首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Leaks from Edward Snowden, a system’s administrator turned whistleblower at the National Security Agency(NSA), America’s signals
Leaks from Edward Snowden, a system’s administrator turned whistleblower at the National Security Agency(NSA), America’s signals
admin
2016-09-24
69
问题
Leaks from Edward Snowden, a system’s administrator turned whistleblower at the National Security Agency(NSA), America’s signals-intelligence agency, have confirmed that the Internet is insecure, and that modern spy agencies can—and do, on an industrial scale—tap virtually any form of online communication. But perhaps the most acute embarrassment so far has been caused by the revelation that the NSA may have been listening to phone calls made by the leaders of America’s allies, most notably those of the German chancellor, Angela Merkel. But how exactly is it done?
A mobile phone is essentially a telephone with a radio attached. Anyone can listen in on the radio waves travelling between a handset and the base station to which it is connected. To prevent casual eavesdropping, phones often(although not always)use encryption, which disarranges the data so that only the intended recipient can make sense of it. But not all encryption is created equal. The encryption used in second-generation(2G)phones—a technology that dates back to 1991—is weak, and readily cracked by modern computers. The 3G standard includes stronger disarranging, although it is still not perfect. 4G, the newest standard, currently being used around the world, likewise offers more competent encryption—although documents leaked by Edward Snowden suggest that the spies are pressuring manufacturers to put secret "back doors" into their products.
But getting involved in cryptography isn’t always necessary. Spy agencies can obtain details from telephone companies, either by asking them to cooperate or forcing them to. Another option is to impersonate the mobile network itself, by setting up a fake base-station and persuading the target’s phone to connect to it. At a hacker conference in 2010, a security researcher called Chris Paget gave a detailed demonstration of how this works, using less than $ 2, 000 of off-the-shelf equipment(a fake base-station can instruct phones that connect to it to do all sorts of things, such as turn off their encryption). Police forces around the world use a similar gear to silently listen in on calls made by their targets. A recent book describes how the FBI has quietly removed several such fake base-stations— run by foreign embassies—from around Washington, D. C.
Nor is it just calls. Text messages can also be snatched. Modern smartphones are general-purpose computers. Users store e-mails on them, fix their position with satellite navigation systems, and even use them for banking, making them very juicy targets indeed. Even if the phones themselves are secure, it is far from clear how secure the behind-the-scenes servers run by Google and Apple, which control the Android and iOS platforms respectively, really are. For the non-spies, there are cheaper, simpler options that often work, too. This week several journalists in Britain are standing trial for hacking the voicemail messages of everyone from serving politicians to murdered schoolchildren. Their methods were low-tech but effective: they smooth-talked employees of mobile-phone companies into handing over the four-digit pass codes that protect their customers’ voicemail accounts. Or else they simply guessed them, betting that the phone owners either hadn’t changed them from default settings or had chosen easy-to-remember ones, such as 1 — 2 — 3 — 4. Whether the NSA used low-or high-tech methods to tap Mrs. Merkel’s phone remains a mystery—for now, at least.
How can encryption prevent casual eavesdropping?
选项
A、By stopping the usual radio waves.
B、By disconnecting a telephone to a radio.
C、By making the information incomprehensible.
D、By creating equal code pages.
答案
C
解析
加密金钥如何防止偶然的窃听?使信息无法理解。根据第二段第三句,为了防止偶然的窃听,电话往往(尽管并非总是如此)使用加密金钥,即一种特殊的代码,代码将数据打乱,只让蓄意的接收者理解数据。
转载请注明原文地址:https://www.kaotiyun.com/show/sJGO777K
0
考博英语
相关试题推荐
Billisanexampleofaseverelydisabledpersonwhohasbecome______atmanysurvivalskills.
Hearguedthatthe______offirearmsinAmericaisanillegalact,anddegradesthevaluesthiscountrywasfoundedon.
Televisionhasbecomequiteavigorousactivity.Sittingupisexhaustingsomostpeople______downwhilewatchingtelevision.
Today,theTowerofLondonisoneofthemostpopulartourist【C1】______andattractsoverthreemillionvisitorsayear.Itw
AstheEnglishlanguagehaschangedatafastspeedinthelastcentury,sohastheuseoftheEnglishlanguage.AftertheB
ThenewtechnologicalrevolutioninAmericannewspapershasbroughtincreased______awiderrangeofpublicationsandanexpansio
Youprobablyknowthatit’sbetterforbothyouandtheenvironmentifyoubuyanorganictomatoinsteadofonethat’sbeendous
Thepotentialofcomputersforincreasingthecontroloforganizationsorsocietyovertheirmembersandforinvadingtheprivac
Beforemanypeoplebuyacar,atelevisionorawashingmachine,theyshoparoundforthebestdeal.Yet,whensomeofthesepeo
人类最大的谬误,就是以为社会和政治问题简单得很,所以根本不需要科学方法的严格训练,而只要根据实际经验就可以判断,就可以解决,但是事实却恰好相反。
随机试题
美国谈判界有一位号称“最佳谈判手”的考温,他非常重视沟通的技巧。举一个关于他的生动的例子:有一年夏天,他被任命为一家公司的新任经理。为了真实地了解公司的状况,他在上任前就来到下属的工厂。当看到一个工人独自在厂房外抽烟时,他主动走过去递了一根烟.说
药物的酊剂与单糖浆混合时,作助滤剂浸膏剂的制备中加人去油脂
下列对“冬天麦盖三层被,来年枕着馒头睡”的理解,错误的是:
某班有35个学生,每个学生至少参加英语小组、语文小组、数学小组中的一个课外活动小组。现已知参加英语小组的有17人,参加语文小组的有30人,参加数学小组的有13人。如果有5个学生三个小组全参加了,问有多少个学生只参加了一个小组?()
非理性因素在认识过程中()。
设供应商零件的关系模式为SP(Sno,Pno,Qty),其中Sno表示供应商号,Pno表示零件号,Qty表示零件数量。查询至少包含了供应商“168”所供应的全部零件的供应商号的SQL语句如下:SELECTSnoFROM
阅读以下说明,回答问题1至问题5。[说明]客户机TUser连接终端服务器TServer的网络拓扑示意图如图2-1所示。终端服务采用的传输层协议是______。
下面关于计算机的论述,其中错误的是Ⅰ.第四代计算机以大规模集成电路和超大规模集成电路的使用为主要标志Ⅱ.计算机的发展趋势可以概括为:速度更快、功能更多、体积更小、价格更低Ⅲ.智能模拟是用计算机模拟人类某些智能行为,目前最先进的智能机器人已经能够完全取代人脑
在窗体上画一个命令按钮(其名称为Command1),然后编写如下事件过程:PrivateShbCommand1_Chck()Dima(5,5)AsIntegerDimiAsInteger,jAs
AdamSmithwasmefounderofeconomicsasadistinctfieldofstudy.Hewroteonlyonebookonthesubject—TheWealthofNatio
最新回复
(
0
)