时间:2019-01-12 作者:英语课 分类:2015年VOA慢速英语(三)月


英语课

AS IT IS 2015-03-09 Iran, US Increase Cyberattacks Despite Nuclear Talks 伊朗与美国一边核谈判一边增加网络攻击


A newly published report says Iran and the United States have increased cyberattacks, even as their top diplomats 1 are working toward a nuclear agreement. The goal is to guarantee that Iran does not develop a nuclear weapon, and to loosen Iran’s international sanctions. 


The top U.S. and Iranian diplomats have been holding almost weekly meetings in an effort to finish an agreement on nuclear weapons. However, a website called The Intercept 2 says that a “cyber war,” attacks against computer networks, is taking place behind the scenes. The website takes some of its information from secret U.S. government documents made public by Edward Snowden. It published details of a U.S. National Security Agency paper, written two years ago. The NSA paper calls for a stronger U.S. answer to Iran’s improved cyber warfare 3 abilities.


The report says Iran learned from a virus called Stuxnet that was placed into its nuclear program. The virus allegedly was put there by U.S. and Israeli intelligence services in 2012.


David Stupples of City University, London is a cyber-warfare expert. He says the incident may have shown Iranian leaders the value of cyber warfare, compared to controversial, costly 4 and dangerous nuclear weapons.


Iran has “now realized they have a much stronger weapon at hand,” Mr. Stupples said. He added that Iran “can continually attack and continually get payoffs from their activities quite cheaply.”


A basic cyberattack means a computer attacker closes down a website. Real problems, however, result when cyberattacks steal or destroy data. That is what happened in the attack on Sony Pictures last year, reportedly by North Korea.   


A year ago, the head of the NSA, Admiral Mike Rogers, told Congress that cyber warfare is here to stay. “Clearly, cyber will be an element of almost any crisis we are going to see in the future,” said Admiral Rogers. He added that he believes cyber warfare was used in Ukraine, Syria and Georgia. “It increasingly is becoming a norm,” he said.


Cyberattacks are inexpensive, secret, and can be denied. Those are some of the reasons that could make them more appealing to terrorists and governments, instead of using conventional or nuclear weapons. 


Words in This Story


abilities – n. (plural) the powers or skills to do something


allegedly – adv. said to have happened but not yet proven


controversial – adj. likely to produce controversy 5; relating to much discussion, disagreement, or argument


conventional – adj. usual or traditional



n.外交官( diplomat的名词复数 );有手腕的人,善于交际的人
  • These events led to the expulsion of senior diplomats from the country. 这些事件导致一些高级外交官被驱逐出境。
  • The court has no jurisdiction over foreign diplomats living in this country. 法院对驻本国的外交官无裁判权。 来自《简明英汉词典》
vt.拦截,截住,截击
  • His letter was intercepted by the Secret Service.他的信被特工处截获了。
  • Gunmen intercepted him on his way to the airport.持枪歹徒在他去机场的路上截击了他。
n.战争(状态);斗争;冲突
  • He addressed the audience on the subject of atomic warfare.他向听众演讲有关原子战争的问题。
  • Their struggle consists mainly in peasant guerrilla warfare.他们的斗争主要是农民游击战。
adj.昂贵的,价值高的,豪华的
  • It must be very costly to keep up a house like this.维修这么一幢房子一定很昂贵。
  • This dictionary is very useful,only it is a bit costly.这本词典很有用,左不过贵了些。
n.争论,辩论,争吵
  • That is a fact beyond controversy.那是一个无可争论的事实。
  • We ran the risk of becoming the butt of every controversy.我们要冒使自己在所有的纷争中都成为众矢之的的风险。
标签: VOA慢速英语
学英语单词
16-bit application
a-methyl-para-tyrosine
aiims
air way
allocation index
An Phuoc
antiedemic
auxiliary brake shoe
Beloti
Betsiamites R.
Boroughbridge
boulevardlike
brbender viscoamylogram
breeding population
chemical styptic
circular head
Clathrulina
cleftpalate
Clementines
committals to memory
cotton and wool mixture
Creed key board perforator
cryotherapists
cybermarkets
differential static pressure
distillery drier house
doctor's solution
drum miller
Drusus, Nero Claudius
Ecker's fluid
elm blight
excopy
ferroelectric storages
fictitious value
fragmentarily
Frohlich high-temperature brea-kdown theory
from beyond the grave
functional error recovery
funditae
gas distribution adjustment
Generic Access Network
Giovanni di Paolo
golombek
hasil
hyperlinks
IACOMS
insulation coefficient
Jīwani
Kieselaluminite
lactotropin
log rule
lyellite (devillite)
mcmeekin
mechanical floor
monodisperse system
network-type analog computer
new atom chemistry
nonpeptidic
nonwashing plate
one-percentage-point
parent companies
penpad
perineoprostatectomy
phase shift keying
potassium permangnate
pro-gram
prognostic value
pseudosquilla ciliata
pull-throughs
put sb to expense
quarryings
reactivity compensation
regular twill
remaining life
retail marketing
rhynchonellas
Riemann lower integral
savoir-faires
segmented cylindrical rod
singing
single-stage distillation
Slovene alphabet
snowflake cataract
soda liparite
speed variation rate
sphenoethmoidal(suture)
steam-refined asphalt
super resolution
synchysite- (y)
taxon.
thalassotherapist
tonforce
top of the morning
topolino
total fatty acid content
transfer resistivity
unity equivalent form
Ustilaginoidea
well location
word vision
write-up
x.2