美国国家公共电台 NPR After DNC Hack, Cybersecurity Experts Worry About Old Machines, Vote Tampering
时间:2019-01-17 作者:英语课 分类:2016年NPR美国国家公共电台8月
After DNC Hack 1, Cybersecurity Experts Worry About Old Machines, Vote Tampering 2
SCOTT SIMON, HOST:
Security experts say that Russian government hackers 4 tapped into the database of the Democratic National Committee and probably other targets. But some officials are worried that votes themselves could be compromised by hackers and potentially tip the results. Now, most states have moved back to paper-backed systems in recent years, but that still leaves a number of states vulnerable, including some political swing states. Zeynep Tufekci is a professor at the University of North Carolina where she studies the social impact of technology. Professor Tufekci joins us now from the university. Thanks so much for being with us.
ZEYNEP TUFEKCI: Thank you for inviting 5 me.
SIMON: How easy is it to hack into an electronic voting machine?
TUFEKCI: Unfortunately, too easy, and this has been demonstrated again and again by security researchers around the country. In my old workplace at Princeton University at the Center for Information Technology Policy, we had this lounging area with comfy couches and the researchers had decorated the place with a voting machine that had been hacked 6 to play Pac-Man instead of counting votes (laughter). And they had done this without even...
SIMON: You zany tech people.
TUFEKCI: Well, they had done this without even tampering with the, you know, no-tamper protections the system was supposed to have had. And when they hacked this, the machine had been in use in jurisdictions 7 around the country with more than 9 million voters. And the worry is in a lot of states that are critical to the election - swing states - they don't even have a paper trail that you can audit 8 with. That's really worrisome given how crucial elections are.
SIMON: Well, I mean, let me state this to you then this baldly - is it possible that election results could be tampered 9 with?
TUFEKCI: It's not a straightforward 10 thing in the sense that, you know, the doomsday scenario 11 where some foreign power or some domestic player hacks 12 all of them because the machines as a - the election machines we have are a patchwork 13 of different systems. It's kind of hard to pull off a centralized hack.
SIMON: Yeah.
TUFEKCI: But let's consider Georgia, which is running electronic-only machines. There's no paper trail. And the systems there...
SIMON: This is the state of Georgia, not the country.
TUFEKCI: It's the state of Georgia, of course, and the machines they're using are more than a decade old, so the hardware is falling apart. And the operating system they're using is Windows 2000, which hasn't been updated for security for years, which means it's a sitting duck. And Georgia traditionally votes for the Republican presidential candidate.
Now, this year, some polls are suggesting a close race. And let's assume there's an upset, and there's a 1 percent win by Hillary Clinton. And let's assume that people are objecting because this is kind of unexpected. There's no way to check. I feel this is such an important, crucial thing that security experts have been warning for 10 years, and maybe this attention with the DNC hack can get us focused on this issue that is not new but keeps not getting fix.
SIMON: Well, I say this as a Chicagoan - there was - there has been vote fraud with paper ballots 14, too.
TUFEKCI: Yes. Fraud comes in many ways, and there's no question that there are ways to steal elections based on paper. But it's easier and more possible to describe tamperproof paper protocols 15 and to implement 16 them. And because of security experts' concerns, a lot of states have moved to paper trails.
The number of states that don't have it include all of Georgia, parts of Pennsylvania, few places even in Florida. And Ohio does have a paper trail, but experts say it's not a reliable and worthy 17 one. So the number of states that are still affected 18 in part or in full by having no paper trail number 12 to 15, depending on how you count, and potentially up to 60 million voters, enough to swing an election.
SIMON: I guess we're thinking of foreign hackers or somebody with an interest in the election, but the way you describe it, it could also be a couple of 17-year-old students at - new to your high school.
TUFEKCI: I don't find the foreign power meddling 19 in U.S. elections that likely because the stakes are so high. I mean, if a foreign country comes, meddles 20 in U.S. elections, they know the U.S. will retaliate 21 very hard against something like that. So I'm not that worried that it's going to be a foreign power, but this lack of security means a corrupt 22 official, as you say, a teenage hacker 3.
We're just losing votes and not even knowing that you lost the votes. All of those are very real possibilities. So while we imagine these apocalyptic 23 scenarios 24 of some foreign power meddling, the real issue is we have the thing falling apart in 10 different ways that we're not fixing.
SIMON: Zeynep Tufekci is a professor at the University of North Carolina. Thanks very much for being with us.
TUFEKCI: Thank you for inviting me.
- He made a hack at the log.他朝圆木上砍了一下。
- Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
- Two policemen were accused of tampering with the evidence. 有两名警察被控篡改证据。 来自《简明英汉词典》
- As Harry London had forecast, Brookside's D-day caught many meter-tampering offenders. 正如哈里·伦敦预见到的那样,布鲁克赛德的D日行动抓住了不少非法改装仪表的人。 来自辞典例句
- The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
- This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
- They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
- Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
- An inviting smell of coffee wafted into the room.一股诱人的咖啡香味飘进了房间。
- The kitchen smelled warm and inviting and blessedly familiar.这间厨房的味道温暖诱人,使人感到亲切温馨。
- Butler entreated him to remember the act abolishing the heritable jurisdictions. 巴特勒提醒他注意废除世袭审判权的国会法令。
- James I personally adjudicated between the two jurisdictions. 詹姆士一世亲自裁定双方纠纷。
- Each year they audit our accounts and certify them as being true and fair.他们每年对我们进行账务审核,以确保其真实无误。
- As usual,the yearly audit will take place in December.跟往常一样,年度审计将在十二月份进行。
- The records of the meeting had been tampered with. 会议记录已被人擅自改动。 来自辞典例句
- The old man's will has been tampered with. 老人的遗嘱已被窜改。 来自辞典例句
- A straightforward talk is better than a flowery speech.巧言不如直说。
- I must insist on your giving me a straightforward answer.我一定要你给我一个直截了当的回答。
- But the birth scenario is not completely accurate.然而分娩脚本并非完全准确的。
- This is a totally different scenario.这是完全不同的剧本。
- But there are hacks who take advantage of people like Teddy. 但有些无赖会占类似泰迪的人的便宜。 来自电影对白
- I want those two hacks back here, right now. 我要那两个雇工回到这儿,现在就回。 来自互联网
- That proposal is nothing else other than a patchwork.那个建议只是一个大杂烩而已。
- She patched new cloth to the old coat,so It'seemed mere patchwork. 她把新布初到那件旧上衣上,所以那件衣服看上去就象拼凑起来的东西。
- They're counting the ballots. 他们正在计算选票。 来自《简明英汉词典》
- The news of rigged ballots has rubbed off much of the shine of their election victory. 他们操纵选票的消息使他们在选举中获得的胜利大为减色。 来自《简明英汉词典》
- There are also protocols on the testing of nuclear weapons. 也有关于核武器试验的协议。 来自辞典例句
- Hardware components and software design of network transport protocols are separately introduced. 介绍系统硬件组成及网络传输协议的软件设计。 来自互联网
- Don't undertake a project unless you can implement it.不要承担一项计划,除非你能完成这项计划。
- The best implement for digging a garden is a spade.在花园里挖土的最好工具是铁锹。
- I did not esteem him to be worthy of trust.我认为他不值得信赖。
- There occurred nothing that was worthy to be mentioned.没有值得一提的事发生。
- She showed an affected interest in our subject.她假装对我们的课题感到兴趣。
- His manners are affected.他的态度不自然。
- He denounced all "meddling" attempts to promote a negotiation. 他斥责了一切“干预”促成谈判的企图。 来自辞典例句
- They liked this field because it was never visited by meddling strangers. 她们喜欢这块田野,因为好事的陌生人从来不到那里去。 来自辞典例句
- Who meddles in all things may shoe the gosling. 闲事样样管,时间白白丢。 来自互联网
- He sought every opportunity to retaliate against his enemy.他找机会向他的敌人反击。
- It is strictly forbidden to retaliate against the quality inspectors.严禁对质量检验人员进行打击报复。
- The newspaper alleged the mayor's corrupt practices.那家报纸断言市长有舞弊行为。
- This judge is corrupt.这个法官贪污。
- The air is chill and stagnant,the language apocalyptic.空气寒冷而污浊,语言则是《启示录》式的。
- Parts of the ocean there look just absolutely apocalyptic.海洋的很多区域看上去完全像是世界末日。
- Further, graphite cores may be safer than non-graphite cores under some accident scenarios. 再者,根据一些事故解说,石墨堆芯可比非石墨堆芯更安全一些。 来自英汉非文学 - 环境法 - 环境法
- Again, scenarios should make it clear which modes are acceptable to users in various contexts. 同样,我们可以运用场景剧本来搞清楚在不同情境下哪些模式可被用户接受。 来自About Face 3交互设计精髓