新东方2016考研英语阅读经济学人文章:计算机间谍
2015-11-30 17:02 新东方
2016考研英语阅读题源经济学人文章:计算机间谍
Computerised espionage
计算机间谍活动
The spy who hacked me
我被间谍给黑了
Malicious computer code is making the spook's jobeasier than ever
恶意计算机编码使间谍活动比以前更容易
IT IS 30 years since William Gibson, an American-Canadian author, wrote “Neuromancer”, in which he coined the term “cyberspace” and imagineda future of hackers for hire and giant corporations raiding each other's computer systems insearch of secrets. He was right about the direction of travel, but wrong about some of thedetails. For it is governments, not corporations or anti-social teenagers, who have become theworld's best hackers.
美籍加拿大作家威廉·吉布森的著作《神经漫游者》的问世距今已有30年。在此书中,威廉提出“网络空间”一词,并勾勒出未来大型公司雇佣黑客潜入竞争对手的电脑系统窃取机密的场景。但他只预言中了大致的方向,细节上有很大的出入。如今,政府成为世上最厉害的黑客,而非大型公司或反社会青年。
The latest example came on November 23rd, when Symantec, an American antivirus firm,announced the discovery of a piece of software called Regin, which it had found lurking oncomputers in Russia, Saudi Arabia and several other countries, sniffing for secrets. Itssophistication and stealth led Symantec to conclude that it must have been written by anation-state.
比如,美国杀毒软件公司---诺顿杀毒于11月23日宣布发现了一种名为“雷金”的病毒软件。该软件潜伏在俄罗斯、沙特阿拉伯和其他国家的电脑上窃取机密。根据其复杂性和机密性,诺顿杀毒断定,此病毒软件一定是由某国政府编写。
Regin (the arbitrarily chosen name comes from a text string found in the bug's innards) isonly the latest in a long line of government-sponsored malware (see table). The most famous isStuxnet, discovered in 2010, which was designed, almost certainly by America and Israel, tohijack industrial-control systems. It was deployed against Iran's nuclear programme, anddestroyed centrifuges that were being used to enrich uranium. Unlike the vast surveillancedragnets revealed by Edward Snowden, a former American contractor who leaked thousands ofsecret documents in 2013, these computerised bugs are tailored and aimed at defined targets.
“雷金”(该名字来源于病毒内部的文本字符串)只是由政府赞助的恶意程序的冰山一角。最有名的病毒是2001年发现的震网,该病毒极有可能由美国和以色列政府编写,针对工业控制系统,攻击伊朗核计划,破坏用于铀浓缩的离心器。2003年,一名美国承包商泄露了上千份机密文件,这是针对特定目标发生的有目的性的电脑故障,不同于爱德华·斯诺登揭露的大范围拉网式监控。
The sort of direct sabotage carried out by Stuxnet is unusual. Most government malware (orat least, most that security researchers know about) seems to be for information-gathering. In2006, for instance, it emerged that someone had hacked electronic equipment belonging toVodafone's Greek subsidiary and listened to the mobile-phone conversations of the Greekcabinet. But such attacks can still do damage: Regin's most common targets were individualsand small businesses, but telecoms firms, energy companies and airlines were affected, too.
但像震网一样能造成直接伤害的恶意软件并不常见。大多数政府支持(或至少,大多数安全研究员知晓)的恶意软件似乎只是为了窃取信息。比如,2006年,有人黑了沃达丰希腊子公司的电子设备,并窃听电话通话。但此类攻击依然具有破坏性:雷金的目标大多是个人和小公司,但电信公司、能源公司和航空公司也牵扯其中。
Working out who has created a piece of malware is not easy. Computer code has nonationality. Programmers sometimes leave hints, or use suggestive phrases, but these are notproof. The targets can provide clues, as can comparisons with known malware. DarkHotel, whichtargets corporate executives and other bigwigs by hijacking hotel Wi-Fi systems and whichwas discovered only weeks before Regin, has been tentatively pinned on South Korea. Koreancharacters, and a reference to a known South Korean coder, were found in its code. Thetargets included people from Taiwan, Japan, China—and a few from America, South Korea'smost important ally.
要查出恶意程序的制造者可不是一件容易事儿。电脑编码无国界。有时,程序员会留下线索或使用暗示语,但这并不能证明什么。受害目标能够提供线索,也可以与已知的恶意程序相比较。比雷金早几周发现的“暗黑宾馆”是一款通过黑进旅馆Wi-Fi系统,攻击公司高管及其他权贵人物的恶意软件。有迹象表明此软件来源于韩国,因为在软件代码中发现了韩文和韩文编码器。此软件的目标包括台湾人、日本人、中国人和少数美国人,尽管美国是韩国的最重要盟友。
There are similar clues in Regin. Symantec says Regin's most frequent targets were computersin Russia, which accounted for 28% of the total, and Saudi Arabia, which made up 24%. But thefull list includes countries as diverse as Afghanistan, Ireland and Mexico. One of Regin'smodules is called “LEGSPIN”, a cricketing term. And experts say that it seems very similar tomalware used in an attack on Belgacom, a Belgian telecoms firm, in which the British are thechief suspects. (Government Communications Headquarters, Britain's electronic-spying agency,refused to comment.) But such clues may be designed to mislead: when the Russians begantheir computerised espionage, they would often try to make it seem as if the software wasChinese. “They hid behind China's notoriety,” says Mikko Hypponen of F-Secure, a Finnishcomputer-security firm.
雷金也是如此。赛门铁克公司称,雷金的主要目标是俄罗斯的电脑用户,占总数的28%,还有沙特阿拉伯,占总数的24%。但是攻击清单上也包括阿富汗、爱尔兰和墨西哥。雷金的其中一个模块名为右旋球(板球术语)。专家称,攻击比利时电信公司的恶意软件也类似如此,而英国是最大的嫌疑。但英国电子间谍机构—政府通信总部拒绝承认。但此类线索也许会产生误导:当俄罗斯利用计算机进行间谍活动时,他们可能会伪装,让别人误以为是中国软件。芬兰计算机安全公司芬杀客的米克·席博尼说,“这样一来,中国变得臭名昭著,而他们躲在后面坐享其成。”
Such deniability is one attraction of computerised espionage. Another is that modern softwareis so complex that it is riddled with security holes, most of which can be exploited from a safedistance. Once one is found, data can easily and cheaply be smuggled out and sent round theworld.
这种推诿是计算机间谍活动的吸引力之一。另外一个就是,现代软件很复杂,且充斥着安全漏洞。而这些漏洞大多都可以远程操控,一旦被发现其中一个,数据就会很轻易地泄露出去,并散播到世界各地。
This means that the big powers are not the only cyber-spies. The cutting-edge stuff is done byAmerica, China and Russia, says Mr Hypponen, but F-secure thinks Pakistan, North Korea andsome African countries are doing it, too. The low cost means that governments and firms canexpect to suffer from more and more of it. Some are already taking drastic measures: Russiahas ordered 20 typewriters, reportedly because of the vulnerability of computers. Toparaphrase Mr Gibson: it seems that the future is already here, and it is becoming ever moreevenly distributed.
这意味着,参与网络间谍的不仅仅是大国。米克·席博尼说,芬杀客公司认为,除了美国、中国和俄罗斯这些尖端技术大国,巴基斯坦、朝鲜和一些非洲国家在进行网络间谍活动。低成本意味着政府和公司承担着更多的费用。一些国家已经采取了严厉的措施:俄罗斯订购了20台打字机,据说是因为计算机容易出现漏洞。用吉布森先生的话来结尾:未来似乎触手可及,且越来越均匀分布。
1.come from 来自;来自于
Many of the clothes come from the world's topfashion houses.
这些服装中有很多出自世界顶级时装设计公司。
The final word will still come from the Secretary ofState.
最后仍然要由国务卿来定夺。
2.aim at 瞄准;针对
Republican strategists are taking particular aim at Democratic senators.
共和党的战略家正尖锐地攻击民主党的参议员。
His criticism stuck out a mile to aim at us.
他的批评显然是针对我们。
3.carry out 执行;实行;实施
The indisputable fact is that computers carry out logical operations.
不容置疑的事实是,电脑执行逻辑操作指令。
The Navy is to carry out an examination of the wreck tomorrow.
海军明天将对失事船只进行细查。
4.account for 解释;说明
Ministers should be called to account for their actions.
部长们应该对他们的行为作出解释。
The social services account for a substantial part of public spending.
社会福利事业占了一大部分的公共支出。
编辑:张雨
联系我们
版权及免责声明
① 凡本网注明“稿件来源:新东方”的所有文字、图片和音视频稿件,版权均属新东方教育科技集团(含本网和新东方网)所有,任何媒体、网站或个人未经本网协议授权不得转载、链接、转贴或以其他任何方式复制、发表。已经本网协议授权的媒体、网站,在下载使用时必须注明“稿件来源:新东方”,违者本网将依法追究法律责任。
② 本网未注明“稿件来源:新东方”的文/图等稿件均为转载稿,本网转载仅基于传递更多信息之目的,并不意味着赞同转载稿的观点或证实其内容的真实性。如其他媒体、网站或个人从本网下载使用,必须保留本网注明的“稿件来源”,并自负版权等法律责任。如擅自篡改为“稿件来源:新东方”,本网将依法追究法律责任。
③ 如本网转载稿涉及版权等问题,请作者见稿后在两周内速来电与新东方网联系,电话:400-0551-888。