Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing.
Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century.
【六级讲义阅读理解 Passage Sixteen (Crime in Computer)】相关文章:
★ 六级讲义阅读的理解 A Strong Stock Marke
★ 六级深度讲义阅读的理解Passage Four 20100928
★ 六级深度讲义—阅读理解Passage Nine 20101003
★ 六级深度讲义的阅读理解Passage Ten 20101004
最新
2016-10-18
2016-10-11
2016-10-11
2016-10-08
2016-09-30
2016-09-30