搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
Cyber Crime Preys1 on All Internet Users
计算机犯罪瞄准所有网络使用者
Every time you turn on the computer and get online, experts say, you are a potential victim of cyber crime.
The Internet Storm Center is a volunteer group that guards against criminal activity online. It is run by Marc Sachs.
Marc Sachs: For the criminal world it's what we like to call a perfect storm. We have an Internet that is almost completely anonymous2, perfect for criminal activity. We have an Internet that’s largely ungoverned.
Dan Larkin heads the Internet Crime Complaint Center at the Federal Bureau of Investigation3, or FBI. He battles cyber crime daily, and says it is diverse and global.
Dan Larkin: We have a substantial piece of cyber crime that emanates5 from West Africa, no surprise, Eastern Europe, Russia, some in Asia and South America as well.
These rings, and cyber criminals here in the United States, are involved in schemes that run the gamut6 from identity theft, to intellectual piracy7, to sex crimes, fraud schemes, hacking8, spamming, you name it… it is being done. But here is the surprising part: home users are usually unwitting accomplices10.
Marc Sachs: We've got millions of users who don't keep their computer systems updated, who don't run anti-virus [software], who go to websites, download software [and] they don't know what they are downloading.
Experts say criminals are counting on that. When users do not update their systems, or use firewalls for protection, their computers can help spread viruses and worms, or invite trouble by downloading what are known as Trojans, some of which help spread chaos11.
Marc Sachs: Overnight your home machine, which is just sitting there silently consuming power, is actually sending out thousands of unsolicited e-mail messages and you don't even know it's happening.
The aim of some of the malicious12 e-mail or spam is to lure13 the user into clicking on a particular site or attachment14. It's called "phishing" in the cyber world, and criminals use all kinds of schemes to reel the user in. The purpose of these schemes is almost always to get money, or steal someone's identity.
Dan Larkin: …inviting you to go to your bank, or go to your E-Bay account, or go to some other account that they hope you have and update something with regard to your personal profile or your financial or personal data.
Identity theft is a huge piece of cyber crime. The best-publicized cases -- with potential losses in the millions of dollars -- have been breaches15 in corporate16 computer networks. But home users and home computers are also at risk.
Every time you visit a website or click on an attachment, for example, you may be downloading a Trojan capable of stealing personal information.
Called the Keylogger, it watches and records keystrokes waiting for you to access a bank site or retail17 online.
March Sachs of the Internet Storm Center explains.
March Sachs: It knows that within first 50 or 100-some odd key strokes, I'm likely to type in my user name, my password, mothers maiden18 name, a credit card number, a PIN [personal identification] number, or other things.
Dan Larkin: The goal is to capture that, store it somewhere or transmit that information to another site for use in an identity theft or account takeover.
Dan Larkin of the FBI's Internet Crime Complaint Center says Russian cyber criminals used the Keylogger to take over thousands of identifications before they were put out of business last summer.
International shipping19 is another cyber crime scheme sweeping20 across the United States.
Dan Larkin: We identified thousands of locations in the U.S. that were individuals and organizations that were being recruited and being used as reshippers.
They were all connected to a Nigerian cyber crime ring that used stolen financial data to buy millions of dollars worth of goods and services to sell overseas. To avoid raising suspicion, they had first shipped goods to the recruited U.S. citizens they called "mules21."
Dan Larkin: They would recruit somebody from the U.S. to receive the package so that the shipping label and address will look domestic, the guard would drop a bit from the merchant and they would let the package be shipped, only to find next day it had been reshipped -- overnighted -- and out of country to Nigeria.
The ring was eventually broken up, but it's one more example of the scope and ingenuity22 of Internet crime.
Cracking down on cyber criminals is an ongoing23 collaborative effort among international law enforcement officials, online retailers24, and private and volunteer computer security groups.
Personal computer users can do their part, too. Experts say, keep your computers protected and updated. The FBI also recommends you visit the Internet Crime Complaint Center at www.ic3.gov to report suspicious activity and learn about the latest scheme in cyber space.
I’m Nahedah Zayed for VOA news.
注释:
cyber crime [5saibE5kraim] n. 计算机犯罪
anonymous [E5nCnimEs] adj. 匿名的
spamming 兜售信息[邮件,广告,新闻,文章],与垃圾邮件(junk mail)同义
unwitting [Qn5witiN] adj. 不知情的
accomplice9 [E5kCmplis] n. 同谋者,帮凶
worms [wE:mz] n. 计算机网络“蠕虫”病毒
unsolicited [5QnsE5lisitid] adj. 未被恳求的,主动提供的
keystroke [5ki:strEuk] n. [计]键击,按键
1 preys | |
v.掠食( prey的第三人称单数 );掠食;折磨;(人)靠欺诈为生 | |
参考例句: |
|
|
2 anonymous | |
adj.无名的;匿名的;无特色的 | |
参考例句: |
|
|
3 investigation | |
n.调查,调查研究 | |
参考例句: |
|
|
4 emanate | |
v.发自,来自,出自 | |
参考例句: |
|
|
5 emanates | |
v.从…处传出,传出( emanate的第三人称单数 );产生,表现,显示 | |
参考例句: |
|
|
6 gamut | |
n.全音阶,(一领域的)全部知识 | |
参考例句: |
|
|
7 piracy | |
n.海盗行为,剽窃,著作权侵害 | |
参考例句: |
|
|
8 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
9 accomplice | |
n.从犯,帮凶,同谋 | |
参考例句: |
|
|
10 accomplices | |
从犯,帮凶,同谋( accomplice的名词复数 ) | |
参考例句: |
|
|
11 chaos | |
n.混乱,无秩序 | |
参考例句: |
|
|
12 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
13 lure | |
n.吸引人的东西,诱惑物;vt.引诱,吸引 | |
参考例句: |
|
|
14 attachment | |
n.附属物,附件;依恋;依附 | |
参考例句: |
|
|
15 breaches | |
破坏( breach的名词复数 ); 破裂; 缺口; 违背 | |
参考例句: |
|
|
16 corporate | |
adj.共同的,全体的;公司的,企业的 | |
参考例句: |
|
|
17 retail | |
v./n.零售;adv.以零售价格 | |
参考例句: |
|
|
18 maiden | |
n.少女,处女;adj.未婚的,纯洁的,无经验的 | |
参考例句: |
|
|
19 shipping | |
n.船运(发货,运输,乘船) | |
参考例句: |
|
|
20 sweeping | |
adj.范围广大的,一扫无遗的 | |
参考例句: |
|
|
21 mules | |
骡( mule的名词复数 ); 拖鞋; 顽固的人; 越境运毒者 | |
参考例句: |
|
|
22 ingenuity | |
n.别出心裁;善于发明创造 | |
参考例句: |
|
|
23 ongoing | |
adj.进行中的,前进的 | |
参考例句: |
|
|
24 retailers | |
零售商,零售店( retailer的名词复数 ) | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。