-
(单词翻译:双击或拖选)
WASHINGTON—Information from the private email account of CIA Director John Brennan is being made public, just days after hackers1 bragged2 they had broken in.
WikiLeaks on Thursday posted several documents from the account, including what appear to be drafts of papers about the challenges facing the U.S. intelligence community and recommendations for how the U.S. should deal with Iran.
The anti-secrecy website also posted a draft of Brennan’s security clearance3 application, which contained personal information, such as a Social Security number.
WikiLeaks defended its actions, saying Brennan “used the account occasionally for several intelligence-related projects,” adding that it planned to release additional documents in the coming days.
WikiLeaks Posts Info From CIA Director Personal Email
CIA counters
A CIA spokesman rejected the website’s claims.
“There is no indication that any of the documents released thus far are classified,” the spokesman said, describing them instead as “documents that a private citizen with national security interests and expertise4 would be expected to possess.”
“The Brennan family is the victim,” the spokesman said. “The private electronic holdings of the Brennan family were plundered6 with malicious7 intent and are now being distributed across the Web.”
The documents posted on WikiLeaks appear to have come from a high school student who told the New York Post earlier this week that he'd hijacked8 the CIA director’s personal email account to protest American foreign policy.
The documents posted by WikiLeaks on Thursday all date to a time before Brennan joined the administration of President Barack Obama.
Draft paper
One paper from 2007, titled “The Conundrum9 of Iran,” warns that Tehran’s ongoing10 use of terrorism is “particularly alarming and insidious,” but also bemoans11 “the gratuitous12 labeling of Iran as part of an 'axis13 of evil' by President Bush” following the September 11, 2001, terror attacks on the U.S.
“Iran’s importance to U.S. strategic interests and to overall stability in the region necessitates15 the establishment of direct and senior-level dialogue,” Brennan wrote, suggesting Washington “hold out meaningful carrots as well as sticks.”
The paper also suggested naming former Secretary of State Colin Powell as a special U.S. envoy16 to Iran to facilitate the process.
WikiLeaks posted a 2008 letter from former U.S. Senator Kit17 Bond to other senators about Bond’s own proposal to curb18 CIA interrogation techniques. It also posted what appeared to be Bond's draft legislation.
“There’s unlikely to be any real geopolitical fallout,” said Patrick Skinner, a former U.S. intelligence official who is now director of special projects at the Soufan Group, a private intelligence firm.
“Other intelligence agencies would look for information to either blackmail19 or socially engineer a pitch, but the CIA director isn't a realistic target for those services,” Skinner said. “This is much more narrow and personal.”
Vulnerabilities exposed
Government officials and private experts say the incident also demonstrates the vulnerabilities of an environment in which a need for fast and easy communication has outpaced the ability of agencies and companies to safeguard information.
“It is one of the most critical threats right now,” said Saryu Nayyar, CEO of Gurucul, a company that provides identity-based threat detection.
“It’s happening many times a day at any organization,” she said. “Hackers get into an environment, behave like insiders and exfiltrate critical intellectual property and confidential20 data.”
Law enforcement officials say they are looking into the hijacking21 of the CIA director’s private email account.
“The FBI is investigating this matter jointly22 with the U.S. Secret Service,” the FBI said in a statement. “Because this is an ongoing investigation23, we are restricted from commenting further.”
点击收听单词发音
1 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
2 bragged | |
v.自夸,吹嘘( brag的过去式和过去分词 ) | |
参考例句: |
|
|
3 clearance | |
n.净空;许可(证);清算;清除,清理 | |
参考例句: |
|
|
4 expertise | |
n.专门知识(或技能等),专长 | |
参考例句: |
|
|
5 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
6 plundered | |
掠夺,抢劫( plunder的过去式和过去分词 ) | |
参考例句: |
|
|
7 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
8 hijacked | |
劫持( hijack的过去式和过去分词 ); 绑架; 拦路抢劫; 操纵(会议等,以推销自己的意图) | |
参考例句: |
|
|
9 conundrum | |
n.谜语;难题 | |
参考例句: |
|
|
10 ongoing | |
adj.进行中的,前进的 | |
参考例句: |
|
|
11 bemoans | |
v.为(某人或某事)抱怨( bemoan的第三人称单数 );悲悼;为…恸哭;哀叹 | |
参考例句: |
|
|
12 gratuitous | |
adj.无偿的,免费的;无缘无故的,不必要的 | |
参考例句: |
|
|
13 axis | |
n.轴,轴线,中心线;坐标轴,基准线 | |
参考例句: |
|
|
14 rhetoric | |
n.修辞学,浮夸之言语 | |
参考例句: |
|
|
15 necessitates | |
使…成为必要,需要( necessitate的第三人称单数 ) | |
参考例句: |
|
|
16 envoy | |
n.使节,使者,代表,公使 | |
参考例句: |
|
|
17 kit | |
n.用具包,成套工具;随身携带物 | |
参考例句: |
|
|
18 curb | |
n.场外证券市场,场外交易;vt.制止,抑制 | |
参考例句: |
|
|
19 blackmail | |
n.讹诈,敲诈,勒索,胁迫,恫吓 | |
参考例句: |
|
|
20 confidential | |
adj.秘(机)密的,表示信任的,担任机密工作的 | |
参考例句: |
|
|
21 hijacking | |
n. 劫持, 抢劫 动词hijack的现在分词形式 | |
参考例句: |
|
|
22 jointly | |
ad.联合地,共同地 | |
参考例句: |
|
|
23 investigation | |
n.调查,调查研究 | |
参考例句: |
|
|