{"id":1383,"date":"2024-09-22T21:25:06","date_gmt":"2024-09-22T13:25:06","guid":{"rendered":"https:\/\/www.kafeizha.com\/?p=1383"},"modified":"2024-09-22T21:25:06","modified_gmt":"2024-09-22T13:25:06","slug":"%e4%bb%a5%e8%89%b2%e5%88%97pager%e6%94%bb%e5%87%bb%e5%bc%95%e5%8f%91%e5%85%a8%e7%90%83%e5%8f%98%e9%9d%a9","status":"publish","type":"post","link":"https:\/\/news.tomjun.com\/?p=1383","title":{"rendered":"\u4ee5\u8272\u5217Pager\u653b\u51fb\u5f15\u53d1\u5168\u7403\u53d8\u9769"},"content":{"rendered":"<p><b>\u65b0\u95fb\u6765\u6e90\uff1a<\/b>www.nytimes.com<br \/> <b>\u539f\u6587\u5730\u5740\uff1a<\/b><font size=\"-1\"><a href=\"https:\/\/www.nytimes.com\/2024\/09\/22\/opinion\/israel-pager-attacks-supply-chain.html target=\"_blank\">Opinion | Israel\u2019s Pager Attacks Have Changed the World<\/a><\/font><br \/> <b>\u65b0\u95fb\u65e5\u671f\uff1a<\/b>2024-09-22<\/p>\n<p> \u4ee5\u8272\u5217\u6700\u8fd1\u5bf9\u9ece\u5df4\u5ae9\u771f\u4e3b\u515a\u7684\u5927\u80c6\u88ad\u51fb\u4e8b\u4ef6\uff0c\u5bfc\u81f4\u6570\u767e\u53f0\u4f20\u547c\u673a\u548c\u53cc\u5411\u65e0\u7ebf\u7535\u8bbe\u5907\u7206\u70b8\uff0c\u593a\u53bb\u4e86\u81f3\u5c1137\u6761\u751f\u547d\uff0c\u9c9c\u660e\u5730\u63ed\u793a\u4e86\u7f51\u7edc\u5b89\u5168\u4e13\u5bb6\u591a\u5e74\u6765\u4e00\u76f4\u5728\u8b66\u544a\u7684\u5a01\u80c1\uff1a\u6211\u4eec\u8ba1\u7b97\u673a\u5316\u8bbe\u5907\u7684\u56fd\u9645\u4f9b\u5e94\u94fe\u4f7f\u6211\u4eec\u9762\u4e34\u8106\u5f31\u6027\uff0c\u800c\u76ee\u524d\u6211\u4eec\u7f3a\u4e4f\u6709\u6548\u7684\u9632\u5fa1\u624b\u6bb5\u3002<\/p>\n<p>\u5c3d\u7ba1\u8fd9\u4e9b\u81f4\u547d\u884c\u52a8\u4ee4\u4eba\u9707\u60ca\uff0c\u4f46\u6267\u884c\u8fc7\u7a0b\u4e2d\u4f7f\u7528\u7684\u65b9\u6cd5\u5e76\u65e0\u7279\u522b\u65b0\u9896\u4e4b\u5904\u3002\u4ee5\u8272\u5217\u2014\u2014\u5176\u662f\u5426\u53c2\u4e0e\u6b64\u4e8b\u5e76\u672a\u786e\u8ba4\u2014\u2014\u5165\u4fb5\u56fd\u9645\u4f9b\u5e94\u94fe\u5e76\u5728\u8fd9\u7c7b\u88c5\u7f6e\u4e2d\u5d4c\u5165\u5851\u6599\u70b8\u836f\u7684\u6280\u672f\uff0c\u5df2\u7ecf\u5b58\u5728\u591a\u5e74\u3002\u65b0\u53d8\u5316\u5728\u4e8e\u4ee5\u8272\u5217\u5c06\u5b83\u4eec\u4ee5\u5982\u6b64\u6bc1\u706d\u6027\u7684\u3001\u6781\u5ea6\u516c\u5f00\u7684\u65b9\u5f0f\u7ed3\u5408\u8d77\u6765\uff0c\u51f8\u663e\u4e86\u672a\u6765\u5927\u56fd\u7ade\u4e89\u5728\u548c\u5e73\u65f6\u671f\u3001\u6218\u4e89\u4ee5\u53ca\u4e24\u8005\u4e4b\u95f4\u7684\u7070\u8272\u5730\u5e26\u7684\u56fe\u666f\u3002<\/p>\n<p>\u76ee\u6807\u4e0d\u4ec5\u9650\u4e8e\u6050\u6016\u5206\u5b50\u3002\u6211\u4eec\u7684\u7535\u8111\u9762\u4e34\u5a01\u80c1\uff0c\u8d8a\u6765\u8d8a\u591a\u7684\u5bb6\u5ead\u8bbe\u5907\u4e5f\u662f\u5982\u6b64\u2014\u2014\u5982\u51b0\u7bb1\u3001\u5bb6\u7528\u6052\u6e29\u5668\u4ee5\u53ca\u8f68\u9053\u4e0a\u7684\u8bb8\u591a\u5176\u4ed6\u6709\u7528\u4e4b\u7269\u3002\u5371\u9669\u65e0\u5904\u4e0d\u5728\u3002<\/p>\n<p>\u8fd9\u6b21\u884c\u52a8\u7684\u6838\u5fc3\u2014\u2014\u5c06\u5851\u6599\u70b8\u836f\u690d\u5165\u4f20\u547c\u673a\u548c\u65e0\u7ebf\u7535\u8bbe\u5907\u2014\u2014\u81ea2001\u5e74\u7406\u67e5\u5fb7\u00b7\u96f7\u5fb7\uff08The Shoe Bomber\uff09\u8bd5\u56fe\u5728\u98de\u673a\u4e0a\u70b9\u71c3\u4e00\u4e9b\u70b8\u5f39\u4ee5\u6765\uff0c\u4fbf\u6784\u6210\u4e86\u6050\u6016\u4e3b\u4e49\u98ce\u9669\u7684\u4e00\u90e8\u5206\u3002\u8fd9\u5c31\u662f\u6240\u6709\u673a\u573a\u626b\u63cf\u5668\u7684\u8bbe\u8ba1\u76ee\u6807\u2014\u2014\u65e0\u8bba\u662f\u60a8\u5728\u5b89\u68c0\u5904\u770b\u5230\u7684\u90a3\u4e9b\u8fd8\u662f\u540e\u6765\u5bf9\u884c\u674e\u8fdb\u884c\u626b\u63cf\u7684\u626b\u63cf\u5668\u3002\u54ea\u6015\u53ea\u6709\u4e00\u70b9\u91cf\u4e5f\u80fd\u9020\u6210\u60ca\u4eba\u7684\u7834\u574f\u3002<\/p>\n<p>\u7b2c\u4e8c\u4e2a\u5143\u7d20\u2014\u2014\u901a\u8fc7\u4e2a\u4eba\u8bbe\u5907\u6267\u884c\u6697\u6740\u884c\u52a8\u2014\u2014\u4e5f\u4e0d\u662f\u6700\u8fd1\u53d1\u660e\u7684\u65b0\u624b\u6bb5\u3002\u4ee5\u8272\u5217\u66fe\u57281996\u5e74\u5bf9\u54c8\u9a6c\u65af\u70b8\u5f39\u5236\u9020\u8005\u548c2000\u5e74\u5bf9\u6cd5\u5854\u8d6b\u6d3b\u52a8\u5bb6\u91c7\u53d6\u8fc7\u8fd9\u79cd\u65b9\u5f0f\uff0c\u4e24\u8005\u90fd\u6b7b\u4e8e\u9065\u63a7\u5f15\u7206\u7684\u81ea\u5236\u624b\u673a\u4e2d\u3002<\/p>\n<p>\u6700\u540e\u4f46\u540c\u6837\u590d\u6742\u7684\u4e00\u4e2a\u73af\u8282\u2014\u2014\u653b\u51fb\u56fd\u9645\u4f9b\u5e94\u94fe\u4ee5\u5927\u89c4\u6a21\u7834\u574f\u8bbe\u5907\u2014\u2014\u662f\u7f8e\u56fd\u81ea\u5df1\u4e5f\u505a\u8fc7\u7684\u4e8b\u60c5\uff0c\u76ee\u7684\u4e0d\u540c\u3002\u56fd\u5bb6\u5b89\u5168\u5c40\u62e6\u622a\u5728\u9014\u4e2d\u4f20\u8f93\u7684\u901a\u4fe1\u8bbe\u5907\u5e76\u8fdb\u884c\u4fee\u6539\uff0c\u5e76\u975e\u51fa\u4e8e\u7834\u574f\u76ee\u7684\u800c\u662f\u7528\u4e8e\u7a83\u542c\u3002\u6839\u636e\u65af\u8bfa\u767b\u6587\u4ef6\u4e2d\u7684\u4fe1\u606f\uff0c\u8be5\u673a\u6784\u66fe\u5bf9\u6253\u7b97\u8fd0\u5f80\u53d9\u5229\u4e9a\u7535\u4fe1\u516c\u53f8\u7684\u601d\u79d1\u8def\u7531\u5668\u8fdb\u884c\u8fc7\u6b64\u7c7b\u64cd\u4f5c\u3002\u60f3\u5fc5\u8fd9\u5e76\u975e\u8be5\u673a\u6784\u552f\u4e00\u91c7\u53d6\u6b64\u7c7b\u884c\u52a8\u7684\u65b9\u5f0f\u3002<\/p>\n<p>\u521b\u5efa\u4e00\u4e2a\u4f2a\u88c5\u516c\u53f8\u6765\u6b3a\u9a97\u53d7\u5bb3\u8005\u4e5f\u7b97\u4e0d\u4e0a\u662f\u4e00\u4e2a\u65b0\u7684\u82b1\u6837\u3002\u636e\u62a5\u9053\uff0c\u4ee5\u8272\u5217\u6210\u7acb\u4e86\u4e00\u5bb6\u7a7a\u58f3\u516c\u53f8\u4ee5\u751f\u4ea7\u5e76\u5411\u771f\u4e3b\u515a\u9500\u552e\u88c5\u6709\u70b8\u836f\u7684\u8bbe\u5907\u3002\u800c\u57282019\u5e74\uff0c\u7f8e\u56fd\u8054\u90a6\u8c03\u67e5\u5c40\u5efa\u7acb\u4e86\u4e00\u5bb6\u516c\u53f8\u5411\u7f6a\u72af\u51fa\u552e\u88ab\u8ba4\u4e3a\u662f\u5b89\u5168\u7684\u624b\u673a\u2014\u2014\u5e76\u975e\u4e3a\u4e86\u6697\u6740\u4ed6\u4eec\u800c\u662f\u7528\u4e8e\u7a83\u542c\u548c\u968f\u540e\u902e\u6355\u4ed6\u4eec\u3002<\/p>\n<p>\u7ed3\u8bba\uff1a\u6211\u4eec\u7684\u4f9b\u5e94\u94fe\u6613\u53d7\u653b\u51fb\uff0c\u8fd9\u610f\u5473\u7740\u6211\u4eec\u540c\u6837\u6613\u53d7\u653b\u51fb\u3002\u4efb\u4f55\u53c2\u4e0e\u9ad8\u79d1\u6280\u4f9b\u5e94\u94fe\u7684\u4eba\u6216\u56e2\u4f53\u90fd\u6709\u53ef\u80fd\u98a0\u8986\u901a\u8fc7\u5176\u4e2d\u4f20\u8f93\u7684\u8bbe\u5907\u3002\u8fd9\u79cd\u98a0\u8986\u53ef\u7528\u4e8e\u7a83\u542c\u3001\u7834\u574f\u6216\u5728\u547d\u4ee4\u4e0b\u5931\u6548\uff0c\u751a\u81f3\u66f4\u96be\u4ee5\u5b9e\u73b0\u7684\u662f\uff0c\u7528\u4e8e\u6740\u6b7b\u76ee\u6807\u3002<\/p>\n<p>\u4e0e\u4e92\u8054\u7f51\u8fde\u63a5\u7684\u4e2a\u4eba\u8bbe\u5907\u2014\u2014\u5c24\u5176\u662f\u4f7f\u7528\u9891\u7387\u9ad8\u7684\u7f8e\u56fd\u7b49\u56fd\u5bb6\u4e2d\u7684\u8bbe\u5907\u2014\u2014\u7279\u522b\u5bb9\u6613\u53d7\u5230\u653b\u51fb\u30022007\u5e74\uff0c\u7231\u8fbe\u8377\u5dde\u56fd\u5bb6\u5b9e\u9a8c\u5ba4\u8bc1\u660e\u4e86\u901a\u8fc7\u7f51\u7edc\u653b\u51fb\u53ef\u80fd\u5bfc\u81f4\u9ad8\u538b\u53d1\u7535\u673a\u7206\u70b8\u30022010\u5e74\uff0c\u4eba\u4eec\u8ba4\u4e3a\u7531\u7f8e\u4ee5\u4e24\u56fd\u5171\u540c\u5f00\u53d1\u7684\u8ba1\u7b97\u673a\u75c5\u6bd2\u6467\u6bc1\u4e86\u4f0a\u6717\u6838\u8bbe\u65bd\u7684\u79bb\u5fc3\u673a\u30022017\u5e74\u89e3\u5bc6\u7684\u4e2d\u60c5\u5c40\u6587\u4ef6\u63d0\u53ca\u4e86\u8fdc\u7a0b\u5165\u4fb5\u6c7d\u8f66\u7684\u53ef\u80fd\u6027\u2014\u2014\u7ef4\u57fa\u6cc4\u5bc6\u79f0\u8fd9\u79cd\u6280\u672f\u53ef\u4ee5\u7528\u4e8e\u5b9e\u65bd\u201c\u51e0\u4e4e\u96be\u4ee5\u5bdf\u89c9\u7684\u6697\u6740\u201d\u3002\u8fd9\u4e0d\u4ec5\u4ec5\u662f\u7406\u8bba\u4e0a\u7684\u6982\u5ff5\uff1a\u57282015\u5e74\u7684\u300a\u8fde\u7ebf\u300b\u8bb0\u8005\u9a7e\u9a76\u8fc7\u7a0b\u4e2d\uff0c\u5141\u8bb8\u9ed1\u5ba2\u9065\u63a7\u63a7\u5236\u4ed6\u7684\u6c7d\u8f66\u2014\u2014\u4ed6\u4eec\u5728\u4ed6\u884c\u9a76\u5728\u8def\u4e0a\u65f6\u5173\u95ed\u4e86\u5f15\u64ce\u3002<\/p>\n<p>\u4e16\u754c\u5df2\u7ecf\u5f00\u59cb\u5bf9\u8fd9\u4e00\u5a01\u80c1\u505a\u51fa\u8c03\u6574\u3002\u8bb8\u591a\u56fd\u5bb6\u6108\u53d1\u8b66\u60d5\u8d2d\u4e70\u6765\u81ea\u4e0d\u4fe1\u4efb\u56fd\u522b\u901a\u4fe1\u8bbe\u5907\u3002\u7f8e\u56fd\u53ca\u5176\u4ed6\u56fd\u5bb6\u7981\u6b62\u4e2d\u56fd\u534e\u4e3a\u7684\u5927\u578b\u8def\u7531\u5668\uff0c\u62c5\u5fc3\u5b83\u4eec\u53ef\u80fd\u88ab\u7528\u4e8e\u76d1\u542c\u2014\u2014\u751a\u81f3\u66f4\u7cdf\u7684\u60c5\u51b5\u4e0b\uff0c\u5728\u654c\u5bf9\u5347\u7ea7\u4e2d\u88ab\u8fdc\u7a0b\u7981\u7528\u30022019\u5e74\u6709\u8f7b\u5fae\u6050\u614c\u6e90\u4e8e\u53ef\u80fd\u6539\u53d8\u5176\u4e58\u5ba2\u8046\u542c\u65b9\u5f0f\u7684\u4e2d\u56fd\u5236\u9020\u5730\u94c1\u5217\u8f66\u3002<\/p>\n<p>\u4e0d\u4ec5\u4ec5\u9488\u5bf9\u5df2\u5b8c\u6210\u4ea7\u54c1\u7684\u5173\u6ce8\uff0c\u5341\u591a\u5e74\u524d\u7f8e\u519b\u8c03\u67e5\u4e86\u4f7f\u7528\u6765\u81ea\u4e2d\u56fd\u7684\u96f6\u90e8\u4ef6\u5728\u8bbe\u5907\u4e2d\u5e26\u6765\u7684\u5b89\u5168\u98ce\u9669\u30022018\u5e74\u7684\u300a\u534e\u5c14\u8857\u65e5\u62a5\u300b\u62a5\u9053\u63ed\u793a\u4e86\u7f8e\u56fd\u8c03\u67e5\u4eba\u5458\u6307\u63a7\u4e2d\u56fd\u5bf9\u8ba1\u7b97\u673a\u82af\u7247\u8fdb\u884c\u4fee\u6539\u4ee5\u7a83\u53d6\u4fe1\u606f\u7684\u4e8b\u5b9e\u3002<\/p>\n<p>\u5e94\u5bf9\u8fd9\u4e9b\u548c\u7c7b\u4f3c\u653b\u51fb\u7684\u65b9\u6cd5\u4f3c\u4e4e\u5e76\u4e0d\u660e\u663e\u3002\u6211\u4eec\u7684\u9ad8\u79d1\u6280\u4f9b\u5e94\u94fe\u662f\u590d\u6742\u4e14\u56fd\u9645\u5316\u7684\u3002\u5bf9\u4e8e\u54c8\u91cc\u53d1\u515a\u6765\u8bf4\uff0c\u7531\u4e8e\u8fd9\u79cd\u73b0\u8c61\u5728\u6b63\u5e38\u60c5\u51b5\u4e0b\u5e76\u4e0d\u4f1a\u5f15\u8d77\u4efb\u4f55\u8b66\u89c9\uff0c\u56e0\u6b64\u8bbe\u5907\u4ece\u5308\u7259\u5229\u4e00\u5bb6\u516c\u53f8\u8d2d\u4e70\uff0c\u518d\u7531\u53f0\u6e7e\u63d0\u4f9b\u7ed9\u4ed6\u4eec\uff0c\u8fd9\u662f\u5b8c\u5168\u53ef\u4ee5\u63a5\u53d7\u7684\u2014\u2014\u5927\u591a\u6570\u7f8e\u56fd\u4eba\u7684\u7535\u5b50\u8bbe\u5907\u90fd\u662f\u4ece\u6d77\u5916\u91c7\u8d2d\u6765\u7684\uff0c\u5305\u62ec\u82f9\u679c\u624b\u673a\uff0c\u5176\u96f6\u4ef6\u6765\u81ea\u6570\u5341\u4e2a\u56fd\u5bb6\uff0c\u5728\u4e2d\u56fd\u7ec4\u88c5\u3002<\/p>\n<p>\u8fd9\u662f\u4e00\u4e2a\u96be\u4ee5\u89e3\u51b3\u7684\u95ee\u9898\u3002\u6211\u4eec\u65e0\u6cd5\u60f3\u8c61\u534e\u76db\u987f\u4f1a\u901a\u8fc7\u7acb\u6cd5\u8981\u6c42\u82f9\u679c\u624b\u673a\u5b8c\u5168\u5728\u4e2d\u56fd\u751f\u4ea7\uff0c\u6210\u672c\u592a\u9ad8\uff0c\u4e14\u56fd\u5185\u65e0\u80fd\u529b\u5236\u9020\u8fd9\u4e9b\u4ea7\u54c1\u3002\u6211\u4eec\u7684\u4f9b\u5e94\u94fe\u5df2\u7ecf\u6df1\u6df1\u3001\u4e0d\u53ef\u9006\u8f6c\u5730\u56fd\u9645\u5316\u4e86\uff0c\u8981\u6539\u53d8\u8fd9\u4e00\u72b6\u51b5\u9700\u8981\u5c06\u5168\u7403\u7ecf\u6d4e\u62c9\u56de\u81f3\u4e0a\u4e16\u7eaa80\u5e74\u4ee3\u7684\u6c34\u5e73\u3002<\/p>\n<p>\u90a3\u4e48\u63a5\u4e0b\u6765\u4f1a\u53d1\u751f\u4ec0\u4e48\u5462\uff1f\u5bf9\u4e8e\u54c8\u91cc\u53d1\u515a\u800c\u8a00\uff0c\u5176\u9886\u5bfc\u4eba\u548c\u4f5c\u6218\u4eba\u5458\u4e0d\u518d\u80fd\u591f\u4fe1\u4efb\u4e0e\u7f51\u7edc\u8fde\u63a5\u7684\u8bbe\u5907\u2014\u2014\u8fd9\u53ef\u80fd\u662f\u88ad\u51fb\u7684\u4e3b\u8981\u76ee\u6807\u4e4b\u4e00\u3002\u4e16\u754c\u5fc5\u987b\u7b49\u5f85\u4ee5\u89c2\u5bdf\u6b64\u653b\u51fb\u5e26\u6765\u7684\u957f\u671f\u5f71\u54cd\uff0c\u4ee5\u53ca\u8be5\u7ec4\u7ec7\u5c06\u4f1a\u5982\u4f55\u56de\u5e94\u3002<\/p>\n<p>\u4f46\u662f\u73b0\u5728\u8fd9\u4e00\u754c\u9650\u5df2\u7ecf\u8de8\u8d8a\uff0c\u5176\u4ed6\u56fd\u5bb6\u51e0\u4e4e\u80af\u5b9a\u4f1a\u5f00\u59cb\u8003\u8651\u8fd9\u79cd\u7b56\u7565\u662f\u5426\u5408\u6cd5\uff0c\u53ef\u80fd\u5728\u6218\u4e89\u4e2d\u4f7f\u7528\u8fd9\u79cd\u7b56\u7565\u5bf9\u6297\u519b\u961f\u6216\u5728\u6218\u4e89\u524d\u5915\u5bf9\u5e73\u6c11\u8fdb\u884c\u653b\u51fb\u3002\u800c\u5bf9\u4e8e\u50cf\u7f8e\u56fd\u8fd9\u6837\u7684\u53d1\u8fbe\u56fd\u5bb6\u800c\u8a00\u5c24\u5176\u8106\u5f31\uff0c\u53ea\u662f\u56e0\u4e3a\u62e5\u6709\u5927\u91cf\u53ef\u88ab\u5229\u7528\u7684\u6613\u53d7\u653b\u51fb\u8bbe\u5907\u7684\u6570\u91cf\u4f17\u591a\u3002 <\/p>\n<hr>\n<p> <b>\u539f\u6587\u6458\u8981\uff1a<\/b><\/p>\n<p> Israel\u2019s brazen attacks on Hezbollah last week, in which hundreds of pagers and two-way radios exploded and killed at least 37 people, graphically illustrated a threat that cybersecurity experts have been warning about for years: Our international supply chains for computerized equipment leave us vulnerable. And we have no good means to defend ourselves.<br \/>\nThough the deadly operations were stunning, none of the elements used to carry them out were particularly new. The tactics employed by Israel, which has neither confirmed nor denied any role, to hijack an international supply chain and embed plastic explosives in Hezbollah devices have been used for years. What\u2019s new is that Israel put them together in such a devastating and extravagantly public fashion, bringing into stark relief what the future of great power competition will look like \u2014 in peacetime, wartime and the ever expanding gray zone in between.<br \/>\nThe targets won\u2019t just be terrorists. Our computers are vulnerable, and increasingly, so are our cars, our refrigerators, our home thermostats and many other useful things in our orbits. Targets are everywhere.<br \/>\nThe core component of the operation \u2014 implanting plastic explosives in pagers and radios \u2014 has been a terrorist risk since Richard Reid, the so-called shoe bomber, tried to ignite some on an airplane in 2001. That\u2019s what all of those airport scanners are designed to detect \u2014 both the ones you see at security checkpoints and the ones that later scan your luggage. Even a small amount can do an impressive degree of damage.<br \/>\nThe second component, assassination by personal device, isn\u2019t new, either. Israel used this tactic against a Hamas bomb maker in 1996 and a Fatah activist in 2000. Both were killed by remotely detonated booby-trapped cellphones.<br \/>\nThe final and more logistically complex piece of Israel\u2019s plan \u2014 attacking an international supply chain to compromise equipment at scale \u2014 is something that the United States has done itself, though for different purposes. The National Security Agency has intercepted communications equipment in transit and modified it, not for destructive purposes but for eavesdropping. We know from a Snowden document that the agency did this to a Cisco router destined for a Syrian telecommunications company. Presumably, this wasn\u2019t the agency\u2019s only operation of this type.<br \/>\nCreating a front company to fool victims isn\u2019t even a new twist. Israel reportedly created a shell company to produce and sell explosive-laden devices to Hezbollah. In 2019, the F.B.I. created a company that sold supposedly secure cellphones to criminals \u2014 not to assassinate them, but to eavesdrop on and then arrest them.<br \/>\nThe bottom line: Our supply chains are vulnerable, which means that we are vulnerable. Anyone \u2014 any country, any group, any individual \u2014 that interacts with a high-tech supply chain can potentially subvert the equipment passing through it. It could be subverted to eavesdrop. It could be subverted to degrade or fail on command. And, although it\u2019s harder, it can be subverted to kill.<br \/>\nPersonal devices connected to the internet \u2014 and countries in which they are in high use, such as the United States \u2014 are especially at risk. In 2007, the Idaho National Laboratory demonstrated that a cyberattack could cause a high-voltage generator to explode. In 2010, a computer virus believed to have been developed jointly by the United States and Israel destroyed centrifuges at an Iranian nuclear facility. A 2017 dump of C.I.A. documents included statements about the possibility of remotely hacking cars, which WikiLeaks asserted can be used to carry out \u201cnearly undetectable assassinations.\u201d This isn\u2019t just theoretical: In 2015, a Wired reporter allowed hackers to remotely take over his car while he was driving it. They disabled the engine while he was on a highway.<br \/>\nThe world has already begun to adjust to this threat. Many countries are increasingly wary of buying communications equipment from countries they don\u2019t trust. The United States and others are banning large routers from the Chinese company Huawei because we fear that they could be used for eavesdropping and \u2014 even worse \u2014 disabled remotely in a time of escalating hostilities. In 2019 there was a minor panic over Chinese-made subway cars that could possibly have been modified to eavesdrop on their riders.<br \/>\nIt\u2019s not just finished equipment that is under the scanner. More than a decade ago, the U.S. military investigated the security risks of using Chinese parts in its equipment. In 2018, a Bloomberg report revealed U.S. investigators had accused China of modifying computer chips to steal information.<br \/>\nIt\u2019s not obvious how to defend against these and similar attacks. Our high-tech supply chains are complex and international. It didn\u2019t raise any red flags to Hezbollah that the group\u2019s pagers came from a Hungary-based company that sourced them from Taiwan, because that sort of thing is perfectly normal. Most of the electronics Americans buy come from overseas, including our iPhones, whose parts come from dozens of countries before being pieced together primarily in China.<br \/>\nThat\u2019s a hard problem to fix. We can\u2019t imagine Washington passing a law requiring iPhones to be made entirely in the United States. Labor costs are too high, and our country doesn\u2019t have the domestic capacity to make these things. Our supply chains are deeply, inexorably international, and changing that would require bringing global economies back to the 1980s.<br \/>\nSo what happens now? As for Hezbollah, its leaders and operatives will no longer be able to trust equipment connected to a network \u2014 very likely one of the primary goals of the attacks. And the world will have to wait to see if there are any long-term effects of this attack, or how the group will respond.<br \/>\nBut now that the line has been crossed, other countries will almost certainly start to consider this sort of tactic as within bounds. It could be deployed against a military during a war, or against civilians in the run-up to a war. And developed countries like the United States will be especially vulnerable, simply because of the sheer number of vulnerable devices we have.<br \/><\/p>\n<div style=\"margin: 20px 0;\"><div class=\"qrcswholewtapper\" style=\"text-align:left;\"><div class=\"qrcprowrapper\"  id=\"qrcwraa2leds\"><div class=\"qrc_canvass\" id=\"qrc_cuttenpages_2\" style=\"display:inline-block\" data-text=\"https:\/\/news.tomjun.com\/?p=1383\"><\/div><div><a download=\"\u4ee5\u8272\u5217Pager\u653b\u51fb\u5f15\u53d1\u5168\u7403\u53d8\u9769.png\" class=\"qrcdownloads\" id=\"worign\">\r\n           <button type=\"button\" style=\"min-width:200px;background:#44d813;color:#000;font-weight: 600;border: 1px solid #44d813;border-radius:20px;font-size:12px;padding: 6px 0;\" class=\"uqr_code_btn\">\u6587\u7ae0\u4e8c\u7ef4\u7801<\/button>\r\n           <\/a><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u65b0\u95fb\u6765\u6e90\uff1awww.nytimes.com \u539f\u6587\u5730\u5740\uff1a<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[90],"tags":[2252,2255,2253,2254,2256],"class_list":["post-1383","post","type-post","status-publish","format-standard","hentry","category-90","tag-2252","tag-2255","tag-2253","tag-2254","tag-2256"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1383"}],"version-history":[{"count":1,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1383\/revisions"}],"predecessor-version":[{"id":1384,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=\/wp\/v2\/posts\/1383\/revisions\/1384"}],"wp:attachment":[{"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.tomjun.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}