时间:2019-01-02 作者:英语课 分类:2017年VOA慢速英语(三)月


英语课

 


WikiLeaks has published documents it says show how the U.S. Central Intelligence Agency (CIA) collects information from electronic devices.


The anti-secrecy group did not say how it received the 8,700 documents and files connected to the CIA’s Center for Cyber Intelligence.


But WikiLeaks said the number is greater than the National Security Agency (NSA) documents provided by Edward Snowden in 2013. Snowden formerly 1 worked as a contractor 2 for the NSA.


VOA and other news media could not confirm if the documents released on Tuesday accurately 3 describe CIA efforts to get information from smart phones, televisions and computers.


Jonathan Liu, spokesman for the CIA, said the agency does not comment on whether leaked documents are real.


One of the more sensational 4 examples of hacking 5 reported by WikiLeaks involved Samsung smart televisions.


WikiLeaks said the CIA infected some smart TVs with a computer virus known as “Weeping Angel.” The virus created a “fake off” button that left owners thinking the receiver wasn’t operating.


But while in the “off position,” the TV reportedly would record discussions and send the recordings 7 over the Internet to a CIA computer.


WikiLeaks said the agency developed tools that could also work around security measures on Apple iPhones and Google’s Android phones.


Infected phones could be programmed to send the CIA the location of the user, along with messages and other information. The hack 6 also activated 8 the phone’s camera and microphone, WikiLeaks reported.


The website described one program it says has been tested against Microsoft’s Windows XP, Vista 9 and Windows 7 computer operating systems. It enters coding information that enables a hacker 10 to gain use of the program’s memory and other controls.


All this happens, WikiLeaks said, without the knowledge of the computer’s owner.


WikiLeaks also said the CIA was looking into ways to infect control systems used on modern cars. The purpose is not known WikiLeaks suggested it could allow the agency to kill enemies and terrorists.


WikiLeaks said the CIA also collected information on how other countries, including Russia, do internet spying.


In addition to its main offices in Virginia, the agency also has an office in Frankfurt, Germany. It serves as a secret base for computer spying in Europe, the Middle East and Africa, WikiLeaks said.


Bob Ayers, a retired 11 U.S. intelligence official, told the Associated Press that damage from WikiLeaks’ latest release is high.


But he said WikiLeaks has said it plans to release even more material, which could do even more damage.


WikiLeaks said the person or persons who provided the documents did so to start a discussion on whether the CIA is going beyond its official powers.


Sean Spicer, press secretary for President Donald Trump 12, would not comment on the WikiLeaks report.


WikiLeaks publishes secret information, often provided by people who do not want to be identified. It was founded in 2006 by Julian Assange.


Some U.S. intelligence officials have said that WikiLeaks provided information used to hurt former Secretary of State Hillary Clinton in the 2016 elections. Clinton was the Democratic Party’s candidate for president. Officials accused Russian intelligence agencies of using the information to help Donald Trump, the Republican candidate.


Trump won the election and now is in his 2nd month as president.


Words in This Story


contractor - n. a person who is paid to perform work or to provide goods at a certain price or within a given time


determine - v. to find out information


accurately - adv. free from mistakes or errors


sensational - adj. causing very great excitement or interest with shocking details


hacking - n. to secretly gain use to the files of a computer or computer network in order to get information or cause damage


fake - adj. not real


microphone - n. a device into which people speak or sing in order to record their voices or to make them sound louder


coding - n. of or related to a series of directions for a computer



adv.从前,以前
  • We now enjoy these comforts of which formerly we had only heard.我们现在享受到了过去只是听说过的那些舒适条件。
  • This boat was formerly used on the rivers of China.这船从前航行在中国内河里。
n.订约人,承包人,收缩肌
  • The Tokyo contractor was asked to kick $ 6000 back as commission.那个东京的承包商被要求退还6000美元作为佣金。
  • The style of house the contractor builds depends partly on the lay of the land.承包商所建房屋的式样,有几分要看地势而定。
adv.准确地,精确地
  • It is hard to hit the ball accurately.准确地击中球很难。
  • Now scientists can forecast the weather accurately.现在科学家们能准确地预报天气。
adj.使人感动的,非常好的,轰动的,耸人听闻的
  • Papers of this kind are full of sensational news reports.这类报纸满是耸人听闻的新闻报道。
  • Their performance was sensational.他们的演出妙极了。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
n.劈,砍,出租马车;v.劈,砍,干咳
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
n.记录( recording的名词复数 );录音;录像;唱片
  • a boxed set of original recordings 一套盒装原声录音带
  • old jazz recordings reissued on CD 以激光唱片重新发行的老爵士乐
n.远景,深景,展望,回想
  • From my bedroom window I looked out on a crowded vista of hills and rooftops.我从卧室窗口望去,远处尽是连绵的山峦和屋顶。
  • These uprisings come from desperation and a vista of a future without hope.发生这些暴动是因为人们被逼上了绝路,未来看不到一点儿希望。
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
adj.隐退的,退休的,退役的
  • The old man retired to the country for rest.这位老人下乡休息去了。
  • Many retired people take up gardening as a hobby.许多退休的人都以从事园艺为嗜好。
n.王牌,法宝;v.打出王牌,吹喇叭
  • He was never able to trump up the courage to have a showdown.他始终鼓不起勇气摊牌。
  • The coach saved his star player for a trump card.教练保留他的明星选手,作为他的王牌。
标签:
学英语单词
absolute methanol
acronichal
Akebia trifoliata
alpha-angle
Amoeiro
anti-aliased
areometric
asemanticity
bashaarat
be in a mood for something
begin to fidget
bitter oath
bound exciton state
C. & E.
cargo contamination
charge shift
check pilot
citation index and indexing
colorers
colour retardation
comeupance
compulsory (trade) unionism
curve of output
dadfar
de-attribution
dehydrocanned
dismutation reaction
doronicums
double pole cut out
dye-variant fibre
e-values
earth resouces survey
expiratory neuron
finned rocket
FTNVD
gheada
go for the doctor
grantski
guybrows
height of layer
herst
hinzmann
holotypic kidney
infandous
infix syntax
injection hole
intellectual asset
jumble together
khipu
kleve (cleve)
Kriz(Karīz)
laser mouse
life saving jacket
linney
lloyd's form-general average deposit receipt
lumped discontinuity
Machaneng
magnetic amplifier characteristic
maisonnettes
Mansel
motor scooter
nanpingite
Normet
Ohara's fever
oropharyngonasal
Oscar Palmer Robertson
paraheloike
parameters of operation process
pipeworts
plumbisms
polypropylenes
prosporangium
pull tab
put ... to the vote
red neck syndrome
relativistic hydrodynamics
resilient drive
rotary sliding-vane refrigerating compressor
seditions
self analysis
signal operation
single facer
sonic attractant
spin foam
squizz
staggerin'
steel letters
stomatopapilloma
swissres
Sǒngjinman
three-card memory
thyrohyoid ligaments
tire chain
transvision
traverse guider
tread chord width
up the aisle
validity of civil law
visibility of satellite
water wall craft
woebegoneness
writees