Professional Documents
Culture Documents
http://www.upscportal.com
Downloaded From: http://www.upscportal.com
THE HINDU: Hindi Translation
If the Stuxnet attack on Iran was a limited act of cyber ldrk gw¡ fd vius lHkh iSekuksa ds ckotwn] gekjs ije.k.kq flLV~e dks
sabotage, on September 28 the U.S. attempted to imagine daI;qVj ok;jl dh enn ls u"V djus esa 'k=q iwjh rjg ls vlQy
what an all-out cyber war might look like and whether it gks pqds gSaA ;fn bZjku ij gqvk LVDlusV geyk] lkbcj ;q) dk
was equipped to deal with it. lhfer dk;Z Fkk] rks 28 flracj dks ;w,l us Hkh ;g dYiuk djus dk
Cyber Storm III
iz;kl fd;k fd okLro esa lai.w kZ lkbcj ;q) dSlk fn[krk gS vkSj D;k
9. In an exercise named Cyber Storm III, involving
og blls fuiVus ds fy, iw.kZ :i ls rS;kj Fkk \
government agencies and 60 private sector organisations
including the banking, chemical, nuclear energy and IT
sectors, it presented a scenario where America was hit ¼9½ lkbcj LVkWeZ III uked vH;kl ] ftlesa ljdkjh ,tsfa l;ksa
by a co-ordinated cyber shock-and-awe campaign, hitting lfgr dSfedy] vkbZVh vkfn ls 60 izkbosV lsDVj laxBu 'kkfey Fks] us
1,500 different targets. The results of the exercise have ,d vuqeku is'k fd;k fd lkbcj >Vds vkSj Hk; vfHk;ku ls vesfjdk
not been released. fdruk izHkkfor gqvkA lkbcj >Vds yxHkx 1500 y{;ksa dks pksV igqp a k
10. One of those who believes that cyber war has jgs gSAa gkykafd bl vH;kl dk fjtYV lkoZtfud :i ls ?kksf"kr ugha
finally come of age is James Lewis of the Centre for fd;k x;kA
Strategic and International Studies in Washington. Lewis ¼10½ ^lsaVj QkWj n LVªsVftd ,aM baVjus'kuy LVMht
said that while previous large-scale hacking attacks had ¼okf'kaxVu½* ds tsEl Y;qbl mu pan tkudkjh esa ls ,d gS]a ftudk
been an annoyance, Stuxnet and the attack on Centcom fo'okl gS fd lkbcj ;q) vUrr% viuh mez ij vk pqdk gSA Y;wbl
represented the use of malicious programmes as
us dgk fd iwoZ esa gksus okys O;kid Lrj ds gSfdax geys ,d cM+h
significant weapons. “Cyber war is already here,” said
ijs'kkuh Fks] exj LVDlusV vkSj lsaVdkWe ij gqvk geyk] }s"kiw.kZ
Lewis. “We are in the same place as we were after the
invention of the aeroplane. It was inevitable someone izksxzkeksa dks lkFkZd gfFk;kjksa ds iz;ksx ds rkSj ij n'kkZrk gSA mUgksaus
would work out how to use planes to drop bombs. dgk fd lkbcj ;q) ;gka igys ls gh gSA ge mlh LFkku ij gS]a tgka
Militaries will now have a cyber-war capability in their ge gokbZ tgkt dk vfo"dkj gkssus ds ckn Fks vkSj ;g vifjgk;Z Fkk
arsenals. There are five already that have that capacity, fd dksbZ ij bl dke djsxk fd tgkt dk iz;ksx ce fxjkus ds fy,
including Russia and China.” Of those, Lewis said he dSls fd;k tk,A lsukvksa ds ikl vc muds 'kL= HkaMkjksa esa lkbcj
believed only three had the motivation and capability to ;q) dh {kerk,a Hkh gSAa :l vkSj phu lfgr dqy ikap ns'k gS]a ftuds
mount the Stuxnet attack on Iran: the U.S., Israel and the ikl ;s {kerk,a gSAa Y;qbl us dgk fd lHkh ikap ns'kksas esa ls dsoy rhu
U.K. ds ikl bZjku esa LVDlusV geyk djus dh izjs .kk vkSj ;ksX;rk Fkh vkSj
11. He added that a deliberate hack of an electric os rhu ns'k ;w,l] btjkby vkSj ;wds ¼baxySaM½ gSaA
generator at the Idaho National Laboratory, via the
¼11½ mUgksua s ;g Hkh dgk fd baVjusV ds tfj, ^bnkgksa us'kuy
internet, had previously demonstrated that infrastructure
yScksjVs ªh* ds ,d bySfDVªd tujsVj dks tkucw>dj gSd (Hack)fd,
could be persuaded to destroy itself.
12. “There is growing concern that there has already
tkus fd ?kVuk ls ;g igys gh fl) gks pqdk Fkk] fd cqfu;knh <kaps
been hostile reconnaissance of the U.S. electricity grid,” dks [kqn u"V djus ds fy, rS;kj fd;k tk ldrk gSA
he said. ¼12½ mUgksaus dgkA ;g rsth ls c<+rh gS fpark fd ;w,l
‘Just a matter of time’ bySfDVªflVh fxzM dh igys ls gh 'k=qrkiw.kZ Vksg gks pqdh gSA
13. Last year, the Wall Street Journal quoted U.S.
intelligence officials describing how cyber spies had ¼13½ fiNys o"kZ] okWyLVªhV tuZy esa Nik fd ;w,l baVfs ytsl
a
charted the on-off controls for large sections of the U.S. vf/kdkjh O;k[;k dj jgs gSa fd dSls lkbcj xqIrpjksa us ;w,l fxzM
grid and its vulnerability to hacking. ds yacs [kaM vkSj bldh gSd djus dh {kerk ds fy,] blds
14. The head of the Pentagon’s newly inaugurated vkWu&vkWQ fu;a=.kksa dk uD'kk rS;kj fd;kA
U.S. Cyber Command, General Keith Alexander, has ¼14½ isaVkxu ds uofufeZr ^;w,l lkbcj dekaM* ds v/;{k
recently said that it is only a matter of time before America
tujy dhFk ,ysDtsaMj us gky gh esa dgk fd ;g dsoy le; dk
is attacked by something like the Stuxnet worm.
ekeyk gS] blls igys fd LVDlusV dh rjg fdlh ds }kjk vesfjdk
15. In recent testimony to Congress, Alexander
underlined how the cyber war threat had rapidly evolved ij Hkh geyk gksA
in the past three years, describing two of the most high-
http://www.upscportal.com
Downloaded From: http://www.upscportal.com
THE HINDU: Hindi Translation
profile attacks on countries: a 2007 assault on Estonia, ¼15½ dkaxzsl dks fn, vius gkfy;k izek.kksa esa ,ysDtsaMj us
and a 2008 attack on Georgia during its war with Russia, crk;k fd dSls fiNys rhu lkyksa esa lkbcj ;q) cgqr rsth ls QSyk
both blamed on Moscow. gS\ mUgksaus jk"Vªksa ij gq, nks cgqpfpZr geyksa ds ckjs esa crk;kA :l
16. Those were “denial of service” attacks that ds lkFk 2007 esa ;q) ds nkSjku ,LVksfu;k vkSj 2008 esa T;ksftZ;k ij
disabled computer networks. But it is destructive attacks
geyk gqvk vkSj nksuks gh ns'kksa us blds fy, ekWLdks ij nks"k ea<+kA
such as Stuxnet that frighten Alexander the most.
¼16½ os ^fMuk;y vkWQ lfoZl (Denial of Service)geys Fks]
Agreements needed
17. He favours agreements similar to nuclear
ftUgksaus daI;qVj usVodZ dk fuf"Ø; dj fn;k] exj ;s geys
weapons treaties with countries such as Russia to limit LVDlusV dh rjg gh fouk'kdkjh gSA LVDlusV og geyk gS] ftlus
the retention and use of cyber-war technology. ,ysDtsaMj dks lcls vf/kd Mjk;kA
18. One of the problems that will confront states in
this new era is identifying who is behind an attack. Some ¼17½ tujy ,tsDtsM a j lkbcj ;q) rduhd ds mi;ksx s vkSj
analysts believe Israel is the most likely culprit in the ml ij LokfeRo dks lhfer djus ds fy, ijek.kq gfFk;kj laf/k;ksa ds
Stuxnet attack on Iran — perhaps through its cyber war leku] :l tSls ns'kksa ds lkFk le>kSrs dh odkyr djrs gSa]
“unit 8200”, which has been given greater resources. ¼18½ lkbcj geys ds ihNs dkSu gS] bldh igpku djuk Hkh
They point to a file in the worm called Myrtus — perhaps jk"Vªkas ds lkeus bl u, ;qx esa ,d leL;k gksxhA dqN fo'ys"kdksa dk
an oblique reference to the book of Esther and Jewish ekuuk gS fd bZjku ij gq, LVDlusV geys ds fy, 'kk;n btjkby
pre-emption of a plot to kill them. But it could also be a
vius lkbcj ;q) ^;wfuV 8200* ds tfj, vf/kdka'k :i ls ftEesokj
red herring designed to put investigators off the scent.
gS] ftls egku lalk/ku fn, tk pqds gSa os feVlZ (Myrtus)uked
19. Dave Clemente, a researcher into conflict and
technology at the Royal United Services Institute at ok;jl esa ,d iafDr dh vksj b'kjk djrs gSa & ;g 'kk;n vLFkj
Chatham House in London, argues that where once the vkSj T;qbl dh iqLrd ds vizR;{k lanHkZ gS]a ftlesa mUgsa ekjus ds fy,
threat from cyber war was “hyped ... reality has quickly tehu ds iwoZ [kkyhiu dk ftØ gSA
caught up”. ¼19½ yanu ds p;u gkml esa fLFkr ^jkW;y ;wukbVsM lfoZflt
20. “You look at the Stuxnet worm. It is of such baLVhV~;wV* ds la?k"kZ ,oa rduhd esa 'kks/kdrkZ nos fDyesaV rdZ djrs
complexity it could only be a state behind it,” he said. gq, dgrs gSa & ^^lkbcj ;q) ls ,d ckj tgka Hk; c<+k Fkk ------- ogha
21. Clemente points to the fact that the attack used bldh lPpkbZ tYn gh idM+h tk pqdh gSA
four separate, unpublicised flaws in the operating system ¼20½ mUgksua s dgk ^^vki LVDlusV ok;jl dks ns[ks]a blesa dqN
of the Bushehr plant to infect it. Other experts note that tfVyrk,a gS ,sls esa blds ihNs dksbZ jk"Vª gh gks ldrk gSA
Stuxnet used genuine verification code stolen from a
¼21½ fDyeaV rF; dh vksj b'kkjk djrs gSa fd ^c'ksgj IykaV
Taiwanese company, and that the worm’s designers built
ds vkWijsfVax flLV~e dks nwf"kr djus ds fy, geys esa pkj fcYdqy
in safeguards to limit the amount of collateral damage it
would cause.
vyx vkSj turk dh utjksa ls cps gq, ok;jl dk iz;ksx fd;k x;kA
22. “The U.S. and the U.K. are now putting large amounts ogha vU; ,DliVZ crkrs gSa fd LVDlusV esa rkbokuh daiuh ls pqjk;k
of resources into cyber warfare, in particular defence x;k 'kq) tkap dksM (Genuine Ventecation code) iz;ksx fd;k x;k
against it,” said Clemente, pointing out that there is now vkSj ok;jl fMtkbujksa us bldh vfrfjDr {kfr dh ek=k dks lhfer
a cyber security operations centre in GCHQ (British ds fy, bldks lqj{kk dop esa fufeZr fd;kA
government communications headquarters) and a new ¼22½ fDyesVa us dgk fd lkbcj ;q) esa j{kk ds fy, vesfjdk
office of cyber security in the Cabinet Office. He added: vkSj baXySaM vc j{kk ekeyksa ds Lrj ij lkbcj ;q) esa cM+h ek=k esa
“What I think you can say about Stuxnet is that cyber lalk/ku yxk jgs gSaA mUgksaus crk;k fd vc lhth,p;w ¼fczfV'k
war is now very real. This appears to be the first instance xouZeVas dE;qfuds'ku gSMDokVZj½ esa lkbcj flD;qfjVh vkWijs'ku vkSj
of a destructive use of a cyber war weapon.” — © dSfcusV dk;kZy; esa lkbcj flD;qfjVh dk u;k dk;kZy; gSA mUgksua s
Guardian Newspapers Limited, 2010
dgk ^^eSa le>rk gwa fd LVDlusV ds ckjs esa vki dg ldrs gSa fd
lkbcj ;q) vkt iwjh rjg ls lp gSA ;g lkbcj ;q) gfFk;kjksa ds
fouk'kdkjh mi;ksx dk igyk mnkgj.k izrhr gksrk gSA** Gaurdian
Newspaper Limited 2010