首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
admin
2022-09-06
61
问题
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook can now wirelessly transfer a wiretapping program to any mobile phone. The programs are inexpensive, and the transfer requires no special skill. The would-be spy needs to get his hands on your phone to press keys authorizing the download, but it takes just a few minutes—about the time needed to download a ringtone.
This new generation of user-friendly spy-phone software has become widely available in the last year—and it confers stunning powers. The latest programs can silently turn on handset microphones even when no call is being made, allowing a spy to listen to voices in a room halfway around the world. Targets are none the wiser: neither call logs nor phone bills show records of the secretly transmitted data.
More than 200 companies sell spy-phone software online, at prices as low as $50. Vendors are loath to release sales figures. But some experts claim that a surprising number of people carry a mobile that has been compromised, usually by a spouse, lover, parent or co-worker. Many employees, experts say, hope to discover a supervisor’s dishonest dealings and tip off the top boss anonymously. Max Maiellaro, head of Agata Christie Investigation, a private-investigation firm in Milan, estimates that 3 percent of mobiles in France and Germany are tapped, and about 5 percent or so in Greece, Italy, Romania and Spain. James Atkinson, a spy-phone expert at Granite Island Group, a security consultancy in Gloucester, Massachusetts, puts the number of tapped phones in the U.S. at 3 percent. Even if these numbers are inflated, clearly many otherwise law-abiding citizens are willing to break wiretapping laws.
Spyware thrives on iPhones, BlackBerrys and other smart phones because they have ample processing power. In the United States, the spread of GSM networks, which are more vulnerable than older technologies, has also enlarged the pool of potential victims. Spyware being developed for law-enforcement agencies will accompany a text message and automatically install itself in the victim’s phone when the message is opened, according to an Italian developer who declined to be identified. One worry is that the software will find its way into the hands of criminals.
The current embarrassment is partly the result of decisions by Apple, Microsoft and Research In Motion (producer of the BlackBerry) to open their phones to outside application-software developers, which created the opening for spyware. Antivirus and security programs developed for computers require too much processing power, even for smart phones. Although security programs are available for phones, by and large users haven’t given the threat much thought. If the spying keeps spreading, that may change soon.
In pointing out figures related to compromised mobiles, the author suggests that A an unexpected number of people are being eavesdropped.
选项
A、many employees hope to discover the boss’ dishonest secrets.
B、the popularity of spy-phone software results from low prices.
C、law-abiding people become the victims of spy phone.
答案
A
解析
根据compromised mobiles定位到第三段。此处引用数字是为了说明前面提到的:有许多人的手机都被监听了,故选A项。文中提到许多雇员希望发现上级主管的违规行为,而非B项中的boss“老板”。对象错误;原文并没有提到价格低廉是监听软件流行的原因,故C项错误;此外文中提到奉公守法的公民甘愿违反窃听法,D项中却指出遵纪守法的公民沦为监听软件的受害者,显然与事实不符。
转载请注明原文地址:https://kaotiyun.com/show/iHmZ777K
0
考研英语一
相关试题推荐
Globalwarmingisalreadycuttingsubstantiallyintopotentialcropyieldsinsomecountries—tosuchanextentthatitmaybea
Therigidhigher-educationbusinessisabouttoexperienceawelcomeearthquake.Traditionaluniversitiesnowfaceanew【C1】____
Evidenceofthebenefitsthatvolunteeringcanbringolderpeoplecontinuestorollin."Volunteershaveimprovedphysicalands
Whyinanageofadvancedtechnology,shouldsomanypeoplestillclingtoanancientbelief?Inpartitmustbebecauseastrolo
TheNewCollegeoftheHumanitiesinBloomsbury,London’smainuniversityquarter,feelslikeatinyversionofanaugustacadem
TheNewCollegeoftheHumanitiesinBloomsbury,London’smainuniversityquarter,feelslikeatinyversionofanaugustacadem
Emilywantedtoseeotherpeople.Stuarthadenjoyedastringofshort-termrelationshipsbutrealizedthatheneededmorecommi
Emilywantedtoseeotherpeople.Stuarthadenjoyedastringofshort-termrelationshipsbutrealizedthatheneededmorecommi
[A]Takeawalk[B]Lookatcurrenttrends[C]Brainstormwithfriends[D]ShareyouropinionsontheInternet[E]L
[A]Takeawalk[B]Lookatcurrenttrends[C]Brainstormwithfriends[D]ShareyouropinionsontheInternet[E]L
随机试题
在沟通方式中,沟通速度快但会发生信息逐级筛选现象,以致影响信息真实性的是()
患者,女,25岁。脐周疼痛1天,逐渐加重,现感觉右下腹疼痛,伴恶心呕吐,轻度发热,无阴道出血。血液分析显示白细胞11.8×109/L,中性白细胞0.87。问题4:该病的病理类型不包括
正常人体气体交换的关键因素是
2017年5月,甲公司销售商品实际应交增值税38万元,应交消费税35万元,转让办公楼交纳的土地增值税为15万元;适用的城市维护建设税税率为7%,教育费附加为3%。假定不考虑其他因素,甲公司当月应列入利润表“税金及附加”项目的金额为()万元。
下列古代汲水灌溉工具与应用原理对应错误的是:
建国后,毛泽东曾多次强调:“如果我们在大约三个五年计划的时期内基本上解决农业合作化的问题,我们的社会主义工业化事业就会遇到绝大的困难.我们就不可能完成社会主义工业化。”这一论述意在说明
[*]
下面有关加密技术的叙述中,(1)是错误的。
下面描述中,符合结构化程序设计风格的是()。
Inancienttimesthemostimportantexaminationswerespoken,notwritten.IntheschoolsofancientGreeceandRome,testingus
最新回复
(
0
)