- •State educational institution
- •Contents
- •Part I. Reading for information
- •I. Headlines
- •II. The plan for rendering an article.
- •Article I Russians Get ‘Gold Medal’ for Cyber Fraud
- •Article II Female Discovered in Trunk of Car at u.S./Canada Border
- •Article III cbp Officers Intercept Marijuana Smuggling Attempt in New York
- •Article IV Border Patrol Stops Drug Smuggler, Seizes Meth on I-5
- •Article V Siemens Managers Admit Bribing Russian Officials
- •Article VI Drug Police Seize Cannabis Garden
- •Article VII Afgan Drug Lords Bypassing Central Asia
- •Article VIII Bank Clients’ Data Faces Scrutiny
- •Vedomosti
- •Article IX Branding: a crucial defence in guarding market share
- •Article X uk government backtracks over bribery
- •Article XI Globalisation needs no defence – it needs to be questioned
- •Article XII Breaking the habit
- •Part II. Reading for analysis Text I
- •The custom of customs
- •1. Whole numbers
- •2. Decimals
- •Text II
- •Anything to declare?
- •Text III
- •Full exposure
- •Text IV
- •Counterfeiting and piracy: crime of the 21st century
- •Дозажигался…
- •Counterfeiting, the Internet and the postal dilemma
- •Text VI
- •Call of the wild
- •Russia Backs Pact to Save Wild Tigers
- •Text VII
- •Trafficking drugs into Europe
- •The cocaine business
- •Text VIII
- •Sniffy customers
- •Text IX
- •Classification of goods
- •The Harmonized System Convention
- •Text XI
- •Customs valuation
- •Text XII
- •Meeting the challenges of the 21st century
- •Part III. Supplementary reading not guilty
- •Smuggler
- •Two coats
- •In the driving seat
- •At the customs office
- •Dutch cigarettes
- •A present from strasbourg
- •Coping with smuggling in the middle ages
- •A true story
- •A great deal of trouble
- •Travels with charley in search of america
- •The word
- •Tests Test 1 Coke and the Colonel’s wife
- •Test 2 On the border
- •Test 3 Drug Detector Dogs in Customs work
- •Test 4 Lexical – grammar test
- •Bibliography
II. The plan for rendering an article.
The title of the article |
The article is headlined … The headline of the article I have read is … |
The author of the article; Where and when the article was published. |
The author of the article is … The article is written by … It is (was) published in … It is (was) printed in … |
The main idea of the article. |
The main idea of the article is … The article is about … The article is devoted to … The article deals with … The article touches upon … The article focuses on … The article covers the problem (issue) … The purpose of the article is to give the reader some information on … The aim of the article is to provide the reader with some material (data) on … |
The contents of the article. Some names, facts, figures. |
The author starts by telling the reader (about, that) … The author writes (states, stresses, thinks, points out) that … The article describes … According to the text … Further the author reports (says) that … In conclusion … The author comes to the conclusion that … |
Your opinion of the article |
I found the article interesting (important, dull, of no value, too hard to understand) In my opinion … To my mind … I am (not) with the author when he says that … |
Article I Russians Get ‘Gold Medal’ for Cyber Fraud
BLOOMBERG
Russian hackers get a “gold medal” for fraud, but their Chinese counterparts carried out more than half of all the cybercrimes committed last year, according to Kaspersky Lab, Russia’s largest antivirus software developer.
About 52 percent of the 73 million attacks on the World Wide Web that Kaspersky recorded last year originated in China, the Moscow-based company said in its annual report Tuesday.
“Chinese cyber criminals are capable of producing so much vicious software that in the past two years absolutely all the antivirus developers have had to deal with it,” Kaspersky said.
Chinese hackers are now the world’s best, trumping those from the United States, Germany, the Netherlands and Russia, although Russians retained the “gold medal” for fraud, Kaspersky said.
Russian hackers have mastered the mass-production of web sites that play upon users’ naivety and curiosity by offering services that purport to allow access to the e-mails and text messages of friends and family members, according to Kaspersky.
One successful scam invites users to send a free text message with a short code to receive passwords for private e-mail accounts, leading to charges on the victim’s cell phone bill, Kaspersky said.
Task 1. Read the article and find the names of:
all countries mentioned in the article,
a Russian organization developing antivirus software.
Task 2. True or false?
Russian hackers get a “gold medal” for fraud.
About 25 percent of the 73 million attacks on the World Wide Web originated in China.
Chinese hackers are now the world’s worst.
Russian hackers have mastered the mass-production of web sites that play upon users’ naivety and curiosity.
Task 3. Choose the best alternatives to complete the statements.
a hacker is
a secret agent
a secret user of other people’s computer system
a hairdresser
a fraud is
a discussion
a TV program
the crime of deceiving people
a crime is
a crisis
an illegal action that can be punished by law
an institution
curiosity is
the desire to emigrate
the desire to know about something
the desire to sleep
Task 4. Match 1-6 to a)-f) to form partnerships from the article:
gold a) counterparts
Chinese b) company
Moscow-based c) hackers
Russian d) medal
successful e) text message
free f) scam
Task 5. Over to you. Are hackers “rewarded” well?
Task 6. Render the article according to the plan for rendering newspaper articles.