Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

angl_yaz / Lesson 5

.doc
Скачиваний:
8
Добавлен:
10.02.2016
Размер:
37.89 Кб
Скачать

Lesson 5

THE READING MODULE

Read the text: The computer technology is used in the criminal cases of financial-banking sphere.

Nowadays computers are widely used for information storage and processing. They are also used in criminal activity. During larceny or embezzlement investigation, economic crimes in financial-banking sphere there are computers, which serve either as object of a criminal encroachment or served as instruments for committing crimes and possess criminal action trace. Thus, during investigation actions such as examination or inspection, search, seizure, reconstitution of conditions and circumstances on different categories of criminal cases, during investigation of computer information sphere, a new object of investigation and research can be identified – computer technique, and object of a search can be identified as information stored in the computer memory or external carriers – disks, diskettes etc. It is important to implement specialized knowledge for obtaining full and complete information concerning committed crime.

The use of special knowledge and technical methods by investigator, prosecutor-criminalist and by court differs from other forms of their implementation by its remedial and criminalistic orientation on collecting, recording, research, and use of actual database of a specific crime circumstances and of guilty persons involved in it, remedial order of investigatory actions. Investigator (prosecutor-criminalist) applies his professional criminalistic knowledge, methods, techniques and criminalistic techniques means with the purpose of finding, recording and seizure of evidence. Conditions and result of their implementation are recorded in the investigatory actions minutes and by criminalistic methods of recording (such as photographs, moulds, sound –and video recordings etc.).

The form of special knowledge use by investigators on pre-judicial trial has its peculiarities.

Realization of any investigatory action requires thorough preparation that is explained by computer means peculiarities. The site crime survey includes: a) preparatory; b) working and c) final stages, which have their own goals and tasks.

It is very important to get the following data during the preparatory stage of survey or search: IBM configuration; organization of a local network or connecting to the global network (such as Internet); information safety service availability; data protection from unauthorized access with the purpose of automated information deleting, which can be deleted during opening of a computer body, of a room where computer is located or under other circumstances; conditions of a water supply system of the premises where computer engineering is installed, users’ qualifications, and correlation among those employees who operate the technique. It is necessary to make out a plan of survey conducting on preparatory stage

A high level of computer protection can be characterized by a special information protection system from an unauthorized access or certified means of protection; permanent territory and premises guarding and security where the computer system is located: by technical means and specially trained staff, strict pass procedure, special premises equipment, information protection service, normal functioning and control of the work.

Low level of protection determined by a casual algorithm of access limitation (database is protected by a password), it’s easy to obtain data on how to get through the password so it’s not necessary to apply special access techniques.

I. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

Information storage, criminal activity, investigation, inspection, computer information sphere, computer memory, special knowledge, database, guilty person, peculiarity, the global network, computer protection, computer engineering, password.

Exercise 2. Answer the questions:

1. What are computers used for?

2. What can you say about computer technique?

3. What does the site survey include?

4. Is it very important to get the following data during the preparatory stage of survey or search?

Exercise 3. Match the left part with right:

1. A high level of computer protection

a) to make out a plan of survey conducting on preparatory stage.

2. It is necessary

b) can be characterized by special information protection system.

3. The use of special knowledge and technical methods by investigator, by court

c) are recorded in the investigatory actions.

4. Conditions and results of their implementation

d) differs from other forms of their implementation.

Exercise 4. Open brackets choosing the right words:

Nowadays computers are (widely/closed) used for information storage and (processing/working). They are (also/too) used in criminal (activity/study). During larceny or embezzlement (investigation/event) economic crimes in (financial-banking/engineering) sphere there (are/were) computers, which serve (either/neither) as object of a criminal encroachment.

THE SPEAKING MODULE

II. Speaking Exercises:

Exercise 1. Ask questions to the given answers:

1)Question: _______________________________________________________?

Answer: The form of special knowledge use by investigators on pre-judicial trial has its peculiarities.

2)Question: _______________________________________________________?

Answer: Nowadays computers are widely used for information storage and processing.

3)Question: _______________________________________________________?

Answer: They are also used in criminal activity.

4)Question: _______________________________________________________?

Answer: A high level of computer protection can be characterized by a special protection system.

Exercise2. Retell the second paragraph.

THE WRITING MODULE

III. Writing exercises:

Exercise 1. complete the sentences with the suggested words: of(3), during(2), and(2), on.

Thus, _________ investigation action such as examination or inspection, search, seizure, reconstitution of conditions _________ circumstances_________ different categories _________ criminal cases, ______ investigation_________ computer information sphere, a new object _________ investigation ________ research can be identified-computer technique.

Exercise 2. Explain the expressions in your language:

technical methods;___________________________________

computer means;_____________________________________

an unauthorized access;________________________________

technical means;______________________________________

specially trained staff;__________________________________

special premises equipment;_____________________________

to get through the password._____________________________

Соседние файлы в папке angl_yaz