计算机犯罪瞄准所有网络使用者(在线收听

Cyber Crime Preys on All Internet Users

计算机犯罪瞄准所有网络使用者

 

Every time you turn on the computer and get online, experts say, you are a potential victim of cyber crime.

 

The Internet Storm Center is a volunteer group that guards against criminal activity online.  It is run by Marc Sachs. 

 

Marc Sachs: For the criminal world it's what we like to call a perfect storm. We have an Internet that is almost completely anonymous, perfect for criminal activity.  We have an Internet that’s largely ungoverned.

 

Dan Larkin heads the Internet Crime Complaint Center at the Federal Bureau of Investigation, or FBI.  He battles cyber crime daily, and says it is diverse and global. 

 

Dan Larkin: We have a substantial piece of cyber crime that emanates from West Africa, no surprise, Eastern Europe, Russia, some in Asia and South America as well.

 

These rings, and cyber criminals here in the United States, are involved in schemes that run the gamut from identity theft, to intellectual piracy, to sex crimes, fraud schemes, hacking, spamming, you name it… it is being done. But here is the surprising part: home users are usually unwitting accomplices.

 

Marc Sachs: We've got millions of users who don't keep their computer systems updated, who don't run anti-virus [software], who go to websites, download software [and] they don't know what they are downloading.

 

Experts say criminals are counting on that. When users do not update their systems, or use firewalls for protection, their computers can help spread viruses and worms, or invite trouble by downloading what are known as Trojans, some of which help spread chaos.

 

Marc Sachs: Overnight your home machine, which is just sitting there silently consuming power, is actually sending out thousands of unsolicited e-mail messages and you don't even know it's happening.

 

The aim of some of the malicious e-mail or spam is to lure the user into clicking on a particular site or attachment. It's called "phishing" in the cyber world, and criminals use all kinds of schemes to reel the user in. The purpose of these schemes is almost always to get money, or steal someone's identity.  

 

Dan Larkin: …inviting you to go to your bank, or go to your E-Bay account, or go to some other account that they hope you have and update something with regard to your personal profile or your financial or personal data.

 

Identity theft is a huge piece of cyber crime. The best-publicized cases -- with potential losses in the millions of dollars -- have been breaches in corporate computer networks. But home users and home computers are also at risk.

 

Every time you visit a website or click on an attachment, for example, you may be downloading a Trojan capable of stealing personal information. 

 

Called the Keylogger, it watches and records keystrokes waiting for you to access a bank site or retail online.

 

March Sachs of the Internet Storm Center explains. 

 

March Sachs: It knows that within first 50 or 100-some odd key strokes, I'm likely to type in my user name, my password, mothers maiden name, a credit card number, a PIN [personal identification] number, or other things.

 

Dan Larkin: The goal is to capture that, store it somewhere or transmit that information to another site for use in an identity theft or account takeover.

 

Dan Larkin of the FBI's Internet Crime Complaint Center says Russian cyber criminals used the Keylogger to take over thousands of identifications before they were put out of business last summer. 

 

International shipping is another cyber crime scheme sweeping across the United States.

 

Dan Larkin: We identified thousands of locations in the U.S. that were individuals and organizations that were being recruited and being used as reshippers.  

 

They were all connected to a Nigerian cyber crime ring that used stolen financial data to buy millions of dollars worth of goods and services to sell overseas. To avoid raising suspicion, they had first shipped goods to the recruited U.S. citizens they called "mules."

 

Dan Larkin: They would recruit somebody from the U.S. to receive the package so that the shipping label and address will look domestic, the guard would drop a bit from the merchant and they would let the package be shipped, only to find next day it had been reshipped -- overnighted -- and out of country to Nigeria.

 

The ring was eventually broken up, but it's one more example of the scope and ingenuity of Internet crime.

 

Cracking down on cyber criminals is an ongoing collaborative effort among international law enforcement officials, online retailers, and private and volunteer computer security groups. 

 

Personal computer users can do their part, too.  Experts say, keep your computers protected and updated. The FBI also recommends you visit the Internet Crime Complaint Center at www.ic3.gov to report suspicious activity and learn about the latest scheme in cyber space.

 

I’m Nahedah Zayed for VOA news.

 

注释:

cyber crime [5saibE5kraim] n. 计算机犯罪

anonymous [E5nCnimEs] adj. 匿名的

emanate [5emEneit] vi. 发出,发源

spamming 兜售信息[邮件,广告,新闻,文章],与垃圾邮件(junk mail)同义

unwitting [Qn5witiN] adj. 不知情的

accomplice [E5kCmplis] n. 同谋者,帮凶

worms [wE:mz] n. 计算机网络“蠕虫”病毒

unsolicited [5QnsE5lisitid] adj. 未被恳求的,主动提供的

keystroke [5ki:strEuk] n. []键击,按键

  原文地址:http://www.tingroom.com/voastandard/2005/13/20045.html