时间:2018-12-17 作者:英语课 分类:2016年NPR美国国家公共电台9月


英语课

Russian Hackers 2 Doxxed Me. What Should I Do About It? 


play pause stop mute unmute max volume 00:0004:19repeat repeat off Update Required To play the media you will need to either update your browser 3 to a recent version or update your Flash plugin. RACHEL MARTIN, HOST: 


What to do and who to blame when you've been the victim of a cyber intrusion - NPR's David Welna had to find out firsthand.


DAVID WELNA, BYLINE 4: It's a strange experience seeing your own passport posted on a pro-Kremlin news site. That's what happened to me after Ukraine's Defense 5 Ministry 6 got hacked 7, including the documents I had sent there to get press credentials 8. I was identified on that news site as a high-ranking U.S. adviser 9. The episode does not surprise Ukrainian journalist Alya Shandra.


ALYA SHANDRA: This is how Russian propaganda works. They just take some document that they find somewhere and they send this absurd story around. Ukraine is being run by the Americans. That's their main narrative 10.


WELNA: The Ukraine Defense Ministry's hacking 11 forced me to get a new passport. Things get even more complicated when it comes to the hack 1 of the Democratic National Committee's emails. Adam Schiff is the top democrat 12 on the House Intelligence Committee. Russia, he says, needs to be named and blamed.


ADAM SCHIFF: I would like to see the administration make public the attribution of responsibility for the hack. There's ample evidence - certainly, we've seen ample evidence even within the public sources.


WELNA: Indeed, there already has been quite a bit of attribution of responsibility by the news media.


(SOUNDBITE OF ARCHIVED RECORDING)


RENE MARSH 13: The cybersecurity firm called in to investigate tells CNN the perpetrators are affiliated 14 with the Russian government.


WELNA: But not all cybersecurity experts are rushing to blame the Kremlin.


JEFFREY CARR: The problem with cyberspace 15 is that you can't confirm your suspicions because anybody can pretend to be anyone.


WELNA: That's Jeffrey Carr. He heads Taia Global, a cybersecurity firm that assesses the risk of being hacked. He says while the tool used to hack the DNC was made by a Russian company, there's no conclusive 16 evidence it was Russia's authorities who used it.


CARR: And this is why skepticism is so critical when it comes to claims of attribution in cyberspace because it's very easy to place the blame on a foreign power, especially if there's already tension between the U.S. and that other foreign power.


WELNA: Russian President Vladimir Putin, for his part, flatly denies having a hand in the DNC hack. He was asked about it by Bloomberg News.


(SOUNDBITE OF ARCHIVED RECORDING)


PRESIDENT VLADIMIR PUTIN: (Through interpreter) I don't know anything about it. And on a state level, Russia has never done this.


WELNA: A few days after Putin's claim that Russia had never done anything like this on a state level, Defense Secretary Ash Carter spoke 17 in Oxford 18, England. He declared that while the U.S. wanted neither a cold nor a hot war with Russia...


(SOUNDBITE OF ARCHIVED RECORDING)


ASH CARTER: We will counter attempts to undermine our collective security, and we'll not ignore attempts to interfere 19 with our democratic processes.


WELNA: It was the closest any administration official had come to publicly suggesting Russia is meddling 20 in the presidential election.


(SOUNDBITE OF ARCHIVED RECORDING)


JOHN MCCAIN: Is that the best the United States can do?


WELNA: That's what Senate Armed Services Committee Chairman John McCain wanted to know at a hearing on cybersecurity. Seated before him in the witness chair was Admiral Mike Rogers, commander of the U.S. Cyber Command. While Rogers seemed to sympathize with McCain's frustration 21 over the administration's muted response to the hacks 22, he would not start naming names.


(SOUNDBITE OF ARCHIVED RECORDING)


MIKE ROGERS: Sir, we continue to see activity of concern. Again, I'm not going to characterize this activity - is it a foreign nation state or not?


WELNA: The official line from the administration is that it's waiting for the FBI to complete an investigation 23 of the DNC hack before making any attributions of responsibility. Connecticut Democratic Senator Chris Murphy says reasons of state, including the recent failing attempt at a cease-fire in Syria, may be why little has been said or done so far.


CHRIS MURPHY: I am confident that the Obama administration is going to send the right signals to Russia, but this is not a moment in which we can shut down a relationship that is vital to the future disposition 24 of potential peace in a place like Syria.


WELNA: But with Election Day only weeks away now, Congressman 25 Schiff says it's past time to publicly pin blame on Russia.


SCHIFF: I think if you level with the American people and you say this is what the Russians are doing and we need to protect against this, it's far better to alert the public now than to wait until after the election and say, OK, this is what happened.


WELNA: And as both I and the DNC found out, what happens when you get hacked raises a thornier 26 issue - what to do about it.


David Welna, NPR News, Washington.



1 hack
n.劈,砍,出租马车;v.劈,砍,干咳
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
2 hackers
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
3 browser
n.浏览者
  • View edits in a web browser.在浏览器中看编辑的效果。
  • I think my browser has a list of shareware links.我想在浏览器中会有一系列的共享软件链接。
4 byline
n.署名;v.署名
  • His byline was absent as well.他的署名也不见了。
  • We wish to thank the author of this article which carries no byline.我们要感谢这篇文章的那位没有署名的作者。
5 defense
n.防御,保卫;[pl.]防务工事;辩护,答辩
  • The accused has the right to defense.被告人有权获得辩护。
  • The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
6 ministry
n.(政府的)部;牧师
  • They sent a deputation to the ministry to complain.他们派了一个代表团到部里投诉。
  • We probed the Air Ministry statements.我们调查了空军部的记录。
7 hacked
生气
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
8 credentials
n.证明,资格,证明书,证件
  • He has long credentials of diplomatic service.他的外交工作资历很深。
  • Both candidates for the job have excellent credentials.此项工作的两个求职者都非常符合资格。
9 adviser
n.劝告者,顾问
  • They employed me as an adviser.他们聘请我当顾问。
  • Our department has engaged a foreign teacher as phonetic adviser.我们系已经聘请了一位外籍老师作为语音顾问。
10 narrative
n.叙述,故事;adj.叙事的,故事体的
  • He was a writer of great narrative power.他是一位颇有记述能力的作家。
  • Neither author was very strong on narrative.两个作者都不是很善于讲故事。
11 hacking
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
12 democrat
n.民主主义者,民主人士;民主党党员
  • The Democrat and the Public criticized each other.民主党人和共和党人互相攻击。
  • About two years later,he was defeated by Democrat Jimmy Carter.大约两年后,他被民主党人杰米卡特击败。
13 marsh
n.沼泽,湿地
  • There are a lot of frogs in the marsh.沼泽里有许多青蛙。
  • I made my way slowly out of the marsh.我缓慢地走出这片沼泽地。
14 affiliated
adj. 附属的, 有关连的
  • The hospital is affiliated with the local university. 这家医院附属于当地大学。
  • All affiliated members can vote. 所有隶属成员都有投票权。
15 cyberspace
n.虚拟信息空间,网络空间,计算机化世界
  • She travels in cyberspace by sending messages to friends around the world.她利用电子空间给世界各地的朋友们发送信件。
  • The teens spend more time in cyberspace than in the real world of friends and family.青少年花费在电脑上的时间比他们和真正的朋友及家人在一起的时间要多。
16 conclusive
adj.最后的,结论的;确凿的,消除怀疑的
  • They produced some fairly conclusive evidence.他们提供了一些相当确凿的证据。
  • Franklin did not believe that the French tests were conclusive.富兰克林不相信这个法国人的实验是结论性的。
17 spoke
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说
  • They sourced the spoke nuts from our company.他们的轮辐螺帽是从我们公司获得的。
  • The spokes of a wheel are the bars that connect the outer ring to the centre.辐条是轮子上连接外圈与中心的条棒。
18 Oxford
n.牛津(英国城市)
  • At present he has become a Professor of Chemistry at Oxford.他现在已是牛津大学的化学教授了。
  • This is where the road to Oxford joins the road to London.这是去牛津的路与去伦敦的路的汇合处。
19 interfere
v.(in)干涉,干预;(with)妨碍,打扰
  • If we interfere, it may do more harm than good.如果我们干预的话,可能弊多利少。
  • When others interfere in the affair,it always makes troubles. 别人一卷入这一事件,棘手的事情就来了。
20 meddling
v.干涉,干预(他人事务)( meddle的现在分词 )
  • He denounced all "meddling" attempts to promote a negotiation. 他斥责了一切“干预”促成谈判的企图。 来自辞典例句
  • They liked this field because it was never visited by meddling strangers. 她们喜欢这块田野,因为好事的陌生人从来不到那里去。 来自辞典例句
21 frustration
n.挫折,失败,失效,落空
  • He had to fight back tears of frustration.他不得不强忍住失意的泪水。
  • He beat his hands on the steering wheel in frustration.他沮丧地用手打了几下方向盘。
22 hacks
黑客
  • But there are hacks who take advantage of people like Teddy. 但有些无赖会占类似泰迪的人的便宜。 来自电影对白
  • I want those two hacks back here, right now. 我要那两个雇工回到这儿,现在就回。 来自互联网
23 investigation
n.调查,调查研究
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
24 disposition
n.性情,性格;意向,倾向;排列,部署
  • He has made a good disposition of his property.他已对财产作了妥善处理。
  • He has a cheerful disposition.他性情开朗。
25 Congressman
n.(美)国会议员
  • He related several anecdotes about his first years as a congressman.他讲述自己初任议员那几年的几则轶事。
  • The congressman is meditating a reply to his critics.这位国会议员正在考虑给他的批评者一个答复。
26 thornier
adj.多刺的( thorny的比较级 );有刺的;棘手的;多障碍的
  • Changing regulations, meanwhile, is even thornier. 与此同时,不断变化的法规更加棘手。 来自互联网
  • The vote, on a procedural point, does not bode well for the passage of thornier legislation. 从程序上说,这次选举对更为棘手的立法进程来说并不是个好兆头。 来自互联网
学英语单词
abderrahim
absentee ballot
acanthoma
address interleaving
admissible
agrofuel
apyretic tetanuss
autocalc
babe babe of love
Beaver Brook
bet up
bonsha
bothriate
BS balance sheet
character classification
Chirita cordifolia
chromosomal fibrilla
cimpeni (campeni)
common midpoint
compensating eyepieces
critical path methodology
culicoides (oecacta) shortti
dam toe
Danger Is.
DC (data cell)
dearely
dermal sensitivity test
digging fork
dilaniate
direct oxidase
dome cover
emplastrum hydrargyri
ESD (emergency shutdown)
experimental variables
flower cells
form point
full-track fractor
genus triceratopss
georg ohm
girkin
glucobrassicanapin
graphic object
had people
hypersensitively
ingot shears
intersomitic groove
judgments in personam
just social order
lanae
linear transient analysis
lizard's tail
long-sufferance
longitudinal axis
mainframe code
malaris palpbra
marxist framework
maximum effective
measuring disk
middle turbinated bone
mode boundary
Mount Bethel
multiple asset depreciation accounting
myrologies
nebennucleolar
noonmark
old-womanishness
on your knees
one-sided sequence
outstroke
overcentralize
palki
palying
pepster
phaeophycean tannin
plate slap
postanarchism
precision accuracy
production manufacturing
pump pressure gauge
radopactovoty disintegration series
ream drilling method
Rhineland-Palatinate
S traps
sex maniacs
shalk
short-circuit test
signal phrases
single-ticket
spore-pollen analysis
stator case
steam-bottom still
supersurface-craft
system-independent characterization
tc-99m
teeds
Thamnocalamus
torgun
vaccum gauge
vulvar cleft
wale piece
wind speed frequency
wood farm