-
(单词翻译:双击或拖选)
网络的发展,给我们带来便利的同时,也带来了问题。其中之一就是网络犯罪....
Dan: Hello, I'm Dan.
Rob: And I'm Rob.
Dan: And this is 6 Minute English! This week we're talking about cyber crime.
Rob: Yes, cyber crime. It's something we're hearing more and more about. This is
crime that takes place over a computer network.
Dan: Rob, have you ever been the victim of cyber crime?
Rob: Well, I don't think so. I always use security software on my computer and keep
all my passwords private.
Dan: That's a good idea. I do the same but it still seems possible for hackers1 to
access our computers. More on that in a minute but first I have a question for
you, Rob.
Rob: I thought you might!
Dan: Well, here goes. According to a recent UK government study, how much does
cyber crime cost the UK economy? Is it:
a) £27 million a year
b) £27 billion a year, or
6 Minute English © bbclearningenglish.com 2011
Page 2 of 7
c) £270 billion a year
Rob: I’d take a guess at £27 million a year.
Dan: OK, well, as usual, I'll tell you the correct answer at the end of the programme.
Now let's talk a bit more about what's happening in the world of cyber crime.
Rob: This online crime is becoming more commercialised and this is what experts
were recently discussing at a meeting in London.
Dan: So criminals are carrying out illegal practices online and cashing in on them
by selling their services to other people.
Rob: And internet security experts want to stop this.
Dan: That’s right. They're calling it a cyber war. It's a sort of virtual war. But who
exactly are they fighting?
Rob: Well, it's computer hackers, many of who are teenagers working on their
computers at home.
Dan: But there's a worry their work is overlapping2 with the world of criminal
networks. And Charlie McMurdy of the Police Central e-crime Unit says this
work is international.
6 Minute English © bbclearningenglish.com 2011
Page 3 of 7
Insert 1: Charlie McMurdy, Police Central e-crime Unit
Every investigation3 has international aspects to it. You don't have to, like your old, say,
the armed robbery team who used to meet in the dark and dangerous pub… Well, on
the internet you can meet virtually and work as a criminal enterprise, even though
you’re in different parts of the world.
Dan: Charlie McMurdy says cyber crime is different from old fashioned crimes.
Criminals can meet virtually anywhere and work as a criminal enterprise - like
a business.
Rob: So they meet virtually. They don't meet physically4, face to face, but they
communicate via the internet.
Dan: Yes. It's a big problem. Did you know there are nine new unique threats
detected every second in cyberspace5?
Rob: Wow, that is a lot. And what exactly do they do?
Dan: Well, they are hijacking6 - or taking over - home computers and turning them
in to botnets.
Rob: Botnets - tell us more about that, Dan.
Dan: Well, these are a network of computers taken over by hackers and used for
malicious7 purposes. They infect the computers with software that enables
them to control them remotely.
Rob: And this sort of activity is becoming more commercialised?
6 Minute English © bbclearningenglish.com 2011
Page 4 of 7
Dan: It is. Tony Osborn from security company Symantec uses another word,
'industrialised'.
Insert 2: Tony Osborn, Symantec
What we’ve found over the last few years is a maturing, so it's like the industrialisation
of this business. Part of one organisation8 might be selling botnet facilities, so you can
rent our botnet for $100 or whatever, and that will give you access to these number of
devices. And that you give us the malicious code, the malware, the spam and we will
inject that into the botnets, and for a period of time we will then send those out.
Dan: Tony Osborn says the business is maturing.
Rob: So that means it's fully9 developed and it's becoming big business. One
example is hackers renting out access to botnets. They give you access to a
number of devices for a fee - for money.
Dan: And then they inject your malicious codes, malware and spam into other
people's computers.
Rob: Spam. That's when you send the same message indiscriminately to a large
numbers of recipients10 on the Internet.
Dan: And we don't have much control over this. But the UK government is planning
to spend £650 million on improving cyber security. But what should it be spent
on? John Bassett from the Royal United Services Institute thinks there are
number of priorities.
6 Minute English © bbclearningenglish.com 2011
Page 5 of 7
Insert 3: John Bassett, Royal United Services Institute
How that is going to be spent in the context of the Ministry11 of Defence, how that's going
to be spent in terms of network defence overall. What's going to be done in terms of
public awareness12, what are we going to do about bringing on more cyber experts? All
four of those, I think, are important and the cornerstone of good cyber security has to be
based on education.
Dan: So John Bassett is talking about areas of cyber security where he thinks money
could be spent. And he talked about education and public awareness.
Rob: Public awareness is all about educating people on good cyber security. The
risks from cyber crime are everywhere, from fraud to espionage13 and even
Dan: It seems to be the big crime of the 21st century and it's costing us a lot of
money.
Rob: That's right, and Dan, earlier you asked me a question. According to a UK
government study, how much is it costing the economy? £27 million a year,
£27 billion a year or £270 billion a year?
Dan: And you said?
Rob: I said £27 million a year. Am I right?
Dan: No, you’re not! It's actually £27 billion a year, and that's a lot of money.
Rob: It really is, isn’t it, yeah.
6 Minute English © bbclearningenglish.com 2011
Page 6 of 7
Dan: OK, Rob, well, before we go, let’s hear some of the words and phrases that
we’ve used in today’s programme.
Rob: cyber crime
hackers
commercialised
cashing in
enterprise
hijack
botnets
malicious
industrialised
espionage
Dan: Thanks, Rob. Well, we hope you’ve found today's 6 Minute English interesting
- and that you’ll join us again next time.
Both: Bye.
1 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
2 overlapping | |
adj./n.交迭(的) | |
参考例句: |
|
|
3 investigation | |
n.调查,调查研究 | |
参考例句: |
|
|
4 physically | |
adj.物质上,体格上,身体上,按自然规律 | |
参考例句: |
|
|
5 cyberspace | |
n.虚拟信息空间,网络空间,计算机化世界 | |
参考例句: |
|
|
6 hijacking | |
n. 劫持, 抢劫 动词hijack的现在分词形式 | |
参考例句: |
|
|
7 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
8 organisation | |
n.组织,安排,团体,有机休 | |
参考例句: |
|
|
9 fully | |
adv.完全地,全部地,彻底地;充分地 | |
参考例句: |
|
|
10 recipients | |
adj.接受的;受领的;容纳的;愿意接受的n.收件人;接受者;受领者;接受器 | |
参考例句: |
|
|
11 ministry | |
n.(政府的)部;牧师 | |
参考例句: |
|
|
12 awareness | |
n.意识,觉悟,懂事,明智 | |
参考例句: |
|
|
13 espionage | |
n.间谍行为,谍报活动 | |
参考例句: |
|
|
14 warfare | |
n.战争(状态);斗争;冲突 | |
参考例句: |
|
|