时间:2018-12-28 作者:英语课 分类:英语语言学习


英语课

 In 2008, Burhan Hassan, age 17, boarded a flight from Minneapolis to the Horn of Africa. And while Burhan was the youngest recruit, he was not alone. Al-Shabaab managed to recruit over two dozen young men in their late teens and early 20s with a heavy presence on social media platforms like Facebook. With the Internet and other technologies, they've changed our everyday lives, but they've also changed recruitment, radicalization and the front lines of conflict today.


What about the links connecting Twitter, Google and protesters fighting for democracy? These numbers represent Google's public DNS servers, effectively the only digital border crossing protesters had and could use to communicate with each other, to reach the outside world and to spread viral awareness 1 of what was happening in their own country.
Today, conflict is essentially 2 borderless. If there are bounds to conflict today, they're bound by digital, not physical geography. And under all this is a vacuum of power where non-state actors, individuals and private organizations have the advantage over slow, outdated 3 military and intelligence agencies. And this is because, in the digital age of conflict, there exists a feedback loop where new technologies, platforms like the ones I mentioned, and more disruptive ones, can be adapted, learned, and deployed 4 by individuals and organizations faster than governments can react.
To understand the pace of our own government thinking on this, I like to turn to something aptly named the Worldwide Threat Assessment 6, where every year the Director of National Intelligence in the US looks at the global threat landscape, and he says, "These are the threats, these are the details, and this is how we rank them." In 2007, there was absolutely no mention of cyber security. It took until 2011, when it came at the end, where other things, like West African drug trafficking, took precedence. In 2012, it crept up, still behind things like terrorism and proliferation. In 2013, it became the top threat, in 2014 and for the foreseeable future.
What things like that show us is that there is a fundamental inability today on the part of governments to adapt and learn in digital conflict, where conflict can be immaterial, borderless, often wholly untraceable. And conflict isn't just online to offline, as we see with terrorist radicalization, but it goes the other way as well.
We all know the horrible events that unfolded in Paris this year with the Charlie Hebdo terrorist attacks. What an individual hacker 7 or a small group of anonymous 8 individuals did was enter those social media conversations that so many of us took part in. #JeSuisCharlie. On Facebook, on Twitter, on Google, all sorts of places where millions of people, myself included, were talking about the events and saw images like this, the emotional, poignant 9 image of a baby with "Je suis Charlie" on its wrist. And this turned into a weapon. What the hackers 10 did was weaponize this image, where unsuspecting victims, like all of us in those conversations, saw this image, downloaded it but it was embedded 11 with malware. And so when you downloaded this image, it hacked 12 your system. It took six days to deploy 5 a global malware campaign. The divide between physical and digital domains 13 today ceases to exist, where we have offline attacks like those in Paris appropriated for online hacks 14.
And it goes the other way as well, with recruitment. We see online radicalization of teens, who can then be deployed globally for offline terrorist attacks.
With all of this, we see that there's a new 21st century battle brewing 15, and governments don't necessarily take a part.
So in another case, Anonymous vs. Los Zetas. In early September 2011 in Mexico, Los Zetas, one of the most powerful drug cartels, hung two bloggers with a sign that said, "This is what will happen to all Internet busybodies." A week later, they beheaded a young girl. They severed 16 her head, put it on top of her computer with a similar note. And taking the digital counteroffensive because governments couldn't even understand what was going on or act, Anonymous, a group we might not associate as the most positive force in the world, took action, not in cyber attacks, but threatening information to be free. On social media, they said, "We will release information that ties prosecutors 17 and governors to corrupt 18 drug deals with the cartel." And escalating 19 that conflict, Los Zetas said, "We will kill 10 people for every bit of information you release." And so it ended there because it would become too gruesome to continue. But what was powerful about this was that anonymous individuals, not federal policia, not military, not politicians, could strike fear deep into the heart of one of the most powerful, violent organizations in the world. And so we live in an era that lacks the clarity of the past in conflict, in who we're fighting, in the motivations behind attacks, in the tools and techniques used, and how quickly they evolve. And the question still remains 20: what can individuals, organizations and governments do?
For answers to these questions, it starts with individuals, and I think peer-to-peer security is the answer. Those people in relationships that bought over teens online, we can do that with peer-to-peer security. Individuals have more power than ever before to affect national and international security. And we can create those positive peer-to-peer relationships on and offline, we can support and educate the next generation of hackers, like myself, instead of saying, "You can either be a criminal or join the NSA." That matters today. And it's not just individuals -- it's organizations, corporations even. They have an advantage to act across more borders, more effectively and more rapidly than governments can, and there's a set of real incentives 21 there. It's profitable and valuable to be seen as trustworthy in the digital age, and will only be more so in future generations to come.
But we still can't ignore government, because that's who we turn to for collective action to keep us safe and secure. But we see where that's gotten us so far, where there's an inability to adapt and learn in digital conflict, where at the highest levels of leadership, the Director of the CIA, Secretary of Defense 22, they say, "Cyber Pearl Harbor will happen." "Cyber 9/11 is imminent 23." But this only makes us more fearful, not more secure. By banning encryption in favor of mass surveillance and mass hacking 24, sure, GCHQ and the NSA can spy on you. But that doesn't mean that they're the only ones that can. Capabilities 25 are cheap, even free. Technical ability is rising around the world, and individuals and small groups have the advantage. So today it might just be the NSA and GCHQ, but who's to say that the Chinese can't find that backdoor? Or in another generation, some kid in his basement in Estonia?
And so I would say that it's not what governments can do, it's that they can't. Governments today need to give up power and control in order to help make us more secure. Giving up mass surveillance and hacking and instead fixing those backdoors means that, yeah, they can't spy on us, but neither can the Chinese or that hacker in Estonia a generation from now. And government support for technologies like Tor and Bitcoin mean giving up control, but it means that developers, translators, anybody with an Internet connection, in countries like Cuba, Iran and China, can sell their skills, their products, in the global marketplace, but more importantly sell their ideas, show us what's happening in their own countries.
And so it should be not fearful, it should be inspiring to the same governments that fought for civil rights, free speech and democracy in the great wars of the last century, that today, for the first time in human history, we have a technical opportunity to make billions of people safer around the world that we've never had before in human history. It should be inspiring.
 

1 awareness
n.意识,觉悟,懂事,明智
  • There is a general awareness that smoking is harmful.人们普遍认识到吸烟有害健康。
  • Environmental awareness has increased over the years.这些年来人们的环境意识增强了。
2 essentially
adv.本质上,实质上,基本上
  • Really great men are essentially modest.真正的伟人大都很谦虚。
  • She is an essentially selfish person.她本质上是个自私自利的人。
3 outdated
adj.旧式的,落伍的,过时的;v.使过时
  • That list of addresses is outdated,many have changed.那个通讯录已经没用了,许多地址已经改了。
  • Many of us conform to the outdated customs laid down by our forebears.我们许多人都遵循祖先立下的过时习俗。
4 deployed
(尤指军事行动)使展开( deploy的过去式和过去分词 ); 施展; 部署; 有效地利用
  • Tanks have been deployed all along the front line. 沿整个前线已部署了坦克。
  • The artillery was deployed to bear on the fort. 火炮是对着那个碉堡部署的。
5 deploy
v.(军)散开成战斗队形,布置,展开
  • The infantry began to deploy at dawn.步兵黎明时开始进入战斗位置。
  • The president said he had no intention of deploying ground troops.总统称并不打算部署地面部队。
6 assessment
n.评价;评估;对财产的估价,被估定的金额
  • This is a very perceptive assessment of the situation.这是一个对该情况的极富洞察力的评价。
  • What is your assessment of the situation?你对时局的看法如何?
7 hacker
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
8 anonymous
adj.无名的;匿名的;无特色的
  • Sending anonymous letters is a cowardly act.寄匿名信是懦夫的行为。
  • The author wishes to remain anonymous.作者希望姓名不公开。
9 poignant
adj.令人痛苦的,辛酸的,惨痛的
  • His lyrics are as acerbic and poignant as they ever have been.他的歌词一如既往的犀利辛辣。
  • It is especially poignant that he died on the day before his wedding.他在婚礼前一天去世了,这尤其令人悲恸。
10 hackers
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
11 embedded
a.扎牢的
  • an operation to remove glass that was embedded in his leg 取出扎入他腿部玻璃的手术
  • He has embedded his name in the minds of millions of people. 他的名字铭刻在数百万人民心中。
12 hacked
生气
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
13 domains
n.范围( domain的名词复数 );领域;版图;地产
  • The theory of thermodynamics links the macroscopic and submicroscopic domains. 热力学把宏观世界同亚微观世界联系起来。 来自辞典例句
  • All three flow domains are indicated by shading. 所有三个流动区域都是用阴影部分表示的。 来自辞典例句
14 hacks
黑客
  • But there are hacks who take advantage of people like Teddy. 但有些无赖会占类似泰迪的人的便宜。 来自电影对白
  • I want those two hacks back here, right now. 我要那两个雇工回到这儿,现在就回。 来自互联网
15 brewing
v.切断,断绝( sever的过去式和过去分词 );断,裂
  • The doctor said I'd severed a vessel in my leg. 医生说我割断了腿上的一根血管。 来自《简明英汉词典》
  • We have severed diplomatic relations with that country. 我们与那个国家断绝了外交关系。 来自《简明英汉词典》
16 prosecutors
检举人( prosecutor的名词复数 ); 告发人; 起诉人; 公诉人
  • In some places,public prosecutors are elected rather than appointed. 在有些地方,检察官是经选举而非任命产生的。 来自口语例句
  • You've been summoned to the Prosecutors' Office, 2 days later. 你在两天以后被宣到了检察官的办公室。
17 corrupt
v.贿赂,收买;adj.腐败的,贪污的
  • The newspaper alleged the mayor's corrupt practices.那家报纸断言市长有舞弊行为。
  • This judge is corrupt.这个法官贪污。
18 escalating
v.(使)逐步升级( escalate的现在分词 );(使)逐步扩大;(使)更高;(使)更大
  • The cost of living is escalating. 生活费用在迅速上涨。 来自《简明英汉词典》
  • The cost of living is escalating in the country. 这个国家的生活费用在上涨。 来自辞典例句
19 remains
n.剩余物,残留物;遗体,遗迹
  • He ate the remains of food hungrily.他狼吞虎咽地吃剩余的食物。
  • The remains of the meal were fed to the dog.残羹剩饭喂狗了。
20 incentives
激励某人做某事的事物( incentive的名词复数 ); 刺激; 诱因; 动机
  • tax incentives to encourage savings 鼓励储蓄的税收措施
  • Furthermore, subsidies provide incentives only for investments in equipment. 更有甚者,提供津贴仅是为鼓励增添设备的投资。 来自英汉非文学 - 环境法 - 环境法
21 defense
n.防御,保卫;[pl.]防务工事;辩护,答辩
  • The accused has the right to defense.被告人有权获得辩护。
  • The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
22 imminent
adj.即将发生的,临近的,逼近的
  • The black clounds show that a storm is imminent.乌云预示暴风雨即将来临。
  • The country is in imminent danger.国难当头。
23 hacking
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
24 capabilities
n.能力( capability的名词复数 );可能;容量;[复数]潜在能力
  • He was somewhat pompous and had a high opinion of his own capabilities. 他有点自大,自视甚高。 来自辞典例句
  • Some programmers use tabs to break complex product capabilities into smaller chunks. 一些程序员认为,标签可以将复杂的功能分为每个窗格一组简单的功能。 来自About Face 3交互设计精髓
学英语单词
a bit of muslin
abnormal hearing
adipocytes
aerodynamic maneuver
alkylantimony halide
aloe chinensis bak.
Ambohibary
analog-digital-analog conversion system
atonest
autograt
be up to one's old tricks
Brooklynite
brunei b.
bull gear reducer
calcium 5'-ribonuucleotide
caveated
cerous hydropyrophosphate
chelseas
Chetopir
Chirita monantha
combining
constant formula diet
copesmate
corporation library
counter-balance piece
davuls
debris storage capacity
decolonialized
descanted
ductography
Duggendorf
encylical
Fanta Shet'
feathering paddle-wheel
finance statistics
fusible interlining
glutinane
go down to
golpe
goodstein
gotterleben
gyffe
have one's fingers in the till
heredo-familial corneal dystrophy
iced-tea spoons
implementation requirement
in view of
inclosure(enclosure)
inner ring axis
internal dielectric membrane
inuredness
inwardmost
kiet
lacewear
large pill
learning activity package
Marquess of Queensberry rules
maximum grinding hole diameter
megalomycin
minelaying
morticer
multi-gradient magnetic separator
multispectral remote sensing system
omit function
overtoils
oxandrin
peace camp
pectinellus
pentagrid converter
Pierofanina
pilot's automatic telephone weather answering service
powder-like fur
pro-europeans
pure clay
pyrophosphatases
qusternary syphilis
r-l-c oscillator
ratchet-toothed escape wheel
raw gasoline
recognized component
revised price
Rubia mandersii
run-on sentences
scheerer
seminal cyst
shell tap
soft emplacement
sowing plot
spongio-
spontaneous request
tank block
tavarus
technofetishist
to smash
tobicillin
total derived functor
triple deck screen
two lined octave
vaccinoids
whitetailed
wrightstown
zawadski