时间:2018-11-29 作者:英语课 分类:VOA2005(下)--环境科学探索


英语课

Cyber Crime Preys 1 on All Internet Users


计算机犯罪瞄准所有网络使用者


 


Every time you turn on the computer and get online, experts say, you are a potential victim of cyber crime.


 


The Internet Storm Center is a volunteer group that guards against criminal activity online.  It is run by Marc Sachs. 


 


Marc Sachs: For the criminal world it's what we like to call a perfect storm. We have an Internet that is almost completely anonymous 2, perfect for criminal activity.  We have an Internet that’s largely ungoverned.


 


Dan Larkin heads the Internet Crime Complaint Center at the Federal Bureau of Investigation 3, or FBI.  He battles cyber crime daily, and says it is diverse and global. 


 


Dan Larkin: We have a substantial piece of cyber crime that emanates 5 from West Africa, no surprise, Eastern Europe, Russia, some in Asia and South America as well.


 


These rings, and cyber criminals here in the United States, are involved in schemes that run the gamut 6 from identity theft, to intellectual piracy 7, to sex crimes, fraud schemes, hacking 8, spamming, you name it… it is being done. But here is the surprising part: home users are usually unwitting accomplices 10.


 


Marc Sachs: We've got millions of users who don't keep their computer systems updated, who don't run anti-virus [software], who go to websites, download software [and] they don't know what they are downloading.


 


Experts say criminals are counting on that. When users do not update their systems, or use firewalls for protection, their computers can help spread viruses and worms, or invite trouble by downloading what are known as Trojans, some of which help spread chaos 11.


 


Marc Sachs: Overnight your home machine, which is just sitting there silently consuming power, is actually sending out thousands of unsolicited e-mail messages and you don't even know it's happening.


 


The aim of some of the malicious 12 e-mail or spam is to lure 13 the user into clicking on a particular site or attachment 14. It's called "phishing" in the cyber world, and criminals use all kinds of schemes to reel the user in. The purpose of these schemes is almost always to get money, or steal someone's identity.  


 


Dan Larkin: …inviting you to go to your bank, or go to your E-Bay account, or go to some other account that they hope you have and update something with regard to your personal profile or your financial or personal data.


 


Identity theft is a huge piece of cyber crime. The best-publicized cases -- with potential losses in the millions of dollars -- have been breaches 15 in corporate 16 computer networks. But home users and home computers are also at risk.


 


Every time you visit a website or click on an attachment, for example, you may be downloading a Trojan capable of stealing personal information. 


 


Called the Keylogger, it watches and records keystrokes waiting for you to access a bank site or retail 17 online.


 


March Sachs of the Internet Storm Center explains. 


 


March Sachs: It knows that within first 50 or 100-some odd key strokes, I'm likely to type in my user name, my password, mothers maiden 18 name, a credit card number, a PIN [personal identification] number, or other things.


 


Dan Larkin: The goal is to capture that, store it somewhere or transmit that information to another site for use in an identity theft or account takeover.


 


Dan Larkin of the FBI's Internet Crime Complaint Center says Russian cyber criminals used the Keylogger to take over thousands of identifications before they were put out of business last summer. 


 


International shipping 19 is another cyber crime scheme sweeping 20 across the United States.


 


Dan Larkin: We identified thousands of locations in the U.S. that were individuals and organizations that were being recruited and being used as reshippers.  


 


They were all connected to a Nigerian cyber crime ring that used stolen financial data to buy millions of dollars worth of goods and services to sell overseas. To avoid raising suspicion, they had first shipped goods to the recruited U.S. citizens they called "mules 21."


 


Dan Larkin: They would recruit somebody from the U.S. to receive the package so that the shipping label and address will look domestic, the guard would drop a bit from the merchant and they would let the package be shipped, only to find next day it had been reshipped -- overnighted -- and out of country to Nigeria.


 


The ring was eventually broken up, but it's one more example of the scope and ingenuity 22 of Internet crime.


 


Cracking down on cyber criminals is an ongoing 23 collaborative effort among international law enforcement officials, online retailers 24, and private and volunteer computer security groups. 


 


Personal computer users can do their part, too.  Experts say, keep your computers protected and updated. The FBI also recommends you visit the Internet Crime Complaint Center at www.ic3.gov to report suspicious activity and learn about the latest scheme in cyber space.


 


I’m Nahedah Zayed for VOA news.


 


注释:


cyber crime [5saibE5kraim] n. 计算机犯罪


anonymous [E5nCnimEs] adj. 匿名的


emanate 4 [5emEneit] vi. 发出,发源


spamming 兜售信息[邮件,广告,新闻,文章],与垃圾邮件(junk mail)同义


unwitting [Qn5witiN] adj. 不知情的


accomplice 9 [E5kCmplis] n. 同谋者,帮凶


worms [wE:mz] n. 计算机网络“蠕虫”病毒


unsolicited [5QnsE5lisitid] adj. 未被恳求的,主动提供的


keystroke [5ki:strEuk] n. []键击,按键



1 preys
v.掠食( prey的第三人称单数 );掠食;折磨;(人)靠欺诈为生
  • His misfortune preys upon his mind. 他的不幸使她心中苦恼。 来自辞典例句
  • The owl preys on mice. 猫头鹰捕食老鼠。 来自辞典例句
2 anonymous
adj.无名的;匿名的;无特色的
  • Sending anonymous letters is a cowardly act.寄匿名信是懦夫的行为。
  • The author wishes to remain anonymous.作者希望姓名不公开。
3 investigation
n.调查,调查研究
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
4 emanate
v.发自,来自,出自
  • Waves emanate from the same atom source.波是由同一原子辐射的。
  • These chemicals can emanate certain poisonous gases.这些化学药品会散发出某些有毒的气味。
5 emanates
v.从…处传出,传出( emanate的第三人称单数 );产生,表现,显示
  • He emanates power and confidence. 他表现出力量和信心。
  • He emanates sympathy. 他流露出同情。 来自辞典例句
6 gamut
n.全音阶,(一领域的)全部知识
  • The exhibition runs the whole gamut of artistic styles.这次展览包括了所有艺术风格的作品。
  • This poem runs the gamut of emotions from despair to joy.这首诗展现了从绝望到喜悦的感情历程。
7 piracy
n.海盗行为,剽窃,著作权侵害
  • The government has already adopted effective measures against piracy.政府已采取有效措施惩治盗版行为。
  • They made the place a notorious centre of piracy.他们把这地方变成了臭名昭著的海盗中心。
8 hacking
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
9 accomplice
n.从犯,帮凶,同谋
  • She was her husband's accomplice in murdering a rich old man.她是她丈夫谋杀一个老富翁的帮凶。
  • He is suspected as an accomplice of the murder.他涉嫌为这次凶杀案的同谋。
10 accomplices
从犯,帮凶,同谋( accomplice的名词复数 )
  • He was given away by one of his accomplices. 他被一个同伙出卖了。
  • The chief criminals shall be punished without fail, those who are accomplices under duress shall go unpunished and those who perform deeds of merIt'shall be rewarded. 首恶必办, 胁从不问,立功受奖。
11 chaos
n.混乱,无秩序
  • After the failure of electricity supply the city was in chaos.停电后,城市一片混乱。
  • The typhoon left chaos behind it.台风后一片混乱。
12 malicious
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
13 lure
n.吸引人的东西,诱惑物;vt.引诱,吸引
  • Life in big cities is a lure for many country boys.大城市的生活吸引着许多乡下小伙子。
  • He couldn't resist the lure of money.他不能抵制金钱的诱惑。
14 attachment
n.附属物,附件;依恋;依附
  • She has a great attachment to her sister.她十分依恋她的姐姐。
  • She's on attachment to the Ministry of Defense.她现在隶属于国防部。
15 breaches
破坏( breach的名词复数 ); 破裂; 缺口; 违背
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
16 corporate
adj.共同的,全体的;公司的,企业的
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
17 retail
v./n.零售;adv.以零售价格
  • In this shop they retail tobacco and sweets.这家铺子零售香烟和糖果。
  • These shoes retail at 10 yuan a pair.这些鞋子零卖10元一双。
18 maiden
n.少女,处女;adj.未婚的,纯洁的,无经验的
  • The prince fell in love with a fair young maiden.王子爱上了一位年轻美丽的少女。
  • The aircraft makes its maiden flight tomorrow.这架飞机明天首航。
19 shipping
n.船运(发货,运输,乘船)
  • We struck a bargain with an American shipping firm.我们和一家美国船运公司谈成了一笔生意。
  • There's a shipping charge of £5 added to the price.价格之外另加五英镑运输费。
20 sweeping
adj.范围广大的,一扫无遗的
  • The citizens voted for sweeping reforms.公民投票支持全面的改革。
  • Can you hear the wind sweeping through the branches?你能听到风掠过树枝的声音吗?
21 mules
骡( mule的名词复数 ); 拖鞋; 顽固的人; 越境运毒者
  • The cart was pulled by two mules. 两匹骡子拉这辆大车。
  • She wore tight trousers and high-heeled mules. 她穿紧身裤和拖鞋式高跟鞋。
22 ingenuity
n.别出心裁;善于发明创造
  • The boy showed ingenuity in making toys.那个小男孩做玩具很有创造力。
  • I admire your ingenuity and perseverance.我钦佩你的别出心裁和毅力。
23 ongoing
adj.进行中的,前进的
  • The problem is ongoing.这个问题尚未解决。
  • The issues raised in the report relate directly to Age Concern's ongoing work in this area.报告中提出的问题与“关心老人”组织在这方面正在做的工作有直接的关系。
24 retailers
零售商,零售店( retailer的名词复数 )
  • High street retailers reported a marked increase in sales before Christmas. 商业街的零售商报告说圣诞节前销售量显著提高。
  • Retailers have a statutory duty to provide goods suitable for their purpose. 零售商有为他们提供符合要求的货品的法定义务。
学英语单词
a tidal wave of crime
a twopenny halfpenny affair
Abel-beth-maachah
additive rate
after hours value
alnicoes
ammonium mucate
Amphibicorisae
anemia of myxedema
angle shot
antitechnologist
application valve pin
as suwar
ashen-faceds
at stake
auto-releaser
automatic spray washer
baaron
be immersed in
Bendazle
BRL-17421
Bukuishi
Bull Moose Party
cholesteatoma
civil commotion
close to tears
confirmation order
Corona Borealis Cluster
culhaven
D line
data bucket
digital scale
diphosphoinositides
dissatisfied customer
dognap
don't give me that
dorbank
drug-administration
elbow meter
entropy of the endomorphism
epencephala
flindosies
Gauss model
get off lightly
globe pliers
Gouves
Helmholtz-Lagrange theorem
hime
horizontal strip borer
Hyalellidae
hydaticus vittatus
ilesa
incapacitative
incidental inclusion
interests of the whole
international debt
kinara
metigate
molybdenum(iv) fluoride
monosized
morn
multihead automatic arc welding machine
non-educational
NZ claw type coupling
open systems interconnection architecture
ovatus crataegarius
overwinds
pachylaelaps squamosus
panel filling
Parisier-Parr-Pople method
phosphorin
pipe-to-soil potential
pododynamometer
Pooftas
prayering
Pseudaspidodera
rawa
saaddine
secondary test
secured loan
semiconductor thermoresistance
shrugged
Signal Needle Code
slipper spurge
sociology of leisure
speed-in
spruemaster
strength of joint
structural retrieval
sundel
thermoluminescent dosimetry
toughened polystyrene resin
tracheloplasty
transonic wing design
transverse carpal ligament
trim joist
unbuttonings
Viscum monoicum
voice band
Wakuya
Walpeup
yucca