals is more restricted because of their location, but the information flowing on the network still has to go across fiber optic cables and through routers and servers, just as with any other network. Routers can be attacked to cut communications. The hardware used ... can all be compromised at the point of manufacture of later one. Therefore we cannot assume that even this network is reliable.[6]

The mounting threat to US cybersecurity has led to some developments surrounding defense. In 2011, Leon Panetta and other intelligence officials gave statements about the growing vulnerability of the US to cyber attacks. This stemmed from Pentagon Reports about critical security breaches in government and business networks.[16]

Since then the Department of Defense has rolled out and continually developed 'Einstein' software aimed at detecting and preventing intrusion into federal government networks. In addition, "the Department of Homeland Security and the NSA signed a memorandum of understanding the improve collaboration between the agencies."[16]

The 2008 Russian infiltration of SIPRNET led to large reforms in terms of defense strategy. In 2008, then defense Secretary Robert Gates moved to create a dedicated infrastructure dealing specializing with cyber warfare strategy – the Cyber Command. Cyber command was originally designed by Colonel Paul Nakasone, Lieutenant Colonel Jen Easterly, Navy Captain T. J. White, and Air Force Colonel Stephen Davis. These four became colloquially known as 'The Four Horsemen' and set out to create the framework for Cyber Command, the US's dedicated cyber-strategy wing.[19]

In 2016, Cyber Command gained separation from the NSA, elevating it to have a direct line to the White House. The Trump administration has further stretched the team's authority, allowing them to take a more offensive approach to cyber strategy.[19]

See also

References

  1. ^ MARCORSYSCOM – Website Temporarily Suspended Archived 2011-02-20 at the Wayback Machine. Marcorsyscom.usmc.mil. Retrieved on 2014-04-12.
  2. ^ Joint Worldwide Intelligence Communications System (JWICS) Archived 2015-04-09 at the Wayback Machine. Fas.org. Retrieved on 2014-04-12.
  3. ^ "WikiLeaks: From Wales to a US jail, via Iraq, the story of Bradley Manning". the Guardian. 2011-02-01. Retrieved 2022-02-22.
  4. ^ Kevin Poulsen and Kim Zetter (2010-06-06). "U.S. Intelligence Analyst Arrested in Wikileaks Video Probe". Wired. Retrieved 2010-06-15.
  5. ^ a b c d Cares, J. R. (2017). JWICS Network. In Springer, P. J. Encyclopaedia of Cyber Warfare (pp. 162-163). Santa Barbara, California, ABC-CLIO.
  6. ^ a b c d e f g h i j k l m n o Clarke, R. A., Knake, R. K. (2012) Cyber War: The Next Threat to National Security and What to do About it. New York, United States: HarperCollins.
  7. ^ a b c d e f Salera, B. (2017). Manning, Bradley. In Springer, P. J. Encyclopaedia of Cyber Warfare (pp. 175-177). Santa Barbara, California, ABC-CLIO.
  8. ^ a b c d e f g Ambinder, Marc (2010-11-29). "WikiLeaks: One Analyst, So Many Documents". The Atlantic. Retrieved 2023-08-11.
  9. ^ a b c d Maxwell, L. (2019). Chelsea Manning as Transformative Truth-Teller. In Insurgent Truth: Chelsea Manning and the Politics of Outsider Truth-Telling.(pp. 55-80) : Oxford University Press. doi:10.1093/oso/9780190920029.001.0001
  10. ^ Munro, I. (2019). An interview with Chelsea Manning's lawyer: Nancy Hollander on human rights and the protection of whistleblowers. Organization, 26(2), 276–290. doi:10.1177/1350508418779648
  11. ^ "Chelsea Manning Is Ordered Released From Jail (Published 2020)". 2020-03-12. Retrieved 2023-08-11.
  12. ^ a b c d Brevini, B., Murdock, G. (2013) Following the Money: WikiLeaks and the Political Economy of Disclosure. In Brevini, B., Hintz, A., McCurdy, P. (2013) Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society. (pp. 35-55). London, United Kingdom: Palgrave MacMillan
  13. ^ Moore, M. (2011). The Limits of Transparency. The Political Quarterly., 82(4), 506–508. doi:10.1111/j.1467-923X.2011.02248.x
  14. ^ a b c "Is Wikileaks putting people at risk?". BBC News. 2016-08-23. Retrieved 2023-08-11.
  15. ^ a b c Elliot, C. (2013). WikiLeaks and the Public Interest Dilemma: A View from Inside the Media. In Brevini, B., Hintz, A., McCurdy, P. (2013). Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society. (pp. 35-55). London, United Kingdom: Palgrave MacMillan
  16. ^ a b c "CIA Director Leon Panetta Warns of Possible Cyber-Pearl Harbor". ABC News. Retrieved 2023-08-11.
  17. ^ a b III, William J. Lynn (2010-09-01). "Defending a New Domain". Foreign Affairs. No. September/October 2010. ISSN 0015-7120. Retrieved 2023-08-11.
  18. ^ Shachtman, Noah. "Hackers, Troops Rejoice: Pentagon Lifts Thumb-Drive Ban (Updated)". Wired. ISSN 1059-1028. Retrieved 2023-08-11.
  19. ^ a b Matishak, Martin (2018-11-29). "A decade after Russia hacked the Pentagon, Trump unshackles Cyber Command". POLITICO. Retrieved 2023-08-11.

External links

Read more information:

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada November 2022. Jeong Da-raeInformasi pribadiNama lengkapJeong Da-raeLahir2 Desember 1991 (umur 32)Yeosu, Jeollanam-do, Korea SelatanTinggi173 m (567 ft 7 in)Berat64 kg (141 pon) (141 pon) OlahragaOlahragaRenangStrokGaya dadaKlubJeolla…

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada November 2022. Franca ScagnettiLahir(1924-05-17)17 Mei 1924Roma, ItaliaMeninggal1 November 1999(1999-11-01) (umur 75)Roma, ItaliaPekerjaanPemeranTahun aktif1969-1999 Franca Scagnetti (17 Mei 1924 – 1 November 1999) adalah seorang pemeran film …

Artikel ini membutuhkan rujukan tambahan agar kualitasnya dapat dipastikan. Mohon bantu kami mengembangkan artikel ini dengan cara menambahkan rujukan ke sumber tepercaya. Pernyataan tak bersumber bisa saja dipertentangkan dan dihapus.Cari sumber: Gurat peregangan – berita · surat kabar · buku · cendekiawan · JSTOR Stretch marksInformasi umumNama lainstria, striae distensaeSpesialisasiDermatologi Gurat peregangan (Inggris: stretchmark) adalah penampakan g…

Hiromu Nonaka野中 廣務 Anggota Dewan Perwakilan JepangMasa jabatan8 Agustus 1983 – 10 Oktober 2003 PendahuluShigesaburo MaeoSen'ichi TanigakiPenggantiHideo TanakaDaerah pemilihanKyoto-2 hingga 1993Kyoto-4 dari 1993Kepala Badan Pembangunan OkinawaMasa jabatan14 Januari 1999 – 5 Oktober 1999Perdana MenteriKeizo Obuchi PendahuluKichio InouePenggantiMikio AokiKetua Sekretaris KabinetMasa jabatan5 Oktober 1998 – 30 Juli 1999Perdana MenteriKeizo Obuchi PendahuluKan…

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: BitTorrent – berita · surat kabar · buku · cendekiawan · JSTOR Logo BitTorrent BitTorrent adalah protokol internet untuk berbagi file secara peer-to-peer (P2P) yang memungkinkan pengguna komputer mendistrib…

OneShot Publikasi Windows 9 Desember 2016 (2016-12-09) macOS 31 Mei 2018 (2018-05-31) Linux 24 April 2019 (2019-04-24) Switch, PS4, Xbox One 22 Agustus 2022 (2022-08-22) GenreTeka-tekipetualanganKarakterNiko (en) Bahasa Daftar Inggris, Italia, Jepang, Korea, Portugis Brasil, Prancis, Rusia, Spanyol dan Tionghoa Sederhana 60 Karakteristik teknisPlatformWindows, macOS, Linux dan Nintendo Switch MesinRPG Maker XPModePermainan video pemain tunggal Formatdistribusi digital dan und…

Questa voce sull'argomento psicologia è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Segui i suggerimenti del progetto di riferimento. Un classico esempio di illusione di Ponzo. Le due linee prospettiche nello sfondo (il binario) danno all'immagine una percezione di profondità attraverso una rappresentazione prospettica; in questo caso la linea gialla superiore sembra più lunga di quella inferiore (anche se in realtà hanno la stessa lunghezza); difatt…

Tuiloma Neroni Slade Hakim Mahkamah Pidana InternasionalMasa jabatan2003–2006 Sunting kotak info • L • B Tuiloma Neroni Slade adalah tokoh dari negara Samoa yang dikenal akan kiprahnya sebagai hakim dalam Mahkamah Pidana Internasional. Ia mulai menjabat sebagai hakim dalam mahkamah tersebut pada 2003. Masa jabatannya sebagai hakim berakhir pada 2006.[1] Referensi ^ Who's who: Judges of the International Criminal Court. Mahkamah Pidana Internasional. Diarsipkan dari versi …

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: SMA Negeri 2 Kendal – berita · surat kabar · buku · cendekiawan · JSTOR SMA Negeri 2 KendalInformasiDidirikan1996AkreditasiAJurusan atau peminatanIPA dan IPSRentang kelasX IPA/IPS, XI IPA/IPS, XII IPA/IPSAl…

Bill NyeBill Nye in 2011Lahir27 November 1955 (umur 68)Washington, D.C.Warga negaraAmerika SerikatAlmamaterUniversitas CornellDikenal atasBill Nye the Science GuyKarier ilmiahBidangTeknik mesinInstitusiBoeingUniversitas CornellPlanetary Society William Sanford Nye (lahir 27 November 1955; dikenal sebagai Bill Nye Orang Ilmu Pengetahuan) adalah seorang pelawak, pembawa acara televisi, pendidik ilmu pengetahuan dan insinyur mesin berkewarganegaraan Amerika Serikat. Pranala luar Portal Biograf…

Untuk perusahaan maskapai penerbangan, lihat Canadian North. Kanada UtaraNord du Canada Kawasan Negara Kanada Teritorial Northwest Territories, Nunavut, Yukon Area 3.535.263 km2 (1.364.973 sq mi) [1] Population 113.604 (2016) [1] Density 0,03213 / km² (0 / sq mi) Kanada Utara, didefinisikan secara politik terdiri dari (dari barat ke timur) Yukon, Northwest Territories, dan Nunavut. Kanada Utara (Northern Canada, the North), adalah sebuah kawasan …

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Februari 2023. Dalam sosiologi kejahatan, istilah efikasi kolektif mengacu pada kemampuan komunitas mengontrol perilaku individu dan kelompok dalam komunitas.[1] Kontrol terhadap perilaku masyarakat berakhir pada penduduk komunitas yang menciptakan lingkungan y…

Clare Stewart di festival tahun 2016 Festival Film London BFI (Inggris: BFI London Film Festivalcode: en is deprecated ) adalah sebuah festival film tahunan yang diadakan di Britania Raya, yang diadakan pada paruh kedua Oktober dengan kerjasama dari British Film Institute. Festival tersebut menayangkan lebih dari 300 film, dokumenter dan film pendek dari sekitar 50 negara. Referensi Pranala luar bfi Homepage Diarsipkan 2019-07-31 di Wayback Machine. London Film Festival Homepage Diarsipkan 2016-…

Piala Negara IsraelMulai digelar1928Wilayah IsraelJuara bertahanHapoel Ramat GanTim tersuksesMaccabi Tel Aviv(22 gelar)Situs webSitus resmi Piala Negara Israel 2013–14 Piala Negara Israel adalah kejuaraan nasional sepak bola di Israel. Mulai diselenggarakan sejak 1928, pemenangnya berhak mengikuti Liga Eropa UEFA pada musim berikutnya. Distribusi juara Klub Jumlah gelar Jumlah runner-up Tahun juara Tahun runner-up Maccabi Tel Aviv 22 11 1929, 1930, 1933, 1941, 1946, 1947, 1954, 1955, 1958…

FilsafatPlato, Kant, Nietzsche, Buddha, Kong Hu Cu, Ibnu SinaPlatoKantNietzscheBuddhaKong Hu CuIbnu Sina Cabang Epistemologi Estetika Etika Hukum Logika Metafisika Politik Sosial Tradisi Afrika Analitis Aristoteles Barat Buddha Eksistensialisme Hindu Islam Jainisme Kontinental Kristen Plato Pragmatisme Timur Tiongkok Yahudi Zaman Klasik Pertengahan Modern Kontemporer Kepustakaan Epistemologi Estetika Etika Filsafat politik Logika Metafisika Filsuf Epistemologi Estetika Etika Filsuf politik dan s…

Festival Film Indonesia ke-13Pembukaan Festival Film Indonesia 1982, JakartaTanggal9-14 Agustus 1982TempatJakartaSorotanFilm TerbaikSerangan FajarPenghargaan terbanyakSerangan Fajar (5)Liputan televisiJaringanTVRI ← 1981 Festival Film Indonesia 1983 → Festival Film Indonesia 1982 adalah Festival Film Indonesia ke-XIII yang diadakan di Jakarta pada tanggal 9–14 Agustus 1982. Daftar pemenang dan nominasi Pemenang dituliskan dengan huruf tebal di urutan pertama. Nominasi diu…

Julaftonen av Carl Larsson 1904 Guas atau cat air opak[1] (bahasa Inggris: gouache, Italia guazzo; arti: genangan air) merupakan jenis cat air yang dicampuri selapis warna putih, biasanya diambil dan warna putih seng, litofon atau putih titan.[2] Guas digunakan dalam melukis di warna yang buram, dengan tinta yang dicampur dengan air dan lainnya.[3] Kemudian istilah tersebut juga dipakai untuk menunjuk pada lukisan yang dicat dengan cat guas. Hasil karya lukisan cat air bi…

One of the 12 Tribes of Israel Not to be confused with Kingdom of Judah. This article is about the Hebrew tribe. For the musical band, see Tribe of Judah (band). This article's lead section may be too short to adequately summarize the key points. Please consider expanding the lead to provide an accessible overview of all important aspects of the article. (October 2021) Tribe of JudahMap of the twelve tribes of Israel, before the move of Dan to the North. (The text is partially in German.)Geograp…

Bonggolan yang telah digoreng Bonggolan adalah jajanan berbentuk lonjong yang terbuat dari bahan dasar daging ikan yang dicampur tepung kanji yang ditambah dengan garam dan bawang putih. Jajanan ini berasal dari daerah pesisir Gresik, Jawa Timur. Jajanan ini memiliki tekstur yang kenyal.[1] Sejarah Pada awalnya, sejarah terbentuknya makanan ini sangat sederhana. Bonggolan ditemukan dan juga menjadi makanan khas oleh daerah pesisir utara Kabupaten Gresik, Jawa Timur. Jajanan ini dibuat ka…

Bulbophyllum dryas Klasifikasi ilmiah Kerajaan: Plantae (tanpa takson): Angiospermae (tanpa takson): Monocots Ordo: Asparagales Famili: Orchidaceae Genus: Bulbophyllum Spesies: Bulbophyllum dryas Nama binomial Bulbophyllum dryasRidl. 1915 Bulbophyllum dryas adalah spesies tumbuhan yang tergolong ke dalam famili Orchidaceae. Spesies ini juga merupakan bagian dari ordo Asparagales. Spesies Bulbophyllum dryas sendiri merupakan bagian dari genus Bulbophyllum.[1] Nama ilmiah dari spesies ini …

Kembali kehalaman sebelumnya