-
(单词翻译:双击或拖选)
Could a Cyberattack Lead to a Real War?
International security experts have warned that internet attacks by major world powers on other governments could lead to a real war. But they say it is not easy to define what kind cyberattack would be considered an act of war.
President Joe Biden said in July that if the United States ended up in a war with a major power it could "be as a consequence of a cyber breach1 of great consequence." Biden made the comments to leaders of the U.S. intelligence community.
Tensions are currently high between Russia and members of the NATO alliance over a possible conflict in Ukraine. Russia has deployed2 more than 100,000 troops near its border with Ukraine. U.S. and NATO officials have expressed concern that Russia may invade Ukraine.
Some Western officials have also warned about the danger of Russia possibly launching harmful cyberattacks against Ukraine or NATO allies. But experts say there is no clear line for how severe a cyberattack would have to be before it resulted in military action.
"The rules are fuzzy," said Max Smeets, director of the European Cyber Conflict Research Initiative, to The Associated Press. "It's not clear what is allowed, what isn't allowed," he added.
The U.S. and other NATO members have threatened to put economic restrictions3 on Russia if it sends troops into Ukraine. But it is less clear if such restrictions would be put in place if Russia launched a serious cyberattack.
Currently, arms control treaties do not provide detailed4 guidelines on how state-backed cyberattacks should be dealt with. It can also be difficult to quickly identify who is behind such attacks. Criminals and independent attackers can also work together with governments, making it harder to target specific blame.
In 2015, major world powers and others agreed at the United Nations on a set of 11 voluntary guidelines for international cyber behavior. But those guidelines have mostly been ignored.
Ukraine has blamed Russia for a cyberattack last month on Ukrainian government websites. Experts say the damage from that internet attack – which affected5 servers at several agencies – was not considered serious.
But cybersecurity company CrowdStrike recently said on its website it thinks such attacks are likely to continue as Russian President Vladimir Putin tries to "delegitimize" trust in Ukraine's government.
Michele Markoff is the deputy coordinator6 for cyber issues for the U.S. State Department. She said she thinks it will require, what she calls, "muscular diplomacy7" to end such "immoral8" and "destabilizing" behavior.
But it is unclear how such diplomatic efforts can be effectively carried out. Unlike nuclear arms, cyberweapons cannot easily be limited in treaties and they are difficult to identify. Violators are also not likely to be held responsible by the United Nations, since Russia and China both hold veto power on the Security Council.
NATO approved a new U.S.-supported policy last year. Under the policy, repeated lower-level cyberattacks could be enough to activate9 NATO's Article 5. The article states that any attack on any of the alliance's 30 members is considered an attack on all. But NATO rules are currently not clear on exactly what kind of cyberattack would be covered under Article 5.
Serhii Demediuk is with Ukraine's National Security and Defense10 Council. He told the AP the U.S. and other NATO partners have been helping11 Ukraine set up a separate cyber military organization.
In November, Ukraine said it had discovered an eight-year spying operation by agents of Russia's FSB security service that involved more than 5,000 attempted cyberattacks. Ukraine's state-run news agency said the goal of the operation was to gain control over important infrastructure12.
This month, American software company Microsoft said the cyber operation is ongoing13. It said it found evidence of attempts to break into Ukraine's military, judiciary and law enforcement systems. But Microsoft said no damage was discovered so far.
Words in This Story
consequence – n. the result of an action or situation
breach – n. an action that breaks a rule, agreement or law
fuzzy – adj. confusing and not clear
allow – v. to permit
delegitimize – v. make something seen as not valid14 or acceptable
destabilize – v. to make a government, area or political group lose power or control
infrastructure – n. the basic equipment and structures (such as roads and bridges) that are needed for a country or area
1 breach | |
n.违反,不履行;破裂;vt.冲破,攻破 | |
参考例句: |
|
|
2 deployed | |
(尤指军事行动)使展开( deploy的过去式和过去分词 ); 施展; 部署; 有效地利用 | |
参考例句: |
|
|
3 restrictions | |
约束( restriction的名词复数 ); 管制; 制约因素; 带限制性的条件(或规则) | |
参考例句: |
|
|
4 detailed | |
adj.详细的,详尽的,极注意细节的,完全的 | |
参考例句: |
|
|
5 affected | |
adj.不自然的,假装的 | |
参考例句: |
|
|
6 coordinator | |
n.协调人 | |
参考例句: |
|
|
7 diplomacy | |
n.外交;外交手腕,交际手腕 | |
参考例句: |
|
|
8 immoral | |
adj.不道德的,淫荡的,荒淫的,有伤风化的 | |
参考例句: |
|
|
9 activate | |
vt.使活动起来,使开始起作用 | |
参考例句: |
|
|
10 defense | |
n.防御,保卫;[pl.]防务工事;辩护,答辩 | |
参考例句: |
|
|
11 helping | |
n.食物的一份&adj.帮助人的,辅助的 | |
参考例句: |
|
|
12 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
13 ongoing | |
adj.进行中的,前进的 | |
参考例句: |
|
|
14 valid | |
adj.有确实根据的;有效的;正当的,合法的 | |
参考例句: |
|
|