-
(单词翻译:双击或拖选)
STEVE INSKEEP, HOST:
Let's spend a moment on an overshadowed question about Russia and the U.S. election. For President Trump1, the investigation2 of Russian interference in last year's election is a quote, "witch hunt." For some lawmakers, though, the real question is whether Russian interference can be prevented in the future. Officials say they see no evidence that votes have been tampered3 with, but they can't be sure. Here's NPR's Pam Fessler.
PAM FESSLER, BYLINE4: Election officials assured voters repeatedly last year that there was no way foreign hackers6 could manipulate votes. Louisiana Secretary of State Tom Schedler was typical.
(SOUNDBITE OF ARCHIVED RECORDING)
TOM SCHEDLER: There is no state, in general - no state - voting in cyberspace7 on the Internet. So how do you hack5 something in cyberspace when it's not in cyberspace?
JEREMY EPSTEIN: Well, it's inaccurate8 on two levels.
FESSLER: Election cybersecurity expert Jeremy Epstein says many states do allow some online voting, usually for members of the military. But more importantly, even if most voting machines aren't connected to the Internet...
EPSTEIN: They are connected to something that's connected to something that's connected to the Internet.
FESSLER: And last week's release of a U.S. intelligence report on Russian hacking9 only reinforced his concerns. Russia apparently10 broke into an election software vendor's computer system and used that information to send 122 election officials fake emails infected with malicious11 software. It's unclear if anyone took the bait, but University of Michigan computer scientist Alex Halderman says it's just the kind of phishing attacks someone would use if they wanted to manipulate votes.
ALEX HALDERMAN: That's because before every election, the voting machines have to be programmed with the design of the ballot12, right? What are the races? Who are the candidates?
FESSLER: And that's done on a computer in a central election office or by a contractor13. The ballot program is then installed on individual voting machines using removable memory cards.
HALDERMAN: So as a remote attacker, I can target an election management system, one of these ballot programming computers. If I can infect it with malicious software, I can have that malicious software spread to the individual machines on the memory cards and then change votes on Election Day.
FESSLER: There's absolutely no evidence that happened last year, but Halderman notes that some or all electronic voting machines in 14 states have no paper ballot backups that can be checked to make sure there was no tampering14. State and local election officials insist such an attack would be extremely difficult, if not impossible because of tight security measures such as restrictions15 on who has access to voting machines. Still, Connecticut election director Peggy Reeves told a panel on voting technology earlier this week that many local election officials are ill-equipped to handle cybersecurity threats.
(SOUNDBITE OF ARCHIVED RECORDING)
PEGGY REEVES: Many of our towns actually have no local IT support. Seriously, they don't have an IT director in their town. They might have a consultant16 that they call on if they have an issue. So they look to us, but we're a pretty small division.
FESSLER: She says the best protection against hackers is probably the fact that the nation's voting system is so decentralized. Larry Norden, an election technology expert with the Brennan Center, agrees, but he's worried that last year's intruders were laying the groundwork for more serious attacks in the future.
LARRY NORDEN: This is a real threat. It's not going away, and if anything, foreign adversaries17 - even people at home might be emboldened18 to do this more going forward. And to me, it is a real call that we have to do more as soon as possible, to secure these systems.
FESSLER: He would like all voting machines to have paper records and for all states to conduct routine audits19 to make sure that the electronic results match the paper ones. Pam Fessler, NPR News.
1 trump | |
n.王牌,法宝;v.打出王牌,吹喇叭 | |
参考例句: |
|
|
2 investigation | |
n.调查,调查研究 | |
参考例句: |
|
|
3 tampered | |
v.窜改( tamper的过去式 );篡改;(用不正当手段)影响;瞎摆弄 | |
参考例句: |
|
|
4 byline | |
n.署名;v.署名 | |
参考例句: |
|
|
5 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
6 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
7 cyberspace | |
n.虚拟信息空间,网络空间,计算机化世界 | |
参考例句: |
|
|
8 inaccurate | |
adj.错误的,不正确的,不准确的 | |
参考例句: |
|
|
9 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
10 apparently | |
adv.显然地;表面上,似乎 | |
参考例句: |
|
|
11 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
12 ballot | |
n.(不记名)投票,投票总数,投票权;vi.投票 | |
参考例句: |
|
|
13 contractor | |
n.订约人,承包人,收缩肌 | |
参考例句: |
|
|
14 tampering | |
v.窜改( tamper的现在分词 );篡改;(用不正当手段)影响;瞎摆弄 | |
参考例句: |
|
|
15 restrictions | |
约束( restriction的名词复数 ); 管制; 制约因素; 带限制性的条件(或规则) | |
参考例句: |
|
|
16 consultant | |
n.顾问;会诊医师,专科医生 | |
参考例句: |
|
|
17 adversaries | |
n.对手,敌手( adversary的名词复数 ) | |
参考例句: |
|
|
18 emboldened | |
v.鼓励,使有胆量( embolden的过去式和过去分词 ) | |
参考例句: |
|
|
19 audits | |
n.审计,查账( audit的名词复数 )v.审计,查账( audit的第三人称单数 ) | |
参考例句: |
|
|