时间:2019-01-14 作者:英语课 分类:VOA标准英语2011年(三月)


英语课

Online communication tools played a huge role in recent government changes in Tunisia and Egypt. But they also showed how easily governments can interrupt Internet traffic and cell phone transmissions. VOA's David Byrd has this look at the future of online communications in the Middle East, and how more of the control is moving from the government to the people.

The turmoil 1 in the Middle East - including the recent "revolutions" in Tunisia and Egypt - have highlighted the role of technology - including the Internet and mobile devices. Social media - including Facebook and Twitter - also played large roles in both Egypt and Tunisia.

Government's online action

But both revolutions also showed how governments can still cut off communications.

Courtesy of Julian York

Jillian York

Jillian York is with the Berkman Center for Internet and Society at Harvard University in Cambridge, Massachusetts. She says that the Tunisian government used old-school "Phishing" attacks to get Facebook user's passwords and hijack 2 their accounts.

"A user would try to log in to Facebook.com and would be redirected to a page that looked just like the login page, " she said. "When they logged in, their password was captured and their account was thus taken away from them."

Facebook eventually responded by implementing 3 secure servers or "https" accounts for its users. The social networking site also put up a roadblock that asked users to identify people in their photos in order to log in. The solution took less than a week, but many accounts had been compromised.

In Egypt, the government action was deeper and more widespread. The government-owned Telecom Egypt controls nearly all the fiber 4 optic cables on which Internet service providers were required to lease space.

Egypt's internal networks also relied on information services located outside the country, including e-mail servers at Google, Yahoo, and Microsoft. By cutting off contact with the outside world, the government crippled internal communications as well.

Activists 5 in Egypt found ways around the shutdown by using self-purchased satellite dishes to watch television coverage 6 of events. After five days Internet and cell service was restored. But similar government-sponsored service interruptions controls have occurred in Iran, Syria, Iraqi Kurdistan and elsewhere in the Middle East.

Courtesy of Michael Rubin

Michael Rubin

Michael Rubin is a resident scholar at the American Enterprise Institute in Washington. He told VOA that governments' grip on communication will be loosened as technology gets smaller and more sophisticated.

"We are going to see a miniaturization of Internet Service Providers and satellite receivers and satellite phones and the means for independent communication," Rubin said. "At the same time, we are going to see the governments trying to come up with jamming technologies which will prevent ordinary people from having an independent communications platform."

MIT

Luke Hutchison

Luke Hutchison is a PhD candidate at MIT in Cambridge, Massachusetts, specializing in computer science and computational biology. He says one way that people can get around government control is smaller networks, including peer-to-peer sharing.

"So you could have a string of laptops where each laptop was only in range of one laptop down the valley and one laptop down the valley, but it would bounce an Internet signal from laptop to laptop all the way up the valley," he said.

"So at the very top of this valley you could get a signal that had been transmitted along say 20 laptops. So these sorts of networks show a lot of promise for future communications," he added.

Michael Rubin also says people could set up their own Internet networks using satellite up-links to dial into servers outside their country.

"For example, when Syrians wanted to use Internet illegally, often times what they would do is simply dial into Lebanese Internet Service Providers," he said.

"The question is for example whether the Libyans will someday be able to access directly Italy's servers or France's servers - whether technology is going to be constrained 7 by borders or whether borders are going to become irrelevant 8 when it comes to networks," Rubin added.

'Kill switch'

But Luke Hutchison says governments can still maintain a so-called "kill switch" particularly if the government owns or licenses 9 the communications networks or fiber optic cables.

In some cases, governments control the infrastructure 10 to which social media are connected - as it did in Egypt and still does in countries like China, Iran and Syria - and Internet access can be hindered. Authoritarian 11 regimes can also use the same tools - Internet pages, SMS, and mobile devices - to rally their supporters. There are still also places where the so-called information superhighway is limited to a virtual one-lane road.

The Chinese government used a so-called "choke point" in 2009 to shut down Internet and cellular 12 service during unrest in the Xinjiang region of western China. But Hutchison said that people who are determined 13 to exercise their civil rights will still find ways to communicate.

"Once you have tasted freedom, particularly information freedom, it is very difficult for someone to take that away from you," Hutchison said.

"China is an interesting case. More and more you see Chinese citizens not just sitting back and accepting the injustices 14 they see around them but actually saying something and doing something about it. And more and more the government is stepping back and not allowing that control to take place," Hutchison said.

Ways around

Jillian York of the Berkman Center says that even if governments try to block Internet communication, there are ways around the interference.

"Even with Facebook or Twitter being blocked, there are numerous ways to get around that," she said.

"There are circumvention 15 tools, when https is enabled it is very difficult and unlikely that a government is going to block all https communications. And there are also projects like the Tor project that provides both anonymity 16 and circumvention," York added.

Mobile devices are getting smaller and more powerful. With the advent 17 of smart phones like the iPhone and Android devices in the Middle East, people are carrying more power in their back pocket than rooms full of machines could generate a generation ago. New media have given the world a window into what is happening on the ground in countries like Tunisia, Egypt and Libya. But whether governments in the region will embrace new media or resist them remains 18 an open question.



n.骚乱,混乱,动乱
  • His mind was in such a turmoil that he couldn't get to sleep.内心的纷扰使他无法入睡。
  • The robbery put the village in a turmoil.抢劫使全村陷入混乱。
v.劫持,劫机,拦路抢劫
  • Most countries refuse to give sanctuary to people who hijack aeroplanes.大多数国家拒绝对劫机者提供庇护。
  • The hijack take place just after the plane take off.劫持是飞机刚起飞后发生的。
v.实现( implement的现在分词 );执行;贯彻;使生效
  • -- Implementing a comprehensive drug control strategy. ――实行综合治理的禁毒战略。 来自汉英非文学 - 白皮书
  • He was in no hurry about implementing his unshakable principle. 他并不急于实行他那不可动摇的原则。 来自辞典例句
n.纤维,纤维质
  • The basic structural unit of yarn is the fiber.纤维是纱的基本结构单元。
  • The material must be free of fiber clumps.这种材料必须无纤维块。
n.(政治活动的)积极分子,活动家( activist的名词复数 )
  • His research work was attacked by animal rights activists . 他的研究受到了动物权益维护者的抨击。
  • Party activists with lower middle class pedigrees are numerous. 党的激进分子中有很多出身于中产阶级下层。 来自《简明英汉词典》
n.报导,保险范围,保险额,范围,覆盖
  • There's little coverage of foreign news in the newspaper.报纸上几乎没有国外新闻报道。
  • This is an insurance policy with extensive coverage.这是一项承保范围广泛的保险。
adj.束缚的,节制的
  • The evidence was so compelling that he felt constrained to accept it. 证据是那样的令人折服,他觉得不得不接受。
  • I feel constrained to write and ask for your forgiveness. 我不得不写信请你原谅。
adj.不恰当的,无关系的,不相干的
  • That is completely irrelevant to the subject under discussion.这跟讨论的主题完全不相关。
  • A question about arithmetic is irrelevant in a music lesson.在音乐课上,一个数学的问题是风马牛不相及的。
n.执照( license的名词复数 )v.批准,许可,颁发执照( license的第三人称单数 )
  • Drivers have ten days' grace to renew their licenses. 驾驶员更换执照有10天的宽限期。 来自《现代汉英综合大词典》
  • Jewish firms couldn't get import or export licenses or raw materials. 犹太人的企业得不到进出口许可证或原料。 来自辞典例句
n.下部构造,下部组织,基础结构,基础设施
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
n./adj.专制(的),专制主义者,独裁主义者
  • Foreign diplomats suspect him of authoritarian tendencies.各国外交官怀疑他有着独裁主义倾向。
  • The authoritarian policy wasn't proved to be a success.独裁主义的政策证明并不成功。
adj.移动的;细胞的,由细胞组成的
  • She has a cellular telephone in her car.她的汽车里有一部无线通讯电话机。
  • Many people use cellular materials as sensitive elements in hygrometers.很多人用蜂窝状的材料作为测量温度的传感元件。
adj.坚定的;有决心的
  • I have determined on going to Tibet after graduation.我已决定毕业后去西藏。
  • He determined to view the rooms behind the office.他决定查看一下办公室后面的房间。
不公平( injustice的名词复数 ); 非正义; 待…不公正; 冤枉
  • One who committed many injustices is doomed to failure. 多行不义必自毙。
  • He felt confident that his injustices would be righted. 他相信他的冤屈会受到昭雪的。
n.陷害,欺骗
  • They gave a pledge that there would be no circumvention via third coutries. 他们保证不会有通过第三国进行包围的事。 来自辞典例句
  • The anti-circumvention clause has its " validity and rationality. " 反规避条款有其存在的合法性和合理性。 来自互联网
n.the condition of being anonymous
  • Names of people in the book were changed to preserve anonymity. 为了姓名保密,书中的人用的都是化名。
  • Our company promises to preserve the anonymity of all its clients. 我们公司承诺不公开客户的姓名。
n.(重要事件等的)到来,来临
  • Swallows come by groups at the advent of spring. 春天来临时燕子成群飞来。
  • The advent of the Euro will redefine Europe.欧元的出现将重新定义欧洲。
n.剩余物,残留物;遗体,遗迹
  • He ate the remains of food hungrily.他狼吞虎咽地吃剩余的食物。
  • The remains of the meal were fed to the dog.残羹剩饭喂狗了。
学英语单词
air-mail paper
alliaceous odor
American Merchant Marine Institate
ammonium pyrosulfite
analytical statics
antitranspirants
arteflene
Aster L.
bahias
bake-sale
be around
bee escape
beta-Chemokines
biological unit
bog rush
brimming over with
bubble cavitation
business performance
Caimodorro
Carapidae
careful writing
catalysator
circumferential register adjustment
circumscriptly
commodity future
compaction deformation
continuously adjustable setting-range
countertop
demodectic mange
desetope
desynchronises
differentiation of Zang and Fu
diffusion activation energy
digital video bandwidth
double-breasted plough
embedded operating system
fibrinolysin(plasmin)
fibromyxoid sarcoma
film layer
Floian
four center polymerization
four-sections
Fresvik
gone under the knife
gorbals
gunboat policy
Hebden
index of fixed construction
infinite dimension
Isle of Whithorn
j. form
judicial committee
junction box header
Khaypudyrskaya Guba
Kinver
Kittel overflow tray
Kusada
Lake Biddy
lambda particle
lifeboat with self-contained air support system
lifelore
luncheteria
Lurgi catalyst
mirina
movable barrage
Net Receivables
noooooo
optical refractometry and reflectometry
padnag
Payables on equipment
peripheral arteriole
person supporting prosecution
pixel peeper
plane axiom
press revises
primary gangrene
printanier
public-assembly
relator
ridge welding
rosa cymosa tratt
Rostan's asthma
satellite intercept
scutiger
shipborne navigational aid
skin-friction drag
Skua L.
soochongs
spectral hole burning
Spirochaeta hermsi
St-Louis, L.
Structured Storage
subdivergences
suprabuccalis
Talmont
to ourselves
toxic action
tractor roller
tranquillising
us wireless
washbasket
xiph-