Read the Original Article at http://www.informationweek.com/news/showArticle.jhtml?articleID=240145962
Officials have long warned about vulnerabilities in the U.S. electrical grid and other critical infrastructure facilities, and both the Department of Defense and Department of Homeland Security have programs underway to help secure critical infrastructure networks and systems. The National Security Agency itself has been linked to the Stuxnet attacks on control systems at Iran's Natanz nuclear plant.
The documents, released pursuant to a Freedom of Information Act (FOIA ) request by EPIC, are heavily censored: More than half of the 188 pages have been deleted for numerous reasons, and others redacted. The remaining pages indicated that NSA contracted with Raytheon in a deal capped at $91 million to help run Perfect Citizen, which is in the fourth year of a five-year contract period.
[ Hackers already have infiltrated U.S. networks, say government officials. Read DOD: Hackers Breached U.S. Critical Infrastructure Control Systems ]
EPIC had sought contracts, memoranda and other records on Perfect Citizen after The Wall Street Journal reported in 2010 that Perfect Citizen would deploy sensors that would be triggered by network activity that suggested an impending attack on critical infrastructure networks and computers.
In an email to InformationWeek Government at the time, NSA refuted the reports that NSA would place any sensors on utility company systems, and called Perfect Citizen a "research and engineering effort." Although the documents do not mention sensors, they seem to indicate that the project goes far beyond research.
A statement of work included in the documentation details an effort that aims to understand critical infrastructure control systems to "enable the government to protect the systems." The documents indicate that NSA's interest in critical infrastructure control systems derives from the fact that "the prevention of a loss due to a cyber or physical attack is crucial to the continuity of the [Department of Defense], the [Intelligence Community], and the operation of [signals intelligence] systems."
Perfect Citizen includes the study of "interfaces and communication between significant components" of specific critical infrastructure control systems; work to discover vulnerabilities of those systems and attached devices; and demonstration of exploits. The project also includes the development of best practices to defend against these vulnerabilities.
Details of labor requirements show a team of 28, including software, hardware and embedded systems engineers; systems administrators; penetration testers; and others experienced in a broad array of technologies. Those technologies and areas of expertise include C, assembly and similar languages; TCP/IPO protocols or SQL programming; hardware testing and lab equipment; and familiarity with broader software and hardware development processes.
Specifically, the penetration tester positions required experience with a number of common penetration testing and other security tools, such as Nmap, Tenable Network Security's Nessus, dsniff, Libnet, Netcat, and network sniffers and fuzzers.
NSA cited national security as the primary reason for its redactions, noting that some of the redacted information has been classified Top Secret. "Its disclosure could reasonably be expected to cause exceptionally grave damage to the national security," NSA said, noting that such classification exempts it from FOIA disclosure. Other information has been redacted for privacy and confidentiality reasons.
According to the documents, the statement of work for Perfect Citizen was issued in September 2009, and the contract was awarded to Raytheon in June 2010. Thus, the project will continue through at least June 2015 if work continues for the full five-year contract.
InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes? The nomination period for 2013 Government IT Innovators closes April 12.