手机APP下载

您现在的位置: 首页 > 在线广播 > PBS高端访谈 > PBS访谈商业系列 > 正文

PBS高端访谈:维基解密揭示CIA是如何攻击智能手机和电视的

来源:pbs 编辑:max   可可英语APP下载 |  可可官方微信:ikekenet
  


扫描二维码可进行跟读训练
  下载MP3到电脑  [F8键暂停/播放]   批量下载MP3到手机

JUDY WOODRUFF: As we just discussed, WikiLeaks today did publish thousands of pages of what it says are files about the CIA and its hacking activities.

Jeffrey Brown has our further look.

JEFFREY BROWN: The material comes from the CIA's Center for Cyber Intelligence. It includes a range of documents from 2013 to 2016 which describe cyber-tools for hacking cell phones, computers, television, and even vehicles.

The documents also contain computer code. One program, dubbed Weeping Angel, entails infecting Samsung smart TVs, turning them into bugging devices. Another program is aimed at hacking Apple and Android cell phones, undercutting encryption on services like WhatsApp, Signal, and Telegram.

WikiLeaks also says these documents show that when the CIA discovered flaws in computer code written by Apple, Google or Samsung, it failed to notify those companies about the vulnerabilities to allow fixes to be made.

Mark Mazzetti of The New York Times has been covering this, and joins us now.

Mark, welcome to you.

So, the CIA hasn't said much so far. What do we know about the authenticity of the documents and where they came from?

MARK MAZZETTI, The New York Times: Well, we're still trying to confirm the authenticity.

We have several people we have spoken to today who say they believe they're authentic. We have heard nothing thus far from the government indicating that they are not. Some people we have spoken to have said that some of the code names that were cited in the documents are, indeed, legitimate.

So it does appear at the moment — and I should say at the moment — that they are legitimate.

JEFFREY BROWN: Well, when you look at the totality, Mark, of all of these cyber-tools that being described, help us understand, what are they aimed at? What is this program about?

MARK MAZZETTI: Well, they're a series of — and we're talking about thousands of documents that are laying out some of the tools the CIA allegedly has to carry out hacking of any number of different devices, as you said, cars, against foreign adversaries or people overseas.

I should stress that there is — unlike the Snowden disclosures, there were not specific mentions of where these have been used. But they're more sort of like the toolkit the CIA has. And it's pretty expansive, if the documents are to be believed.

And in terms of where they came from, you asked. I mean, that's another thing we're still trying to figure out. WikiLeaks said today that they had a source come to them who was concerned about the use of these tools. We don't know anything about the source. And there's a lot of questions still at the moment.

维基解密揭示CIA是如何攻击智能手机和电视的

JEFFREY BROWN: WikiLeaks said that it had redacted some names and some information in its release. But how potentially damaging is this to the CIA?

MARK MAZZETTI: Well, again, if they're confirmed to be true, any revelations about actual capabilities that the CIA or any other intelligence agency has would limit the ability of the agency to continue to do those activities.

You saw that to a degree with Snowden and others. And so that is where the concern is, that you will have a lot of — these tools may not be used because they're now revealed. But, again, we have to — we still have to report out exactly, you know, what has been used and, to a large extent, how much of this is actual truth.

JEFFREY BROWN: Yes, and I realize so much of that is going on.

I mentioned one particular program, which is the Weeping Angel, using Samsung smart televisions as covert listening devices. But that's one concrete example that's come out today.

MARK MAZZETTI: Yes.

And the — in a nutshell, the idea was that the Samsung smart TVs have a feature that allowed access to the Internet, and by having this — you're basically turning this smart feature on. The CIA is turning it into a microphone and allowing eavesdropping in a home.

And another thing you cited was questions about the ability of the agency's hackers to sort of sort of bypass traditional encryption and very popular encryption software like Signal or WhatsApp.

The idea is not that the programs themselves are hacked or compromised. It's that, if you're in the phone, if the CIA were to be in the phone, they would be able to get the data before it was then encrypted by these applications.

JEFFREY BROWN: And just, Mark, in 10 seconds, in a word here, so much of the attention has been on the NSA programs in the past. Is it a surprise to learn that the CIA may have its own program?

MARK MAZZETTI: Well, it's pretty well known that the CIA has been building up this capability and are determined to because they see computer hacking and computer cyber-warfare as the future.

So, they are very much in that game.

JEFFREY BROWN: All right, Mark Mazzetti of The New York Times, thank you very much.

MARK MAZZETTI: Thank you.

重点单词   查看全部解释    
release [ri'li:s]

想一想再看

n. 释放,让渡,发行
vt. 释放,让与,准

联想记忆
determined [di'tə:mind]

想一想再看

adj. 坚毅的,下定决心的

 
particular [pə'tikjulə]

想一想再看

adj. 特殊的,特别的,特定的,挑剔的
n.

联想记忆
confirmed [kən'fə:md]

想一想再看

adj. 习惯的,积习的,确认过的,证实的 动词conf

 
range [reindʒ]

想一想再看

n. 范围,行列,射程,山脉,一系列
v. 排

 
concerned [kən'sə:nd]

想一想再看

adj. 担忧的,关心的

 
intelligence [in'telidʒəns]

想一想再看

n. 理解力,智力
n. 情报,情报工作,情报

联想记忆
specific [spi'sifik]

想一想再看

adj. 特殊的,明确的,具有特效的
n. 特

联想记忆
understand [.ʌndə'stænd]

想一想再看

vt. 理解,懂,听说,获悉,将 ... 理解为,认为<

 
popular ['pɔpjulə]

想一想再看

adj. 流行的,大众的,通俗的,受欢迎的

联想记忆

发布评论我来说2句

    最新文章

    可可英语官方微信(微信号:ikekenet)

    每天向大家推送短小精悍的英语学习资料.

    添加方式1.扫描上方可可官方微信二维码。
    添加方式2.搜索微信号ikekenet添加即可。