英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语


时间:2006-04-18 16:00来源:互联网 提供网友:cfgxj   字体: [ ]

Cyber Crime Preys1 on All Internet Users



Every time you turn on the computer and get online, experts say, you are a potential victim of cyber crime.


The Internet Storm Center is a volunteer group that guards against criminal activity online.  It is run by Marc Sachs. 


Marc Sachs: For the criminal world it's what we like to call a perfect storm. We have an Internet that is almost completely anonymous2, perfect for criminal activity.  We have an Internet that’s largely ungoverned.


Dan Larkin heads the Internet Crime Complaint Center at the Federal Bureau of Investigation3, or FBI.  He battles cyber crime daily, and says it is diverse and global. 


Dan Larkin: We have a substantial piece of cyber crime that emanates5 from West Africa, no surprise, Eastern Europe, Russia, some in Asia and South America as well.


These rings, and cyber criminals here in the United States, are involved in schemes that run the gamut6 from identity theft, to intellectual piracy7, to sex crimes, fraud schemes, hacking8, spamming, you name it… it is being done. But here is the surprising part: home users are usually unwitting accomplices10.


Marc Sachs: We've got millions of users who don't keep their computer systems updated, who don't run anti-virus [software], who go to websites, download software [and] they don't know what they are downloading.


Experts say criminals are counting on that. When users do not update their systems, or use firewalls for protection, their computers can help spread viruses and worms, or invite trouble by downloading what are known as Trojans, some of which help spread chaos11.


Marc Sachs: Overnight your home machine, which is just sitting there silently consuming power, is actually sending out thousands of unsolicited e-mail messages and you don't even know it's happening.


The aim of some of the malicious12 e-mail or spam is to lure13 the user into clicking on a particular site or attachment14. It's called "phishing" in the cyber world, and criminals use all kinds of schemes to reel the user in. The purpose of these schemes is almost always to get money, or steal someone's identity.  


Dan Larkin: …inviting you to go to your bank, or go to your E-Bay account, or go to some other account that they hope you have and update something with regard to your personal profile or your financial or personal data.


Identity theft is a huge piece of cyber crime. The best-publicized cases -- with potential losses in the millions of dollars -- have been breaches15 in corporate16 computer networks. But home users and home computers are also at risk.


Every time you visit a website or click on an attachment, for example, you may be downloading a Trojan capable of stealing personal information. 


Called the Keylogger, it watches and records keystrokes waiting for you to access a bank site or retail17 online.


March Sachs of the Internet Storm Center explains. 


March Sachs: It knows that within first 50 or 100-some odd key strokes, I'm likely to type in my user name, my password, mothers maiden18 name, a credit card number, a PIN [personal identification] number, or other things.


Dan Larkin: The goal is to capture that, store it somewhere or transmit that information to another site for use in an identity theft or account takeover.


Dan Larkin of the FBI's Internet Crime Complaint Center says Russian cyber criminals used the Keylogger to take over thousands of identifications before they were put out of business last summer. 


International shipping19 is another cyber crime scheme sweeping20 across the United States.


Dan Larkin: We identified thousands of locations in the U.S. that were individuals and organizations that were being recruited and being used as reshippers.  


They were all connected to a Nigerian cyber crime ring that used stolen financial data to buy millions of dollars worth of goods and services to sell overseas. To avoid raising suspicion, they had first shipped goods to the recruited U.S. citizens they called "mules21."


Dan Larkin: They would recruit somebody from the U.S. to receive the package so that the shipping label and address will look domestic, the guard would drop a bit from the merchant and they would let the package be shipped, only to find next day it had been reshipped -- overnighted -- and out of country to Nigeria.


The ring was eventually broken up, but it's one more example of the scope and ingenuity22 of Internet crime.


Cracking down on cyber criminals is an ongoing23 collaborative effort among international law enforcement officials, online retailers24, and private and volunteer computer security groups. 


Personal computer users can do their part, too.  Experts say, keep your computers protected and updated. The FBI also recommends you visit the Internet Crime Complaint Center at www.ic3.gov to report suspicious activity and learn about the latest scheme in cyber space.


I’m Nahedah Zayed for VOA news.



cyber crime [5saibE5kraim] n. 计算机犯罪

anonymous [E5nCnimEs] adj. 匿名的

emanate4 [5emEneit] vi. 发出,发源

spamming 兜售信息[邮件,广告,新闻,文章],与垃圾邮件(junk mail)同义

unwitting [Qn5witiN] adj. 不知情的

accomplice9 [E5kCmplis] n. 同谋者,帮凶

worms [wE:mz] n. 计算机网络“蠕虫”病毒

unsolicited [5QnsE5lisitid] adj. 未被恳求的,主动提供的

keystroke [5ki:strEuk] n. []键击,按键


1 preys 008ad2ad9007c4d7b3ecfb54442db8fd     
v.掠食( prey的第三人称单数 );掠食;折磨;(人)靠欺诈为生
  • His misfortune preys upon his mind. 他的不幸使她心中苦恼。 来自辞典例句
  • The owl preys on mice. 猫头鹰捕食老鼠。 来自辞典例句
2 anonymous lM2yp     
  • Sending anonymous letters is a cowardly act.寄匿名信是懦夫的行为。
  • The author wishes to remain anonymous.作者希望姓名不公开。
3 investigation MRKzq     
  • In an investigation,a new fact became known, which told against him.在调查中新发现了一件对他不利的事实。
  • He drew the conclusion by building on his own investigation.他根据自己的调查研究作出结论。
4 emanate DPXz3     
  • Waves emanate from the same atom source.波是由同一原子辐射的。
  • These chemicals can emanate certain poisonous gases.这些化学药品会散发出某些有毒的气味。
5 emanates 724a6b247638d0a6927d9c426409bbb8     
v.从…处传出,传出( emanate的第三人称单数 );产生,表现,显示
  • He emanates power and confidence. 他表现出力量和信心。
  • He emanates sympathy. 他流露出同情。 来自辞典例句
6 gamut HzJyL     
  • The exhibition runs the whole gamut of artistic styles.这次展览包括了所有艺术风格的作品。
  • This poem runs the gamut of emotions from despair to joy.这首诗展现了从绝望到喜悦的感情历程。
7 piracy 9N3xO     
  • The government has already adopted effective measures against piracy.政府已采取有效措施惩治盗版行为。
  • They made the place a notorious centre of piracy.他们把这地方变成了臭名昭著的海盗中心。
8 hacking KrIzgm     
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
9 accomplice XJsyq     
  • She was her husband's accomplice in murdering a rich old man.她是她丈夫谋杀一个老富翁的帮凶。
  • He is suspected as an accomplice of the murder.他涉嫌为这次凶杀案的同谋。
10 accomplices d2d44186ab38e4c55857a53f3f536458     
从犯,帮凶,同谋( accomplice的名词复数 )
  • He was given away by one of his accomplices. 他被一个同伙出卖了。
  • The chief criminals shall be punished without fail, those who are accomplices under duress shall go unpunished and those who perform deeds of merIt'shall be rewarded. 首恶必办, 胁从不问,立功受奖。
11 chaos 7bZyz     
  • After the failure of electricity supply the city was in chaos.停电后,城市一片混乱。
  • The typhoon left chaos behind it.台风后一片混乱。
12 malicious e8UzX     
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
13 lure l8Gz2     
  • Life in big cities is a lure for many country boys.大城市的生活吸引着许多乡下小伙子。
  • He couldn't resist the lure of money.他不能抵制金钱的诱惑。
14 attachment POpy1     
  • She has a great attachment to her sister.她十分依恋她的姐姐。
  • She's on attachment to the Ministry of Defense.她现在隶属于国防部。
15 breaches f7e9a03d0b1fa3eeb94ac8e8ffbb509a     
破坏( breach的名词复数 ); 破裂; 缺口; 违背
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
16 corporate 7olzl     
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
17 retail VWoxC     
  • In this shop they retail tobacco and sweets.这家铺子零售香烟和糖果。
  • These shoes retail at 10 yuan a pair.这些鞋子零卖10元一双。
18 maiden yRpz7     
  • The prince fell in love with a fair young maiden.王子爱上了一位年轻美丽的少女。
  • The aircraft makes its maiden flight tomorrow.这架飞机明天首航。
19 shipping WESyg     
  • We struck a bargain with an American shipping firm.我们和一家美国船运公司谈成了一笔生意。
  • There's a shipping charge of £5 added to the price.价格之外另加五英镑运输费。
20 sweeping ihCzZ4     
  • The citizens voted for sweeping reforms.公民投票支持全面的改革。
  • Can you hear the wind sweeping through the branches?你能听到风掠过树枝的声音吗?
21 mules be18bf53ebe6a97854771cdc8bfe67e6     
骡( mule的名词复数 ); 拖鞋; 顽固的人; 越境运毒者
  • The cart was pulled by two mules. 两匹骡子拉这辆大车。
  • She wore tight trousers and high-heeled mules. 她穿紧身裤和拖鞋式高跟鞋。
22 ingenuity 77TxM     
  • The boy showed ingenuity in making toys.那个小男孩做玩具很有创造力。
  • I admire your ingenuity and perseverance.我钦佩你的别出心裁和毅力。
23 ongoing 6RvzT     
  • The problem is ongoing.这个问题尚未解决。
  • The issues raised in the report relate directly to Age Concern's ongoing work in this area.报告中提出的问题与“关心老人”组织在这方面正在做的工作有直接的关系。
24 retailers 08ff8df43efeef1abfd3410ef6661c95     
零售商,零售店( retailer的名词复数 )
  • High street retailers reported a marked increase in sales before Christmas. 商业街的零售商报告说圣诞节前销售量显著提高。
  • Retailers have a statutory duty to provide goods suitable for their purpose. 零售商有为他们提供符合要求的货品的法定义务。
TAG标签:   voa  环境科学  探索  计算机  网络使用者
最新评论 查看所有评论
发表评论 查看所有评论