Documents Detail NSAs Perfect Citizen Cybersecurity Work

  /     /     /  
Publicated : 22/11/2024   Category : security


Documents Detail NSAs Perfect Citizen Cybersecurity Work


Documents confirm National Security Agencys penetration testing of U.S. critical infrastructure control systems and a related five-year contract with Raytheon, but are heavily redacted.



Military Drones Present And Future: Visual Tour (click image for larger view and for slideshow)
Documents recently obtained by privacy advocacy group the Electronic Privacy Information Center (EPIC) provide new details on a secret and provocatively-named National Security Agency effort to improve cybersecurity at U.S. critical infrastructure sites.
Officials have long warned about vulnerabilities in the U.S. electrical grid and other critical infrastructure facilities, and both the Department of Defense and Department of Homeland Security have programs underway to help secure critical infrastructure networks and systems. The National Security Agency itself has been linked to the Stuxnet attacks on control systems at Irans Natanz nuclear plant.
The
documents
, released pursuant to a Freedom of Information Act (FOIA ) request by EPIC, are heavily censored: More than half of the 188 pages have been deleted for numerous reasons, and others redacted. The remaining pages indicated that NSA contracted with Raytheon in a deal capped at $91 million to help run
Perfect Citizen
, which is in the fourth year of a five-year contract period.
[ Hackers already have infiltrated U.S. networks, say government officials. Read
DOD: Hackers Breached U.S. Critical Infrastructure Control Systems
]
EPIC had sought contracts, memoranda and other records on Perfect Citizen after
The Wall Street Journal

reported
in 2010 that Perfect Citizen would deploy sensors that would be triggered by network activity that suggested an impending attack on critical infrastructure networks and computers.
In an email to
InformationWeek Government
at the time, NSA refuted the reports that NSA would place any sensors on utility company systems, and called Perfect Citizen a research and engineering effort. Although the documents do not mention sensors, they seem to indicate that the project goes far beyond research.
A statement of work included in the documentation details an effort that aims to understand critical infrastructure control systems to enable the government to protect the systems. The documents indicate that NSAs interest in critical infrastructure control systems derives from the fact that the prevention of a loss due to a cyber or physical attack is crucial to the continuity of the [Department of Defense], the [Intelligence Community], and the operation of [signals intelligence] systems.
Perfect Citizen includes the study of interfaces and communication between significant components of specific critical infrastructure control systems; work to discover vulnerabilities of those systems and attached devices; and demonstration of exploits. The project also includes the development of best practices to defend against these vulnerabilities.
Details of labor requirements show a team of 28, including software, hardware and embedded systems engineers; systems administrators; penetration testers; and others experienced in a broad array of technologies. Those technologies and areas of expertise include C, assembly and similar languages; TCP/IPO protocols or SQL programming; hardware testing and lab equipment; and familiarity with broader software and hardware development processes.
Specifically, the penetration tester positions required experience with a number of common penetration testing and other security tools, such as Nmap, Tenable Network Securitys Nessus, dsniff, Libnet, Netcat, and network sniffers and fuzzers.
NSA cited national security as the primary reason for its redactions, noting that some of the redacted information has been classified Top Secret. Its disclosure could reasonably be expected to cause exceptionally grave damage to the national security, NSA said, noting that such classification exempts it from FOIA disclosure. Other information has been redacted for privacy and confidentiality reasons.
According to the documents, the statement of work for Perfect Citizen was issued in September 2009, and the contract was awarded to Raytheon in June 2010. Thus, the project will continue through at least June 2015 if work continues for the full five-year contract.
InformationWeeks 2013
Government IT Innovators program
will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes? The nomination period for 2013 Government IT Innovators closes April 12.

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Documents Detail NSAs Perfect Citizen Cybersecurity Work