新世纪博士生综合英语Unit5_Crime_in_Cyberspace课文及译文.doc_第1页
新世纪博士生综合英语Unit5_Crime_in_Cyberspace课文及译文.doc_第2页
新世纪博士生综合英语Unit5_Crime_in_Cyberspace课文及译文.doc_第3页
新世纪博士生综合英语Unit5_Crime_in_Cyberspace课文及译文.doc_第4页
新世纪博士生综合英语Unit5_Crime_in_Cyberspace课文及译文.doc_第5页
免费预览已结束,剩余5页可下载查看

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Unit5: Crime in CyberspaceNew technogical developments present unprecedented opportunities for computer crime.- Peter Grabosky网络犯罪 新技术的发展给电脑犯罪带来了前所未有的机会。- Peter GraboskyRobyn Williams: 罗宾威廉斯1 Last week, Ockhams Razor was presented by the Director of the Australian Institute of Criminology in Canberra, who reflected on his experience of being burgled偷盗, and how to design homes and businesses to avoid such an experience. This week we look at theft outside such physical structures: being robbed or otherwise interfered with in cyberspace. Theres plenty of risk, but what can you do about it? This is the Director of Research at the Institute, Peter Grabosky.Robyn Williams:1 上周,澳大利亚堪培拉犯罪学研究所主任演示了奥卡姆剃刀定律,他回忆了自己被盗的经历,并且告诫家庭和公司如何避免此类事件。本周,我们再介绍下此类实质形态之外的盗窃:网络抢劫或网络上的其他干涉行为。网络上存在着大量风险,但是我们应该怎么做呢?这是澳大利亚犯罪学研究所研究部主任,Peter GraboskyPeter Grabosky:2 It has almost become trite迂腐 to suggest that we are entering an age as significant and profound 意义深远in its impact as was the Industrial Revolution. When you think about it, the convergence集合 of computing and communications has already affected most, if not all, of the major institutions of society. It has created unprecedented1 opportunities for education, health services, recreation and commerce. Unfortunately, it has also created unprecedented2 opportunities for crime. It seems to me that identifying these vulnerabilities, and mobilizing appropriate countermeasures will be one of the great challenges of the next century.2暗示我们现在正进入一个如同工业革命一样具有意义重大而深远的时代几乎可以说是一个老调重弹的话题。当你考虑这个问题时,计算机和通信的融合已经给我们的大多数(即使不是全部)社会机构带来了巨大的影响。这一融合给教育、卫生、娱乐和商业创造了前所未有的机会,不幸的是,它也给犯罪创造了史无前例的机会。在我看来讨论这些负面影响,并且采取合适的对策会是下一个世纪的巨大挑战之一。3 This challenge is so great that it defies藐视 the capacity of law enforcement alone to control. Consequently, new forms of policing, involving the harnessing治理 of non-government resources, will become essential. Given the fact that cyberspace knows no boundaries, and that computer crime often transcends national frontiers边疆, effective countermeasures对策will also require a degree of international co-operation which is without precedent3先例. Let me describe nine types of crime involving information systems as instruments and/or as targets.这一挑战的威力如此之大以至于仅凭法律执行部门本身的力量来控制是不够的。因此,新的政策形式,包括利用非政府资源,将变得极其重要。考虑到网络无国界和计算机犯罪经常超越国界这一事实,采取有效地对策也将要求国际合作打到一种史无前例的程度。下面我向大家介绍九个类型的犯罪,包括把信息系统做为手段和(或)目标。4 First is Theft of Information Services.The means of stealing telecommunications services are diverse, and include the cloning of cellular phones, counterfeiting伪造of telephone cards, and unauthorised access to an organisations telephone switchboard. In one case, hackers were reported to have obtained access to the telephone facilities of Scotland Yard, and made over a million dollars worth of phone calls.4 第一种是窃取信息服务。窃取电信服务的手段是多种多样的,其中包括“克隆”手机,伪造电话卡,以及未经授权的访问组织的电话总机。在一个案例中,据报道黑客获得了进入伦敦警察厅电话设施的权限,并打了价值超过100万美元的电话。5 Next are Communications in Furtherance of Criminal Conspiracies阴谋.Modern information systems clearly provide an effective means by which offenders can communicate in order to plan and execute their activities. There is evidence of information systems being used to facilitate organised drug trafficking, money laundering, child pornography and trade in weapons. Although the use of information facilities does not cause such illegal conduct to occur, it certainly enhances the speed and ease with which individuals may act together to plan and to execute criminal activity.5 第二种是通信促进犯罪阴谋。 很显然,现代信息系统为犯罪分子计划和实施犯罪行为提供了有效的沟通手段。有证据表明,信息系统被用来帮助组织贩毒、洗钱、儿童色情和武器贸易。尽管信息设施的使用不会导致此类非法行为的发生,但它肯定使犯罪分子可以更快速和更容易地共同制定计划和实施犯罪活动。6 Emerging technologies新技术 of encryption and high speed data transfer can greatly enhance the capacity of sophisticated复杂高级 criminal organizations, and place their communications outside the reach of police. Increasingly, police are encountering encrypted communications, and as cryptography密码学 becomes more widely accessible, I predict that its use to conceal criminal communications will increase markedly.6新的加密技术和高速的数据传输可以大大提高老练的犯罪组织的能力,并且使得他们通信无法被警方破解。警方遇到的加密通信越来越多,并且随着密码学变得越来越普及,我预测运用密码学隐藏犯罪通信的情况将显著增加。7 Then we have a range of activities to which we collectively共同的refer as Information Piracy海盗, Counterfeiting and Forgery伪造.Digital technology permits perfect reproduction of software, text, images, sound, and combinations of these-what we call multi-media content. The potential for copyright infringement版权侵犯, falsification伪造 of documents, and fabrication of negotiable instruments流通票据, has never been greater. It is now possible to download compact disks光盘 and feature films故事片 from the Internet. Copyright infringement can occur quickly and without difficulty, by anyone, from the comfort of your own home. But I would not encourage you to try it.7第三种是统称为盗版、假冒和伪造的一系列活动。数字化技术可完美再现软件、文本、图像、声音和所说的多媒体内容的组合。使得侵权、伪造文件,以及伪造流通票据的可能性超过以往任何时候。现在可以从网上下载压缩光盘和故事片。任何人可以随意的,轻松、快捷的进行侵权。但我并不鼓励大家做这种尝试。8 Then we have Dissemination宣传 of Offensive Materials.Content considered by some to be objectionable讨厌的 exists in abundance in cyberspace. This includes, among much else, sexually explicit materials, racist propaganda宣传, and instructions for the fabrication制造 of incendiary燃烧弹 and explosive devices. Information systems can also be used for harassing, threatening胁迫 or intrusive打扰 communications, from the traditional obscene telephone call to its contemporary当代的 manifestation表现 in cyber-stalking追踪 when persistent messages are sent to an unwilling recipient接受者.8 第四种是宣传令人反感的材料。网络中存在着大量大家不喜欢的内容。其中包括露骨的色情材料、种族主义宣传、以及制造燃烧弹和爆炸装置的说明书。当不停的向不愿意接收的人发送信息,信息系统还可以被用来进行骚扰、恐吓或干扰通信,从传统的色情电话到现代的“网络骚扰”。9 Category种类 five is what I call Electronic Money Laundering洗钱.For some time now, electronic funds transfers电子转账 have assisted in concealing掩饰 and in moving the proceeds of crime赃款. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Large financial institutions will no longer be the only ones with the ability to achieve electronic funds transfers transiting numerous jurisdictions司法管辖区at the speed of light. The development of informal banking institutions and parallel banking systems may permit central bank supervision监督 to be bypassed绕道, but can also facilitate the evasion逃避 of cash transaction reporting requirements in those nations which have them. Traditional underground banks, which have flourished繁荣 in Asian countries for centuries, will enjoy even greater capacity through the use of information technology.9 第五种是我所说的电子洗钱。一段时间以来,电子转帐帮助隐藏和转移脏款。新兴技术将大大地帮助隐瞒非法所得的来源。大型的金融机构将不再是唯一可以通过大量权限迅速进行电子转帐的机构。不正规银行机构和与银行类似的系统的发展不仅可以绕过中央银行的监管,而且也可以帮助规避所在国家的现金交易报告要求。在亚洲国家繁荣了数世纪的地下钱庄,通过使用信息技术将享有更大的能力。10 Next is Electronic Vandalism破坏行为 and Terrorism恐怖活动.As never before, western industrial society is dependent upon complex data processing and information systems. Im sure you would agree that nowadays, almost everything depends upon software. Electric power generation发电, telecommunications, air traffic control, and financial systems all comprise包含 what we call societys critical infrastructure关键基础设施. Damage to, or interference with, any of these systems can lead to catastrophic灾难的 consequences. Whether motivated by curiosity, vindictiveness恶意 or greed, electronic intruders cause inconvenience at best, and have the potential for inflicting造成 massive harm. Some commentators评论员 suggest that the very nature of warfare is changing. Defence planners around the world are investing substantially充分的 in information warfare: means of disrupting破坏 the information technology infrastructure of defence systems.10 接下来是电子破坏和恐怖活动。西方工业社会空前地依赖复杂的数据处理和信息系统。我相信您会赞成,现在几乎一切都依赖于软件。发电、电信、空中交通管制、和金融系统都包含我们所说的社会的关键基础设施。损坏或干扰这些系统中的任何部分都能导致灾难性后果。无论是由于好奇、恶意或贪婪,电子入侵者造成最大的不便,以及可能造成巨大的危害。一些评论家认为战争的本质正在发生变化。世界各地的防务规划者正在对信息战争进行巨大的投资:破坏防御系统的信息技术基础设施的手段。11 Seventh is Sales and Investment Fraud欺诈.The use of the telephone for fraudulent sales pitches推销, deceptive欺诈的 charitable慈善 solicitations恳求诱惑, or bogus假的 investment overtures提议 is a billion dollar a year industry around the world. Fraudulent sales and investment offers abound in cyberspace. Further developments in electronic marketing will provide new opportunities for the unscrupulous无道德的 and new risks for the unwitting不知情的. The growing use of the Internet as a medium for share market股票市场 transactions provide unprecedented4 occasions机会 for criminal exploitation开发.11 第七种是销售和投资诈骗利用电话进行销售诈骗、慈善募捐诈骗或虚假投资提议是世界上一种一年十亿美元的产业。销售和投资诈骗的行为在网络比比皆是。电子营销的进一步发展将为无道德的人提供新的机会,以及为不知情者带来了新的风险。越来越多的使用互联网作为股市交易媒介为犯罪提供了前所未有的机会。12 Next is Illegal Interception窃听 of Information.Developments in information technology provide new opportunities for electronic eavesdropping窃听. From activities as time-honoured由来已久 as the surveillance监督 of an unfaithful不忠 spouse配偶, to the newest forms of political and industrial espionage政治工业间谍, information interception has increasing applications. Here again, we are beginning to see how technological developments create new vulnerabilities. The electromagnetic电磁 signals emitted发射 by a computer may themselves be intercepted. Cables电缆 may act as broadcast antennas天线.12 下一条是非法截取信息。信息技术的发展为电子窃听提供了新的机会。从早期的监视不忠配偶到最新形式的政治工业间谍,信息拦截的应用越来越多。在这里,我们又将开始看到技术发展是如何创建新的负面影响。计算机发射的电磁信号本身可能会被拦截。电缆可能起了广播电线的作用。13 And finally, we have Electronic Funds Transfer Fraud.The proliferation扩散 of electronic funds transfer systems will enhance the risk that such transactions处理 may be intercepted and diverted转移. Criminals who are strategically situated and skilled enough to gain access to accounts账户have already succeeded in executing执行electronic ripoffs盗窃. The growth of electronic commerce电子商务and the move to a cashless society will provide even greater opportunities for sophisticated复杂精细criminals.13 最后是电子转帐诈骗电子资金转帐系统的普及将增加此类交易可能被拦截和转移的风险。极具战略并且足够熟练的获取帐户权限的犯罪分子已经成功的进行了电子盗窃。电子商务的成长和向无现金社会的转移将为老练的犯罪分子提供更大的机会。14 You can see that these forms of illegality are not necessarily mutually exclusive相互排斥, and need not occur in isolation孤立. Just as an armed robber might steal an automobile to facilitate帮助 a quick getaway, so too can one steal information services and use them for purposes of vandalism, fraud, extortion勒索, or in furtherance2 of other criminal conspiracies阴谋. And remember, any one of them can be committed犯罪 from the other side of the world as easily as it can from ones own city. Conversely相反的, one can break the law somewhere on the other side of the globe from ones own bedroom.14您可以看到,这些非法活动的形式无需相互排斥,也无需彼此孤立。正如装备良好的抢劫犯偷走一辆汽车以便其迅速逃跑一样,人们也可以窃取服务信息,用于蓄意破坏,欺诈,勒索以及促进2其它犯罪阴谋。并且不要忘记,从世界的另一端进行计算机犯罪同在自己的城市进行计算机犯罪一样容易。相反地,人们可以在自己的卧室违反地球另一端某个地方的法律。15 Moreover, there may be a lack of agreement between authorities in different jurisdictions about whether or not the activity in question is criminal at all. If an online financial newsletter, originating in the Bahamas, contains fraudulent speculation推测 about the prospects of a company whose shares are traded on the Australian Stock证券交易Exchange, where has the offence occurred?15再者,拥有不同管辖权的权威部门对于所讨论的行为是否构成了犯罪缺乏一致的意见。如果某则巴哈马群岛网上财经报道,推测某公司的股票将在澳大利亚股市进行交易,而该推测包含欺骗性内容,这样是否构成犯罪呢?16 Other issues which may complicate investigation entail承担 the logistics后勤 of search and seizure捕获, the sheer完全 volume of material within which incriminating归罪的 evidence may be contained, and the encryption of information which may render提出 it entirely inaccessible or accessible only after a massive application of decryption解密 technology.16可能使调查复杂化的其他问题需要搜寻和抓捕的后勤工作,包含犯罪证据的所有材料和加密信息;而只有在解密技术的大力使用之后才能得出这些加密信息是完全无法读取的或是可读取的。17 Well, what to do about all these risks? All of this might appear formidable难对付, but pulling the plug比喻, and returning to the pre-digital age is no longer an option, because in a real sense, the genie妖怪is already out of the bottle. Not only do digital technologies provide us with specular镜子opportunities, but the competitive nature of the global economy requires that we ride the wave of technology.17那么,对于所有的这些挑战,我们能做什么呢?这些挑战看上去难以对付,但是拔下插头回到前数字时代已经是不可能的了,因为实际上妖怪已经从瓶子里跑出来了。数字技术不仅给我们提供了前所未有的机会,全球经济的竞争本质也要求我们充分利用这个新技术。18 As I see it, the fundamental challenge is to maximise最大限的 the benefits which digital technology provides us, while minimising the downside risks. So, what can we do to control computer crime? First, we should emphasise prevention. It is a great deal more difficult to pursue追捕an online offender to the ends of the earth than to prevent the offence in the first place. The trite homily说教 that prevention is better than cure治疗 is nowhere more appropriate than in cyberspace. It applies no less to high technology crime than it does to residential住宅 burglary入室盗窃. Just as one would be most unwise to leave ones house unlocked when heading off转移方向to work in the morning, so too is it foolish to leave ones information systems accessible to unauthorised persons.18正如我所见,最大的挑战是充分扩大数字技术带给我们的益处,同时把它的不利方面降低到最小。所以,我们能做什么来控制计算机犯罪呢?首先,我们应强调预防。到天涯海角去追捕一个网上的犯罪者比一开始就防范这种犯罪的发生要难得多,“预防好于治疗”这句老话没有比用于网络更合适的地方了。这句话对于居家防盗和高科技犯罪同样适用。正如一个人早晨去上班时没锁家门是非常不明智的一样,让未经授权的人都可以进入自己的信息系统也是愚蠢的。 19 It seems to me that the first step in the prevention of online crime is to raise awareness on the part of prospective victims受害者 to the risks which they face. Individuals and institutions should be made aware of the potential consequences of an attack on their information assets资产, and of the basic precautionary预防 measures which they should take. Those businesses who stand to gain the most from electronic commerce have the greatest interest in developing secure payments systems. Technologies of computer security can provide significant protection against various forms of computer crime. But there are other, low technology measures which should also not be overlooked. Perhaps foremost最重要的 among these is staff selection. Surveys of businesses reveal显示 that ones own staff often pose a greater threat威胁 to ones information assets than do so-called outsiders. Disgruntled不满的 employees and former employees constitute构成 a significant risk. Suffice it to say that great care should be taken when engaging雇佣 and disengaging staff.19就我看来,预防网上犯罪的第一步是提高潜在受害者的意识,让他们意识到自己面对的风险。个人和机构都应该意识到其信息资产可能被攻击的可能性后果,并清楚在这种情况下,应该采取的基本预防措施。从电子商务中获益最多的企业最有兴趣开发安全支付系统。(从电子商务中获益最多的业务,也能在研发安全付款系统中获取最大利益。)针对不同形式的电脑犯罪,电脑安全技术能提供重要的保护。然而,另外一些“低科技”的措施也不应该被忽视。或许,在所有的保护措施中,员工的选择最重要。公司调查显示其员工对其信息资产造成的威胁远远大于所谓的“局外人”。对公司不满的员工或前员工构成重要的威胁源。只要在雇佣和解雇员工时非常谨慎就足够了。20 Next, non-governmental resources should be harnessed治理 whenever possible. Market forces will generate产生 powerful influences in furtherance3 of electronic crime control. Given the immense巨大的 fortunes which stand to be made by those who develop secure processes for electronic commerce, they hardly need any prompting from government. In some sectors, there are ample丰富的 commercial incentives激励 which can operate in furtherance4 of cyber-crime prevention. Information security promises to become one of the growth industries of the coming century. Some of the new developments in information security which have begun to emerge出现 include technologies of authentication鉴定. The simple password for access to a computer system, vulnerable to theft or determination by other means, is being complemented补充 or succeeded altogether by biometric生物计量 authentication methods such as retinal视网膜 imaging and voice or fingerprinting.20其次,是尽可能利用非政府资源。在帮助3控制网上犯罪中,市场力将产生有力的影响。倘若电子商务安全程序的研发人员获得了巨大的财富,他们几乎不再需要政府的任何激励措施。在一些领域里,有充足的激励措施能帮助4防范网络犯罪。信息安全有望成为未来世纪里增长的行业之一。信息安全中已经出现了一些新的发展,包括鉴定技术。进入计算机系统的简单密码容易被盗窃或以其他方式确定,这种简单密码正在被补充,或者说需要生物计量鉴定技术如视网膜成像及声音或指纹的配合才能成功保证系统的安全。21 Detection侦查 of unauthorised access to or use of computer systems can be facilitated by such technologies as artificial intelligence and neural networking神经网络, which can identify anomalous异常 patterns模式 of use according to time of day, and keystroke按键 patterns.21通过人工智能和神经网络可帮助侦查未经授权进入或使用计算机系统的行为,该技术根据每天使用的时间和按键模式可识别异常使用模式。22 Next, we can enhance the Capacity of Law Enforcement. The continuing uptake获取 of digital technology around the world means that law enforcement agencies will be required to keep abreast of rapidly developing technologies. As new technologies are exploited by criminals, it becomes even more important for law enforcement not to be left behind. This is a significant challenge, given the emerging trend for skilled investigators to be poached侵占 by the private sector. The collaboration合作of law enforcement with specialised expertise residing存在于 in the private sector will become a common feature in years to come.22再次,我们应该增强法律执行部门的能力。全世界范围内数字犯罪的持续增加意味着法律执行机构也需要了解快速发展的技术。随着犯罪分子开始利用新技术,法律执行部门不落在后面变得更加重要。如果技术娴熟的调查人员逐渐被私有部门所有,这将会是一个巨大的挑战。执法部门同私有部门的专家互相合作将成为未来的普遍特征。 23 Finally, it is imperative必要的 to foster鼓励扶植 international co-operation. At present, if I, in Australia, were to be gullible易受骗 enough to fall victim牺牲品 to a fraudulent investment scheme计划 originating in Albania, I suspect that I could count on very little help from authorities政府 in either jurisdiction司法. But transnational跨国界的 electronic crime seems destined注定 only to increase.23最后,加强国际合作是势在必行的。目前,如果我在澳大利亚,被阿尔巴尼亚的一份虚假投资计划所欺骗并成为受害者,我认为自己几乎不能从任何一方政府的司法机构获得帮助。然而,跨国电子犯罪肯定会增加。24 Steps taken following the G-8 Birmingham meeting in May 1998 for nations to designate指定 liaison联络处 offices which will be on call on a 24-hour basis, illustrates说明 the need for prompt迅速 concerted协调 response to the problem of transnational digital crime.24遵照1998年五月G-8伯明翰会议所采取的措施,指定24小时电话联络办公室,说明了应对跨国数字犯罪问题及时协调的必要性。25 I think most of us would agree that the world is a shrinking收缩 place. On the one hand, this shrinking is highly beneficial. People around the world now enjoy economic, cultural and recreational娱乐 opportunities which were previously以前 not accessible. On the other hand, the rapid mobility机动性 of people, money, information, ideas and commodities商品 generally has provided new opportunities for crime, and new challenges for law enforcement agencies. This will require unprecedented5 co-operation between nat

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论