首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to
admin
2018-01-01
46
问题
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to stop children as young as 12 becoming involved in sophisticated computer crimes. Jamie Saunders said training was needed to help spot at-risk teenagers, as many young Internet users experiment with computer hacking or other cyber offences without realising that what they are doing is a crime. Saunders, Director of the National Cyber Crime Unit at the National Crime Agency, explained that he is proposing a scheme to ministers modelled in part on the official counter-radicalisation programme "Prevent", which has been dogged by controversy.
But instead of trying to divert aspirant jihadists from terrorism, "cyber Prevent" would aim to divert computer-literate youngsters from carrying out Distributed Denial of Service attacks (DDoS) and other cybercrimes, such as hacking private Internet users’ details. The "Cyber Prevent" programme might also be used to recruit tech-savvy young adults. Saunders said: "We need education for schools on the Computer Misuse Act, on what it is and isn’t. A lot of kids don’t realise they are committing a crime. We don’t want them to go to prison, we want them to come and work for us."
Demand for computer skills is forecast to grow in the coming years. One core message at the heart of the new strategy is that young adults with computer skills can earn well and legitimately, as opposed to perpetrating cybercrimes and facing punishment. "A lot of kids are stumbling into this crime. This activity has consequences for them and others. There are legitimate opportunities for their skills," Saunders said. The target group would be 12 to 25 years old. Analysis of investigations carried out by the NCCU in 2015 found the average age of suspects to be 17. The previous year the average was 24. Saunders said some cyber-attacks have been carried out by children who did not realise the harm they could do, adding: "We are not dealing with serious criminals. Some are sucked in and damage their careers and do a lot of harm."
Research shows that some who end up committing cybercrime start by learning how to outwit games programmers. "One of the entry points is cheating on online gaming, and you have to be quite clever to do that," he said. He said Cyber Prevent would be relatively low cost, especially compared with the harm it is trying to thwart. It would hire a network of regional specialists and industry might contribute to the cost.
Cyber Prevent would also target parents, so they had a better chance of knowing what their children might be up to. The sheer volume of online offending means that only a fraction of offenders are likely to be caught. Compared with other major crime types, intelligence about cybercrime offenders is at a relatively early stage. "We keep finding clean skins, people we did not know about," Saunders said.
The NCA says that also popular among teenage computer users is a malicious software called Remote Access Trojans (RATs). They allow people to remotely take full control of another computer, turning on webcams, stealing passwords and personal information, and launching further attacks on other computers. An NCA-led operation, targeting users of the Blackshades RAT, found that the average age of the 22 people who where arrested was 18, with the youngest person being just 12 years old. In 2014 the NCA coordinated the first UK-wide cybercrime operation to target users of the Blackshades RAT. More than 100 people were arrested worldwide, following an FBI-led crackdown. Saunders was previously director of international cyber policy at the Foreign Office. Prior to that he had worked at the UK Government Communications Headquarters.
All of the following can be found from the passage EXCEPT that ______.
选项
A、the volume of cybercrime is quite large
B、intelligence about cybercrime offenders needs to be fully collected
C、the age of cybercrime offenders has been lowering over the years
D、online gaming is the one major channel leading to cybercrime
答案
D
解析
转载请注明原文地址:https://kaotiyun.com/show/GYSO777K
本试题收录于:
NAETI高级口译笔试题库外语翻译证书(NAETI)分类
0
NAETI高级口译笔试
外语翻译证书(NAETI)
相关试题推荐
尊敬的赵洪祝书记、周强书记和各位中方省长,尊敬的葛瑞格尔州长和各位美国州长,尊敬的李小林会长、霍马茨副国务卿,各位来宾,女士们、先生们:很高兴出席中美省州长对话。首先,我代表外交部和杨洁篪外长对此次对话成功举行表示热烈祝贺。长期以来,中美地方间合
A、Theyareconsideredasfashionableitems.B、Theykeeppeopleclosertoeachother.C、Theyaremoreconvenienttousersthanfi
Accordingtothestatement,theUNSecurityCouncilresolutionconcerningIsraelandYasserArafatwaspresentedbytheUnitedS
WhyhavetheAmericansdevelopedspaceshuttleaccordingtothepassage?
ThecompanybeganbyofferingcomputersoftwaresolutionstolocalbusinessesinthegreaterSeattlemetropolitanarea.
A、TheFutureofSugarIndustryinCentralAmericaB、UnemploymentinLatinAmericaC、ReformsinSugarIndustryinNorthAmericaD
Nearly20yearsagoacademicsbegancallingattentiontothefactthatcompaniestendtoawardstockoptionstoexecutivesjust
A、Thecompany’stopexecutives.B、Producersandservicemen.C、Agentsandcustomers.D、Managersfromhomeandabroad.C
Whatisdistancelearning?Itmeansthatyoustudyonyourown,athomeorwhereversuitsyou.Recently,theworldfamousOpenU
A、Therequirementsofastudent.B、Thequalificationsofacoach.C、Thelengthofone’straining.D、Theimportanceofone’sbuil
随机试题
试述矩阵图的种类和用途。
最常见的原发性胸膜肿瘤有________和________。
反映肺一次最大通气能力的指标是兰次最大吸气后,尽力尽快呼出的最大气体量是
下列公式错误的是______。
下列哪些现象与逆选择相关?( )Ⅰ.经理人用股东的钱装修豪华的办公室Ⅱ.富有的人结婚时担心对方是为了钱才跟他(她)结婚的Ⅲ.身体不好的人更愿意参加人寿保险Ⅳ.参加存款保险的商业银行更倾向投资于高风险、高收益的业务Ⅴ.政府部门要求上市公司公布真实
ISO9000:2000标准给出的以过程为基础的质量管理体系模式所确定的四个过程的顺序是()。
据报载,北京市××区开展以文化育文明活动,通过文化资源育文明,群众文化哺育文明,文化兴区培育文明等三重途径,营造文明城区。这是因为()。
把下面的六个图形分为两类,使每一类图形都有各自的共同特征或规律,分类正确的一项是:
某单位周一至周五为工作日,周六、周日双休,某年7月份,该单位员工小刘共出勤22天(全勤),则该年的7月8日可能为:
Byusingthenationalroadsystem,onecandrivetoallstatesofAmericawithoutstopping.AlthoughHenryJoyagreedtofundt
最新回复
(
0
)