时间:2019-01-27 作者:英语课 分类:PBS访谈商业系列


英语课

   HARI SREENIVASAN: Investigators 1 are calling the recent cyber-attacks on Sony Pictures unprecedented 2, well-planned and possibly the most destructive corporate 3 security breach 4 reported on U.S. soil.


  Sony happens to be releasing a comedy movie called "The Interview," which depicts 5 a fictitious 6 plot to assassination 7 Kim Jong-un, pointing to North Korea's possible involvement in the attack. There's also speculation 8 that China aided in the security breach.
  Joining me now via Skype from Seoul, South Korea, is James Pearson, a reporter for Reuters and the co-author of "North Korea Confidential," due out in February.
  Let's start with the attack on Sony. Does the evidence point to North Korea?
  JAMES PEARSON, Reuters: Well, there's still no — there's still no evidence then that — that — at least there's no conclusive 9 evidence that North Korea was behind the attacks on Sony Pictures.
  What we do know are that there are — there are some hallmarks of this attack, which is similar to an earlier one. Since about 2009, there have been countless 10 attacks on South Korea by a gang which security researchers have nicknamed the Dark Seoul Gang, which was a name for the malware which they were — they were found to use at the time.
  And, later on, the researchers also found that these — these hackers 12 were — on the surface looked like hacktivists. They were defacing Web sites. But the codes that they had written were actually specifically designed to steal North Korean — and military secrets, and also from U.S. bases, of course, which there are — of which there are many here in South Korea.
  So, whilst there is still no conclusive evidence that North Korea is indeed behind this attack — and they have — they have also denied it — just today, they said that it was a righteous deed that perhaps some pro-North Korean activists 13 carried out on their behalf.
  The point is, is that, if they wanted to do that attack, they would have the capability 14 to do so.
  HARI SREENIVASAN: Tell us about the structure of what amounts to the North Korean cyber-unit.
  JAMES PEARSON: Well, within — within North Korea, just like in — in fact, many countries, has its own military intelligence, which is specifically designed to target its — the militaries — the networks of the militaries of its enemies.
  Now, within North Korea, there's an organization that's a slightly shadowy organization, like many of the wings of the government, called the General Reconnaissance Bureau. And within that, there's a further bureau called Bureau 121, which specializes in — in hacking 15, essentially 16.
  HARI SREENIVASAN: You have spoken to North Korean defectors. They have told you that hackers are given incentives 18 to be part of this team.
  JAMES PEARSON: Well, the defectors that we spoke 17 to in Seoul described hacking, as a member of the North Korean elite 19, as a white-collar job, essentially.
  It's a highly sought-after profession. There are many people who do computer science in Pyongyang. In fact, you don't even have to be particularly elite. We spoke to some defectors who said that they studied alongside friends who came all the way from the countryside to Pyongyang to study at the University of Automation and learned — and learned their trades there.
  Now, in terms of the incentives that they give these hackers, one thing you have got to remember is that, if you're in a highly controlled space like North Korea, and you are given access to information from the outside world, then, ideologically 20, it's quite threatening.
  So, the one thing you can do as a state to sweeten the deal for these hackers is make sure that they live very, very comfortably. If you're a hacker 11, for example, you will be given quite a nice apartment. You may — you will have probably a computer in your own house, and you will live quite comfortably.
  You will probably also be able to travel overseas as a part of a North Korean trading delegation 21 and have access to things that most North Koreans simply would never even be aware of, let alone think of.
  HARI SREENIVASAN: James Pearson via Skype from Seoul, South Korea, thanks so much.
  JAMES PEARSON: Thank you.

n.调查者,审查者( investigator的名词复数 )
  • This memo could be the smoking gun that investigators have been looking for. 这份备忘录可能是调查人员一直在寻找的证据。
  • The team consisted of six investigators and two secretaries. 这个团队由六个调查人员和两个秘书组成。 来自《简明英汉词典》
adj.无前例的,新奇的
  • The air crash caused an unprecedented number of deaths.这次空难的死亡人数是空前的。
  • A flood of this sort is really unprecedented.这样大的洪水真是十年九不遇。
adj.共同的,全体的;公司的,企业的
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
n.违反,不履行;破裂;vt.冲破,攻破
  • We won't have any breach of discipline.我们不允许任何破坏纪律的现象。
  • He was sued for breach of contract.他因不履行合同而被起诉。
描绘,描画( depict的第三人称单数 ); 描述
  • The book vividly depicts French society of the 1930s. 这本书生动地描绘了20 世纪30 年代的法国社会。
  • He depicts the sordid and vulgar sides of life exclusively. 他只描写人生肮脏和庸俗的一面。
adj.虚构的,假设的;空头的
  • She invented a fictitious boyfriend to put him off.她虚构出一个男朋友来拒绝他。
  • The story my mother told me when I was young is fictitious.小时候妈妈对我讲的那个故事是虚构的。
n.暗杀;暗杀事件
  • The assassination of the president brought matters to a head.总统遭暗杀使事态到了严重关头。
  • Lincoln's assassination in 1865 shocked the whole nation.1865年,林肯遇刺事件震惊全美国。
n.思索,沉思;猜测;投机
  • Her mind is occupied with speculation.她的头脑忙于思考。
  • There is widespread speculation that he is going to resign.人们普遍推测他要辞职。
adj.最后的,结论的;确凿的,消除怀疑的
  • They produced some fairly conclusive evidence.他们提供了一些相当确凿的证据。
  • Franklin did not believe that the French tests were conclusive.富兰克林不相信这个法国人的实验是结论性的。
adj.无数的,多得不计其数的
  • In the war countless innocent people lost their lives.在这场战争中无数无辜的人丧失了性命。
  • I've told you countless times.我已经告诉你无数遍了。
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
n.(政治活动的)积极分子,活动家( activist的名词复数 )
  • His research work was attacked by animal rights activists . 他的研究受到了动物权益维护者的抨击。
  • Party activists with lower middle class pedigrees are numerous. 党的激进分子中有很多出身于中产阶级下层。 来自《简明英汉词典》
n.能力;才能;(pl)可发展的能力或特性等
  • She has the capability to become a very fine actress.她有潜力成为杰出演员。
  • Organizing a whole department is beyond his capability.组织整个部门是他能力以外的事。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
adv.本质上,实质上,基本上
  • Really great men are essentially modest.真正的伟人大都很谦虚。
  • She is an essentially selfish person.她本质上是个自私自利的人。
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说
  • They sourced the spoke nuts from our company.他们的轮辐螺帽是从我们公司获得的。
  • The spokes of a wheel are the bars that connect the outer ring to the centre.辐条是轮子上连接外圈与中心的条棒。
激励某人做某事的事物( incentive的名词复数 ); 刺激; 诱因; 动机
  • tax incentives to encourage savings 鼓励储蓄的税收措施
  • Furthermore, subsidies provide incentives only for investments in equipment. 更有甚者,提供津贴仅是为鼓励增添设备的投资。 来自英汉非文学 - 环境法 - 环境法
n.精英阶层;实力集团;adj.杰出的,卓越的
  • The power elite inside the government is controlling foreign policy.政府内部的一群握有实权的精英控制着对外政策。
  • We have a political elite in this country.我们国家有一群政治精英。
adv. 意识形态上地,思想上地
  • Ideologically, they have many differences. 在思想意识上,他们之间有许多不同之处。
  • He has slipped back ideologically. 他思想退步了。
n.代表团;派遣
  • The statement of our delegation was singularly appropriate to the occasion.我们代表团的声明非常适合时宜。
  • We shall inform you of the date of the delegation's arrival.我们将把代表团到达的日期通知你。
标签: PBS
学英语单词
acoustic mismatch
activated-sludge effluent
adverbial case
air fuel ratio
anaphylodiagnosis
barium bisulfate
batch sample
be book
bicarboxylic acid cycle
Bolotnoye
bunted
chaperons
chattel real
coal-tar primer
combination logging instrument
consumer farm products
criterional
crossmodally
cut the pack
debromoaplysiatoxin
dense gneiss
detail condition
dextral displacement
dihydropyrans
diktyomas
display to
distilled mustard gas
douglas hemlock
eesi
effective isotropic radiated power dbw contour map
electron energy loss spectroscopy
enpowder
Entoconchidae
family alaudidaes
FIGR
flat lacquer
follow sth up with sth
foreign liquid assets
four phase single stage torque converter
fully controlled bridge
Glosset
good as wheat
hair-tailed moles
heat-resistant wire
hedonistic
human existence
humo ferric podzol
income and expense summary account
interactive simulator
interprocedural data-flow analysis
lactated
leucvorin
ligand-transfer reaction
limiting viscosity
lock banking stop
London School of Economics
make merit with
microsurgical technique
military economics
model-maker
morwong
MPS (mathematical programming system)
multiparameter
n-butylpyrrolioine
non-polarizing electrode
on exhibit
over one's dead body
parapsoriasis en plaques
Picardians
piloerector
prenticing
printing position
production operational capability
push tug boat
radiogeochemistry
Razgon
relative humidity adjustment range
retroperitoneal pneumography
Richard Coeur de Lion
Rondinha
schedule outage rate
scraper equipment
self aligning spherical rolling bearing
sludge box
solid state transformation
St-Aigulin
stepwise multiple regression analysis
sympathetic consideration
tangential cutter
tetralogies of fallot
to come across
Torstein
touchdown zone lights
Vesoul
Vitino
volumetric dilatation
warm-up jacket
weighted residue
Whack it Off
wilderness environment system
wind power plant
Yoshitaka