VimIy微民网,让世界倾听微民的声音! 设为首页 | 加入收藏 | 网站地图
当前位置:主页 > 大杂烩 >

【小心那头兔子!】网络恐慌症-为什么五角大楼又在炒作中国网络黑客

整理时间:2013-03-18 17:41 来源:www.vimiy.com 作者:编辑 点击:

【楼主】(2254299)2013-03-18 10:41

» 网络恐慌症-为什么五角大楼又在炒作中国网络黑客
    转载龙腾 http://www.ltaaa.com/wtfy/8076.html
    
    
    
    网络恐慌症-为什么五角大楼又在炒作中国网络黑客
    TheGreat Cyberscare
    
    
    
    TheGreat Cyberscare
    Whythe Pentagon is razzmatazzing you about those big bad Chinese hackers.
    
    重度网络恐慌症——为什么五角大楼又在炒作中国网络黑客大坏蛋
    
    
    The White Houselikes a bit of threat. In his State of the Union address, Barack Obama wantedto nudge Congress yet again into passing meaningful legislation. The presidentemphasized that America's enemies are "seeking the ability to sabotage ourpower grid, our financial institutions, and our air traffic controlsystems." After two failed attempts to pass a cybersecurity act in thepast two years, he added swiftly: "We cannot look back years from now andwonder why we did nothing in the face of real threats to our security and oureconomy." Fair enough. A bit of threat to prompt needed action is onething. Fear-mongering is something else: counterproductive. Yet too many aparticipant in the cybersecurity debate reckons that puffery pays off.
    
    白宫似乎被吓坏了。在国情咨文报告中,奥巴马再次敦促国会通过一项影响深远的法案。奥巴马强调美国的敌人正在“试图获取能够破坏我们电力网络、金融机构和飞行控制系统的能力”。在过去两年两次试图通过网络安全法案的尝试以失败告终之后,这次他很巧妙地表示:“我们不该在多年后回顾今天,然后质疑为什么我们在敌人和现实安全威胁面前无所作为”。说的真好。但是用些手段来推动某些必要的行动是一回事,人为制造恐慌则不是那么回事了:适得其反。但是很多参与网络安全讨论的人都预计这次的炒作会奏效。
    
    *
    -
    
    The Pentagon, no doubt, is the master ofrazzmatazz. Leon Panetta set the tone by warning again and again of animpending "cyber Pearl Harbor."Just before he left the Pentagon, the Defense Science Board delivered aremarkable report, Resilient Military Systems andthe Advanced Cyber Threat. The paper seemed obsessed with making yetmore drastic historical comparisons: "The cyber threat is serious," the task force wrote,"with potential consequences similar to the nuclear threat of the ColdWar." The manifestations of an all-out nuclear war would be different fromcyberattack, the Pentagon scientists helpfully acknowledged. But then theyadded, gravely, that "in the end, the existential impact on the UnitedStates is the same."
    A reminder is inorder: The world has yet to witness a single casualty, let alone fatality, as aresult of a computer attack. Such statements are a plain insult to survivors ofHiroshima. Some sections of the Pentagon document offer such eye-wateringlyshoddy analysis that they would not have passed as an MA dissertation in aself-respecting political science department. But in the current debate itseemed to make sense. After all a bit of fear helps to claim -- or keep --scarce resources when austerity and cutting seems out-of-control. The reportrecommended allocating the stout sum of $2.5 billion for its top two prioritiesalone, protecting nuclear weapons against cyberattacks and determining the mixof weapons necessary to punish all-out cyber-aggressors.
    
    五角大楼无疑是夸大其词的好手。帕内塔已经通过一遍遍地重复所谓即将上演的“网络珍珠港”铺垫舆论氛围。就在他卸任前,国防部国防科学委员会发表一个吸引眼球的报告《高科技网络威胁和灵活反应的军事体制》。报告进行了骇人的历史比对:“网络安全威胁非常严重”,专家组写道,“其潜在危险和冷战时期的核威胁的差不多”。所幸的是五角大楼的研究者似乎还明白网络攻击和全面的核战争还是略有不同的。但是他们不忘严肃地提出,“其对美国造成的最终影响是一样的”。提示一下:遭受网络攻击之后,世界就会毁灭。这种表述简直是对广岛幸存者的直接侮辱。
    
    不过制造点恐慌有利于在无法控制的严厉的大规模紧缩政策下索取—或者保持—获得大量的资源。报告要求给它的两大优先关注问题上单独划拨高达25亿美元的预算:保护核武器免受网络攻击和报复网络战侵略国的必要的武器装备。
    
    Then there are private computer securitycompanies. Such firms, naturally, are keen to pocket some of the government'smoney earmarked for cybersecurity. And hype is the means to that end.Mandiant's much-noted report linking acoordinated and coherent campaign of espionage attacks dubbed AdvancedPersistent Threat 1, or "APT1," to a unit of the Chinese military isa case in point: The firm offered far more details on attributing attacks tothe Chinese than the intelligence community has ever done, and the companyshould be commended for making the report public. But instead of using cockyand over-confident language, Mandiant's analysts should have used Words of Estimative Probability,as professional intelligence analysts would have done.
    An example is the report's conclusion,which describes APT1's work: "Although they control systems in dozens ofcountries, their attacks originate from four large networks in Shanghai -- twoof which are allocated directly to the Pudong New Area," the report found.Unit 61398 of the People's Liberation Army is also in Pudong. Therefore,Mandiant's computer security specialists concluded, the two were identical:"Given the mission, resourcing, and location of PLA Unit 61398, weconclude that PLA Unit 61398 is APT1." But the report conspicuously doesnot mention that Pudong is not a small neighborhood ("right outside of Unit61398's gates") but in fact a vast city landscape twice the size ofChicago. Mandiant's report was useful and many attacks indeed originate inChina. But the company should have been more careful in its overall assessmentof the available evidence, as the computer security expert Jeffrey Carr andothershave pointed out.The firm made it too easy for Beijing to dismiss the report. My class incybersecurity at King's College London started poking holes into the reportafter 15 minutes of red-teaming it -- the New York Times didn't.
    
    然后就是私人计算机安全企业了。这些企业当然很想要政府划拨的作为网络安全所用的资金了。炒作就是为了这个目的。Mandiant公司的非常轰动的报告将一系列持续的间谍攻击行为( “高科技持续威胁”)和中国军方的某个部门联系起来就是个例子:这家企业提供了更多的细节来指认攻击是源自中国的,在此之前还没有专业人士这样做过,而且这家企业还将报告公之于众。但是Mandiant公司应该使用更具推测性的而不是自负或过于确信的口吻,这才是专业的科学分析者该做的。
    
    比如这份报告描述高科技持续威胁的结论:“虽然控制方来自于数十个国家,但是攻击源头来自上海的四个位置——其中两个IP段在浦东新区”。解放军 61398部队也在浦东,因此Mandiant的计算机安全专家作出结论将两者画上了等号,“根据61398部队的任务、(IP)段和位置,我们认为 61398部队就是高科技持续威胁”。但是报告很显然没有说明浦东不是一个小地方(不只61398部队一个院子那么大),事实上它是芝加哥两倍大。 Mandiant的报告是有价值的,而且许多攻击确实来自于中国。但是正如计算机安全专家杰弗里卡尔和其他人指出的那样,Mandiant公司应根据现有资料做出更加谨慎的全面评估。该公司这样的报告很容易被中国反驳。在认真审核了15分钟之后,我在伦敦大学国王学院网络安全课上就指出这份报告的问题—— 纽约时报则将它视为珍宝。
    
    Which leads to the next point: The mediawant to sell copy through threat inflation. "In Cyberspace, New ColdWar," the headline writers at the Times intoned inlate February. "The U.S. is not ready for a cyberwar," shrieked the Washington Post earlier this week.Instead of calling out the above-mentioned Pentagon report, the paper actuallypublished two supportive articles on it and pointed out that a major offensivecyber capability now seemed essential "in a world awash incyber-espionage, theft and disruption." The Post should have reminded its readers that theonly military-style cyberattack that has actually created physical damage--Stuxnet -- was actually executed by the United States government. The Times, likewise, should have asked tough questions andpointed to some of the evidential problems in the Mandiant report; instead, itpublished what appeared like an elegant press release for the firm. On issuesof cybersecurity, the nation's fiercest watchdogs too often look like hand-tamepuppies eager to lap up stories from private firms as well as anonymous sourcesin the security establishment.
    
    这就推导出来了第二个结论:媒体想要通过传播恐慌来卖软件。泰晤士报在二月份以“网络空间上的新冷战”这样的标题做头条。华盛顿邮报这周早先时候喊 “美国还没准备好应对网络战争”。邮报没有引用上面提到的五角大楼的报告,它刊登了两份对报告持支持态度的文章并指出“在一个被网络间谍攻击、网络窃密威胁的世界里”网络攻击能力看来是必要的了。邮报应该告诉它的读者,唯一实际造成现实损害的军方网络攻击—震网—是美国政府策划实施的。泰晤士报也应该对 Mandiant报告认真地提出质疑并指出证据上的一些疑点,但是它却表现得像是该公司的一场完美的新闻发布会一样。在网络安全问题上,对于私人企业和安全机关匿名人士讲述的故事,国家的严苛的看门狗常常表现为欣然接受。
    
    Finally,the intelligence community tags along with the hype because the NSA and CIA arestill traumatized by missing 9/11. Missing a "cyber 9/11" would betruly catastrophic for America's spies, so erring on the side of caution seemsthe rational choice. Yes, Director of National Intelligence James Clapper'srecent testimony was more nuanced than reported and toneddown the threat of a very serious cyberattack. But at the sametime America's top spies are not as forthcoming with more detailed informationas they could be. We know that the intelligence community, especially in theUnited States, has far better information, better sources, better expertise,and better analysts than private companies like Symantec, McAfee, and KasperskyLab. But for a number of reasons they keep their findings and their analysisclassified. This means that the quality of the public debate suffers, asexperts as well as journalists have no choice but to rely on industry reportsof sometimes questionable quality or anonymous informants whose veracity ishard to assess.
    The tragedy is that Obama actually has it right: Something needsto be done, urgently. But Washington's high-octane mix of profiteering,protectiveness, and politics is sadly counterproductive for four reasons:
    
    最终,情报界只能跟着这些炒作走。因为国土安全部和中情局已经因为漏过911而大受挫折。如果再漏掉“网络911”肯定会是美国情报部门的灭顶大灾,所以谨慎点看起来是合理的选择。虽然国家情报总监克莱佩最近所做的证词略有不同且降低了网络攻击威胁的调门。但是与此同时美国的顶级情报机构并不愿意提供他们有能力提供的更多细节。我们都知道情报部门尤其是美国的情报部门,相对于赛门铁克、迈克菲和卡巴斯基等私人企业来说有更多的信息、更广泛的情报来源、更好的专家评估报告和更好的情报分析人员,但出于某些原因他们将这些发现和分析保密不对外公布。这就意味着公众在讨论这些问题时—无论是专家还是媒体—都别无他选,只能依靠那些可信度存疑的企业报告或者是真实性无从查证的匿名人士提供的信息。
    
    所以悲剧的是奥巴马确实需要尽快去做一些正确的事情,但是华盛顿充斥着非法利益输送和保护主义,于是政治很悲哀地被误导了:
    
    First, the hype actually makes it harder to focus on crucialengineering details. Security standards in industrial control systems and SCADAnetworks -- the networks that control stuff that physically moves around, fromtrains to gas to elevators -- are shockingly low. The so-called ProgrammableLogic Controllers widely used in critical infrastructure are designed to besafe and reliable in tough factory-floor conditions and harsh weather, notsecure against outside attack. This year's S4-conference in Miami Beach, organized by the smalland specialized security outfit Digital Bond, again showcased how vulnerablethese systems are. But Washington is too busy screaming havoc and tooill-informed to do something meaningful about concrete engineering issues. Justsharing information, as the inspector general of the Department of HomelandSecurity recommendedin a report last month, is useful but it will not deliversecurity. Connecting critical infrastructure that was never designed to belinked to the Internet is also not the root of the problem -- the built-insecurity flaws and fragility of these systems needs to be fixed, as DigitalBond's Dale Peterson pointedout last week inresponse to the timid DHS report. The political dynamic behind this logic isclear: The more is declared critical, the harder it becomes to act on thereally critical.
    
    第一,炒作使得集中精力在真正重要的技术细节变得更难。
    
    工业控制体系的安全标准和网络工业控制体系安全标准—控制实际运作的网络体系—实际上在不停摇摆,从汽车到天然气到电梯各方面标准都非常低。广泛应用于关键设施的可编程逻辑控制器只针对严苛的地面条件和恶劣天气,但对于外部攻击则并不安全和值得信赖。今年在迈阿密,规模较小但专业严谨的 DigitalBond公司组织召开的工业控制体系安全科学研讨会(SCADASecurity Scientific Symposium)表明这些系统是多么的脆弱。华盛顿正忙于炒作重大威胁根本没有意识在应该在工业领域做些有意义的事情。像上个月国土安全部部长那样发布一份报告来分享信息是有用的,但这并不能直接带来安全。将这些设计上就不该连接到互联网的关键设施联网也不是问题的源头,正如DigitalBond公司的德尔彼得森上周在回应国土安全部报告中所指出的那样,设计上的安全漏洞和系统的脆弱节点需要修复。背后的政治逻辑非常清楚:越是被强调为关键的,在实际行动中越是难以实施。
    
    Second, the hype clouds badly needed visibility. A fascinatingproject at Free University Berlin has produced a vulnerability map. The mapuses publicly available data from Shodan, the Google for control systemhackers, and adds a layer of information crawled from the web to geo-locate thesystems that often should not be connected to the Internet in the first place.Red dots on the map show those systems. The United States looksas if it has the measles. But note that the map is incomplete:It is biased towards German products, the project's founder told me. If thatflaw can be fixed, the United States and other countries would look as bloodyred as Germany does already. The U.S. government's attention-absorbing emphasison offensive capabilities means it has very little visibility into what thisvulnerability map would actually look like.
    
    第二,炒作需要得到澄清。柏林自由大学一个引人关注的项目发布了脆弱性地图。地图根据SHODAN(Sentient Hyper-Optimized Data Access Network) 高级优化数据网络的公开可用数据、有关控制系统黑客入侵的搜索数据和从网页获取信息来进行地理定位的系统(不应该连接到互联网),地图上的红点标出了这些系统。
    
    美国看起来就像是个得了麻疹的病人。但是要注意的是地图并不完善:项目负责人告诉我地图对德国产品有偏见。如果这个缺陷得到修正的话,美国或者其他国家会和德国一样血呼啦啦。美国政府这么热衷于进攻性的能力建设,意味着对于脆弱性地图表现的事实并不关心。
    
    Third, sabotage and espionage arerather different things -- technically as well as politically. SCADA systemsare highly specific kit, often old and patched together over years, if notdecades. That means these systems are highly specific targets, not genericones. Affecting critical operations requires reprogramming these systems, notjust disrupting them; the goal is modifying output parameters in a subtle waythat serves the saboteur's purpose. With Stuxnet, the U.S. government providedthe -- so far -- most extreme and best-documented case study. The operationshowed that successful sabotage that goes beyond just deleting data is far moredifficult than successful espionage: It requires testing and fine-tuning anattack over many iterations in a lab environment, as well as acquiring highlyspecific and hard-to-get target intelligence. Stealing large volumes ofintellectual property from a commercial competitor, by contrast, is atechnically rather different operation -- there is little to no valuable IPhidden inside control systems. To put it bluntly: China and others have a highcommercial incentive to steal stuff, but they have no commercial incentive tobreak stuff. All threats are not created equal. What's needed is nuance,surgical precision, differentiation, and sober analysis -- not funk, flap, andfluster.
    
    第三,无论是从政治层面上看还是从技术层面上看,蓄意破坏行动和间谍行为都是截然不同的。工业控制体系安全标准是非常特殊的体系,老旧而且是多年甚至几十年的东西混合的。这意味着这些系统是非常个别具体的目标,不具有普遍性。关键操作需要重新编译这些系统而不是仅仅扰乱它们,微妙地来调整输出参数才符合破坏分子的想法。以震网为例,美国政府提供了非常好的学习案例。震网行动表明成功的破坏行动不只是简单地删除数据,这比成功的间谍行动难度大多了:它需要在实验室环境下多次的测试和操作,而且还需要非常特别和难以获取的目标情报。从竞争对手那里窃取大量信息是非常难的。坦率地说:中国和其他一些国家有很多商业动机来窃取信息,但是他们并没有动机来制造破坏。各种威胁的程度不一。我们需要的是严谨细致和理性的分析,而不是陷入惶恐和不安。
    
    Finally, hype favors the offense over the defense. The offenseis already sexier than the defense. Many software engineers who consider acareer in public administration want to head north to the dark cubicle at FortMeade, not bore themselves in the Department of Homeland Security -- if theyare not working happily in the Googleplex on bouncing rubber balls already. Ifthe NSA sucks up most of the available talent and skill and puts it to work onthe offense, the defense will continue to suffer. By overstating the threat,and by lumping separate issues into one big bad problem, the administrationalso inadvertently increases the resistance of powerful business interestsagainst a regulatory over-reaction.
    
    最终,炒作使得我们更倾向于进攻而不是防御。进攻也比防御更让人感兴趣。多数把在公共政府部门服务当做终身职业的软件工程师都想要到米德堡的暗室去工作,而不是在国土安全部度过无聊的一生——如果他们没在谷歌公司上班的话。如果国土安全部把现有的人手都投入到进攻方面来的话,那防御方面糟糕情况仍将继续。通过扩大威胁以及把孤立的小事情捏造编成大问题,政府无形中增加了商业利益不受过度监管的反弹。
    
    译注:米德堡,位于美国马里兰州,是美国国土安全部总部所在地。
    
    As President Obama mentioned in his State of the Union address,if we look back years from now and wonder why we did nothing in the face of realthreats, the answer may be straightforward: too much bark, not enough bite.
    
    如奥巴马总统在国情咨文报告中所说,如果我们在多年后回顾今天,质疑为什么我们在敌人和现实的安全威胁面前无所作为时,那么答案很简单:说的太多做的太少。
    
网友评论(2254299)2013-03-18 10:41


    评论翻译:
    
    MarkPelham
    Um, you areaware that it is pretty easy to trace locations for IP addresses right? Especially if you have the skills for complex code writing/reading andcyber security. I don't think you guys properly understand the technologyassociated with what's been going down. More on a policy side of things,what is somewhat amusing and myopic is the fact that the Chinesemilitary was so obviously aggressive. It leaves them wide openfor cyber attacks moving forward and all our government is going to say inreturn is "you started it."
    
    嗯,你应该知道追溯IP地址是很容易的,特别是在你掌握了复杂的代码读写和网络安全技术的时候。我不认为你们这些人能很好地理解这些技术以及正在发生的事情。从政策角度来看,中国军方如此明显的进攻性确实很有趣也很短视。这会让他们对即将到来的网络攻击门户洞开,我们政府唯一要说的就是“你先挑的事”。
    
    ed_robinson
    This piecereally got me reading on words of estimative probability. That's reallyinteresting.... fair to say that I won't be bothering with further commentaryby Rid or his book though.
    
    这篇文章吸引我非常认真地阅读理解对于可能发生的分析。这很有趣,要我说如果里德有进一步的分析文章或者书籍的话,我也会看的。
    
    andao
    A decentarticle, but it completely ignores the potential effects ofindustrial espionage in the weapons industry. I think this is afar, far greater threat than foreign hackers blowing up a nuclear power plant.
    Foreign countryX steals terabytes of data on F-22 weapons systems and develops a radar systemthat can easily detect it. Foreign country then provokes somehow, F-22'sare scrambled, and promptly blown to smithereens. This isn't alegitimate threat?
    Further,industrial espionage in the "long game" is also devastating. A nation's military is only going to be strong if it's economy can affordit. It's well established that China hacks foreign companies,steals their IP, and gives it to their own state owned enterprises. Theseenterprises then can sell the same product worldwide for cheaper, since theyhave no R&D investment. Since the only the the US makes any more isIP, this is really the whole ballgame.
    I agree that theMandiant report isn't as conclusive as news outlets have been saying, but Ithink it would be relatively easy to comprise US weapons systems with all thedata that's been stolen. I haven't seen a convincing argument that thisisn't a big problem.
    
    不错的文章,但是完全忽略了在军工产业的间谍行为的影响。我觉得那个影响比外国黑客摧毁一个核电厂来的打多了。
    
    如果X国窃取了F-22的TB的数据并据此制造雷达系统,那F-22就会很容易被侦测到。然后他们发起某种挑衅,F-22上当灰飞烟灭。这不就是可能的威胁吗?
    
    进一步说,工业间谍在“长期进程”中也极具破坏力。一个国家的军事要发展需要经济方面的支撑。有很明显的证据表明中国入侵外国公司盗窃技术成果提供给他们的国有企业。藉此他们的企业因为不需要研发费用,可以更低廉的价格卖同样的产品。目前美国唯一比中国多的就是技术成果,(窃取)这是个大麻烦。
    
    我也认同Mandiant的报告正如文章所说并不是那么确切的,但我想把被盗的数据和美国武器系统进行比对是相对容易的事情。我还没看到有人说这不是个大问题。
    
    bing520
    The US alsosteals the weapon secrets of a foreign country so as to upgrade our weapons.The US sends her spies all over the world. I am sure China has her spiesin the US. We don't start a war with China because of Chinese spiestrying to stealing data on Patriot missile. Nor would China shoot usbecause of our spies.
    There should bea set of rules governing cyberespionage. I don't know what type ofrules yet, but I doubt the US wants some rules restricting the use of ourcyberweapons, which are far superior. Chinese government has been callingfor such rules but we simply ignore. Obama talked about threat but the USrefuses to even recognize our use of cyberweapons.
    It isa reasonable strategy to say nothing about our cyberespionage game, not totie our own hands. The less our opponents know, the better off weare. Then, we can't deny Chinese are going to do everything it can tocatch up. How do you hone in your cyber-skills? I would say,"Do it every day until you master it."
    Cyberthreat is a real problem. We should constantly improve our defense andoffense. That's all we should do. No reason toover-react. Our intelligence officials are excellent inkeeping a low profile, but our citizens are getting angry and fail tounderstand the advantage of being silent. Cyber weapons are unlikenuclear bomb. You can't use the same attack virus over and over again..
    
    美国也同样从别人窃取武器技术秘密来升级自己的武器。美国的间谍遍布全球。我很确定中国也往美国派了间谍,我们不会因为中国间谍试图窃取爱国者导弹的技术情报就和它开战,中国也不会因为我们的间谍就向我们开枪。
    
    网络间谍行为需要一整套规则来规范。我不知道是怎样的规则,但我想美国不愿意制定某些网络武器的使用规则,因为我们的更先进。中国政府呼吁制定一些规则,但我们根本没搭理。奥巴马讨论这些威胁,但美国却连我们网络武器的使用都不愿意提。
    
    对我们的网络间谍活动只字不提是有道理的,这可以避免束缚我们自己的手脚。敌人知道的越少对我们越有利。我们同样不能否认中国正竭尽全力来试图赶上。如何提高你的网络技术,那我只能说“每天练习直到精通为止”。
    
    网络威胁是个现实问题。我们要不断提高网络攻防能力,这是我们要做的,没必要过度反应。我们的情报人员善于保持低调,但是普通民众却变得愤怒且不理解保持沉默的益处。网络武器和核武器并不一样,攻击病毒重复使用就没有效果了……。
    
    Al28
    US hacking all the world from many many years by different excuses and suckingtheir resources and if china didn,t hack them also US need excuse to keepbejing down and take some advantage on trade or others issue.MR USA your timegone and now look what this world do with u as u did with world before Sorry USA
    and keep calm still more will come!!!!!!
    
    美国一直都在用不同借口黑其他国家并从他们那里搜刮资源。即便中国没有黑他们,美国也会制造理由来压中国,在贸易或者其他方面占便宜。山姆你的好日子到头了,想想看你之前对世界上的其他国家做了什么,现在他们是怎么对待你的。对不起美国,别喊了,享受更多的那啥吧!!!
    
网友评论(941450)2013-03-18 10:44


    李菊福
    

    
    
    

关于网站 | 网站声明 | 用户反馈 | 合作伙伴 | 联系我们
Copyright © 2012年2月8日