-
(单词翻译:双击或拖选)
HARI SREENIVASAN: Investigators1 are calling the recent cyber-attacks on Sony Pictures unprecedented2, well-planned and possibly the most destructive corporate3 security breach4 reported on U.S. soil.
Sony happens to be releasing a comedy movie called "The Interview," which depicts5 a fictitious6 plot to assassination7 Kim Jong-un, pointing to North Korea's possible involvement in the attack. There's also speculation8 that China aided in the security breach.
Joining me now via Skype from Seoul, South Korea, is James Pearson, a reporter for Reuters and the co-author of "North Korea Confidential," due out in February.
Let's start with the attack on Sony. Does the evidence point to North Korea?
JAMES PEARSON, Reuters: Well, there's still no — there's still no evidence then that — that — at least there's no conclusive9 evidence that North Korea was behind the attacks on Sony Pictures.
What we do know are that there are — there are some hallmarks of this attack, which is similar to an earlier one. Since about 2009, there have been countless10 attacks on South Korea by a gang which security researchers have nicknamed the Dark Seoul Gang, which was a name for the malware which they were — they were found to use at the time.
And, later on, the researchers also found that these — these hackers12 were — on the surface looked like hacktivists. They were defacing Web sites. But the codes that they had written were actually specifically designed to steal North Korean — and military secrets, and also from U.S. bases, of course, which there are — of which there are many here in South Korea.
So, whilst there is still no conclusive evidence that North Korea is indeed behind this attack — and they have — they have also denied it — just today, they said that it was a righteous deed that perhaps some pro-North Korean activists13 carried out on their behalf.
The point is, is that, if they wanted to do that attack, they would have the capability14 to do so.
HARI SREENIVASAN: Tell us about the structure of what amounts to the North Korean cyber-unit.
JAMES PEARSON: Well, within — within North Korea, just like in — in fact, many countries, has its own military intelligence, which is specifically designed to target its — the militaries — the networks of the militaries of its enemies.
Now, within North Korea, there's an organization that's a slightly shadowy organization, like many of the wings of the government, called the General Reconnaissance Bureau. And within that, there's a further bureau called Bureau 121, which specializes in — in hacking15, essentially16.
HARI SREENIVASAN: You have spoken to North Korean defectors. They have told you that hackers are given incentives18 to be part of this team.
JAMES PEARSON: Well, the defectors that we spoke17 to in Seoul described hacking, as a member of the North Korean elite19, as a white-collar job, essentially.
It's a highly sought-after profession. There are many people who do computer science in Pyongyang. In fact, you don't even have to be particularly elite. We spoke to some defectors who said that they studied alongside friends who came all the way from the countryside to Pyongyang to study at the University of Automation and learned — and learned their trades there.
Now, in terms of the incentives that they give these hackers, one thing you have got to remember is that, if you're in a highly controlled space like North Korea, and you are given access to information from the outside world, then, ideologically20, it's quite threatening.
So, the one thing you can do as a state to sweeten the deal for these hackers is make sure that they live very, very comfortably. If you're a hacker11, for example, you will be given quite a nice apartment. You may — you will have probably a computer in your own house, and you will live quite comfortably.
You will probably also be able to travel overseas as a part of a North Korean trading delegation21 and have access to things that most North Koreans simply would never even be aware of, let alone think of.
HARI SREENIVASAN: James Pearson via Skype from Seoul, South Korea, thanks so much.
JAMES PEARSON: Thank you.
点击收听单词发音
1 investigators | |
n.调查者,审查者( investigator的名词复数 ) | |
参考例句: |
|
|
2 unprecedented | |
adj.无前例的,新奇的 | |
参考例句: |
|
|
3 corporate | |
adj.共同的,全体的;公司的,企业的 | |
参考例句: |
|
|
4 breach | |
n.违反,不履行;破裂;vt.冲破,攻破 | |
参考例句: |
|
|
5 depicts | |
描绘,描画( depict的第三人称单数 ); 描述 | |
参考例句: |
|
|
6 fictitious | |
adj.虚构的,假设的;空头的 | |
参考例句: |
|
|
7 assassination | |
n.暗杀;暗杀事件 | |
参考例句: |
|
|
8 speculation | |
n.思索,沉思;猜测;投机 | |
参考例句: |
|
|
9 conclusive | |
adj.最后的,结论的;确凿的,消除怀疑的 | |
参考例句: |
|
|
10 countless | |
adj.无数的,多得不计其数的 | |
参考例句: |
|
|
11 hacker | |
n.能盗用或偷改电脑中信息的人,电脑黑客 | |
参考例句: |
|
|
12 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
13 activists | |
n.(政治活动的)积极分子,活动家( activist的名词复数 ) | |
参考例句: |
|
|
14 capability | |
n.能力;才能;(pl)可发展的能力或特性等 | |
参考例句: |
|
|
15 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
16 essentially | |
adv.本质上,实质上,基本上 | |
参考例句: |
|
|
17 spoke | |
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说 | |
参考例句: |
|
|
18 incentives | |
激励某人做某事的事物( incentive的名词复数 ); 刺激; 诱因; 动机 | |
参考例句: |
|
|
19 elite | |
n.精英阶层;实力集团;adj.杰出的,卓越的 | |
参考例句: |
|
|
20 ideologically | |
adv. 意识形态上地,思想上地 | |
参考例句: |
|
|
21 delegation | |
n.代表团;派遣 | |
参考例句: |
|
|