你的位置:天山云海综合信息港 >> 资讯 >> English News >> 详细内容 在线投稿

China probing U.S. military networks

排行榜 收藏 打印 发给朋友 举报 来源: United Press International   发布者:tianshanyunhai
热度134票  浏览48次 【共0条评论】【我要评论 时间:2007年6月15日 14:23

WASHINGTON -- Chinese hackers are continually probing U.S. military networks, primarily for technical information, a top U.S. general said.

"... For the most part, what we're seeing is industrial espionage in large measure," said Air Force Lt. Gen. Robert Elder Jr., the Air Force service component to Joint Task Force Global Network Operations at U.S. Strategic Command, Offut Air Force Base, Neb. "Even when they go against our networks that's what they are looking for, system information."

"You can spend 10 to 15 years building a technology or someone can give it to you by leaving it on the table," he said.

China has identified "domination of the electromagnetic spectrum" as one of five military goals.

"China has put a lot of resources into this businesses (but) we have so many nation states (doing that) it's hard to pick your favorite one," he said. "They're the only nation that's been quite that blatant."

Elder said nearly all countries have active cyber-warfare programs, except for North Korea.

"We've concluded there must be only one laptop in North Korea," he joked. "They don't pose a cyber threat."

The U.S. military is extremely reliant on computer networks and satellite communications for warfighting, both of which make computer network attack, also known as information warfare, a tempting area of investment and development for other nation states.

The U.S. military is similarly investing, both in offensive capabilities (the ability to compromise enemy sensors, toy with data bases and interfere with battle management systems) and defensive capabilities.

"Anything we can do to someone else we have to defend ourselves against," he said.

The biggest vulnerability is the "insider threat" -- not necessarily a spy, but a military user who inadvertently opens a "back door" to a secure network with bad security practices, like uploading unapproved software or having an easily hacked password.

搜索
顶:9 踩:12
对本文中的事件或人物打分:
当前平均分:-0.67 (42次打分)
对本篇资讯内容的质量打分:
当前平均分:-1.08 (25次打分)
【已经有46人表态】
6票
感动
6票
震惊
2票
4票
路过
5票
高兴
11票
同情
3票
难过
5票
无聊
2票
愤怒
2票
搞笑
上一篇 下一篇
发表评论
换一张

网友评论仅供网友表达个人看法,并不表明本网同意其观点或证实其描述。

查看全部回复【已有0位网友发表了看法】

网络资源

声明:本站所有新闻信息均为网络转载,但不表示本站同意其观点及说法!如有任何问题请联系被转载方并通知本站屏蔽该新闻,谢谢!