-
(单词翻译:双击或拖选)
By Deborah Tate
Capitol Hill
04 August 2006
Among the last issues to come before the U.S. Senate before lawmakers began their August recess1 were cybercrime and cybersecurity. Senators ratified2 an international treaty aimed at cracking down on crimes that are facilitated by the Internet, and they assessed how vulnerable U.S. government computer networks are to potential attack.
---------
The Senate ratified the Council of Europe's Convention on Cybercrime, which calls on signatories to share electronic information to boost efforts to combat crimes facilitated by the Internet.
In a written statement, Senate Majority Leader Bill Frist noted3 that terrorists use computers to plan and carry out bombings and murder, and child predators4 use computers to commit a variety of crimes against children from kidnapping and murder to sex trafficking and child pornography. He said the treaty will strengthen the ability of law enforcement and the intelligence community to prevent acts of terrorism and protect children around the world from predators.
U.S. Attorney General Alberto Gonzales said the treaty is in full accord with all U.S. constitutional protections, such as free speech and other civil liberties, and will require no change to U.S. laws.
The accord has been signed by 38 European nations, as well as the United States, Canada, Japan and South Africa.
In a related move, lawmakers are assessing the vulnerability of U.S. government computer networks.
Tom Noonan, president of Internet Security Systems, which advises governments and private companies worldwide about protecting computer networks, told a Senate panel that U.S. government efforts are woefully inadequate5:
"We, as a nation, are not doing nearly enough to preempt6 the types of attacks that could debilitate7 our critical networked infrastructure8," he said.
Senator Tom Coburn, an Oklahoma Republican, echoed the concern.
"What would happen to this economy if you had a four-week disruption, interruption of the Internet?" he asked. "We would be on our back, and everybody knows that. And yet the urgency to make sure that that cannot happen or if it did happen, recover quickly, I do not see anywhere except the private sector9."
A new report by the U.S. Government Accountability Office (GAO), the congressional watchdog agency, criticizes the Department of Homeland Security for failing to prepare for a large-scale disruption of government networks.
Keith Rhodes is the GAO's chief technologist.
"DHS has developed high-level plans for infrastructure protection and a national disaster response, but components10 of these plans that are to address internet recovery are incomplete and inadequate," he said.
The Department of Homeland Security's Undersecretary of Preparedness, George Foresman, acknowledges more needs to be done, but says the situation is not as serious as the GAO's Rhodes suggests.
"I think his assessment11 in terms of progress is much bleaker12 than what is the actual progress to date," he noted.
Tom Noonan of Internet Security Systems suggests an assistant secretary of Homeland Security for Cyber Security be appointed to coordinate13 efforts with the private sector as a first step toward protecting the government's online infrastructure.
1 recess | |
n.短期休息,壁凹(墙上装架子,柜子等凹处) | |
参考例句: |
|
|
2 ratified | |
v.批准,签认(合约等)( ratify的过去式和过去分词 ) | |
参考例句: |
|
|
3 noted | |
adj.著名的,知名的 | |
参考例句: |
|
|
4 predators | |
n.食肉动物( predator的名词复数 );奴役他人者(尤指在财务或性关系方面) | |
参考例句: |
|
|
5 inadequate | |
adj.(for,to)不充足的,不适当的 | |
参考例句: |
|
|
6 preempt | |
v.先发制人;先取 | |
参考例句: |
|
|
7 debilitate | |
v. 使衰弱 | |
参考例句: |
|
|
8 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
9 sector | |
n.部门,部分;防御地段,防区;扇形 | |
参考例句: |
|
|
10 components | |
(机器、设备等的)构成要素,零件,成分; 成分( component的名词复数 ); [物理化学]组分; [数学]分量; (混合物的)组成部分 | |
参考例句: |
|
|
11 assessment | |
n.评价;评估;对财产的估价,被估定的金额 | |
参考例句: |
|
|
12 bleaker | |
阴冷的( bleak的比较级 ); (状况)无望的; 没有希望的; 光秃的 | |
参考例句: |
|
|
13 coordinate | |
adj.同等的,协调的;n.同等者;vt.协作,协调 | |
参考例句: |
|
|