999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Cyberspace: Game-play in the New Security Realm

2013-01-13 05:32:34ByWangYong
Peace 2013年4期

By Wang Yong

?

Cyberspace: Game-play in the New Security Realm

By Wang Yong

Strategic Research Department,National Defense University

On 20 March 2013, as the Korea-U.S. joint military exercises against the DPRK into the climax, South Korea suddenly suffered massive hacker attacks, more than 32,000 computers and servers were damaged by the attacks, including six hackers from the same organization. Although the hackers source of the attacks is yet to be verified, wide-raging speculations on the peninsula "cyber-war" as a prelude to real war has aroused severe worries. In this connection, the U.S. cyber warfare commander Alexander on 12 March 2013 announced while testifying before the Congress that the United States will build 40 new network task forces, of which 13 will be used to launch intrusion, 27 for full-time training and monitoring. These indicate that security problems generated by competition for cyberspace have become a new real challenge.

Cyberspace Expands Social Needs But Also Changes Traditional Security Boundaries

Cyberspace is an information exchange domain based on interdependent networks of information infrastructure, which consists of Internet, telecommunications networks, computer systems as well as embedded processors and controllers by key industries, and formulates an interdependent digital information processing environment. This unique carrier organically integrates the national public networks, critical infrastructure networks and specialized defense networks onto an "information highway", and provides a variety of convenient services for modern life and safety and security.

Relevant data shows that there are in the world currently at least 12 billion networked computers and devices, number of Internet users more than 2.0 billion , while the number of Internet users in China accounts for 34.6% of the total users, and up to 280 million mobile Internet users. It can be said the networks "nerve endings" have been extended to all areas of society, penetrated into the political, economic, military, cultural aspects, and other aspects of life. Whether it is production or life, is almost inseparable from information networks. Meanwhile, security problems caused by the networks are also increasing. According to the "Computer Manager" monitoring reports, fraud URL blocked off in only 2012 in China reached 4.48 billion, with daily average of 12 million malicious URL blocked. The CNCERT sampling monitoring in 2011 found that about 47,000 foreign IP addresses as the Trojan horse or "zombie" network control servers involved in controlling up to 8.9 million PC controllers. Obviously, we are trapped in a "network storm" shocks.

This also shows that today's security problems will occur not only along the traditional "border lines", and the danger may be just on our side. Cyberspace security problems are not only significantly harmful, but also can exert wide-ranging impacts. Maybe one day when one wakes up and finds that your bank card fails or deposits are cleared, the stock exchange cannot be in normal operation, the national financial order is out of control; gas stations cannot refuel, most or all of the city traffic lights are off with the whole city in traffic chaos; fixed telephones and mobile phones are unable to get through, computers or TVs are Huaping or black, the surveillance equipments and communication systems of the task forces on strategic duty fail, the telecommunication, media and communications systems of a locality or an entire region are in an abnormal state ...... This science that is previously found in fiction movies or espionage films only may emerge at any time in real life. These new security problemsrising from the cyberspace have made the security boundaries become more blurred, and strategic game-play for security extended from the traditional Arms days to electromagnetic fields, state or non-state organizations and individuals. And the cyberspace will have a dual identity of both cyberspace security victims and security interests defenders. Cyberspace is becoming an important aspect affecting social stability and national security, and ensuring cyberspace security is a formidable task.

"Alternative Operations" Based on Cyberspace Are Becoming Routine, and Classic Cases Are Worth Further Studies

If more attention was paid to the "precision operation" by applying high-tech weaponry during the Gulf War in the early 1990s of the 20th century, then, during the Iraq war in the beginning of this century, attention is not only given to the show of the traditional battles operation, but, "alternative operations" based on cyberspace -- "cyberwar" in the new form-- has become increasingly clearer. As early as the year (2002) before launching of the Iraq war, the U.S. Navy established a Cyber Warfare Command, and then the U.S. cyber warfare task forces and the operational concept have also rapidly developed and become an important channel for planning and implementing the "war to overthrow Saddam". Relevant information shows that the then President George W. Bush in July 2002 signed the National Security Presidential Decree No. 16. This Presidential Decree puts forward guiding principles to launch cyber attacks against a "hostile country" such as Iraq. In the following year, the cyber warfare troops under the command of two-star general D. Brian, in line with the "Presidential Decree" requirements and the Department of Defense plans, orchestrated the "cyber warfare" in the "Iraqi Freedom Actions" in 2003. One of the most effective means is to use various "cyber intrusion" to launch long large-scale "soft attacks" against computer networks for major departments of the Iraqi government and military. In addition to blacking out the cyber networks of Iraq (especially command and communication systems), the intrusion also sent bulk emails on exposing the crimes of Saddam Hussein family and inducing Iraqi Government officials and military commanders, and the majority of ordinary people using network mailbox to capitulate, thus, greatly undermined their will to resist and contributed to quick disintegration of Iraqi "Republican Guard" and "resistant forces" under the military strike.

During the 2011 Libyan crisis intervention, the United States again used the "cyberwar" as an effective means in actual operation. After the "Odyssey Dawn" operation, the United States ostensibly handed over the command of military action to NATO, and pushed the "unified force action" of the British and French air and naval forces on to front line, but actually carried out another war in cyberspace. In this online war without gunpowder smoke, the United States operated a large number of professional and non-professional cyber warfare forces for launching a massive "wireless network intrusion" against Libya. In order to easily grasp first-hand information, CEOs of a number of U.S. companies to provide network attack techniques were all in the "front line" in Benghazi and Tripoli. In this "Cyber Dawn" operation, the United States combined the use of conventional fixed cyber attack force and a dynamic cyber attack force composed of the airborne, ship-launched and a variety of electronic warfare platforms carried by special operations forces to intervene and suppress the Libyan government military command and control systems, and even the 32ndand 9thbrigade under the direct command of Gaddafi were also intruded and controlled by American special cyber warfare forces. Through "taking over" Libyan authorities’ computer networks (primarily wireless networks), the U.S. and NATO command systems not only disturbed Gaddafi's position, but also grasped the dynamics of himself and his followers so as to constantly adjust the strategy on targets. So these provide a near real-time "battlefield guide" for NATO to carry out more effective military strikes as well as coordinate with the Libyan "National Transitional Council" and the armed opposition’s "Down with Gaddafi actions". This fully shows a modern version of a strategist winning thousands of miles away.

Following the crisis in Libya, Syria in the Middle East becomes the "storm eye" of another crisis influenced by the "Arab Spring". The crisis has lasted more than two years and "spilled over" to Syria's neighboring countries, then, it is difficult to predict what impacts it will exert on the regional situation and the international pattern. Although there is no systematic reports on this crisis regarding "cyberspace" contest, yet, it is not difficult to sniff "cyber war" clues from the reports on West’s continuously cooking the Syrian chemical weapons issue as well as senior military commanders and officials from the government repeatedly abandoned Syrian Bashar regime. Previously, Natanz nuclear reactor in 2009 suffered virus (Stuxnet) attacks and paralyzed, which raised more awareness of "cyberwar" great destructive power. Following the "Stuxnet", there has appeared more powerful "Flame" virus, which has "patronized" tens of thousands of global industrial data control systems. The code of this virus is extremely complex and has other unique capabilities, which can cover up traces of online fraud, identify targets and destroy hardware (including damages of physically independent network facilities), and which can be hardly manufactured by average countries or non-governmental organizations unless advanced technology and strong professionals teams are available. This will also guide the concerned watch on Iran's main adversaries such as the United States, Israel, etc. In this connection, the "Cyberspace International Strategy" and "Cyberspace Action Strategy" released by the Obama Administration in 2011 not only emphasize the necessity of developing cyber attack facilities and implementing cyber deterrence, but also view cyber attack as an "act of war", and claim to return "a retaliatory strike". This indicates that new military preparations for response to the cyberspace threats have become increasingly real and urgent.

Various Countries Compete for Developing Cyberspace Strategy and Competition for "Cyberspace Control Power" Will Become More Intense

In the year 2010, Assange and "WikiLeaks" constitute open challenges to the Western major powers. The website disclosed 250,000 U.S. diplomatic documents, which set off a cyberspace individuals frenzy against the state, and sent the United States in "Diplomatic 9/11" panic. The desecration of the Islamic Prophet in a movie on the Internet has produced magnificent anti-American sentiment among people in Muslim countries, and ultimately led to American Ambassador in Benghazi, Libya burned dead. Another phenomenon is also reflected: a "cyberwar" will be implemented both ways and the front line is very vague, even if a country with very advanced cyber -network technology also faces an enormous challenge of cyber-network security. An undeniable fact is that with the increasing popularity of cyber-networks, our "security weakness" is also more exposed. Today, not only a country, but smaller "non-governmental actors" and even individuals may become a network security constraint. In view of this, 11 countries in 2011 had developed a "cyber-network security strategy". Having released a new, the Obama Administration also has issued aconsecutively, and paralleled the cyber-network, nuclear and space for the same national security strategic attention, established a unified cyber electromagnetic space command, promoted the "Einstein" projects and implemented the "X- plan" as well as formed 40 "Cyber-network Task Force", etc. Britain, Austria, Germany and some other NATO countries have also released their own "Cyberspace Security Strategy", and actively participated in a series of exercises by the U.S.-led "National Cyber Range" test and the "cyber-network alliance". Neighboring Russia, South Korea, Japan, etc., have also established special cyber warfare forces and strengthened "cyber-network sovereignty" consciousness .

If competition for "controlling air" and "controlling sea" is generally the focus of the war in the last century, then attaining "cyber-network power" will become contending priory for war and non-war actions in the new century. Thus, it is not difficult to explain why the United States, in early 2013 on the pretext of a research report released by Mandy Angte cyber-network security ompany, cooked the so-called "hacking" acts by "China cyber warfare forces" located in Shanghai. In fact, the United States whips up a public opinion and looks for reasons in order to establish its code of conduct for cyberspace (i.e., cyber-network voice). Chinese Defense Ministry spokesman stated that the U.S. company report is neither professional nor based on facts, IP addresses tracking shows that in 2012 cyber-networks of China's Defense Ministry and military cyber-networks monthly suffered intrusions from abroad up to 144,000 times, of which 62.9 percent from the United States. It can be seen that it is China rather than the United States that is threatened by is cyber- networks.

These phenomena remind us that the security alert under the background of informationization has extended all-dimensionally, and preparedness should be related more to technology, intelligence and adaptability to the new security environment. In the face of increasingly fierce competition for cyberspace, to defend the "new defense mobile frontier" sovereignty and security becomes a very difficult task. In view of this, it is necessary to update the traditional concept of security and the new threats from cyberspace, virtual but existing everywhere, and difficult to distinguish but clearly marked, and take it into account for the national security strategy planning, and to develop a relative comprehensive response mechanism by professional organizations and teams under the guidance of national authoritative departments so as to attain the initiative in the competition for cyberspace.

主站蜘蛛池模板: 呦女亚洲一区精品| 九九热在线视频| www亚洲精品| 亚洲男人的天堂在线观看| 欧美一区二区自偷自拍视频| 亚洲欧美在线综合一区二区三区 | 亚洲人成网18禁| 中国黄色一级视频| 亚洲精品第一在线观看视频| 国产91色| 中文字幕色在线| www.亚洲国产| 国产一级毛片网站| 日韩中文字幕免费在线观看 | 喷潮白浆直流在线播放| 无码 在线 在线| 國產尤物AV尤物在線觀看| 免费无码在线观看| 国产人成网线在线播放va| 国产97视频在线| 国产精品无码影视久久久久久久| 91国内在线观看| www中文字幕在线观看| 欧美精品1区2区| 99精品国产自在现线观看| 国产男人的天堂| 99久久性生片| 激情视频综合网| 国产成人高清在线精品| 久久久久久尹人网香蕉| 亚洲最猛黑人xxxx黑人猛交| 92午夜福利影院一区二区三区| 这里只有精品免费视频| 免费一级毛片在线播放傲雪网| 91激情视频| 免费国产一级 片内射老| 在线人成精品免费视频| 亚洲女人在线| 四虎精品国产永久在线观看| 天天综合网亚洲网站| 在线毛片网站| 无码日韩精品91超碰| 国产簧片免费在线播放| 欧美午夜网站| 亚洲天堂首页| 国产精品hd在线播放| 中文字幕无码制服中字| 在线观看的黄网| 亚洲乱亚洲乱妇24p| 色悠久久久久久久综合网伊人| 香蕉eeww99国产精选播放| 特级毛片免费视频| 国产黄色爱视频| 欧美激情视频二区三区| 国产91视频免费观看| 一级一级特黄女人精品毛片| 国产精品视频3p| 日本黄色a视频| 精品国产成人高清在线| 国产欧美日韩一区二区视频在线| 婷婷色狠狠干| 日韩人妻精品一区| 干中文字幕| 亚洲黄色片免费看| 亚洲国产日韩欧美在线| 中文字幕欧美成人免费| 日韩高清中文字幕| 国产一级无码不卡视频| 国产成人精品免费视频大全五级| 91精品国产一区自在线拍| 狠狠亚洲五月天| 免费国产黄线在线观看| 亚洲一区二区约美女探花| 亚洲区欧美区| 日本高清免费不卡视频| 亚洲国产日韩一区| 91年精品国产福利线观看久久 | 欧美高清国产| 国产美女91视频| 久久国产V一级毛多内射| 国产主播喷水| 亚洲欧美人成人让影院|