搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
SCOTT SIMON, HOST:
And elsewhere on the show, we're going to talk to a veteran of the CIA who argues the memo's release damages the intelligence community. The director of the CIA, Mike Pompeo, warned this week the Russians will likely try to interfere1 in this year's elections like they did in 2016. U.S. officials have been taking steps to guard against an attack.
But as NPR's Pam Fessler reports, security gaps remain. She has an exclusive look at one session aimed at closing those gaps.
PAM FESSLER, BYLINE2: If any group knows how easily voting can be disrupted, it's election supervisors3 in the state of Florida, which is why several dozen of them gathered in Orlando recently to figure out how best to deal with the latest threat. It's no longer butterfly ballots4 and hanging chads, like those that upended the 2000 presidential race, or even a lone5 troublemaker6. Wesley Wilcox, who runs elections in Marion County, says the danger's grown much larger.
WESLEY WILCOX: You know, it's no longer the teenager in his basement eating Cheetos that's trying to get into my system. There are now nation-states that are in a coordinated7 effort, trying to do something.
FESSLER: In fact, Florida was among at least 21 states that intelligence agencies say had their election systems probed by Russian hackers8 in 2016. There's no evidence that any votes were changed, but everyone here is hyper-aware that they're now on the front lines of a very serious international conflict.
MATT MASTERSON: The reality is all of us are going to be impacted at some point in time by a cyber incident - all of us.
FESSLER: Matt Masterson is chairman of the U.S. Election Assistance Commission, a federal agency that's working with states and localities to beef up security. Just to make sure everyone here is sufficiently9 alarmed, he displays a news article about hackers targeting nuclear facilities.
MASTERSON: I share this because you're now in good company. As part of the nation's critical infrastructure10, you're now in a group with nuclear facilities.
FESSLER: Which means more security help from the federal government. But it also means their jobs are far more complex. Elections have become increasingly computerized since 2000, with electronic voting machines, vote tabulators, online registration11 systems. And that new technology means new risks. Ryan Macias of the Election Assistance Commission has a long list.
RYAN MACIAS: So we have denial of service, which is a disruption attack - your website going down.
FESSLER: He says even if hackers don't change any actual votes, they can shake the public's confidence. There are also concerns about vendors13 and contractors14. How do they transmit information like electronic ballots to election offices? Are their systems secure? What about temp workers? Have they been screened?
MACIAS: You have ransomware. What happens if somebody, you know, takes your data - takes your election night reporting data - and holds it ransom15 on election night? What are you going to do? How are you going to recover from that? What are your backup processes?
UNIDENTIFIED MAN #1: So we just got - WannaCry just hit us, right? Let's say that's the incident.
FESSLER: And that's what these election officials and IT workers try to figure out as they break into smaller groups and are asked to deal with some hypothetical hacks16.
UNIDENTIFIED MAN #2: Well, WannaCry erases17 everything, so it came up with a no operating system found.
FESSLER: They have to decide if any systems need to be shut down, who has to be called first and if law enforcement should be told.
UNIDENTIFIED MAN #3: We are required to report it to Department of State, right? And then I believe that they would probably take it from there.
UNIDENTIFIED MAN #4: So they're also a stakeholder, then, as well.
FESSLER: Another challenge these officials face is what to do if an election worker mistakenly opens a malicious18 email.
UNIDENTIFIED MAN #5: All right. So it appears one of our employees has been successfully phished.
FESSLER: It's something everyone here is familiar with. According to a leaked intelligence report, Russian hackers posing as a Florida vendor12 tried to get election workers to open email attachments19 containing malicious software. So far, there's no evidence anyone did. It's clear that a lot of people here already have protections in place. But some counties are extremely small with no IT staffs of their own. Dana Southerland runs elections in Taylor County, which has only 13,000 voters. She says she picked up some useful tips.
DANA SOUTHERLAND: It's not always opening something and trying to respond to it but making sure that it's not a phishing email or something like that. I had no idea what that was until we started having some of these workshops. But I think just general office practices like changing passwords - you know, just general basic things.
FESSLER: She says perhaps the most important message is that no one, no matter how small, is immune from attack, and they have to be ready.
Pam Fessler, NPR News.
1 interfere | |
v.(in)干涉,干预;(with)妨碍,打扰 | |
参考例句: |
|
|
2 byline | |
n.署名;v.署名 | |
参考例句: |
|
|
3 supervisors | |
n.监督者,管理者( supervisor的名词复数 ) | |
参考例句: |
|
|
4 ballots | |
n.投票表决( ballot的名词复数 );选举;选票;投票总数v.(使)投票表决( ballot的第三人称单数 ) | |
参考例句: |
|
|
5 lone | |
adj.孤寂的,单独的;唯一的 | |
参考例句: |
|
|
6 troublemaker | |
n.惹是生非者,闹事者,捣乱者 | |
参考例句: |
|
|
7 coordinated | |
adj.协调的 | |
参考例句: |
|
|
8 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
9 sufficiently | |
adv.足够地,充分地 | |
参考例句: |
|
|
10 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
11 registration | |
n.登记,注册,挂号 | |
参考例句: |
|
|
12 vendor | |
n.卖主;小贩 | |
参考例句: |
|
|
13 vendors | |
n.摊贩( vendor的名词复数 );小贩;(房屋等的)卖主;卖方 | |
参考例句: |
|
|
14 contractors | |
n.(建筑、监造中的)承包人( contractor的名词复数 ) | |
参考例句: |
|
|
15 ransom | |
n.赎金,赎身;v.赎回,解救 | |
参考例句: |
|
|
16 hacks | |
黑客 | |
参考例句: |
|
|
17 erases | |
v.擦掉( erase的第三人称单数 );抹去;清除 | |
参考例句: |
|
|
18 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
19 attachments | |
n.(用电子邮件发送的)附件( attachment的名词复数 );附着;连接;附属物 | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。