时间:2018-12-05 作者:英语课 分类:PBS访谈商业系列


英语课

   JUDY WOODRUFF: As we just discussed, WikiLeaks today did publish thousands of pages of what it says are files about the CIA and its hacking 1 activities.


  Jeffrey Brown has our further look.
  JEFFREY BROWN: The material comes from the CIA's Center for Cyber Intelligence. It includes a range of documents from 2013 to 2016 which describe cyber-tools for hacking cell phones, computers, television, and even vehicles.
  The documents also contain computer code. One program, dubbed 2 Weeping Angel, entails 3 infecting Samsung smart TVs, turning them into bugging 4 devices. Another program is aimed at hacking Apple and Android cell phones, undercutting encryption on services like WhatsApp, Signal, and Telegram.
  WikiLeaks also says these documents show that when the CIA discovered flaws in computer code written by Apple, Google or Samsung, it failed to notify those companies about the vulnerabilities to allow fixes to be made.
  Mark Mazzetti of The New York Times has been covering this, and joins us now.
  Mark, welcome to you.
  So, the CIA hasn't said much so far. What do we know about the authenticity 5 of the documents and where they came from?
  MARK MAZZETTI, The New York Times: Well, we're still trying to confirm the authenticity.
  We have several people we have spoken to today who say they believe they're authentic 6. We have heard nothing thus far from the government indicating that they are not. Some people we have spoken to have said that some of the code names that were cited in the documents are, indeed, legitimate 7.
  So it does appear at the moment — and I should say at the moment — that they are legitimate.
  JEFFREY BROWN: Well, when you look at the totality, Mark, of all of these cyber-tools that being described, help us understand, what are they aimed at? What is this program about?
  MARK MAZZETTI: Well, they're a series of — and we're talking about thousands of documents that are laying out some of the tools the CIA allegedly has to carry out hacking of any number of different devices, as you said, cars, against foreign adversaries 8 or people overseas.
  I should stress that there is — unlike the Snowden disclosures, there were not specific mentions of where these have been used. But they're more sort of like the toolkit the CIA has. And it's pretty expansive, if the documents are to be believed.
  And in terms of where they came from, you asked. I mean, that's another thing we're still trying to figure out. WikiLeaks said today that they had a source come to them who was concerned about the use of these tools. We don't know anything about the source. And there's a lot of questions still at the moment.
  维基解密揭示CIA是如何攻击智能手机和电视的
  JEFFREY BROWN: WikiLeaks said that it had redacted some names and some information in its release. But how potentially damaging is this to the CIA?
  MARK MAZZETTI: Well, again, if they're confirmed to be true, any revelations about actual capabilities 9 that the CIA or any other intelligence agency has would limit the ability of the agency to continue to do those activities.
  You saw that to a degree with Snowden and others. And so that is where the concern is, that you will have a lot of — these tools may not be used because they're now revealed. But, again, we have to — we still have to report out exactly, you know, what has been used and, to a large extent, how much of this is actual truth.
  JEFFREY BROWN: Yes, and I realize so much of that is going on.
  I mentioned one particular program, which is the Weeping Angel, using Samsung smart televisions as covert 10 listening devices. But that's one concrete example that's come out today.
  MARK MAZZETTI: Yes.
  And the — in a nutshell, the idea was that the Samsung smart TVs have a feature that allowed access to the Internet, and by having this — you're basically turning this smart feature on. The CIA is turning it into a microphone and allowing eavesdropping 11 in a home.
  And another thing you cited was questions about the ability of the agency's hackers 12 to sort of sort of bypass traditional encryption and very popular encryption software like Signal or WhatsApp.
  The idea is not that the programs themselves are hacked 13 or compromised. It's that, if you're in the phone, if the CIA were to be in the phone, they would be able to get the data before it was then encrypted by these applications.
  JEFFREY BROWN: And just, Mark, in 10 seconds, in a word here, so much of the attention has been on the NSA programs in the past. Is it a surprise to learn that the CIA may have its own program?
  MARK MAZZETTI: Well, it's pretty well known that the CIA has been building up this capability 14 and are determined 15 to because they see computer hacking and computer cyber-warfare as the future.
  So, they are very much in that game.
  JEFFREY BROWN: All right, Mark Mazzetti of The New York Times, thank you very much.
  MARK MAZZETTI: Thank you.

1 hacking
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
2 dubbed
v.给…起绰号( dub的过去式和过去分词 );把…称为;配音;复制
  • Mathematics was once dubbed the handmaiden of the sciences. 数学曾一度被视为各门科学的基础。
  • Is the movie dubbed or does it have subtitles? 这部电影是配音的还是打字幕的? 来自《简明英汉词典》
3 entails
使…成为必要( entail的第三人称单数 ); 需要; 限定继承; 使必需
  • The job entails a lot of hard work. 这工作需要十分艰苦的努力。
  • This job entails a lot of hard work. 这项工作需要十分努力。
4 bugging
[法] 窃听
  • Okay, then let's get the show on the road and I'll stop bugging you. 好,那么让我们开始动起来,我将不再惹你生气。 来自辞典例句
  • Go fly a kite and stop bugging me. 走开,别烦我。 来自英汉 - 翻译样例 - 口语
5 authenticity
n.真实性
  • There has been some debate over the authenticity of his will. 对于他的遗嘱的真实性一直有争论。
  • The museum is seeking an expert opinion on the authenticity of the painting. 博物馆在请专家鉴定那幅画的真伪。
6 authentic
a.真的,真正的;可靠的,可信的,有根据的
  • This is an authentic news report. We can depend on it. 这是篇可靠的新闻报道, 我们相信它。
  • Autumn is also the authentic season of renewal. 秋天才是真正的除旧布新的季节。
7 legitimate
adj.合法的,合理的,合乎逻辑的;v.使合法
  • Sickness is a legitimate reason for asking for leave.生病是请假的一个正当的理由。
  • That's a perfectly legitimate fear.怀有这种恐惧完全在情理之中。
8 adversaries
n.对手,敌手( adversary的名词复数 )
  • That would cause potential adversaries to recoil from a challenge. 这会迫使潜在的敌人在挑战面前退缩。 来自辞典例句
  • Every adversaries are more comfortable with a predictable, coherent America. 就连敌人也会因有可以预料的,始终一致的美国而感到舒服得多。 来自辞典例句
9 capabilities
n.能力( capability的名词复数 );可能;容量;[复数]潜在能力
  • He was somewhat pompous and had a high opinion of his own capabilities. 他有点自大,自视甚高。 来自辞典例句
  • Some programmers use tabs to break complex product capabilities into smaller chunks. 一些程序员认为,标签可以将复杂的功能分为每个窗格一组简单的功能。 来自About Face 3交互设计精髓
10 covert
adj.隐藏的;暗地里的
  • We should learn to fight with enemy in an overt and covert way.我们应学会同敌人做公开和隐蔽的斗争。
  • The army carried out covert surveillance of the building for several months.军队对这座建筑物进行了数月的秘密监视。
11 eavesdropping
n. 偷听
  • We caught him eavesdropping outside the window. 我们撞见他正在窗外偷听。
  • Suddenly the kids,who had been eavesdropping,flew into the room. 突然间,一直在偷听的孩子们飞进屋来。
12 hackers
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
13 hacked
生气
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
14 capability
n.能力;才能;(pl)可发展的能力或特性等
  • She has the capability to become a very fine actress.她有潜力成为杰出演员。
  • Organizing a whole department is beyond his capability.组织整个部门是他能力以外的事。
15 determined
adj.坚定的;有决心的
  • I have determined on going to Tibet after graduation.我已决定毕业后去西藏。
  • He determined to view the rooms behind the office.他决定查看一下办公室后面的房间。
标签: PBS
学英语单词
AC asynchronous motor
acoustooptical receiver
ad valorem property taxes
alpha-angle
alusia
Ama Khel
anuj
audio communication circuit
Baalder
bad waltersdorf
bonding pads
bouncing bomb
Bowie Canyon
capture new markets
Chkdisk
chokoloskee
chop
climbin
common agrimony
compound course
constitutional ash
deductions before distribution
denin
dependent application
dicarboxylic aid
diffuse hypergammaglobulinemia
directly acting carcinogens
dose-independent ADR
down take
Dunscore
embroiderer
established right
ex-monk
ferment cell
Flamingo, Tk.
formatize
fratercula corniculatas
fuscosclerotic acid
garnishes
hemangiectasis
horribleness
iced coffees
infrared remote receiver
insulinoma
intrinsic contaminant
iron-smelting technology
kanakaredes
lamination diagram
laser navigation sensor
lesser zygomatic muscle
Ligularia tenuipes
lithochemical prospecting
Lope de Vaga
low-brower
luctuosus
magnesium chromium ferrite
maximum feed stop lever
Mbean
megalotocepheus japonicus
microfluorimeter
microstrongyle
oogenic
parallel wharf
pearl luster
percentage speed variation
phonically
Pollutant charge
pressure-tendency chart
prophenpyridamine
quotingly
radial positioning grid
reactor core barrel
remote visual display
residual ore
reversed spirit level
right to the use of a site
rimrocked
scarus xanthopleura
screw flight
seed corm
semiconductor cell
sentinel antibody
slight fault
slow interval training
solvent loading
station keeper
steaminess
Stogovo Planina
stripping cracking
swing-hammer crusher
tax on capital profit
tipping moment
to compress
trophidium
tunnel radio
unmanned weapon delivery system
untowards
vigs
watchdog timers
wheft
windscreen cleaning liquid
Zlatni Pysǔtsi