时间:2019-01-11 作者:英语课 分类:VOA标准英语2008年(三月)


英语课
By Mandy Clark
London
13 March 2008
 

Internet experts warn that the Worldwide Web has become a haven 1 for organized crime and they say the threat of online terrorism is real.  At a recent e-crime congress in London, a NATO official said online espionage 2 and Internet-based terrorism represent some of the gravest threats to global security.  VOA's Mandy Clark reports from London. 
 
While people work hard on their computers - so too do the Internet viruses or malicious 3 software known as malware.  Cyber experts say hundreds of thousands of them bombard personal computers every day.  Far from being a mere 4 nuisance, these bugs 5 threaten modern life.


British opposition 6 lawmaker David Davis warned an e-crime conference in London that the danger of cyber terrorism is real.


"In America, hackers 7 have already broken into the Pentagon's computer systems; in India, into government ministers' files; in Germany, into the chancellor's," Davis said. "Such attacks could be designed to compromise safety systems, critical national infrastructure 8, to overwhelm communication systems, or even to cause a run on the bank."


Last April, Estonia fell victim to cyber-terrorism.  A barrage 9 of spam and hacking 10 paralyzed the former Soviet 11 republic's banks and government. 


James Finch 12 is assistant director of the FBI's Cyber Division.  He says governments are in a constant battle with cyber criminals.


"Unfortunately bad guys and their talents are maturing on the Internet, so it is a constant battle or challenge to stay ahead of the Internet criminal," Finch said.


NATO warns that the online terror threat will continue to grow as groups become increasingly aware of its potential.  The military alliance says it considers internet terrorism to be a greater threat than a missile strike.


Cyber security expert Mikko Hyppönen says malware are making the Internet a more dangerous place.


"I think we have never seen as bad a situation as we are seeing right now," Hyppönen said. "We are getting more samples than ever before in the history of malware and many people are surprised by that because people see less outbreaks, but there are still more viruses being created.  And the reason behind this is the virus writers have changed from the old hobby virus writers who did it for fun, to the professionals who do it to make money."


Ghost malware and other bugs are hidden deep within infected computers, allowing criminal gangs to silently gather personal information.  The FBI's James Finch says there is a well-organized, Internet mafia. 


"If there is a crime that is profitable on the Internet, it is safe to say that an organized group of people is probably carrying it out," Finch said. "We are looking at very structured organized groups, individuals who have never physically 13 met, but are collaborating 14 on the Internet globally.


Internet experts say they do not want people to pull the plug on their life online, but rather they caution them to stay vigilant 15, keep anti-virus software up-to-date and know the enemy.




n.安全的地方,避难所,庇护所
  • It's a real haven at the end of a busy working day.忙碌了一整天后,这真是一个安乐窝。
  • The school library is a little haven of peace and quiet.学校的图书馆是一个和平且安静的小避风港。
n.间谍行为,谍报活动
  • The authorities have arrested several people suspected of espionage.官方已经逮捕了几个涉嫌从事间谍活动的人。
  • Neither was there any hint of espionage in Hanley's early life.汉利的早期生活也毫无进行间谍活动的迹象。
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
adj.纯粹的;仅仅,只不过
  • That is a mere repetition of what you said before.那不过是重复了你以前讲的话。
  • It's a mere waste of time waiting any longer.再等下去纯粹是浪费时间。
adj.疯狂的,发疯的n.窃听器( bug的名词复数 );病菌;虫子;[计算机](制作软件程序所产生的意料不到的)错误
  • All programs have bugs and need endless refinement. 所有的程序都有漏洞,都需要不断改进。 来自《简明英汉词典》
  • The sacks of rice were swarming with bugs. 一袋袋的米里长满了虫子。 来自《简明英汉词典》
n.反对,敌对
  • The party leader is facing opposition in his own backyard.该党领袖在自己的党內遇到了反对。
  • The police tried to break down the prisoner's opposition.警察设法制住了那个囚犯的反抗。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
n.下部构造,下部组织,基础结构,基础设施
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
n.火力网,弹幕
  • The attack jumped off under cover of a barrage.进攻在炮火的掩护下开始了。
  • The fierce artillery barrage destroyed the most part of the city in a few minutes.猛烈的炮火几分钟内便毁灭了这座城市的大部分地区。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
adj.苏联的,苏维埃的;n.苏维埃
  • Zhukov was a marshal of the former Soviet Union.朱可夫是前苏联的一位元帅。
  • Germany began to attack the Soviet Union in 1941.德国在1941年开始进攻苏联。
n.雀科鸣禽(如燕雀,金丝雀等)
  • This behaviour is commonly observed among several species of finch.这种行为常常可以在几种雀科鸣禽中看到。
  • In Australia,it is predominantly called the Gouldian Finch.在澳大利亚,它主要还是被称之为胡锦雀。
adj.物质上,体格上,身体上,按自然规律
  • He was out of sorts physically,as well as disordered mentally.他浑身不舒服,心绪也很乱。
  • Every time I think about it I feel physically sick.一想起那件事我就感到极恶心。
合作( collaborate的现在分词 ); 勾结叛国
  • Joe is collaborating on the work with a friend. 乔正与一位朋友合作做那件工作。
  • He was not only learning from but also collaborating with Joseph Thomson. 他不仅是在跟约瑟福?汤姆逊学习,而且也是在和他合作。
adj.警觉的,警戒的,警惕的
  • He has to learn how to remain vigilant through these long nights.他得学会如何在这漫长的黑夜里保持警觉。
  • The dog kept a vigilant guard over the house.这只狗警醒地守护着这所房屋。
学英语单词
afterthreshold behavior
al-ahram
Allium mairei
alumina-thermic welding process
American Physical Society
antivirus software
anus cerebri
arsenic(v) fluoride
arthropodologist
ata
atmospheric-research
Ballantrae
battery of genes
be elevated to
blocking jamming
Bowe
calleo
ceratophryids
collection optics
conflict theory
Criptoalite
cross swell
current quick-breaking protection
dame sybil thorndikes
Dampelas, Tg.
dedicated space
dip vector
elancer
engine hood
engineered cost
eproxindine
EVATA
facsimile vestigial sideband
finely crushed glass
five spice
forty-seven
geostatistics
gradual case analysis
hydatothrips flavidus
hydrophone directivity
hydroximic acid
infection model
interfacers
interminglement
judicial proceedings
Khryashchevka
lake copper
Lanaken
low-tension regulating transformer
LV (low voltage)
magnesia spinel
make a stranger of
measuring jug
mistletoe thrush
multi-rigid-body system
mutual deadlock
nanomicelles
narrow strip-selection method
Neginamycin
non-combatants
nongremial
nornuciferine
Olmsted Falls
operator information area message
oultrage
pallet rack
Pandy's reagent
partitioned data organization
penecontemporaneous structure
peristole
phyllite
program specification block generation
protoetioporphyrin
punched
radially bare
ranksum test
reduccin
rotary sagger machine
scrimmaged
ship in vicinity
shnovial fold
signon verification security
sintered glass filter-bulb
sliding knee
spatial isomorphism
special form of commodity exchange
spinlocks
ST_easy-and-difficult_causing-difficulties-for-oneself-or-others
strain energy of dilation
Suruga-wan
swithers
tealest
technological aspect
tel malhata (tell el milh)
telemark
Tetracera
tide prediction
vision with both driver and object moving
waesuck
Westbury apple
yeast turbidity
Zolotarëvka