Unit 3
(Para. 1)A recentsimulat ion of a devasta ting cyberat tack on America was cryingfor a Bruce Willislead:A riesof mysteri ous attacks cripple d much of the nationa l infrast ructur e, includi ng air traffic, financi al markets and even basic email.
最近一场模拟美国遭受毁灭性网络攻击的演习急需布鲁斯·威利斯(曾在小电脑
客马特福斯特的专业帮助下,打破了一个异国客天衣无缝的电脑系统入侵计划)这样的一个具有高精尖电脑技术的人的帮助:由于一系列神秘的攻击,国家基础
设施陷入瘫痪,包括航空运输,金融市场,甚至是基本的电子通信。
If this was not bad enough, an unrelat ed electri city outagetook down whateve r remaine d of the already unplugg ed East Coast.
如果这还不够糟糕,那么一段与神秘攻击毫不相干的电力断供期的出现,让已经
无电力供应的东部沿海地区停止运转。
(Para. 2)The simulat ion—fundedby a numberof major players in network curit y, organiz ed by the Biparti san PolicyCenter, a Washing ton-bad think tank,and broadca st on CNN on a Saturda y night—had an unexpec ted twist.
这次模拟实验是由一群网络安全领域的专家支持的,并在两党联立政策中心——
华盛顿智囊团的组织下进行的,于一个星期六的晚上在CNN广播公布。它引来
洒脱的拼音了始料未及的烦恼。
The America n governm ent appeare d incompe tent, indecis ive and confuse d (past governm ent officia ls, includi ng formerSecreta ry of Homelan d Securit y Michael Chertof f and formerDeputySecreta ry of State John Negropo nte, were recruit ed to play this glamoro us role on TV). “TheU.S. is unprepa red for cyberwa r,”th e simulat ion‟sorganiz ers grimlyconclud ed.
美国政府显得不够胜任,不够关注并且有些管理混乱。(历来的政府官员,包括
前任国家安全部秘书迈克儿·舍特奥夫,前任州政府秘书代理人乃格尔包特都加
入模拟实战通过电视宣传它的重要作用)模拟的组织者们坚定地下了这样的结论:美国尚未做好网络之战的准备。
(Para. 3)The past few monthshave been packedwith cyber-jingois m from formerand current nationa l curit y officia ls.结记
这几个月以来,到处充斥着来自前任和现任国家安全官员的网络主战论。
Richard Clarke, a formercyberse curity advir to two adminis tratio ns, says in his new book that“cyberwa r has already begun.”Testify ing in Congres s in Februar y, Mike McConne ll, formerhead of the Nationa l Securit y Agency,arguedthat“ifwewenttowartodayinacyberwa r, we would lo.”Speakin g in late April, Directo r of Central Intelli genceLeon Panettasaidthat“thenextPearlHarb oris likelyto be a cyberat tackin g going after our grid.”前两部门网络安全顾问理查德·克拉克在他最近的新书里提到:“网络战已
经开始了。”前国家安全局的领导麦克·麦可科奈尔在二月召开的国会里说道:“倘
若今天进入网络战,我们必输无疑。”四月,中央情报局理事里奥·番奈特说道:“下一个网络攻击的“珍珠港”事件很可能会进入我们的领地。”
(Para. 4)The murky natureof recentattacks on Google—in which someone tricked a Google
employe e into opening a malicio us link that eventua lly allowed intrude rs to accessparts of Google‟
spasswor d-managin g softwar e, has only added to publicfears.
近期对于谷歌的隐形侵袭过程只能加重公众的担忧。因为,在侵袭途中有人欺骗谷歌员工打开了未经允许的链接使得入侵者们进入了谷歌密码运行软件的部分区域。这些针对谷歌的恶性攻击事件增加了公众的恐慌情绪。
Iftheworld‟smostinnovat ive technol ogy company cannotprotect its compute rs from such digital aggress ion, what can we expectfrom the bureauc raticchimera that is the Departm ent of Homelan d Securit y?
如果连世界上最具创新性的技术公司都无法保护计算机免受诸如此类的网络侵略,我们还期望从本国安全部门,这个官僚政治的巨头那里得到什么?
(Para. 5)Googleshouldbe applaud ed for going on the recordabout the cyber-attacks; most compani es preferto keep quiet about such inciden ts.
谷歌应该为其声称自己受到网络攻击的行为得到掌声,而大多数公司面对这些事件时倾向于保持沉默。
But do hundred s—or even thousan ds—of such inciden ts that targetboth the private and the publics
举国同庆
ectoradd up to the imminen t threatofa“cyberwa r”thatisworthyof such hype? The evidenc e so far looks too shaky.
但是成百上千甚至更多的这些以私人和公共部门为目标的攻击事件加起来就等于即将来临的危险——这个值得广泛宣传的网络战吗?证据显得如此不可靠。
(Para. 6)Ironica lly, the more we spend on curin g the Interne t, the less curewe appearto feel. 可笑的是,在网络防卫上投入得越多,我们就越觉得不安全。
A 2009 reportby Input, a marketi ng intelli gencefirm, project ed that governm ent spendin g on cyberse curity would grow at a compoun d rate of 8.1% in the next five years. A March reportfrom consult ing firm MarketRearc h Media estimat es that the governm ent‟stotalspendin g on cyberse curity between now and 2015 is t to hit $55 billion, with stronggrowthpredict ed in areas such as Interne t-traffic surveil lanceand monitor ing.
一份2009年来自营销智囊团Input公司的报告预测在未来五年,政府花在网络安全上的经费将以8.1%的综合速度增长。另一份于3月出自顾问公司M arketRearc h Media的报告估计从今年起到2015年政府用于网络安全的总费用将直逼550亿美元,其中预计诸如网络传输监控和追踪等领域增长尤为迅速。(Para. 7) Given the previou s history of excessi vely tight connect ions between our governm ent
滋阴养颜
and many of its contrac tors,it‟sq uite possibl e that the over-dramati zed rhetori c of tho cheerle adingthe cyberwa r has helpedto add at least a few billion dollars to this price tag. Mr. McConne ll's current employe r, Booz Allen Hamilto n, has just landed$34 million in cyber curit y contrac ts with the Air Force. In additio n to writing books on the subject, Richard Clarkeis a partner in a curit y firm, Good HarborConsult ing.
鉴于过去我们政府与它众多的承包商之间关系过分亲密的事情,那些花言巧语过
分鼓吹网络战的承包商完全可能使得费用至少增加几十亿。麦克·麦可科奈尔先
生的现任雇主艾伦·汉密尔顿已经与空军签订价值三千四百万关于网络安全合同。除了写与网络安全相关的文章外,理查德·克拉克还是Go od HarborConsult ing安全公司的成员之一。
(Para. 8a)Both Messrs. McConne ll and Clarke—as well as countle ss otherswho have made a success ful transit ion from tryingto fix the governm ent‟scy ber curit y problem s from withinto offerin g their rvice s to do the same from without—are highlyrespect ed profess ionals and their opinion s shouldnot be taken lightly, if only because they have en more classif ied reports
分享英语麦克·麦可科奈尔与克拉克,甚至那些数不胜数的实现了成功过渡的人们,由于
他们先确认了政府的网络安全问题紧接着为这些问题提供帮助,因此他们被誉为
备受尊敬的专业人士,除此之外,如果仅仅因为他们见识过更加专业化的报道,
他们的想法也不该被轻视。
(Para. 8b)Their stature, however, does not relieve them of the respons ibilit y to provide some hard evidenc e to support their claims. We do not want to sleepwa lk into a cyber-Katrina, but neither do we want to hold our policy-makinghostage to the rhetori cal ploys of better-informe d governm ent contrac tors.
然而,他们的高度水平也并没有就此减轻他们要为他们的观点提供可靠证据的责
任感。我们不想抱着幻想投入到只有网络的生活当中,也不想将政策决定这个赌
注放在消息灵通的政府合作者所持有的那些夸张的伎俩上面。
(Para. 9)StevenWalt, a profess or of interna tional politic s at Harvard, believe s that the nascent debateabout cyberwa r prent s“aclassic al opportu nity for threatinflati on.”MrWalt pointsto the rembl ance between our current deliber ations about onlinecurit y and the debateabout nuclear arms duringthe Cold War.
一名哈佛大学国际政治学教授斯蒂文·沃尔特认为关于网络战的初次讨论引出了
一次绝佳的夸大危胁的机会。沃尔特先生指出我们现在关于网络安全的深思熟虑
与在冷战时期关于核武器的热议的相似之处。
Back then, tho working in weapons labs and the militar y tendedto hold more alarmis t views than many academi c experts, arguabl y because the livelih oods of univers ity profess ors did not dependon havingto hype up the need for arms racing.
当时,从事武器与军事研究的人员比许多理论专家更倾向于杞人忧天的观点,显
然是因为大学教授不需要依赖大肆宣传军备竞赛以谋求生计。
(Para. 10)MarkusRanum, a veteran of the network curit y industr y and a noted criticof the cyber war hype, pointsto another similar ity with the Cold War.
马科斯·冉讷姆是一位从事网络安全行业的内行人,也是著名的批判鼓吹网络战
的人士。他指出网络战的热议与冷战的相似之处。
Today‟shype, he says, leads us to believethat“weneedtodevelop an offensi ve capabil ity in order to defendagainst an attackthatisn‟tcoming—it‟stheold…bombergap‟alloveragain:a flimsyexcuto militar ize.”
他进一步说明今天关于网络战的大肆宣传会导致我们认为为了防御一个尚未到来的攻击,我们需要发展攻击能力。这是冷战时期“轰炸机代差”的重演。它只是一个为扩大军事化的脆弱的借口。
(Para. 11)How dire is the threat? Ask two experts and you will get differe nt opinion s. Just last month, Lt. Gen. Keith Alexand er, directo r of the NSA, told the Senate‟sArmedService s Committ ee that U.S. militar y network s were eing“hundred s of thousan ds of probesa day.”However, speakin g at a March confere nce in San Francis co, HowardSchmidt, Obama‟srecentl y appoint ed cyberse curity czar, saidthat“thereisnocyberwa r,”addingthatitis“aterribl e metapho r”anda“terribl e concept.”
危险到底有多可怕?问问两位专家,你会得到两个完全不同的答案。就在上个月,NSA局长亚历山大向参议院的现役武装委员会报告,美国军网监测到每天有成百上千的入侵探测。但是,奥巴马最近任命网络安全负责人豪吾儿德·斯格梅特在旧金山的一个军事会议上说:“没有网络战”,他补充道,那是“可怕的比喻”和“骇人的概念”。
(Para. 12) The truth is, not surpris ingly, somewhe re in between. There is no doubt that the Interne t
brims with spammin g, scammin g and identit y fraud.
不要感到惊讶,真相就在这两者之间的某个地方。毫无疑问,互联网充满着垃圾邮件、诡计以及骗子。
Havingsomeone wipe out your hard drive or bank account has never been easier, and the tools for committ ing electro nic mischie f on your enemies are cheap and widelyaccessi ble.
人们从没有如此容易地擦除你的硬驱动器或者你的银行账目,而且用于给你的敌人制造电子故障的工具更加便宜和普遍。
(Para. 13)This is the inevita ble cost of democra tizing accessto multi-purpose technol ogies. Just as any blogger can now act like an Ed Murrow,so can any armchai r-bound cyberwa rrioract like the über-hackerKevin Mitnick, who was once America‟s most-wantedcompute r crimina l and now runs a curit y consult ing firm.
这是自由地使用多用途技术不可避免的代价。正如所有的博客现在都能够扮演爱德·莫罗的角色一样,所有不切实际鼓吹网络战的人都扮演曾经是美国最想缉拿归案的网络罪犯,而现今经营一家安全咨询公司的黑客凯文·米特尼克。
But just as it is wrong to conclud e that the amateur izatio n of media will bring on a renaiss ance of high-quality journal ism, so it is wrong to conclud e that the amateur izatio n of cyberat tackswill usher in a brave new world of destruc tive cyberwa rfare.
但是正如错误地推断媒体的成熟将会带来高质量新闻业的复兴,网络攻击的成熟将会带来一个具有破坏性网络战争的新的世界的推断也是错的。
荷叶圆圆仿写句子
(Para. 14)From a strictl y militar y perspec tive, “cyberwa r”—withasmall“c”—may very
well exist, playing condfiddleto ongoing militar y conflic t, the one with tanks, shellfi re and all. The Interne t—much like the possibi lity of air combata century ago—has openednew possibi lities for militar y operati ons: block the dictato r‟sbankaccount or shut down his propaga nda-infeste d broadca st media. Such options were already on the table—even thoughthey appearto have been ud sparing ly— duringa numberof recentwars.
从严格的军事观点看,网络战将在现实中继续存在,扮演着一个仅次于正在进行中需要坦克、炮火和所有武器的军事斗争的角色。互联网就像一个世纪前的发生空中战争的可能,已为军事行动提供了新的可能:冻结独裁者的银行账目或者关闭宣传他主张的广播媒体。这些方式已在最近的一些战争中开始运用,虽然他们看起来似乎用的有点保守。
(Para. 15a)Why have such tactics—known in militar y parlanc eas“compute r network attacks”—not been ud more widely? As revolut ionary as it is, the Interne t does not make centuri es-old laws of war obsolet e or irrelev ant. Militar y convent ions, for example, require that attacks disting uish between civilia n and militar y targets. In decentr alized and interco nnecte d cybersp ace, this require ment is not so easy to satisfy: A cyberat tack on a cellpho ne tower ud by the adversa ry may affectcivilia n targets along with militar y ones.
天摧地塌为什么这些在军事领域里被认为是网络攻击的策略没有被广泛运用?正如革命,互联网并没有使悠久的战争规律变得过时或毫不相关。比如,按照军事惯例要求在攻击时区分平民和军事目标。在既相互分离又相互连接的电脑空间里,这个要求并不容易满足:在网络攻击敌人用的电话塔时影响平民目标和军事目标。
(Para. 15b)When in 2008 the U.S. militar y decided to dismant le a Saudi Interne t forum—initial ly t up by the CIA to glean intelli gencebut increas inglyud by the jihadis ts to plan on attacks in Iraq — it inadver tently cauddisrupt ion to more than 300 rvers in Saudi Arabia,Germany and T exas. A weaponof surgica l precisi on the Interne t certain ly isn‟t, and damageto civilia ns is hard to avoid. Militar y command ers do not want to be tried for war crimes, even if tho crimesare committ ed online.
骆驼祥子作者是谁在2008年美国军队决定拆除一个沙特阿拉伯的网络论坛。这个由CIA创立的论坛本来是用来收集人才的但是却越来越被异教徒用在伊拉克的攻击上。这次拆除不经意间造成在沙特阿拉伯、德国、德克萨斯州的300多台服务器的中断。网络攻击定然不是外科手术般的精确打击武器,且对平民的伤害很难避免。军事指挥官不想尝试战争犯罪的实验,即使是通过网络来实行犯罪。
(Para. 16)All of the distinc t threats require quite distinc t policyrespons es that can balance the risks with the levelsof devasta tion. We probabl y want very strongprotect ion against cyberte rror, moderat e protect ion against cybercr ime, and littleto no protect ion against juvenil e cyber-hooliga nism。
所有这些不同的威胁需要很不相同的能够平衡风险和毁坏水平的政策响应。我们