Knowledge (XXG)

Perfect Citizen

Source đź“ť

247: 61:
The project is still in an early stage, "but NSA officials have reportedly met with utility executives and politely asked them to cooperate with the surveillance." Although participation is still voluntary, the government has offered incentives such as additional contracts to those who comply.
57:
against government agencies and private companies in critical parts of the U.S. private sector including defense, power plants, transportation, and major internet firms. The program is the successor to a previous surveillance project called "April Strawberry".
187: 43: 318: 308: 191: 313: 284: 151: 71: 303: 83: 30:
on U.S. critical infrastructure. It was originally reported to be a program to develop a system of sensors to detect
277: 246: 27: 20: 156: 35: 102: 74:", has raised privacy concerns as well as concerns over government intervention in the private sector. 53:
The program was originally reported to be designed to monitor for, as well as neutralize and counter,
270: 39: 254: 297: 214: 24: 123: 188:"DailyTech - NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity Savior?" 31: 54: 219: 128: 47: 50:
has received a contract for up to $ 100 million for the initial stage.
38:
computer networks in both the private and public sector through a
152:"U.S. Program to Detect Cyber Attacks on Infrastructure" 258: 124:"Report: NSA initiating program to detect cyberattacks" 253:This United States government–related article is a 215:"White House outlines secret cybersecurity plan" 70:The program, which is described by critics as " 44:Comprehensive National Cybersecurity Initiative 278: 8: 42:system named Einstein. It is funded by the 285: 271: 19:is a program designed in 2010 to perform 95: 181: 179: 177: 175: 173: 117: 115: 113: 111: 7: 243: 241: 213:McCullagh, Declan (March 2, 2010). 103:NSA Denies It Will Spy on Utilities 257:. You can help Knowledge (XXG) by 14: 245: 122:Whitney, Lance (July 8, 2010). 319:United States government stubs 150:Gorman, Siobhan (2010-07-07). 84:Echelon (signals intelligence) 1: 309:Privacy of telecommunications 314:Privacy in the United States 186:Mick, Jason (July 8, 2010). 190:. DailyTech. Archived from 335: 240: 105:, Threat Level, Wired.com 304:National Security Agency 28:National Security Agency 21:vulnerability assessment 157:The Wall Street Journal 36:critical infrastructure 40:network monitoring 266: 265: 326: 287: 280: 273: 249: 242: 232: 231: 229: 227: 210: 204: 203: 201: 199: 183: 168: 167: 165: 164: 147: 141: 140: 138: 136: 119: 106: 100: 334: 333: 329: 328: 327: 325: 324: 323: 294: 293: 292: 291: 238: 236: 235: 225: 223: 212: 211: 207: 197: 195: 194:on 11 July 2010 185: 184: 171: 162: 160: 149: 148: 144: 134: 132: 121: 120: 109: 101: 97: 92: 80: 68: 17:Perfect Citizen 12: 11: 5: 332: 330: 322: 321: 316: 311: 306: 296: 295: 290: 289: 282: 275: 267: 264: 263: 250: 234: 233: 205: 169: 142: 107: 94: 93: 91: 88: 87: 86: 79: 76: 67: 64: 13: 10: 9: 6: 4: 3: 2: 331: 320: 317: 315: 312: 310: 307: 305: 302: 301: 299: 288: 283: 281: 276: 274: 269: 268: 262: 260: 256: 251: 248: 244: 239: 222: 221: 216: 209: 206: 193: 189: 182: 180: 178: 176: 174: 170: 159: 158: 153: 146: 143: 131: 130: 125: 118: 116: 114: 112: 108: 104: 99: 96: 89: 85: 82: 81: 77: 75: 73: 65: 63: 59: 56: 51: 49: 46:and thus far 45: 41: 37: 33: 32:cyber attacks 29: 26: 25:United States 22: 18: 259:expanding it 252: 237: 224:. Retrieved 218: 208: 196:. Retrieved 192:the original 161:. Retrieved 155: 145: 133:. Retrieved 127: 98: 69: 60: 55:cyberattacks 52: 16: 15: 72:Big Brother 66:Controversy 298:Categories 163:2010-07-07 90:References 220:CNET.com 129:CNET.com 78:See also 48:Raytheon 23:by the 226:8 July 198:8 July 135:8 July 255:stub 228:2010 200:2010 137:2010 34:on 300:: 217:. 172:^ 154:. 126:. 110:^ 286:e 279:t 272:v 261:. 230:. 202:. 166:. 139:.

Index

vulnerability assessment
United States
National Security Agency
cyber attacks
critical infrastructure
network monitoring
Comprehensive National Cybersecurity Initiative
Raytheon
cyberattacks
Big Brother
Echelon (signals intelligence)
NSA Denies It Will Spy on Utilities




"Report: NSA initiating program to detect cyberattacks"
CNET.com
"U.S. Program to Detect Cyber Attacks on Infrastructure"
The Wall Street Journal





"DailyTech - NSA's "Perfect Citizen" Program: Big Brother or Cybersecurity Savior?"
the original
"White House outlines secret cybersecurity plan"
CNET.com
Stub icon

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑