Information Warriors come in all shapes and colors.Hackers and phone phreaks1 have been waging2 Info War skirmishes3 against corporate America and the telephone companies for years,but the recent generation of young cybernauts4 is more aggressive.
Now, tens of thousands of ex-Iron Curtain5 intelligence agents seek to ply their trade for the highest bidder;some going as far as offering their services in the classified6 sections of daily newspapers.
Power-hungry dictators7,radical fundamentalists8,and a score of international political sects are candidates to use Cyberspace to effect their agendas. The narcoterrorists9 are well- financed,armed with a bevy of10 technical advisors,and have already taken aim at the Drug Enforcement Administration with Information Weapons.
Radical environmental groups have shown their willingness to be physically provocative11 and Information Warfare offers them the ability to strike out12 in a new, imaginative,and less personally dangerous way at oil companies,logging companies,and other groups unsympathetic to endangered species.
Information brokers and data bankers sell your name,your upper-middle class zip code,and the date of your last under-wear purchase to anyone with a floppy disk——all without your permission.Banks and credit bureaus allow computers to make decisions that affect our lives and our livelihoods based upon information that contains as much as thirty percent erroneous13 data——all with virtual impunity14.
Anyone can be an Information Warrior. Publications such as 2600:The Hacker Quarterly and Phrack provide the basic training for inductees15.Cyberspace itself offers safe havens for Information Warriors to build their armies,develop their weapons,and deploy them.An unhappy worker can suddenly turn against his employer with little chance of prosecution. A government employee may moonlight as an Information Warrior,or a teenager may live in Cyberspace twenty hours a day, alighting on16 Earth only for Coke and pizza.A hundred million potential Information Warriors,some less friendly than others,are out there waiting,honing17 their skills.
Information Warfare is about capabilities,the potential power of the individual and the potential power of an organized group. The capabilities of kids, the capabilities of technological mercenaries18, and the capabilities of nation——states are all threats we must face. Their intentions are secondary. If a group or an individual chooses to Wreak havoc, today they have the weapons to do exactly as they please.
有形形色色的信息斗士。近年來,黑客和偷打長途電話的人一直在對美國公司和電話公司進(jìn)行信息戰(zhàn)。最近一代的信息斗士則更為囂張。
目前,數(shù)以萬計(jì)的前鐵幕國家情報(bào)人員試圖為出價(jià)的客戶開展工作,他們中的某些人甚至在報(bào)紙的分類廣告上表明愿意提供服務(wù)。
渴望權(quán)力的*者、激進(jìn)的原教旨主義者和數(shù)十個(gè)國際政治集團(tuán),可能會使用網(wǎng)絡(luò)空間推行他們的計(jì)劃。資金雄厚、得到技術(shù)顧問幫助的販毒恐怖主義者,已經(jīng)用信息武器瞄準(zhǔn)了毒品管理局。
激進(jìn)的環(huán)保組織已經(jīng)展示了他們進(jìn)行硬性對抗的意愿,而信息戰(zhàn)爭為他們提供了以新的、富有想象力并且人身危險(xiǎn)較小的方式對付石油公司、伐木公司和其他對瀕危物種漠不關(guān)心的集團(tuán)的能力。
信息掮客和數(shù)據(jù)經(jīng)紀(jì)人,未經(jīng)你的同意就向任何一個(gè)有軟盤的人出售你的姓名、中上階層郵政編碼、最近的內(nèi)衣購買日期等信息。銀行和信貸機(jī)構(gòu),允許計(jì)算機(jī)根據(jù)包含多達(dá)30%錯(cuò)誤數(shù)據(jù)的信息做出影響我們的生活和生計(jì)的決定,而這一切實(shí)際上都未受什么懲罰。
任何人都可以成為信息斗士?!逗诳图究愤@樣的出版物提供了基本的黑客技術(shù)訓(xùn)練。網(wǎng)絡(luò)空間本身,為信息斗士建設(shè)自己的軍隊(duì)、設(shè)計(jì)自己的武器并部署它們,提供了一個(gè)安全的場所。一個(gè)心懷不滿的工人可能突然會對老板進(jìn)行信息戰(zhàn)爭,這個(gè)工人因此而受到法律起訴的可能性非常小。一名政府雇員可能在夜里從事第二職業(yè),充當(dāng)一名信息斗士;一個(gè)少年可能每天在網(wǎng)絡(luò)空間里待20小時(shí),可口可樂與比薩餅是他與地球的惟一聯(lián)系。1億個(gè)潛在的信息斗士(有些是不友好的)正在等待時(shí)機(jī),磨刀霍霍。
信息戰(zhàn)爭是關(guān)于能力的問題,潛在的個(gè)人能力和潛在的有組織集團(tuán)的能力。孩子的能力、技術(shù)雇傭軍的能力、民族國家的能力,均對我們構(gòu)成必須面對的威脅,它們的意圖是次要的。如果一個(gè)集團(tuán)或某個(gè)人決定進(jìn)行破?,那么他們現(xiàn)在手頭就有武器想怎么干就怎么干。
注釋:
1.phone phreak亦作phone freak(非法利用電子裝置)不付錢打電話的人
2.wage vt.進(jìn)行,從事,開始
3.skirmish n.[軍]小規(guī)模戰(zhàn)斗,小沖突
4.cybernaut n.網(wǎng)絡(luò)用戶
5.Iron Curtain鐵幕(西方用語,指前蘇聯(lián)與東歐國家所設(shè)置的阻止同歐美進(jìn)行思想、文化交流的無形屏障)
6.classified adj.登有分類廣告的
7.dictator n.*者
8.fundamentalist n.原教旨主義者
9.narcoterrorist n.毒品恐怖主義者
10.a bevy of一群
11.provocative adj.挑釁的
12.strike out行進(jìn),反擊
13.erroneous adj.錯(cuò)誤的,不正確的
14.impunity n.(懲罰等的)免除
15.inductee n.[美]被征召入伍者
16.alight vi.(與on連用)偶然發(fā)現(xiàn)(碰見)
17.hone vt.磨練,訓(xùn)練
18.mercenary n.受雇傭者
Now, tens of thousands of ex-Iron Curtain5 intelligence agents seek to ply their trade for the highest bidder;some going as far as offering their services in the classified6 sections of daily newspapers.
Power-hungry dictators7,radical fundamentalists8,and a score of international political sects are candidates to use Cyberspace to effect their agendas. The narcoterrorists9 are well- financed,armed with a bevy of10 technical advisors,and have already taken aim at the Drug Enforcement Administration with Information Weapons.
Radical environmental groups have shown their willingness to be physically provocative11 and Information Warfare offers them the ability to strike out12 in a new, imaginative,and less personally dangerous way at oil companies,logging companies,and other groups unsympathetic to endangered species.
Information brokers and data bankers sell your name,your upper-middle class zip code,and the date of your last under-wear purchase to anyone with a floppy disk——all without your permission.Banks and credit bureaus allow computers to make decisions that affect our lives and our livelihoods based upon information that contains as much as thirty percent erroneous13 data——all with virtual impunity14.
Anyone can be an Information Warrior. Publications such as 2600:The Hacker Quarterly and Phrack provide the basic training for inductees15.Cyberspace itself offers safe havens for Information Warriors to build their armies,develop their weapons,and deploy them.An unhappy worker can suddenly turn against his employer with little chance of prosecution. A government employee may moonlight as an Information Warrior,or a teenager may live in Cyberspace twenty hours a day, alighting on16 Earth only for Coke and pizza.A hundred million potential Information Warriors,some less friendly than others,are out there waiting,honing17 their skills.
Information Warfare is about capabilities,the potential power of the individual and the potential power of an organized group. The capabilities of kids, the capabilities of technological mercenaries18, and the capabilities of nation——states are all threats we must face. Their intentions are secondary. If a group or an individual chooses to Wreak havoc, today they have the weapons to do exactly as they please.
有形形色色的信息斗士。近年來,黑客和偷打長途電話的人一直在對美國公司和電話公司進(jìn)行信息戰(zhàn)。最近一代的信息斗士則更為囂張。
目前,數(shù)以萬計(jì)的前鐵幕國家情報(bào)人員試圖為出價(jià)的客戶開展工作,他們中的某些人甚至在報(bào)紙的分類廣告上表明愿意提供服務(wù)。
渴望權(quán)力的*者、激進(jìn)的原教旨主義者和數(shù)十個(gè)國際政治集團(tuán),可能會使用網(wǎng)絡(luò)空間推行他們的計(jì)劃。資金雄厚、得到技術(shù)顧問幫助的販毒恐怖主義者,已經(jīng)用信息武器瞄準(zhǔn)了毒品管理局。
激進(jìn)的環(huán)保組織已經(jīng)展示了他們進(jìn)行硬性對抗的意愿,而信息戰(zhàn)爭為他們提供了以新的、富有想象力并且人身危險(xiǎn)較小的方式對付石油公司、伐木公司和其他對瀕危物種漠不關(guān)心的集團(tuán)的能力。
信息掮客和數(shù)據(jù)經(jīng)紀(jì)人,未經(jīng)你的同意就向任何一個(gè)有軟盤的人出售你的姓名、中上階層郵政編碼、最近的內(nèi)衣購買日期等信息。銀行和信貸機(jī)構(gòu),允許計(jì)算機(jī)根據(jù)包含多達(dá)30%錯(cuò)誤數(shù)據(jù)的信息做出影響我們的生活和生計(jì)的決定,而這一切實(shí)際上都未受什么懲罰。
任何人都可以成為信息斗士?!逗诳图究愤@樣的出版物提供了基本的黑客技術(shù)訓(xùn)練。網(wǎng)絡(luò)空間本身,為信息斗士建設(shè)自己的軍隊(duì)、設(shè)計(jì)自己的武器并部署它們,提供了一個(gè)安全的場所。一個(gè)心懷不滿的工人可能突然會對老板進(jìn)行信息戰(zhàn)爭,這個(gè)工人因此而受到法律起訴的可能性非常小。一名政府雇員可能在夜里從事第二職業(yè),充當(dāng)一名信息斗士;一個(gè)少年可能每天在網(wǎng)絡(luò)空間里待20小時(shí),可口可樂與比薩餅是他與地球的惟一聯(lián)系。1億個(gè)潛在的信息斗士(有些是不友好的)正在等待時(shí)機(jī),磨刀霍霍。
信息戰(zhàn)爭是關(guān)于能力的問題,潛在的個(gè)人能力和潛在的有組織集團(tuán)的能力。孩子的能力、技術(shù)雇傭軍的能力、民族國家的能力,均對我們構(gòu)成必須面對的威脅,它們的意圖是次要的。如果一個(gè)集團(tuán)或某個(gè)人決定進(jìn)行破?,那么他們現(xiàn)在手頭就有武器想怎么干就怎么干。
注釋:
1.phone phreak亦作phone freak(非法利用電子裝置)不付錢打電話的人
2.wage vt.進(jìn)行,從事,開始
3.skirmish n.[軍]小規(guī)模戰(zhàn)斗,小沖突
4.cybernaut n.網(wǎng)絡(luò)用戶
5.Iron Curtain鐵幕(西方用語,指前蘇聯(lián)與東歐國家所設(shè)置的阻止同歐美進(jìn)行思想、文化交流的無形屏障)
6.classified adj.登有分類廣告的
7.dictator n.*者
8.fundamentalist n.原教旨主義者
9.narcoterrorist n.毒品恐怖主義者
10.a bevy of一群
11.provocative adj.挑釁的
12.strike out行進(jìn),反擊
13.erroneous adj.錯(cuò)誤的,不正確的
14.impunity n.(懲罰等的)免除
15.inductee n.[美]被征召入伍者
16.alight vi.(與on連用)偶然發(fā)現(xiàn)(碰見)
17.hone vt.磨練,訓(xùn)練
18.mercenary n.受雇傭者

