




已阅读5页,还剩4页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Crime in Cyberspace Summary: Some thoughts about crime prevention in cyberspace. 网络犯罪摘要:关于防止网络犯罪的几点思考。Transcript:案例:Robyn Williams: 1 Last week, Ockhams Razor was presented by the Director of the Australian Institute of Criminology in Canberra, who reflected on his experience of being burgled偷盗, and how to design homes and businesses to avoid such an experience.Robyn Williams:1 上周,澳大利亚堪培拉犯罪学研究所主任演示了奥卡姆剃刀定律,他回忆了自己被盗的经历,并且告诫家庭和公司如何避免此类事件。This week we look at theft outside such physical structures: being robbed or otherwise interfered with in cyberspace. Theres plenty of risk, but what can you do about it? This is the Director of Research at the Institute, Peter Grabosky.本周,我们再介绍下此类实质形态之外的盗窃:网络抢劫或其他的干涉行为。这里存在着大量风险,但是我们应该怎么做呢?我是研究所主任,Peter GraboskyPeter Grabosky: 2 It has almost become trite迂腐 to suggest that we are entering an age as significant and profound 意义深远in its impact as was the Industrial Revolution. When you think about it, the convergence集合 of computing and communications has already affected most, if not all, of the major institutions of society. It has created unprecedented1 opportunities for education, health services, recreation and commerce. Unfortunately, it has also created unprecedented2 opportunities for crime. It seems to me that identifying these vulnerabilities, and mobilizing appropriate countermeasures will be one of the great challenges of the next century.Peter Grabosky:2 如果说,我们进入了一个时代,其意义之深远不亚于工业革命,这几乎已经是陈词滥调。您想想看,计算机和通信的结合已经影响到,即便不是全部,也是多数社会主要机构。它为教育、保健服务、娱乐和商业创造了前所未有的机会1。不幸的是,它也创造了前所未有的犯罪机会2。在我看来,识别这些漏洞,并出台相应的对策,将是下个世纪巨大挑战之一。3 This challenge is so great that it defies藐视 the capacity of law enforcement alone to control. Consequently, new forms of policing, involving the harnessing治理 of non-government resources, will become essential. Given the fact that cyberspace knows no boundaries, and that computer crime often transcends national frontiers边疆, effective countermeasure对策will also require a degree of international co-operation which is without precedent3先例.这项挑战如此巨大,以至于单靠执法控制已经无能为力。因此,新形式的警务工作,涉及利用非政府资源的治理工作,已经必不可少。鉴于网络没有国界,利用网络进行犯罪往往超越国界,因此有效的对策也将需要一定程度的史无前例的国际合作3。Let me describe nine types of crime involving information systems as instruments and/or as targets.下面向大家介绍九种犯罪类型,包括涉及文书和(或)目标的信息系统。4 First is Theft of Information Services.The means of stealing telecommunications services are diverse, and include the cloning of cellular phones, counterfeiting伪造of telephone cards, and unauthorised access to an organisations telephone switchboard. In one case, hackers were reported to have obtained access to the telephone facilities of Scotland Yard, and made over a million dollars worth of phone calls.4 第一种是窃取信息服务。窃取电信服务的手段是多种多样的,其中包括“克隆”手机,伪造电话卡,以及未经授权的访问组织的电话总机。据报道,在一个案例中,黑客获得了伦敦警察厅的电话设施,并打了话费超过一百万美元的电话。5 Next are Communications in Furtherance1 of Criminal Conspiracies阴谋.Modern information systems clearly provide an effective means by which offenders can communicate in order to plan and execute their activities. There is evidence of information systems being used to facilitate organised drug trafficking, money laundering, child pornography and trade in weapons. Although the use of information facilities does not cause such illegal conduct to occur, it certainly enhances the speed and ease with which individuals may act together to plan and to execute criminal activity.5 第二种是有利于犯罪阴谋得逞的通信。 很显然,现代信息系统为犯罪者提供了有效的沟通手段,使得他们得以计划和实施他们的行为。有证据表明,信息系统被用来帮助组织贩毒、洗钱、儿童色情和武器贸易。尽管并非由于使用信息设施而导致此类非法行为的发生,但他肯定使得个人可以更快速和更容易组织起来去计划和实施犯罪行为。6 Emerging technologies新技术 of encryption and high speed data transfer can greatly enhance the capacity of sophisticated复杂高级 criminal organizations, and place their communications outside the reach of police. Increasingly, police are encountering encrypted communications, and as cryptography密码学 becomes more widely accessible, I predict that its use to conceal criminal communications will increase markedly.6新技术的加密和高速数据传输可以大大提高复杂高级犯罪组织的能力,并且使得他们通信无法被警方破解。警方遇到的加密通信越来越多,并且密码学变得越来越普及,我预测隐藏犯罪通信的使用将显著增加。7 Then we have a range of activities to which we collectively共同的refer as Information Piracy海盗, Counterfeiting and Forgery伪造.Digital technology permits perfect reproduction of software, text, images, sound, and combinations of these-what we call multi-media content. The potential for copyright infringement版权侵犯, falsification伪造 of documents, and fabrication of negotiable instruments流通票据, has never been greater. It is now possible to download compact disks光盘 and feature films故事片 from the Internet. Copyright infringement can occur quickly and without difficulty, by anyone, from the comfort of your own home. But I would not encourage you to try it.7第三种是我们具有一系列统称为盗版、假冒和伪造的文件。数字化技术使得软件、文本、图像、声音和所说的多媒体内容的组合得以再现。使得侵权、伪造文件,以及票据流通的可能性超过以往任何时候。现在可以从网上下载光盘和故事片。任何人可以随意的,轻松、快捷的进行侵权。但我们并不鼓励大家做这种尝试。8 Then we have Dissemination宣传 of Offensive Materials.Content considered by some to be objectionable讨厌的 exists in abundance in cyberspace. This includes, among much else, sexually explicit materials, racist propaganda宣传, and instructions for the fabrication制造 of incendiary燃烧弹 and explosive devices. Information systems can also be used for harassing, threatening胁迫 or intrusive打扰 communications, from the traditional obscene telephone call to its contemporary当代的 manifestation表现 in cyber-stalking追踪 when persistent messages are sent to an unwilling recipient接受者.8 第四种是攻击性材料宣传。网络中存在着大量大家不喜欢的内容。其中包括很多其他色情材料、种族主义宣传、以及制造燃烧弹和爆炸装置的说明书。当不停的向不愿意接收的人发送信息,信息系统还可以被用来进行骚扰、恐吓或纠缠,从传统的色情电话到现代的“网络缠扰行为追踪”。9 Category种类 five is what I call Electronic Money Laundering洗钱.9 第五种是我们所说的电子洗钱For some time now, electronic funds transfers电子转账 have assisted in concealing掩饰 and in moving the proceeds of crime赃款. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Large financial institutions will no longer be the only ones with the ability to achieve electronic funds transfers transiting numerous jurisdictions司法管辖区at the speed of light. The development of informal banking institutions and parallel banking systems may permit central bank supervision监督 to be bypassed绕道, but can also facilitate the evasion逃避 of cash transaction reporting requirements in those nations which have them. Traditional underground banks, which have flourished繁荣 in Asian countries for centuries, will enjoy even greater capacity through the use of information technology.一段时间以来,电子转帐帮助隐藏和流动犯罪脏款。新兴技术将极大的帮助隐瞒非法所得的来源。许多大型金融机构将不再是唯一可以进行迅速跨区域电子转帐的机构。正规银行机构和与银行类似的系统的发展可以绕过中央银行的监管,但也可以帮助规避所在国家的现金交易报告要求。在亚洲国家繁荣了几个世纪的地下钱庄,通过使用信息技术可以享有更大的能力。10 Next is Electronic Vandalism破坏行为 and Terrorism恐怖活动.10 接下来是电子破坏和恐怖活动。As never before, western industrial society is dependent upon complex data processing and information systems. Im sure you would agree that nowadays, almost everything depends upon software. Electric power generation发电, telecommunications, air traffic control, and financial systems all comprise包含 what we call societys critical infrastructure关键基础设施. Damage to, or interference with, any of these systems can lead to catastrophic灾难的 consequences. Whether motivated by curiosity, vindictiveness恶意 or greed, electronic intruders cause inconvenience at best, and have the potential for inflicting造成 massive harm. Some commentators评论员 suggest that the very nature of warfare is changing. Defence planners around the world are investing substantially充分的 in information warfare: means of disrupting破坏 the information technology infrastructure of defence systems.空前的,西方工业社会依赖于复杂的数据处理和信息系统。我相信您会赞成,现在几乎一切都可以依赖于软件。发电、电信、空中交通管制、和金融系统都包含我们所说的社会的关键基础设施。损坏或干扰这些系统中的任何部分将导致灾难性后果。无论是由于好奇、恶意或贪婪,电子入侵者造成最大的不便,以及可能造成巨大的伤害。一些评论家认为战争的本质正在发生变化。世界各地的防务规划者正在对信息战争进行巨大的投资:信息技术基础设施破坏防御系统措施。11 Seventh is Sales and Investment Fraud欺诈.The use of the telephone for fraudulent sales pitches推销, deceptive欺诈的 charitable慈善 solicitations恳求诱惑, or bogus假的 investment overtures提议 is a billion dollar a year industry around the world. Fraudulent sales and investment offers abound in cyberspace. Further developments in electronic marketing will provide new opportunities for the unscrupulous无道德的 and new risks for the unwitting不知情的. The growing use of the Internet as a medium for share market股票市场 transactions provide unprecedented4 occasions机会 for criminal exploitation开发.11 第七种是销售和投资诈骗利用电话进行销售诈骗、慈善募捐诈骗或虚假投资提议是世界上一种一年十亿美元的产业。利用网络进行销售和投资诈骗的行为比比皆是。电子营销将为无德行为提供新的机会,以及为不知情者增加了新的风险。越来越多的使用互联网作为股市交易媒介为刑事犯罪提供了前所未有的机会。12 Next is Illegal Interception窃听 of Information.Developments in information technology provide new opportunities for electronic eavesdropping窃听. From activities as time-honoured由来已久 as the surveillance监督 of an unfaithful不忠 spouse配偶, to the newest forms of political and industrial espionage政治工业间谍, information interception has increasing applications. Here again, we are beginning to see how technological developments create new vulnerabilities. The electromagnetic电磁 signals emitted发射 by a computer may themselves be intercepted. Cables电缆 may act as broadcast antennas天线.12 下一条是非法窃听信息。信息技术的发展为电子窃听提供了新的机会。从早期的监视不忠配偶到新形式的政治工业间谍,越来越多的应用信息拦截。现在,我们又将开始看到技术发展是如何创建新的安全漏洞。计算机电磁信号发射可以使其自身被拦截。电缆可以作为广播电线。13 And finally, we have Electronic Funds Transfer Fraud.The proliferation扩散 of electronic funds transfer systems will enhance the risk that such transactions处理 may be intercepted and diverted转移. Criminals who are strategically situated and skilled enough to gain access to accounts账户have already succeeded in executing执行electronic ripoffs盗窃. The growth of electronic commerce电子商务and the move to a cashless society will provide even greater opportunities for sophisticated复杂精细criminals.13 最后是电子转帐欺诈电子资金转帐系统的扩散将增加此类处理可能被拦截和转移的风险。犯罪分子极具战略并且足够熟练的获取帐户已经成功的进行了电子盗窃。电子商务的成长并转移到无现金社会将为复杂精细的犯罪提供更大的机会。14 You can see that these forms of illegality are not necessarily mutually exclusive相互排斥, and need not occur in isolation孤立. Just as an armed robber might steal an automobile to facilitate帮助 a quick getaway, so too can one steal information services and use them for purposes of vandalism, fraud, extortion勒索, or in furtherance2 of other criminal conspiracies阴谋.14显而易见,您可以看到,非法活动的形式无需相互排斥,也无需彼此孤立。正如装备良好的抢劫犯偷走一辆汽车以便其迅速逃跑一样,人们也可以窃取服务信息,用于蓄意破坏,欺诈,勒索以及助长2其它犯罪阴谋。And remember, any one of them can be committed犯罪 from the other side of the world as easily as it can from ones own city. Conversely相反的, one can break the law somewhere on the other side of the globe from ones own bedroom.并且要谨记,任何一种犯罪行为,即使在世界的另一端,也如同在自己的城市一样轻而易举。相反,人们可以在自己的卧室里违反地球另一端的法律。15 Moreover, there may be a lack of agreement between authorities in different jurisdictions about whether or not the activity in question is criminal at all. If an online financial newsletter, originating in the Bahamas, contains fraudulent speculation推测 about the prospects of a company whose shares are traded on the Australian Stock证券交易Exchange, where has the offence occurred?15另外,对于质疑的活动是否属于犯罪行为,不同的司法机构缺乏统一意见。如果某则巴哈马群岛网上财经报道,推测某公司的股票将在澳大利亚股市进行交易,而该推测包含欺骗性内容,这样是否构成犯罪呢?16 Other issues which may complicate investigation entail承担 the logistics后勤 of search and seizure捕获, the sheer完全 volume of material within which incriminating归罪的 evidence may be contained, and the encryption of information which may render提出 it entirely inaccessible or accessible only after a massive application of decryption解密 technology.16其它问题可能需要经过复杂的调查才能进行搜寻和捕获工作,且该调查的结果可能包含所有的犯罪证据材料,在解密技术的大力使用之后,才可能发现完全无法读取或可读取这些加密的信息。17 Well, what to do about all these risks? All of this might appear formidable难对付, but pulling the plug比喻, and returning to the pre-digital age is no longer an option, because in a real sense, the genie妖怪is already out of the bottle. Not only do digital technologies provide us with specular镜子opportunities, but the competitive nature of the global economy requires that we ride the wave of technology.17那么,该如何处理所有的风险呢?这些似乎难以应付,但打个比喻,现在已经不会再选择回到数字时代之前了,因为,在真正意义上,精灵已经出瓶了,数字时代的趋势已经势不可挡了。不仅数字技术给我们提供了机会,全球经济竞争的本质也要求我们必须迎上技术发展的潮流。18 As I see it, the fundamental challenge is to maximise最大限的 the benefits which digital technology provides us, while minimising the downside risks.So, what can we do to control computer crime?18正如我所见,最大的挑战是将数字技术带给我们的利益最大化,而使其不利风险最小化。First, we should emphasise prevention.首先,我们应该重视预防。It is a great deal more difficult to pursue追捕an online offender to the ends of the earth than to prevent the offence in the first place. The trite homily说教 that prevention is better than cure治疗 is nowhere more appropriate than in cyberspace. It applies no less to high technology crime than it does to residential住宅 burglary入室盗窃. Just as one would be most unwise to leave ones house unlocked when heading off转移方向to work in the morning, so too is it foolish to leave ones information systems accessible to unauthorised persons.在全球范围内追捕一名网上罪犯比在事发点阻止其犯罪困难许多。通过说教阻止网络犯罪再合适不过了。说教对高科技犯罪所起到的作用同其对入室盗窃的所起到的作用一样。正如人们可能在早上匆忙赶去上班的时候忘记锁门一样,也可能会让未经授权人员进入其信息系统,这些低级的失误时有发生。19 It seems to me that the first step in the prevention of online crime is to raise awareness on the part of prospective victims受害者 to the risks which they face. Individuals and institutions should be made aware of the potential consequences of an attack on their information assets资产, and of the basic precautionary预防 measures which they should take. Those businesses who stand to gain the most from electronic commerce have the greatest interest in developing secure payments systems. Technologies of computer security can provide significant protection against various forms of computer crime. But there are other, low technology measures which should also not be overlooked. Perhaps foremost最重要的 among these is staff selection. Surveys of businesses reveal显示 that ones own staff often pose a greater threat威胁 to ones information assets than do so-called outsiders. Disgruntled不满的 employees and former employees constitute构成 a significant risk. Suffice满足 it to say that great care should be taken when engaging雇佣 and disengaging staff.19就我看来,预防网上犯罪的第一步是提高潜在受害者的意识,让他们意识到自己面对的风险。个人和机构都应该意识到其信息资产可能被黑客袭击的后果,并清楚在这种情况下,自己应该采取的基本预防措施。从电子商务中获益最多的业务,也能在研发安全付款系统中获取最大利益。电脑安全技术能针对各种形式的电脑犯罪提供重要的保护作用。然而,另外一些“低科技”的措施也不应该被忽视。或许,在所有的保护措施中,员工的选择最重要。公司调查显示其员工对其信息资产的威胁远远大于所谓的“局外人”。对公司不满的员工或前员工构成重要的威胁源。可以说只要在雇佣和解雇员工时额外小心就足够了。20 Next, non-governmental resources should be harnessed治理 whenever possible. 20其次,无论何时,都应该对非政府资源进行治理。Market forces will generate产生 powerful influences in furtherance3 of electronic crime control. Given the immense巨大的 fortunes which stand to be made by those who develop secure processes for electronic commerce, they hardly need any prompting from government. In some sectors, there are ample丰富的 commercial incentives激励 which can operate in furtherance4 of cyber-crime prevention. Information security promises to become one of the growth industries of the coming century. Some of the new developments in information security which have begun to emerge出现 include technologies of authentication鉴定. The simple password for access to a computer system, vulnerable to theft or determination by other means, is being complemented补充 or succeeded altogether by biometric生物计量 authentication methods such as retinal视网膜 imaging and voice or fingerprinting.在帮助3控制网上犯罪中,市场力将产生有力的影响。如果给予研发电子商务安全程序的人员巨大的财富,他们几乎不再需要政府的任何激励措施。在一些部门里,有充足的激励措施能帮助4阻止网络犯罪。信息安全将成为未来世纪里新兴增长的产业之一。信息安全中已经出现了一些新的发展,包括鉴定技术。进入计算机系统的简单密码已经远不足以抵挡信息窃取者或其它途径对计算机系统的侵袭,计算机系统密码正成为信息安全的一种补充形式,需要生物计量鉴定技术例如视网膜成像及声音或指纹的配合才能成功保证系统的安全。21 Detection侦查 of unauthorised access to or use of computer systems can be facilitated by such technologies as artificial intelligence and neural networking神经网络, which can identify anomalous异常 patterns模式 of use according to time of day, and keystroke按键 patterns.21通过人工智能和神经网络可帮助侦查未经授权进入或使用计算机系统的行为,该技术根据每天使用的时间和按键模式可识别异常模式。22 Next, we can enhance the Capacity of Law Enforcement. The continuing uptake获取 of digital technology around the world means that law enforcement agencies will be required to keep abreast of rapidly developing technologies. As new technologies are exploited by criminals, it becomes even more important for law enforcement not to be left behind. This is a significant challenge, given the emerging trend for skilled investigators to be poached侵占 by the private sector. The collaboration合作of law enforcement with specialised expertise residing存在于 in the private sector will become a common feature in years to come.22其次,我们可提高执法能力。世界范围内数字技术的不断进步意味着执法机构也必须保持快速发展科技的脚步。由于犯罪分子利用新兴的技术进行犯罪活动,因此,执法部门不能落后于科技的发展的要求变得更为重要。如果技术娴熟的调查人员逐渐被私有部门所有,这将会是一个巨大的挑战。执法部门同私有部门的专家互相合作将成为未来的普遍特征。23 Finally, it is imperative必要的 to foster鼓励扶植 international co-operation.23最后,有必要鼓励国际合作。At present, if I, in Australia, were to be gullible易受骗 enough to fall victim牺牲品 to a fraudulent investment scheme计划 originating in Albania, I suspect that I could count on very little help from authorities政府 in either jurisdiction司法. But transnational跨国界的 electronic crime seems destined注定 only to increase.目前,如果我在澳大利亚,被阿尔巴尼亚的一份虚假投资计划所欺骗并成为受害者,我认为自己几乎不能从任何一方政府的司法机构获得帮助。然而,跨国网上犯罪却似乎注定只增不减。24 Steps taken following the G-8 Birmingham meeting in May 1998 for nations to designate指定 liaison联络处 offices which will be on call on a 24-hour basis, illustrates说明 the need for prompt迅速 concerted协调 response to the problem of transnational digital crime.24遵照1998年五月G-8伯明翰会议所采取的措施,指定24小时电话联络办公室,说明了应对跨国数字犯罪问题及时协调的必要性。25 I think most of us would agree that the world is a shrinking收缩 place. On the one hand, this shrinking is highly beneficial. People around the world now enjoy economic, cultural and recreational娱乐 opportunities which were previously以前 not accessible. On the other hand, the rapid mobility机动性 of people, money, information, ideas and commodities商品 generally has provided new opportunities for crime, and new challenges for law enforcement agencies. This will require unprecedented5 co-operation between nations, and will inevitably不可避免 generate t
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年资产评估行业当前市场规模及未来五到十年发展趋势报告
- 2025年电抗器行业当前发展现状及增长策略研究报告
- 保定市安新县2024-2025学年中考数学模拟试题含解析
- 2025年版《义务教育道德与法治课程标准》试题(含答案)
- 2025年食堂从业人员卫生知识测试试题与答案
- 2025年安全工程师试卷及答案
- (完整)老年痴呆护理培训考试试题及答案
- 摩托驾驶安全知识培训课件
- 2025政府采购评审专家考试试题及答案
- 2025年全国公文写作与处理自考试题及答案解析
- DB15-T 3015-2023地理标志产品 俄体粉条
- 医学检验题库(全)
- 卡拉贝利110千伏线路吊车跨越G3013高速公路施工方案
- 闸调器介绍讲解
- YB/T 4089-2000高功率石墨电极
- GB/T 9268-2008乳胶漆耐冻融性的测定
- GB/T 16439-2009交流伺服系统通用技术条件
- 成都理工大学2023年805普通物理学考研真题(回忆版)
- 申克振动筛操作和维护手册
- 三晶变频器说明书SAJ8000系列简约版
- 循环系统-超声诊断
评论
0/150
提交评论