Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Английскй учебник

.pdf
Скачиваний:
105
Добавлен:
16.03.2015
Размер:
8.7 Mб
Скачать

1. as white as …

a. a mule

2. as red as …

b. a hunter

3. as ugly as …

c. honey

4. as hungry as …

d. a mouse

5. as light as …

e. hills

6. as firm as …

f. a feather

7. as obstinate as …

g. a sin

8. as old as …

h. a sheet

9. as quiet as …

i. a rock

10. as sweet as …

j. a lobster

7. , $# -

.

1. as …. as a lion

a. good

2. as … as ice

b. black

3. as …. as a berry

c. pale

4. as … as a picture

d. sober

5. as …. as

a judge

e. brave

6. as … as a peacock

f. brown

7. as … as gold

g. pretty

8. as … as pitch

h. proud

9. as … as

a bat

i. cold

10. as … as

a ghost

j. blind

8. , . -

. ! &.

Copy & Paste Plagiarism: Any time you lift a sentence or significant phrase intact from a source, you must use quotations marks and reference the source.

Word Switch Plagiarism: If you take a sentence from a source and change around a few words, it is still plagiarism. If you want to quote a sentence, then you need to put it in quotation marks and cite the author and article.

Style Plagiarism: When you follow a Source Article sentence-by-sentence or paragraph-by- paragraph, it is plagiarism, even though none of your sentences is exactly like those in the Source Article or even in the same order. What you are copying in this case, is the author's reasoning style.

Metaphor Plagiarism: Metaphors are used either to make an idea clearer or give the reader an analogy that touches the senses or emotions better than a plain description of the object or process. If you cannot come up with your own metaphor to illustrate an important idea, then use the metaphor in the Source Article, but give the author credit for it.

351

Idea Plagiarism: If the author of the Source Article expresses a creative idea or suggests a solution to a problem, the idea or solution must be clearly attributed to the author.

SOURCE ARTICLE

PLAGIARISM

 

 

This picture of the constellation Cygnus, the Swan,

Although dusty clouds block our vision

in visible light looks rather dull. Yet at an infrared

of stellar nurseries, infrared light reveals

wavelength of 60 the region looks very different.

them. These newborns glitter like a jewel

In infrared light we can see a glittering jewel-box of

box and seem to be peeking at us from

new born stars peeking out of the dust clouds that lie

behind the dust obscuring them.

between us and the center of our Galaxy.

 

 

???_____________________________

 

 

Brown dwarfs rank among the most elusive objects

Brown dwarfs are difficult to locate and

in the universe. With masses from about 15 to 80

rank among the most elusive objects in

times that of Jupiter, they are bigger than planets but

the universe. Brown dwarfs have masses

too small to ignite the nuclear fusion reactions that

from about 15 to 80 times that of Jupiter.

cause stars to shine.

Scientists have determined that brown

 

dwarfs are bigger than planets; however,

 

they are too small to ignite nuclear fusion

 

reactions which cause stars to shine.

 

???___________________________

 

 

Hot stars at 30,000 degrees emit a lot more blue light

Stars considered to be hot are 30,000

than red light, and so hot stars look blue or bluish-

degrees, whereas stars as cool as 3,000

white. Cool stars at 3,000 degrees give off more red

degrees are considered to be cold.

light than blue, and so these stars look red.

 

 

???___________________________

 

 

Especially since the launch of HST and the unprece-

Everyone is interested in astronomical

dented clarity of the images satellites have given us,

images, especially since the launch of

you've all seen on the news or in books, beautiful

HST and the unprecedented clarity of the

color pictures of various sights in the cosmos. But is

images satellites have given us. But is

this the way you would see these objects if you went

this the way you would see these objects

there? Well, to tackle that question, first we have to

if you went there?

consider the nature of light and color. Light is made

 

of waves of electromagnetic radiation. We perceive

 

different wavelengths of visible light as different

???___________________________

colors.

 

 

 

Especially since the launch of HST and the unprece-

The beautiful pictures that the space tele-

dented clarity of the images satellites have given us,

scope has given us show spectacular

You've all seen on the news or in books, beautiful

color. But is the color real? First, we have

 

 

352

color pictures of various sights in the cosmos. But is

to consider what light and color are. Dif-

this the way you would see these objects if you went

ferent wavelengths of light correspond to

there? Well, to tackle that question, first we have to

different colors, and light is called elec-

talk about the nature of light and color.

tromagnetic radiation. The temperature of

Light is made of waves of electromagnetic radiation.

an object determines the color of light

We perceive different wavelengths as different col-

emitted, and all things, including people,

ors.

emit light. In the constellation Orion, the

All solid bodies emit light: stars, rocks and people

star Betelgeuse is a huge, giant star, as

included. The temperature of the star, rock or person

big as the orbit of Jupiter. Betelgeuse is

determines which wavelength of light will be most

red. Another star in Orion, Rigel, is blue.

strongly radiated. In the constellation Orion, the up-

The reason that they are different colors

per left star is Betelgeuse (Armpit of the giant), 520

is that they each have a different surface

l-y distant. Betelgeuse is a supergiant star, 14,000

temperature.

times brighter than our sun. and so big, if you were

Cold stars are at about 3,000 degrees and

to put Betelgeuse in place of our sun, its surface

emit more red than blue light and very

would reach all the way out to Jupiter. Betelgeuse's

hot stars emit blue light since they have

color is bright red. On the other hand, another super-

temperatures of about 30,000 degrees.

giant star, Rigel, with a luminosity 57,000 times that

 

of the sun, appears whitish-blue. The reason that Be-

 

telgeuse is red and Rigel is blue is that their surface

 

temperatures are different.

???__________________________

Hot stars at 30,000 degrees emit a lot more blue light

 

than red light, and so hot stars look blue or bluish-

 

white. Cool stars at 3,000 degrees give off more red

 

light than blue, and so these stars look red.

 

 

 

UNIT 4. SOFTWARE FORENSICS

1..

1.How can you identify software forensics?

2.What are the objectives of software forensics?

3.What characteristic features of the author’s style can you find in any program?

4.How can source code authorship analysis be divided?

5.Where is code authorship analysis used?

TEXT

SOFTWARE FORENSICS

Computers and networks have played an important role in peoples’ everyday life over the last decade. But while computers have made our lives easier and have improved our standard of living, have also introduced a new venue of criminal activities.

Cyber attacks in the form of viruses, trojan horses, logic bombs, fraud, credit card cloning, and plagiarism of code have increased in severity and frequency.

The creation of a new field with its own methods and tools, called software forensics, has helped to tackle these issues in a proper way and not in an ad hoc manner. The term software forensics implies the use of these tools and methods for some legal or official purpose. Software forensics could be used to examine and analyze software in any form, source or executable code, to identify the author.

Although source code (the textual form of a computer program that is written by a computer programmer) is much more formal and restrictive than spoken or written languages, there is still a

353

large degree of flexibility when writing a program. This flexibility includes characteristics that deal with the layout of the program (placement of comments, indentation), characteristics that are more difficult to change automatically by pretty printers and code formatters, and deal with the style of the program (comment lengths, variable names, function names) and features that we hypothesize are dependent on the programming experience (the statistical distribution of lines of code per function, usage of data structures). Research studies on this field have proved that many of these features (layout, style, structure) of computer program can be specific to a programmer. Source code authorship analysis can be divided into 5 sub-fields according to the application area:

1.Author identification. The aim here is to decide whether some piece of code was written by a certain programmer. This type of application area has a lot of similarities with the corresponding literature where the task is to determine that a piece of work has been written by a certain author.

2.Author characterization. This application area determines some characteristics of the programmer of a piece of code, such as cultural educational background and language familiarity, based on their programming style.

3.Plagiarism detection. This method attempts to find similarities among multiple sets of source code files.

4.Author discrimination. This task is the opposite of the above and involves deciding whether some pieces of code were written by a single author or by some number of authors.

5.Author intent determination. In some cases we need to know whether a piece of code was written having this as its goal or was the result of an accidental error. In many cases, an error during the software development process can cause serious problems.

It seems that source code authorship analysis is an important area of practice in computer security, computer law, and academia as well as an exciting area of research.

2.. ,

.

Models:

In my opinion – #

I can’t make up my mind, but … – , &, …

I am keeping an open mind for the moment. –

.

I’m (not) sure that …. – 6 ( ) , …

1.Computers have made our lives easier.

2.Computers have introduced a new venue of criminal activities.

3.Credit card cloning and plagiarism of code are quite legal type of activity.

4.Software forensics could be used to examine and analyze software in any form.

5.Cyber attacks in the form of viruses are a widespread phenomenon which shouldn’t be fought against.

6.The textual form of a computer program written by a computer programmer is less more formal and restrictive than spoken or written languages.

7.The flexibility of source code includes characteristics dealing with the layout of the program, the style of the program and characteristics that are more difficult to change automatically by pretty printers and code formatters.

8.Source code authorship analysis can be divided into 5 sub-fields according to the application area.

9.Source code authorship analysis is an important area of practice in computer security and computer law.

3. !$ $ .

WHAT IS ….?

354

Author

Author

Plagiarism

Author

Author intent

identification

characterization

detection

discrimination

determination

 

 

 

 

 

4. , . -

. ,

, # .

AUTHOR

CODE

PROGRAM

5. , & $ .

1. Viruses are ……..

2.Trojan horses are …….

3.Logic bombs are ……..

4.Credit card cloning is ………

5.Cyber attacks are …………

6.! -. # # .

AUTHORSHIP ANALYSIS IN CYBERCRIME INVESTIGATION

The development of networking (") and the Internet in particular, has created a new way to share (# ) across ( ). While computer ( ) have enhanced ( &) in many aspects, they have also opened a ( # $" -$ ). These activities have spawned the ( ) of cybercrime, which ( ) to illegal computer-mediated activities that can be conducted through ( % ), such as the Internet. One predominant type of cybercrime is distribution of ( $ -) in cyber space. Such materials include pirate software, ( #), stolen properties, etc. Cyber criminals have been using various Web-based ( , $) illegal materials such as Email, websites, Internet newsgroups, Internet chat rooms, etc. One common characteristic of these channels is ( $). People usually do not need to provide their real identity information, such as ( , , ), in order to participate in cyber activities. Compared to conventional ( ), cybercrime conducted through such ( -) imposes unique challenges for law enforcement agencies in criminal identity tracing. The situation is further (&) by the sheer amount of cyber ( $ ") and activities, making the manual approach to criminal identity tracing impossible for meeting cybercrime investigation requirements.

355

7. !. «Applying Authorship Analysis in Cybercrime Investigation».

% 1* – « »: !, , $ , , -

$ . 8 ( 4 -5 ), -

! . ,

, , , ! ,

$ , ! , -

. .

The large amount of cyber space activities and their anonymous nature make cybercrime investigation extremely difficult. One of the major tasks in cybercrime investigation is tracing the real identity source of an illegal document. Normally the investigator tries to attribute a new illegal message to a particular criminal in order to get some new clues. Conventional ways to deal with this problem rely on manual work, which is largely limited by the sheer amount of messages and constantly changing author IDs. Automatic authorship analysis should be highly valuable to cybercrime investigators. Figure 1 depicts the typical process of cybercrime identity tracing using the authorship analysis approach.

Fig. 1

Fig. 1. A Framework of Cybercrime Investigation with Authorship Analysis assumes that an investigator has a collection of illegal documents created by a particular suspected cyber criminal. In the first step the feature extractor runs on those documents and generates a set of style features, which will be used as the input to/for the learning engine. A feature-based model is then created as the outcome of the learning engine. This model can identify whether a newly found illegal document is written by that suspicious criminal under different IDs or names. This information will help the investigator focus his/her effort on a small scope of illegal documents and effectively keep track of more important cyber criminals. Cyberspace texts have several characteristics which are different from those of literary works or published articles and make authorship analysis in cyber space a challenge to researchers. One big problem is that cyber documents are generally short in length. This means that many language-based features successfully used in previous studies may not be appropriate (e.g., vocabulary richness).

356

Through observation we were able to spot illegal sales of pirate software in all three newsgroups. Figure 2 is an example of such a message.

From: "The Collectaholic" <mkusz@comcast.net>

Subject: Software Titles - Only $3.00

Newsgroups: misc.forsale.computers.other.software

Date: 2002-10-04 12:07:22 PST

All CDs are the original CDs in working condition and come with all the original documentation. Shipping is $3.00 for first title and $.50 for each additional title.

$1.00 Titles

PC World The Best of MediaClips: sounds and graphics that can be used onmedia projects…

$3.00 Titles

Boggle: classic word game

Canon Publishing Suite: layout, drawing & photo editing tools

Fig. 2. Illegal Internet Newsgroup Message

We then identified the 9 most active users (represented by a unique ID and email address) who frequently posted messages in these newsgroups. Messages posted by these users were carefully checked to determine whether or not they indicated illegal activities. Between 8 and 30 illegal messages per user were downloaded for use in the experiment.

8. . .

TEXT

(Title)_________________________________________________

1._________________________________________________________________________

a)_____________________________________________________________

b)_____________________________________________________________

c)_____________________________________________________________

d)_____________________________________________________________

e)_____________________________________________________________

2._________________________________________________________________________

3._________________________________________________________________________

4._________________________________________________________________________

Forensic linguists are involved in many areas that relate to crime, both solving crime and absolving people wrongly accused of committing crimes. Some of these areas of research include:

357

voice identification (for instance, determining whether the voice on a threatening tape recording was that of the defendant; sometimes also called forensic phonetics);

author identification (determining who wrote a particular text by comparing it to known writing samples of a suspect; sometimes also called forensic stylistics);

discourse analysis (analyzing the structure of a writing or spoken utterance, often recorded, to help determine issues such as who is introducing topics or whether a suspect is agreeing to engage in a criminal conspiracy);

linguistic proficiency (did a suspect understand the Miranda warning or police caution?);

dialectology (determining which dialect of a language a person speaks, usually to show that a defendant has a different dialect from that on an incriminating tape recording. As opposed to voice identification, which analyzes the acoustic qualities of the voice, dialectology uses linguistic features to accomplish similar goals).

Author identification is a very interesting and potentially useful area, but it is hampered by the fact that documents in a forensic setting (ransom notes, threatening letters, etc.) are usually much too short to make a reliable identification. Moreover, which linguistic features are reliable indicators of authorship, and how reliable those features are, remains to be discovered. Research is ongoing, however, and the availability of large corpora of speech and writing samples suggests that the field may advance in the future (although the typically small size of the documents in most criminal cases will always be a problem). Moreover, it may be sufficiently reliable to eliminate someone as an author, or select an author from a small group of suspects.

Discourse analysis is a very broad field, and how acceptable its conclusions are depends on the methodology that is used and how any conclusions are described. Discourse analysist can provide helpful information by close analysis of a covert recording and, for instance, showing that the suspect's use of "I" rather than "we" might indicate noncomplicity in a conspiracy. Linguists have also pointed out that when a suspect is recorded as saying "yeah" or "uh-huh" in response to a suggestion, the suspect is not necessarily agreeing with the suggestion, but may simply be providing a feedback marker to indicate he has understood the utterance, as we routinely do in ordinary conversation. Courts have a mixed record in whether they allow discourse analysists to testify as experts, but even when not allowed to testify they may be useful to the lawyers in preparing a case.

Proficiency testing and dialectology are both time-tested and relatively noncontroversial areas of linguistics. Of course, because of the influence of mass media and population mobility, dialects are becoming less distinct than they once were, and people often mix dialect features. This is a serious problem with linguistic origin analysis. Determining a person's origin by means of his or her dialect or language is also complicated by the fact that many languages straddle a border or are spoken in multiple countries.

(by Peter Tiersma, PhD, University of California)

9..

1.What do forensic linguists deal with?

2.What type of research do they perform?

3.What are the main difficulties in author identification?

4.What does discourse analysis depend on?

5.Why are proficiency testing and dialectology noncontroversial areas of lin-

guistics?

358

10. #' $ . , & $#

.

?

?

?

?

11. .

4/15,-)( % (1/:1 *)6 .* 1% + )

- " % -

. +$

-

, " ,

$

— , ,

) " ) # . ( , $- " , ) , % & $ - # .

- " % " ) # , - # .

) # % :

);

$ -

# ?

( # " &, " $ - # “ ”.% % :

, ( ) -;

$ " $ ;

, -( , ) $" ;

, ;

# " ?

359

) , ", % , , :

& $- " ;

$ & ;

: # ( -$ $ , , # ", . .)?

 

'- , ) , $ #

 

, $ $ " -

 

" . @ ( ) -

"-

, & " -

$

, - " % -

$" .

UNIT 5. A FORENSIC LINGUISTIC REPORT

1. .

TEXT

DOCUMENTING AND REPORTING

Principle: The examiner is responsible for completely and accurately reporting his or her findings and the results of the forensic examination. Documentation is an ongoing process throughout the examination. It is important to accurately record the steps taken during the examination.

Procedure: All documentation should be complete, accurate, and comprehensive. The resulting report should be written for the intended audience.

Examiner's notes

Documentation should be contemporaneous with the examination, and retention of notes should be consistent with departmental policies. The following is a list of general considerations that may assist the examiner throughout the documentation process.

-Take notes when consulting with the case investigator and/or prosecutor.

-Maintain a copy of the search authority with the case notes.

-Maintain the initial request for assistance with the case file.

-Maintain a copy of chain of custody documentation.

-Make notes detailed enough to allow complete duplication of actions.

-Include in the notes dates, times, and descriptions and results of actions taken.

-Document irregularities encountered and any actions taken regarding the irregularities during the examination.

The structure of the linguist’s statement will follow the report style of the empirical sciences, something along these lines:

1. Summary (equivalent to the abstract of an academic paper).

360