Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Каширский 434-2004

.pdf
Скачиваний:
22
Добавлен:
31.05.2015
Размер:
451.37 Кб
Скачать

3.

Choose the best variant to complete each sentence:

 

1.

Mobile radio communication began with Guglielmo Marconi's and

Alexander Popov's experiments with 1 communication in 1890's.

a) satellite b) ship-to-shore

c) cellular

d) digital

2.

A wireless communication link includes a 2 a

receiver, and a

channel.

 

 

a) capacitor b) detector

c) switch

d) transmitter

3.More than one mobile at a time can be 3 if a different channel is assigned to each user.

a) supported b) provided c) constructed d) adjusted

4.Mobile units, sharing a frequency 4 can communicate with one another, and independent conversations can take place on different channels.

a) band

b) channel

e) area

d) meter

5.The repeater, a transceiver that is located at a high point,

5 the signals with greater power on the second channel, a) reflects b) distorts c) retransmits d) receives

6.A trunked system can support many more users than the number of frequencies 6

a) dispensable b) expedient c) negligible d) available

7.The large distances and high speeds of the satellites introduce some difficulties, but a system of this type can provide worldwide 7

a) coverage b) access

c) broadcast

d) scale

8.

 

 

At VHF and above, radio wave

 

 

 

8 is most by line-of-sight. a)

transmission b) selection c) propagation d) reflection

 

9.

 

 

 

Many

amateur and most CB radio contacts 9

 

into its

peer-to-peer model.

 

 

 

a) fit

 

b) come

c) get

d) break

10.

A repeater system 10 communication over a much greater range

than in a direct peer-to-peer system.

 

 

a) supplies

b) controls

c) interrupts

d) allows

19

4. Get ready to ask оме of the students:

1)which types of mobile communication systems he knows;

2)what the structure of a base/mobile system is;

3)how the repeater system works.

TEXT 3

1. Read the text and give the translation using the dictionary. Study the following words and word combinations before reading:

baby alarm - (зд.) - детская рация;

to track down - выследить (и поймать); countersurveillance - контрнабдюдение; to pick up - добывать сведения;

radio ham - radio amateur;

to eavesdrop ( on )-подслушивать; to intercept - перехватывать;

to monitor - перехватывать; surveillance - надзор, наблюдение;

to charge with - порицать, осуждать; обвинять; to pinpoint - определять точное местоположение; prey - добыча;

mains supply - питающая сеть; countermeasure - контрмера, мера против;

to bug - устанавливать аппаратуру для подслушивания, тайного наблюдения; подслушивать, вести тайное наблюдение

помощью спец. аппаратуры); a bug - подслушивающее устройство, “жучок”;

to tap - прослушивать телефонные разговоры; a tap - устройство для прослушивания телефонных разговоров; прослушивание телефонных разговоров; tapping прослушивание телефонных разговоров;

lucrative - прибыльный, выгодный, доходный; culprit - преступник;

credit (зд.) - счет в банке;

20

head office - главный офис.

The Gadgetry that can Invade anyone's Privacy

An Englishman's home is no longer his castle. It can easily be bugged and every conversation in any room monitored. Even a humble baby alarm can be used to listen in to conversations within 40ft of the transmitter.

Telephone calls, information stored on computers, credit and financial details -even the exact position where you are in the country - can be tracked down by those with the right knowledge and the right equipment, according to countersurveillance experts and private detectives.

In the week in which it was shown how vulnerable a phone call between "Squidgy" and "James" (Lady Diana and a man) was to a prying radio ham with a tape recorder, the underlying message was that it is not just royal privacy but the privacy of ordinary Britons that has been eroded.

The case of the call said to have involved the Princess of Wales showed that mobile telephone conversations can be picked up by a scanner. But calls made in the home on cordless equipment are equally at risk of being picked up by eavesdroppers using scanners bought from electronic stores for about £200.

An American businessman was jailed for four months in 1990 after a neighbour intercepted his cordless phone conversation and reported him to the police as a drug dealer. Police monitored his calls and charged him with tax evasion.

It is through a mobile phone that a person's exact position can be pinpointed -by tracking the signals from the telephone cell.

Baby alarms are easy prey. Most use the electricity mains supply to transmit, so neighbours can pick up the signals.

William Parsons, an electronic countermeasures consultant, explains: "Each street has mains modulation. Each house is on a different phase. The first house is coded red. the second is yellow, and the third blue. The fourth house will be red again. So the fourth

21

house would be able to pick up the signals from the baby alarm in the first house because they are linked. Another baby alarm could be used to listen in. The alarms can transmit conversations within 40 feet of the equipment."

Bugging and telephone tapping have become lucrative business as people grow more aware of the value of information. Private investigators are often the main culprits.

"You can put a tap on anybody's phone line from the exchange, privately, without British Telecom knowing about it. The equipment costs about £500 and it takes two minutes to set up." one private investigator said.

Mr Parsons added that companies charge between £500 and £10,000 to bug telephone lines. Phone tapping is illegal under the Telegraph and Wireless Act, but even the Association of Private Investigators admits that some members may break the law.

"Bugging is an offence with a fine of £1,000. Yet you can buy a bug, and you can advertise them. But if you put a transmitter in, you are breaking the law. the law is an ass" said the association's spokesman, Peter Heimes.

Telephone taps are a simple route into computer systems. "Networkers", who work from home on computers linked by modem to an office system, are particularly at risk.

By bugging a target's telephone line, passwords to the home and office systems can be recorded on tape and used to raid information on both. "All you need is a laptop computer, a modem, software and a tape recorder.

The bug costs just £25," according to John Armstrong, a design engineer.

But he said, there are much simpler ways of stealing computer information. All computers radiate signals from the screen, which can be picked up by a receiver. "A small pocket TV, which costs around £49, can be adapted to receive the information, which can be recorded. You sit outside, tune it into the computer screen in the target's house and take aim."

A more sophisticated scanner, at £200, could monitor the information from a quarter of a mile away. The range of

22

monitoring equipment is staggering. One London shop sells a laser which can be aimed at windows to monitor any conversation in a room.

The actress Vanessa Redgrave accused the security services of bugging her office in March last year, after an electronic listening device was found in a two-way electric plug adaptor in her office at her south London home. She called in an expert when a wire was found outside her house.

Credit rating information is available on anybody. "Banks promise they won't let anybody have information about your accounts. But it only takes someone in head office who needs £.500 and they will give you every statement you need," a private investigator said.

So who are the clients? One consultant said that the biggest private buyers of phone taps were Arabs suspicious of friends, relatives and business partners. Although commercial companies were right to spend money on preventing industrial espionage, he advised individuals to weigh the costs against the value of their secrets. "It is not worth building a Fort Knox to protect twopence.”

Dean Nelson, The Independent

2. Pick out the statement with the meaning opposite to the one expressed by the proverb:

"It is not worth building a Fort Knox to protect twopence." 1) The game is not worth the candle.

2) The end justifies the means.

3) It is not worth powder and shot.

4) Choice of the end doesn’t cover choice of the means.

3. Answer the questions:

1.Why is an Englishman’s home no longer his castle?

2.What purpose can a baby alarm serve?

3.What can be tracked down with the right equipment?

4.What did the radio amateur do with the help of a tape recorder?

23

5.Which is safer in use, a mobile phone or cordless equipment at home?

6.Why was an American businessman jailed for four months?

7.How can your conversation be listened in by your neighbour by means of a baby alarm?

8.What has become lucrative business by now?

9.What kind of people often bug phone lines?

10.How much is the fine for advertising a bug?

11.What do you need to break into a computer system?

12.Why should your computer screen be facing away from the street?

13.What did Vanessa Redgrave accuse the security services of and why did she do that?

14.How can you get information about someone's bank account?

15.What did the expert advise?

4.

Complete the gaps with the appropriate words from the text.

1.

An Englishman's home is no longer his castle. It can easily be

bugged and every conversation in any room 1

 

a) practised b) monitored c) detected

d) learnt

2.

Even a humble baby alarm can be used to

listen in to conversations 2 of the transmitter.

 

a) within 60 ft b) within 40 ft c) within 50 ft d) within 450 ft

 

3.

In the week in which it was shown how 3 a phone call between

"Squidgy" and "James" was to a prying radio ham with a tape recorder, the underlying message was that it is not just royal privacy but the privacy of ordinary Britons that has been eroded.

a) vulnerable b) secure c) dangerous d) safe

4.The case of the call said to have involved the Princess of Wales showed that 4 conversations can be picked up by a scanner.

a) private b) public c) face-to-face d) mobile telephone

5.But calls made in the home on cordless equipment are equally at risk of being picked up by eavesdroppers using 5 bought from electronic stores for about £200.

24

a) scanners b) mobile phones c) monitors d) lasers

6.An American businessman was jailed for four months in 1990 after a neighbour 6 his cordless phone conversation and reported him to the police as a drug dealer.

a) cut short b) publicized c) interrupted d) intercepted

7.Police monitored his calls and charged him with 7

a) tax evasion b) a swindle c) a murder d) kidnapping

8.Most baby alarms use the electricity mains supply to 8 so neighbours can pick up the signals.

a) accumulate b) propagate c) transmit d) receive

9.Private investigators are often the main 9

a) suspects b) culprits

c) characters

d) experts

10.

"Bugging is an offence with a fine of £1,000. Yet you can buy a

bug, and you can advertise them. But if you put a 10 in. you are breaking the

law.

 

a) receiver b) transmitter c) capacitor

d) switch

5. Answer the following ‘true/ false’ questions by referring to the text:

1.Having appropriate equipment, one can intrude upon anybody’s

privacy.

2.Cordless telephones at home are more secure to use than mobile

phones.

3.Cordless telephone conversations can’t be picked up by means of a

scanner.

4.The police are allowed to listen in to private telephone conversations.

5.Baby alarms can be used as a means of penetration into anyone’s

privacy.

6.Private investigators have never been involved in telephone lines bugging.

7.Telephone tapping is available only to highly qualified specialists.

8.According to John Armstrong, a design engineer, there is no simpler way to steal computer information than to bug a target’s

25

telephone line.

9. Famous people can also be exposed to a bugging attack.

26

SUPPLEMENTARY READING

Data Encryption

The process of scrambling stored or transmitted information so that it is unintelligible until it is unscrambled by the intended recipient. Historically, data encryption has been used primarily to protect diplomatic and military secrets from foreign governments. It is also now used increasingly by the financial industry to protect money transfers, by merchants to protect credit-card information in electronic commerce, and by corporations to secure sensitive communications of proprietary information.

All modem cryptography is based on the use of algorithms to scramble (encrypt) the original message, called plaintext, into unintelligible babble, called ciphertext. The operation of the algorithm requires the use of a key. Until 1976 the algorithms were symmetric, that is, the key used to encrypt the plaintext was the same as the key used to decrypt the ciphertext. In 1977 the asymmetric or public key algorithm was introduced by the American mathematicians W. Dafiier and M. E. Hellmartn. This algorithm requires two keys, an unguarded public key used to encrypt the plaintext and a guarded private key used for decryption of the ciphertext; the two keys are mathematically related but cannot be deduced from one another. The advantages of asymmetric algorithms are that compromising one of the keys is not sufficient for breaking the cipher and fewer unique keys must be generated.

In 1977 the Data Encryption Standard (DES), a symmetric algorithm, was adopted in die United States as a federal standard. DES and the International Data Encryption Algorithm (IDEA) ate the two most commonly used symmetric techniques. The most common asymmetric technique is die RSA algorithm, named, after Ronald Rivets, Adi Sharrti, and Len Adleman. who invented it while at die Massachusetts Institute of Technology in 1977. Other commonly used encryption algorithms include Pretty Good Privacy (PGP), Secure Sockets Layer (SSL), and Secure Hypertext Transfer Protocol

27

(S-HTTP). The National Institute of Standards and Technology (NIST) is working with industry and the cryptographic community to develop die Advanced Encryption Standard (AES), a mutually acceptable algorithm that will protect sensitive government information and will be used by industry' on a voluntary basis.

Data encryption is regarded by the U.S. government as a nationalsecurity issue because it can interfere with intelligence gathering—therefore, it is subject to export controls, which in turn make it difficult for U.S. companies to function competitively in the international marketplace. To resolve this dilemma, the federal government in 1993 proposed key escrow encryption, an approach embodied in an electronic device called a "Clipper chip." That makes broadly available a purportedly unbreakable encryption technique (although the code was broken by researchers in 1995) with keys to unlock die information held in escrow for national security and lawenforcement purposes by the federal government This approach, however, has been unacceptable to civil libertarians and to the international community. In 1994 the Clipper algorithm (called Skipjack) was specified in the Escrow Encryption Standard (EES), a voluntary federal standard for encryption of voice, facsimile (fax), and data communications over ordinary telephone lines. A subsequent compromise escrow scheme intended to create a standard for data encryption that balanced the needs of national security, law enforcement, and personal freedom was rejected in 1995; a compromise proposed in 1999 was also controversial.

Semiconductors and their Properties

A semiconductor is a crystalline solid that is intermediate in electrical conductivity. Their values of resistivity at room temperature are in the range of about 10-2 to 109 ohm cm. That is, it is in between a conductor and an insulator. Semiconductors behave as insulators at absolute zero. The most common solids used for semiconductors are silicon and germanium.

The semiconductor was first researched by Michael Faraday in 1833. Faraday found that some conductors became

28