首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
admin
2017-04-13
53
问题
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook can now wirelessly transfer a wiretapping program to any mobile phone. The programs are inexpensive, and the transfer requires no special skill. The would-be spy needs to get his hands on your phone to press keys authorizing the download, but it takes just a few minutes—about the time needed to download a ringtone.
This new generation of user-friendly ipyphone software has become widely available in the last year— and it confers stunning powers. The latest programs can silently turn on handset microphones even when no call is being made, allowing a spy to listen to voices in a room halfway around the world. Targets are none the wiser: neither call logs nor phone bills show records of the secretly transmitted data.
More than 200 companies sell spy-phone software online, at prices as low as $50. Vendors are loath to release sales figures. But some experts claim that a surprising number of people carry a mobile that has been compromised, usually by a spouse, lover, parent or co-worker. Many employees, experts say, hope to discover a supervisor’s dishonest dealings and tip off the top boss anonymously. Max Maiellaro, head of Agata Christie Investigation, a private-investigation firm in Milan, estimates that 3 percent of mobiles in France and Germany are tapped, and about 5 percent or so in Greece, Italy, Romania and Spain. James Atkinson, a spy-phone expert at Granite Island Group, a security consultancy in Gloucester, Massachusetts, puts the number of tapped phones in the U.S. at 3 percent. Even if these numbers are inflated, clearly many otherwise law-abiding citizens are willing to break wiretapping laws.
Spyware thrives on iPhones, BlackBerrys and other smart phones because they have ample processing power. In the United States, the spread of GSM networks, which are more vulnerable than older technologies, has also enlarged the pool of potential victims. Spyware being developed for law-enforcement agencies will accompany a text message and automatically install itself in the victim’s phone when the message is opened, according to an Italian developer who declined to be identified. One worry is that the software will find its way into the hands of criminals.
The current embarrassment is partly the result of decisions by Apple, Microsoft and Research In Motion(producer of the BlackBerry)to open their phones to outside application-software developers, which created the opening for spyware. Antivirus and security programs developed for computers require too much processing power, even for smart phones. Although security programs are available for phones, by and large users haven’t given the threat much thought If the spying keeps spreading, that may change soon.
Which of the following is true of the "spy phone"?
选项
A、It’s a complicated and inexpensive wireless transfer software.
B、It can be downloaded to the phone for free.
C、The download takes less than the time of downloading a ringtone.
D、Its targets are totally unaware that they are spied.
答案
D
解析
事实细节题。第二段末句提到,被监听的人对此是一无所知的:不管是通话记录还是手机账单都不会有秘密传输数据的记录,D项与之相符。
转载请注明原文地址:https://kaotiyun.com/show/HnbZ777K
0
考研英语一
相关试题推荐
InatimeoflowacademicachievementbychildrenintheUnitedStates,manyAmericansareturningtoJapan,acountryofhigha
TheNHS(NationalHealthService)hasapprovedthecreationofchainsofhospitalsforthefirsttimeinitshistoryinabidtot
Readthefollowingtextandanswerthequestionsbyfindinginformationfromtheleftcolumnthatcorrespondstoeachofthemar
ReadthefollowingtextandanswerthequestionsbychoosingthemostsuitablesubheadingfromthelistA-Gforeachnumberedp
ReadthefollowingtextandanswerthequestionsbychoosingthemostsuitablesubheadingfromthelistA-Gforeachnumberedp
Moreevidenceisinthatso-callede-cigarettesdoletsmokersstopsmoking.Suchcigarettes【C1】______totheuseranoralnicoti
Moreevidenceisinthatso-callede-cigarettesdoletsmokersstopsmoking.Suchcigarettes【C1】______totheuseranoralnicoti
ReadthefollowingtextandanswerthequestionsbychoosingthemostsuitablesubheadingfromthelistA-Gforeachnumberedp
AsGilbertWhite,Darwin,andothersobservedlongago,allspeciesappeartohavetheinnatecapacitytoincreasetheirnumbers
Darwindiscoveredtwomajorforcesinevolution—naturalselectionandsexualselectionandwrotethreeradicalscientificmaster
随机试题
求微分方程y"+2y’-3y=(2x+1)ex的通解.
Men’sHealthIfyou’reamaleandyou’rereadingthis,congratulations:you’reasurvivor.Accordingtostatistics,you
A.心尖区舒张中晚期隆隆样杂音B.心尖区全收缩期吹风样杂音C.胸骨左缘3肋间舒张早期哈气样杂音D.胸骨右缘2肋间3级以上喷射性收缩期杂音E.胸骨左缘功能性收缩期杂音主动脉瓣关闭不全
患者,女,36岁。1周来头晕目眩,伴胸胁胀闷,舌红,脉弦。治疗应首选
依据《中华人民共和国固体废物污染环境防治法》,固体废物的“处置"包括()。
下列行为中,属于招标人违法行为的有()。
2017年7月28日A公司从B公司购入一项土地使用权,支付购买价款2000万元,支付契税80万元,支付过户登记费2万元。A公司预计该土地使用权尚可使用30年,采用直线法摊销。则A公司2017年应计提摊销的金额为()万元。
图1为反射弧,图2为图1中D结构的放大示意图(D结构与C相似)。请根据图分析,回答下列问题:图1中的C结构名称是_________。
毛泽东在《关于正确处理人民内部矛盾的问题》讲话中,提出的方法是()。
A、 B、 C、 D、 B建立E_R模型是数据库概念设计的重要内容,而概念设计是设计阶段的组成部分。
最新回复
(
0
)