二
New and bizarre crimes have come into being with the advent of computer technology. Organized crime too has been directly involved; the new technology offers its unlimited opportunities, such as data crimes, theft of services, propertyrelated crimes, industrial sabotage, politically related sabotage,vandalism,crimes against the individual and financially related crimes.
(1) Theft of data, or data crime.
It has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program.
(2) To destroy a company’s computer system.
It cripples the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm.
(3) Politically motivated sabotage is on the increase
Political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicate have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders.
(4)Sabotaging the computer of a lifesupport system
Computers are used in hospital lifesupport system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation.
(5) The organized computer crime
The computer opens vast areas of crime to organized criminal groups, both national and international.
[A]It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
[B] An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations.
[C]Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defense work suffered more than$2million in damages as a result of a bombing.
[D]Politically related sabotage could bring about a lot of disaster.
[E]Criminals could kill an individual as easily as they and used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could be come hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century.
[F]With the growing reliance by firms on computers for their record keeping and daily operations,sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
答案及解析
1. B。 答题线索:上下文一致。从第一段我们可以了解到计算机新技术犯罪的类型。从本段我们可以知道所说的是计算机化的数据犯罪问题。由此,我们可以推断出第一句中心句所说的应该就是关于数据犯罪的问题。所以,我们不难选出该项为正确答案。
2. F。答题线索:段落一致性。从本段我们可以了解到其大意是计算机的破坏给企业所带来的影响。而有些公司则利用这一点来达到其不可告人的目的。通过本段的大意,我们可以看到选项F正好符合题意,为正确答案。
3. C。答题线索:段落一致性。本句这段所举的例子:摧毁一空军基地的计算机设施和大学计算机设施的爆炸,这些都是具有政治目的性的破坏,也就是属于第一段所说的"与政治有关的破坏"。很明显,选项C的意思与其相一致,因此为正确答案。
4. E。答题线索:段落一致性。通读本句的文段内容,我们可以了解到计算机很容易遭到犯罪集团的破坏。也就是说不管是政府的计算机还是私人的计算机系统都很容易遭到计算机罪犯的破坏,换一句话就是说政府和私人的计算机系统都还没有足够的防破坏的能力。通过这样的逻辑分析,我们就可以不难选出E项为正确答案。
5. A。答题线索:上下文一致。纵观全文,我们可以知道整篇文章所说的都是关于计算机技术犯罪的问题。而在最后我们可以推断出作者应该是发表了他对此的观点和看法。从C项我们可以看出作者提出了法制还需健全的观点,对计算机的犯罪我们不应该还停留在用传统的犯罪学来思考问题。因此,选择A为正确答案。
译文
随着计算机技术的出现,产生了新的奇怪的犯罪。有组织的犯罪团伙也直接参与:新技术为犯罪提供了无数的机会:如数据信息犯罪、偷窃服务项目、与财产有关的犯罪、工业破坏、与政治有关的破坏、对文化的破坏、针对个人的犯罪和与金融有关的犯罪等。
偷窃数据或数据犯罪。它已引起有组织的犯罪辛迪加(集团)的兴趣。通常这是偷窃或抄袭珍贵的计算机程序。关于计算机化的数据已有了国际市场,据说在这种迅速扩大的犯罪市场上专业化的电子栅栏起着关键作用。这种盗版程序的买主有公司的竞争对手也有国外竞争对手。
破坏一个公司的计算机系统。该行为的目的是破坏或削弱公司的运行能力,从而使其丧失在私人或政府部门的竞争能力。计算机的破坏也可能牵扯到富裕的投资者想得到受害公司的企图。由于公司越来越多地依靠计算机进行记录贮存和日常运行,对计算机的破坏会导致内部大浩劫。此后有意得到该公司的集团会以相当低的价格轻而易举地把它买到手。如果这个公司是由有组织的犯罪,操纵和控制的企业的对手,则该犯罪团伙也可能利用破坏。
有政治动机的破坏正在上升。在每个大陆都兴起了政治极端分子集团。复杂的计算机技术用可怕的力量武装了这些集团,而且打开了许多技术先进的国家让他们攻击。为了摧毁一个空军基地的计算机设施,他们已进行了多次尝试。与国家防卫工作有关的一个大学计算机设施由于一次爆炸损失200万美元以上。计算机屡遭破坏的情况已多有记载。一个国会的调查表明;无论是政府还是私人的计算机系统都没有足够的防破坏能力。有组织的犯罪集团已表示他们想与政治集团合作的愿望。调查已发现犯罪集团和外国政府在麻醉剂方面的合作。犯罪集团已多次试图暗杀政治领导人。
破坏生命维持系统的计算机。计算机应用于医院的生命维持系统、实验室以及重大手术。罪犯们会很容易地把这些计算机变成破坏的工具。通过破坏生命维持系统的计算机,罪犯可以像用枪一样容易杀人。通过操纵计算机,他们可以引导这些恐怖的工具攻击大的城市中心。城市和国家都可能变成人质。谋杀会有一种新形式。计算机可能会成为20世纪的职业杀手。
有组织的计算机犯罪。计算机为国内外有组织地犯罪集团开辟了广阔的犯罪领域。它要求他们集中资源,增强合作力量,因为许多这种犯罪太复杂,一个集团难以处理,特别是那些需要庞大的电子栅栏网络的犯罪。虽然罪犯已适应了计算机技术,但法制还没有。许多人还用传统的犯罪学思考问题。
下一页继续
① 凡本站注明“稿件来源:中国教育在线”的所有文字、图片和音视频稿件,版权均属本网所有,任何媒体、网站或个人未经本网协议授权不得转载、链接、转贴或以其他方式复制发表。已经本站协议授权的媒体、网站,在下载使用时必须注明“稿件来源:中国教育在线”,违者本站将依法追究责任。
② 本站注明稿件来源为其他媒体的文/图等稿件均为转载稿,本站转载出于非商业性的教育和科研之目的,并不意味着赞同其观点或证实其内容的真实性。如转载稿涉及版权等问题,请作者在两周内速来电或来函联系。




中国教育在线















