Editing Article Page
Title
Content
<div id='article-page'><div id='article-content' data-media-url='//news-app-staging.s3.amazonaws.com' data-base-url='//news-app-staging.herokuapp.com' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/pub.wav' data-capture-url='//staging.analytics.lingraphica.com/events/capture_news' data-article-title='Public Might Not Know about Attacks on US Election Systems' data-article-id='4233'><script src='//news-app-staging.herokuapp.com/javascripts/getscripts.js'></script><link rel='stylesheet' href='//news-app-staging.herokuapp.com/stylesheets/article.css' type='text/css' /><div class='article'><p><span data-start-time='0' data-end-time='9625'>It is no secret that foreign computer hackers are targeting election systems in the United States.</span> <span data-start-time='9625' data-end-time='24750'>Government officials believe Russian agents searched for weaknesses in election systems in all 50 U.S. states during the presidential election in 2016.</span> <span data-start-time='24750' data-end-time='39042'>But if hackers were able to interfere in U.S. elections in 2020, voters and some public officials may not learn about it until much later.</span> <span data-start-time='39042' data-end-time='49563'>Government officials with the Federal Bureau of Investigation, or, FBI, usually investigate computer hacking.</span> <span data-start-time='49563' data-end-time='56063'>But they are not required to share information when an election system is hacked.</span> <span data-start-time='56063' data-end-time='63750'>And they must follow rules about protecting the identities of possible victims.</span> <span data-start-time='63750' data-end-time='71396'>The Associated Press has reported that the situation can be difficult for election officials.</span> <span data-start-time='71396' data-end-time='77083'>They want to know about hacking efforts so they can protect their systems.</span> <span data-start-time='77083' data-end-time='81229'>But they do not want their agencies to look bad.</span> <span data-start-time='81229' data-end-time='88375'>And they do not want to create chaos and confusion, which is what hackers are seeking.</span> </p></div><div class='control-buttons-sticky' style='display:none;'><div class='control-buttons'><button title='Back' class='back' disabled='disabled'></button><button title='Play' class='play' disabled='disabled'></button><button title='Pause' class='pause' style='display:none;'></button><button title='Forward' class='forward' disabled='disabled'></button><button class='finished-reading' style='display:none;'>Done</button></div></div></div><div id='article-media'><div id='media-image'><img src='https://news-app-production.s3.amazonaws.com/articles/3752/pub.jpg'/></div></div><div id='question-content' style='display:none;'><div class='vocabulary_question question-container' data-question-id=13908 data-hint-location='81229' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/what_does_chaos_mean.wav'>What does chaos mean?</div><div class='choices' data-correct-choice='complete confusion and disorder'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/complete_confusion_and_disorder.wav'><span>complete confusion and disorder</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/illegally_enter_a_computer.wav'><span>illegally enter a computer</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/share_information.wav'><span>share information</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/weakened_election_system.wav'><span>weakened election system</span></div></div></div><div class='multiple_choice_question question-container' data-question-id=13909 data-hint-location='56063' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/what_information_is_being_protected.wav'>What information is being protected?</div><div class='choices' data-correct-choice='identity of victims'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/criminal_suspects.wav'><span>criminal suspects</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/foreign_actors.wav'><span>foreign actors</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/identity_of_victims.wav'><span>identity of victims</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/hacking_efforts.wav'><span>hacking efforts</span></div></div></div><div class='sentence_completion_question question-container' data-question-id=13910 data-hint-location='9625' style='display:none;'><div class='question' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/russian_agents_searched_for__blank__in_election_systems.wav'>Russian agents searched for <span class='blank'>weaknesses</span> in election systems.</div><div class='choices' data-correct-choice='weaknesses'><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/voter_records.wav'><span>voter records</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/weaknesses.wav'><span>weaknesses</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/corruption.wav'><span>corruption</span></div><div class='choice' data-sound-name='https://news-app-production.s3.amazonaws.com/articles/3752/information.wav'><span>information</span></div></div></div><div class='question-buttons'><button class='skip-button'></button><button class='hint-button'></button><button class='speak-button'></button></div></div></div>
Sound name
https://news-app-production.s3.amazonaws.com/articles/3752/pub.wav
Show
|
Back