时间:2018-11-29 作者:英语课 分类:VOA2005(下)--环境科学探索


英语课

Cyber Crime Preys 1 on All Internet Users


计算机犯罪瞄准所有网络使用者


 


Every time you turn on the computer and get online, experts say, you are a potential victim of cyber crime.


 


The Internet Storm Center is a volunteer group that guards against criminal activity online.  It is run by Marc Sachs. 


 


Marc Sachs: For the criminal world it's what we like to call a perfect storm. We have an Internet that is almost completely anonymous 2, perfect for criminal activity.  We have an Internet that’s largely ungoverned.


 


Dan Larkin heads the Internet Crime Complaint Center at the Federal Bureau of Investigation 3, or FBI.  He battles cyber crime daily, and says it is diverse and global. 


 


Dan Larkin: We have a substantial piece of cyber crime that emanates 5 from West Africa, no surprise, Eastern Europe, Russia, some in Asia and South America as well.


 


These rings, and cyber criminals here in the United States, are involved in schemes that run the gamut 6 from identity theft, to intellectual piracy 7, to sex crimes, fraud schemes, hacking 8, spamming, you name it… it is being done. But here is the surprising part: home users are usually unwitting accomplices 10.


 


Marc Sachs: We've got millions of users who don't keep their computer systems updated, who don't run anti-virus [software], who go to websites, download software [and] they don't know what they are downloading.


 


Experts say criminals are counting on that. When users do not update their systems, or use firewalls for protection, their computers can help spread viruses and worms, or invite trouble by downloading what are known as Trojans, some of which help spread chaos 11.


 


Marc Sachs: Overnight your home machine, which is just sitting there silently consuming power, is actually sending out thousands of unsolicited e-mail messages and you don't even know it's happening.


 


The aim of some of the malicious 12 e-mail or spam is to lure 13 the user into clicking on a particular site or attachment 14. It's called "phishing" in the cyber world, and criminals use all kinds of schemes to reel the user in. The purpose of these schemes is almost always to get money, or steal someone's identity.  


 


Dan Larkin: …inviting you to go to your bank, or go to your E-Bay account, or go to some other account that they hope you have and update something with regard to your personal profile or your financial or personal data.


 


Identity theft is a huge piece of cyber crime. The best-publicized cases -- with potential losses in the millions of dollars -- have been breaches 15 in corporate 16 computer networks. But home users and home computers are also at risk.


 


Every time you visit a website or click on an attachment, for example, you may be downloading a Trojan capable of stealing personal information. 


 


Called the Keylogger, it watches and records keystrokes waiting for you to access a bank site or retail 17 online.


 


March Sachs of the Internet Storm Center explains. 


 


March Sachs: It knows that within first 50 or 100-some odd key strokes, I'm likely to type in my user name, my password, mothers maiden 18 name, a credit card number, a PIN [personal identification] number, or other things.


 


Dan Larkin: The goal is to capture that, store it somewhere or transmit that information to another site for use in an identity theft or account takeover.


 


Dan Larkin of the FBI's Internet Crime Complaint Center says Russian cyber criminals used the Keylogger to take over thousands of identifications before they were put out of business last summer. 


 


International shipping 19 is another cyber crime scheme sweeping 20 across the United States.


 


Dan Larkin: We identified thousands of locations in the U.S. that were individuals and organizations that were being recruited and being used as reshippers.  


 


They were all connected to a Nigerian cyber crime ring that used stolen financial data to buy millions of dollars worth of goods and services to sell overseas. To avoid raising suspicion, they had first shipped goods to the recruited U.S. citizens they called "mules 21."


 


Dan Larkin: They would recruit somebody from the U.S. to receive the package so that the shipping label and address will look domestic, the guard would drop a bit from the merchant and they would let the package be shipped, only to find next day it had been reshipped -- overnighted -- and out of country to Nigeria.


 


The ring was eventually broken up, but it's one more example of the scope and ingenuity 22 of Internet crime.


 


Cracking down on cyber criminals is an ongoing 23 collaborative effort among international law enforcement officials, online retailers 24, and private and volunteer computer security groups. 


 


Personal computer users can do their part, too.  Experts say, keep your computers protected and updated. The FBI also recommends you visit the Internet Crime Complaint Center at www.ic3.gov to report suspicious activity and learn about the latest scheme in cyber space.


 


I’m Nahedah Zayed for VOA news.


 


注释:


cyber crime [5saibE5kraim] n. 计算机犯罪


anonymous [E5nCnimEs] adj. 匿名的


emanate 4 [5emEneit] vi. 发出,发源


spamming 兜售信息[邮件,广告,新闻,文章],与垃圾邮件(junk mail)同义


unwitting [Qn5witiN] adj. 不知情的


accomplice 9 [E5kCmplis] n. 同谋者,帮凶


worms [wE:mz] n. 计算机网络“蠕虫”病毒


unsolicited [5QnsE5lisitid] adj. 未被恳求的,主动提供的


keystroke [5ki:strEuk] n. []键击,按键



1 preys
v.掠食( prey的第三人称单数 );掠食;折磨;(人)靠欺诈为生
  • His misfortune preys upon his mind. 他的不幸使她心中苦恼。 来自辞典例句
  • The owl preys on mice. 猫头鹰捕食老鼠。 来自辞典例句
2 anonymous
adj.无名的;匿名的;无特色的
  • Sending anonymous letters is a cowardly act.寄匿名信是懦夫的行为。
  • The author wishes to remain anonymous.作者希望姓名不公开。
3 investigation
n.调查,调查研究
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
4 emanate
v.发自,来自,出自
  • Waves emanate from the same atom source.波是由同一原子辐射的。
  • These chemicals can emanate certain poisonous gases.这些化学药品会散发出某些有毒的气味。
5 emanates
v.从…处传出,传出( emanate的第三人称单数 );产生,表现,显示
  • He emanates power and confidence. 他表现出力量和信心。
  • He emanates sympathy. 他流露出同情。 来自辞典例句
6 gamut
n.全音阶,(一领域的)全部知识
  • The exhibition runs the whole gamut of artistic styles.这次展览包括了所有艺术风格的作品。
  • This poem runs the gamut of emotions from despair to joy.这首诗展现了从绝望到喜悦的感情历程。
7 piracy
n.海盗行为,剽窃,著作权侵害
  • The government has already adopted effective measures against piracy.政府已采取有效措施惩治盗版行为。
  • They made the place a notorious centre of piracy.他们把这地方变成了臭名昭著的海盗中心。
8 hacking
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
9 accomplice
n.从犯,帮凶,同谋
  • She was her husband's accomplice in murdering a rich old man.她是她丈夫谋杀一个老富翁的帮凶。
  • He is suspected as an accomplice of the murder.他涉嫌为这次凶杀案的同谋。
10 accomplices
从犯,帮凶,同谋( accomplice的名词复数 )
  • He was given away by one of his accomplices. 他被一个同伙出卖了。
  • The chief criminals shall be punished without fail, those who are accomplices under duress shall go unpunished and those who perform deeds of merIt'shall be rewarded. 首恶必办, 胁从不问,立功受奖。
11 chaos
n.混乱,无秩序
  • After the failure of electricity supply the city was in chaos.停电后,城市一片混乱。
  • The typhoon left chaos behind it.台风后一片混乱。
12 malicious
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
13 lure
n.吸引人的东西,诱惑物;vt.引诱,吸引
  • Life in big cities is a lure for many country boys.大城市的生活吸引着许多乡下小伙子。
  • He couldn't resist the lure of money.他不能抵制金钱的诱惑。
14 attachment
n.附属物,附件;依恋;依附
  • She has a great attachment to her sister.她十分依恋她的姐姐。
  • She's on attachment to the Ministry of Defense.她现在隶属于国防部。
15 breaches
破坏( breach的名词复数 ); 破裂; 缺口; 违背
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
16 corporate
adj.共同的,全体的;公司的,企业的
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
17 retail
v./n.零售;adv.以零售价格
  • In this shop they retail tobacco and sweets.这家铺子零售香烟和糖果。
  • These shoes retail at 10 yuan a pair.这些鞋子零卖10元一双。
18 maiden
n.少女,处女;adj.未婚的,纯洁的,无经验的
  • The prince fell in love with a fair young maiden.王子爱上了一位年轻美丽的少女。
  • The aircraft makes its maiden flight tomorrow.这架飞机明天首航。
19 shipping
n.船运(发货,运输,乘船)
  • We struck a bargain with an American shipping firm.我们和一家美国船运公司谈成了一笔生意。
  • There's a shipping charge of £5 added to the price.价格之外另加五英镑运输费。
20 sweeping
adj.范围广大的,一扫无遗的
  • The citizens voted for sweeping reforms.公民投票支持全面的改革。
  • Can you hear the wind sweeping through the branches?你能听到风掠过树枝的声音吗?
21 mules
骡( mule的名词复数 ); 拖鞋; 顽固的人; 越境运毒者
  • The cart was pulled by two mules. 两匹骡子拉这辆大车。
  • She wore tight trousers and high-heeled mules. 她穿紧身裤和拖鞋式高跟鞋。
22 ingenuity
n.别出心裁;善于发明创造
  • The boy showed ingenuity in making toys.那个小男孩做玩具很有创造力。
  • I admire your ingenuity and perseverance.我钦佩你的别出心裁和毅力。
23 ongoing
adj.进行中的,前进的
  • The problem is ongoing.这个问题尚未解决。
  • The issues raised in the report relate directly to Age Concern's ongoing work in this area.报告中提出的问题与“关心老人”组织在这方面正在做的工作有直接的关系。
24 retailers
零售商,零售店( retailer的名词复数 )
  • High street retailers reported a marked increase in sales before Christmas. 商业街的零售商报告说圣诞节前销售量显著提高。
  • Retailers have a statutory duty to provide goods suitable for their purpose. 零售商有为他们提供符合要求的货品的法定义务。
学英语单词
a poor snake
abstract entity
adlects
aerosoloscope
altar tomb
alternicirrhosum
apogon semilineatus
appetite for
aziethylene
Badarian
bear yourself
below cutoff attenuator
benzylisopropyl acetate
Bretagne-d'Armagnac
buckwagon
cable clench
cargo supervision and control
Carpobrotus
cast up the gorge at
cocoplum
connectible
coulteri
cross linking agent
crudding
depreciation composite life method
deubiquitinated
Dirty Harry
double belting
force of adhesion
forging temperature
frogurt
harmonized
head of pressure
heat penetration
heavy-wall pipe
hypothesis of horizontal movement
idiographic psychology
inflammable substance
injudiciousness
instrument capsule
intercrystallization
Kong Oscars Fd.
label carrier
LDS churches
light emitting screen
list mill
logorrhea
maize gluten feed
manufacture on a large scale
margelan
meadow lark
mechanical davit
menara
Merecry
meturgeman
minidump
mito-
multi wall
multichannel communication system
multiple-address space partition
muscle accentuated
nailbeds
normal Gaussian distribution function
oriented path
Pang Long
pasteurized
Pioneer Mountains
population regression parameters
prewetting
priority of system task
product-oriented
psychostimulant
pupillo-
raft of timber
ragandboneman
ramigenous
ratio of current assets to total assets
re-distributions
re-orienting
rechendorff
reducants
rocoa
royalty-free transfer
Russell-Silver syndrome
Sabina przewalskii
Septuagintal
shocketh
single-shaft mixer
skin the same old coon
solenocera crassicornis
Stratum circulare
subsea cable
substance manufacturer identifier
switched service
target destruction
thyro-laryngeal artery(or anterior thyroid artery)
translatrices
undivert
us buffet
Versarol
vignetted dot contact film screen
ziss