NSA to probe public firms for security holes

Powered by SC Magazine
 

Asks companies to accept “Big Brother” monitoring equipment.

The US National Security Agency (NSA) is to start monitoring the networks of public companies for security holes as part of 'Project Citizen,' an early warning system against online attack.

The NSA is asking for companies to install network monitoring equipment that would look for suspicious activity online.

The first stage of the program will initially focus on legacy systems in the power and nuclear industries and the work has been outsourced to Raytheon in a US$100m contract, according to an email leaked to the Wall Street Journal.

"The overall purpose of the [program] is our Government...feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security," said the Raytheon email.

"Perfect Citizen is Big Brother."

According to officials the NSA will not force companies to take part in the project, but it can offer incentives, particularly if the company is a beneficiary of government contracts. Raytheon may also be looking for partners to carry out the work according to the newspaper.

Previous attempts by the NSA to introduce monitoring equipment were revealed by AT&T whistle-blower Mark Klein and have since been ruled to be illegal. Analyst house Gartner has also warned of the dangers of such monitoring equipment.

Copyright ©v3.co.uk


NSA to probe public firms for security holes
 
 
 
Top Stories
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Images: the next frontier in data analytics?
Barclay’s global data chief says we’re still at the starting line.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 417

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  55%
 
No
  45%
TOTAL VOTES: 196

Vote