-
(单词翻译:双击或拖选)
British government is looking to expand its espionage1 roster2. Any one who is a citizen can apply, but the entrance exam is a bit of brain buster. It’s a code, and you gotta crack it if you want the chance to be Britain’s next cyber spy. Bryan Tod looks to the reactions to this unique recruiting idea and examines why the espionage industry is moving online.
Here’s your challenge 160 combinations of numbers and letters, and a countdown clock. You’ve got just a few days to your dead line. If you’re a British citizen and you 've solved this encrypted graphic3 puzzle, you could be recruited for Britain’s next generation of high tech spies. Posted online, publicized on FaceBook and Twitter, it’s put out by the Government’s Communications Headquarters, British version of America’s National Security Agency. A kind of // eavesdropping4 post whose mission is to help catch terrorists. This agency wants posted job adds inside video games, and an official there tells us this puzzle has got thousands of hits, and at least 50 people have solved it. If you do that, you’re congratulated, offered a chance to apply.
What you think this as a recruiting tool?
I think it’s a great idea, one of these things it does is to bring a sort of awareness5 of the need for encrypted //, encrypted //…
Former CIA Mark Staudte is an expert on code cracking at the International Spy Museum in Washington, he says for people with reasonable training and math and computer science, this code probably isn’t too hard.
What kind of crucial intelligence you can gather by code breaking?
Well, code breaking signals and intelligence we call it can be tremendously valuable because it’s one of the rare forms of intelligence that if you’ve done properly, you could get access to the right things will give you the enemy’s attention, what they’re really thinking.
Staudte and other experts say governments like Britain needs cyber warriors6 more than ever, an official of the government’s communications headquarter says want people with an interest in so-called ethical7 hacking8, illegal hackers9 need not apply, cyber experts say the code is too easy, and the official at the Government Communications Headquarter says it’s not designed to be overly difficult, more to promote awareness of what that agency does. // and other say if that’s the goal then it’s worth it to get teenagers and other young people excited about potential careers in legitimate10 cyber espionage. Bryan Tod CNN, Washington.
Before we go, taking pictures with Santa is a Christmas tradition, but for Canadians that tradition has gone to the dogs. This Santa is posing for pics with pups, this trick is getting them to sit still for the camera, at least they were requested to the // and red are not too complicated. What is a dog want for Christmas this year, either a toy or a treat. Whether they’ve been naughty or nice, still makes for a cute post card which is the perfect way for these dogs to wish you a happy holidays. Of course // you // better not to expect anything from the Santa on December 25th they just be barking after the wrong Christmas tree. Remember the deadline is tomorrow for sending us iReport about what you’re looking forward to in 2012, if you’ve already sent one in, we need you to look for our email reply about what to do next. That’s all about the headlines. I’m Carl Azuz.
点击收听单词发音
1 espionage | |
n.间谍行为,谍报活动 | |
参考例句: |
|
|
2 roster | |
n.值勤表,花名册 | |
参考例句: |
|
|
3 graphic | |
adj.生动的,形象的,绘画的,文字的,图表的 | |
参考例句: |
|
|
4 eavesdropping | |
n. 偷听 | |
参考例句: |
|
|
5 awareness | |
n.意识,觉悟,懂事,明智 | |
参考例句: |
|
|
6 warriors | |
武士,勇士,战士( warrior的名词复数 ) | |
参考例句: |
|
|
7 ethical | |
adj.伦理的,道德的,合乎道德的 | |
参考例句: |
|
|
8 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
9 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
10 legitimate | |
adj.合法的,合理的,合乎逻辑的;v.使合法 | |
参考例句: |
|
|