【禁闻】网路安全问题 美中明显分歧

【新唐人2011年7月18日讯】继5月16号美国政府推出《网络空间国际策略》后,7月14号,美国国防部又正式推出《网路安全行动战略》。网路安全问题再次引起讨论。网路安全问题至今没有任何国际条约约束,美中两国在网路安全的问题上更是长期存在分歧。

美国国防部副部长林恩在14号的新闻发布会上说,在过去十年中,网路入侵者一直从“国防部承包商”的电脑上提取敏感性资料。今年三月在一个单一的入侵,就窃取了24000个文件。他说这是五角大楼制定所谓“网路战略”的重要原因之一。

《路透社》报导,两年来,美国与中国的学术专家一直在进行非正式的“网路安全对话”,试图建立相关规则。但多数情况下,对话暴露出美中两国在网路问题的巨大分歧,其中包括“监控电脑网路”、“网路战争”以及“信息控制”等问题。

“美国防务集团公司”中国问题专家詹姆斯.莫尔维农(James Mulvenon)最近在华盛顿的一次会议上指出,当美国专家想讨论“保护电脑网路”的必要性时,中国专家就提出对网路安全截然相反的观点。当谈到“网路审查”时,中方立即表示否定,提出要谈信息安全,也就是“既保护网路又监控网路内容”。两方要谈什么内容,一直没有达成一致。

目前,针对美国高科技企业和政府机构的“网路袭击”每天都有。许多人相信,这些袭击主要来自中国,即便不是源于中国,也是在中国进行代理。

时事评论员伍凡:“中共在过去的10年来它也在积极的投资,大量发展它的网络和它的网络部队。至少我所知道的资料,中共成立“网军”(net-force)已经超过了10年,并且这是它的主要部队,中共军队内部的一个编制部队“网军”。第二,它又成立了以地方民兵为骨干的网民部队,它的号召是打全民战争,人手一个电脑来围攻美国。”

伍凡表示,今年5月份,英国媒体《天空新闻》记者到中国去实地采访,在中国境内发现有一个庞大的网络骇客部队,在对西方国家的政府和企业进行有目地性的网络攻击行动,大多数都是来自于中共当局。据估计,目前每个月发出来自中共的攻击有16亿起。美国国防部每天所受的攻击是几百万次,是5年之前的1万倍。

伍凡认为,这是中共发动的“以人海战术为特色”的网络攻击。

那么,为什么中共在这个时候频频发动“网络战”呢?伍凡表示,中共用“网络战”的形式,想引起跟美国的冲突,制造美中之间的民众矛盾,来转移国内的巨大难题,如,社会矛盾、政治矛盾、经济下滑等问题。

但是伍凡表示,中共从1986年开始建立网络系统以来,软件、硬体发展都靠美国。如果美国要反击,中共会不堪一击。

伍凡:“你看中共花了那么多钱建立一个“金盾工程”,谁帮它造的?是美国的硬体公司Cisco 思科公司,美国的软件公司Microsoft微软,这两家公司一“硬”一“软”,那么我想美国人一定知道,这个金盾工程所有它的弱点以及它的软肋在哪里,甚至我都很可能怀疑,美国人设的‘木马’,随时可以把这个金盾工程给破解掉。”

经济学家何清涟曾总结中共“金盾工程”的主要功能,一是封锁信息,包括封锁国外网站、网路交流关键字与电子邮件﹔以及IP地址封锁﹔过滤网页内容、网址、HTTPS证书,等等。二,对“重点”目标的所有网路活动实施监控,包括网吧监控、个人上网监控等。三,收集情报。 四,破坏,如劫持“功能变数名称”,包括劫持个人电脑,发送病毒等。

而美国对民众个人的信息流通从不干涉。林恩在“网路安全战略”推介会上表示,美国正式推出的“网路安全战略”,将系统保护美国防火墙、感测器、软件和美国情报机构所收集的资料,仅仅是为了用于防御和自卫反击。

新唐人记者黎安安、萧宇综合报导。

After the U.S. government launched
the International Strategy for Cyberspace on May 16, 2011,
the U.S. Department of Defence unveiled the Pentagon’s
new “Strategy for Operating in Cyber-Space,” on July 14.
outlining five “strategic initiatives"
how the military will operate online.
To date, there are no international policies regarding cyber security,
and the U.S. and China have never met eye-to-eye on this issue.

In a speech at the National Defence University
in Washington, D.C. on July 14,
Deputy Defence Secretary William Lynn III said
that over the past decade,
cyber-attacks have targeted Western defence contractors
in an effort to secure sensitive military information.
A foreign intelligence service in March
stole 24,000 files in a single attack.

Lynn said that this is reason enough to
roll out the Pentagon’s new Cyber Strategy.
According to Reuters, for two years,
academic experts from the U.S. and China
have quietly held talks on cyber-security,
straining to establish rules.

The talks appear to have exposed a wide gap
between the U.S. and China
regarding almost everything virtual,
such as policing computer networks,
oderating cyber warfare,
and controlling information.

James Mulvenon, a China expert at the Defence Group Inc.,
said on a recent Washington conference that
whenever U.S. cyber experts want to discuss
the importance of “protecting computer networks,”
Chinese cyber experts would
voice a completely opposite opinion.

When discussing censorship, the Chinese side
wants to shift the topic to information security,
which is both protecting the network
and policing the content on the network.
It seems that both sides are unable
to agree on the main point of the talks.
Currently, cyber-attacks against high-tech U.S. enterprises
and governmental agencies happen every day.
Many people believe these attacks originate from China.

However, even if they don’t originate there,
they are believed to have been paid for by people in China.
Commentator Wu Fan: For the past 10 years,
the Chinese Communist Party (CCP)
has been actively investing in expanding its cyberspace,
and cyberspace net-force.
The CCP’s net-force is their main force,
and is now a recognized branch of the CCP military.
Secondly, they also established a paramilitary unit
consisting of average Internet users,
who can be called on to attack the U.S.

Wu Fan said, “In May, a Sky News reporter from the U.K.
went to China for an on-site interview.
He discovered that the CCP employs
an enormous army of hackers,
directing cyber-attacks at Western governments
and enterprises.

It is estimated that there are about 1.6 billion
cyber-attacks originating from the CCP, every month.
The U.S. Department of Defence
is being attacked several million times per day,
which is 10,000 times more per day
than just five years ago.”

Wu Fan believes that this is the CCP’s
“population tactics” on cyber-attacks.
Then why does the CCP frequently
launch network wars now?

Wu Fan thinks that the CCP is using cyberspace to
spark conflicts between U.S. and Chinese people,
in order to divert attention away from China’s current
social conflicts, political conflicts, and a declining economy.

Wu Fan said, since establishing
the Internet in 1986 in China,
the CCP has been dependent on the U.S.
for the development of software and hardware.
If the U.S. fights back,
the CCP would be very vulnerable.

Wu Fan: Look how much time
it took the CCP to develop the Golden Shield
Who helped in building it?
It is the American companies, Cisco and Microsoft.

Then I think that Americans must know
what weaknesses exist in the Golden Shield Project.
I even think that, maybe the Americans already built a Trojan to
destroy this Golden Shield Project, whenever they need to.”
Chinese economist He Qinglian summarized
the main functions of Golden Shield Project.

First, it blocks foreign websites, keywords,
and e-mail exchange network;
IP addresses; and filters web contents,
URL and HTTPS certificates.

Second, it monitors the targets’ network activities, including
cyber-cafe surveillance and Internet monitoring of individuals.
Third, it gathers intelligence.
Fourth, it sabotages, such as hijacking “domain names" and PCs,
and spreading viruses.

The U.S. doesn’t interfere with citizens’ flow of information.
Lynn said on “Network security strategy" promotional meeting
that the U.S. launched the strategy to systematically
protect the U.S. firewall, sensors, software and
the information collected by U.S. intelligence agencies.
It is used only for defence and self-defense.

NTD reporters Li Anan and Xiao Yu

相关文章
评论