时间:2019-02-13 作者:英语课 分类:2018年NPR美国国家公共电台12月


英语课

 


ARI SHAPIRO, HOST:


The U.S. says intellectual property theft by Chinese hackers 1 is growing, and the U.S. will keep naming and shaming suspected cybercriminals. The Chinese are targeting the country's technology - from major corporations, Silicon 2 Valley startups, even college research labs. NPR's Greg Myre has this look.


GREG MYRE, BYLINE 3: To understand China's espionage 4 goals, U.S. officials say, just look at the ambitious aims the country has set out in plans it calls Made In China 2025. By that date, China wants to be a world leader in computing 5 power, military technology and artificial intelligence. And that's just a partial list.


(SOUNDBITE OF ARCHIVED RECORDING)


JOHN DEMERS: It's guidance to the rest of government and to the rest of their companies and to their people that this is what we want to be the best in class at and therefore that you should organize your activities, whether they are legal or illegal, to achieve that.


MYRE: That's John Demers of the Justice Department testifying before the Senate Judiciary Committee. He says recent legal cases against China show the country is aggressively trying to steal technology directly linked to its national goals.


(SOUNDBITE OF ARCHIVED RECORDING)


DEMERS: We of course don't begrudge 6 them their efforts to develop technologically 7, but you cannot use theft as a means to develop yourselves technologically.


MYRE: This Chinese approach doesn't follow the traditional spy-versus-spy battles that largely focus on acquiring government and military secrets. China's targets cover a broad spectrum 8, including things like genetically 9 modified crops, according to Dean Cheng of the Heritage Foundation.


DEAN CHENG: People were stopped at U.S. airports. Their luggage was examined. And they had acquired seeds, seedlings 10, plants - literally 11 the plants themselves.


MYRE: This is just one example, he says, of why U.S. corporations, universities and research labs all need to be aware of China's broad aims.


CHENG: The Chinese see food security as part of comprehensive national power and comprehensive national security. We don't tend to think about food security. They do.


MYRE: The U.S.-China relationship is a complex web of collaboration 12 and competition. Before the trade war, the Chinese were big buyers of American soybeans and other crops. Toys made in China were stacked high under American Christmas trees. More than 300,000 Chinese students study at U.S. universities - nearly a third of all foreign students and far more than any other country. Many are in cutting-edge fields like artificial intelligence, or AI, says David Edelman, who heads a project at MIT on the intersection 13 of technology, the economy and national security.


DAVID EDELMAN: We have a critical gap in the United States of AI expertise 14. Companies from Silicon Valley and elsewhere cannot hire enough trained AI experts - experts in machine learning. And foreign graduate students come to U.S. universities because they're the best.


MYRE: Edelman is well aware the U.S. could be training future adversaries 15. He was in charge of cybersecurity at the National Security Council under President Barack Obama, yet he warns against putting up too many barriers to Chinese students.


EDELMAN: The vast majority of graduate students that are coming to the U.S. for technical training, if they could, they would stay here. They would stay here and found a business or join a business in what is still the most thriving, open, technologically advanced, innovative 16 economy in the world.


MYRE: The U.S. and China signed an agreement in 2015 that called for an end to intellectual property theft. Chinese corporate 17 hacking 18 did go down for a while, according to analysts 19, but it's rising again. In the latest case, the U.S. has charged two Chinese citizens and says they were working for China's main intelligence agency. David Edelman sees this naming and shaming as one way to deter 20 China.


DEMERS: Because if there's one thing that, in my personal experience, really drove some in Beijing nuts, it was the allegation that they were behind every act of cyber theft.


MYRE: The growing U.S. legal cases will put this theory to the test. Greg Myre, NPR News, Washington.



n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
n.硅(旧名矽)
  • This company pioneered the use of silicon chip.这家公司开创了使用硅片的方法。
  • A chip is a piece of silicon about the size of a postage stamp.芯片就是一枚邮票大小的硅片。
n.署名;v.署名
  • His byline was absent as well.他的署名也不见了。
  • We wish to thank the author of this article which carries no byline.我们要感谢这篇文章的那位没有署名的作者。
n.间谍行为,谍报活动
  • The authorities have arrested several people suspected of espionage.官方已经逮捕了几个涉嫌从事间谍活动的人。
  • Neither was there any hint of espionage in Hanley's early life.汉利的早期生活也毫无进行间谍活动的迹象。
n.计算
  • to work in computing 从事信息处理
  • Back in the dark ages of computing, in about 1980, they started a software company. 早在计算机尚未普及的时代(约1980年),他们就创办了软件公司。
vt.吝啬,羡慕
  • I begrudge spending so much money on train fares.我舍不得把这么多钱花在火车票上。
  • We should not begrudge our neighbour's richness.我们不应该嫉妒邻人的富有。
ad.技术上地
  • Shanghai is a technologically advanced city. 上海是中国的一个技术先进的城市。
  • Many senior managers are technologically illiterate. 许多高级经理都对技术知之甚少。
n.谱,光谱,频谱;范围,幅度,系列
  • This is a kind of atomic spectrum.这是一种原子光谱。
  • We have known much of the constitution of the solar spectrum.关于太阳光谱的构成,我们已了解不少。
adv.遗传上
  • All the bees in the colony are genetically related. 同一群体的蜜蜂都有亲缘关系。
  • Genetically modified foods have already arrived on American dinner tables. 经基因改造加工过的食物已端上了美国人的餐桌。 来自英汉非文学 - 生命科学 - 基因与食物
n.刚出芽的幼苗( seedling的名词复数 )
  • Ninety-five per cent of the new seedlings have survived. 新栽的树苗95%都已成活。 来自《现代汉英综合大词典》
  • In such wet weather we must prevent the seedlings from rotting. 这样的阴雨天要防止烂秧。 来自《现代汉英综合大词典》
adv.照字面意义,逐字地;确实
  • He translated the passage literally.他逐字逐句地翻译这段文字。
  • Sometimes she would not sit down till she was literally faint.有时候,她不走到真正要昏厥了,决不肯坐下来。
n.合作,协作;勾结
  • The two companies are working in close collaboration each other.这两家公司密切合作。
  • He was shot for collaboration with the enemy.他因通敌而被枪毙了。
n.交集,十字路口,交叉点;[计算机] 交集
  • There is a stop sign at an intersection.在交叉路口处有停车标志。
  • Bridges are used to avoid the intersection of a railway and a highway.桥用来避免铁路和公路直接交叉。
n.专门知识(或技能等),专长
  • We were amazed at his expertise on the ski slopes.他斜坡滑雪的技能使我们赞叹不已。
  • You really have the technical expertise in a new breakthrough.让你真正在专业技术上有一个全新的突破。
n.对手,敌手( adversary的名词复数 )
  • That would cause potential adversaries to recoil from a challenge. 这会迫使潜在的敌人在挑战面前退缩。 来自辞典例句
  • Every adversaries are more comfortable with a predictable, coherent America. 就连敌人也会因有可以预料的,始终一致的美国而感到舒服得多。 来自辞典例句
adj.革新的,新颖的,富有革新精神的
  • Discover an innovative way of marketing.发现一个创新的营销方式。
  • He was one of the most creative and innovative engineers of his generation.他是他那代人当中最富创造性与革新精神的工程师之一。
adj.共同的,全体的;公司的,企业的
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
分析家,化验员( analyst的名词复数 )
  • City analysts forecast huge profits this year. 伦敦金融分析家预测今年的利润非常丰厚。
  • I was impressed by the high calibre of the researchers and analysts. 研究人员和分析人员的高素质给我留下了深刻印象。
vt.阻止,使不敢,吓住
  • Failure did not deter us from trying it again.失败并没有能阻挡我们再次进行试验。
  • Dogs can deter unwelcome intruders.狗能够阻拦不受欢迎的闯入者。
学英语单词
a. perinealis
accrued charge
acoustic magnetic mine
adlecting
administration of internal affairs
Aflogualnum
ai chi
alternative procedure
ampholite
art and part
artificial caving
assidue
base of petroleum
black cottonwood
blue-green bacterium
bursting speed
cascading down
centricdiatom
cloud-bases
complementary scale
consistorial
conventional-arms
counter-cast
Crista sacralis intermedia
Cynwyl Elfed
Daphne holosericea
departmental arrangement and distribution in commodity stock
Direct Copper Blue 2R
disinflations
drip channel
event oriented simulation
eye-serve
factorization method
facular
Fentathienil
flower
geomagnetic periodic variation
go yachting.
group demodulator filter
harpending
hepatitis sequestrans
information management program
initial overburden pressure
insulation varnish
intrapore
inverse beta process
journal box lid hinge
lanatest
light pressure separator
Lothair
megalodiscs
merry-go-round
monoethanolamine(surfactant)
moving current-weighted Passche indexes
neutralizing water tank
new staff
Nihon-maru
non-specified-time relay
nuclear quadrupole spectrum
oil pressure switch
one-cancels-the-other order
orbit maneuver engine
output transfer function
Pare's suture
plain shank
plant hole
poikilosmotic character
preregeneration
progressive wave
pushback
put somebody up to
RCITR
reducing capacity
reductive alkylation
regional index call warrant
RFRNA
Rhodiola wallichiana
Richardson's ground squirrel
rosette phyllotaxy
semi-tractor
sexlessnesses
sgd.
shell tuck
sickling diathesis
simple deterministic language
spaces out
spantik
spread back
sugarcane top
system of gravitational unit
tea-tree
telephone bills
tiled mode
use test
vendibler
vertical decomposition
voltage and frequency response
wear plate
Y ligament
Yang Shiying
zori