247:
61:
The project is still in an early stage, "but NSA officials have reportedly met with utility executives and politely asked them to cooperate with the surveillance." Although participation is still voluntary, the government has offered incentives such as additional contracts to those who comply.
57:
against government agencies and private companies in critical parts of the U.S. private sector including defense, power plants, transportation, and major internet firms. The program is the successor to a previous surveillance project called "April
Strawberry".
187:
43:
318:
308:
191:
313:
284:
151:
71:
303:
83:
30:
on U.S. critical infrastructure. It was originally reported to be a program to develop a system of sensors to detect
277:
246:
27:
20:
156:
35:
102:
74:", has raised privacy concerns as well as concerns over government intervention in the private sector.
53:
The program was originally reported to be designed to monitor for, as well as neutralize and counter,
270:
39:
254:
297:
214:
24:
123:
188:"DailyTech - NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity Savior?"
31:
54:
219:
128:
47:
50:
has received a contract for up to $ 100 million for the initial stage.
38:
computer networks in both the private and public sector through a
152:"U.S. Program to Detect Cyber Attacks on Infrastructure"
258:
124:"Report: NSA initiating program to detect cyberattacks"
253:This United States government–related article is a
215:"White House outlines secret cybersecurity plan"
70:The program, which is described by critics as "
44:Comprehensive National Cybersecurity Initiative
278:
8:
42:system named Einstein. It is funded by the
285:
271:
19:is a program designed in 2010 to perform
95:
181:
179:
177:
175:
173:
117:
115:
113:
111:
7:
243:
241:
213:McCullagh, Declan (March 2, 2010).
103:NSA Denies It Will Spy on Utilities
257:. You can help Knowledge (XXG) by
14:
245:
122:Whitney, Lance (July 8, 2010).
319:United States government stubs
150:Gorman, Siobhan (2010-07-07).
84:Echelon (signals intelligence)
1:
309:Privacy of telecommunications
314:Privacy in the United States
186:Mick, Jason (July 8, 2010).
190:. DailyTech. Archived from
335:
240:
105:, Threat Level, Wired.com
304:National Security Agency
28:National Security Agency
21:vulnerability assessment
157:The Wall Street Journal
36:critical infrastructure
40:network monitoring
266:
265:
326:
287:
280:
273:
249:
242:
232:
231:
229:
227:
210:
204:
203:
201:
199:
183:
168:
167:
165:
164:
147:
141:
140:
138:
136:
119:
106:
100:
334:
333:
329:
328:
327:
325:
324:
323:
294:
293:
292:
291:
238:
236:
235:
225:
223:
212:
211:
207:
197:
195:
194:on 11 July 2010
185:
184:
171:
162:
160:
149:
148:
144:
134:
132:
121:
120:
109:
101:
97:
92:
80:
68:
17:Perfect Citizen
12:
11:
5:
332:
330:
322:
321:
316:
311:
306:
296:
295:
290:
289:
282:
275:
267:
264:
263:
250:
234:
233:
205:
169:
142:
107:
94:
93:
91:
88:
87:
86:
79:
76:
67:
64:
13:
10:
9:
6:
4:
3:
2:
331:
320:
317:
315:
312:
310:
307:
305:
302:
301:
299:
288:
283:
281:
276:
274:
269:
268:
262:
260:
256:
251:
248:
244:
239:
222:
221:
216:
209:
206:
193:
189:
182:
180:
178:
176:
174:
170:
159:
158:
153:
146:
143:
131:
130:
125:
118:
116:
114:
112:
108:
104:
99:
96:
89:
85:
82:
81:
77:
75:
73:
65:
63:
59:
56:
51:
49:
46:and thus far
45:
41:
37:
33:
32:cyber attacks
29:
26:
25:United States
22:
18:
259:expanding it
252:
237:
224:. Retrieved
218:
208:
196:. Retrieved
192:the original
161:. Retrieved
155:
145:
133:. Retrieved
127:
98:
69:
60:
55:cyberattacks
52:
16:
15:
72:Big Brother
66:Controversy
298:Categories
163:2010-07-07
90:References
220:CNET.com
129:CNET.com
78:See also
48:Raytheon
23:by the
226:8 July
198:8 July
135:8 July
255:stub
228:2010
200:2010
137:2010
34:on
300::
217:.
172:^
154:.
126:.
110:^
286:e
279:t
272:v
261:.
230:.
202:.
166:.
139:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.