时间:2019-02-23 作者:英语课 分类:英语语言学习


英语课
This is the VOA Special English Technology Report.
 
A new study looks at privacy in a world where computers can increasingly recognize faces in a crowd or online. Alessandro Acquisti at Carnegie Mellon University's Heinz College in Pittsburgh, Pennsylvania, led the study.
 
Professor Acquisti says social networks like Facebook and LinkedIn represent some of the world's largest databases of identities. He sees increasing threats to privacy in facial recognition software and cloud computing 1 -- the ability to store huge amounts of information in data centers.
 
ALESSANDRO ACQUISTI: "The convergence of all these technologies -- face recognition, social networks, cloud computing -- and all these advances in statistical 2 re-identification techniques and data mining are creating this world where you can blend together online and offline data. You can start from an anonymous 3 face and end up with sensitive inferences about that person.”
 
Recognition systems measure things like the size and position of a nose, the distance between the eyes and the shape of cheekbones. The software compares lots of images to try to identify the person. This is what the professor means by "statistical re-identification techniques."
 
Facial recognition programs are used in police and security operations. But the software is increasingly popular in other uses, including social media sites.
 
For the study, the Carnegie Mellon team used software from Pittsburg Pattern Recognition, or PittPat. Google bought that company last month. The software can recognize faces in photos and videos.
 
The researchers did three experiments. First, they collected profile photos from a dating website. Its users try to protect their privacy by not listing their real name. But comparing their photos to pictures on Facebook identified one out of ten people.
 
In the second experiment, the Carnegie Mellon researchers asked permission to take pictures of students on campus. They compared these to photos on Facebook. This time they correctly identified one-third of the students.
 
In the third experiment, they tried to see how much they could learn about people just from a photo. They found not only names but birthdates, personal interests and even locations, when people listed them. And Professor Acquisti says the technology is only improving.
 
ALESSANDRO ACQUISTI: “Because face recognizers keep improving accuracy, because cloud computing keeps offering more power, and because more and more images of ourselves are going to be online, we are getting really close to this future where what we did as a proof of concept will be possible to do by anyone on a massive scale.”
 
In June, Facebook launched a facial recognition system to help users "tag" or list the names of people in photos. Germany last month became the first country to declare this software an illegal violation 4 of privacy.
 
And that's the VOA Special English Technology Report, written by June Simms. Share your thoughts about privacy and technology at voaspecialenglish.com. I'm Steve Ember.
 
===================================================
 
Facial Recognition Systems Bring Privacy Concerns
Today we take another look at facial recognition systems. These can tag friends in Facebook photos or help police identify suspects in the recent riots in Britain.
 
Kurt Roemer is chief security strategist for Citrix Systems in Fort Lauderdale, Florida. He says technology makes it easier than ever for governments to identify people.
 
KURT ROEMER: "Governments can go through and identify, profile and target people, basically in any order. And it is very much a fine line between effective law enforcement and privacy.” :10
 
Kristene Unsworth researches information policy at Drexel College in Philadelphia, Pennsylvania. She says she is concerned that governments and police are increasingly using facial recognition software without clearly defined policies.
 
KRISTENE UNSWORTH: “There is so much secrecy 5 around this information that we don’t really know how these kind of images or other sorts of personal data points are being used, how long the information is being retained. All of those kinds of things. So I guess for me it is an issue of transparency and dialogue.”:21
 
Questions like these are part of a larger debate about privacy and free speech. After the riots, British Prime Minister David Cameron raised the possibility of interfering 6 with social networks. He said the question was whether it would be right to stop people from communicating "when we know they are plotting violence, disorder 7 and criminality."
 
China's official news agency Xinhua says the British government has "recognized that a balance needs to be struck between freedom and the monitoring of social media tools." Xinhua added, "We may wonder why western leaders, on the one hand, tend to indiscriminately accuse other nations of monitoring, but on the other take for granted their steps to monitor and control the Internet."
 
Europe has some of the world's strongest policies on privacy rights. But Kurt Roemer says, like other western governments, they have not clearly defined their policies on new technologies.
 
KURT ROEMER: “China calling that out really shows that we have some issues to address here from a policy perspective, in addition to technology.” :08
 
One debate involves an action in San Francisco on August eleventh by the Bay Area Rapid Transit 8 system. BART disabled wireless 9 service in some of its underground stations for three hours. It says protesters were planning to use mobile devices to organize activities to disrupt train service. BART has faced protests over what activists 10 say is police abuse by transit officers.
 
BART says it acted to protect public safety. The American Civil Liberties Union of Northern California says the decision was in effect an effort by a government agency "to silence its critics." The Federal Communications Commission says it is collecting information about BART's actions.
 
And that's the VOA Special English Technology Report, written by June Simms. You can find part one of our report on facial recognition systems at voaspecialenglish.com. I'm Steve Ember.

n.计算
  • to work in computing 从事信息处理
  • Back in the dark ages of computing, in about 1980, they started a software company. 早在计算机尚未普及的时代(约1980年),他们就创办了软件公司。
adj.统计的,统计学的
  • He showed the price fluctuations in a statistical table.他用统计表显示价格的波动。
  • They're making detailed statistical analysis.他们正在做具体的统计分析。
adj.无名的;匿名的;无特色的
  • Sending anonymous letters is a cowardly act.寄匿名信是懦夫的行为。
  • The author wishes to remain anonymous.作者希望姓名不公开。
n.违反(行为),违背(行为),侵犯
  • He roared that was a violation of the rules.他大声说,那是违反规则的。
  • He was fined 200 dollars for violation of traffic regulation.他因违反交通规则被罚款200美元。
n.秘密,保密,隐蔽
  • All the researchers on the project are sworn to secrecy.该项目的所有研究人员都按要求起誓保守秘密。
  • Complete secrecy surrounded the meeting.会议在绝对机密的环境中进行。
n.紊乱,混乱;骚动,骚乱;疾病,失调
  • When returning back,he discovered the room to be in disorder.回家后,他发现屋子里乱七八糟。
  • It contained a vast number of letters in great disorder.里面七零八落地装着许多信件。
n.经过,运输;vt.穿越,旋转;vi.越过
  • His luggage was lost in transit.他的行李在运送中丢失。
  • The canal can transit a total of 50 ships daily.这条运河每天能通过50条船。
adj.无线的;n.无线电
  • There are a lot of wireless links in a radio.收音机里有许多无线电线路。
  • Wireless messages tell us that the ship was sinking.无线电报告知我们那艘船正在下沉。
n.(政治活动的)积极分子,活动家( activist的名词复数 )
  • His research work was attacked by animal rights activists . 他的研究受到了动物权益维护者的抨击。
  • Party activists with lower middle class pedigrees are numerous. 党的激进分子中有很多出身于中产阶级下层。 来自《简明英汉词典》
学英语单词
activated 7-dehydrocholesterol
Aethoxidum
Asthana
aumonier
battles of bunker hill
Beta Persei star
big-rig
biventer mandibulae
block of glass wool
BlueStacks
Bogdanovich, Peter
cap and collar mortgage
carpoptosis
carpotetrasporangium
catfishing
channel reversing swithc
chawn
chromatography in aqueous media
clear entry
cognitive consistency
cold-crucible
compound symbols
condensation product
constitutional day
continuous duty laser
copper sulphate treatment
corrected value of air humidity
Crag mylone 85W
crassicaulis
cystitides
Davydivka
desemiticize
Dhākā Dist.
diorthosis
drift ashore
driven by stress of
DRO system
drop in delivery
dual chamber incinerator
Duliray
feerite modulator
ferroelectric ceramic display
franion
free term
futureness
greenfinger
hot-air type heater
insulated oiling pole
inter-scholastic
irresonant
ISOC
jonjoes
legal approach
liver-colo(u)red
load designed waterline
locally solvable group
long range scheduling
massorets
multiple walls
name service
neropathy
neutron monitoring channel
newsticker
nonsentience
organ hymn
over-coats
paloys
pavics
PC - personal computer
peta-joule
Platanus acerifolia
pollos
polycyclic tectonics
pulse switch out
read only mode
red painted steel pipe
representative rates of exchange
residual resistivity
rod bank overlap
rosellinia mirabilis
self-levelling
Steinakirchen
stop on a dime
stoppablest
sub director
sun angle
teacher-researchers
telenomus beneficiens
tendovaginitis granulosa
Teniarene
tensile stressed skin
Tetramitidae
trachelomonas volvocina punctata
trichinosed
uk doh
underextension
voltage-controlled current
walachia (wallachia)
water jet cutter
web gear
wood-boring
zoom past