The Hunt For The Kill Switch
- 格式:pdf
- 大小:5.17 MB
- 文档页数:6
[身份推理]一夜终极狼人One Night Ultimate Werewolf+破晓DayBreak 规则一夜终极狼人(*号为破晓扩展)相比狼人杀的优点:1、不需要一个单独的法官,所有人可以参与游戏2、没有人先死导致玩一小时手机3、只有一个夜晚白天就开始投票,游戏时长可以只有十来分钟。
4、携带方便,如果没带游戏,也可以在扑克牌正面写上字就能玩,甚至是其他游戏的卡牌或者token均可,只要背面区分不出来就行游戏规则如下:人数+3张卡牌。
洗匀卡牌后每人抽一张,观看自己获得的身份后将自己的卡牌盖置在桌子上,多余的3张牌盖置在中央,因为有换牌看牌的操作,建议卡牌都摆放的靠中间点,方便夜晚移动或观看卡牌。
选择一名玩家开始主讲(同样闭眼参与游戏):“天黑请闭眼……按角色顺序,被报到的角色睁眼执行自己的动作后闭眼……请各位保持闭眼状态伸出手探一探自己的卡牌并稍微移动一下,天亮了”按自己一开始摸到的卡牌身份执行技能且只能执行一次(举例:强盗换到了捣蛋鬼以后也不能再执行捣蛋鬼的技能,假如你的牌之后没被换过,天亮以后你就是捣蛋鬼了)天亮以后所有人都不能再观看卡牌,按天亮后盖置的身份判定胜负。
所有人开始自由发言,然后同时投票,必须投票且不能投自己,2票及以上的平票一起死,然后翻开角色牌,根据现有的角色判定胜负。
角色说明如下:(按天黑后执行任务顺序)*哨兵:放置盾牌在某玩家牌(除自己)上,该身份牌不能被(包括本人在内任何人)查看或调换化身幽灵:观看另外一名玩家的身份牌并且成为这个角色(按照那个角色所在组计算胜利)。
预言家/强盗/捣蛋鬼/酒鬼/*侦探/*白痴:立即使用这些人的角色能力。
狼人或守夜人:和狼人或守夜人一同睁眼。
不睁眼角色:成为这个角色但晚上不用做其他事。
——主讲人说话:请化身幽灵观看一位玩家身份。
若化身幽灵看到可以行动的角色能力请执行,倒数……闭眼。
请化身爪牙睁眼,狼人(包括贪睡狼)伸出大拇指示意,闭眼。
狼人X2:狼人一起睁眼(*贪睡狼竖起大拇指)。
Section Ⅰ TOPIC TALK(主题语境:人与自然之环境保护)一、根据提示回顾相应的主题词汇图1:在过去的40年里 in the past 40 years;下降了 decrease by图2:成千上万的物种 thousands of species;灭绝的边缘 the edge of extinction图3:增长到 rise to ;对……产生令人震惊的影响 have a shocking impact on ...二、选用相关主题词汇并根据提示翻译下面句子1.在过去的40年里,野生动物的数量减少了50%。
In the past 40 years, the number of wild animals has decreased by 50 percent. 2.我们已经把成千上万的物种逼到了灭绝的边缘。
We ’ve driven thousands of species to the edge of extinction.3.随着人口增长到75亿,我们对其他物种产生了令人震惊的影响。
As the human population has risen to 7.5 billion, we have had a shocking impacton other species.三、回答问题1.What are the consequences of the impact we have on the environment?(Answers may vary)Potentially enormous losses.2.What is nature to us?(Answers may vary)Nature is not “nice to have” —it is our lifesupport system.Section ⅠTOPIC TALKⅠ.根据词性及汉语意思写出英语1.plastic adj. 塑料制的2.mining n. 采矿业3.item n. 一项,一条4.informative adj. 有教育意义的;知识性强的5.switch vi.& vt. 转换,改变6.rhino n. 犀牛7.horn n. (牛、羊等头上的)角Ⅱ.拓展识变化1.conservation n.保护→conserve v.保护2.destroy vt.破坏;毁掉→destruction n.破坏;毁掉→destroyer n. 破坏者3.recycle vi.& vt.再利用,回收利用→recyclable adj.可回收的→unrecyclable adj.不可回收的4.threat n.威胁; (灾难等坏事)发生的可能→threaten v.威胁5.illegally adv.非法地,违法地→legally adv.合法地→legal adj.合法的→ill egal adj.非法的6.hunt vi.& vt.猎取,猎杀→hunter n.猎人7.extinct adj.灭绝的,绝种的→extinction n.灭绝,绝种8.incredibly adv.非常地,极端地→incredible adj.难以置信的;极好的9.urgent adj.紧急的,急迫的→urgency n.急迫,紧急→urge v.敦促Ⅲ.语境记短语1.have a role to play 起某种作用2.do his part in the job 尽他的职责3.in order to protect the planet 为了4.threats to the environment 对……的威胁5.switch to different forms of power 转向6.as soon as possible尽可能快地7.the amount of waste ……的数量8.protect animals in danger处于危险中9.at present现在,目前10.stop this from happening 阻止……做某事Ⅳ.仿写练句式1.[教材原句] It was by Professor Linda Wei, the environmental expert, wasn ’t it?[句式分析] 反意疑问句[佳句仿写] 他们工作努力,不是吗?They work hard, don ’t they?2.[教材原句] ... I really feel strongly that we need to change the way we live in order to protect our planet.[句式分析] way后的定语从句[佳句仿写] 我不喜欢你跟她说话的方式。
【英语】一般将来时一、单项选择一般将来时1.You look frozen.Sit down by the fire and I you some hot tea.A.make B.was making C.made D.will make【答案】D【解析】考查时态。
句意:你看起来冻坏了。
坐在火边,我给你沏一些热茶。
可知下文描述的是将来的动作,故用将来时态,选D。
2.A good film producer must make sure that his films ____ fit into the needs of the changing market.A.are to B.will C.are going to D.are about to【答案】A【解析】试题分析:考查将来时的表达法。
Be to do sth表示计划的事情;表示注定要做某事;也可以表示命令做某事,相当于have to, must,should; will表示一般的将来,或者临时决定做某事;be going to do sth表示按照计划安排要做某事;或者根据某种迹象要做某事;be about to do sth即将做某事,不与表示将来时的时间状语连用。
句意:好的电影出品人要确保他的电影应该满足不断变化的市场的需要。
该句中的be to =should.故A正确。
考点:考查将来时的表达法点评:Be to do sth表示计划的事情;表示注定要做某事;也可以表示命令做某事,相当于have to, must,should; will表示一般的将来,或者临时决定做某事;be going to do sth表示按照计划安排要做某事;或者根据某种迹象要做某事;be about to do sth即将做某事,不与表示将来时的时间状语连用。
3.Half the world’s population ______ water shortages within 15 years according to the World Bank, just one of many recent alarming reports on the world’s fresh water supply.A.are suffering B.have been suffered C.will suffer D.were suffered【答案】C【解析】试题分析:根据时间状语within 15 years,故用一般将来时。
第三版新视野大学英语3习题加答案解析[部分]1.Most cities in the country have introduced “Clean Air Zones”whereby factories and households are only allowed to burn smokeless fuel.2.He knows that the pursuit of social status can consume vast amounts of his time and effort.3.The doctors are at a loss because so far no medicine has been found to inhibit the spread of the disease.4.We see many special education directors trying to maintain the quality of their programs with much less money and much smaller staff.5.People there are told it is their patriotic duty to support the national economy by buying their own products.6.Darwin’s thinking both drew upon and transcended the conventional ideas of his time.7.In spite of all your endeavors , there may be times when you encounter difficulties in the training process.8.My advice to Mr. Stewart is to think carefully before entering intoa career in medicine, as this is a field which requires a lot of dedication and long working hours.9.Most Chinese parents would prefer to choose some professions that are stable and could bring prestige and economic benefits.10. It’s legally possible for an elderly person to nominate someone to act for them, should they become incapable of looking after themselves.1.Kids are more likely to intervene in a situation if they believe their parents expect them to help.2.The first lesson I learned as a newcomer for the company was never to underestimate the degree of difficulty I would face in career advancement.3.Just as I started to think that I was never going to get well, the illness began to recede .4.Whatever the decision is, I would like you to know that your department is my first choice and I deem it a great honor if I could study in your department.5.During one particularly bleak moment in my career, a senior colleague of mind said to me, “If you follow your dreams, the money will come. Follow the money, and you’ll lose your dreams.”6.Unless we can find a way to appraise nature and then invest in protecting it, our basic life-support systems are going to collapse.7.The blizzard(暴风雪) moved south, turning into an icy rain that paralyzed the airports for three days.8.In this introduction we have diagnosed some of the causes of the illness and, in the following chapters, we will draw attention to its various unpleasant symptoms.9.In those days, divorce under any circumstances was socially unacceptable and there was great dismay in the family who went through it.10.Every time she talked about being rejected in her hunt fora job, she seemed on the brink of tears, and I would quickly switch the conversation to another topic.Unit 31.As a number of authors point out, the urge to migrate is a(n) integral part of human nature.2.Children should be allowed to cherish those few years ofinnocence before they have to learn the truth about the real world.3.He has been afflicted by a horrible disease, from which one of his best friends died two weeks ago.4.The results of the survey are noteworthy and useful despite being froma small sample.5.The director said that they needed a young actress who could portray someone who was both unbalanced and confident at the same time.6.Praise must be used wisely to compliment students who perform up to expectations and to and to encourage students to perform to maximum levels.7.In the domain of research, it is an accepted fact that scientific publications have to be written or translated into English to get published, acknowledged, and cited.8.He received a(n)anonymous call threatening to disclose details of his affair if he didn’t pay the money.9.The movie presents Lincoln as a strong-willed, conscientious man who led the US through a moral, constitutional and political crisis.10.It is understandable that the health and welfare of their family is a(n) perpetual concern for this young couple.Unit 41.Although secondary education is compulsory, parents are not required to send their children to state schools.2.The economic situation has been worsening, causing economists to contemplate whether the present policies are sustainable.3.He was found guilty and was imprisoned in the T ower ofLondon, where he died very quickly, aged only 47.4.It is obvious that the future of the Internet is to globalize more and more areas of the world, and that e-commerce and e-entertainment are going to go for more and more markets.5.However, your current losses should soon be offset by gains; the fund will produce a positive return of 11.6 percent overa nine-month period.6.Because she was so tall and slim, all the clothes looked marvelous on her and the other girls would groan their envy.7.This can be a helpful approach in discussion-someone may regard you as stubborn since you never want to change your mind, whereas you see yourself as determined.8.On weekends, the school parking lot is almost empty except that a few cars cluster near the entrance.9.In the photographer’s finest pictures there is also a degree of ambiguity, which allows them to be interpreted in a variety of ways.10.Tim stretched out a hand in apology for his thoughtless remarks and was consoled by a firm handshake from Mark.Unit 51.The general considered all the information that had been gathered and gauged what possible moves the enemy might make before issuing his orders.2.The new president said she would dedicate herself to protecting the rights of the old and the homeless, who are otherwise helpless and vulnerable.3.Cell phone conversations, which are fairly commonplace on commuter trains, can be annoying to fellow commuters.4.Ask your doctor whether a low-fat diet and a daily walk will suffice to reduce your high blood pressure.5.The revenue from tourism is the biggest single contribution to GDP in the Maldives; every year many tourists from all corners of the world spend their holidays there.6.Since the beginning of this century, China has built many modern conference centers with underground parking, air-conditioning and simultaneous translation systems.7.While advertising offers a stimulus(刺激) to buy, sales promotion offers a(n) incentive to buy, but consumers must have their own reason to buy.8.In general, smokers living in cities are slightly more prone to lung cancer than smokers who are living in the country.9.A large proportion of important innovations are brought about by people who step outside of conventional categories or traditional assumptions.10.The habit of going to coffee houses was fostered by the city’s relatively small size, safe streets, good public transportation, and moderate climate.Unit 11.When Francis got back after Easter, he was far behind his classmates and he was removed from the second into the third class at his own desire.2.The president acknowledged that he had somehow failed in his ability to communicate to the American people.3.Unfortunately, as history has shown, some of the companies are guilty of misconduct in the pursuit of profit.4.The ship deviated from the agreed voyage and arrived about 10 days late and in the meantime the price of sugar had fallen and the merchants lost over £4,000.5.Because the transcript is still under seal, the law precludes them from reading and discussing the evidence in detail.6.In carrying out the plan we are likely to come across difficulties, but we are determined to triumph over them all.7.Without increasing investment in education, it will be increasingly difficult for low-income people to work their way into the middle class.8.All the passengers in the plane that crashed in the middle of the Andes Mountains a week ago were written off as dead.Unit 21.When the bus pulled to a stop and I got off, I was relieved becauseI had finished school and I had the weekend ahead of me to enjoy myself.2.When my car crashed into the big tree, I could feel the blood draining from my face and I wondered whether I was about to black out.3.All kinds of questions concerning the soaring housing price begin to pop up on cable television and the blogosphere(博客圈) .4.The soldiers’rapid march was stopped short by the general’s command;they were uncertain whether to go back or forward.5.A car crashed into the side of a house after the drive lost control and plowed through a hedge(树篱).6.Charles reappeared, after half an hour’s absence, and threw himself into an armchair, where he lay back for some time with his eyes shut.7.No special equipment is needed other than inspiring, motivating music that you can dance passionately to and let yourself go.8.As her door began to open, she grabbed for the telephone, and then dropped the receiver as Luke walked in.Unit 31.Clearly, most of the students there are full-time workers who would not otherwise have been able to embark on sustained further study.2.The court ruled that this man be deprived of his political rights fora further four years after he has served his 13-year sentence.3.I would love to have kids. I would turn down an Oscar to see my boy at a baseball game or my girl at a song recital.4.Richard was finally released on February 4, one year and six weeks af ter he’d been taken captive.5.She hoped Vincent would understand that her life had not been empty, because her love would live on.6.All people, whether they be rich or poor, strong or weak, privilegedor deprived, are interdependent, and share in the common task of seeking to achieve mankind’s full potential.7.In September 1944 he was able to return to his academic duties, but soon after the war ended he was stricken by a serious illness and did relatively little research thereafter(从那以后).8.She retired from the company where she has led by example and been a source of encouragement to others.Unit 41.Virginia was a perfectionist. She was just not prepared to settle for anything that was second best.2.He could be quite casual in his attitude to his wife’s anxiety, and more often than not failed to let her know when he would be back from a business trip.3.“You’ll kill yourself with those things”, Arty said in a tone in which disappointment was mingled with disgust.4.Thanks to modern transportation, agricultural products in these remote mountainous regions can also be traded for other goods.5.As the market was saturated with a wide variety of goods, the economy became more balanced and the competition forced the prices down.6.Going with the flow doesn’t mean that we don’t know where we’re going; it means that we are open to multiple ways of getting there.7.The athlete had been endowed with long legs and a persistent temperament so he was very successful.8.The wrongly accused man asked for extra compensation to made up for the street he had suffered during the case.Unit 51.The result of this experiment do not correlate with those of the studies that the team of scientists had conducted previously.2.It was a moment of overwhelming excitement when Steve was given the first prize; Tiffany couldn’t refrain from hugging and kissing him.3.As we count down to tonight’s presidential debate, it’s time to go over the political agendas which the candidates are trying to promote.4.She spent the next 10 years taking in washing, slaving away to pay back the money they had borrowed from the bank.5.Indeed, it seems that the upward shift in the rate of economic growth in the mid-1990s coincided with a sudden, substantial,and rapid decline in the prices of computers.6.As Crawford contended with heartbreak in his private life, his career soared to greater heights than he could have ever dreamed of.7.I am assuming that you have adequate health insurance, but someone should be designated as successor to take over your financial and domestic affairs if you become unable to cope with them yourself.8.Formal consent for this new type of treatment was obtained from each patient and the study conform to our institution’s guidelines concerning medical ethics(伦理).Unit 1Where there is a will, there is a way. This proverb means that if you are really determined to do something, however difficult it might be, you will 1)F.eventually find a way to do it well. The 2) G.premier point is that you must have the will to achieve success. Ninety percent of the failures that occur are due to the fact that there is no strong will involved. Many people simply say that they want something, but they do not make any 3) H.endeavor to achieve it. So, instead of getting it, they use the poorest excuse to explain the situation away.On many occasions, people tend to 4) J.bypass every minute obstacle, making the objective impossible to attain. In reality, if they have the will to succeed, they can get rid of the 5) E.handicaps and achieve their goals.Only those with a(n)6)N. committed and focused will and spirit can fight their way to final victory. Many a famous man has the same experience. They have 7)A.attained their prestige because they have had the will to 8)I.transcend apparently insuperable (无法克服的) obstacles. Many artists, statesmen, writers and inventors have manged to succeed because they possess a fierce will, which has helped them to accomplish major 9)K.feats.Therefore, we can see that the main thing which one needs is a strong will. Weak-willed people never climb to the top. They collapse at the 10) M.slightest use of force against them. Strong-willed people, on the other hand will stand up against all odds and will make it a point to succeed.Unit 2实现中华民族伟大复兴(rejuvenation)是近代以来中国人民最伟大的梦想,我们称之为“中国梦”,其基本内涵是实现国家富强、民族振兴、人民幸福。
你伊森愿意娶茱莉亚为你的合法妻子吗Do you, Ethan, take Julia to be your lawful wedded wife?我愿意I do.相依相偎相亲相爱相敬相护To have, to hold, to love, cherish, honor, and protect?我愿意I do.去保护她免受已知和未知恐怖的侵害To shield from terrors known and unknown?-去撒谎去欺骗... -什么- To lie, to deceive... - What?去过双面生活无法阻止她被绑♥架♥ To live a double life, to fail to prevent her abduction,抹去她的身份逼她隐于人世erase her identity, force her into hiding,-夺走她所知的一切-停- take away all she has known... - Stop.-用自私徒劳暂时的方式-停- ...in a selfish, futile, fleeting attempt... - Stop.来逃避你真正的自我...to escape your own true self?求你了停下Please, stop.茱莉亚你选择接受吗And, Julia, do you choose to accept?别Don't.-我接受-不- I do. - No.你该杀了我的伊森You should have killed me, Ethan.贝尔法斯特命运对勇士低语Fate whispers to the warrior...风暴将至A storm is coming.勇士低声回应And the warrior whispers back...我即风暴I am the storm.荷马史诗身份确认伊森·亨特晚上好亨特先生Good evening, Mr. Hunt.无政♥府♥主义者所罗门·莱恩The anarchist Solomon Lane.自从你两年前抓捕他之后Since you captured him 2 years ago,他的消失带来了意料之外的后果his absence from the world stage has had unintended consequences.他曾领导的由变节特工组成的辛迪加组织His Syndicate of rogue covert operatives继续在全球范围内肆虐continues to wreak havoc around the globe.中情局特别行动科The CIA's Special Activities Division一直在坚持不懈地追捕莱恩的特工网络has relentlessly hunted Lane's elite network of hostiles.但还是有很多人未知或在逃But many remain unknown and at large.这个极端分♥裂♥组织剩余的成员The remnants of this extremist splinter cell自称「使徒」refer to themselves as "The Apostles."使徒他们采取了"雇佣恐袭"策略They have since adopted a policy of terror-for-hire,让他们成为了更大的威胁making them an even greater threat.最近在印控克什米尔和中巴边界They are responsible for the recent smallpox outbreak爆发的天花疫情in Indian-controlled Kashmir,克什米尔就是他们的手笔along the borders of China and Pakistan,全球三分之一的人口都受到了威胁threatening one-third of the world's population.疫情已经得到了控制The epidemic is being contained,但情报显示but intelligence would indicate已经有一个新客户雇佣了使徒that a new client has hired the Apostles来执行更庞大的行动for a more ambitious operation.此人曾联♥系♥过他们They have been contacted by this man,一个信息不详的极端分子an unidentified extremist约翰·拉克只知其代号♥是"约翰·拉克"known only by the code name John Lark,他撰写了这份末日宣言author of this apocalyptic manifesto呼吁人们摧毁当前的世界秩序calling for the destruction of the current world order.所有的和平都需要伟大的牺牲据推测挪威核武器专家It is believed Lark is responsible for the disappearance尼尔斯·德布朗克的失踪就与拉克有关of Norwegian nuclear weapons specialist Nils Delbruuk.尼尔斯·德布朗克德布朗克博士的安全权限Dr. Delbruuk's security clearance was revoked在他发表了极度反宗教言论后就被取消了after he expressed fiercely anti-religious views.与此同时使徒一直和Meanwhile, the Apostles have been in contact使徒东欧地下世界的成员有联♥系♥with elements of the Eastern European underworld,他们手中有三枚从俄♥罗♥斯♥东部who are in possession of three plutonium cores一个导弹基地偷取的三颗钚核stolen from a missile base in eastern Russia.这意味着约翰·拉克和使徒This would indicate that John Lark and the Apostles正在协作试图获得可用的核武器are working together to acquire functioning nuclear weapons.核事件应急支援小组预计以德布朗克的水平NEST estimates that a man with Delbruuk's knowledge,使用获得的材料using the materials in play,他可以在72小时内造出三枚核武器could complete three nuclear weapons in as little as 72 hours.这些装置将是手提式的These devices would be man-portable一夜之间就能被安放到世界的任意角落and deployable anywhere on Earth overnight.这些武器在约翰·拉克和使徒手里In the hands of John Lark and the Apostles,将对数以百万计的人these weapons represent an unprecedented threat造成前所未有的威胁to countless millions.你的任务若你选择接受Your mission, should you choose to accept it,就是阻止使徒拿到钚核is to prevent the Apostles from acquiring plutonium使徒不择一切手段using any means at your disposal.如果你或任何你的IMF组员被捕或被杀If you or any members of your IMF team are caught or killed,部长都会否认对你们的行动知情the Secretary will disavow any knowledge of your actions.祝你好运伊森Good luck, Ethan.本条信息将在五秒后自毁This message will self-destruct in five seconds.柏林他迟到了He's late.-他从来不迟到的-他会来的- He's never late. - He'll be here.我感觉很不好I don't like it.这家伙身上有什么东西让我不安Something about this guy just really gives me the creeps.好了放松Okay, just relax.我很放松I'm relaxed.你听起来不像是放松的样子You don't sound relaxed.路德他听起来放松吗Luther, does he sound relaxed to you?他听起来害怕极了He sounds terrified.拜托我没有害怕Please, I'm not terrified.我只是有种不祥的预感I just have a bad feeling is all.你刚刚不是说你很放松吗I thought you said you were relaxed.放松的同时又极度不安It's entirely possible to be relaxed and extremely uneasy是完全有可能的at the same time.-不不可能-你就总这样- No, it's not. - You do it all the time.-不我没有-你就是- No, I don't. - Yes, you do.不他没有No, he doesn't.你想让我相信你现在完全放松I'm supposed to believe that you are perfectly relaxed,-此时此地... -班吉- right here, now... - Benji.在一条黑暗的小巷里等着从一个变♥态♥手中...in a dark alleyway, waiting to buy black-market plutonium买♥♥黑市钚核from a psychopath.班吉我不会让你出事的Benji, I won't let anything happen to you.-好把-瞧吧班吉你非常安全- Okay. - See, Benji, you're perfectly safe.你说得轻松你可是坐在车里That's easy for you to say, you're in the van.是你想出外勤的"硬汉"Well, you wanted to be in the field, tough guy.但今晚路德我想待在车里And tonight, Luther, I would like to be in the van!他来了He's here.天呐Oh, God.准备好钱路德Have that money ready, Luther.收到Copy.伊森你能收到吗Ethan, do you copy?你能收到吗Do you copy?我们到底还做不做交易了Are we finally gonna do this or not?我能在这行生存下来I have survived in this business全靠我脑海中的一个声音with the help of a voice in my head.这个声音从来不出错而无论我何时遇到你This voice is never wrong. And whenever I meet you,它总会跟我说同一句话it tells me the same thing.什么What's that?什么都没有Nothing.我是来做生意的让你的声音扔硬币决定吧I'm here to do business. Tell the voice to flip a coin.那是什么What's that?这是根铍棒This is a beryllium rod,它引发里面的钚产生了反应which is causing a reaction with the plutonium inside the core.没问题That's them.钱呢The money?钱The money.把钱拿过来Bring the money.路德把钱拿过来Luther, bring the money.我们需要那笔钱路德We're gonna need that money, Luther.杀了他们Kill them.我来拿I got it!路德你能收到吗Luther, do you copy?路德Luther!路德快回话Luther, come in.路德现在不在Luther's not here right now.使徒能为你做什么亨特What can the Apostles do for you, Hunt?-你们想要什么-你们被包围了亨特- What do you want? - You're boxed in, Hunt.把钚给我们然后离开Give us the plutonium and walk away.班吉把车开来Benji, get the car.我可能做不到I don't think I can do that.班吉把车开来Benji, get the car.我们跟你做个交易亨特We'll make you a deal, Hunt.把钚给我们我们就不杀你的朋友Give us the plutonium and we won't kill your friend.别伊森别为了我这么做Don't you do it, Ethan! Not for me!我数到三I'm gonna count to three.一One.-二-路德- Two. - Luther...-对不起-三- I'm sorry. - Three.对不起我不知道还能怎么办I'm sorry. I didn't know what else to do.我不会放在心上的We're good.-你还好吗-我本该已经死了- You okay? - I should be dead.我们都该已经死了We should all be dead.为什么我们没有死Why aren't we?钚核呢Where's the plutonium?不在了It's gone.如果您刚刚打开电视If you're just joining us,三起大爆♥炸♥事件同时发生three massive explosions have gone off simultaneously突发新闻三起核武器袭击目前看来是联合恐怖袭击in what appears to be a coordinated attack.这是从罗马拍摄到的梵蒂冈的实时画面This image is live in Rome, looking toward the Vatican而这是我们的镜头能到达的最近距离了and is as close as our cameras can get.据消息称爆♥炸♥发生时It is believed that the Pope was in residence教皇正位于他的居所内at the time of the blast.这是从耶路撒冷城外拍摄到的城内的实时画面Also live, we're looking at Jerusalem from just outside the city.接下来是圣城麦加的实时画面Also live, the holy city of Mecca是停靠在沙特阿♥拉♥伯附近的红海上的from the USS Ronald Reagan in the Red Sea里根号♥航♥空♥母舰拍摄到的off the coast of Saudi Arabia.已经探测到了核辐射Radiation has been detected,意味着这些令人震惊的袭击indicating that nuclear weapons were used使用了核武器in these unspeakable attacks.-伊森时间到了-目前虽没有具体伤亡数字- Ethan, it's time. - No word on casualties yet,但我们可以预计but we can assume死亡人数将是灾难级的the death toll is catastrophic.初期报告显示制♥造♥袭击中使用的武器Early reports suggest the weapons used需要极其专业的知识would require highly specialized knowledge而只有极少数人具备这样的知识that very few people possess.现在的问题是谁会同时袭击这三座宗教圣城The question now is who would attack all three of these holy sites?以及为什么And why?三起袭击精确地发生在同一时刻The attacks occurred at precisely the same moment,就在一个多小时前just over an hour ago,东部时间凌晨4点at 4:00 a.m. Eastern Time.爆♥炸♥发生几分钟内Within minutes of the attack,国会紧急休会Congress ordered an emergency recess国会大厦被疏散and the Capitol Building was evacuated.总统乘坐空军一号♥离开了华盛顿The President left Washington on Air Force One.白宫宣布进入紧急状态The White House has declared a state of emergency,命令军队处于最高戒备placing the military on highest alert.能让我们单独待会儿吗谢谢Would you excuse us, please?德布朗克博士Dr. Delbruuk.我们知道你是谁We know who you are.我们看了宣言也找到了你的实验室We read the manifesto, we found your lab.机密"所有的和平"There has never been peace都需要伟大的牺牲"without first a great suffering.牺牲越大和平越久""The greater the suffering, the greater the peace."这能让他们团结起来知道吗See, this will unite them. Hmm?他们读到这份宣言的时候就会懂的When they read this manifesto, they'll all understand.永远都不会有人读到这份宣言Nobody's gonna read that manifesto, ever.我可以向你保证I can promise you that.今天是几号♥What day is it?我在这儿多久了How long have I been here?你记得的最后一件事是什么What's the last thing you remember?我在开车I was driving.有人撞了我Someone hit me.那是两周前了That was two weeks ago.-两周-两周- Two weeks? - Two weeks.这是你的是不是This is yours, isn't it?拉克就是用这个跟你联♥系♥的It's how Lark communicated with you.-拉克-约翰·拉克- Lark? - John Lark.-我们知道关于他的一切-你们什么都不知道- We know all about him. - You know nothing.这手♥机♥上有线索能帮我们找到他There's information in this phone that could lead us to him.而你知道密♥码♥And you have the passcode.你们觉得拉克是敌人是吗You think Lark is the enemy, hmm?但你们But you,无论你们是谁你们才是敌人well, whoever you are, you are the enemy.你们才是这个体制得以苟存的原因You're why the system survives.-劫难不断持续的原因-闭嘴- Why the suffering goes on. - Shut up!我们不在乎你我们只想抓到拉克We don't care about you. We want Lark.我们做个交易如何What if we make a deal?不没有交易路德No, there's no deal, Luther.出去一下Step outside.让我和这家伙待五分钟Give me five minutes with this guy.伊森我不能让你这么做我们不是这样的人Ethan, I can't let you do that. That's not who we are.或许我们该重新考虑这一点了Then maybe we need to reconsider that.如果他们在电视上宣读这份宣言呢What if they read the manifesto on the air?什么你能做到这个What? You can do that?我们打个电♥话♥就能做到We can do it with a phone call.如果他宣读了拉克的宣言...Well, if he reads Lark's manifesto...不行No.我就把密♥码♥给你I'll give you the passcode.伊森伊森Ethan! Ethan!想想伊森Think, Ethan.为了大局着想拜托Think of the greater good, please.没错只要你们这么做就行Yeah, you do that.长官Sir.不他不愿意合作No, he won't cooperate.是的长官除非我们宣读那份宣言Yes, sir. If we read the manifesto在直播中读on the air.我很抱歉长官I'm sorry, sir.贸易以及全球市场大幅下跌Trading and global markets plummeted.等等我刚收到消息Stand by. I'm told我们有一些额外的消息要报道we're about to get some additional information.我刚刚拿到了一份来自尼尔斯·德布朗克的文件I've just been handed a document from Nils Delbruuk,他是一位核武器专家a nuclear weapons specialist并声称自己是袭击中所使用的武器的制♥造♥者who claims to have built the weapons used in these attacks.我被要求完整朗读这份宣言I've been asked to read this manifesto in its entirety."所有的和平都需要伟大的牺牲"There has never been peace without first a great suffering."牺牲越大和平越久"The greater the suffering, the greater the peace."人类正在走上自毁之途"As mankind is drawn to his self-destruction"犹如飞蛾扑火般"like a moth to the candle,"那些所谓的和平捍卫者"the so-called defenders of peace,"教会政♥府♥ 法律"the church, the government, the law,"孜孜不倦地阻止人类自毁""work tirelessly to save humanity from itself."现在你们要这些也没用了It's not gonna help you now."但为了避免灾难"But by averting disaster,"他们选择推迟...""they serve to delay a peace..."木已成舟What's done is done."只有经过火的洗礼才能最终诞生的和平"...that can only come through an inevitable baptism of fire."我带给你们的灾难不是末日的开始"The suffering I bring you is not the beginning of the end."而是一个更好的互相理解的世界的开始""It is the beginning of a greater mutual understanding..."拿到了吗Did we get it?"这是迈向人类终极团结的第一步""It is the first step toward the ultimate brotherhood of man."拿到了We got it."我带给你们的灾难"The suffering I bring you"是通往终极和平的桥梁""is the bridge to ultimate peace."撤Go.拿到了吗Did we get it?当然拿到了Of course we got it.我就说我们会拿到的I told you we'd get it.我不明白I don't understand.袭击还没发生吗The attacks didn't happen?你是在一小时之前出的车祸The car accident you were in, that was an hour ago.撞你的那辆车就是我开的I was driving the other car.木是不是已经成了舟What's done is done,那得我们说了算when we say it's done.碟中谍6: 全面瓦解德国拉姆施泰因空军基地长官Sir.你解锁的那个手♥机♥让我们找到了一个冰岛的服务器That phone you unlocked led us to a server in Iceland我们成功解码了一份where we managed to decrypt a communique约翰·拉克和这个女人之间的公报between John Lark and this woman:阿♥拉♥娜·米索普利斯活动家以及慈善家Alana Mitsopolis, activist and philanthropist,她进行的慈善活动whose charity work让她得到了白寡妇的绰号♥has earned her the nickname the White Widow.这些都是为了掩护她真正的交易It's all a front for her real trade:武器贸易洗钱arms dealing, money laundering.广泛的政♥府♥关系也为她提供了保护Extensive political connections provide her with protection.拉克和寡妇今晚要碰面Lark and the Widow are meeting tonight来协商关于某个未知包裹的交付问题to negotiate delivery of an unspecified package,我们只能假设这个包裹是我们丢失的钚核which we can only assume is our missing plutonium.他们会在巴黎大皇宫的私人会所碰头They'll make contact in a private lounge at the Grand Palais in Paris她会在那里举办她的年度筹款活动during her annual fundraising event.细节全在文件里The details are in the file.如果拉克在午夜12点还没有出现If Lark isn't there by midnight,白寡妇就会离开the Widow will leave并且把包裹出♥售♥给出价最高者and sell the package to the highest bidder.你还剩两小时来找到拉克Which gives you two hours from now to find Lark.长官我想有些事情你需要知道Sir, I think there's something you need to know.-我... -我必须马上打断你- I... - I'm gonna stop you right there你在柏林时面临的是艰难的选择You had a terrible choice to make in Berlin:是保住钚核还是去救你的队员Recover the plutonium or save your team.你选择了队员现在整个世界都陷入了危机You chose your team, and now the world is at risk.你自身本质的某些缺陷Some flaw deep in your core being让你无法在一条命和数百万条生命之间抉择simply won't allow you to choose between one life and millions.你认为这是你的弱点You see that as a sign of weakness.但对我而言这正是你最强大的力量To me, that's your greatest strength.这也说明有朝一日我可以指望你来救我的命It also tells me I can count on you to cover my ass.因为虽然从中情局调来这里是平级调动Because coming over here from the CIA was a lateral move,也有人说是降职了some say a step down.但我还是到这里来了But I did it因为你because of you.别让我后悔Don't make me regret it.打电♥话♥Make the call.Shut 'em down.你以为你在干什么艾瑞卡What do you think you're doing, Erika?这个任务可能是你的It may be your mission,但这架飞机是中情局的but this is the CIA's plane.没我的允许它就不能起飞It doesn't take off without my say-so.我没时间跟你争We don't have time for this.我在巴黎的小队已经准备好了I have a team in Paris ready to grab Lark拉克一离开大楼我们就会抓住他as soon as he leaves the building.一架G5飞机会把他引渡到关塔那摩监狱A G5 standing by to rendition him to Gitmo,我们会在那里拷问他where a waterboard is waiting.花上无谓的24小时来问出一份我们无法相信的口供Spend 24 hours we don't have to pull a confession we can't trust 供述者还连身份都不能确定我不认同这方案from a man we haven't positively identified? No.我们需要可靠的情报现在就要We need reliable intelligence, and we need it now.IMF的存在就是为了处理这种情况This scenario is precisely why the IMF exists!IMF就是万圣节闹剧艾伦The IMF is Halloween, Alan.一群成年人戴着面具在玩不给糖就捣蛋A bunch of grown men in rubber masks playing trick-or-treat.如果他在柏林时能保住钚核And if he had held on to the plutonium in Berlin,我们也不用在这里争了we wouldn't be having this conversation.但那样他的队员就会死And his team would be dead.确实他们会死Yes. They would.那就是职责所在That's the job.正因此我才希望现场有一个我的人And that's why I want one of my own men on the sceneto appraise the situation.沃克特工来自特别行动组Agent Walker, Special Activities.他的名声我早有耳闻His reputation precedes.你习惯用手术刀You use a scalpel.我更喜欢用锤子I prefer a hammer.我不同意The answer is no.我有直接来自总统的行动授权I have operational authority here, direct from the President.你要是有异议就自己去找他You have a problem with that, you take it up with him.我已经找过了他也同意了I have already, and he agrees with me.要么我的人跟着去要么谁都别想去My man goes or no one goes.绝不能让任何人阻止你拿到钚核No one comes between you and that plutonium.亨特不能他的队员不能任何人都不能Not Hunt, not his team, not anyone.白寡妇在政♥府♥各层都有眼线The White Widow has spies at every level of government.这架飞机伪装成了商用客机This plane is posing as a commercial airliner这样我们就能跳伞进入法国境内而不被发现so we can jump into France undetected.她和拉克会于午夜12点在贵宾厅见面The Widow's meeting Lark in the VIP lounge at midnight.没有预先发放的电子手环任何人都不能进去No one will be admitted without a pre-issued electronic I.D. band.我们已经拿到了拉克手环上的射频识别码We have acquired the unique RFID number for Lark's band,这样我们就可以定位他allowing us to locate it用这些with these.找到那个手环就找到了拉克Find that I.D. band, you find Lark.然后呢Then what?然后...Then...我借用他的身份来与白寡妇联♥系♥I assume his identity and make contact with the Widow.让她领着我们找到包裹She takes us to the package.真的有人信你这烂招吗People actually fall for this shit?你准备怎么让拉克合作How do you intend to make Lark cooperate?我在人群中撞他一下I bump him in the crowd.不出十秒他就会跟派对上的其他醉汉一样In ten seconds he'll look like any other drunk at the party,语无伦次毫无还手之力incoherent and completely pliable.我装成他的样子之后After I borrow his face,你就带他走出前门you walk him out the front door把他交给斯隆的撤离小队and hand him to Sloane's extraction team.你可别想这么轻易就甩掉我亨特You're not getting rid of me that easily, Hunt.我这么做不是为了甩掉你That's not what this is about.当然就是Sure it is.我知道你不想让我插手这次的行动I know you don't want me on this detail.但我们还是面对现实吧But let's face it:如果你在柏林能狠一狠心If you'd made the hard choice in Berlin,我就不会在这里了I wouldn't be here.如果你没有击毙And if you hadn't gunned down他们派你去追查的每一个辛迪加特工every Syndicate agent they sent you to find,我也不用出现在这里了I wouldn't be here.没错我知道关于你的一切That's right, I know all about you.就是因为你我们才没有活着的证人You're why we don't have a living witness能来指认约翰·拉克或者使徒who can identify John Lark or the Apostles.如果你对我的方法有意见If you have a problem with my methods,你可以一直留在后方you can always stay behind."你的任务由你来决定是否接受""Your mission, should you choose to accept it."是这么说的吧Isn't that the thing?两分钟之后开始减压Two minutes to decompression.穿上装备白寡妇半小时后就要跟拉克会面了Suit up. The Widow is meeting Lark in 30 minutes.十秒钟之后开始减压Ten seconds to decompression.你的氧气开了吗Is your oxygen on?这个海拔高度大气稀薄There is no atmosphere at this altitude.我可不希望你晕过去I don't need you blacking out on me.你头盔上的屏幕有内置的导航系统Your heads-up display has a built-in guidance system.跟着它降落到目的地Follow it to the target.系统告诉你开伞时你再开Open your chute when the system says,不许早也不许晚not before and definitely not after,否则最后经过你大脑的or the last thing that goes through your mind就是你的膝盖骨明白了吗will be your kneecaps. Is that clear?明白Crystal.我们需要谈谈需要重新制定计划We got to talk. We need to rethink this.别挡路亨特Out of my way, Hunt.沃克现在有问题Walker, we've got a problem.外面风暴肆虐我们需要...There's a storm. We need to...别说了Enough talk.巴黎见I'll see you in Paris.拜托拜托拜托Come on, come on, come on.海拔25000英尺Altitude: 25,000 feet.沃克Walker?怎么了亨特这点闪电就让你怕了吗What's the matter, Hunt? You afraid of a little lightning?海拔20000英尺Altitude: 20,000 feet.该死的Son of a bitch.沃克Walker?你听得到吗Do you copy?沃克Walker?沃克Walker.拜托Come on.海拔15000英尺Altitude: 15,000 feet.沃克Walker.沃克Walker!沃克Walker!沃克Walker!海拔1♥0♥0♥0♥0♥英尺Altitude: 10,000 feet.9000英尺9,000.见鬼Oh, shit.8000英尺8,000.7000英尺7,000.6000英尺6,000.5000英尺5,000.4000英尺4,000.沃克Walker!沃克Walker!3000英尺3,000.开伞开伞开伞Deploy. Deploy. Deploy.开伞开伞Deploy. Deploy.天呐Oh, God.看来你氧气断了啊Looks like you lost your oxygen.白寡妇和拉克就在那里碰头That's where the Widow is meeting Lark.伊森Ethan.-沃克-伊森如果你能听见我说话- Walker. - Ethan, if you can hear me,我找到他了I've got him.再说一遍哪里Say again. Where?他朝洗手间去了He's headed for the bathroom.-针剂在哪-不需要了- Where's the needle? - Didn't need it.把他抬起来Get him up.别害羞嘛人多更好玩开门嘛我们没有恶意的-我们能加入你们吗-我们不会咬人的该死Shit.-你还能做面具吗-我至少得有张脸啊- Can you still make a mask? - I need a face to make a mask.抱歉我本来瞄准的是他的胸口Sorry. I was aiming for his chest.-你在这里干什么-我也很高兴再见到你- What are you doing here? - It's good to see you, too.抱歉我糊涂了你是...I'm sorry, I'm confused. You are...一位老朋友An old friend.取消撤离小队目标已死亡Cancel extraction. We're code blue.派清理人员来Send sanitation.北侧男洗手间North men's room.你没有回答我的问题你在这里干什么You didn't answer my question. What are you doing here?就这样放轻松就是这样That's it. Just take it easy. That's it.保持抬头的姿势直到停止出血为止Just keep your head back until the bleeding stops.有问题吗What is it? Eh?你们也想试试吗你在这里不是巧合谁派你来的You're not here by accident. Who sent you?我不能告诉你I can't tell you that.你要干什么What are you doing?我和那个白寡妇有个约会I have a date with the White Widow.是他和那个寡妇有个约会而你长得一点也不像他He had a date with the Widow. You look nothing like him.现在我们只能希望他们从未见过面了And now we have to hope they never met.-希望可不是什么策略-你一定是新来的- Hope is not a strategy! - Oh, you must be new.我别无选择I have no other choice.白寡妇是我们唯一的线索The White Widow's our only lead.我必须假扮成这家伙5分钟I got to be this guy for five minutes.-不要这么做-什么- Don't do it. - What?到底怎么了你向我隐瞒了什么What is it? What aren't you telling me?你并不清楚你被卷入了什么麻烦You don't understand what you're involved in.我不清楚我被卷入了什么I don't understand what I'm involved in.我不清楚我被卷入了什么I don't understand what I'm involved in?我到底被卷入了什么What am I involved in?如果你要和寡妇见面她3分钟后就走了If you're meeting the Widow, she leaves in three minutes. -伊森-我会搞定的- Ethan! - I'll make it work.-伊森-我会搞定的- Ethan! - I'll make it work.我叫沃克The name's Walker.是吗不用谢Yeah? You're welcome.你以为你在干什么What do you think you're doing?-我和你一起去-不行- I'm going with you. - Like hell you are.有一些人被派来杀拉克People have been sent here to kill Lark.可不是嘛No shit.不不是我是那些合约杀手和雇佣杀手No, not me. Contractors. Paid assassins.他们不知道他长什么样They don't know what he looks like,他们只知道他半夜要和寡妇见面they only know he's meeting the Widow at midnight.如果你这么做If you go through with this,他们会认为你就是拉克they're gonna believe you're Lark然后杀了你and they're gonna kill you.。
Blackstone Irregulars是一队跨越整个Ferelden的雇佣军。
你可以在一个不同的支线中完成的最重要的主体。
你可以在具体地区接受很多的支线任务。
A Change in Leadership起始:任何Blackstone Irregulars box(完成全部其他Blackstone Irregulars任务)过程:你必须在Denerim市场区杀死Raelnor或Taoran。
然后你将会在地图行走的时候遇到Taoran营地的随机事件,然后干掉Taoran。
Dereliction of Duty起始:任何Blackstone Irregulars boxes获取过程:你的任务是“处理”掉三个逃兵,拿回军需品。
追查这三个家伙,然后干掉他们及其保镖。
一定要找回尸体的每个军需品。
你收集了这3个军需品,回去就会有奖励。
Sammael 在Lake Calenhad Docks ,Layson在Denerim 内部的Run-down Back Street ,Tornas在Frostback Mountains 。
Grease the Wheels起始:Redcliffe Village 的Blackstone Irregulars box过程:提供通知5个在Denerim信使,位置:Market District (东面)Dark Alley (北端)AlienageThe Pearl (大厅)Rundown Back Street (东面)Notices of Death起始:Denerim市场区Gnawed Noble Tavern 的Blackstone Irregulars box过程:你带出4个死亡通知给下面4位仁兄。
Irenia是在Redcliffe 教堂Larana是在Lake Calenhad Docks 的Spoiled PrincessSara(靠近入口处Denerim市场区)Tania在Dirty Back Alley @ DenerimRestocking the Guild起始:Denerim市场区Gnawed Noble Tavern 的Blackstone Irregulars box过程:收集20个Health Poultices (less也行哦)Scraping the Barrel起始:任何Blackstone Irregulars boxes过程:送信给3个人Dernal Garrison 在Redcliffe的军营Patter Gritch 在Lothering ChantryVarel Baern在Denerim的桥Cammen’s Lament起始:在Dalish Camp 和Cammen说话过程:Cammen想泡女精灵Gheyna。
第一关An Old Friend任务简报:根据指示,熟习操纵John Cooper的方法。
出场人物:John Cooper1.跟随马贼,爬行穿过栏杆(按C键),再爬上屋顶,可见马贼在马顶等候。
2.拔枪(按G键),向着对面的花瓶开枪,打破花瓶后再按G键上子弹。
3.跟随马贼到擂台,上台一拳挥倒巨汉(按H键)。
4.跟随马贼到飞刀比赛场地,站在线后,将刀飞向标耙(按K键)。
到标耙前拔回刀子,用刀子割断旁边吊着奖品的绳子(按J键)5.被马贼打晕,拾起音乐腕表,将音乐腕表放在X处(按L键),知道音乐腕表作吸引敌人用,拾起音乐腕表。
6.到山脚下,用音乐腕表吸引马贼下来,躲在树后,待马贼下来后将他一拳击倒。
要小心不要被马贼发现John的存在,按Alt可知他的视野。
7.拾起马鞍,将马鞍放在马背上,然后骑马离去。
第二关Southern Comfort任务简报:救出Sam Williams。
出场人物:John Cooper、Sam Williams1.静静地走到敌人背后,用小刀将他杀死。
紧记将他搬到屋内,以免被敌人发现。
2.留意这个敌人的巡逻路线,可在屋子的转角位用小刀杀他或绕到他背后使用飞刀。
3.杀这四个敌人的方法与2一样,但要小心不要被其他敌人发现尸体。
万一被敌人发现尸体,可立即躲进屋内,待敌人松懈下来(敌人视野由红色变成绿色)后再出击。
4.躲进稻田内,在稻田内爬行可避过敌人的视线。
去惊动稻草人上的乌鸦,引来一大批敌人,但敌人不会发现在稻田内爬行的John,此时可用手枪一一将敌人干掉,再到稻田的左下角开枪,又引来一批敌人,可将之清除。
5.绕过屋后到左边的稻田,在稻田中伏下,然后开枪,可引来另一批敌人,再一一用枪将他们击毙吧。
6.此时上半部分的敌人应该都已经清除。
进入大屋的后门,到大屋的楼上。
在二楼露台开枪杀死屋下的两个敌人。
7.回到起点,抬起晕倒的Sam,到左下方的马房将Sam弄醒。
8.派John到出口附近,可见电话亭内有一名敌人,用枪声引他出来后再将他击毙。
34 NA • iEEE SpEctrum • mAy 2008J a m e s a r c h e r /a n a t o m y B l u eL ast September, Israeli jetsbombed a suspected nuclearinstallation in northeastern Syria.Among the many mysteries stillsurrounding that strike was the failure of a Syrian radar—supposedly state-of-the-art—to warn the Syrian mili-tary of the incoming assault. It wasn’t long before military and technology bloggers concluded that this was an incident of elec-tronic warfare—and not just any kind.Post after post speculated that the commercial off-the-shelf microproces-sors in the Syrian radar might have been purposely fabricated with a hid-den “backdoor” inside. By sending a preprogrammed code to those chips, an unknown antagonist had disrupted the chips’ function and temporarily blocked the radar.That same basic scenario is cropping upmore frequently lately, and not just in theMiddle East, where conspiracy theoriesabound. According to a U.S. defense con-tractor who spoke on condition of anony-mity, a “European chip maker” recentlybuilt into its microprocessors a kill switchthat could be accessed remotely. Frenchdefense contractors have used the chipsin military equipment, the contractor toldIEEE Spectrum. If in the future the equip-ment fell into hostile hands, “the Frenchwanted a way to disable that circuit,” hesaid. Spectrum could not confirm thisaccount independently, but spirited dis-cussion about it among researchers andanother defense contractor last summerat a military research conference revealsa lot about the fever dreams plaguing theU.S. Department of Defense (DOD).Feeding those dreams is the Pentagon’srealization that it no longer controls whomanufactures the components that go intoits increasingly complex systems. A singleplane like the DOD’s next generation F-35Joint Strike Fighter, can contain an “insanenumber” of chips, says one semiconduc-tor expert familiar with that aircraft’sdesign. Estimates from other sources putthe total at several hundred to more thana thousand. And tracing a part back to itssource is not always straightforward. Thedwindling of domestic chip and electron-ics manufacturing in the United States,combined with the phenomenal growth ofsuppliers in countries like China, has onlydeepened the U.S. military’s concern.Recognizing this enormous vulner-ability, the DOD recently launched itsmost ambitious program yet to verifythe hunt fort he KiLL S wit chAre chip mAkers building electronic trApdoors inkey militAry hArdwAre? the pentAgon is mAking itsbiggest effort yet to find out By sally adeemAy 2008 • iEEE SpEctrum • NA 35 36 NA • iEEE SpEctrum • mAy 2008Fakelegitimate one. …& Bake to a scant 6 months.add or reconnect Wiring during the layout process, new circuit traces and wiring can be added to the circuit. A skilled engineer familiar with the chip’s blueprints could reconnect the wires that connect transistors, adding gates and hooking them up using a process called circuit editing.nick the WireA notch in a few interconnects would be almost impossible to detect but would causeeventual mechanical failure as the wire became overloaded.add extra transistors hidden code that shuts off all or part of the chip.At eAch step of the hardware design process, a saboteur could make a particu-lar part of the circuit fail. A typical microprocessor can have up to eight layers, and any layer on a microchip can be targeted. illustration: emil y cooperthe integrity of the electronics that will underpin future additions to its arse-nal. In December, the Defense Advanced Research Projects Agency (DARPA), the Pentagon’s R&D wing, released details about a three-year initiative it calls the Trust in Integrated Circuits program. The findings from the program could give the military—and defense contrac-tors who make sensitive microelectronics like the weapons systems for the F-35—a guaranteed method of determining whether their chips have been compro-mised. In January, the Trust program started its prequalifying rounds by send-ing to three contractors four identical ver-sions of a chip that contained unspecified malicious circuitry. The teams have until the end of this month to ferret out as many of the devious insertions as they can. Vetting a chip with a hidden agenda can’t be all that tough, right? Wrong. Although commercial chip makers rou-tinely and exhaustively test chips with hundreds of millions of logic gates, they can’t afford to inspect everything. So instead they focus on how well the chip performs specific functions. For a micro-processor destined for use in a cellphone, for instance, the chip maker will check to see whether all the phone’s various func-tions work. Any extraneous circuitry that doesn’t interfere with the chip’s normal functions won’t show up in these tests.“You don’t check for the infinite pos-sible things that are not specified,” says electrical engineering professor Ruby Lee, a cryptography expert at Princeton. “You could check the obvious possibili-ties, but can you test for every unspeci-fied function?” Nor can chip makers afford to test every chip. From a batch of thousands, technicians select a single chip for physi-cal inspection, assuming that the manu-facturing process has yielded essentially identical devices. They then laboriously grind away a thin layer of the chip, put the chip into a scanning electron microscope, and then take a picture of it, repeating the process until every layer of the chip has been imaged. Even here, spotting a tiny discrepancy amid a chip’s many layers and millions or billions of transistors is a fantastically difficult task, and the chip is destroyed in the process.But the military can’t really work that way. For ICs destined for mission-critical systems, you’d ideally want to test every chip without destroying it.The upshot is that the Trust program’s challenge is enormous. “We can all do with more verification,” says Samsung’s Victoria Coleman, who helped create the Cyber Trust initiative to secure con-gressional support for cybersecurity. “My advice to [DARPA director] Tony Tether was ‘trust but verify.’ That’s all you can do.”recipe for disAsterS emiconductor offshoring dates back to the 1960s, when U.S.chip makers began moving the labor-intensive assembly and testing stages to Singapore, Taiwan, and other countries with educated workforces and relatively inexpensive labor.Today only Intel and a few other com-panies still design and manufacture all their own chips in their own fabrication plants. Other chip designers—including LSI Corp. and most recently Sony—have gone “fabless,” outsourcing their manu-facturing to offshore facilities known as foundries. In doing so, they avoid the huge expense of building a state-of-the-art fab, which in 2007 cost as much as US $2 billion to $4 billion.Well into the 1970s, the U.S. military’s status as one of the largest consumers of integrated circuits gave it some control over the industry’s production and manufac-turing, so the offshoring trend didn’t pose a big problem. The Pentagon could always find a domestic fab and pay a little more to make highly classified and mission-critical chips. The DOD also maintained its own chip-making plant at Fort Meade, near Washington, D.C., until the early 1980s, when costs became prohibitive.But these days, the U.S. military con-sumes only about 1 percent of the world’s integrated circuits. “Now,” says Coleman, “all they can do is buy stuff.” Nearly every military system today contains some com-mercial hardware. It’s a pretty sure bet that the National Security Agency doesn’t fabricate its encryption chips in China. But no entity, no matter how well funded, can afford to manufacture its own safe version of every chip in every piece of equipment.The Pentagon is now caught in a bind. It likes the cheap, cutting-edge devices emerging from commercial foundries and the regular leaps in IC performance the commercial sector is known for. But with those improvements comes the poten-tial for sabotage. “The economy is global-ized, but defense is not globalized,” says Coleman. “How do you reconcile the two?”In 2004, the Defense Department cre-ated the Trusted Foundries Program to try to ensure an unbroken supply of secure microchips for the government. DOD inspectors have now certified cer-tain commercial chip plants, such as IBM’s Burlington, Vt., facility, as trusted foundries. These plants are then con-tracted to supply a set number of chips to the Pentagon each year. But Coleman argues that the program blesses a process, not a product. And, she says, the DefenseDepartment’s assumption that onshoreassembly is more secure than offshorereveals a blind spot. “Why can’t peopleput something bad into the chips maderight here?” she says.Three years ago, the prestigiousDefense Science Board, which advises theDOD on science and technology develop-ments, warned in a report that the con-tinuing shift to overseas chip fabricationwould expose the Pentagon’s most mission-critical integrated circuits to sabotage. Theboard was especially alarmed that noexisting tests could detect such compro-mised chips, which led to the formation ofthe DARPA Trust in IC program.Where might such an attack originate?U.S. officials invariably mention Chinaand Russia. Kenneth Flamm, a technologyexpert at the Pentagon during the Clintonadministration who is now a professor atthe University of Texas at Austin, wouldn’tget that specific but did offer some clues.Each year, secure government computernetworks weather thousands of attacksover the Internet. “Some of that prob-ing has come from places where a lot ofour electronics are being manufactured,”Flamm says. “And if you’re a responsibledefense person, you would be stupid notto look at some of the stuff they’re assem-bling, to see how else they might try toenter the network.”John Randall, a semiconductor expertat Zyvex Corp., in Richardson, Texas,elaborates that any malefactor who canpenetrate government security can findout what chips are being ordered by theDefense Department and then targetthem for sabotage. “If they can access thechip designs and add the modifications,”Randall says, “then the chips could bemanufactured correctly anywhere andstill contain the unwanted circuitry.”S o what’s the best way to kill achip? No one agrees on the most likelyscenario, and in fact, there seem to beas many potential avenues of attack as thereare people working on the problem. But thethreats most often mentioned fall into twocategories: a kill switch or a backdoor.A kill switch is any manipulation of thechip’s software or hardware that wouldcause the chip to die outright—to shut offan F-35’s missile-launching electronics, forexample. A backdoor, by contrast, lets out-siders gain access to the system throughcode or hardware to disable or enable aspecific function. Because this methodworks without shutting down the wholechip, users remain unaware of the intru-sion. An enemy could use it to bypassbattlefield radio encryption, for instance.Depending on the adversary’s degree ofsophistication, a kill switch might be con-trolled to go off at a set time, under certaincircumstances, or at random. As an exam-ple of the latter, Stanford electrical engi-neering professor Fabian Pease muses, “I’dnick the [chip’s] copper wiring.” The fault,almost impossible to detect, would makethe chip fail early, due to electromigration:as current flowed through the wire, even-tually the metal atoms would migrate andform voids, and the wire would break. “Ifthe chip goes into a defense satellite, whereit’s supposed to work for 15 years but failsafter six months, you have a very expen-sive, inoperative satellite,” Pease says.But other experts counter that suchideas ignore economic realities. “First andforemost, [the foundries] want to makesure their chips work,” says Coleman. “Ifa company develops a reputation for mak-ing chips that fail early, that company suf-fers more than anyone else.”A kill switch built to be triggered atwill, as was allegedly incorporated intothe European microprocessors, would bemore difficult and expensive to pull off, butit’s also the more likely threat, says DavidAdler, a consulting professor of electricalengineering at Stanford, who was previ-ously funded by DARPA to develop chip-testing hardware in an unrelated project.To create a controlled kill switch, you’dneed to add extra logic to a microprocessor,which you could do either during manufac-turing or during the chip’s design phase. Asaboteur could substitute one of the masksused to imprint the pattern of wires andtransistors onto the semiconductor wafer,Adler suggests, so that the pattern for justone microchip is different from the rest.“You’re printing pictures from a negative,”he says. “If you change the mask, you canadd extra transistors.”Or the extra circuits could be added tothe design itself. Chip circuitry these daystends to be created in software modules,which can come from anywhere, notesDean Collins, deputy director of DARPA’sMicrosystems Technology Office and pro-gram manager for the Trust in IC initia-tive. Programmers “browse many sourceson the Internet for a component,” he says.“They’ll find a good one made by some-body in Romania, and they’ll put that intheir design.” Up to two dozen differentsoftware tools may be used to design thechip, and the origin of that software is notalways clear, he adds. “That creates twodozen entry points for malicious code.”mAy 2008 • iEEE SpEctrum • NA 37Collins notes that many defense contrac-tors rely heavily on field-programmable gate arrays (FPGAs)—a kind of generic chip that can be customized through soft-ware. While a ready-made FPGA can be bought for $500, an application-specific IC, or ASIC, can cost anywhere from $4 million to $50 million. “If you make a mistake on an FPGA, hey, you just repro-gram it,” says Collins. “That’s the good news. The bad news is that if you put the FPGA in a military system, someone else can reprogram it.”Almost all FPGAs are now made at foundries outside the United States, about 80 percent of them in Taiwan. Defense contractors have no good way of guaran-teeing that these economical chips haven’t been tampered with. Building a kill switch into an FPGA could mean embed-ding as few as 1000 transistors within its many hundreds of millions. “You could do a lot of very interesting things with those extra transistors,” Collins says.The rogue additions would be nearly impossible to spot. Say those 1000 tran-sistors are programmed to respond to a specific 512-bit sequence of numbers. To discover the code using software testing, you might have to cycle through every possible numerical combination of 512-bit sequences. That’s 13.4 × 10153 combinations. (For perspective, the universe has existed for about 4 × 1017 seconds.) And that’s just for the 512-bit number—the actual number of bits in the code would almost certainly be unknown. So you’d have to apply the same calculations to all possible 1024-bit numbers, and maybe even 2048-bit num-bers, says Tim Holman, a research asso-ciate professor of electrical engineering at Vanderbilt University, in Nashville. “There just isn’t enough time in the universe.”Those extra transistors could create a kill switch or a backdoor in any chip, not just an FPGA. Holman sketches a possi-ble scenario: suppose those added transis-tors find their way into a networking chip used in the routers connecting the comput-ers in your home, your workplace, banks, and military bases with the Internet. The chip functions perfectly until it receives that 512-bit sequence, which could be transmitted from anywhere in the world. The sequence prompts the router to hang up. Thinking it was the usual kind of bug, tech support would reset the router, but on restart the chip would again immediately hang up, preventing the router from con-necting to the outside world. Meanwhile, the same thing would be happening to sim-ilarly configured routers the world over.The router scenario also illustratesthat the nation’s security and economicwell-being depend on shoring up not justmilitary chips but also commercial chips.An adversary who succeeded in embed-ding a kill switch in every commercialrouter could devastate national secu-rity without ever targeting the DefenseDepartment directly.A kill switch or backdoor built into anencryption chip could have even moredisastrous consequences. Today encod-ing and decoding classified messages isdone completely by integrated circuit—no more Enigma machine with its leversand wheels. Most advanced encryptionschemes rely on the difficulty that com-puters have in factoring numbers con-taining hundreds of digits; discoveringa 512-bit type of encryption would takesome machines up to 149 million years.Encryption that uses the same code orkey to encrypt and decrypt information—as is often true—could easily be com-promised by a kill switch or a backdoor.No matter what precautions are takenat the programming level to safeguardthat key, one extra block of transistorscould undo any amount of cryptography,says John East, CEO of Actel Corp., inMountain View, Calif., which suppliesmilitary FPGAs.“Let’s say I can make changes to aninsecure FPGA’s hardware,” says East.“I could easily put a little timer into thecircuit. The timer could be programmedwith a single command: ‘Three weeksafter you get your configuration, forgetit.’ If the FPGA were to forget its configu-ration information, the entire securitymechanism would be disabled.”Alternately, a kill switch might be pro-grammed to simply shut down encryptionchips in military radios; instead of scram-bling the signals they transmit, the radioswould send their messages in the clear, foranybody to pick up. “Just like we figuredout how the Enigma machine worked inWorld War II,” says Stanford’s Adler, “oneof our adversaries could in principle figureout how our electronic Enigma machineswork and use that information to decodeour classified communications.”Chip alteration can even be done afterthe device has been manufactured andpackaged, provided the design data areavailable, notes Chad Rue, an engineerwith FEI, based in Hillsboro, Ore., whichmakes specialized equipment for chipediting (albeit for legitimate reasons).FEI’s circuit-editing tools have beenaround for 20 years, Rue says, and yet“chip designers are still surprised whenthey hear what they can do.”Skilled circuit editing requires electri-cal engineering know-how, the blueprintsof the chip, and a $2 million refrigerator-size piece of equipment called a focused-ion-beam etching machine, or FIB. A FIBshoots a stream of ions at precise areason the chip, mechanically milling awaytiny amounts of material. FIB lab work-ers refer to the process as microsurgery,with the beam acting like a tiny scalpel.“You can remove material, cut a metalline, and make new connections,” saysRue. The process can take from hoursto several days. But the results can beastonishing: a knowledgeable techniciancan edit the chip’s design just as easily asif he were taking “an eraser and a pencilto it,” says Adler.Semiconductor companies typicallydo circuit editing when they’re designingand debugging prototypes. Designers canmake changes to any level of the chip’swiring, not just the top. “It’s not uncom-mon to dig through eight different lay-ers to get to the intended target,” says Rue.The only thing you can’t do with a FIB isadd extra transistors. “But we can reroutesignals to the transistors that are alreadythere,” he says. That’s significant becausechips commonly contain large blocks ofunused circuitry, leftovers from previousversions of the design. “They’re just alongfor the ride,” Rue says. He thinks it wouldbe possible to use a FIB to rewire a chipto make use of these latent structures. Todo so, an adversary would need a tremen-dous amount of skill with digital circuitryand access to the original design data.Some experts find the idea too impracti-cal to worry about. But an adversary withunlimited funds and time—exactly whatthe Defense Science Board warned of—could potentially pull it off, Rue says.In short, the potential for tinkeringwith an integrated circuit is almost lim-itless, notes Princeton’s Lee. “The hard-ware design process has many steps,”she says. “At each step, you could dosomething that would make a particu-lar part of the IC fail.”c learly, the companies partici-pating in the Trust in IC programhave their work cut out for them.As Collins sees it, the result has to be acompletely new chip-verification method.He’s divided up the Trust participants intoteams: one group to create the test chipsfrom scratch; another to come up with mali-cious insertions; three more groups, which38 NA • iEEE SpEctrum • mAy he calls “performers,” to actually hunt for the errant circuits; and a final group to judge the results.To fabricate the test chips, Collins chose the Information Sci-ences Institute at the University of Southern California, Los Angeles. He picked MIT’s Lincoln Laboratory to engineer what-ever sneaky insertions they could devise, and he tapped Johns Hopkins University Applied Phy-sics Laboratory, in Laurel, Md., to come up with a way to compare and assess the performers’ results.The three performers are Raytheon, Luna Innovations, and Xradia. None of the teams would speak on the record, but their spe-cialties offer some clues to their approach. Xradia, in Concord, Calif., builds nondestructive X-ray microscopes used widely in the semiconductor industry, so it may be looking at a new method of inspecting chips based on soft X-ray tomography, Stanford’s Pease suggests. Soft X-rays are powerful enough to penetrate the chip but not strong enough to do irreversible damage.Luna Innovations, in Roanoke, Va., specializes in creating anti-tamper features for FPGAs. Prince-ton’s Lee suggests that Luna’s approach may involve narrow-ing down the number of possi-ble unspecified functions. “There are ways to determine where such hardware would be inserted,” she says. “Where could they gather the most information? Where would they be least likely to be noticed? That is what they’re looking for.” She compares chip security to a barricaded home. The front door and windows might offer vault-like protection, but there might be an unknown window in the base-ment. The Luna researchers, she speculates, may be looking for the on-chip equivalent of the base-ment window.Raytheon, of Waltham, Mass., has expertise in hardware and logic testing, says Collins. He believes the company will use a more com-plex version of a technique called Boolean equivalence checking to analyze what types of inputs will generate certain outputs. Normally, applying specific inputs to a cir-cuit will result in specific, predict-able outputs, just as hitting a lightswitch should always cause thelight to turn off. “Now look at thatprocess in reverse,” says Collins.Given a certain output (the lightsgo out), engineers can reconstructwhat made it happen (someone hita switch). Collins says this couldhelp avoid cycling through infinitecombinations of inputs to find a sin-gle fatal response.In January, the performerswere given a set of four test chips,each containing an unknown (tothem) number of malicious inser-tions. Along with a thoroughdescription of the chips, Collinssays, “we told them precisely whatthe circuits were supposed to be.”Each team’s success will begauged by the number of maliciousinsertions it can spot. The goal isa 90 percent detection rate, saysCollins, with a minimum of falsepositives. The teams will also haveto contend with red herrings: to tripthem up, the test set includes fullyfunctioning, uncompromised chips.By the end of this month, the per-formers will report back to DARPA.After Johns Hopkins has tallied theresults, the teams will get a secondset of test chips, which they’ll haveto analyze by the end of the year.Any performer that doesn’t passmuster will be cut from the pro-gram, while the methods developedby the successful ones will be devel-oped further. By the program’s endin 2010, Collins hopes to have ascientifically verifiable method tocategorically authenticate a circuit.“There’s not going to be a DARPAseal of approval on them,” saysCollins, but both the Army and theAir Force have already expressedinterest in adopting whatever tech-nology emerges.Meanwhile, other countriesappear to be awakening to the chipthreat. At a January hearing, aU.S. House Committee on ForeignAffairs addressed Pakistan’songoing refusal to let the UnitedStates help it secure its nucleararsenal with American technol-ogy. Pakistan remains reluctant toallow such intervention, citing fearsthat the United States would use theopportunity to cripple its weaponswith—what else?—a kill switch. od ArpA’s progrAm has formed teams to test chipintegrity. usc’s group creates the chips, which mit’sgroup then compromises with unknown additions.the “performers,” Xradia, luna innovations, and raytheon,are supposed to find the malicious alterations. And theJohns hopkins group judges the results. the program’sthree phases get progressively harder, with the number ofinsertions increasing and the testing time decreasing.ScAvENgEr huNtistockphoto (6)TO PROBE FURTHER For a comprehensive look intothe failure of the Syrian radar, see “Cyber-Combat’sFirst Shot,” Aviation Week & Space Technology,26 November 2007 by David A. Fulghum, Robert Wall,and Amy Butler. For more on the DARPA program andon the kill-switch debate, go to /may08/chiptrust.Metrics teaMJohns Hopkins Applied Physics Labdevelops ways to measure success.PERFORMERXradia studiesX-ray analysis.PERFORMERRaytheonstudies designprocess,ASICs, and FPGAs.PERFORMERLuna Innovationsstudies FPGAs.test-article teaMUSC Information Sciences Institutecreates test chips.red teaMMIT Lincoln Labsinserts malicious circuits.mAy 2008 • iEEE SpEctrum • NA 39 。