新世纪博士生综合英语Unit5-Crime-in-Cyberspace课文及译文

新世纪博士生综合英语Unit5-Crime-in-Cyberspace课文及译文


2024年5月17日发(作者:手机电视直播大全下载安装)

====Word行业资料分享--可编辑版本--双击可删====

Unit5: Crime in Cyberspace

New technogical developments present unprecedented opportunities for computer

crime.

----- Peter Grabosky

网络犯罪

新技术的发展给电脑犯罪带来了前所未有的机会。

----- Peter Grabosky

Robyn Williams: 罗宾·威廉斯

1 Last week, Ockham's Razor was presented by the Director of the Australian Institute

of Criminology in Canberra, who reflected on his experience of being burgled偷盗, and

how to design homes and businesses to avoid such an experience. This week we look at

theft outside such physical structures: being robbed or otherwise interfered with in

cyberspace. There's plenty of risk, but what can you do about it? This is the Director of

Research at the Institute, Peter Grabosky.

Robyn Williams:

1 上周,澳大利亚堪培拉犯罪学研究所主任演示了奥卡姆剃刀定律,他回忆了自己被盗的

经历,并且告诫家庭和公司如何避免此类事件。本周,我们再介绍下此类实质形态之外的

盗窃:网络抢劫或网络上的其他干涉行为。网络上存在着大量风险,但是我们应该怎么做

呢?这是澳大利亚犯罪学研究所研究部主任,Peter Grabosky

Peter Grabosky:

2 It has almost become trite迂腐 to suggest that we are entering an age as significant

and profound 意义深远in its impact as was the Industrial Revolution. When you think

about it, the convergence集合 of computing and communications has already affected

most, if not all, of the major institutions of society. It has created unprecedented1

opportunities for education, health services, recreation and commerce. Unfortunately, it

has also created unprecedented2 opportunities for crime. It seems to me that

identifying these vulnerabilities, and mobilizing appropriate countermeasures will be

one of the great challenges of the next century.

2暗示我们现在正进入一个如同工业革命一样具有意义重大而深远的时代几乎可以说是一

个老调重弹的话题。当你考虑这个问题时,计算机和通信的融合已经给我们的大多数(即

使不是全部)社会机构带来了巨大的影响。这一融合给教育、卫生、娱乐和商业创造了前

所未有的机会,不幸的是,它也给犯罪创造了史无前例的机会。在我看来讨论这些负面影

响,并且采取合适的对策会是下一个世纪的巨大挑战之一。

3 This challenge is so great that it defies藐视 the capacity of law enforcement alone to

源-于-网-络-收-集

====Word行业资料分享--可编辑版本--双击可删====

control. Consequently, new forms of policing, involving the harnessing治理 of

non-government resources, will become essential. Given the fact that cyberspace knows

no boundaries, and that computer crime often transcends national frontiers边疆,

effective countermeasures对策will also require a degree of international co-operation

which is without precedent3先例. Let me describe nine types of crime involving

information systems as instruments and/or as targets.

这一挑战的威力如此之大以至于仅凭法律执行部门本身的力量来控制是不够的。因此,新

的政策形式,包括利用非政府资源,将变得极其重要。考虑到网络无国界和计算机犯罪经

常超越国界这一事实,采取有效地对策也将要求国际合作打到一种史无前例的程度。下面

我向大家介绍九个类型的犯罪,包括把信息系统做为手段和(或)目标。

4 First is Theft of Information Services.①

The means of stealing telecommunications services are diverse, and include the 'cloning'

of cellular phones, counterfeiting伪造of telephone cards, and unauthorised access to an

organisation's telephone switchboard. In one case, hackers were reported to have

obtained access to the telephone facilities of Scotland Yard, and made over a million

dollars worth of phone calls.

4 第一种是窃取信息服务。①

窃取电信服务的手段是多种多样的,其中包括“克隆”手机,伪造电话卡,以及未经授权的

访问组织的电话总机。在一个案例中,据报道黑客获得了进入伦敦警察厅电话设施的权限,

并打了价值超过100万美元的电话。

5 Next are Communications in Furtherance of Criminal Conspiracies阴谋.②

Modern information systems clearly provide an effective means by which offenders can

communicate in order to plan and execute their activities. There is evidence of

information systems being used to facilitate organised drug trafficking, money

laundering, child pornography and trade in weapons. Although the use of information

facilities does not cause such illegal conduct to occur, it certainly enhances the speed

and ease with which individuals may act together to plan and to execute criminal

activity.

5 第二种是通信促进犯罪阴谋。

很显然,现代信息系统为犯罪分子计划和实施犯罪行为提供了有效的沟通手段。有证

据表明,信息系统被用来帮助组织贩毒、洗钱、儿童色情和武器贸易。尽管信息设施的使

用不会导致此类非法行为的发生,但它肯定使犯罪分子可以更快速和更容易地共同制定计

划和实施犯罪活动。

源-于-网-络-收-集


发布者:admin,转转请注明出处:http://www.yc00.com/num/1715916898a2691537.html

相关推荐

发表回复

评论列表(0条)

  • 暂无评论

联系我们

400-800-8888

在线咨询: QQ交谈

邮件:admin@example.com

工作时间:周一至周五,9:30-18:30,节假日休息

关注微信