时间:2019-01-02 作者:英语课 分类:2017年VOA慢速英语(三)月


英语课

 


WikiLeaks has published documents it says show how the U.S. Central Intelligence Agency (CIA) collects information from electronic devices.


The anti-secrecy group did not say how it received the 8,700 documents and files connected to the CIA’s Center for Cyber Intelligence.


But WikiLeaks said the number is greater than the National Security Agency (NSA) documents provided by Edward Snowden in 2013. Snowden formerly 1 worked as a contractor 2 for the NSA.


VOA and other news media could not confirm if the documents released on Tuesday accurately 3 describe CIA efforts to get information from smart phones, televisions and computers.


Jonathan Liu, spokesman for the CIA, said the agency does not comment on whether leaked documents are real.


One of the more sensational 4 examples of hacking 5 reported by WikiLeaks involved Samsung smart televisions.


WikiLeaks said the CIA infected some smart TVs with a computer virus known as “Weeping Angel.” The virus created a “fake off” button that left owners thinking the receiver wasn’t operating.


But while in the “off position,” the TV reportedly would record discussions and send the recordings 7 over the Internet to a CIA computer.


WikiLeaks said the agency developed tools that could also work around security measures on Apple iPhones and Google’s Android phones.


Infected phones could be programmed to send the CIA the location of the user, along with messages and other information. The hack 6 also activated 8 the phone’s camera and microphone, WikiLeaks reported.


The website described one program it says has been tested against Microsoft’s Windows XP, Vista 9 and Windows 7 computer operating systems. It enters coding information that enables a hacker 10 to gain use of the program’s memory and other controls.


All this happens, WikiLeaks said, without the knowledge of the computer’s owner.


WikiLeaks also said the CIA was looking into ways to infect control systems used on modern cars. The purpose is not known WikiLeaks suggested it could allow the agency to kill enemies and terrorists.


WikiLeaks said the CIA also collected information on how other countries, including Russia, do internet spying.


In addition to its main offices in Virginia, the agency also has an office in Frankfurt, Germany. It serves as a secret base for computer spying in Europe, the Middle East and Africa, WikiLeaks said.


Bob Ayers, a retired 11 U.S. intelligence official, told the Associated Press that damage from WikiLeaks’ latest release is high.


But he said WikiLeaks has said it plans to release even more material, which could do even more damage.


WikiLeaks said the person or persons who provided the documents did so to start a discussion on whether the CIA is going beyond its official powers.


Sean Spicer, press secretary for President Donald Trump 12, would not comment on the WikiLeaks report.


WikiLeaks publishes secret information, often provided by people who do not want to be identified. It was founded in 2006 by Julian Assange.


Some U.S. intelligence officials have said that WikiLeaks provided information used to hurt former Secretary of State Hillary Clinton in the 2016 elections. Clinton was the Democratic Party’s candidate for president. Officials accused Russian intelligence agencies of using the information to help Donald Trump, the Republican candidate.


Trump won the election and now is in his 2nd month as president.


Words in This Story


contractor - n. a person who is paid to perform work or to provide goods at a certain price or within a given time


determine - v. to find out information


accurately - adv. free from mistakes or errors


sensational - adj. causing very great excitement or interest with shocking details


hacking - n. to secretly gain use to the files of a computer or computer network in order to get information or cause damage


fake - adj. not real


microphone - n. a device into which people speak or sing in order to record their voices or to make them sound louder


coding - n. of or related to a series of directions for a computer



adv.从前,以前
  • We now enjoy these comforts of which formerly we had only heard.我们现在享受到了过去只是听说过的那些舒适条件。
  • This boat was formerly used on the rivers of China.这船从前航行在中国内河里。
n.订约人,承包人,收缩肌
  • The Tokyo contractor was asked to kick $ 6000 back as commission.那个东京的承包商被要求退还6000美元作为佣金。
  • The style of house the contractor builds depends partly on the lay of the land.承包商所建房屋的式样,有几分要看地势而定。
adv.准确地,精确地
  • It is hard to hit the ball accurately.准确地击中球很难。
  • Now scientists can forecast the weather accurately.现在科学家们能准确地预报天气。
adj.使人感动的,非常好的,轰动的,耸人听闻的
  • Papers of this kind are full of sensational news reports.这类报纸满是耸人听闻的新闻报道。
  • Their performance was sensational.他们的演出妙极了。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
n.劈,砍,出租马车;v.劈,砍,干咳
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
n.记录( recording的名词复数 );录音;录像;唱片
  • a boxed set of original recordings 一套盒装原声录音带
  • old jazz recordings reissued on CD 以激光唱片重新发行的老爵士乐
n.远景,深景,展望,回想
  • From my bedroom window I looked out on a crowded vista of hills and rooftops.我从卧室窗口望去,远处尽是连绵的山峦和屋顶。
  • These uprisings come from desperation and a vista of a future without hope.发生这些暴动是因为人们被逼上了绝路,未来看不到一点儿希望。
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
adj.隐退的,退休的,退役的
  • The old man retired to the country for rest.这位老人下乡休息去了。
  • Many retired people take up gardening as a hobby.许多退休的人都以从事园艺为嗜好。
n.王牌,法宝;v.打出王牌,吹喇叭
  • He was never able to trump up the courage to have a showdown.他始终鼓不起勇气摊牌。
  • The coach saved his star player for a trump card.教练保留他的明星选手,作为他的王牌。
标签:
学英语单词
address code sensor
air blast atomizer
air seperation plant
aldan facies
artery of pterygoid canal
average actual
bas-relief
Baskish
bessell
bioscopic
boezem
careinophilia
chews on
coccidiodomycosis
computed price
coon bears
cycloheptaphanes
deus ex machinas
dormant wood cutting
earthing reactance
eighty-plus
Enterocoela
ferry grease
frontocylpeus
full-framer
gadolinian
geological climate
gnashing of teeth
good-for-nothings
hightech industry
holographic technique
hot oil boiler
I want to make a long distance call
individual pump system
iron(iii) hypophosphite
jointing edge
kathetometer
kilobequerel
lattice fringe image
legitimacy of children
line outage
little wabash r.
lock knitting
machine cast iron
mantacks
matching system
merge error recovery procedure
motlanthe
multiphasers
Nagorskiy Rayon
nervi cutaneus antebrachii medialis
neural canal
non-director system
normopathies
olfactometric
ollmann
Onilahy
OOW
optio
or unit
overlading
owner of freight
pal(eo)ichnology
partitions of information
petygree
photoelectron counting
pican
plungar
Polari
psychosocial deprivation
pushkins
quamoclit pennatas
rated tip-speed ratio
reimpregnation
reinforcing spleen to promote digestion
rotary type through-flow dryer
safe in life and limb
Salix sinica
sarcopterygian
scotty
sequential transiting of switches
service creation environment point
shroud cloth
slantingwise
SNMP manager
state-sponsored terrorisms
steam platen press
steel bridge
swayed
synchronization character
tanwin
tentaculocysts
thais marginata
thermocline
thiazidelike
third cuneiform
tionary
total qualitative analysis
ultrapure metal
uncorporeal
us list
vista line