LESSON 3. LAW AND THE INTERNET

 

Discussion

1. Think of possible legal problems that the Internet may cause.

2. Search the Internet and find definitions of the following concepts. Present them in a group discussion.

1) charity fraud – мошенническая благотворительность (is the act of using deception to get money from people who believe they are making donations to charities.)

2) cyber terrorism – осуществление террористических актов, используя компьютерные технологии (['saɪbə]) (the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm, in order to achieve political gains through intimidation.)

3) cyberextortion – кибер-вымогательство (extortion by means of the Internet)

4) cyberstalking – кибер-преследование (the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, slander and libel)

5) cyberwarfare – компьютерная (кибер) война (any virtual conflict initiated as a politically motivated attack on an enemy's computer and information systems.)

6) dating fraud – мошеннические свидания/знакомства

7) espionage – шпионаж (the practice of spying or of using spies, typically by governments to obtain political and military information)

8) identity theft – кража личных данных (the use of a person's private identifying information, usually for financial gain.)

9) internet marketing and retail fraud – интернет маркетинг и мошенничество в сфере розничной торговли

10) phishing – фишинг/ выуживание информации, позволяющей совершить "кражу личности" (a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims.)

11) piracy – пиратство/нарушение авторского права (the unauthorized use of another's production, invention)

12) purchase fraud – торговое мошенничество

13) social engineering - провоцирование пользователя (refers to psychological manipulation of people into performing actions or divulging confidential information.)

14) "work-at-home" scams – работа на дому (for some, working at home is a dream. For others, it’s an opportunity to defraud those dreamers. Work-at-home scams pop up everywhere—in your email, on social media.)

 

Reading and speaking

Text 1

1. Read the text below. Find in the text the English equivalents of the following words:

1. финансовая афера - financial scams

2. взламывать систему - computer hacking (crack into systems, to penetrate into systems)

3. вымогательствоextortion

4. взлом компьютерной системы безопасности -breaches of security

5. злоупотребление интернетом на рабочем местеto abuse the internet

6. фиктивная компания - bogus company

7. кража сведений личного характераidentify theft

8. преследованиеstalking

9. неожидаемыйunsolicited (?)

10. компьютерная программа, несущая скрытую опасность - malicious code

11. использовать уязвимые места в системе безопасности - security vulnerabilities of a system

12. промышленный шпионаж - ndustrial espionage

WHAT IS A CYBERCRIME?

Cybercrime is one of the fastest-growing criminal activities on the planet. Cybercrime is defined as the use of any computer network for crime and the high-tech criminals of the digital age have not been slow to spot the opportunities. The scope (сфера, рамки) of the definition becomes even larger with the frequent companion or substitute term “computer-related crime.” Some writers are also of the opinion that “computer crime” refers to computer-related activities which are either criminal in the legal sense of the word or just antisocial behaviour where there is no breach of the law (нарушение закона).

Given the extent to which computers have become a part of modern life, it was inevitable that some people would see the wired world as an opportunity to make money or cause mischief. Cybercriminals can range from teenagers who vandalise websites to terrorists who target (нацеливаться на) a nation.

Cybercrime covers a huge range of illegal activityincluding financial scams, computer hacking, downloading pornographic images from the internet, virus attacks, stalking by e-mail and creating websites that promote racial hatred.

ü The term hacking was originally used to describe an audacious practical joke, but has become better known as a term for the activities of computer enthusiasts who pit their skills against the IT systems of governments and big corporations. Hackers sometime crack into systems to brag about their abilities to penetrate into systems, but others do it for illegal gain or other malicious purposes. The handiwork of some hackers, or "crackers" as they are known in the computer industry, has had disastrous results. The "love-bug" virus crippled at least 45 million computers worldwide and caused billions of dollars worth of damage.

ü Then there is fraud and extortion. Some hackers have broken into the computer systems of banks and other businesses, with the intention of stealing money - or information like credit card numbers, which are just as valuable to the criminal.

· 90% of US companies which responded to a Computer Security Institute survey said they had detected computer security breaches in the previous year

· 74% acknowledged financial losses as a result of the breaches of security

· 79% detected employee abuse of the internet, for example downloading pornography or pirated software

· 85% detected computer viruses

Gangsters can use computers for extortion. Burglary rings track break-ins and then inventory their winnings from each job. Gangsters who want to murder a person in hospital can crack the hospital’s computers to alter the dosage of medication.

Scams by cyber-criminals include setting up bogus companies on the Net. Unsuspecting buyers are offered products at tempting prices, and then supply their credit card details - only to find that the site suddenly disappears. No phone number, no address and no redress. The dot com becomes a dot con.

ü   Another 21st century crime is identity theft. This usually does not involve hacking at all. Criminals can trawl the web or other public databases for information about someone's date of birth, social security number and address and then use that to apply for credit cards and run up huge bills. It is easy to do and as a result is one of the fastest growing crimes in the US.

ü Cyberstalking. The goal of a cyberstalker is control. Stalking and harassment over cyberspace is more easily practised than in real life. There are many cases where cyberstalking crosses over to physical stalking. Some examples of computer harassment are:

- Live chat obscenities (непристойности) and harassment;

- Unsolicited and threatening e-mail;

- Hostile postings about someone;

- Spreading vicious rumours about someone;

- Leaving abusive messages on a website’s guest books.

ü Malicious codes like worms, viruses and Trojan horses cause damage on a greater scale. These exploit security vulnerabilities of a system and they tend to alter or destroy data. The damage they cause is worth millions of Ringgit to companies as well as government agencies. Worms are different from viruses because they are able to spread themselves with no user interaction. A virus can attack systems in many ways: by erasing files, corrupting databases (база данных) and destroying hard disk drives (жесткийдиск).

ü Industrial espionage. This is where corporations spy on other companies and with network systems, this can be an easy task. Companies can retrieve sensitive information rarely leaving behind any evidence. Cyberespionage can also be applied to nations that spy on other countries' sensitive information (конфиденциальнаяинформация).

With so many cybercrimes on the rise the need for a cyberlaw is obvious, but the difficulties are baffling (трудный, неблагоприятный).

The internet is a global system. We can now be attacked by criminals who do not need to come to this territory. Lots of policing arrangements have their roots in the fact that victim and offender are geographically co-located. So the problem for all law-enforcement agencies (правоохранительные органы) is the way that cybercrime, like the Internet itself, is not limited by national boundaries. An investigation that begins in one country may quickly lead elsewhere, but without the co-operation of other nations, it may be impossible to track down (проследить, отследить) the perpetrators (нарушитель, преступник) and secure convictions.

Then there’s a question of liberty. When the Council of Europe produced a draft treaty on cybercrime, it was deluged (потоплять, наполнять) by e-mails from internet users concerned about possible infringements(нарушения) of their privacy and liberty. One complaint said that the proposals could have "a chilling effect on the free flow of information and ideas."

European officials say they have tried to address these concerns, and stress that their intention is simply to consolidate laws against activities such as hacking, spreading viruses, and computer fraud so that in future there is a standard way of securing the digital evidence needed for prosecutions.

 

2. Define the following words as they are used in the text:

- to pit their skills against – (the IT systems of governments and big corporations) – confront

- dot com - a company that relies on Internet commerce

-dot con - a bogus company

-to trawl the web – (site or public databases for information about someone's date of birth) -

- hostile postings - threatening messages, links or images

- vicious rumours – slanders and libels

- to retrieve information – obtain any kind of information

- deluged by e-mails – to be sent a lot of unnecessary e-mails

3. Make use of the material contained in the previous text as well as your own information to answer the following questions:

1) Why is there a need for cyberlaw ?

2) How would you define cyberlaw?

3) What difficulties does cyberlaw involve?

4) Have you heard about any attempts to enact a law on cybercrimes?

 

Text 2

1. Read the text, define its main idea.

2. Single out the topic sentence in every paragraph.

THIEVES IN THE NIGHT

The growth in general wickedness (злой поступок, выходка, злость) online is testing the police

CRIME has been falling in Britain since the mid-1990s, as it has in much of the rich world. Car-related theft has plummeted by (стремительно падать, снижаться)  79% since 1995 and burglary by 67%. The decline is partly due to technology; car immobilisers (устройство, лишающее автомобиль подвижности) and house alarms (домашние сигнализации) make such crimes harder. The increased use of CCTV (кабельное телевидение, close-circuit television) and DNA databases (базы данных ДНК) means criminals are more likely to be caught, and the rewards for burglary have decreased anyway because electronic gadgets are so cheap. The falling crime rate (уровень преступности) has come alongside big recent cuts in police budgets. In 2015, the coalition government trimmed 20%. Meanwhile, crime has moved online.

Britain is particularly at risk when it comes to cybercrime, argues Charlie McMurdie, a cyber-security (информационнаябезопасность) expert at PricewaterhouseCoopers (PWC), a consultancy. It is rich, its infrastructure for moving money around is slick (сколький, хитрый), and it is saturated with (пропитан, пронизан) technology. Over 60% of the population use smartphones. More than 80% of households are connected to the internet. Three-quarters of them shop online. According to PWC, 69% of companies in Britain experienced a cyber-security incident in the past year, compared to 59% globally.

The term “cybercrime” covers everything from sophisticated attacks on government websites to e-mails offering fake prizes. The more serious kinds—and the damage they cause—are obvious. But many are small in scale (в масштабе), though high in volume. There is a big difference between technically being the target of a cybercrime, such as receiving a fake friend-request (поддельнаястраница пользователя на Фейсбук) on Facebook, and actually being harmed, points out David Wall, a criminologist(криминолог) at Durham University.

The scale of it is also hard to measure, in Britain as elsewhere. According to a study in October carried out by Get Safe Online, a government-supported group, half of Britons have experienced crime online—everything from identity theft to hacking to online abuse(злоупотребление интернетом). But the Crime Survey (опрос, исследование) for England and Wales, the best indicator of long-term trends, does not include any of it in its overall count(общее количество) (although the government is now evaluating the best ways of doing so). Government statisticians say that card and bank fraud (мошенничество с картами и банковскими счетами) could contribute 3.6-3.8m incidents of crime to the survey’s total. If that is true, it would reverse the decline in overall crime of the past decade.

Underreporting (непредставление информации) is rife (распространенный, тзобилующий, обычное дело). A Home Office study in October 2013 estimated (оценивать, расценивать, полагать, считать) that businesses reported only 2% of online incidents to the police. Earlier research showed that, among adult Internet users, just 1% reported unauthorised access (несанкционированный доступ) to their data (though that may have risen). Some victims do not realise a crime has taken place. Having your e-mail account hacked is annoying but few people report such crimes to the police; they turn instead to the Internet company for help.

Businesses keep cyber attacks quiet(умалчивать о кибер-атаках/взломах), worried that customers and competitors will assume they have been compromised. In November Andrew Tyrie, chairman of a parliamentary committee, questioned Britain’s biggest banks about whether they were understating the true scale of fraud. Many companies and banks see little benefit in reporting attacks to the police, says Ms McMurdie of PWC. They prefer to go to firms such as hers which have the skills and resources for a fast response.

Public apathy (равнодушие, апатия) persists, except around crimes such as online child abuse (насилие над ребенком). Much cybercrime seems remote, compared with more tangible offences (материальные проавонарушения) such as a burglary or an assault(нападение с причинением физ.насилия). The paucity(нехватка, недосаток) of information about crime online, including its broader impact, does not help. Such poor intelligence makes it hard to deploy (использовать, задействовать) resources effectively. The police do not have ready access to much of the evidence of cybercrime. In November Britain’s police regulator criticised the English and Welsh forces for failing to keep pace with (идти в ногу с, поспевать за) changing criminality, in particular cybercrime.

As a result, police are working more closely with private companies than they might on other crimes. In 2013 the government launched the Cyber Security Information Sharing Partnership which allows companies to share intelligence with each other and the government, including GCHQ, its electronic-monitoring agency. They can do so anonymously, mitigating (смягчать, уменьшать) fears about reputation damage (угроза репутации).

A safe investment

The police are placing a growing emphasis on this kind of crime. The government is investing £860m ($1.4 billion) in its cyber-security programme, established in 2011 (though much has gone to the security and intelligence agencies (разведывательныеучреждения) which deal with more sophisticated cyber-threats). In August the Metropolitan Police set up FALCON, a unit to respond to cybercrime and fraud in London. It deals with online frauds that encourage people to hand over their money or personal details. Since 2009 Britons have been urged to report such fraud to a central body, Action Fraud. The National Fraud Investigation Bureau collates (сопоставлять, сравнивать) those reports and disseminates (распространять) them to individual forces to investigate.

Alan Woodward, a computer scientist at the University of Surrey and an adviser to Europol, the European Union’s law enforcement agency (правоохранительные органы), says that Britain stacks up (зарабатывать, получать выручку) well in tackling()  online crime compared to other EU countries. But the nature of the Internet makes tackling low-level, high-volume cybercrime difficult anywhere. Many perpetrators (правонарушители) are based abroad.

The question is how much time and money the police should devote to online fraud. Stealing cars is seen by many criminologists as a debut crime (совершение преступления в первый раз), the first step on a journey to more serious offences. Cybercrime does not appear to be, says Professor Wall. Fraudsters (мошенники) merely have to commit a greater number of minor frauds to make more money; more complex offences are unnecessary. Many of those willing to commit low-level crimes online would balk at (отказываться, упираться) doing so on the street.

In the meantime, individuals and companies will do more. Few expect every new spammer (спаммер) to be arrested, says Richard Clayton, a computer scientist at Cambridge University. Instead, each spam-blocking system tweaks itself (настраиватьсебя) to increase its success rate. No one in the Wild West believed the sheriff would arrive each time someone stole a cow, he says. “Everyone had to look out for themselves.”

3.Provide definitions of the underlined words and word-combinations and translate them into Russian.

4. Answer the following questions and do the given tasks.

1) What kind of crime has been falling in Britain since the mid-1990s? Why? - CRIME has been falling in Britain since the mid-1990s, as it has in much of the rich world. The decline is partly due to technology; car immobilisersand house alarms make such crimes harder. Сriminals are more likely to be caught, and the rewards for burglary have decreased anyway because electronic gadgets are so cheap.

2) Why is Britain particularly at risk when it comes to cybercrime? -  It is rich, its infrastructure for moving money around is slick and it is saturated with technology.

3)According to the text, what does the term “cybercrime” cover? - The term “cybercrime” covers everything from sophisticated attacks on government websites to e-mails offering fake prizes.

Why don’t individuals report cyberattacks to the police? - Some victims do not realise a crime has taken place. Having your e-mail account hacked is annoying but few people report such crimes to the police; they turn instead to the Internet company for help.

4)Why do businesses keep cyberattacks quiet? – companies don’t want their reputation to be spoilt

5) Prove that the police and the government in Britain are placing a growing emphasis on cybercrime.

6) Do you think more money and police time should be devoted to computer-related crimes? Why (not)?

7) Comment on the metaphor from the final paragraph of the text.

8) Do you believe that some day cyberspace will be completely secure? Why (not)?

 

Text 3

1. Explain and translate the underlined words and word combinations.

FROM RUSSIA WITH “LOADS”

If you think the teeth-gnashing (скрежетание зубами,злость) over unauthorized music downloading (несанкционированное скачивание музыки) begins and ends with Kazaa and Limewire, you're just not thinking globally. A new potential legal battleground (поле боя) on the issue could soon emerge with a focus on, of all places, Russia. A handful of Web sites bearing the ".ru" suffix are offering extremely cheap, downloadable, high-quality MP3s of thousands of CDs.

If the popularity of these sites grows, as it seems to have been doing dramatically in the past year, does anyone think the record labels whose products they're selling will stand by idly (оставатьсябузучастным) and let all this post-Soviet-breakup capitalism run rampant (выходить из под контроля)?

What's available on the Russian sites is, in a word, enticing (соблазнительный). The two primary sites in question--MP3search.ru Club and AllofMP3 are heavier on current and recent Top 40 fare (стоимость, плата), but both have a generous selection of hiphop, Latin pop, and classic rock as well. The selection at AllofMP3 is greater, and it also offers music-video downloads.

Here's the best part: All that music is available in high-quality MP3, all of it's completely burnable  and compatible with all players, and all of it costs about a penny per megabyte--literally less than you'd pay to hear any of these songs on the jukebox (музыкальныйавтомат) in your corner bar. And in fact, AllofMP3 offers music by some artists free of charge (), as sort of a loss leader feature for registered members.

If this all sounds too good to be true, maybe it is and maybe it isn't.

MP3search.ru Club's site swears up and down (клясться чемугодно) that everything it's doing falls in line with(подчиняться, соглашаться с) Russian copyright law: "MP3Search.Ru Club has an agreement with RUSSIAN ORGANIZATION FOR MULTIMEDIA & DIGITAL SYSTEMS" the site's fine print reads.

But suppose you don't live in Russia. Are you violating American copyright laws by using these sites? That's where it gets murky (становиться непонятным, «мутным»). The CD discussion site Museekster conducted what it calls a thorough review of the legal nuts and bolts (основные легальные компоненты) behind these sites, and came to the conclusion that it's all on the up and up-(делать успехи, прогрессировать) -at least in Russia.

"Copyrights for downloads in Russia are more or less equal to the rights radio stations have to pay for broadcasting music," the site reads. "But the most important factor is that one U.S. dollar is worth lots of rubles. In Russia, CDs cost about $2-3. So Allofmp3 to Russians is in fact as expensive as iTunes is to Americans."

If you're comfortable with taking this kind of armchair legal advice, you'll probably be inclined to take your chances with the sites. The product is great, the price is certainly right, and from reading the posts of dozens of users, it doesn't seem that anyone has regretted giving either site their credit-card information. (I would avoid the many U.S. sites that seem to be offering the same service, however.)

The bottom line (конечный результат) seems to be – repeat, seems to be – that Americans have every right to obtain music from anyone who has a legal right to sell it in their country. But as was the case with Napster five years ago, these sites are probably legally available for use only because nobody has taken steps to shut them down yet. If you're OK with residing in what seems to be a legal grey area (легальная «серая полоса», нечто среднее), my advice now is the same as it was during Napster's pre-litigation heyday (пора расцвета): Get it while the getting's good.

 

2. Write the summary of the article.

3. What are other possible legal problems connected with infringement of copyright on the internet (chose one aspect and speak in detail)? What’s you personal attitude to unauthorized music downloading?

4. Have a group discussion of the problems of Internet copyright laws, one part of the group acting as copyright owners (musicians, writers etc.) whose works have been performed on the Internet without the copyright owner’s permission and the other part acting as Internet users, Internet service providers etc. who protect their right to free information on the Internet.

 

Rendering


Дата добавления: 2018-04-15; просмотров: 538; Мы поможем в написании вашей работы!

Поделиться с друзьями:




Мы поможем в написании ваших работ!