cyber war


IT IS the new frontier for military and intelligence activity: cyberspace. For years military experts and computer scientists have speculated about the possibility of a nation’s infrastructure being attacked using computers, rather than bombs. There have been dark warnings of the danger of a “digital Pearl Harbour”—an unexpected strike in which digital attackers shut down America’s electrical grid or air-traffic control systems, or hack into nuclear-power stations and cause them to overheat. In recent years such concerns have been heightened by the first real examples of large-scale cyber-attacks—on Estonia in 2007 and Georgia in 2008. In each case, government websites were brought down by a deluge of traffic, apparently from Russia. The actual damage done was minimal, but it has all added to the sense of urgency, in America in particular, about the need to protect critical infrastructure from such an attack.

In the past few weeks there have been alarming reports that America’s systems have already been infiltrated. On April 8th the Wall Street Journal quoted “current and former national-security officials” who warned that “cyberspies” from China, Russia and elsewhere had broken into the systems that control America’s electrical grid and had installed software that could be used to disrupt it. And on April 21st the newspaper said foreign hackers had penetrated computers containing data about the F-35 Joint Strike Fighter. Does this mean America is suddenly under attack, and that war has broken out in cyberspace?

It is difficult to believe that America, Russia and China are not all probing each other’s computer systems, and the picture is further complicated by the involvement of unofficial groups, such as those thought to have attacked Estonia and Georgia (whether or not they are backed by governments is a murky matter). But the most likely explanation for the sudden spate of scare stories is rather more mundane: a turf war between American government agencies over who should oversee the nation’s cyber-security. In one corner is the Department of Homeland Security, which operates the National Cyber Security Centre (NCSC), a body set up to co-ordinate America’s various cyber-security efforts. In the other corner is the National Security Agency (NSA), which thinks it ought to be in charge. At stake are tens of billions of dollars in funding promised for a multi-year cyber-security initiative.



请阅读更多我的博客文章>>>
  • Youth 青春
  • 中国与美国政治家的出身a lawyer, an engineer and a politician...
  • 英语五大发音要点 (转抄)
  • Venezuela's president
  • Mr. Hu Jintao and Mr. Sarkozy
  • 所有跟帖: 

    回复:cyber war -梅石莹玉- 给 梅石莹玉 发送悄悄话 梅石莹玉 的博客首页 (47 bytes) () 04/29/2009 postreply 17:15:43

    I feel you are more relxed in the 1st paragraph. -jingbeiboy- 给 jingbeiboy 发送悄悄话 (37 bytes) () 04/29/2009 postreply 20:03:24

    回复:I feel you are more relxed in the 1st paragraph. -梅石莹玉- 给 梅石莹玉 发送悄悄话 梅石莹玉 的博客首页 (115 bytes) () 04/30/2009 postreply 05:22:29

    Overall, excellent reading. Your intonation and pacing -jingbeiboy- 给 jingbeiboy 发送悄悄话 (381 bytes) () 04/29/2009 postreply 20:01:26

    回复:Overall, excellent reading. Your intonation and pacing -梅石莹玉- 给 梅石莹玉 发送悄悄话 梅石莹玉 的博客首页 (137 bytes) () 04/30/2009 postreply 05:25:35

    请您先登陆,再发跟帖!