首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to
admin
2018-01-01
39
问题
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to stop children as young as 12 becoming involved in sophisticated computer crimes. Jamie Saunders said training was needed to help spot at-risk teenagers, as many young Internet users experiment with computer hacking or other cyber offences without realising that what they are doing is a crime. Saunders, Director of the National Cyber Crime Unit at the National Crime Agency, explained that he is proposing a scheme to ministers modelled in part on the official counter-radicalisation programme "Prevent", which has been dogged by controversy.
But instead of trying to divert aspirant jihadists from terrorism, "cyber Prevent" would aim to divert computer-literate youngsters from carrying out Distributed Denial of Service attacks (DDoS) and other cybercrimes, such as hacking private Internet users’ details. The "Cyber Prevent" programme might also be used to recruit tech-savvy young adults. Saunders said: "We need education for schools on the Computer Misuse Act, on what it is and isn’t. A lot of kids don’t realise they are committing a crime. We don’t want them to go to prison, we want them to come and work for us."
Demand for computer skills is forecast to grow in the coming years. One core message at the heart of the new strategy is that young adults with computer skills can earn well and legitimately, as opposed to perpetrating cybercrimes and facing punishment. "A lot of kids are stumbling into this crime. This activity has consequences for them and others. There are legitimate opportunities for their skills," Saunders said. The target group would be 12 to 25 years old. Analysis of investigations carried out by the NCCU in 2015 found the average age of suspects to be 17. The previous year the average was 24. Saunders said some cyber-attacks have been carried out by children who did not realise the harm they could do, adding: "We are not dealing with serious criminals. Some are sucked in and damage their careers and do a lot of harm."
Research shows that some who end up committing cybercrime start by learning how to outwit games programmers. "One of the entry points is cheating on online gaming, and you have to be quite clever to do that," he said. He said Cyber Prevent would be relatively low cost, especially compared with the harm it is trying to thwart. It would hire a network of regional specialists and industry might contribute to the cost.
Cyber Prevent would also target parents, so they had a better chance of knowing what their children might be up to. The sheer volume of online offending means that only a fraction of offenders are likely to be caught. Compared with other major crime types, intelligence about cybercrime offenders is at a relatively early stage. "We keep finding clean skins, people we did not know about," Saunders said.
The NCA says that also popular among teenage computer users is a malicious software called Remote Access Trojans (RATs). They allow people to remotely take full control of another computer, turning on webcams, stealing passwords and personal information, and launching further attacks on other computers. An NCA-led operation, targeting users of the Blackshades RAT, found that the average age of the 22 people who where arrested was 18, with the youngest person being just 12 years old. In 2014 the NCA coordinated the first UK-wide cybercrime operation to target users of the Blackshades RAT. More than 100 people were arrested worldwide, following an FBI-led crackdown. Saunders was previously director of international cyber policy at the Foreign Office. Prior to that he had worked at the UK Government Communications Headquarters.
What is the main idea of the passage?
选项
A、Cybercrime tsar plans to intimidate young online offenders.
B、Cybercrime director seeks "Prevent" strategy to deter child hackers.
C、The NCA led the first UK-wide cybercrime operation to target RAT users.
D、The NCA promoted the investigation of the average age of online offenders.
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/LYSO777K
本试题收录于:
NAETI高级口译笔试题库外语翻译证书(NAETI)分类
0
NAETI高级口译笔试
外语翻译证书(NAETI)
相关试题推荐
下面你将听到的是一段有关西藏少数民族情况的讲话。1986年全国人大常委会副委员长班禅喇嘛在西康地区大法会上教诲信徒们,要爱惜民族团结,维护祖国统一。在中国,公民的信仰自由受到法律保护。目前全西藏在寺僧尼约有14,000多人,另有800位
InterpretthefollowingpassagesfromChineseintoEnglish.Startinterpretingatthesignalandstopatthesignal.Youmaytak
Accordingtothestatement,theUNSecurityCouncilresolutionconcerningIsraelandYasserArafatwaspresentedbytheUnitedS
Accordingtothepassage,whathasmadeAmerica’ssystemofhighereducationagreatsuccess?
A、Pricesforfarmproducerose.B、Farmersbecamemoredependentonloansfrombanks.C、Jeffersonestablishedgovernmentprograms
MillionsofbooksandanInternet-basedcampusnetworkareavailablefortheUniversitystaffandstudents.
A、CropproductionbecameincreasinglyspecializedB、Economicdepressionsloweredthepricesoffarmproduce.C、Newbankinglaws
A、Theywerehiredtobuilduptranscontinentalroad.B、Becausetheworkwascarriedoninaremoteareaofthecountry.C、Becaus
A、Sometimesyoungpeoplecomeupwithgoodideasbuttheydon’treallyunderstandhowgoodtheseideasare.B、Youngpeoplesomet
A、Theprogressindevelopingalternativeenergy.B、Theabundantdeposit.C、Thedevelopmentoftechnology.D、Alloftheabove.A
随机试题
简历说明:请根据以下信息写一份简历。1.申请人:王林女1991年10月24日生于浙江省,未婚。2.2009年毕业于杭州市二中,2009年——2012年在浙江汽车职业技术学院读书,获英语三级证书和驾照(A照)。3.毕业后在浙江大
下列检查结果中和阻塞性通气功能不符合的是
A.药用炭B.碳酸氢钠C.甲丙氨酯D.酚磺乙胺E.甘油
《生产经营单位安全生产不良记录“黑名单”管理暂行规定》中规定,生产经营单位纳入“黑名单”管理的期限,为自公布之日起1年。连续进入“黑名单”管理的生产经营单位,从第2次纳入“黑名单”管理起,管理期限为()年。
设3阶矩阵已知A的伴随矩阵的秩为1,则a=()。
当考虑桩基承台分担荷载的作用时,按复合基桩计算竖向承载力的有()。
结构指标反映项目对经济结构的影响,主要包括()等指标。
从消防安全管理的手段上看,消防安全管理活动具有()的特征。
下列关于股东财富最大化和企业价值最大化的说法中,正确的有()。
Itwasthedistrictsportsmeeting.Myfootstillhadn’thealed(痊愈)froma(n)【C1】______injury.Ihad【C2】______whetherornotI
最新回复
(
0
)