Perfect Citizen

Perfect Citizen is a program to perform vulnerability assessment by the United States National Security Agency on U.S. critical infrastructure.[1] It was originally reported to be a program to develop a system of sensors to detect cyber attacks on critical infrastructure computer networks in both the private and public sector through a network monitoring system named Einstein.[2][3] It is funded by the Comprehensive National Cybersecurity Initiative and thus far Raytheon has received a contract for up to $100 million for the initial stage.[2]

The program was originally reported to be designed to monitor for, as well as neutralize and counter, cyberattacks against government agencies and private companies in critical parts of the U.S. private sector including defense, power plants, transportation, and major internet firms.[2][4] The program is the successor to a previous surveillance project called "April Strawberry".[4]

The project is still in an early stage, "but NSA officials have reportedly met with utility executives and politely asked them to cooperate with the surveillance."[4] Although participation is still voluntary, the government has offered incentives such as additional contracts to those who comply.[2][4]

Controversy

The program, which is described by critics as "Big Brother", has raised privacy concerns as well as concerns over government intervention in the private sector.[4][5]

See also

References

  1. NSA Denies It Will Spy on Utilities, Threat Level, Wired.com
  2. Whitney, Lance (July 8, 2010). "Report: NSA initiating program to detect cyberattacks". CNET.com. Retrieved 8 July 2010.
  3. Gorman, Siobhan (2010-07-07). "U.S. Program to Detect Cyber Attacks on Infrastructure". The Wall Street Journal. Retrieved 2010-07-07.
  4. Mick, Jason (July 8, 2010). "DailyTech - NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity Savior?". DailyTech. Archived from the original on 11 July 2010. Retrieved 8 July 2010.
  5. McCullagh, Declan (March 2, 2010). "White House outlines secret cybersecurity plan". CNET.com. Retrieved 8 July 2010.


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.