2016美国大选

Leader_A dangerous new phase in cyber aggression

Hillary Clinton’s presidential campaign was thrown into turmoil by the leak of emails documenting dirty tactics by the Democratic party leadership. Suggestion of attempts to rig the primary contest in her favour is not merely embarrassing; it is bound to anger supporters of her defeated rival, Bernie Sanders, and deepen the party’s divisions. But this should not be a source of satisfaction for Republicans. They should be equally alarmed by the possibility that the leak came from Moscow — marking a serious escalation in the long term trend of Russian aggression in cyber space.

It is extremely difficult to pin down the source of a hacking attack — especially given the Kremlin’s tendency to outsource such work to criminal groups or pro-government organisations. However, cyber security firms have set out credible evidence to identify the groups responsible for hacking the Democratic National Committee’s network — best known as APT 28 and APT 29. They say that the techniques these groups use, the timezone in which they operate and their previous targets — including the White House and US State Department, eastern European governments and Nato — suggest close links to the Kremlin or Russian security services.

It would hardly be a new development for Moscow to adopt such tactics. As far back as 2007, Estonia suffered crippling attacks on the websites of its banks, government and telecoms networks. Georgian state websites were targeted shortly before the outbreak of war in 2008. Of course, many other governments, the US foremost among them, employ similar methods to gather intelligence and counter security threats.

您已阅读46%(1632字),剩余54%(1932字)包含更多重要信息,订阅以继续探索完整内容,并享受更多专属服务。
版权声明:本文版权归manbetx20客户端下载 所有,未经允许任何单位或个人不得转载,复制或以任何其他方式使用本文全部或部分,侵权必究。
设置字号×
最小
较小
默认
较大
最大
分享×