新世纪博士生综合英语Unit5-Crime-in-Cyberspace课文及译文

更新时间:2023-06-21 23:11:26 阅读: 评论:0

Unit5: Crime in Cyberspace
New technogical developments prent unprecedentedthrift opportunities for computer crime.
----- Peter Grabosky
网络犯罪英国学生签证材料
新技术的发展给电脑犯罪带来了前所未有的机会。
----- Peter Grabosky
Robyn Williams: 罗宾·威廉斯
1 Last week, Ockham's Razor was prented by the Director of the Australian Institute of Criminology in Canberra, who reflected on his experience of being burgled偷盗, and how to design homes and business to avoid such an experience. This week we look at theft outside such physical structures: being robbed or otherwi interfered with in cyberspace. There's plenty of risk, but what can you do about it? This is the Director of Rearch at the I
nstitute, Peter Grabosky.
Robyn Williams:
1 上周,澳大利亚堪培拉犯罪学研究所主任演示了奥卡姆剃刀定律,他回忆了自己被盗的经历,并且告诫家庭和公司如何避免此类事件。本周,我们再介绍下此类实质形态之外的盗窃:网络抢劫或网络上的其他干涉行为。网络上存在着大量风险,但是我们应该怎么做呢?这是澳大利亚犯罪学研究所研究部主任,Peter Grabosky
Peter Grabosky:
2 It has almost become trite迂腐 to suggest that we are entering an age as significant and profound 意义深远in its impact as was the Industrial Revolution. When you think about it, the convergence集合 of computing and communications has already affected most, if not all, of the major institutions of society. It has created unprecedented1 opportunities for education, health rvices, recreation and commerce. Unfortunately, it has also created unprecedented2 opportunities for crime. It ems to me that identifying t
he vulnerabilities, and mobilizing appropriate countermeasures will be one of the great challenges of the next century.
2暗示我们现在正进入一个如同工业革命一样具有意义重大而深远的时代几乎可以说是一个老调重弹的话题。当你考虑这个问题时,计算机和通信的融合已经给我们的大多数(即使不是全部)社会机构带来了巨大的影响。这一融合给教育、卫生、娱乐和商业创造了前所未有的机会,不幸的是,它也给犯罪创造了史无前例的机会。在我看来讨论这些负面影响,并且采取合适的对策会是下一个世纪的巨大挑战之一。
3 This challenge is so great that it kbcdefies藐视 the capacity of law enforcement alone to control. Conquently, new forms of policing, involving the harnessing英语经典语句治理 of non-government resources, will become esntial. Given the fact that cyberspace knows no boundaries, and that computer crime often transcends national frontiers边疆, effective countermeasures对策will also require a degree of international co-operation which is without precedent3先例. Let me describe nine types of crime involving information systems as instruments and/or as targets.
这一挑战的威力如此之大以至于仅凭法律执行部门本身的力量来控制是不够的。因此,新的政策形式,包括利用非政府资源,将变得极其重要。考虑到网络无国界和计算机犯罪经常超越国界这一事实,采取有效地对策也将要求国际合作打到一种史无前例的程度。下面我向大家介绍个类型的犯罪,包括把信息系统做为手段和(或)目标。
4 First is Theft of Information Services.
bearingsThe means of stealing telecommunications rvices are diver, and include the 'cloning' of cellular phones, counterfeiting伪造of telephone cards, and unauthorid access to an organisation's telephone switchboard. In one ca, hackers were reported to have obtained access to the telephone facilities of Scotland Yard, and made over a million dollars worth of phone calls.
4 第一种是窃取信息服务。
窃取电信服务的手段是多种多样的,其中包括克隆手机,伪造电话卡,以及未经授权的访问组织的电话总机。在一个案例中,据报道黑客获得了进入伦敦警察厅电话设施的权限,并打了价值超过100万美元的电话。
5 Next are Communications in Furtherance of Criminal Conspiracies阴谋.
Modern information systems clearly provide an effective means by which offenders can communicate in order to plan and execute their activities. There is evidence of information systems being ud to facilitate organid drug trafficking, money laundering, child pornography and trade in weapons. Although the u of information facilities does not cau such illegal conduct to occur, it certainly enhances the speed and ea with which individuals may act together to plan and to execute criminal activity.
5 第二种是通信促进犯罪阴谋。
    很显然,现代信息系统为犯罪分子计划和实施犯罪行为提供了有效的沟通手段。有证据表明,信息系统被用来帮助组织贩毒、洗钱、儿童色情和武器贸易。尽管信息设施的使用不会导致此类非法行为的发生,但它肯定使犯罪分子可以更快速和更容易地共同制定计划和实施犯罪活动。
逃出桃色房间
6 Emerging technologies新技术 of 托辞的意思encryption and high speed data transfer can greatly en
hance the capacity of sophisticated复杂高级 criminal organizations, and place their communications outside the reach of police. Increasingly, police are encountering encrypted communications, and as cryptography密码学 becomes more widely accessible, I predict that its u to conceal criminal communications will increa markedly.
6新的加密技术和高速的数据传输可以大大提高老练的犯罪组织的能力,并且使得他们通信无法被警方破解。警方遇到的加密通信越来越多,并且随着密码学变得越来越普及,我预测运用密码学隐藏犯罪通信的情况将显著增加。
7 Then we have a range of activities to which we collectively共同的refer as Information Piracy口试海盗, Counterfeiting and Forgery伪造.Digital technology permits perfect reproduction of software, text, images, sound, and combinations of the-what we call multi-media content. The potential for copyright never let you goinfringement版权侵犯, falsification伪造 of documents, and fabrication of negotiable instruments流通票据, has never been greater. It is now possible to download compact disks光盘 and feature films故事片 from the Internet.
wink什么意思 Copyright infringement can occur quickly and without difficulty, by anyone, from the comfort of your own home. But I would not encourage you to try it.

本文发布于:2023-06-21 23:11:26,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/90/153019.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:犯罪   网络   组织   设施
相关文章
留言与评论(共有 0 条评论)
   
验证码:
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图