Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Text 3. What is a Cybercrime?



Vocabulary

fastest-growing быстро растущий
computer hacking хакерство
stalking/ espionage шпионаж
racial hatred расовая неприязнь
extortion вымогательство
bogus companies фиктивная компания, фирма-однодневка
to trawl «тролить»,
rumour слухи, сплетни

Cybercrime is one of the fastest-growing criminal activities on the planet. Cybercrime is defined as the use of any computer network for crime and the high-tech criminals of the digital age have not been slow to spot the opportunities.

Cybercrime covers a huge range of illegal activity including financial scams, computer hacking, downloading pornographic images from the Internet, virus attacks, stalking by e-mail and creating websites that promote racial hatred.

The term hacking was originally used to describe the activities of computer enthusiasts who pit their skills against the IT systems of governments and big corporations.

Some hackers have broken into the computer systems of banks and other businesses, with the intention of stealing money - or information like credit card numbers.

Scams by cyber-criminals include setting up bogus companies on the Net. Unsuspecting buyers are offered products at tempting prices, and then supply their credit card details - only to find that the site suddenly disappears. No phone number, no address and no redress.

Another 21st century crime is identity theft. Criminals can trawl the web or other public databases for information about someone's date of birth, social security number and address and then use that to apply for credit cards and run up huge bills.

Cyberstalking. The goal of a cyberstalker is control. Some examples of computer harassment are:

- harassment;

- Threatening e-mail;

- Hostile postings about someone;

- Spreading vicious rumours about someone;

- abusive messages.

Malicious codes like worms, viruses and Trojan horses cause damage on a greater scale. The damage they cause is worth millions to companies as well as government agencies.

Industrial espionage. This is where corporations spy on other companies and with network systems.

With so many cybercrimes on the rise the need for a cyberlaw is obvious, but the difficulties are baffling. The internet is a global system. We can now be attacked by criminals who do not need to come to this territory. Lots of policing arrangements have their roots in the fact that victim and offender are geographically co-located. An investigation that begins in one country may quickly lead elsewhere, but without the co-operation of other nations, it may be impossible to track down the perpetrators and secure convictions.

 

Exercise 16.Explain the following terms.

- trawl the web;

- hostile postings;

- vicious rumours;

- the high-tech criminals;

- computer hacking;

- bogus companies;

- Cyberstalking;

- Malicious codes;

- Industrial espionage.

 

Exercise 17.Read the sentences from the text. Decide whether each sentence is true, false or not stated in the given text.

This sentence is

- true; - false; - not stated.

Cybercrime is the use of any computer network for crime.

This sentence is

- true; - false; - not stated.

Some hackers have broken into the computer systems of banks with the intention of stealing money or information.

This sentence is

- true; - false; - not stated.

The goal of a cyberstalker is control.

This sentence is

- true; - false; - not stated.

Cybercriminals always attack at our territory.

 

Exercise 18.Answer the questions.

1. What is Cybercrime? 2. What kinds of Cybercrime do you know? 3. Do you or your friends have ever been the victims of Cybercriminals? 4. What type of Cybercrimes do you consider the most dangerous? 5. How to protect yourself from Cybercriminals? 6. What measures can the Government of law enforcement agencies use to protect the country and citizens from Cybercrimes?

 

Exercise 19.Translate the sentences into Russian.

1. Cybercrime is defined as the use of any computer network for crime and the high-tech criminals of the digital age have not been slow to spot the opportunities.

2. Cybercrime covers a huge range of illegal activity including financial scams, computer hacking, downloading pornographic images from the internet, virus attacks, stalking by e-mail and creating websites that promote racial hatred.

3. Criminals can trawl the web or other public databases for information about someone's date of birth, social security number and address and then use that to apply for credit cards and run up huge bills.

4. With so many cybercrimes on the rise the need for a cyberlaw is obvious, but the difficulties are baffling.

 

Exercise 20. Give the written translation of the text and make a short plan of the text.

Three Famous Financial Fraudsters

Vocabulary

high-level fraud высокопрофессиональная афера
fraudster мошенник, аферист
to be involved быть вовлеченным
signatory подписавшаяся сторона
dodgy изворотливый

In recent years a number of high-level fraud cases have made the headlines and continue to do so. Here are three of the biggest fraud cases from the 20th century, both from the UK and overseas:

Frank Abagnale remains one of America’s most successful fraudsters ever, cashing $2.5 million over a five-year period in the 1960s. Eventually, he was caught and imprisoned in France, only to be released five years later as an unpaid adviser to the FBI. Abagnale still lecturing to the bureau’s Academy students more than 30 years, thought he does not get paid for his work with the FBI. As well as a series of books about his own experiences of fraud, Abagnale was the subject of the Leonardo DiCaprio film Catch Me If You Can.

Robert Maxwell was a familiar face in the British media. His media organization, Mirror Group Newspapers, hit the financial rocks. The Department of Trade and Industry (DTI) found that Maxwell was heavily involved not just in the management of the group of companies, but in controlling the pension funds of his employees. He was also the only authorised signatory for transferring unlimited amounts of cash between the firms’ bank accounts. According to the DTI report, Maxwell routinely used the pensions of his employees to provide cash for investments to disguise the shortfall. In 1986 £ 34 million in cash was found at his place.

Nick Leeson’s official website now carries the full story of how he brought down Barings Bank in 1995 as part of one of the highest-profile fraud cases in British history. Hidden among the financial institution’s accounts was error account number 88888, set up to hide a £ 20, 000 debt from an inexperienced employee’s poor investment decisions.

In all, $1.3 billion was lost by Leeson’s dodgy dealing.

 

Exercise 21.Find the English equivalents.

Громкое дело о мошенничестве, самый успешный мошенник, посадить в тюрьму, контролировать пенсионный капитал, единственный человек, имеющий право подписи, переводить неограниченные суммы, счета финансовых учреждений, несуществующий счет, долг.

8. 18. Exercise 22.Answer the questions.

1. Who is Frank Abagnale? What is he famous for? 2. Who used the pensions of his employees to provide cash for investments to disguise the shortfall? 3. Nick Leeson or Robert Maxwell used an error account? 4. Who is the most successful fraudster?

 

Exercise 23.Translate the sentences into Russian.

1. In recent years a number of high-level fraud cases have made the headlines and continue to do so. 2. Frank Abagnale remains one of America’s most successful fraudsters ever, cashing $2.5 million over a five-year period in the 1960s. 3. Frank Abagnale also designed the Integrated Payment System cheque now used in place of the old-style cashier cheques. 4. The Department of Trade and Industry found that Maxwell was heavily involved not just in the management of the group of companies, but in controlling the pension funds of his employees. 5. According to the DTI report, Maxwell routinely used the pensions of his employees to provide cash for investments to disguise the shortfall. 6. Hidden among the financial institution’s accounts was error account number 88888, set up to hide a £ 20, 000 debt from an inexperienced employee’s poor investment decisions.

 

Exercise 24.Find the correct translation to the English organizations.

The Economic Crimes Bureau;

The Bureau of Fire Investigations of the New York City Fire Department;

The Bureau of Alcohol, Tobacco and Firearms.

 

Exercise 25.Match the Russian and English equivalents.

to be responsible for A мошенничество в сфере страхования
investigation and prosecution B поджог
arson C укрывать, скрывать
to obtain criminal charge D важность
magnitude, significance   E мошенничество в сфере социального обеспечения
white-collar case F мошенничество с использование м мобильной связи
cellular phone fraud G дело о растрате, хищении
video piracy H быть ответственным за
insurance fraud I бдительность
vigilant   J дело, связанное с защитой окружающей среды
welfare fraud case K добиться обвинения в уголовном деле
embezzlement case   L нелегальное растрата медицинских препаратов
to conceal M раскрытие и обвинение
environmental case N секретность видеозаписи
illegal disposal of medical waste O случаи преступлений, совершенных белыми воротничками

 

Exercise 26.Make your own short story using as many given words as possible.

Russia, theft, world, financial scam, criminal, identity theft, computer crime, money, to commit, computer hacking.

 

Exercise 27.Test

1. Name the types of financial crimes.   a. fraud, embezzlement, forgery b. financial scam, tax evasion, rape c. money laundering, bribery, murder
2. What is identity theft?   a. theft of personal information b. theft of credit cards c. theft of ideas
3.What is Cybercrime?   a. the use of any computer network for crime. b. the use of video and audio-means for a crime. c. the use of robots for a crime.
4.What of the following crimes are not Cybercrimes?   a. trawl the web, hostile postings, burglary b. vicious rumours, computer hacking, abusive messages. c. extortion, stalking and harassment
5. In what sphere are the white-collar crimes widespread? a. economy b. criminal law c. administrative law

 

Список использованной литературы

1. Английский для экономистов / И.П. Агабекян, П.И. Коваленко. – Изд. 14-е, стер. – Ростов н/Д: Феникс, 2013.

2. Английский язык для курсантов образовательных учреждений МВД России. English for law enforcement professionals: учебник/ Байбурина Р.З. и др., под ред. Ф.Р. Имамутдиновой. – М.: ДГСК, 2011.

3. Куприянчик Т. В. Английский язык для юристов: учебник / Т. В. Куприянчик, Е. Б. Поварисова, Н. А. Четверухина; под общ. ред. проф. С. В. Пятчиной. – М.: ЦОКР МВД России, 2009.

4. Лыскова М.И. Английский язык в ситуациях профессионального общения сотрудников органов внутренних дел: учебное пособие. 2-е изд., перераб. и доп. – Тюмень: Тюменский институт повышения квалификации сотрудников МВД России, 2014.

4. Тросклер Е.В. Бизнес и право. Часть 1. Деловой английский. Учебное пособие. – Екатеринбург: Издательский дом «УрГЮА», 2009.

5. Longman. Dictionary of Contemporary English: словарь. Б. м.: Longman, 2003.

6. Market economy and command economy. Методическая разработка по дисциплине «Практический курс основного иностранного языка», (англ. 4 курс) для практических занятий по специальности «Иностранный язык». Сост. Завьялова Н.А. – Екатеринбург: Уральский государственный педагогический институт, 2004.

7. Dictionary of American English – United Kingdom: Oxford University Press, 2010.

 

Содержание

Введение Unit 1. Human rights protection in a democratic society Unit 2. The Russian Police Unit 3. The structure of the British Police Unit 4. The structure of the American Police Unit 5. The International cooperation oft he Police organisations (Interpol, Europol) Unit 6. The history of economic thoughts. The basic economic problems Unit 7. The world economy. The WTO Unit 8. Finances. Taxes as the main source of government income Unit 9. The history of money origin Unit 10. Money. Credits. Banks. Unit 11. Crimes in the sphere of Economy Список использованной литературы Содержание  

 


Поделиться:



Последнее изменение этой страницы: 2017-03-14; Просмотров: 3378; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.027 с.)
Главная | Случайная страница | Обратная связь