亚洲人成网站18禁止中文字幕,国产毛片视频在线看,韩国18禁无码免费网站,国产一级无码视频,偷拍精品视频一区二区三区,国产亚洲成年网址在线观看,国产一区av在线

 

《美國全球監(jiān)聽行動紀(jì)錄》全文
Full Text: The United States' Global Surveillance Record

 
Comment(s)打印 E-mail China.org.cn  2014-05-29
調(diào)整字號大小:

三、美國秘密監(jiān)聽不擇手段 III. The United States' unscrupulous secret surveillance programs
“棱鏡”等項(xiàng)目的披露,凸現(xiàn)了美國在互聯(lián)網(wǎng)時代監(jiān)聽項(xiàng)目多、投入大、范圍廣、時間長,情報機(jī)構(gòu)、政府和私營企業(yè)間在監(jiān)控上“無縫合作”,其大數(shù)據(jù)處理能力使得網(wǎng)絡(luò)監(jiān)聽的廣度和深度極大拓展。 The revelations about PRISM and other programs demonstrate that the U.S. has mounted the most wide-ranging, costly, long-term surveillance operation in the history of the Internet. The seamless cooperation among the intelligence agencies, government and the private sector, with their big-data processing capabilities, allows the surveillance to extend in scope, seemingly without limit.
1. 項(xiàng)目之多、投入之大、范圍之廣、時間之長,無不是世界之最。 1. The world's largest, longest, most costly and wide-ranging surveillance operation
美國情報機(jī)構(gòu)設(shè)立的與互聯(lián)網(wǎng)監(jiān)控直接相關(guān)的項(xiàng)目近十個,涵蓋互聯(lián)網(wǎng)、電信網(wǎng),不僅有語音電話,也包括各種互聯(lián)網(wǎng)信息,主要的互聯(lián)網(wǎng)服務(wù)商都囊括在內(nèi)。 U.S. intelligence has set up a number of programs that are directly linked to cyberspace surveillance, covering both the Internet and telecommunications networks, targeting telephone calls and Internet information, and including the major Internet service providers.
由美國國家安全局興建的猶他州大數(shù)據(jù)中心,是目前世界上最大的數(shù)據(jù)中心,投入20億美元,其主要任務(wù)是通過秘密監(jiān)控系統(tǒng)收集數(shù)據(jù),然后由密碼破譯專家、數(shù)據(jù)挖掘人員、情報分析員進(jìn)行深度處理后分析運(yùn)用,以獲取有價值的情報。 The Utah Data Center set up by the NSA is the world's largest data center, costing 2 billion U.S. dollars to build. It uses secret surveillance systems to collect vast amounts of data which is then processed by code-breaking experts, data-mining professionals and intelligence analysts to obtain useful information.
2013年8月30日《華盛頓郵報》披露的《2013財(cái)年國會預(yù)算論證》卷1——《國家情報項(xiàng)目摘要》顯示:2013年美國情報預(yù)算翻番,高達(dá) 526億美元;網(wǎng)絡(luò)行動預(yù)算占43億美元,約占8%,任務(wù)顯著側(cè)重。自2007年9月11日開始從微軟搜集信息算起,直到2012年10月開始從蘋果搜集 信息,此類美國情報機(jī)構(gòu)與私營機(jī)構(gòu)尤其是主要互聯(lián)網(wǎng)服務(wù)提供商的監(jiān)控合作,從來沒有中斷過,迄今已持續(xù)6年多時間。 An article in the Washington Post on Aug. 30, 2013, reported that the budget request of the National Intelligence Program for fiscal 2013 had doubled to 52.6 billion U.S. dollars, of which spending on cyber operations accounted for 4.3 billion U.S. dollars, nearly 8 percent of the total. Surveillance cooperation between U.S. intelligence and private companies, especially Internet service providers, has never stopped. Microsoft was the first to sign up to collect data on Sept. 11, 2007, and Apple the most recent in October, 2012.
德國《明鏡》周刊報道了代號為“特等艙”的情報項(xiàng)目:美國、英國、澳大利亞和加拿大的駐外大使館秘密安裝了監(jiān)控設(shè)備,用于截聽電子通訊信息。這四個國家和新西蘭共同簽署了一份情報共享協(xié)議。 German newspaper Der Spiegel reported on a surveillance program codenamed Stateroom, in which the United States, the U.K., Australia and Canada installed surveillance facilities in their embassies to intercept information. The four nations have also signed an intelligence sharing agreement with New Zealand.
2. 情報機(jī)構(gòu)、政府、私營企業(yè)之間的秘密合作極其深入且愈演愈烈。 2. Secret cooperation among intelligence agencies, government and the private sector is increasing
美國互聯(lián)網(wǎng)主要的九大軟硬件供應(yīng)商都提供了很核心的技術(shù)支持,特別是微軟最早與美國國家安全局合作,開放outlook、hotmail內(nèi)部接 口,甚至在outlook.com的加密系統(tǒng)正式發(fā)布之間就已將其提供給美國情報部門。曾聲稱其加密技術(shù)和P2P架構(gòu)無法被政府“搭線接聽”的 Skype,在被微軟收購后,主動為“搭線竊聽”打開“后門”。微軟還與情報部門合作,幫助其破解大公司編碼,以便能夠監(jiān)控用戶;微軟經(jīng)常在漏洞發(fā)布前告 知情報機(jī)構(gòu),使他們能夠利用時間差發(fā)起遠(yuǎn)程漏洞攻擊。 The nine major U.S. software and hardware providers offer core technology support to U.S. intelligence. Microsoft, the earliest to work with the NSA, opened its Outlook and Hotmail systems to the agency, going so far as to show intelligence agencies how to circumvent encryption of Outlook chat messages before the product was officially launched. Skype, which used to claim that its encryption technology and P2P system could prevent governments from eavesdropping, offered a "backdoor" to the NSA after being bought by Microsoft. Microsoft also worked with U.S. intelligence to help crack the security systems of major companies in order to keep a watch on their customers. It also informed intelligence agencies before publishing details of bugs, so as to give them the opportunity to launch remote attacks.
3. 利用強(qiáng)大的大數(shù)據(jù)處理和運(yùn)用能力大幅提升監(jiān)控范圍和深度。 3. Ramping up the range and depth of surveillance through big-data processing capabilities
2012年3月,奧巴馬政府將大數(shù)據(jù)戰(zhàn)略上升為最高國策,認(rèn)為大數(shù)據(jù)是“未來的新石油”,將對數(shù)據(jù)的占有和控制,作為陸權(quán)、海權(quán)、空權(quán)之外的另 一種國家核心能力。而“棱鏡”項(xiàng)目與美國大數(shù)據(jù)戰(zhàn)略有著必然聯(lián)系。美國國家安全局擁有一種名為“無邊界情報員”系統(tǒng),這套系統(tǒng)以30天為周期,可以從全球 網(wǎng)絡(luò)系統(tǒng)中接收到970億條信息,再通過比對信用卡或通訊紀(jì)錄等方式,能幾近真實(shí)地還原個人的實(shí)時狀況。 The Obama administration made big data strategy a national priority in March 2012. It argued that "big data is the new oil", and that domination and control of data would become a national core capacity, alongside land, sea and air power. The PRISM project is closely associated with big data. The NSA also has a system codenamed Boundless Informant, which can track anyone's activity almost in real time by collecting 97 billion Internet data records during each 30-day period and matching them against credit card and communication records.
4. 美國情報機(jī)構(gòu)一直致力于或明或暗地尋找其國內(nèi)法律漏洞,突破法律限制,謀求從源頭和根本上控制網(wǎng)絡(luò)信息。 4. U.S. intelligence is seeking legal loopholes to overcome legal restraints and take full control of Internet information
“9·11”事件后,美國為了彌補(bǔ)通信情報收集的不足,開始建立監(jiān)控項(xiàng)目的總統(tǒng)授權(quán)。2001年10月4日,布什總統(tǒng)頒布授權(quán)備忘錄,“在一定 時期內(nèi)開展特定電子監(jiān)控行動”。此后,總統(tǒng)授權(quán)中的“國內(nèi)收集”甚至一度被解釋為允許對國內(nèi)信息包括美國境內(nèi)和美國人的通信信息進(jìn)行收集。其后數(shù)年間,美 國國內(nèi)就這類行政命令的效力、范圍和法律依據(jù)產(chǎn)生爭議。但總體上,美國總統(tǒng)與國家安全局、聯(lián)邦調(diào)查局、司法部等機(jī)構(gòu)就針對外國目標(biāo)收集信息的法律說明逐漸 趨于一致。 The United States used presidential decrees to authorize additional information collection in the wake of the 9/11 terrorist attacks. On Oct. 4, 2001, President George W. Bush signed a memorandum to authorize specific surveillance actions over a limited period. Since then, "domestic collection" authorized by the President had been interpreted as the greenlight to gather information from U.S. citizens and people inside the United States. Although debates have subsequently arisen concerning the legitimacy, scope and legal basis of presidential executive orders, the White House, NSA, FBI, and the Department of Justice have reached a consensus on the legality of gathering information on foreign targets.
2006年5月24日,國外情報監(jiān)視委員會徹底改變了對《愛國者法案》第215條內(nèi)容的解讀方式,允許聯(lián)邦調(diào)查局與國家安全局分享與恐怖事件調(diào)查相關(guān)的“商業(yè)紀(jì)錄”,包括電話公司的電話紀(jì)錄。自此,美國政府每3個月向大型電話公司下達(dá)數(shù)據(jù)索取命令。 On May 24, 2006, the secret Foreign Intelligence Surveillance Court completely redefined the interpretation of Section 215 of the Patriot Act, allowing the FBI and the NSA to share "business records" relevant to terrorist attacks, including the calls databases of telephone companies. Since then, the U.S. government has demanded data from major telephone companies every three months.
2012年10月,奧巴馬簽署一項(xiàng)名為《美國網(wǎng)絡(luò)作戰(zhàn)政策》的總統(tǒng)指令,要求美國國家安全和情報官員制定一份美國可以進(jìn)行網(wǎng)絡(luò)攻擊的目標(biāo)名單。 同時,指令規(guī)定,為實(shí)現(xiàn)美國在全世界的國家安全目標(biāo),美國可以動用獨(dú)特的和非常規(guī)的武力,在事先不進(jìn)行任何警告的情況下發(fā)動攻擊。 In October 2012, President Obama signed Presidential Policy Directive 20, ordering America's national security and intelligence officials to draw up a list of potential overseas targets for U.S. cyber-attacks. The directive also stated that what it called Offensive Cyber Effects Operations (OCEO) offered unique, unconventional capabilities to advance U.S. national objectives around the world, giving little or no warning to potential adversaries or targets.
荷蘭《新鹿特丹商報》稱,斯諾登披露的文件顯示,美國國家安全局利用五種收集方式,在全球范圍內(nèi)開展情報收集行動。一份2012年的檔案文件顯 示,五類情報收集方式包括:第三方/聯(lián)絡(luò),即由美國國家安全局國際合作伙伴提供數(shù)據(jù),其合作伙伴包括約30多個國家;區(qū)域獲取,即以80多個區(qū)域?yàn)榛A(chǔ)的 專門收集服務(wù)行動,該行動是由美國國家安全局和中央情報局在黑色預(yù)算支持下開展的;網(wǎng)絡(luò)入侵,該活動由美國國家安全局下屬的獲取特定情報行動辦公室執(zhí)行, 已經(jīng)在全球超過5萬臺計(jì)算機(jī)中植入了竊取敏感信息的惡意軟件,主要目標(biāo)為中國、俄羅斯、巴西、埃及、印度、墨西哥、沙特阿拉伯及東歐部分地區(qū);大型電纜, 即通過20個大型電纜主要節(jié)點(diǎn)獲取信息,這些節(jié)點(diǎn)大多數(shù)位于美國境內(nèi);外國衛(wèi)星情報收集,即攔截外國衛(wèi)星處理的數(shù)據(jù),如英國、挪威和日本。 The Dutch newspaper NRC Handelsblad reported that leaks by Snowden show the NSA collects intelligence around the world in five ways. A document dating from 2012 lists the collection approaches as: data provided by the third-parties, i.e. international partners of the NSA in more than 30 countries; regional collection by Special Collection Service (SCS) installations that gather intelligence in more than 80 regions, and are part of a joint CIA-NSA program funded by a secret budget; computer network hacking carried out by a special NSA department that implants malicious software to steal sensitive information from 50,000 computers worldwide -- the major targets being China, Russia, Brazil, Egypt, India, Mexico, Saudi Arabia and countries in Eastern Europe; tapping into the fiber optic cables that transport Internet traffic between continents at 20 major locations, mostly inside the United States; and finally, intercepting data from foreign satellite communications in countries such as Britain, Norway and Japan.
“棱鏡”事件反映出美國以國家安全局為主的情報機(jī)構(gòu),實(shí)施互聯(lián)網(wǎng)信息監(jiān)控和信息獲取的主要手段和方法有以下三種: The PRISM scandal revealed that intelligence agencies, led by the NSA in the United States, use three major approaches to conduct Internet surveillance and data collection.
——從光纜獲取世界范圍內(nèi)的數(shù)據(jù)。全球的通信流量大部分經(jīng)過美國,目標(biāo)數(shù)據(jù)流可以很容易流入或流經(jīng)美國。美國國家安全局與國防部等機(jī)構(gòu)在 2003年與美國環(huán)球電訊公司簽署《網(wǎng)絡(luò)安全協(xié)議》,此后的10年間,又與更多的電訊公司簽署了類似協(xié)議。這些協(xié)議規(guī)定,電訊企業(yè)要在美國本土建立“網(wǎng)絡(luò) 運(yùn)行中心”,美國政府官員可以在發(fā)出警告半小時內(nèi)進(jìn)入查訪。與此同時,美國的盟友英國、加拿大等也為其提供光纜監(jiān)聽情報。 -- Obtaining data worldwide from fiber optic cables. Most data flows pass through the United States, so targeting data streams is a simple matter. The NSA, the Department of Defense and other departments signed a "Network Security Agreement" in 2003 with the telecommunication company Global Crossing. Over the following decade, the United States signed similar agreements with other telecommunication operators. The agreements required the companies to build "Network Operations Centers" on the U.S. soil that could be visited by government officials with 30 minutes of warning. Allies such as Britain and Canada also agreed to provide the United States with fiber optic cable intelligence.
——直接進(jìn)入互聯(lián)網(wǎng)公司的服務(wù)器和數(shù)據(jù)庫獲取?!袄忡R”項(xiàng)目相繼與微軟、雅虎、谷歌、臉譜、PalTalk、YouTube、Skype、 AOL和蘋果等9家互聯(lián)網(wǎng)公司合作,大多數(shù)情況下,數(shù)據(jù)會通過這些公司的服務(wù)器以電子方式傳輸給政府,有時一些公司的服務(wù)器還會建立獨(dú)立安全入口,以便于 政府由此調(diào)取信息。情報人員可以直接進(jìn)入上述公司的服務(wù)器和數(shù)據(jù)庫獲取數(shù)據(jù),內(nèi)容包括電子郵件、即時消息、視頻、照片、存儲數(shù)據(jù)、語音聊天、文件傳輸、視 頻會議、登錄時間和社交網(wǎng)絡(luò)資料等10類信息,甚至可以直接監(jiān)控用戶網(wǎng)絡(luò)搜索內(nèi)容。 -- Getting direct access to Internet companies' servers and databases to retrieve intelligence. The PRISM program cooperated with nine internet companies -- Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL and Apple. The companies normally delivered data to the government electronically. Some companies established independent security access to make it easier for government agencies to extract intelligence. The intelligence agents would access the companies' servers and databases to collect emails, instant messages, videos, photos, stored data, voice chat, file transfers, video conferences, login times and social network profiles. They were even able to monitor users' Internet searches.
——美國國家安全局的特別機(jī)構(gòu)主動、秘密、遠(yuǎn)程入侵獲取。美國國家安全局早在1997年就下設(shè)“獲取特定情報行動辦公室”,其主要任務(wù)是通過秘 密入侵目標(biāo)計(jì)算機(jī)和電信系統(tǒng)、破譯密碼、攻破受保護(hù)目標(biāo)計(jì)算機(jī)的安全系統(tǒng)等,竊取存儲在目標(biāo)計(jì)算機(jī)中的數(shù)據(jù),然后復(fù)制目標(biāo)郵件系統(tǒng)中的所有信息和通過的數(shù) 據(jù)流量,來獲取境外目標(biāo)的情報。美國國家安全局描述這一系列行動的技術(shù)術(shù)語是“計(jì)算機(jī)網(wǎng)絡(luò)漏洞利用偵察”,其實(shí)質(zhì)就是網(wǎng)絡(luò)攻擊竊密。 -- An NSA special unit was able to obtain intelligence secretly and remotely by hacking. The agency created the Office of Tailored Access Operations (TAO) as early as 1997. Its main task is to hack target computers and telecommunication systems, crack passwords and security systems, steal data from the target computers, copy information from email systems and track data flows to acquire intelligence on foreign targets. The NSA refers to these activities using the technical term "Computer Network Exploitation" (CNE), but they boil down to cyber-attacks and theft of secrets.
跳轉(zhuǎn)至目錄 >> Back to Contents >>


   Previous   1   2   3   4   5   6   Next  


分享到:

Go to Forum >>0 Comment(s)

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Enter the words you see:   
    Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileMobileRSSRSSNewsletterNewsletter
    1. <ul id="556nl"><kbd id="556nl"><form id="556nl"></form></kbd></ul>
      <thead id="556nl"></thead>

      1. <em id="556nl"><tt id="556nl"></tt></em>
        <ul id="556nl"><kbd id="556nl"><form id="556nl"></form></kbd></ul>

        <ul id="556nl"><small id="556nl"></small></ul>
        1. <thead id="556nl"></thead>

          亚洲人成网站18禁止中文字幕,国产毛片视频在线看,韩国18禁无码免费网站,国产一级无码视频,偷拍精品视频一区二区三区,国产亚洲成年网址在线观看,国产一区av在线 人妻无码久久影视 日韩久久久久久久久久久久 精品国产香蕉伊思人在线 无码国产手机在线a√片无灬 91在线视频无码