Expert: North Korea’s Cyber Abilities Growing
Some experts believe North Korea's ability to carry out computer attacks is increasing. They point to a reported attack that took place in September of last year as evidence.
Attackers, believed to be North Koreans, took thousands of military documents including war plans aimed at destroying North Korea's leadership if war takes place. The war plans, known as Operation Plan 5015, were jointly created by the U.S. and South Korean militaries.
Expert: ‘entirely possible' North Korea responsible
Kenneth Geers is a security expert and a researcher with the NATO Cooperative Cyber Defense Center of Excellence based in Estonia. Recently, he spoke to VOA.
Geers said it is "entirely possible" that U.S.-South Korean war plans were taken. He added that it is possible that North Korea received help from Russia or China to do so.
All digitized information, Geers said, is very difficult to protect. He said large computer systems often have many points that can be attacked and North Korea knows who to target.
He said one possibility is that North Korea may be trying to steal money. The country has been under increasingly tight sanctions after two United Nations Security Council resolutions this year targeted its export income.
Another possibility, Geers said, is that North Korea wants to know if it is about to be attacked. In order to do that, they would need plans from the U.S., Korea and Japan.
Other cyberattacks linked to North Korea
North Korea has been linked to computer attacks that have caused notable damage in the past.
In 2014, North Korea was blamed for entering the computer systems of Sony Pictures Entertainment. The attack caused many computers belonging to the movie production company to become useless. It was seen as a reaction to that studio's attempt to release the film, The Interview. The movie showed an attempt to kill North Korea's leader Kim Jong Un.
More recently, reports from 2016 linked the theft of $81 million from the central bank of Bangladesh to North Korea.
South Korea suspects North Korea has attempted attacks in recent years on computer systems of its energy system and some of its banks as well as its military.
Cyberattacks can seek information, target equipment
But Geers does not believe that North Korea could win a cyberwar with the U.S., South Korea or other Western countries. He said North Korea's internet system is small and an easy target for cyberattacks that can limit or shut down its networks.
Geers said cyberwarfare can take many forms. It can involve secretly getting information and spying on computer systems. Cyberwarfare methods also can seek to make changes to computer systems that limit or block advanced weapons from operating correctly.
In the case of missiles, a cyber attack might block important information that is needed in order to fly a missile in the right direction. It is even possible to cause a missile to travel in the wrong direction.
"A computers might have no way of knowing that it's the right or wrong target. Computers don't think that way. They just respond to commands. In that way, they can be very smart and very stupid at the same time."
One example of a cyberattack targeted Iran's nuclear program and was identified in 2010. The Stuxnet virus is said to have caused damage to computer systems linked to Iran's nuclear weapons program.
I'm Mario Ritter.
1.carry out 实施
Police say they believe the attacks were carried out by nationalists.
2.nuclear weapons 核武器
The declaration deals with disarmament and the non-proliferation of nuclear weapons.
3.took place 发生
The interview took place on a Friday afternoon.
4.known as 被称为
China has always been known as a land of propriety and righteousness.
5.The attack caused many computers belonging to the movie production company to become useless.
belonging to 属于
They looked upon us as belonging to the family.
Many people still feel there is safety in numbers when belonging to a union.
6.In that way, they can be very smart and very stupid at the same time."
at the same time 同时
I was afraid of her, but at the same time I really liked her.
It's impossible to get everybody together at the same time.
有专家认为，朝鲜实施电脑攻击的能力逐渐增强 。他们将去年9月发生的一起电脑入侵案例作为证据 。
据信，这些入侵者为朝鲜人，他们窃取了数千份军事文件，其中包括战时除掉朝鲜领导层的战争计划 。这份《5015号战争计划》是由美国和韩国军队联合制定的 。
肯尼思·吉尔斯（Kenneth Geers）是总部位于爱沙尼亚的北约卓越协同网络防卫中心的安全专家和研究员 。近日，他接受了美国之音的采访 。
吉尔斯表示，美韩战争计划完全有可能被朝鲜窃取 。他还表示，朝鲜有可能得到了俄罗斯或中国的帮助 。
吉尔斯表示，所有数字化信息都很难保护 。他说，大型计算机系统通常有很多易攻击的点，而朝鲜的攻击目标很明确 。
他说，其中一项可能性是朝鲜试图盗取资金 。今年，联合国安理会通过了两项针对朝鲜出口收入的制裁决议，其面临的制裁日益严峻 。
吉尔斯表示，另一种可能是朝鲜想知道是否会受到攻击 。为此，他们需要了解美国、韩国和日本的计划 。
2014年，朝鲜被指入侵了索尼影视娱乐公司的计算机系统 。这次攻击导致该电影制作公司的很多计算机瘫痪 。外界将其视为朝鲜对该公司计划发行《The Interview》电影实施的报复 。该电影讲述的是刺杀朝鲜最高领导人金正恩 。
吉尔斯认为，在与美国、韩国或其它西方国家的网络攻击战中，朝鲜没有胜算 。他说，朝鲜的互联网系统规模较小，易受攻击，黑客可轻易限制或关闭其网络 。
吉尔斯还表示，网络战争形式多样 。其中涉及秘密窃取情报和监听计算机系统 。网络战争也可以是篡改计算机系统，限制或阻止先进武器的准确运行 。
以导弹为例，网络攻击可拦截导弹发射正确方位所需的重要信息 。甚至有可能导致导弹飞向错误方向 。
吉尔斯说：“计算机可能无法识别攻击目标，计算机无法做出判断，只会按照指令操作 。由此看来，计算机既智能又机械 。”
再者就是2010年才公开的针对伊朗核计划的网络攻击 。据说“震网病毒”对伊朗核武器计划相关的计算机系统造成了损害 。