Unit 9 Computer Technology
In-Class Reading Hackers, Crackers and Trackers
1 Coursing through arteries, replicating along the way, edging into new sites to wreak havoc, the virus at first seemed like any other virus that eventually would be defeated by the host's defense mechanisms. This, however, was a new, more powerful virus, and it would take advantage of the system's weaknesses, infecting and reinfecting as it traveled through the host. 2 The "Internet Worm", as the virus came to be known, worked its way into thousands of computers connected to the national information infrastructure. Created by Cornell University student Robert Morris, it infected more than 6,000 systems, jamming hard drives and erasing valuable information before being eliminated in November 1988 by engineers at the University of California at Berkeley and at Purdue University in West Lafayette, Indiana. 3 That was the first time the Internet and the destructive aims of certain computer experts made the national news. It wouldn't be the last. The Internet is just as susceptible to abuse as any other form of computer technology. The only difference is that the malicious attack comes through telephone lines and across network connections. Computer vandals can break into any system. Whether it is transportation, finance or defense, no system is 100-percent safe. There will always be individuals who, for one reason or another, are eager to discover the weak spot in order to penetrate the system. 4 Who are these individuals and what do they want? Generally, people who break into computer systems are called "hackers". Irrespective of their aims, they tend to inspire a certain admiration because they are extremely clever and infinitely more knowledgeable than the average computer user. Breaking into computer systems--whether it is on the Internet, in a bank or a government office--is an illegal activity. However, "ordinary" hackers who penetrate and explore systems just for the intellectual challenge are regarded as less dangerous than "crackers". The latter are people who break into systems in order to steal or to destroy information. They also can remove money from accounts, as Russian "crackers" demonstrated when they stole $10 million from Citibank's cash-management system in 1994. In fact, some experts estimate that the U.S. economy loses between $2 and $4 billion annually to computer vandals. 5 The increasing number of hackers and crackers has forced police departments to create computer crimes squads. These law enforcement experts who watch all these illegal activities are known as "trackers". According to a member of the new Computer Crimes Squad in San Francisco, the FBI does not want to needlessly harass the harmless hacker, but it has a duty to catch the bad ones. No society that depends heavily on computer systems can afford to ignore either the potential dangers of hacking or the moral issues that hacking has raised. 6 Do hackers regard themselves as criminals? Probably not. But they do make a distinction between "good" and "bad" hacking. Take, for example, the case of Ian, a 16-year-old hacker. He admits quite proudly that he knows how to defeat the registration process to get into systems which he enjoys doing just for the fun of it. Nevertheless, he prefers breaking into software programs rather than systems because there is less chance of being prosecuted. Ian never hacks for profit although he knows some who do work for money and even just for the fun of causing someone else headaches. Like many members of the hacker community, he does not feel morally obliged to turn "bad" hackers over to the authorities. 7 Jeff, a 27-year-old hacker, has a different point of view. He feels, on the contrary, that hackers do have the moral responsibility to report "crackers". He admits that he stopped being a "bad" hacker because he didn't want to go to jail. He now works for a computer security company. In other words, he sells his skills as a hacker to a company that repairs flaws in systems to prevent break-ins by hackers of all kinds. However, in his spare time Jeff still continues his activities as a hacker because he considers it a way to expand his knowledge. 8 Jeff's situation raises an interesting debate among computer and information executives, both in government and private enterprise: What can you do with a hacker or what can a hacker do for you? It seems obvious that a person capable of breaking into a system would also be capable of helping repair the flaws in a system. But should hackers be allowed to continue penetrating systems after they have been hired by the computer industry? Hacking is, after all, an illegal activity. 9 Because computer vandals can cause real damage, Congress is taking a serious look at the security of computer systems and ways to deter intrusions by both "good" and "bad" hackers. Many public officials consider the issue of hacking one of the most important issues that government, and society as a whole, face today. However, progress has been slow because many intrusions go unreported by private and public sector organizations for fear of publicity. When a break-in occurs, companies and governmental departments are extremely reluctant to admit that their files have been stolen, damaged or destroyed. By admitting their vulnerability, they would undermine the confidence of the public. 10 Despite the potential danger of hackers, most computer security experts feel that people should not be afraid to use the Internet. It is a technology that, when used properly, can yield untold benefits. The Internet allows scientists to share data, it helps students research history, and it allows journalists to report the news. 11 In the final analysis, America needs the Internet and the hackers that come with it. If no one exposes the vulnerabilities, they never get solved. So at least in one way hackers, the non-malicious ones, help us. (953 words)
Time taken: _______ minutes
Proper Names
Berkeley (地名)伯克利(美国加利福尼亚州西部城市)
California (地名)加利福尼亚(美国州名)
Citibank (美国)花旗银行
FBI Federal Bureau of Investigation (美国)联邦调查局(简称)
Ian (男子名)伊恩
Indiana (地名)印第安纳(美国州名)
San Francisco (地名)旧金山(美国加利福尼亚州西部港口城市)
West Lafayette (地名)西拉斐特(美国印第安纳州西部城市)
New Words
artery n. 1) a main road, railway line, river, etc. 干线,要道 e.g. I heard on the radio that all the main arteries leading into London are blocked with traffic. 2) one of the thick vessels that carry blood from the heart to other parts of the body 动脉 e.g. The arteries leading to the brain are on both sides of the neck.
Congress n. the group of people elected to make laws in the US, consisting of the Senate and the House of Representatives 美国国会 e.g. The US Congress set forth the annual budget.
debate n. a discussion or argument on a subject that people have different opinions about 辩论,讨论 e.g. I) There's a debate in the meeting room about next year's budget II) Whether he will be on time is open to debate.
deter v. prevent, hinder 阻止,制止,防止 e.g. These measures are designed to deter an enemy attack.
enforcement* n. an action of making people obey a rule or law, imposing实施,执行 e.g. I) There should be heavy penalties and strict enforcement for those who sell cigarettes to children. II) The courts vowed stern (严格的) enforcement of all laws and regulations.
hack v. (informal) get into someone else's computer system without permission in order to find out information or do something illegal 私自存取他人计算机系统中的资料
havoc n. a situation in which there is a lot of confusion or damage 混乱,大破坏
infinitely* adv. (especially with comparatives) very much 远,甚 e.g. I) Living in the country is infinitely preferable to living in London. II) Once we understand this, we may take a different view of the belief that all humans are somehow infinitely more valuable than any animal.
infrastructure n. the basic structure on which an organization or system is built and which makes it able to work 基础结构,基础设施
irrespective adj. without considering, regardless 不考虑的,不顾及的 e.g. I) Irrespective of where you decide to turn to for help and support, it is important that you do not delay. II) Irrespective of his strange way of talking, he's an excellent worker.
malicious adj. showing a desire to harm or hurt someone 恶意的
non-malicious adj. not wishing to hurt or harm others 无恶意的
prosecute v. bring a criminal charge against someone in a court of law 对......提出公诉,告发,检举 e.g. I) The store prosecuted John for shoplifting. II) If you don't pay those bills soon we'll be forced to prosecute.
registration * n. the act of having one's name or something else written in a list or record 登记,注册 e.g. You can't attend the conference until you have completed your registration form.
reinfect * v. give someone a disease again, infect again 再传染 e.g. His bandage came off and his wound got reinfected.
replicate v. make a copy of something 复制,自我复制
software n. the instructions which control what a computer does, computer programs 软件 e.g. I) Mary loaded some accounting software onto her computer. II) A new software package (软件包) is now on the market which controls traffic flow in cities.
tracker * n. a person who follows someone or something by means of footprints, marks, etc. 追踪者 e.g. The trackers tried to find when and how the thieves broke into the bank's computer system.
untold * adj. too much or too many to be measured 无数的,巨大的 e.g. I) The millionaire had made untold riches by selling oil. II) Words alone do not convey the untold misery endured by people in these refugee camps.
user n. someone who uses something 使用者,用户 e.g. I) The social worker convinced the drug user to seek help. II) This manual was written to aid new users of this appliance.
vandal n. someone who damages public or private property on purpose 故意破坏他人或公共财产者
wreak v. (past tense and past participle wreaked, also wrought) cause something to happen in a violent and often uncontrolled way 造成(破坏等)
Phrases and Expressions
for fear of/that because of anxiety about/that, in case (of) 惟恐,以免 e.g. I) They did not mention it for fear of offending him. II) They wouldn't let their cat run around outside for fear that it would get run over by a car.
in the final/last analysis after everything has been considered 归根结底,说到底 e.g. I) They realized that in the last analysis their job was to tell the public the facts. II) In the final analysis, political independence and economic independence are inseparable.
irrespective of without considering 不顾或不考虑 e.g. All pupils, irrespective of age, are invited to join the club.
public sector the part of an economy that is controlled by the state 政府控制的企业
turn someone over to someone bring a criminal to the police or other official organization 把某人移交给 e.g. The thief was turned over to the police.
wreak havoc do violence (destruction, punishment, etc.) (对......)造成严重破坏 e.g. The hurricane wreaked havoc on the coastal area.
|