Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Crime.doc
Скачиваний:
0
Добавлен:
01.04.2025
Размер:
74.24 Кб
Скачать

Notable hackers

  • Mark Abene -- Inspired thousands of teenagers around the country to "study" the internal workings of the United States phone system. One of the founders of the Masters of Deception group.

  • Dark Avenger -- Bulgarian virus writer that invented polymorphic code in 1992 as a way to fool the recognition by Anti-virus software.

  • Robert Tappan Morris, Jr. -- This Cornell University graduate student created the first major Internet worm in 1988.

  • Kevin Mitnick -- The first hacker to be held in jail without bail for a time long enough to a world record.

  • Kevin Poulsen -- In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM to win an automobile in a call-in contest.

  • Adrian Lamo – Was accused of nontechnical but surprisingly successful intrusions into computer systems at Microsoft, The New York Times, Lexis-Nexis, MCI WorldCom, SBC, Yahoo!, and others.

  • Vladimir Levin -- This mathematician led Russian hacker gang that tricked Citibank's computers into spitting out $10 million. To this day, the method used is unknown.

Ex.2. Fill in the missing words.

    1. _______ is a term used to describe different types of computer experts.

    2. _______is a hacker who uses the World Wide Web as a way to express their political views.

    3. A hacker is someone who enjoys the intellectual challenge of creatively _______

    4. _______ has age and experience, and _______ often has particular expertise in a specific topic.

    5. A hacker programs _______ and enjoys programming rather than just _______ about programming.

Ex.3. Translate into English.

Кража интеллектуальной собственности, набор навыков, удаленный компьютер, проникать в систему, ошибки в системе безопасности, сеть, творчески преодолевать ограничения, компьютерный эксперт, взломщик, подделка кредитных карточек.

Ex.4. Match the words from column A with their definitions from column B.

  1. Cracker, Black-hat

a) Types of hacker in the positive sense.

  1. Script kiddy

b) A hacker in the negative sense.

  1. Guru, Wizard

c) A hacker who breaks security but who does so for altruistic or at least non-malicious reasons. The darker the hat, the less the ethics of the activity.

  1. Whitehat, Sneaker, Grey-hat

d) a person with little or no skill. Or a person who simply follows directions or uses a cook-book approach without fully understanding the meaning of the steps they are doing.

Ex. 5. ON THE LEFT there are examples of ten useful verbs in computing; on the right there are definitions of the verbs. Read the examples and match the verbs (which are in italics) with the definitions. Then write the infinitive forms into the spaces in the definitions on the right.

EXAMPLES

DEFINITIONS

1.

Two PCs have been assigned to

a)

To ' 'is to write data to a

outputting the labels.

location and, in doing so, to destroy any data already contained in that location.

2.

The account results were dumped to the back up disk.

b)

To ' 'is to switch between two states.

3.

The spelling checker does not eliminate all spelling mistakes.

c)

To ' 'is to say that something dangerous is about to happen, to say

that there is a possible danger.

4.

Some laser printers are able to emulate

d)

To ' ' means not to recognize or not to do what someone says.

the more popular office printers.

5.

The prototype disk drive failed its first test.

e)

To ' 'is to move data from one device or storage area to another.

6.

This command instructs the computer to

f)

To ' 'is to give a computer or someone a job.

ignore all punctuation.

7.

You launch the word processor by double clicking on its icon.

g)

To ' 'is to remove something completely.

8.

The new data input has overwritten the old information.

h)

To ' 'is to copy or behave like something else.

9.

The company's products range from a cheap lapheld micro to a

i)

To ' 'is to check or repair or maintain a system.

multistation mainframe.

10

The disk drives were serviced yesterday and are working well.

j)

To ' 'is not to do something which should be done; not to work properly.

11

The symbols can be toggled on or off the display.

k)

To ' 'is to vary or to be different.

12

He warned the keyboarders that the system might become overloaded.

1)

To ' 'is to start or run a program.

Ex.6. Find the false sentences and correct them using the information from the text.

1. Hacker doesn’t know a set of programming interfaces well enough to write software quickly and expertly.

2. Very talented hackers never become bored with a project they are doing.

3. A hacker is a person who prefers to learn only the minimum necessary.

4. A hacktivist is a hacker who uses a political candidate’s web page and adjusts it to promote the opposition candidate.

Ex.7. Answer the questions.

  1. Who uses other people’s websites to promote their political views?

  2. Who is a white hat hacker?

  3. Who is a black hat hacker?

  4. Who are guru and wizard?

  5. What is the best definition of a hacker?

Ex.8. Translate one of the following texts (to the teacher’s choice) in written form.

(1)

Many crimes involving computers are no different from crimes without computers: the computer is only a tool that a criminal uses to commit a crime. For example,

  • Using a computer, a scanner, graphics software, and a high-quality color laser or ink jet printer for forgery or counterfeiting is the same crime as using an old-fashioned printing press with ink.

  • Stealing a laptop computer with proprietary information stored on the hard disk inside the computer is the same crime as stealing a briefcase that contains papers with proprietary information.

  • Using computers can be another way to commit either larceny or fraud.

Posting messages in an Internet newsgroup or online bulletin board with a false author's name that is intended to harm the reputation of the real person of that name.

These acts might be punishable by existing criminal statutes that prohibit impersonation, forgery, deceit, or fraud. However, a judge might decide that the specific language in old statutes about writing or signature does not apply to e-mail. Rather than write new statutes for forged e-mail addresses or unauthorized sending of e-mail in someone else's name. The author of this article would prefer that legislatures broaden the existing criminal statutes for analogous crimes with paper and ink.

(2)

Unauthorized use of computers tends generally takes the following forms:

  • The criminal reads (or copies) confidential or proprietary information, but data is neither deleted nor changed.

In 1999, the Melissa virus infected a [possibly confidential] document on a victim's computer, then automatically sent that document and copy of the virus via e-mail to other people. Subsequently, the SirCam and Klez malicious programs made a similar release of [possibly confidential] documents from a victim's computer. These malicious programs are a new way to release confidential information from a victim's computer, with the confidential information going not to the author of the malicious program, but to some person unknown to the author of the malicious program.

  • Changing data. For example, change a grade on a school transcript, add "money" to a checking account, etc. Unauthorized changing of data is generally a fraudulent act.

  • Deleting data. Deleting entire files could be an act of vandalism or sabotage.

Most unauthorized use of a computer is accomplished by a person in his home, who uses a modem to access a remote computer. In this way, the computer criminal is acting analogous to a burglar. . However, in the unauthorized use of another's computer, the criminal "enters" the computer via the telephone lines, which is not breaking into the building.

(3)

Since the Internet is not limited by geography, crimes committed in cyberspace can easily achieve global dimensions. Systems can be accessed from anywhere in the world, and locating perpetrators is difficult. Many computer fraud and embezzlement schemes target international financial networks. Organized crime groups can utilize information technology to evade identification and carry out drug trafficking and money laundering on a global scale. Questions of jurisdiction and apprehension become much more complicated in international cyberspace.

Estimates place annual business losses to cyber crime at roughly $1.5 billion. Many hackers are based in countries far from those they affect. Many authorities suspect that organized "cyber-crime gangs" frequently originate in developing countries where computer-crime laws are lax and enforcement is haphazard.

Individual countries vary widely in the legal approaches they have taken to regulating the Internet. Some strictly observant Islamic nations have tried to contain the dissemination of information online, which they view as containing messages potentially harmful to their populaces. Germany has tried to restrict Web sites containing Neo-Nazi content. China installed firewalls to prevent its citizens from accessing unauthorized sites, and Burma bans Internet access completely.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]