时间:2019-02-02 作者:英语课 分类:英语新闻


英语课

   WASHINGTON—Information from the private email account of CIA Director John Brennan is being made public, just days after hackers 1 bragged 2 they had broken in.


  WikiLeaks on Thursday posted several documents from the account, including what appear to be drafts of papers about the challenges facing the U.S. intelligence community and recommendations for how the U.S. should deal with Iran.
  The anti-secrecy website also posted a draft of Brennan’s security clearance 3 application, which contained personal information, such as a Social Security number.
  WikiLeaks defended its actions, saying Brennan “used the account occasionally for several intelligence-related projects,” adding that it planned to release additional documents in the coming days.
  WikiLeaks Posts Info From CIA Director Personal Email
  CIA counters
  A CIA spokesman rejected the website’s claims.
  “There is no indication that any of the documents released thus far are classified,” the spokesman said, describing them instead as “documents that a private citizen with national security interests and expertise 4 would be expected to possess.”
  The spokesman also called the hacking 5 a crime.
  “The Brennan family is the victim,” the spokesman said. “The private electronic holdings of the Brennan family were plundered 6 with malicious 7 intent and are now being distributed across the Web.”
  The documents posted on WikiLeaks appear to have come from a high school student who told the New York Post earlier this week that he'd hijacked 8 the CIA director’s personal email account to protest American foreign policy.
  The documents posted by WikiLeaks on Thursday all date to a time before Brennan joined the administration of President Barack Obama.
  Draft paper
  One paper from 2007, titled “The Conundrum 9 of Iran,” warns that Tehran’s ongoing 10 use of terrorism is “particularly alarming and insidious,” but also bemoans 11 “the gratuitous 12 labeling of Iran as part of an 'axis 13 of evil' by President Bush” following the September 11, 2001, terror attacks on the U.S.
  The draft paper recommends the next president of the United States “tone down” the rhetoric 14.
  “Iran’s importance to U.S. strategic interests and to overall stability in the region necessitates 15 the establishment of direct and senior-level dialogue,” Brennan wrote, suggesting Washington “hold out meaningful carrots as well as sticks.”
  The paper also suggested naming former Secretary of State Colin Powell as a special U.S. envoy 16 to Iran to facilitate the process.
  WikiLeaks posted a 2008 letter from former U.S. Senator Kit 17 Bond to other senators about Bond’s own proposal to curb 18 CIA interrogation techniques. It also posted what appeared to be Bond's draft legislation.
  “There’s unlikely to be any real geopolitical fallout,” said Patrick Skinner, a former U.S. intelligence official who is now director of special projects at the Soufan Group, a private intelligence firm.
  “Other intelligence agencies would look for information to either blackmail 19 or socially engineer a pitch, but the CIA director isn't a realistic target for those services,” Skinner said. “This is much more narrow and personal.”
  Vulnerabilities exposed
  Government officials and private experts say the incident also demonstrates the vulnerabilities of an environment in which a need for fast and easy communication has outpaced the ability of agencies and companies to safeguard information.
  “It is one of the most critical threats right now,” said Saryu Nayyar, CEO of Gurucul, a company that provides identity-based threat detection.
  “It’s happening many times a day at any organization,” she said. “Hackers get into an environment, behave like insiders and exfiltrate critical intellectual property and confidential 20 data.”
  Law enforcement officials say they are looking into the hijacking 21 of the CIA director’s private email account.
  “The FBI is investigating this matter jointly 22 with the U.S. Secret Service,” the FBI said in a statement. “Because this is an ongoing investigation 23, we are restricted from commenting further.”

n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
v.自夸,吹嘘( brag的过去式和过去分词 )
  • He bragged to his friends about the crime. 他向朋友炫耀他的罪行。
  • Mary bragged that she could run faster than Jack. 玛丽夸口说她比杰克跑得快。 来自《简明英汉词典》
n.净空;许可(证);清算;清除,清理
  • There was a clearance of only ten centimetres between the two walls.两堵墙之间只有十厘米的空隙。
  • The ship sailed as soon as it got clearance. 那艘船一办好离港手续立刻启航了。
n.专门知识(或技能等),专长
  • We were amazed at his expertise on the ski slopes.他斜坡滑雪的技能使我们赞叹不已。
  • You really have the technical expertise in a new breakthrough.让你真正在专业技术上有一个全新的突破。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
掠夺,抢劫( plunder的过去式和过去分词 )
  • Many of our cultural treasures have been plundered by imperialists. 我国许多珍贵文物被帝国主义掠走了。
  • The imperialists plundered many valuable works of art. 帝国主义列强掠夺了许多珍贵的艺术品。
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
劫持( hijack的过去式和过去分词 ); 绑架; 拦路抢劫; 操纵(会议等,以推销自己的意图)
  • The plane was hijacked by two armed men on a flight from London to Rome. 飞机在从伦敦飞往罗马途中遭到两名持械男子劫持。
  • The plane was hijacked soon after it took off. 那架飞机起飞后不久被劫持了。
n.谜语;难题
  • Let me give you some history about a conundrum.让我给你们一些关于谜题的历史。
  • Scientists had focused on two explanations to solve this conundrum.科学家已锁定两种解释来解开这个难题。
adj.进行中的,前进的
  • The problem is ongoing.这个问题尚未解决。
  • The issues raised in the report relate directly to Age Concern's ongoing work in this area.报告中提出的问题与“关心老人”组织在这方面正在做的工作有直接的关系。
v.为(某人或某事)抱怨( bemoan的第三人称单数 );悲悼;为…恸哭;哀叹
  • He always bemoans the shortage of funds for research. 他总是叹息研究经费不足。 来自互联网
adj.无偿的,免费的;无缘无故的,不必要的
  • His criticism is quite gratuitous.他的批评完全没有根据。
  • There's too much crime and gratuitous violence on TV.电视里充斥着犯罪和无端的暴力。
n.轴,轴线,中心线;坐标轴,基准线
  • The earth's axis is the line between the North and South Poles.地轴是南北极之间的线。
  • The axis of a circle is its diameter.圆的轴线是其直径。
n.修辞学,浮夸之言语
  • Do you know something about rhetoric?你懂点修辞学吗?
  • Behind all the rhetoric,his relations with the army are dangerously poised.在冠冕堂皇的言辞背后,他和军队的关系岌岌可危。
使…成为必要,需要( necessitate的第三人称单数 )
  • The increase in population necessitates a greater food supply. 人口的增加需要更多食物供应。
  • Your proposal necessitates borrowing money. 你的提议使借款成为必要。
n.使节,使者,代表,公使
  • Their envoy showed no sign of responding to our proposals.他们的代表对我方的提议毫无回应的迹象。
  • The government has not yet appointed an envoy to the area.政府尚未向这一地区派过外交官。
n.用具包,成套工具;随身携带物
  • The kit consisted of about twenty cosmetic items.整套工具包括大约20种化妆用品。
  • The captain wants to inspect your kit.船长想检查你的行装。
n.场外证券市场,场外交易;vt.制止,抑制
  • I could not curb my anger.我按捺不住我的愤怒。
  • You must curb your daughter when you are in church.你在教堂时必须管住你的女儿。
n.讹诈,敲诈,勒索,胁迫,恫吓
  • She demanded $1000 blackmail from him.她向他敲诈了1000美元。
  • The journalist used blackmail to make the lawyer give him the documents.记者讹诈那名律师交给他文件。
adj.秘(机)密的,表示信任的,担任机密工作的
  • He refused to allow his secretary to handle confidential letters.他不让秘书处理机密文件。
  • We have a confidential exchange of views.我们推心置腹地交换意见。
ad.联合地,共同地
  • Tenants are jointly and severally liable for payment of the rent. 租金由承租人共同且分别承担。
  • She owns the house jointly with her husband. 她和丈夫共同拥有这所房子。
n.调查,调查研究
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
标签: 维基
学英语单词
a juggler
agricultural steel
allochthonic ground water
ampersands
angiospermous wood
antirheoscope
biogecchemistry
bone-up
boudewijn kanaal
brages
burglar alarm system
cam journal
chordal node
comparison interval
crystal ballsmanship
cut it short
Cxorvotone
daystrom power plant automation language (dapal)
De Steeg
demand report
descriptive anthropologies
DGAF
disrank
district attorneys
dot system
dry forest zone
Elaeagnus tutcheri
elisia
endo('s) agar
enlighting
flat-tax
G stone
garnet-mica schist
gifford
hand hackle
harnes(s)ing
heavy oil partial oxidation process
heemantic
herculaneums
hexamminecobalt (III)chloride
horizontal position of welding
hycanthone
hygrophorus borealiss
instrument tube routing
iridium(vi) selenide
Kifuli
knocked down condition
lancaster method of instruction
lapsus linguae
latrans
lifetaker
lip swelling
long-term credit facility
maritime buoyage
Marmagao(Mormugao)
median plates of wingbase
microthrombi
minimization of Boolean function
MittelEuropean
moulded shoes
multibit branch
neutral absorption
next generation Internet
Nicholas, Saint
OCTT
olinton
PBIB
Pentaceros
phenylalanine aminotransferase
place under restraint
polystichum falcatum
precise orientation
primary head vein
Puerto Alfonso
recovery pending
red alarm light
relief grinding
response to
resultant tool force
ringing pilot lamp
round bottomed flask
Royal Naval Reserve
runoff erosion
safety car
salmon-eye locus
Sandro
sarpo
scroll-paintings
self-presentations
septenary notation
split run
spoil the Egyptians
Spondias pinnata Kurz
straight flange design
street corners
Sumprabum
super sifter
tentative standard
underground river
victoria's secret
wear inhibitor
wh-what