-
(单词翻译:双击或拖选)
Internet Security Threats
From VOA Learning English, welcome back to AS IT IS. I’m your host Mario Ritter.
China officially has its new leaders in place. This year’s National People’s Congress named Xi Jinping president and Li Kejiang premier1. Listen to some of the issues that are gaining importance in China including, the environment. But first, we hear about concerns over Internet security threats coming from China.
President Obama's National Security Advisor2 Tom Donilon has said that Chinese cyber-attacks are threats to both national security and the economy. A recent report by the Internet security company Mandiant says 90 percent of the cyber-attacks on the United States come from China. Two cyber-security experts spoke3 on VOA’s “Encounter” program about why the issue is now getting a lot of attention. Christopher Cruise has more.
Jessica Herrera-Flanigan is a technology security expert in Washington. She says the attacks in cyberspace4 are as serious as the threat of global terrorism. There are two main ways that cyber-attacks can hurt the country. One is by targeting important systems that provide things like electricity, water or communications that are needed for daily life.
“What we are increasingly seeing are threats against our critical infrastructure5. So, we’re talking about threats against our energy sector6, the banking7 sector, the telecommunications, smart grids8, oil and gas, basically, all the critical assets that we have and that operate our day to day living.”
She says cyber-attacks also target companies that are not vital but can affect the economy if their business is hurt. Lost business means fewer jobs, which would affect the economy. She says both national and economic security are in serious danger from computer hacking9.
Jason Healey is an expert in international cooperation, competition and conflict in cyberspace with the Atlantic Group in Washington. He agrees that cyber-attacks are a problem. But he does not believe they are as serious as terrorism. He says no loss of life has yet taken place. But he does agree that the economic effects of hacking are real.
“When we look at the economic damage that might be happening, the theft of trade secrets, that is [a] significant concern.”
Jessica Herrera-Flanigan says she is not surprised that the Obama administration is voicing its concerns now about cyber-security.
“It’s a recognition that there are attacks going on daily across the scope of businesses and government that need to be addressed, and that those attacks are coming from China and possibly other like-minded nations.”
Jason Healey says it is important to define the terms of the discussion when discussing cyber-attacks. He says that, at this time, physical damage is not being done.
“Much of what we are talking about here is actually intrusions: breaking into a computer and taking things, but not really breaking the computer.”
Intrusion into computer systems, or hacking, has taken place for many years. The difference now, he says, is that the United States has publicly called on Chinese officials to do something about it.
China says it too is the victim of cyber-attacks.
Jessica Herrera-Flanigan says there are two ways of dealing10 with cyber-attacks. The first is through trade relations. China is a member of the World Trade Organization and has entered agreements that bar it from stealing trade secrets. Another response is by answering attacks with attacks. But, she says, offensive action can be complicated and may not have a good result. corruption11. He says publicly punishing companies that pay or accept bribes12 has done a lot to limit official corruption in many countries. He says the same method can be used against companies that are known to use hacking to gain trade secrets.
“The world has made great strides within the last 15 years on corruption. I think it would be interesting if the U.S. were to go for a similar policy to vilify13 any corporation that was known to be stealing industrial secrets or accepting industrial secrets, especially if they use them in products.”
Both experts agree that the main countries that are able to carry out cyber warfare14 are China, Russia and the United States. They say those and other nations need to agree on rules governing acceptable behavior in cyberspace.
China’s National People’s Congress ended on Sunday. At the event, Xi Jinping was officially named China’s president. The Congress also named Li Keqiang as the new premier. Li Keqiang spoke to reporters after the meetings. Karen Leggett tells us more.
The new premier rejected accusations15 from the United States of Chinese computer hacking. He said the two countries should not make accusations against each other without evidence. Mr. Li said they should instead work together on the issue of cyber security. He noted16 that China is a big target of computer attacks itself.
VOA spoke to Stephen Lewis, a China expert at Rice University in Houston, Texas. He spoke about some of the issues that were discussed at the National People’s Congress. He says China and the United States are still seeking to understand the extent of cyber security threats they face. Stephen Lewis says it still is not clear which agencies, in either country, would lead discussions about the issue.
“While they’re trying to assess the threat, both countries are trying to determine who should sit down at the table.”
Treasury17 Secretary Jack18 Lew holds economic talks with Chinese officials this week. The talks are expected to include the issue of cyber-attacks from China on American businesses, including media companies. Targets included the New York Times, Wall Street Journal and Washington Post.
Another issue that China’s new Premier spoke about was the environment. His statements were a sign to Stephen Lewis that those issues are of growing importance.
“I think environment [issues] will be increasingly important. I thought it was very interesting that Li Keqiang, the premier, mentioned in there that he said we will work on cleaning cities including the city that I live in.”
China’s new president, Xi Jinping, spoke to the National People’s Congress on Sunday.
The Congress is largely considered ceremonial, with more than 3,000 delegates voting on government positions and committees. But there were over 800 opposing votes from members of an environmental protection committee. The vote may have demonstrated sympathy with public anger over severe air and water pollution.
I’m Karen Leggett. Thank you for joining us today.
1 premier | |
adj.首要的;n.总理,首相 | |
参考例句: |
|
|
2 advisor | |
n.顾问,指导老师,劝告者 | |
参考例句: |
|
|
3 spoke | |
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说 | |
参考例句: |
|
|
4 cyberspace | |
n.虚拟信息空间,网络空间,计算机化世界 | |
参考例句: |
|
|
5 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
6 sector | |
n.部门,部分;防御地段,防区;扇形 | |
参考例句: |
|
|
7 banking | |
n.银行业,银行学,金融业 | |
参考例句: |
|
|
8 grids | |
n.格子( grid的名词复数 );地图上的坐标方格;(输电线路、天然气管道等的)系统网络;(汽车比赛)赛车起跑线 | |
参考例句: |
|
|
9 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
10 dealing | |
n.经商方法,待人态度 | |
参考例句: |
|
|
11 corruption | |
n.腐败,堕落,贪污 | |
参考例句: |
|
|
12 bribes | |
n.贿赂( bribe的名词复数 );向(某人)行贿,贿赂v.贿赂( bribe的第三人称单数 );向(某人)行贿,贿赂 | |
参考例句: |
|
|
13 vilify | |
v.诽谤,中伤 | |
参考例句: |
|
|
14 warfare | |
n.战争(状态);斗争;冲突 | |
参考例句: |
|
|
15 accusations | |
n.指责( accusation的名词复数 );指控;控告;(被告发、控告的)罪名 | |
参考例句: |
|
|
16 noted | |
adj.著名的,知名的 | |
参考例句: |
|
|
17 treasury | |
n.宝库;国库,金库;文库 | |
参考例句: |
|
|
18 jack | |
n.插座,千斤顶,男人;v.抬起,提醒,扛举;n.(Jake)杰克 | |
参考例句: |
|
|