Secret Raytheon Military Contract Rolls out Internet Clamp Down

It would rely on a set of sensors deployed in computer networks to spy on the Internet for “attacks” on infrastructure.  The irony is that the only people who have the power and technology to cause a massive attack of the scale it is being promoted, are the very same people who are clamping down on the Internet to establish censorship and control.  The program’s name (Perfect Citizen) could not be more deceiving.

WSJ

The federal government is launching an expansive program dubbed “Perfect Citizen” to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.

The surveillance by the National Security Agency, the government’s chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack, though it wouldn’t persistently monitor the whole system, these people said.

Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million, said a person familiar with the project.

An NSA spokeswoman said the agency had no information to provide on the program. A Raytheon spokesman declined to comment.

Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs, while others say it is an important program to combat an emerging security threat that only the NSA is equipped to provide.

“The overall purpose of the [program] is our Government…feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security,” said one internal Raytheon email, the text of which was seen by The Wall Street Journal. “Perfect Citizen is Big Brother.”

Raytheon declined to comment on this email.

A U.S. military official called the program long overdue and said any intrusion into privacy is no greater than what the public already endures from traffic cameras. It’s a logical extension of the work federal agencies have done in the past to protect physical attacks on critical infrastructure that could sabotage the government or key parts of the country, the official said.

U.S. intelligence officials have grown increasingly alarmed about what they believe to be Chinese and Russian surveillance of computer systems that control the electric grid and other U.S. infrastructure. Officials are unable to describe the full scope of the problem, however, because they have had limited ability to pull together all the private data.

Perfect Citizen will look at large, typically older computer control systems that were often designed without Internet connectivity or security in mind. Many of those systems—which run everything from subway systems to air-traffic control networks—have since been linked to the Internet, making them more efficient but also exposing them to cyber attack.

The goal is to close the “big, glaring holes” in the U.S.’s understanding of the nature of the cyber threat against its infrastructure, said one industry specialist familiar with the program. “We don’t have a dedicated way to understand the problem.”

The information gathered by Perfect Citizen could also have applications beyond the critical infrastructure sector, officials said, serving as a data bank that would also help companies and agencies who call upon NSA for help with investigations of cyber attacks, as Google did when it sustained a major attack late last year.

The U.S. government has for more than a decade claimed a national-security interest in privately owned critical infrastructure that, if attacked, could cause significant damage to the government or the economy. Initially, it established relationships with utility companies so it could, for instance, request that a power company seal a manhole that provides access to a key power line for a government agency.

With the growth in concern about cyber attacks, these relationships began to extend into the electronic arena, and the only U.S. agency equipped to manage electronic assessments of critical-infrastructure vulnerabilities is the NSA, government and industry officials said.

The NSA years ago began a small-scale effort to address this problem code-named April Strawberry, the military official said. The program researched vulnerabilities in computer networks running critical infrastructure and sought ways to close security holes.

That led to initial work on Perfect Citizen, which was a piecemeal effort to forge relationships with some companies, particularly energy companies, whose infrastructure is widely used across the country.

The classified program is now being expanded with funding from the multibillion-dollar Comprehensive National Cybersecurity Initiative, which started at the end of the Bush administration and has been continued by the Obama administration, officials said. With that infusion of money, the NSA is now seeking to map out intrusions into critical infrastructure across the country.

Because the program is still in the early stages, much remains to be worked out, such as which computer control systems will be monitored and how the data will be collected. NSA would likely start with the systems that have the most important security implications if attacked, such as electric, nuclear, and air-traffic-control systems, they said.

Intelligence officials have met with utilities’ CEOs and those discussions convinced them of the gravity of the threat against U.S. infrastructure, an industry specialist said, but the CEOs concluded they needed better threat information and guidance on what to do in the event of a major cyber attack.

Some companies may agree to have the NSA put its own sensors on and others may ask for direction on what sensors to buy and come to an agreement about what data they will then share with the government, industry and government officials said.

While the government can’t force companies to work with it, it can provide incentives to urge them to cooperate, particularly if the government already buys services from that company, officials said.

Raytheon, which has built up a large cyber-security practice through acquisitions in recent years, is expected to subcontract out some of the work to smaller specialty companies, according to a person familiar with the project.

About Luis Miranda
The Real Agenda is an independent publication. It does not take money from Corporations, Foundations or Non-Governmental Organizations. It provides news reports in three languages: English, Spanish and Portuguese to reach a larger group of readers. Our news are not guided by any ideological, political or religious interest, which allows us to keep our integrity towards the readers.

One Response to Secret Raytheon Military Contract Rolls out Internet Clamp Down

  1. Ross Wolf says:

    NSA Illegally Wiretapped Your Phone, Fax and Private Email Communications: Now Your Internet?

    In 2008 Telecoms were granted government immunity after they helped U.S. Government spy on millions of Americans’ electronic communications. Since, Government has not disclosed what happened to NSA’s millions of collected emails, faxes and phone call information that belong to U.S. Citizens? Could those wiretaps perhaps illegal, become a problem for some Americans? Neither Congress nor the courts—determined what NSA electronic surveillance could be used by police or introduced into court by the government to prosecute Citizens.

    In 2004, former Attorney General John Ashcroft asked government prosecutors to review thousands of old intelligence files including wiretaps to retrieve information prosecutors could use in “ordinary” criminal prosecutions. That was shortly after a court case lowered a barrier that prior, blocked prosecutors from using illegal-wire tap evidence in Justice Dept. “Intelligence Files” to prosecute ordinary crimes. It would appear this information, may also be used by government to prosecute civil asset forfeitures.
    See: http://www.securityfocus.com/news/5452

    Considering that court case, it appears NSA can share its electronic-domestic-spying with government contractors and private individuals that have security clearances to facilitate the arrest and forfeiture of Americans’ property—-to keep part of the bounty. Police too easily can take an innocent person’s hastily written email, fax, phone call or web post out of context to allege a crime or violation was committed to cause an arrest or asset forfeiture.

    There are over 200 U.S. laws and violations mentioned in the Civil Asset Forfeiture Reform Act of 2000 and the Patriot Act that can subject property to civil asset forfeiture. Under federal civil forfeiture laws, a person or business need not be charged with a crime for government to forfeit their property. In the U.S., private contractors and their operatives, work so close with police exchanging information, to arrest Americans and or share in the forfeiture of their assets, they appear to merge with police.

    Rep. Henry Hyde’s bill HR 1658 passed, the “Civil Asset Forfeiture Reform Act of 2000” and effectively eliminated the “statue of limitations” for Government Civil Asset Forfeiture. The statute now runs five years from when police allege they “learned” that an asset became subject to forfeiture. With such a weak statute of limitations and the low standard of civil proof needed for government to forfeit property “A preponderance of Evidence”, it is problematic law enforcement and private government contractors will want access to NSA and other government wiretaps perhaps illegal and Citizens’ private information U.S. Government agencies glean monitoring the Internet, to arrest Americans and to seize their homes, inheritances and businesses under Title 18USC and other laws. Of obvious concern, what happens to fair justice in America if police and government contractors become dependent on “Asset Forfeiture” to pay their salaries and operating costs?

    Under the USA Patriot Act, witnesses including government contractors can be kept hidden while being paid part of the assets they cause to be forfeited. The Patriot Act specifically mentions using Title 18USC asset forfeiture laws: those laws include a provision in Rep. Henry Hyde’s 2000 bill HR 1658—for “retroactive civil asset forfeiture” of “assets already subject to government forfeiture”, meaning “property already tainted by crime” provided “the property” was already part of or “later connected” to a criminal investigation in progress” when HR.1658 passed. That can apply to more than two hundred federal laws and violations Government can forfeit property—requiring only “A Preponderance of Civil Evidence” little more than hearsay.