pbs高端访谈:美国会面临“网络珍珠港”事件吗?
时间:2018-12-31 作者:英语课 分类:PBS访谈商业系列
英语课
MARGARET WARNER:We turn to a new cyber campaign against American banking 1 giants and growing worries about what they might foreshadow. It began late last month and continues to this day.
Two more U.S. banks are the latest targets in the spate 2 of cyber-hits on American financial institutions. This week, Capital One and BB&T suffered disruptions on their websites, leaving customers without access to their accounts.
A group calling itself the Qassam Cyber Fighters claimed responsibility and said the attacks are retaliation 3 for an anti-Muslim video. But some U.S. officials, like Connecticut Senator Joe Lieberman, blame the recent uptick of attacks on Iran and its elite 4 security force.
He spoke 5 last month on C-SPAN.
101.jpg
SEN. JOSEPH LIEBERMAN,I-Conn.: I think that this was done by Iran and the Quds Force, which has its own developing cyber-attack capacity, and I believe it was a response to the increasingly strong economic sanctions.
MARGARET WARNER:Also blamed on Iran, recent hits on Saudi Arabia's state oil company, Aramco and Qatar's natural gas producer, RasGas, that disabled 30,000 computers entirely 6.
And Defense 7 Secretary Leon Panetta warned last week that the threat to America's vital infrastructure 8 throughout is rising.
DEFENSE SECRETARY LEON PANETTA: The collective result of these kinds of attacks could be a cyber Pearl Harbor, an attack that would cause physical destruction and the loss of life.
MARGARET WARNER:Iran denied any role. But Panetta said the U.S. military stands ready to respond or even preempt 9 destructive attacks.
In fact, it's been widely reported that the U.S. and Israel disrupted Iran's nuclear program with a computer virus called Stuxnet in 2010.
Meanwhile, big banks who've been hit are anxious about what may lie ahead. This was J.P. Morgan Chase's CEO, Jamie Dimon, last week, at the Council on Foreign Relations in Washington.
JAMIE DIMON, J.P. Morgan Chase: Computers in 10 years are going to be a 100,000 times faster. And so they will be able to do calculations quicker and get through quicker. And we're going to have to meet that in every way, shape or form.
MARGARET WARNER:For now, though, a cybersecurity bill sits stalled in the Senate, with little prospect 10 of action this year.
For more, I'm joined by Michael Leiter, director of the NationalCounterterrorismCenter from 2008 to 2011.
And Rodney Joffe, senior vice 11 president at Neustar, an information services company that provides cybersecurity for private and government clients. In 2009, he designed a scenario 12 for a government exercise in how to defend against cyber attacks.
Welcome to you both to this important topic.
Michael Leiter, begin by describing what these hackers 13 did that could temporarily disrupt these Web sites.
MICHAEL LEITER,former director of NationalCounterterrorismCenter: In this case, what they did was a disrupted denial of service attack.
And in layman's terms, all that means is taking computers away from those banks and then flooding effectively the Web sites of those banks, so normal customers in the bank can't actually communicate, transfer funds and the like.
MARGARET WARNER:And is there something that makes banks particularly vulnerable to cyber-hacking?
MICHAEL LEITER:Banks actually tend to be one of those industries that is prepared for cyber-hacking probably better than any other industry in the United States, but we see here that they are still susceptible 14.
And I think it's really two things. One, they represent American power, in the same way that the terrorist attack, the WorldTradeCenter on 9/11, they represented American economic power.
The second is again they are so reliant, increasingly so every day, on their websites for core aspects of the business.
You and I both check our accounts, transfer funds. And cyber-activists or cyber-hackers know that this is the case.
MARGARET WARNER:So what is the danger?
Well, first of all, Mr. Joffe, the banks have tried to defend themselves, yet they were really outgunned in this case. What does that tell you about the growing level of sophistication of these hackers?
RODNEY JOFFE, Neustar, Inc.: As Michael has said, the banks really are the best prepared. That's where the money is.
And so they have been working for many years. And as a sector 15, they're very well prepared. What is different about is that the people behind the attack, whoever that may be, were very, very knowledgeable 16 about how the Internet works.
And so what they have able to do is on an almost day-by-day basis overcome the defenses and sort of take an extra step forward. And so even though there was warning -- in fact, almost all of the banks have had days or weeks of warning...
MARGARET WARNER:They announced, it, right?
RODNEY JOFFE:They announced it in a public post. Even though that was in place, it was very difficult for the banks to defend themselves.
MARGARET WARNER:So, what do you think is the danger of a more sophisticated, more broadly-based attack on the financial system that really could disrupt or disable significant portions of our financial network?
RODNEY JOFFE:So, there is a significant threat, not just against the financial sector.
But one of the problems is that there's a great teaching moment going on, so that not only people who are trying to attack the financial infrastructure, but trying to attack other parts of U.S. and, in fact, global critical infrastructure, are now learning about a mechanism 17 that actually overcomes some of the barriers that have been in place from the beginning.
There's a fundamental issue with the protocols 18 that actually makes this happen.
MARGARET WARNER:Is that the case as you see it, that with every attack they get better at it, whoever is doing this?
MICHAEL LEITER:They do get better. We get better at defending, but they're moving faster than we are in most cases.
We really see three types of threats. We see the disruption threat, and that's what we saw with these banks. We see all the time the theft threat, organizations and companies that have been penetrated 19 and their proprietary 20 information is stolen. And, finally, we see the most dangerous, the destructive threat.
And that's what we saw in the case of Aramco, the Saudi oil company.
MARGARET WARNER:Meaning they went in and actually were able to permanently 21 destroy data.
MICHAEL LEITER:That's exactly right, and going in, penetrating 22 those networks and erasing 23 files, and in this case ending up with a burning U.S. flag in the place of the files that actually make the computers function.
MARGARET WARNER:Isn't there also a danger here, a threat of just having the American public lose confidence in the security of their money in a bank, let's say, and in doing business with banks online, I mean, that could be in and of itself destructive?
RODNEY JOFFE:So, in reality, that's probably the biggest challenge.
In the current attacks, there is some financial impact to the banks, but we don't have any evidence that we have seen so far of money being stolen.
But what will happen over time is that the public will begin to lose confidence. If you think about it as an individual, you have banking to do towards the end of the month. If you're unable to get into your bank account over a period of a day or two, you start to worry about the stability of the entire banking infrastructure, which is obviously a trust issue globally.
MARGARET WARNER:Right. Your mortgage payment is due, and you are not going to be able to have it paid.
RODNEY JOFFE:That's all you care about.
MARGARET WARNER:So, which of America's adversaries 24 out there, Michael Leiter, have the technological 25 know-how 26 or on the verge 27 of it of being able to mount a systemic attack? Is it countries like Russia, China, Iran? Is it criminal elements? Is it jihadis? Who?
MICHAEL LEITER:I will start with ones who are actually not that great, and that's terrorist groups.
Although they have some capability 28, they're not the strongest in this regard. The next is organized crime. And organized crime largely out of Russia has really incredible sophistication. And that then links to the state threats. And by far, the most able in that regard are China, which has been identified that has a serious national security policy of using cyberterrorism or cybertheft, and Russia.
The other issue we face is that those hackers are also being rented out by states and by others. So we have an alignment 29 of interests here among some states and some organized criminals, which makes this threat that much more difficult to defeat.
MARGARET WARNER:And you didn't mention Iran.
MICHAEL LEITER:I didn't mention Iran, and I should have. So thank you.
The CEO of PNC Bank, one of those banks that was attacked over the past couple of weeks, blamed hackers in Iran for this most recent attack. And it's been widely, widely reported that the attacks did emanate 30 from Iran. Whether the government was involved, it's hard to know.
MARGARET WARNER:And before we go, what more should be being done either by companies or by the government that isn't being done now to guard against this?
RODNEY JOFFE:So I think that one of the biggest problems is attribution, the struggle we're having now in terms of who's behind it.
It's important to know where it's coming from, because then you either provide diplomatic pressure to try and alleviate 31 the attacks. What Michael said about the most dangerous groups, which is criminals and their nation state, the line is very blurred 32.
One of the biggest problems is we can't tell whether we're dealing 33 with a nation state issue or a criminal issue, and most times they work together.
MICHAEL LEITER:None of this is going to be stopped by building firewalls.
We are going to have to produce a system that works between the government and the private sector and within industries which is agile 34, so people can identify these threats very, very rapidly, respond operationally, and reduce the threat. And we absolutely are going to have to protect proprietary information, which is being stolen in massive and historic amounts.
MARGARET WARNER:But that means that companies have to be willing to share the information.
RODNEY JOFFE:Really important, the sharing of information between companies and in the private sector and in the public sector critical.
MARGARET WARNER:And that's of course one of the big contentious 35 issues on the Hill.
Well, Rodney Joffe and Michael Leiter, thank you.
RODNEY JOFFE:Thank you.
MICHAEL LEITER:Thank you.
n.银行业,银行学,金融业
- John is launching his son on a career in banking.约翰打算让儿子在银行界谋一个新职位。
- He possesses an extensive knowledge of banking.他具有广博的银行业务知识。
n.泛滥,洪水,突然的一阵
- Police are investigating a spate of burglaries in the area.警察正在调查这一地区发生的大量盗窃案。
- Refugees crossed the border in full spate.难民大量地越过了边境。
n.报复,反击
- retaliation against UN workers 对联合国工作人员的报复
- He never said a single word in retaliation. 他从未说过一句反击的话。 来自《简明英汉词典》
n.精英阶层;实力集团;adj.杰出的,卓越的
- The power elite inside the government is controlling foreign policy.政府内部的一群握有实权的精英控制着对外政策。
- We have a political elite in this country.我们国家有一群政治精英。
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说
- They sourced the spoke nuts from our company.他们的轮辐螺帽是从我们公司获得的。
- The spokes of a wheel are the bars that connect the outer ring to the centre.辐条是轮子上连接外圈与中心的条棒。
ad.全部地,完整地;完全地,彻底地
- The fire was entirely caused by their neglect of duty. 那场火灾完全是由于他们失职而引起的。
- His life was entirely given up to the educational work. 他的一生统统献给了教育工作。
n.防御,保卫;[pl.]防务工事;辩护,答辩
- The accused has the right to defense.被告人有权获得辩护。
- The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
n.下部构造,下部组织,基础结构,基础设施
- We should step up the development of infrastructure for research.加强科学基础设施建设。
- We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
v.先发制人;先取
- We arrived early at the theatre so as to preempt the front seats.我们早早来到剧院,以便捷足先登占到前排座位。
- He pre-empted any decision to sack him.他预先阻止了所有解雇他的决定。
n.前景,前途;景色,视野
- This state of things holds out a cheerful prospect.事态呈现出可喜的前景。
- The prospect became more evident.前景变得更加明朗了。
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的
- He guarded himself against vice.他避免染上坏习惯。
- They are sunk in the depth of vice.他们堕入了罪恶的深渊。
n.剧本,脚本;概要
- But the birth scenario is not completely accurate.然而分娩脚本并非完全准确的。
- This is a totally different scenario.这是完全不同的剧本。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
- They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
- Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.过敏的,敏感的;易动感情的,易受感动的
- Children are more susceptible than adults.孩子比成人易受感动。
- We are all susceptible to advertising.我们都易受广告的影响。
n.部门,部分;防御地段,防区;扇形
- The export sector will aid the economic recovery. 出口产业将促进经济复苏。
- The enemy have attacked the British sector.敌人已进攻英国防区。
adj.知识渊博的;有见识的
- He's quite knowledgeable about the theatre.他对戏剧很有心得。
- He made some knowledgeable remarks at the meeting.他在会上的发言颇有见地。
n.机械装置;机构,结构
- The bones and muscles are parts of the mechanism of the body.骨骼和肌肉是人体的组成部件。
- The mechanism of the machine is very complicated.这台机器的结构是非常复杂的。
n.礼仪( protocol的名词复数 );(外交条约的)草案;(数据传递的)协议;科学实验报告(或计划)
- There are also protocols on the testing of nuclear weapons. 也有关于核武器试验的协议。 来自辞典例句
- Hardware components and software design of network transport protocols are separately introduced. 介绍系统硬件组成及网络传输协议的软件设计。 来自互联网
n.所有权,所有的;独占的;业主
- We had to take action to protect the proprietary technology.我们必须采取措施保护专利技术。
- Proprietary right is the foundation of jus rerem.所有权是物权法之根基。
adv.永恒地,永久地,固定不变地
- The accident left him permanently scarred.那次事故给他留下了永久的伤疤。
- The ship is now permanently moored on the Thames in London.该船现在永久地停泊在伦敦泰晤士河边。
adj.(声音)响亮的,尖锐的adj.(气味)刺激的adj.(思想)敏锐的,有洞察力的
- He had an extraordinarily penetrating gaze. 他的目光有股异乎寻常的洞察力。
- He examined the man with a penetrating gaze. 他以锐利的目光仔细观察了那个人。
v.擦掉( erase的现在分词 );抹去;清除
- He was like a sponge, erasing the past, soaking up the future. 他象一块海绵,挤出过去,吸进未来。 来自辞典例句
- Suddenly, fear overtook longing, erasing memories. 突然,恐惧淹没了渴望,泯灭了回忆。 来自辞典例句
n.对手,敌手( adversary的名词复数 )
- That would cause potential adversaries to recoil from a challenge. 这会迫使潜在的敌人在挑战面前退缩。 来自辞典例句
- Every adversaries are more comfortable with a predictable, coherent America. 就连敌人也会因有可以预料的,始终一致的美国而感到舒服得多。 来自辞典例句
adj.技术的;工艺的
- A successful company must keep up with the pace of technological change.一家成功的公司必须得跟上技术变革的步伐。
- Today,the pace of life is increasing with technological advancements.当今, 随着科技进步,生活节奏不断增快。
n.知识;技术;诀窍
- He hasn't got the know-how to run a farm.他没有经营农场的专业知识。
- I don't have much know-how about engines.发动机方面的技术知识我知之甚少。
n.边,边缘;v.接近,濒临
- The country's economy is on the verge of collapse.国家的经济已到了崩溃的边缘。
- She was on the verge of bursting into tears.她快要哭出来了。
n.能力;才能;(pl)可发展的能力或特性等
- She has the capability to become a very fine actress.她有潜力成为杰出演员。
- Organizing a whole department is beyond his capability.组织整个部门是他能力以外的事。
n.队列;结盟,联合
- The church should have no political alignment.教会不应与政治结盟。
- Britain formed a close alignment with Egypt in the last century.英国在上个世纪与埃及结成了紧密的联盟。
v.发自,来自,出自
- Waves emanate from the same atom source.波是由同一原子辐射的。
- These chemicals can emanate certain poisonous gases.这些化学药品会散发出某些有毒的气味。
v.减轻,缓和,缓解(痛苦等)
- The doctor gave her an injection to alleviate the pain.医生给她注射以减轻疼痛。
- Nothing could alleviate his distress.什么都不能减轻他的痛苦。
v.(使)变模糊( blur的过去式和过去分词 );(使)难以区分;模模糊糊;迷离
- She suffered from dizziness and blurred vision. 她饱受头晕目眩之苦。
- Their lazy, blurred voices fell pleasantly on his ears. 他们那种慢吞吞、含糊不清的声音在他听起来却很悦耳。 来自《简明英汉词典》
n.经商方法,待人态度
- This store has an excellent reputation for fair dealing.该商店因买卖公道而享有极高的声誉。
- His fair dealing earned our confidence.他的诚实的行为获得我们的信任。
adj.好辩的,善争吵的
- She was really not of the contentious fighting sort.她委实不是好吵好闹的人。
- Since then they have tended to steer clear of contentious issues.从那时起,他们总想方设法避开有争议的问题。
标签:
pbs