-
(单词翻译:双击或拖选)
MARGARET WARNER:We turn to a new cyber campaign against American banking1 giants and growing worries about what they might foreshadow. It began late last month and continues to this day.
Two more U.S. banks are the latest targets in the spate2 of cyber-hits on American financial institutions. This week, Capital One and BB&T suffered disruptions on their websites, leaving customers without access to their accounts.
A group calling itself the Qassam Cyber Fighters claimed responsibility and said the attacks are retaliation3 for an anti-Muslim video. But some U.S. officials, like Connecticut Senator Joe Lieberman, blame the recent uptick of attacks on Iran and its elite4 security force.
101.jpg
SEN. JOSEPH LIEBERMAN,I-Conn.: I think that this was done by Iran and the Quds Force, which has its own developing cyber-attack capacity, and I believe it was a response to the increasingly strong economic sanctions.
MARGARET WARNER:Also blamed on Iran, recent hits on Saudi Arabia's state oil company, Aramco and Qatar's natural gas producer, RasGas, that disabled 30,000 computers entirely6.
And Defense7 Secretary Leon Panetta warned last week that the threat to America's vital infrastructure8 throughout is rising.
DEFENSE SECRETARY LEON PANETTA: The collective result of these kinds of attacks could be a cyber Pearl Harbor, an attack that would cause physical destruction and the loss of life.
MARGARET WARNER:Iran denied any role. But Panetta said the U.S. military stands ready to respond or even preempt9 destructive attacks.
In fact, it's been widely reported that the U.S. and Israel disrupted Iran's nuclear program with a computer virus called Stuxnet in 2010.
Meanwhile, big banks who've been hit are anxious about what may lie ahead. This was J.P. Morgan Chase's CEO, Jamie Dimon, last week, at the Council on Foreign Relations in Washington.
JAMIE DIMON, J.P. Morgan Chase: Computers in 10 years are going to be a 100,000 times faster. And so they will be able to do calculations quicker and get through quicker. And we're going to have to meet that in every way, shape or form.
MARGARET WARNER:For now, though, a cybersecurity bill sits stalled in the Senate, with little prospect10 of action this year.
For more, I'm joined by Michael Leiter, director of the NationalCounterterrorismCenter from 2008 to 2011.
And Rodney Joffe, senior vice11 president at Neustar, an information services company that provides cybersecurity for private and government clients. In 2009, he designed a scenario12 for a government exercise in how to defend against cyber attacks.
Welcome to you both to this important topic.
Michael Leiter, begin by describing what these hackers13 did that could temporarily disrupt these Web sites.
MICHAEL LEITER,former director of NationalCounterterrorismCenter: In this case, what they did was a disrupted denial of service attack.
And in layman's terms, all that means is taking computers away from those banks and then flooding effectively the Web sites of those banks, so normal customers in the bank can't actually communicate, transfer funds and the like.
MARGARET WARNER:And is there something that makes banks particularly vulnerable to cyber-hacking?
MICHAEL LEITER:Banks actually tend to be one of those industries that is prepared for cyber-hacking probably better than any other industry in the United States, but we see here that they are still susceptible14.
And I think it's really two things. One, they represent American power, in the same way that the terrorist attack, the WorldTradeCenter on 9/11, they represented American economic power.
The second is again they are so reliant, increasingly so every day, on their websites for core aspects of the business.
You and I both check our accounts, transfer funds. And cyber-activists or cyber-hackers know that this is the case.
MARGARET WARNER:So what is the danger?
Well, first of all, Mr. Joffe, the banks have tried to defend themselves, yet they were really outgunned in this case. What does that tell you about the growing level of sophistication of these hackers?
RODNEY JOFFE, Neustar, Inc.: As Michael has said, the banks really are the best prepared. That's where the money is.
And so they have been working for many years. And as a sector15, they're very well prepared. What is different about is that the people behind the attack, whoever that may be, were very, very knowledgeable16 about how the Internet works.
And so what they have able to do is on an almost day-by-day basis overcome the defenses and sort of take an extra step forward. And so even though there was warning -- in fact, almost all of the banks have had days or weeks of warning...
MARGARET WARNER:They announced, it, right?
RODNEY JOFFE:They announced it in a public post. Even though that was in place, it was very difficult for the banks to defend themselves.
MARGARET WARNER:So, what do you think is the danger of a more sophisticated, more broadly-based attack on the financial system that really could disrupt or disable significant portions of our financial network?
RODNEY JOFFE:So, there is a significant threat, not just against the financial sector.
But one of the problems is that there's a great teaching moment going on, so that not only people who are trying to attack the financial infrastructure, but trying to attack other parts of U.S. and, in fact, global critical infrastructure, are now learning about a mechanism17 that actually overcomes some of the barriers that have been in place from the beginning.
MARGARET WARNER:Is that the case as you see it, that with every attack they get better at it, whoever is doing this?
MICHAEL LEITER:They do get better. We get better at defending, but they're moving faster than we are in most cases.
We really see three types of threats. We see the disruption threat, and that's what we saw with these banks. We see all the time the theft threat, organizations and companies that have been penetrated19 and their proprietary20 information is stolen. And, finally, we see the most dangerous, the destructive threat.
And that's what we saw in the case of Aramco, the Saudi oil company.
MARGARET WARNER:Meaning they went in and actually were able to permanently21 destroy data.
MICHAEL LEITER:That's exactly right, and going in, penetrating22 those networks and erasing23 files, and in this case ending up with a burning U.S. flag in the place of the files that actually make the computers function.
MARGARET WARNER:Isn't there also a danger here, a threat of just having the American public lose confidence in the security of their money in a bank, let's say, and in doing business with banks online, I mean, that could be in and of itself destructive?
RODNEY JOFFE:So, in reality, that's probably the biggest challenge.
In the current attacks, there is some financial impact to the banks, but we don't have any evidence that we have seen so far of money being stolen.
But what will happen over time is that the public will begin to lose confidence. If you think about it as an individual, you have banking to do towards the end of the month. If you're unable to get into your bank account over a period of a day or two, you start to worry about the stability of the entire banking infrastructure, which is obviously a trust issue globally.
MARGARET WARNER:Right. Your mortgage payment is due, and you are not going to be able to have it paid.
RODNEY JOFFE:That's all you care about.
MARGARET WARNER:So, which of America's adversaries24 out there, Michael Leiter, have the technological25 know-how26 or on the verge27 of it of being able to mount a systemic attack? Is it countries like Russia, China, Iran? Is it criminal elements? Is it jihadis? Who?
MICHAEL LEITER:I will start with ones who are actually not that great, and that's terrorist groups.
Although they have some capability28, they're not the strongest in this regard. The next is organized crime. And organized crime largely out of Russia has really incredible sophistication. And that then links to the state threats. And by far, the most able in that regard are China, which has been identified that has a serious national security policy of using cyberterrorism or cybertheft, and Russia.
The other issue we face is that those hackers are also being rented out by states and by others. So we have an alignment29 of interests here among some states and some organized criminals, which makes this threat that much more difficult to defeat.
MARGARET WARNER:And you didn't mention Iran.
MICHAEL LEITER:I didn't mention Iran, and I should have. So thank you.
The CEO of PNC Bank, one of those banks that was attacked over the past couple of weeks, blamed hackers in Iran for this most recent attack. And it's been widely, widely reported that the attacks did emanate30 from Iran. Whether the government was involved, it's hard to know.
MARGARET WARNER:And before we go, what more should be being done either by companies or by the government that isn't being done now to guard against this?
RODNEY JOFFE:So I think that one of the biggest problems is attribution, the struggle we're having now in terms of who's behind it.
It's important to know where it's coming from, because then you either provide diplomatic pressure to try and alleviate31 the attacks. What Michael said about the most dangerous groups, which is criminals and their nation state, the line is very blurred32.
One of the biggest problems is we can't tell whether we're dealing33 with a nation state issue or a criminal issue, and most times they work together.
MICHAEL LEITER:None of this is going to be stopped by building firewalls.
We are going to have to produce a system that works between the government and the private sector and within industries which is agile34, so people can identify these threats very, very rapidly, respond operationally, and reduce the threat. And we absolutely are going to have to protect proprietary information, which is being stolen in massive and historic amounts.
MARGARET WARNER:But that means that companies have to be willing to share the information.
RODNEY JOFFE:Really important, the sharing of information between companies and in the private sector and in the public sector critical.
MARGARET WARNER:And that's of course one of the big contentious35 issues on the Hill.
Well, Rodney Joffe and Michael Leiter, thank you.
RODNEY JOFFE:Thank you.
MICHAEL LEITER:Thank you.
点击收听单词发音
1 banking | |
n.银行业,银行学,金融业 | |
参考例句: |
|
|
2 spate | |
n.泛滥,洪水,突然的一阵 | |
参考例句: |
|
|
3 retaliation | |
n.报复,反击 | |
参考例句: |
|
|
4 elite | |
n.精英阶层;实力集团;adj.杰出的,卓越的 | |
参考例句: |
|
|
5 spoke | |
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说 | |
参考例句: |
|
|
6 entirely | |
ad.全部地,完整地;完全地,彻底地 | |
参考例句: |
|
|
7 defense | |
n.防御,保卫;[pl.]防务工事;辩护,答辩 | |
参考例句: |
|
|
8 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
9 preempt | |
v.先发制人;先取 | |
参考例句: |
|
|
10 prospect | |
n.前景,前途;景色,视野 | |
参考例句: |
|
|
11 vice | |
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的 | |
参考例句: |
|
|
12 scenario | |
n.剧本,脚本;概要 | |
参考例句: |
|
|
13 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
14 susceptible | |
adj.过敏的,敏感的;易动感情的,易受感动的 | |
参考例句: |
|
|
15 sector | |
n.部门,部分;防御地段,防区;扇形 | |
参考例句: |
|
|
16 knowledgeable | |
adj.知识渊博的;有见识的 | |
参考例句: |
|
|
17 mechanism | |
n.机械装置;机构,结构 | |
参考例句: |
|
|
18 protocols | |
n.礼仪( protocol的名词复数 );(外交条约的)草案;(数据传递的)协议;科学实验报告(或计划) | |
参考例句: |
|
|
19 penetrated | |
adj. 击穿的,鞭辟入里的 动词penetrate的过去式和过去分词形式 | |
参考例句: |
|
|
20 proprietary | |
n.所有权,所有的;独占的;业主 | |
参考例句: |
|
|
21 permanently | |
adv.永恒地,永久地,固定不变地 | |
参考例句: |
|
|
22 penetrating | |
adj.(声音)响亮的,尖锐的adj.(气味)刺激的adj.(思想)敏锐的,有洞察力的 | |
参考例句: |
|
|
23 erasing | |
v.擦掉( erase的现在分词 );抹去;清除 | |
参考例句: |
|
|
24 adversaries | |
n.对手,敌手( adversary的名词复数 ) | |
参考例句: |
|
|
25 technological | |
adj.技术的;工艺的 | |
参考例句: |
|
|
26 know-how | |
n.知识;技术;诀窍 | |
参考例句: |
|
|
27 verge | |
n.边,边缘;v.接近,濒临 | |
参考例句: |
|
|
28 capability | |
n.能力;才能;(pl)可发展的能力或特性等 | |
参考例句: |
|
|
29 alignment | |
n.队列;结盟,联合 | |
参考例句: |
|
|
30 emanate | |
v.发自,来自,出自 | |
参考例句: |
|
|
31 alleviate | |
v.减轻,缓和,缓解(痛苦等) | |
参考例句: |
|
|
32 blurred | |
v.(使)变模糊( blur的过去式和过去分词 );(使)难以区分;模模糊糊;迷离 | |
参考例句: |
|
|
33 dealing | |
n.经商方法,待人态度 | |
参考例句: |
|
|
34 agile | |
adj.敏捷的,灵活的 | |
参考例句: |
|
|
35 contentious | |
adj.好辩的,善争吵的 | |
参考例句: |
|
|