-
(单词翻译:双击或拖选)
There is new information today about Russia obtaining highly classified information about how the U.S. military protects its computer networks and how it conducts electronic spying.
Hari Sreenivasan has that story.
First, classified material was stolen from the National Security Agency by a contractor2.
The article doesn't say who the contractor was, but that he used Kaspersky Lab antivirus software, which is believed to be compromised by Russian intelligence.
For more on all of this, we turn to Shane Harris, who broke the story, covering national security and intelligence issues for The Wall Street Journal.
Shane, what do we know that was compromised? What do the Russians have?
Well, what we are told this is that was information that describes or deals with offensive and defensive5 computer network operations at NSA,
so, basically the tools and techniques, the codes that the NSA would use to hack3 into foreign computer systems
and the tools and techniques they use to protect computer networks inside the United States.
This is very critical information that goes to what intelligence agencies call sources and methods,
and it's the kind of thing that is most jealously guarded inside the NSA and is extremely classified.
No. What happened was the contractor removed this classified information unauthorized from his workplace and took it home, we are told,
to work on it there, is what authorities believe, and loaded it on to a personal computer.
And that computer was running the Kaspersky antivirus product. This is a commercially available antivirus product.
Probably many watching this tonight may have it on their own home computers.
And what authorities believe is that that system was then used to alert hackers7 in Russia to the files that were on his machine, which were then removed from it by Russia.
So the software that is scanning his computer, looking for sensitive files, sends a message to Russia saying,
hey, here is a sensitive file, and since they have some sort of a backdoor, they can access it?
Well, there is a sequence here that we're still not entirely8 sure, but, essentially9, yes, this is the idea,
that it alerts people back in Russia, who are then able to take advantage,
knowing what they know, from the software, then home in on this individual's computer and obtain this information.
Now, it is important to say that Kaspersky says they do not provide any kind of access that is unauthorized or illegal,
and they do not participate in computer operations of this nature, cyber-spying on behalf of governments.
So there still is some question about the sequence of events.
But what officials have concluded is that, if not for this Kaspersky product, they do not believe that this information would have been obtained.
Now, just a couple of weeks ago, we had members of the Intelligence Committees -- members of intelligence community sitting in front of the Senate panel.
And when they were asked whether or not they would put this kind of software on their own computers, they unanimously said no.
And it looks like the government's already taking steps to try to make sure that this software is not available to government agencies, right?
That's right. In fact, last month, the Homeland Security Department issued a directive
prohibiting all federal departments and agencies in the U.S. government from either buying these products and services from Kaspersky or using them.
And they were told to get rid of them if they were using them.
That is an extraordinary measure for the government to take. This is a product that is sold in America.
It has been sold, been sold in big box stores. So that really underscored the extent to which officials,
And let's talk a little bit about the timeline. When did this hack happen,
I mean, given the context of all that we're investigating about Russia and their influence on the elections?
What we know so far is that the incident itself occurred in 2015, but it wasn't discovered until the spring of 2016.
So this would be before the election campaign really kicked off in earnest.
But what is interesting about that spring 2016 period is that is when intelligence agencies
now say that they were starting to detect the first signs of Russia beginning to interfere11 in the U.S. elections.
Now, we don't know that there is a direct line between what was going on with this contractor and that activity,
but it does appear that there may have to some degree been coincident,
and that the activity against the contractor may have even preceded the Russian interference in the elections,
and certainly preceded the period before which the U.S. government really became more alert to that.
All right, Shane Harris of The Wall Street Journal, thanks so much. Thank you. undefined
点击收听单词发音
1 breaches | |
破坏( breach的名词复数 ); 破裂; 缺口; 违背 | |
参考例句: |
|
|
2 contractor | |
n.订约人,承包人,收缩肌 | |
参考例句: |
|
|
3 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
4 hacked | |
生气 | |
参考例句: |
|
|
5 defensive | |
adj.防御的;防卫的;防守的 | |
参考例句: |
|
|
6 desktop | |
n.桌面管理系统程序;台式 | |
参考例句: |
|
|
7 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
8 entirely | |
ad.全部地,完整地;完全地,彻底地 | |
参考例句: |
|
|
9 essentially | |
adv.本质上,实质上,基本上 | |
参考例句: |
|
|
10 espionage | |
n.间谍行为,谍报活动 | |
参考例句: |
|
|
11 interfere | |
v.(in)干涉,干预;(with)妨碍,打扰 | |
参考例句: |
|
|