时间:2019-02-02 作者:英语课 分类:英语新闻


英语课

   WASHINGTON—Information from the private email account of CIA Director John Brennan is being made public, just days after hackers 1 bragged 2 they had broken in.


  WikiLeaks on Thursday posted several documents from the account, including what appear to be drafts of papers about the challenges facing the U.S. intelligence community and recommendations for how the U.S. should deal with Iran.
  The anti-secrecy website also posted a draft of Brennan’s security clearance 3 application, which contained personal information, such as a Social Security number.
  WikiLeaks defended its actions, saying Brennan “used the account occasionally for several intelligence-related projects,” adding that it planned to release additional documents in the coming days.
  WikiLeaks Posts Info From CIA Director Personal Email
  CIA counters
  A CIA spokesman rejected the website’s claims.
  “There is no indication that any of the documents released thus far are classified,” the spokesman said, describing them instead as “documents that a private citizen with national security interests and expertise 4 would be expected to possess.”
  The spokesman also called the hacking 5 a crime.
  “The Brennan family is the victim,” the spokesman said. “The private electronic holdings of the Brennan family were plundered 6 with malicious 7 intent and are now being distributed across the Web.”
  The documents posted on WikiLeaks appear to have come from a high school student who told the New York Post earlier this week that he'd hijacked 8 the CIA director’s personal email account to protest American foreign policy.
  The documents posted by WikiLeaks on Thursday all date to a time before Brennan joined the administration of President Barack Obama.
  Draft paper
  One paper from 2007, titled “The Conundrum 9 of Iran,” warns that Tehran’s ongoing 10 use of terrorism is “particularly alarming and insidious,” but also bemoans 11 “the gratuitous 12 labeling of Iran as part of an 'axis 13 of evil' by President Bush” following the September 11, 2001, terror attacks on the U.S.
  The draft paper recommends the next president of the United States “tone down” the rhetoric 14.
  “Iran’s importance to U.S. strategic interests and to overall stability in the region necessitates 15 the establishment of direct and senior-level dialogue,” Brennan wrote, suggesting Washington “hold out meaningful carrots as well as sticks.”
  The paper also suggested naming former Secretary of State Colin Powell as a special U.S. envoy 16 to Iran to facilitate the process.
  WikiLeaks posted a 2008 letter from former U.S. Senator Kit 17 Bond to other senators about Bond’s own proposal to curb 18 CIA interrogation techniques. It also posted what appeared to be Bond's draft legislation.
  “There’s unlikely to be any real geopolitical fallout,” said Patrick Skinner, a former U.S. intelligence official who is now director of special projects at the Soufan Group, a private intelligence firm.
  “Other intelligence agencies would look for information to either blackmail 19 or socially engineer a pitch, but the CIA director isn't a realistic target for those services,” Skinner said. “This is much more narrow and personal.”
  Vulnerabilities exposed
  Government officials and private experts say the incident also demonstrates the vulnerabilities of an environment in which a need for fast and easy communication has outpaced the ability of agencies and companies to safeguard information.
  “It is one of the most critical threats right now,” said Saryu Nayyar, CEO of Gurucul, a company that provides identity-based threat detection.
  “It’s happening many times a day at any organization,” she said. “Hackers get into an environment, behave like insiders and exfiltrate critical intellectual property and confidential 20 data.”
  Law enforcement officials say they are looking into the hijacking 21 of the CIA director’s private email account.
  “The FBI is investigating this matter jointly 22 with the U.S. Secret Service,” the FBI said in a statement. “Because this is an ongoing investigation 23, we are restricted from commenting further.”

n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
v.自夸,吹嘘( brag的过去式和过去分词 )
  • He bragged to his friends about the crime. 他向朋友炫耀他的罪行。
  • Mary bragged that she could run faster than Jack. 玛丽夸口说她比杰克跑得快。 来自《简明英汉词典》
n.净空;许可(证);清算;清除,清理
  • There was a clearance of only ten centimetres between the two walls.两堵墙之间只有十厘米的空隙。
  • The ship sailed as soon as it got clearance. 那艘船一办好离港手续立刻启航了。
n.专门知识(或技能等),专长
  • We were amazed at his expertise on the ski slopes.他斜坡滑雪的技能使我们赞叹不已。
  • You really have the technical expertise in a new breakthrough.让你真正在专业技术上有一个全新的突破。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
掠夺,抢劫( plunder的过去式和过去分词 )
  • Many of our cultural treasures have been plundered by imperialists. 我国许多珍贵文物被帝国主义掠走了。
  • The imperialists plundered many valuable works of art. 帝国主义列强掠夺了许多珍贵的艺术品。
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
劫持( hijack的过去式和过去分词 ); 绑架; 拦路抢劫; 操纵(会议等,以推销自己的意图)
  • The plane was hijacked by two armed men on a flight from London to Rome. 飞机在从伦敦飞往罗马途中遭到两名持械男子劫持。
  • The plane was hijacked soon after it took off. 那架飞机起飞后不久被劫持了。
n.谜语;难题
  • Let me give you some history about a conundrum.让我给你们一些关于谜题的历史。
  • Scientists had focused on two explanations to solve this conundrum.科学家已锁定两种解释来解开这个难题。
adj.进行中的,前进的
  • The problem is ongoing.这个问题尚未解决。
  • The issues raised in the report relate directly to Age Concern's ongoing work in this area.报告中提出的问题与“关心老人”组织在这方面正在做的工作有直接的关系。
v.为(某人或某事)抱怨( bemoan的第三人称单数 );悲悼;为…恸哭;哀叹
  • He always bemoans the shortage of funds for research. 他总是叹息研究经费不足。 来自互联网
adj.无偿的,免费的;无缘无故的,不必要的
  • His criticism is quite gratuitous.他的批评完全没有根据。
  • There's too much crime and gratuitous violence on TV.电视里充斥着犯罪和无端的暴力。
n.轴,轴线,中心线;坐标轴,基准线
  • The earth's axis is the line between the North and South Poles.地轴是南北极之间的线。
  • The axis of a circle is its diameter.圆的轴线是其直径。
n.修辞学,浮夸之言语
  • Do you know something about rhetoric?你懂点修辞学吗?
  • Behind all the rhetoric,his relations with the army are dangerously poised.在冠冕堂皇的言辞背后,他和军队的关系岌岌可危。
使…成为必要,需要( necessitate的第三人称单数 )
  • The increase in population necessitates a greater food supply. 人口的增加需要更多食物供应。
  • Your proposal necessitates borrowing money. 你的提议使借款成为必要。
n.使节,使者,代表,公使
  • Their envoy showed no sign of responding to our proposals.他们的代表对我方的提议毫无回应的迹象。
  • The government has not yet appointed an envoy to the area.政府尚未向这一地区派过外交官。
n.用具包,成套工具;随身携带物
  • The kit consisted of about twenty cosmetic items.整套工具包括大约20种化妆用品。
  • The captain wants to inspect your kit.船长想检查你的行装。
n.场外证券市场,场外交易;vt.制止,抑制
  • I could not curb my anger.我按捺不住我的愤怒。
  • You must curb your daughter when you are in church.你在教堂时必须管住你的女儿。
n.讹诈,敲诈,勒索,胁迫,恫吓
  • She demanded $1000 blackmail from him.她向他敲诈了1000美元。
  • The journalist used blackmail to make the lawyer give him the documents.记者讹诈那名律师交给他文件。
adj.秘(机)密的,表示信任的,担任机密工作的
  • He refused to allow his secretary to handle confidential letters.他不让秘书处理机密文件。
  • We have a confidential exchange of views.我们推心置腹地交换意见。
ad.联合地,共同地
  • Tenants are jointly and severally liable for payment of the rent. 租金由承租人共同且分别承担。
  • She owns the house jointly with her husband. 她和丈夫共同拥有这所房子。
n.调查,调查研究
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
标签: 维基
学英语单词
aargh
abutment joint
alkali waste
allylisopropylacetamide
astronaut's digestion
asymmetric adsorption
boxologies
brain stem
brittle maidenhair fern
chored
coin percussion
communications security material
Conero, Mte.
coordinate axiom
corpora penis
countertell
creta
culturology
degree sequence
dejohn
detailed construction schedule
disaggregation
divide line
ecofascists
embrechites
exit wound
falling-down
forecast note
forest horticulture
formal mode
fur trader
gamma-ray bursts
gastrospas
gated ion channel
glass oiler
grease skimming tank
hand-reset relay
hardhewe
hazella
hb,hb.,h.b.
headlinese
hot attentional focus
improbate
Indomee
intervalley trannsport time
intestinal leiomyosarcoma
isophthalaldehydic acid
kainolithe
keybuttons
lateral illumination
least lines criterion
linear adsorption
load efficiency
loose housing system
lura
m-n blood groups
macromidia ishidai
make inroads into a country
masterblasters
microbial closed ecosystem
Minilya R.
mobbishness
nonparaffin
not come to anything
nucleomegaly
obelisks
ornebius kanetataki
parameter of accumulation of freight cars
pebble dent
pingpong table
points locking device
polyblephary
powerful instruction system
price of the privilege
pupal period
readoption
replacing economics
reverberation method
rotap
Saussurea hultenii
segregation
shellac bond
Single Mode Fiber
solar energy dryer
splendour
sportdiver
steel collector
subbed
sulfaphtalylthiazol
suppression of evidence
surface silo
tert-amyl butyrate
thermal utilization
tibets
timing constraint
treasurys
triphasic wave
uk as
vinyl ester resin
von Mangoldt function
walk with disaster
winnetou