-
(单词翻译:双击或拖选)
US Cyber Pros1: Hackers4 Could Hit Electronic Voting Machines Next 黑客很可能下一步将袭击电子投票仪
WASHINGTON—
U.S. cyber security professionals say suspected foreign hackers who recently attacked computer systems of the Democratic Party could do something even more sinister5 in the future.
The cyber pros, who appeared on this week's Hashtag VOA program, said U.S. electronic voting systems are likely to be among the next targets.
When the whistle-blowing website WikiLeaks published leaked emails of the U.S. Democratic National Committee last month, it caused major embarrassment6 to the party, and forced U.S. Congresswoman Debbie Wasserman Schultz to quit her position as the DNC chairperson.
Cybersecurity analyst7 Richard Forno said that outcome shows foreign hackers can achieve political goals and incentivizes them to escalate8 their attacks.
"Interfering9 with the electoral and political process of countries is a classic tool of intelligence and foreign policy,” said Forno, who directs the University of Maryland’s Center for Cybersecurity. “Even though we are moving toward an era of electronic and technology-enabled voting in more places, this [DNC cyberattack] reinforces the fact that the traditional threats are still with us, and are now moving further into cyberspace10."
Electronic voting machines are part of that cyberspace. The vast majority of U.S. states will use them for this November's national elections.
But a 2015 study by New York University found that 43 of those states had machines that were at least a decade old.
Could they be hacked11 as well? Cyber security pros attending an annual Las Vegas conference known as Black Hat think so.
Attack in Ukraine
One of them is Toni Gidwani, research director at ThreatConnect, a cyberdefense platform used by 1,200 companies and organizations worldwide. She said there is a precedent12 for attacks on voting systems.
"We saw that in Ukraine in 2014, where three days before the election, the Ukrainian central election committee suffered a massive hack2 that threatened their ability to hold voting on schedule,” she said. “And then malware was discovered right before results were announced – malware that would have projected a totally different outcome in which an ultranationalist candidate, who in reality received less than 1 percent of the vote, would have won. So this is not science fiction - we have already seen this happen."
Some U.S. voting machines produce paper records that can be used in case of problems with a vote count. But keeping a paper trail might not be enough.
Yong-Gon Chon, another Black Hat attendee, said any organization seeking to protect itself from hackers needs all of its personnel to play their part.
"It is no longer just the responsibility of a chief security officer or CIO to protect an organization's infrastructure13 - everyone has a role to play,” said Chon, who serves as CEO of Cyber Risk Management and has led global security teams for more than 20 years. “There is a shared level of responsibility, whether you are using cloud systems or your own systems within your organizations. And ultimately it is about being able to practice safe and healthy (cyber) activities on a day to day basis."
One healthy habit recommended by Chon is being skeptical14 when you receive an email containing a hyperlink15 that could expose you to a hacker3.
“You should determine whether or not that is something that you should trust and is acceptable for your business,” he said.
1 pros | |
abbr.prosecuting 起诉;prosecutor 起诉人;professionals 自由职业者;proscenium (舞台)前部n.赞成的意见( pro的名词复数 );赞成的理由;抵偿物;交换物 | |
参考例句: |
|
|
2 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
3 hacker | |
n.能盗用或偷改电脑中信息的人,电脑黑客 | |
参考例句: |
|
|
4 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
5 sinister | |
adj.不吉利的,凶恶的,左边的 | |
参考例句: |
|
|
6 embarrassment | |
n.尴尬;使人为难的人(事物);障碍;窘迫 | |
参考例句: |
|
|
7 analyst | |
n.分析家,化验员;心理分析学家 | |
参考例句: |
|
|
8 escalate | |
v.(使)逐步增长(或发展),(使)逐步升级 | |
参考例句: |
|
|
9 interfering | |
adj. 妨碍的 动词interfere的现在分词 | |
参考例句: |
|
|
10 cyberspace | |
n.虚拟信息空间,网络空间,计算机化世界 | |
参考例句: |
|
|
11 hacked | |
生气 | |
参考例句: |
|
|
12 precedent | |
n.先例,前例;惯例;adj.在前的,在先的 | |
参考例句: |
|
|
13 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
14 skeptical | |
adj.怀疑的,多疑的 | |
参考例句: |
|
|
15 hyperlink | |
n.超链接 | |
参考例句: |
|
|