英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

pbs高端访谈:美国会面临“网络珍珠港”事件吗?

时间:2014-12-30 05:48来源:互联网 提供网友:mapleleaf   字体: [ ]
特别声明:本栏目内容均从网络收集或者网友提供,供仅参考试用,我们无法保证内容完整和正确。如果资料损害了您的权益,请与站长联系,我们将及时删除并致以歉意。
    (单词翻译:双击或拖选)

   MARGARET WARNER:We turn to a new cyber campaign against American banking1 giants and growing worries about what they might foreshadow. It began late last month and continues to this day.

  Two more U.S. banks are the latest targets in the spate2 of cyber-hits on American financial institutions. This week, Capital One and BB&T suffered disruptions on their websites, leaving customers without access to their accounts.
  A group calling itself the Qassam Cyber Fighters claimed responsibility and said the attacks are retaliation3 for an anti-Muslim video. But some U.S. officials, like Connecticut Senator Joe Lieberman, blame the recent uptick of attacks on Iran and its elite4 security force.
  He spoke5 last month on C-SPAN.
  101.jpg
  SEN. JOSEPH LIEBERMAN,I-Conn.: I think that this was done by Iran and the Quds Force, which has its own developing cyber-attack capacity, and I believe it was a response to the increasingly strong economic sanctions.
  MARGARET WARNER:Also blamed on Iran, recent hits on Saudi Arabia's state oil company, Aramco and Qatar's natural gas producer, RasGas, that disabled 30,000 computers entirely6.
  And Defense7 Secretary Leon Panetta warned last week that the threat to America's vital infrastructure8 throughout is rising.
  DEFENSE SECRETARY LEON PANETTA: The collective result of these kinds of attacks could be a cyber Pearl Harbor, an attack that would cause physical destruction and the loss of life.
  MARGARET WARNER:Iran denied any role. But Panetta said the U.S. military stands ready to respond or even preempt9 destructive attacks.
  In fact, it's been widely reported that the U.S. and Israel disrupted Iran's nuclear program with a computer virus called Stuxnet in 2010.
  Meanwhile, big banks who've been hit are anxious about what may lie ahead. This was J.P. Morgan Chase's CEO, Jamie Dimon, last week, at the Council on Foreign Relations in Washington.
  JAMIE DIMON, J.P. Morgan Chase: Computers in 10 years are going to be a 100,000 times faster. And so they will be able to do calculations quicker and get through quicker. And we're going to have to meet that in every way, shape or form.
  MARGARET WARNER:For now, though, a cybersecurity bill sits stalled in the Senate, with little prospect10 of action this year.
  For more, I'm joined by Michael Leiter, director of the NationalCounterterrorismCenter from 2008 to 2011.
  And Rodney Joffe, senior vice11 president at Neustar, an information services company that provides cybersecurity for private and government clients. In 2009, he designed a scenario12 for a government exercise in how to defend against cyber attacks.
  Welcome to you both to this important topic.
  Michael Leiter, begin by describing what these hackers13 did that could temporarily disrupt these Web sites.
  MICHAEL LEITER,former director of NationalCounterterrorismCenter: In this case, what they did was a disrupted denial of service attack.
  And in layman's terms, all that means is taking computers away from those banks and then flooding effectively the Web sites of those banks, so normal customers in the bank can't actually communicate, transfer funds and the like.
  MARGARET WARNER:And is there something that makes banks particularly vulnerable to cyber-hacking?
  MICHAEL LEITER:Banks actually tend to be one of those industries that is prepared for cyber-hacking probably better than any other industry in the United States, but we see here that they are still susceptible14.
  And I think it's really two things. One, they represent American power, in the same way that the terrorist attack, the WorldTradeCenter on 9/11, they represented American economic power.
  The second is again they are so reliant, increasingly so every day, on their websites for core aspects of the business.
  You and I both check our accounts, transfer funds. And cyber-activists or cyber-hackers know that this is the case.
  MARGARET WARNER:So what is the danger?
  Well, first of all, Mr. Joffe, the banks have tried to defend themselves, yet they were really outgunned in this case. What does that tell you about the growing level of sophistication of these hackers?
  RODNEY JOFFE, Neustar, Inc.: As Michael has said, the banks really are the best prepared. That's where the money is.
  And so they have been working for many years. And as a sector15, they're very well prepared. What is different about is that the people behind the attack, whoever that may be, were very, very knowledgeable16 about how the Internet works.
  And so what they have able to do is on an almost day-by-day basis overcome the defenses and sort of take an extra step forward. And so even though there was warning -- in fact, almost all of the banks have had days or weeks of warning...
  MARGARET WARNER:They announced, it, right?
  RODNEY JOFFE:They announced it in a public post. Even though that was in place, it was very difficult for the banks to defend themselves.
  MARGARET WARNER:So, what do you think is the danger of a more sophisticated, more broadly-based attack on the financial system that really could disrupt or disable significant portions of our financial network?
  RODNEY JOFFE:So, there is a significant threat, not just against the financial sector.
  But one of the problems is that there's a great teaching moment going on, so that not only people who are trying to attack the financial infrastructure, but trying to attack other parts of U.S. and, in fact, global critical infrastructure, are now learning about a mechanism17 that actually overcomes some of the barriers that have been in place from the beginning.
  There's a fundamental issue with the protocols18 that actually makes this happen.
  MARGARET WARNER:Is that the case as you see it, that with every attack they get better at it, whoever is doing this?
  MICHAEL LEITER:They do get better. We get better at defending, but they're moving faster than we are in most cases.
  We really see three types of threats. We see the disruption threat, and that's what we saw with these banks. We see all the time the theft threat, organizations and companies that have been penetrated19 and their proprietary20 information is stolen. And, finally, we see the most dangerous, the destructive threat.
  And that's what we saw in the case of Aramco, the Saudi oil company.
  MARGARET WARNER:Meaning they went in and actually were able to permanently21 destroy data.
  MICHAEL LEITER:That's exactly right, and going in, penetrating22 those networks and erasing23 files, and in this case ending up with a burning U.S. flag in the place of the files that actually make the computers function.
  MARGARET WARNER:Isn't there also a danger here, a threat of just having the American public lose confidence in the security of their money in a bank, let's say, and in doing business with banks online, I mean, that could be in and of itself destructive?
  RODNEY JOFFE:So, in reality, that's probably the biggest challenge.
  In the current attacks, there is some financial impact to the banks, but we don't have any evidence that we have seen so far of money being stolen.
  But what will happen over time is that the public will begin to lose confidence. If you think about it as an individual, you have banking to do towards the end of the month. If you're unable to get into your bank account over a period of a day or two, you start to worry about the stability of the entire banking infrastructure, which is obviously a trust issue globally.
  MARGARET WARNER:Right. Your mortgage payment is due, and you are not going to be able to have it paid.
  RODNEY JOFFE:That's all you care about.
  MARGARET WARNER:So, which of America's adversaries24 out there, Michael Leiter, have the technological25 know-how26 or on the verge27 of it of being able to mount a systemic attack? Is it countries like Russia, China, Iran? Is it criminal elements? Is it jihadis? Who?
  MICHAEL LEITER:I will start with ones who are actually not that great, and that's terrorist groups.
  Although they have some capability28, they're not the strongest in this regard. The next is organized crime. And organized crime largely out of Russia has really incredible sophistication. And that then links to the state threats. And by far, the most able in that regard are China, which has been identified that has a serious national security policy of using cyberterrorism or cybertheft, and Russia.
  The other issue we face is that those hackers are also being rented out by states and by others. So we have an alignment29 of interests here among some states and some organized criminals, which makes this threat that much more difficult to defeat.
  MARGARET WARNER:And you didn't mention Iran.
  MICHAEL LEITER:I didn't mention Iran, and I should have. So thank you.
  The CEO of PNC Bank, one of those banks that was attacked over the past couple of weeks, blamed hackers in Iran for this most recent attack. And it's been widely, widely reported that the attacks did emanate30 from Iran. Whether the government was involved, it's hard to know.
  MARGARET WARNER:And before we go, what more should be being done either by companies or by the government that isn't being done now to guard against this?
  RODNEY JOFFE:So I think that one of the biggest problems is attribution, the struggle we're having now in terms of who's behind it.
  It's important to know where it's coming from, because then you either provide diplomatic pressure to try and alleviate31 the attacks. What Michael said about the most dangerous groups, which is criminals and their nation state, the line is very blurred32.
  One of the biggest problems is we can't tell whether we're dealing33 with a nation state issue or a criminal issue, and most times they work together.
  MICHAEL LEITER:None of this is going to be stopped by building firewalls.
  We are going to have to produce a system that works between the government and the private sector and within industries which is agile34, so people can identify these threats very, very rapidly, respond operationally, and reduce the threat. And we absolutely are going to have to protect proprietary information, which is being stolen in massive and historic amounts.
  MARGARET WARNER:But that means that companies have to be willing to share the information.
  RODNEY JOFFE:Really important, the sharing of information between companies and in the private sector and in the public sector critical.
  MARGARET WARNER:And that's of course one of the big contentious35 issues on the Hill.
  Well, Rodney Joffe and Michael Leiter, thank you.
  RODNEY JOFFE:Thank you.
  MICHAEL LEITER:Thank you.

点击收听单词发音收听单词发音  

1 banking aySz20     
n.银行业,银行学,金融业
参考例句:
  • John is launching his son on a career in banking.约翰打算让儿子在银行界谋一个新职位。
  • He possesses an extensive knowledge of banking.他具有广博的银行业务知识。
2 spate BF7zJ     
n.泛滥,洪水,突然的一阵
参考例句:
  • Police are investigating a spate of burglaries in the area.警察正在调查这一地区发生的大量盗窃案。
  • Refugees crossed the border in full spate.难民大量地越过了边境。
3 retaliation PWwxD     
n.报复,反击
参考例句:
  • retaliation against UN workers 对联合国工作人员的报复
  • He never said a single word in retaliation. 他从未说过一句反击的话。 来自《简明英汉词典》
4 elite CqzxN     
n.精英阶层;实力集团;adj.杰出的,卓越的
参考例句:
  • The power elite inside the government is controlling foreign policy.政府内部的一群握有实权的精英控制着对外政策。
  • We have a political elite in this country.我们国家有一群政治精英。
5 spoke XryyC     
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说
参考例句:
  • They sourced the spoke nuts from our company.他们的轮辐螺帽是从我们公司获得的。
  • The spokes of a wheel are the bars that connect the outer ring to the centre.辐条是轮子上连接外圈与中心的条棒。
6 entirely entirely     
ad.全部地,完整地;完全地,彻底地
参考例句:
  • The fire was entirely caused by their neglect of duty. 那场火灾完全是由于他们失职而引起的。
  • His life was entirely given up to the educational work. 他的一生统统献给了教育工作。
7 defense AxbxB     
n.防御,保卫;[pl.]防务工事;辩护,答辩
参考例句:
  • The accused has the right to defense.被告人有权获得辩护。
  • The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
8 infrastructure UbBz5     
n.下部构造,下部组织,基础结构,基础设施
参考例句:
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
9 preempt bP8xH     
v.先发制人;先取
参考例句:
  • We arrived early at the theatre so as to preempt the front seats.我们早早来到剧院,以便捷足先登占到前排座位。
  • He pre-empted any decision to sack him.他预先阻止了所有解雇他的决定。
10 prospect P01zn     
n.前景,前途;景色,视野
参考例句:
  • This state of things holds out a cheerful prospect.事态呈现出可喜的前景。
  • The prospect became more evident.前景变得更加明朗了。
11 vice NU0zQ     
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的
参考例句:
  • He guarded himself against vice.他避免染上坏习惯。
  • They are sunk in the depth of vice.他们堕入了罪恶的深渊。
12 scenario lZoxm     
n.剧本,脚本;概要
参考例句:
  • But the birth scenario is not completely accurate.然而分娩脚本并非完全准确的。
  • This is a totally different scenario.这是完全不同的剧本。
13 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
14 susceptible 4rrw7     
adj.过敏的,敏感的;易动感情的,易受感动的
参考例句:
  • Children are more susceptible than adults.孩子比成人易受感动。
  • We are all susceptible to advertising.我们都易受广告的影响。
15 sector yjczYn     
n.部门,部分;防御地段,防区;扇形
参考例句:
  • The export sector will aid the economic recovery. 出口产业将促进经济复苏。
  • The enemy have attacked the British sector.敌人已进攻英国防区。
16 knowledgeable m2Yxg     
adj.知识渊博的;有见识的
参考例句:
  • He's quite knowledgeable about the theatre.他对戏剧很有心得。
  • He made some knowledgeable remarks at the meeting.他在会上的发言颇有见地。
17 mechanism zCWxr     
n.机械装置;机构,结构
参考例句:
  • The bones and muscles are parts of the mechanism of the body.骨骼和肌肉是人体的组成部件。
  • The mechanism of the machine is very complicated.这台机器的结构是非常复杂的。
18 protocols 66203c461b36a2af573149f0aa6164ff     
n.礼仪( protocol的名词复数 );(外交条约的)草案;(数据传递的)协议;科学实验报告(或计划)
参考例句:
  • There are also protocols on the testing of nuclear weapons. 也有关于核武器试验的协议。 来自辞典例句
  • Hardware components and software design of network transport protocols are separately introduced. 介绍系统硬件组成及网络传输协议的软件设计。 来自互联网
19 penetrated 61c8e5905df30b8828694a7dc4c3a3e0     
adj. 击穿的,鞭辟入里的 动词penetrate的过去式和过去分词形式
参考例句:
  • The knife had penetrated his chest. 刀子刺入了他的胸膛。
  • They penetrated into territory where no man had ever gone before. 他们已进入先前没人去过的地区。
20 proprietary PiZyG     
n.所有权,所有的;独占的;业主
参考例句:
  • We had to take action to protect the proprietary technology.我们必须采取措施保护专利技术。
  • Proprietary right is the foundation of jus rerem.所有权是物权法之根基。
21 permanently KluzuU     
adv.永恒地,永久地,固定不变地
参考例句:
  • The accident left him permanently scarred.那次事故给他留下了永久的伤疤。
  • The ship is now permanently moored on the Thames in London.该船现在永久地停泊在伦敦泰晤士河边。
22 penetrating ImTzZS     
adj.(声音)响亮的,尖锐的adj.(气味)刺激的adj.(思想)敏锐的,有洞察力的
参考例句:
  • He had an extraordinarily penetrating gaze. 他的目光有股异乎寻常的洞察力。
  • He examined the man with a penetrating gaze. 他以锐利的目光仔细观察了那个人。
23 erasing 363d15bcbcde17f34d1f11e0acce66fc     
v.擦掉( erase的现在分词 );抹去;清除
参考例句:
  • He was like a sponge, erasing the past, soaking up the future. 他象一块海绵,挤出过去,吸进未来。 来自辞典例句
  • Suddenly, fear overtook longing, erasing memories. 突然,恐惧淹没了渴望,泯灭了回忆。 来自辞典例句
24 adversaries 5e3df56a80cf841a3387bd9fd1360a22     
n.对手,敌手( adversary的名词复数 )
参考例句:
  • That would cause potential adversaries to recoil from a challenge. 这会迫使潜在的敌人在挑战面前退缩。 来自辞典例句
  • Every adversaries are more comfortable with a predictable, coherent America. 就连敌人也会因有可以预料的,始终一致的美国而感到舒服得多。 来自辞典例句
25 technological gqiwY     
adj.技术的;工艺的
参考例句:
  • A successful company must keep up with the pace of technological change.一家成功的公司必须得跟上技术变革的步伐。
  • Today,the pace of life is increasing with technological advancements.当今, 随着科技进步,生活节奏不断增快。
26 know-how TxeyA     
n.知识;技术;诀窍
参考例句:
  • He hasn't got the know-how to run a farm.他没有经营农场的专业知识。
  • I don't have much know-how about engines.发动机方面的技术知识我知之甚少。
27 verge gUtzQ     
n.边,边缘;v.接近,濒临
参考例句:
  • The country's economy is on the verge of collapse.国家的经济已到了崩溃的边缘。
  • She was on the verge of bursting into tears.她快要哭出来了。
28 capability JsGzZ     
n.能力;才能;(pl)可发展的能力或特性等
参考例句:
  • She has the capability to become a very fine actress.她有潜力成为杰出演员。
  • Organizing a whole department is beyond his capability.组织整个部门是他能力以外的事。
29 alignment LK8yZ     
n.队列;结盟,联合
参考例句:
  • The church should have no political alignment.教会不应与政治结盟。
  • Britain formed a close alignment with Egypt in the last century.英国在上个世纪与埃及结成了紧密的联盟。
30 emanate DPXz3     
v.发自,来自,出自
参考例句:
  • Waves emanate from the same atom source.波是由同一原子辐射的。
  • These chemicals can emanate certain poisonous gases.这些化学药品会散发出某些有毒的气味。
31 alleviate ZxEzJ     
v.减轻,缓和,缓解(痛苦等)
参考例句:
  • The doctor gave her an injection to alleviate the pain.医生给她注射以减轻疼痛。
  • Nothing could alleviate his distress.什么都不能减轻他的痛苦。
32 blurred blurred     
v.(使)变模糊( blur的过去式和过去分词 );(使)难以区分;模模糊糊;迷离
参考例句:
  • She suffered from dizziness and blurred vision. 她饱受头晕目眩之苦。
  • Their lazy, blurred voices fell pleasantly on his ears. 他们那种慢吞吞、含糊不清的声音在他听起来却很悦耳。 来自《简明英汉词典》
33 dealing NvjzWP     
n.经商方法,待人态度
参考例句:
  • This store has an excellent reputation for fair dealing.该商店因买卖公道而享有极高的声誉。
  • His fair dealing earned our confidence.他的诚实的行为获得我们的信任。
34 agile Ix2za     
adj.敏捷的,灵活的
参考例句:
  • She is such an agile dancer!她跳起舞来是那么灵巧!
  • An acrobat has to be agile.杂技演员必须身手敏捷。
35 contentious fa9yk     
adj.好辩的,善争吵的
参考例句:
  • She was really not of the contentious fighting sort.她委实不是好吵好闹的人。
  • Since then they have tended to steer clear of contentious issues.从那时起,他们总想方设法避开有争议的问题。
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   pbs
顶一下
(0)
0%
踩一下
(0)
0%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴