搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
ARI SHAPIRO, HOST:
The U.S. says intellectual property theft by Chinese hackers1 is growing, and the U.S. will keep naming and shaming suspected cybercriminals. The Chinese are targeting the country's technology - from major corporations, Silicon2 Valley startups, even college research labs. NPR's Greg Myre has this look.
GREG MYRE, BYLINE3: To understand China's espionage4 goals, U.S. officials say, just look at the ambitious aims the country has set out in plans it calls Made In China 2025. By that date, China wants to be a world leader in computing5 power, military technology and artificial intelligence. And that's just a partial list.
(SOUNDBITE OF ARCHIVED RECORDING)
JOHN DEMERS: It's guidance to the rest of government and to the rest of their companies and to their people that this is what we want to be the best in class at and therefore that you should organize your activities, whether they are legal or illegal, to achieve that.
MYRE: That's John Demers of the Justice Department testifying before the Senate Judiciary Committee. He says recent legal cases against China show the country is aggressively trying to steal technology directly linked to its national goals.
(SOUNDBITE OF ARCHIVED RECORDING)
DEMERS: We of course don't begrudge6 them their efforts to develop technologically7, but you cannot use theft as a means to develop yourselves technologically.
MYRE: This Chinese approach doesn't follow the traditional spy-versus-spy battles that largely focus on acquiring government and military secrets. China's targets cover a broad spectrum8, including things like genetically9 modified crops, according to Dean Cheng of the Heritage Foundation.
DEAN CHENG: People were stopped at U.S. airports. Their luggage was examined. And they had acquired seeds, seedlings10, plants - literally11 the plants themselves.
MYRE: This is just one example, he says, of why U.S. corporations, universities and research labs all need to be aware of China's broad aims.
CHENG: The Chinese see food security as part of comprehensive national power and comprehensive national security. We don't tend to think about food security. They do.
MYRE: The U.S.-China relationship is a complex web of collaboration12 and competition. Before the trade war, the Chinese were big buyers of American soybeans and other crops. Toys made in China were stacked high under American Christmas trees. More than 300,000 Chinese students study at U.S. universities - nearly a third of all foreign students and far more than any other country. Many are in cutting-edge fields like artificial intelligence, or AI, says David Edelman, who heads a project at MIT on the intersection13 of technology, the economy and national security.
DAVID EDELMAN: We have a critical gap in the United States of AI expertise14. Companies from Silicon Valley and elsewhere cannot hire enough trained AI experts - experts in machine learning. And foreign graduate students come to U.S. universities because they're the best.
MYRE: Edelman is well aware the U.S. could be training future adversaries15. He was in charge of cybersecurity at the National Security Council under President Barack Obama, yet he warns against putting up too many barriers to Chinese students.
EDELMAN: The vast majority of graduate students that are coming to the U.S. for technical training, if they could, they would stay here. They would stay here and found a business or join a business in what is still the most thriving, open, technologically advanced, innovative16 economy in the world.
MYRE: The U.S. and China signed an agreement in 2015 that called for an end to intellectual property theft. Chinese corporate17 hacking18 did go down for a while, according to analysts19, but it's rising again. In the latest case, the U.S. has charged two Chinese citizens and says they were working for China's main intelligence agency. David Edelman sees this naming and shaming as one way to deter20 China.
DEMERS: Because if there's one thing that, in my personal experience, really drove some in Beijing nuts, it was the allegation that they were behind every act of cyber theft.
MYRE: The growing U.S. legal cases will put this theory to the test. Greg Myre, NPR News, Washington.
1 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
2 silicon | |
n.硅(旧名矽) | |
参考例句: |
|
|
3 byline | |
n.署名;v.署名 | |
参考例句: |
|
|
4 espionage | |
n.间谍行为,谍报活动 | |
参考例句: |
|
|
5 computing | |
n.计算 | |
参考例句: |
|
|
6 begrudge | |
vt.吝啬,羡慕 | |
参考例句: |
|
|
7 technologically | |
ad.技术上地 | |
参考例句: |
|
|
8 spectrum | |
n.谱,光谱,频谱;范围,幅度,系列 | |
参考例句: |
|
|
9 genetically | |
adv.遗传上 | |
参考例句: |
|
|
10 seedlings | |
n.刚出芽的幼苗( seedling的名词复数 ) | |
参考例句: |
|
|
11 literally | |
adv.照字面意义,逐字地;确实 | |
参考例句: |
|
|
12 collaboration | |
n.合作,协作;勾结 | |
参考例句: |
|
|
13 intersection | |
n.交集,十字路口,交叉点;[计算机] 交集 | |
参考例句: |
|
|
14 expertise | |
n.专门知识(或技能等),专长 | |
参考例句: |
|
|
15 adversaries | |
n.对手,敌手( adversary的名词复数 ) | |
参考例句: |
|
|
16 innovative | |
adj.革新的,新颖的,富有革新精神的 | |
参考例句: |
|
|
17 corporate | |
adj.共同的,全体的;公司的,企业的 | |
参考例句: |
|
|
18 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
19 analysts | |
分析家,化验员( analyst的名词复数 ) | |
参考例句: |
|
|
20 deter | |
vt.阻止,使不敢,吓住 | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。