英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

PBS高端访谈:维基解密揭示CIA是如何攻击智能手机和电视的

时间:2017-05-05 09:17来源:互联网 提供网友:mapleleaf   字体: [ ]
特别声明:本栏目内容均从网络收集或者网友提供,供仅参考试用,我们无法保证内容完整和正确。如果资料损害了您的权益,请与站长联系,我们将及时删除并致以歉意。
    (单词翻译:双击或拖选)

   JUDY WOODRUFF: As we just discussed, WikiLeaks today did publish thousands of pages of what it says are files about the CIA and its hacking1 activities.

  Jeffrey Brown has our further look.
  JEFFREY BROWN: The material comes from the CIA's Center for Cyber Intelligence. It includes a range of documents from 2013 to 2016 which describe cyber-tools for hacking cell phones, computers, television, and even vehicles.
  The documents also contain computer code. One program, dubbed2 Weeping Angel, entails3 infecting Samsung smart TVs, turning them into bugging4 devices. Another program is aimed at hacking Apple and Android cell phones, undercutting encryption on services like WhatsApp, Signal, and Telegram.
  WikiLeaks also says these documents show that when the CIA discovered flaws in computer code written by Apple, Google or Samsung, it failed to notify those companies about the vulnerabilities to allow fixes to be made.
  Mark Mazzetti of The New York Times has been covering this, and joins us now.
  Mark, welcome to you.
  So, the CIA hasn't said much so far. What do we know about the authenticity5 of the documents and where they came from?
  MARK MAZZETTI, The New York Times: Well, we're still trying to confirm the authenticity.
  We have several people we have spoken to today who say they believe they're authentic6. We have heard nothing thus far from the government indicating that they are not. Some people we have spoken to have said that some of the code names that were cited in the documents are, indeed, legitimate7.
  So it does appear at the moment — and I should say at the moment — that they are legitimate.
  JEFFREY BROWN: Well, when you look at the totality, Mark, of all of these cyber-tools that being described, help us understand, what are they aimed at? What is this program about?
  MARK MAZZETTI: Well, they're a series of — and we're talking about thousands of documents that are laying out some of the tools the CIA allegedly has to carry out hacking of any number of different devices, as you said, cars, against foreign adversaries8 or people overseas.
  I should stress that there is — unlike the Snowden disclosures, there were not specific mentions of where these have been used. But they're more sort of like the toolkit the CIA has. And it's pretty expansive, if the documents are to be believed.
  And in terms of where they came from, you asked. I mean, that's another thing we're still trying to figure out. WikiLeaks said today that they had a source come to them who was concerned about the use of these tools. We don't know anything about the source. And there's a lot of questions still at the moment.
  维基解密揭示CIA是如何攻击智能手机和电视的
  JEFFREY BROWN: WikiLeaks said that it had redacted some names and some information in its release. But how potentially damaging is this to the CIA?
  MARK MAZZETTI: Well, again, if they're confirmed to be true, any revelations about actual capabilities9 that the CIA or any other intelligence agency has would limit the ability of the agency to continue to do those activities.
  You saw that to a degree with Snowden and others. And so that is where the concern is, that you will have a lot of — these tools may not be used because they're now revealed. But, again, we have to — we still have to report out exactly, you know, what has been used and, to a large extent, how much of this is actual truth.
  JEFFREY BROWN: Yes, and I realize so much of that is going on.
  I mentioned one particular program, which is the Weeping Angel, using Samsung smart televisions as covert10 listening devices. But that's one concrete example that's come out today.
  MARK MAZZETTI: Yes.
  And the — in a nutshell, the idea was that the Samsung smart TVs have a feature that allowed access to the Internet, and by having this — you're basically turning this smart feature on. The CIA is turning it into a microphone and allowing eavesdropping11 in a home.
  And another thing you cited was questions about the ability of the agency's hackers12 to sort of sort of bypass traditional encryption and very popular encryption software like Signal or WhatsApp.
  The idea is not that the programs themselves are hacked13 or compromised. It's that, if you're in the phone, if the CIA were to be in the phone, they would be able to get the data before it was then encrypted by these applications.
  JEFFREY BROWN: And just, Mark, in 10 seconds, in a word here, so much of the attention has been on the NSA programs in the past. Is it a surprise to learn that the CIA may have its own program?
  MARK MAZZETTI: Well, it's pretty well known that the CIA has been building up this capability14 and are determined15 to because they see computer hacking and computer cyber-warfare as the future.
  So, they are very much in that game.
  JEFFREY BROWN: All right, Mark Mazzetti of The New York Times, thank you very much.
  MARK MAZZETTI: Thank you.

点击收听单词发音收听单词发音  

1 hacking KrIzgm     
n.非法访问计算机系统和数据库的活动
参考例句:
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
2 dubbed dubbed     
v.给…起绰号( dub的过去式和过去分词 );把…称为;配音;复制
参考例句:
  • Mathematics was once dubbed the handmaiden of the sciences. 数学曾一度被视为各门科学的基础。
  • Is the movie dubbed or does it have subtitles? 这部电影是配音的还是打字幕的? 来自《简明英汉词典》
3 entails bc08bbfc5f8710441959edc8dadcb925     
使…成为必要( entail的第三人称单数 ); 需要; 限定继承; 使必需
参考例句:
  • The job entails a lot of hard work. 这工作需要十分艰苦的努力。
  • This job entails a lot of hard work. 这项工作需要十分努力。
4 bugging 7b00b385cb79d98bcd4440f712db473b     
[法] 窃听
参考例句:
  • Okay, then let's get the show on the road and I'll stop bugging you. 好,那么让我们开始动起来,我将不再惹你生气。 来自辞典例句
  • Go fly a kite and stop bugging me. 走开,别烦我。 来自英汉 - 翻译样例 - 口语
5 authenticity quyzq     
n.真实性
参考例句:
  • There has been some debate over the authenticity of his will. 对于他的遗嘱的真实性一直有争论。
  • The museum is seeking an expert opinion on the authenticity of the painting. 博物馆在请专家鉴定那幅画的真伪。
6 authentic ZuZzs     
a.真的,真正的;可靠的,可信的,有根据的
参考例句:
  • This is an authentic news report. We can depend on it. 这是篇可靠的新闻报道, 我们相信它。
  • Autumn is also the authentic season of renewal. 秋天才是真正的除旧布新的季节。
7 legitimate L9ZzJ     
adj.合法的,合理的,合乎逻辑的;v.使合法
参考例句:
  • Sickness is a legitimate reason for asking for leave.生病是请假的一个正当的理由。
  • That's a perfectly legitimate fear.怀有这种恐惧完全在情理之中。
8 adversaries 5e3df56a80cf841a3387bd9fd1360a22     
n.对手,敌手( adversary的名词复数 )
参考例句:
  • That would cause potential adversaries to recoil from a challenge. 这会迫使潜在的敌人在挑战面前退缩。 来自辞典例句
  • Every adversaries are more comfortable with a predictable, coherent America. 就连敌人也会因有可以预料的,始终一致的美国而感到舒服得多。 来自辞典例句
9 capabilities f7b11037f2050959293aafb493b7653c     
n.能力( capability的名词复数 );可能;容量;[复数]潜在能力
参考例句:
  • He was somewhat pompous and had a high opinion of his own capabilities. 他有点自大,自视甚高。 来自辞典例句
  • Some programmers use tabs to break complex product capabilities into smaller chunks. 一些程序员认为,标签可以将复杂的功能分为每个窗格一组简单的功能。 来自About Face 3交互设计精髓
10 covert voxz0     
adj.隐藏的;暗地里的
参考例句:
  • We should learn to fight with enemy in an overt and covert way.我们应学会同敌人做公开和隐蔽的斗争。
  • The army carried out covert surveillance of the building for several months.军队对这座建筑物进行了数月的秘密监视。
11 eavesdropping 4a826293c077353641ee3f86da957082     
n. 偷听
参考例句:
  • We caught him eavesdropping outside the window. 我们撞见他正在窗外偷听。
  • Suddenly the kids,who had been eavesdropping,flew into the room. 突然间,一直在偷听的孩子们飞进屋来。
12 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
13 hacked FrgzgZ     
生气
参考例句:
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
14 capability JsGzZ     
n.能力;才能;(pl)可发展的能力或特性等
参考例句:
  • She has the capability to become a very fine actress.她有潜力成为杰出演员。
  • Organizing a whole department is beyond his capability.组织整个部门是他能力以外的事。
15 determined duszmP     
adj.坚定的;有决心的
参考例句:
  • I have determined on going to Tibet after graduation.我已决定毕业后去西藏。
  • He determined to view the rooms behind the office.他决定查看一下办公室后面的房间。
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   PBS
顶一下
(0)
0%
踩一下
(0)
0%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴