时间:2018-12-27 作者:英语课 分类:一起听英语


英语课

网络的发展,给我们带来便利的同时,也带来了问题。其中之一就是网络犯罪....


Dan: Hello, I'm Dan.


Rob: And I'm Rob.


Dan: And this is 6 Minute English! This week we're talking about cyber crime.


Rob: Yes, cyber crime. It's something we're hearing more and more about. This is


crime that takes place over a computer network.


Dan: Rob, have you ever been the victim of cyber crime?


Rob: Well, I don't think so. I always use security software on my computer and keep


all my passwords private.


Dan: That's a good idea. I do the same but it still seems possible for hackers 1 to


access our computers. More on that in a minute but first I have a question for


you, Rob.


Rob: I thought you might!


Dan: Well, here goes. According to a recent UK government study, how much does


cyber crime cost the UK economy? Is it:


a) £27 million a year


b) £27 billion a year, or 


6 Minute English © bbclearningenglish.com 2011


Page 2 of 7


c) £270 billion a year


Rob: I’d take a guess at £27 million a year.


Dan: OK, well, as usual, I'll tell you the correct answer at the end of the programme.


Now let's talk a bit more about what's happening in the world of cyber crime.


Rob: This online crime is becoming more commercialised and this is what experts


were recently discussing at a meeting in London.


Dan: So criminals are carrying out illegal practices online and cashing in on them


by selling their services to other people.


Rob: And internet security experts want to stop this.


Dan: That’s right. They're calling it a cyber war. It's a sort of virtual war. But who


exactly are they fighting?


Rob: Well, it's computer hackers, many of who are teenagers working on their


computers at home.


Dan: But there's a worry their work is overlapping 2 with the world of criminal


networks. And Charlie McMurdy of the Police Central e-crime Unit says this


work is international. 


6 Minute English © bbclearningenglish.com 2011


Page 3 of 7


Insert 1: Charlie McMurdy, Police Central e-crime Unit


Every investigation 3 has international aspects to it. You don't have to, like your old, say,


the armed robbery team who used to meet in the dark and dangerous pub… Well, on


the internet you can meet virtually and work as a criminal enterprise, even though


you’re in different parts of the world.


Dan: Charlie McMurdy says cyber crime is different from old fashioned crimes.


Criminals can meet virtually anywhere and work as a criminal enterprise - like


a business.


Rob: So they meet virtually. They don't meet physically 4, face to face, but they


communicate via the internet.


Dan: Yes. It's a big problem. Did you know there are nine new unique threats


detected every second in cyberspace 5?


Rob: Wow, that is a lot. And what exactly do they do?


Dan: Well, they are hijacking 6 - or taking over - home computers and turning them


in to botnets.


Rob: Botnets - tell us more about that, Dan.


Dan: Well, these are a network of computers taken over by hackers and used for


malicious 7 purposes. They infect the computers with software that enables


them to control them remotely.


Rob: And this sort of activity is becoming more commercialised? 


6 Minute English © bbclearningenglish.com 2011


Page 4 of 7


Dan: It is. Tony Osborn from security company Symantec uses another word,


'industrialised'.


Insert 2: Tony Osborn, Symantec


What we’ve found over the last few years is a maturing, so it's like the industrialisation


of this business. Part of one organisation 8 might be selling botnet facilities, so you can


rent our botnet for $100 or whatever, and that will give you access to these number of


devices. And that you give us the malicious code, the malware, the spam and we will


inject that into the botnets, and for a period of time we will then send those out.


Dan: Tony Osborn says the business is maturing.


Rob: So that means it's fully 9 developed and it's becoming big business. One


example is hackers renting out access to botnets. They give you access to a


number of devices for a fee - for money.


Dan: And then they inject your malicious codes, malware and spam into other


people's computers.


Rob: Spam. That's when you send the same message indiscriminately to a large


numbers of recipients 10 on the Internet.


Dan: And we don't have much control over this. But the UK government is planning


to spend £650 million on improving cyber security. But what should it be spent


on? John Bassett from the Royal United Services Institute thinks there are


number of priorities.


6 Minute English © bbclearningenglish.com 2011


Page 5 of 7


Insert 3: John Bassett, Royal United Services Institute


How that is going to be spent in the context of the Ministry 11 of Defence, how that's going


to be spent in terms of network defence overall. What's going to be done in terms of


public awareness 12, what are we going to do about bringing on more cyber experts? All


four of those, I think, are important and the cornerstone of good cyber security has to be


based on education.


Dan: So John Bassett is talking about areas of cyber security where he thinks money


could be spent. And he talked about education and public awareness.


Rob: Public awareness is all about educating people on good cyber security. The


risks from cyber crime are everywhere, from fraud to espionage 13 and even


cyber warfare 14.


Dan: It seems to be the big crime of the 21st century and it's costing us a lot of


money.


Rob: That's right, and Dan, earlier you asked me a question. According to a UK


government study, how much is it costing the economy? £27 million a year,


£27 billion a year or £270 billion a year?


Dan: And you said?


Rob: I said £27 million a year. Am I right?


Dan: No, you’re not! It's actually £27 billion a year, and that's a lot of money.


Rob: It really is, isn’t it, yeah. 


6 Minute English © bbclearningenglish.com 2011


Page 6 of 7


Dan: OK, Rob, well, before we go, let’s hear some of the words and phrases that


we’ve used in today’s programme.


Rob: cyber crime


 hackers


 commercialised


 cashing in


 enterprise


 hijack


 botnets


 malicious


 industrialised


 espionage


Dan: Thanks, Rob. Well, we hope you’ve found today's 6 Minute English interesting


- and that you’ll join us again next time.


Both: Bye.



1 hackers
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
2 overlapping
adj./n.交迭(的)
  • There is no overlapping question between the two courses. 这两门课程之间不存在重叠的问题。
  • A trimetrogon strip is composed of three rows of overlapping. 三镜头摄影航线为三排重迭的象片所组成。
3 investigation
n.调查,调查研究
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
4 physically
adj.物质上,体格上,身体上,按自然规律
  • He was out of sorts physically,as well as disordered mentally.他浑身不舒服,心绪也很乱。
  • Every time I think about it I feel physically sick.一想起那件事我就感到极恶心。
5 cyberspace
n.虚拟信息空间,网络空间,计算机化世界
  • She travels in cyberspace by sending messages to friends around the world.她利用电子空间给世界各地的朋友们发送信件。
  • The teens spend more time in cyberspace than in the real world of friends and family.青少年花费在电脑上的时间比他们和真正的朋友及家人在一起的时间要多。
6 hijacking
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
7 organisation
n.组织,安排,团体,有机休
  • The method of his organisation work is worth commending.他的组织工作的方法值得称道。
  • His application for membership of the organisation was rejected.他想要加入该组织的申请遭到了拒绝。
8 fully
adv.完全地,全部地,彻底地;充分地
  • The doctor asked me to breathe in,then to breathe out fully.医生让我先吸气,然后全部呼出。
  • They soon became fully integrated into the local community.他们很快就完全融入了当地人的圈子。
9 recipients
adj.接受的;受领的;容纳的;愿意接受的n.收件人;接受者;受领者;接受器
  • The recipients of the prizes had their names printed in the paper. 获奖者的姓名登在报上。 来自《简明英汉词典》
  • The recipients of prizes had their names printed in the paper. 获奖者名单登在报上。 来自《现代英汉综合大词典》
10 ministry
n.(政府的)部;牧师
  • They sent a deputation to the ministry to complain.他们派了一个代表团到部里投诉。
  • We probed the Air Ministry statements.我们调查了空军部的记录。
11 awareness
n.意识,觉悟,懂事,明智
  • There is a general awareness that smoking is harmful.人们普遍认识到吸烟有害健康。
  • Environmental awareness has increased over the years.这些年来人们的环境意识增强了。
12 espionage
n.间谍行为,谍报活动
  • The authorities have arrested several people suspected of espionage.官方已经逮捕了几个涉嫌从事间谍活动的人。
  • Neither was there any hint of espionage in Hanley's early life.汉利的早期生活也毫无进行间谍活动的迹象。
13 warfare
n.战争(状态);斗争;冲突
  • He addressed the audience on the subject of atomic warfare.他向听众演讲有关原子战争的问题。
  • Their struggle consists mainly in peasant guerrilla warfare.他们的斗争主要是农民游击战。
学英语单词
a watch dog
acusis
acute pulmonary embolism
alas and alack
Alexbow
anti-inflammatory drug
Aolina
automatic block section
azobenzol
baby room
basis of articulation
boardie
branch condition false
brazilian potato trees
calcium hyposulfite
Camaleno
canvas light van
characteristic matrix
checkout test language
circle cartogram
clear juice
commuting winding
Corallodiscus flabellatus
cross-reference report
cylinder output force
cyst sac
cytophylaxis
delicatas
demartini
disap
Elaeagnus geniculata
emery drum wheat scourer
examination of fracture
execution law
extension of pretection
external setting
FACT (factual compiler)
flubdub and gulf
found against
frequency-division audiometer
From Template
funnel plot
geography of production
gigacoulomb
have blood worth bottling
input duct
ion-adsorption resin column
judaicas
Katongo
LIV-BP
lowks
magnetic core gates
master franchisee
measuring pitch
meterological
mid-summer
multi-pressure condenser
naphthalene resin
no-lose
Onychium
osmiums
over investment
paraboloids
PC Postage
pollency
power-boating
producto
pulpatoon
quincke's tubes
ratio of sales to production
reasoning network
renal endothelioma
replacement value accounting
retinal pigment cells
Rhacochilus
sample tree age
Sandborn
saturation logic circuit
sclerectasia
sea breach
securities introducing broker
self-motive
Serbdom
serrating
skewel
software license key
sounding ranging
spring frame of seat
suppressedly
Theroux
thirdbest
tilt ducted propeller
torn-down
trace organic analysis
transverse filter
variable coefficient
vukusic
Wardian case
welt-splitting machine
whip back
zinc oxide eugenol cement