-
(单词翻译:双击或拖选)
RACHEL MARTIN, HOST:
Efforts to stop Russia from interfering1 in U.S. elections come from two of the most secretive parts of the U.S. government the National Security Agency and Cyber Command. They worked side by side at the same sprawling2 campus in Fort Meade Maryland where the NSA monitors foreign communications. While cyber command takes action in the digital realm the army general who heads them both is a proponent3 of more aggressive measures. Here's NPR national security correspondent Greg Myre.
(SOUNDBITE OF ARCHIVED RECORDING)
UNIDENTIFIED PERSON: It's a pleasure to introduce to you the commander of U.S. Cyber Command and director of the National Security Agency, General Paul Nakasone.
(SOUNDBITE OF MUSIC)
GREG MYRE, BYLINE4: Paul Nakasone usually doesn't say much in public. But recently, he's been on what amounts to a PR blitz. Here he is, in short sleeves and no tie, addressing a high-tech5 confab in San Francisco.
(SOUNDBITE OF ARCHIVED RECORDING)
PAUL NAKASONE: I have all the authorities that I need right now to conduct full-spectrum operations. That's defensive6 operations all the way to offensive operations. And when I don't have those authorities, I will certainly ask for them.
MYRE: Nakasone is driving home the point that the U.S. needs to directly confront rivals in cyberspace7. Here's what he said on Capitol Hill about countering Russian attempts to meddle8 in last fall's midterm elections.
(SOUNDBITE OF ARCHIVED RECORDING)
NAKASONE: For the first time, we sent our cyberwarriors abroad. We sent defensive teams forward in November to three different European countries. That's acting9 outside of our borders that imposed costs against our adversaries10.
MYRE: Over the past decade, the U.S. has been wrestling with the question of how to deal with cyberattacks. What's the proper response when China steals high-tech secrets from a U.S. company or when North Korea hacks12 into Sony because that country doesn't like a satirical movie about its leader Kim Jong Un? Nakasone made clear he wanted to take a harder line at his confirmation13 hearing a year ago. Here he responds to Alaska senator Dan Sullivan.
(SOUNDBITE OF ARCHIVED RECORDING)
DAN SULLIVAN: What do you think our adversaries think right now? If you do a cyberattack on America, what's going to happen to them?
NAKASONE: So basically, I would say right now they do not think that much will happen to them.
SULLIVAN: They don't fear us?
NAKASONE: They don't fear us.
MYRE: President Trump14 has given Nakasone more authority, but this approach raises two big questions. First, will other countries stop attacking the U.S.? Probably not. Second, will this ignite a cycle of retaliation15 and escalation16? No one really knows. But we are getting a peek17 behind the curtain, says P. W. Singer, a cyber expert at the New America think tank.
P W SINGER: So you're seeing a change from keeping everything classified, not talking about anything to trying to share a little bit more information. And the reason is a belief that if you create awareness18, it makes the attacker's job harder.
MYRE: The U.S. now routinely names and shames hackers19.
THOMAS RID: A lot of countries can hack11.
MYRE: That's Thomas Rid of Johns Hopkins University who says not a lot of countries can figure out who did the hacking20. The U.S. can. Robert Mueller's team indicted21 25 Russians for election interference by name and with details that could only be obtained by hacking their computers.
RID: So finding out who hacked22 you, finding the evidence and then assessing the evidence in a professional way - the attribution capabilities23, these are hard to develop.
MYRE: The NSA took another unusual step recently, making one of its own software programs available to the public for free. It's called Ghidra, and it reverse-engineers malware that's been detected in a computer system. Now anyone can download Ghidra to analyze24 malware and figure out how best to combat it. Of course, the NSA has its own history of planting malware abroad, notes author James Bamford, who's written about the agency for decades.
JAMES BAMFORD: The Russians plant malware and look for openings in various infrastructure25 in the United States. It's exactly the same thing we do in other countries. It's not necessarily an act of aggression26; it's just normal espionage27.
MYRE: Whatever you call it, Nakasone says it's here to stay.
(SOUNDBITE OF ARCHIVED RECORDING)
NAKASONE: I think this is a new normal. It can't be episodic. You have to be involved every day. You have to be aware of what your adversary28 is doing.
MYRE: Planning, he says, is already underway to protect the 2020 election.
Greg Myre, NPR News, Washington.
(SOUNDBITE OF EVOCATIV'S "CASTAWAY")
1 interfering | |
adj. 妨碍的 动词interfere的现在分词 | |
参考例句: |
|
|
2 sprawling | |
adj.蔓生的,不规则地伸展的v.伸开四肢坐[躺]( sprawl的现在分词 );蔓延;杂乱无序地拓展;四肢伸展坐着(或躺着) | |
参考例句: |
|
|
3 proponent | |
n.建议者;支持者;adj.建议的 | |
参考例句: |
|
|
4 byline | |
n.署名;v.署名 | |
参考例句: |
|
|
5 high-tech | |
adj.高科技的 | |
参考例句: |
|
|
6 defensive | |
adj.防御的;防卫的;防守的 | |
参考例句: |
|
|
7 cyberspace | |
n.虚拟信息空间,网络空间,计算机化世界 | |
参考例句: |
|
|
8 meddle | |
v.干预,干涉,插手 | |
参考例句: |
|
|
9 acting | |
n.演戏,行为,假装;adj.代理的,临时的,演出用的 | |
参考例句: |
|
|
10 adversaries | |
n.对手,敌手( adversary的名词复数 ) | |
参考例句: |
|
|
11 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
12 hacks | |
黑客 | |
参考例句: |
|
|
13 confirmation | |
n.证实,确认,批准 | |
参考例句: |
|
|
14 trump | |
n.王牌,法宝;v.打出王牌,吹喇叭 | |
参考例句: |
|
|
15 retaliation | |
n.报复,反击 | |
参考例句: |
|
|
16 escalation | |
n.扩大,增加 | |
参考例句: |
|
|
17 peek | |
vi.偷看,窥视;n.偷偷的一看,一瞥 | |
参考例句: |
|
|
18 awareness | |
n.意识,觉悟,懂事,明智 | |
参考例句: |
|
|
19 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
20 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
21 indicted | |
控告,起诉( indict的过去式和过去分词 ) | |
参考例句: |
|
|
22 hacked | |
生气 | |
参考例句: |
|
|
23 capabilities | |
n.能力( capability的名词复数 );可能;容量;[复数]潜在能力 | |
参考例句: |
|
|
24 analyze | |
vt.分析,解析 (=analyse) | |
参考例句: |
|
|
25 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
26 aggression | |
n.进攻,侵略,侵犯,侵害 | |
参考例句: |
|
|
27 espionage | |
n.间谍行为,谍报活动 | |
参考例句: |
|
|
28 adversary | |
adj.敌手,对手 | |
参考例句: |
|
|