【新唐人2011年7月18日訊】繼5月16號美國政府推出《網絡空間國際策略》後,7月14號,美國國防部又正式推出《網路安全行動戰略》。網路安全問題再次引起討論。網路安全問題至今沒有任何國際條約約束,美中兩國在網路安全的問題上更是長期存在分歧。
美國國防部副部長林恩在14號的新聞發佈會上說,在過去十年中,網路入侵者一直從「國防部承包商」的電腦上提取敏感性資料。今年三月在一個單一的入侵,就竊取了24000個文件。他說這是五角大樓制定所謂「網路戰略」的重要原因之一。
《路透社》報導,兩年來,美國與中國的學術專家一直在進行非正式的「網路安全對話」,試圖建立相關規則。但多數情況下,對話暴露出美中兩國在網路問題的巨大分歧,其中包括「監控電腦網路」、「網路戰爭」以及「信息控制」等問題。
「美國防務集團公司」中國問題專家詹姆斯.莫爾維農(James Mulvenon)最近在華盛頓的一次會議上指出,當美國專家想討論「保護電腦網路」的必要性時,中國專家就提出對網路安全截然相反的觀點。當談到「網路審查」時,中方立即表示否定,提出要談信息安全,也就是「既保護網路又監控網路內容」。兩方要談甚麼內容,一直沒有達成一致。
目前,針對美國高科技企業和政府機構的「網路襲擊」每天都有。許多人相信,這些襲擊主要來自中國,即便不是源於中國,也是在中國進行代理。
時事評論員伍凡:“中共在過去的10年來它也在積極的投資,大量發展它的網絡和它的網絡部隊。至少我所知道的資料,中共成立「網軍」(net-force)已經超過了10年,並且這是它的主要部隊,中共軍隊內部的一個編製部隊「網軍」。第二,它又成立了以地方民兵為骨幹的網民部隊,它的號召是打全民戰爭,人手一個電腦來圍攻美國。”
伍凡表示,今年5月份,英國媒體《天空新聞》記者到中國去實地採訪,在中國境內發現有一個龐大的網絡駭客部隊,在對西方國家的政府和企業進行有目地性的網絡攻擊行動,大多數都是來自於中共當局。據估計,目前每個月發出來自中共的攻擊有16億起。美國國防部每天所受的攻擊是幾百萬次,是5年之前的1萬倍。
伍凡認為,這是中共發動的「以人海戰術為特色」的網絡攻擊。
那麼,為甚麼中共在這個時候頻頻發動「網絡戰」呢?伍凡表示,中共用「網絡戰」的形式,想引起跟美國的衝突,製造美中之間的民眾矛盾,來轉移國內的巨大難題,如,社會矛盾、政治矛盾、經濟下滑等問題。
但是伍凡表示,中共從1986年開始建立網絡系統以來,軟件、硬體發展都靠美國。如果美國要反擊,中共會不堪一擊。
伍凡:“你看中共花了那麼多錢建立一個「金盾工程」,誰幫它造的?是美國的硬體公司Cisco 思科公司,美國的軟件公司Microsoft微軟,這兩家公司一「硬」一「軟」,那麼我想美國人一定知道,這個金盾工程所有它的弱點以及它的軟肋在哪裏,甚至我都很可能懷疑,美國人設的『木馬』,隨時可以把這個金盾工程給破解掉。”
經濟學家何清漣曾總結中共「金盾工程」的主要功能,一是封鎖信息,包括封鎖國外網站、網路交流關鍵字與電子郵件﹔以及IP地址封鎖﹔過濾網頁內容、網址、HTTPS證書,等等。二,對“重點”目標的所有網路活動實施監控,包括網吧監控、個人上網監控等。三,收集情報。 四,破壞,如劫持「功能變數名稱」,包括劫持個人電腦,發送病毒等。
而美國對民眾個人的信息流通從不干涉。林恩在「網路安全戰略」推介會上表示,美國正式推出的「網路安全戰略」,將系統保護美國防火牆、感測器、軟件和美國情報機構所收集的資料,僅僅是為了用於防禦和自衛反擊。
新唐人記者黎安安、蕭宇綜合報導。
After the U.S. government launched
the International Strategy for Cyberspace on May 16, 2011,
the U.S. Department of Defence unveiled the Pentagon’s
new “Strategy for Operating in Cyber-Space,” on July 14.
outlining five “strategic initiatives"
how the military will operate online.
To date, there are no international policies regarding cyber security,
and the U.S. and China have never met eye-to-eye on this issue.
In a speech at the National Defence University
in Washington, D.C. on July 14,
Deputy Defence Secretary William Lynn III said
that over the past decade,
cyber-attacks have targeted Western defence contractors
in an effort to secure sensitive military information.
A foreign intelligence service in March
stole 24,000 files in a single attack.
Lynn said that this is reason enough to
roll out the Pentagon’s new Cyber Strategy.
According to Reuters, for two years,
academic experts from the U.S. and China
have quietly held talks on cyber-security,
straining to establish rules.
The talks appear to have exposed a wide gap
between the U.S. and China
regarding almost everything virtual,
such as policing computer networks,
oderating cyber warfare,
and controlling information.
James Mulvenon, a China expert at the Defence Group Inc.,
said on a recent Washington conference that
whenever U.S. cyber experts want to discuss
the importance of “protecting computer networks,”
Chinese cyber experts would
voice a completely opposite opinion.
When discussing censorship, the Chinese side
wants to shift the topic to information security,
which is both protecting the network
and policing the content on the network.
It seems that both sides are unable
to agree on the main point of the talks.
Currently, cyber-attacks against high-tech U.S. enterprises
and governmental agencies happen every day.
Many people believe these attacks originate from China.
However, even if they don’t originate there,
they are believed to have been paid for by people in China.
Commentator Wu Fan: For the past 10 years,
the Chinese Communist Party (CCP)
has been actively investing in expanding its cyberspace,
and cyberspace net-force.
The CCP’s net-force is their main force,
and is now a recognized branch of the CCP military.
Secondly, they also established a paramilitary unit
consisting of average Internet users,
who can be called on to attack the U.S.
Wu Fan said, “In May, a Sky News reporter from the U.K.
went to China for an on-site interview.
He discovered that the CCP employs
an enormous army of hackers,
directing cyber-attacks at Western governments
and enterprises.
It is estimated that there are about 1.6 billion
cyber-attacks originating from the CCP, every month.
The U.S. Department of Defence
is being attacked several million times per day,
which is 10,000 times more per day
than just five years ago.”
Wu Fan believes that this is the CCP’s
“population tactics” on cyber-attacks.
Then why does the CCP frequently
launch network wars now?
Wu Fan thinks that the CCP is using cyberspace to
spark conflicts between U.S. and Chinese people,
in order to divert attention away from China’s current
social conflicts, political conflicts, and a declining economy.
Wu Fan said, since establishing
the Internet in 1986 in China,
the CCP has been dependent on the U.S.
for the development of software and hardware.
If the U.S. fights back,
the CCP would be very vulnerable.
Wu Fan: Look how much time
it took the CCP to develop the Golden Shield
Who helped in building it?
It is the American companies, Cisco and Microsoft.
Then I think that Americans must know
what weaknesses exist in the Golden Shield Project.
I even think that, maybe the Americans already built a Trojan to
destroy this Golden Shield Project, whenever they need to.”
Chinese economist He Qinglian summarized
the main functions of Golden Shield Project.
First, it blocks foreign websites, keywords,
and e-mail exchange network;
IP addresses; and filters web contents,
URL and HTTPS certificates.
Second, it monitors the targets’ network activities, including
cyber-cafe surveillance and Internet monitoring of individuals.
Third, it gathers intelligence.
Fourth, it sabotages, such as hijacking “domain names" and PCs,
and spreading viruses.
The U.S. doesn’t interfere with citizens’ flow of information.
Lynn said on “Network security strategy" promotional meeting
that the U.S. launched the strategy to systematically
protect the U.S. firewall, sensors, software and
the information collected by U.S. intelligence agencies.
It is used only for defence and self-defense.
NTD reporters Li Anan and Xiao Yu