首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to
admin
2018-01-01
72
问题
Britain’s cybercrime tsar is to ask the government for a programme based on its controversial counter-radicalisation strategy to stop children as young as 12 becoming involved in sophisticated computer crimes. Jamie Saunders said training was needed to help spot at-risk teenagers, as many young Internet users experiment with computer hacking or other cyber offences without realising that what they are doing is a crime. Saunders, Director of the National Cyber Crime Unit at the National Crime Agency, explained that he is proposing a scheme to ministers modelled in part on the official counter-radicalisation programme "Prevent", which has been dogged by controversy.
But instead of trying to divert aspirant jihadists from terrorism, "cyber Prevent" would aim to divert computer-literate youngsters from carrying out Distributed Denial of Service attacks (DDoS) and other cybercrimes, such as hacking private Internet users’ details. The "Cyber Prevent" programme might also be used to recruit tech-savvy young adults. Saunders said: "We need education for schools on the Computer Misuse Act, on what it is and isn’t. A lot of kids don’t realise they are committing a crime. We don’t want them to go to prison, we want them to come and work for us."
Demand for computer skills is forecast to grow in the coming years. One core message at the heart of the new strategy is that young adults with computer skills can earn well and legitimately, as opposed to perpetrating cybercrimes and facing punishment. "A lot of kids are stumbling into this crime. This activity has consequences for them and others. There are legitimate opportunities for their skills," Saunders said. The target group would be 12 to 25 years old. Analysis of investigations carried out by the NCCU in 2015 found the average age of suspects to be 17. The previous year the average was 24. Saunders said some cyber-attacks have been carried out by children who did not realise the harm they could do, adding: "We are not dealing with serious criminals. Some are sucked in and damage their careers and do a lot of harm."
Research shows that some who end up committing cybercrime start by learning how to outwit games programmers. "One of the entry points is cheating on online gaming, and you have to be quite clever to do that," he said. He said Cyber Prevent would be relatively low cost, especially compared with the harm it is trying to thwart. It would hire a network of regional specialists and industry might contribute to the cost.
Cyber Prevent would also target parents, so they had a better chance of knowing what their children might be up to. The sheer volume of online offending means that only a fraction of offenders are likely to be caught. Compared with other major crime types, intelligence about cybercrime offenders is at a relatively early stage. "We keep finding clean skins, people we did not know about," Saunders said.
The NCA says that also popular among teenage computer users is a malicious software called Remote Access Trojans (RATs). They allow people to remotely take full control of another computer, turning on webcams, stealing passwords and personal information, and launching further attacks on other computers. An NCA-led operation, targeting users of the Blackshades RAT, found that the average age of the 22 people who where arrested was 18, with the youngest person being just 12 years old. In 2014 the NCA coordinated the first UK-wide cybercrime operation to target users of the Blackshades RAT. More than 100 people were arrested worldwide, following an FBI-led crackdown. Saunders was previously director of international cyber policy at the Foreign Office. Prior to that he had worked at the UK Government Communications Headquarters.
Which of the following is NOT covered by the new strategy?
选项
A、To track down the serious cyber-criminals.
B、To recruit tech-savvy youngsters to work for the programme.
C、To tell young people with computer skills that they can legitimately earn well.
D、To promote education on the Computer Misuse Act.
答案
A
解析
转载请注明原文地址:https://www.kaotiyun.com/show/FYSO777K
本试题收录于:
NAETI高级口译笔试题库外语翻译证书(NAETI)分类
0
NAETI高级口译笔试
外语翻译证书(NAETI)
相关试题推荐
InterpretthefollowingpassagesfromEnglishintoChinese.Startinterpretingatthesignalandstopatthesignal.Youmaytak
InterpretthefollowingpassagesfromEnglishintoChinese.Startinterpretingatthesignalandstopatthesignal.Youmaytak
Manyyoungpeopledoubtthattheirdreamsforthegoodlifecouldevercometrue.
Accordingtothepassage,whathasmadeAmerica’ssystemofhighereducationagreatsuccess?
Nowpeoplebelievethatboththeirgovernmentsandindividualsshouldpracticejustice,integrityandtrust.
Nowpeoplebelievethatboththeirgovernmentsandindividualsshouldpracticejustice,integrityandtrust.
Nearly20yearsagoacademicsbegancallingattentiontothefactthatcompaniestendtoawardstockoptionstoexecutivesjust
Ascrimeskyrocketsinmanycommunities,peoplearefinallybeginningtolookforlong-lastingeffectiveanswerstostemthetid
Intheatmosphere,carbondioxideactsratherlikeaone-waymirror—theglassintheroofofagreenhousewhichallowsthesun’s
Intheatmosphere,carbondioxideactsratherlikeaone-waymirror—theglassintheroofofagreenhousewhichallowsthesun’s
随机试题
耳郭是以下述何成分作为主要支架
以下哪项是缺铁性贫血时红细胞直方图的特点
A.半年B.一年C.二年D.三年E.四年
王某将房子租给刘某居住,月租金800元,现王某因刘某拖欠了10个月的房租未缴,而诉诸法院,要求刘某给付8000元房租。现问,此案的诉讼标的指的是什么?
施工成本计划作为施工成本控制的依据,应包括的重要内容是()。
登记账簿要用蓝黑墨水钢笔或蓝黑圆珠笔书写,不得使用铅笔书写。()
只有当外部审计组织按照有关监管法律的授权或接受监管当局的委托对商业银行进行审计时,其工作才具有风险监管的性质。()
影像是历史的眼睛,也是现实的摄魂术。它是对世界忠直的观察、记录、发现,而非对世界的提纯、美化,或者丑化。伍尔芙说图像“不是争论”,“它们就是事实直接对眼睛所说的未经加工的声明”。这个由机器所作的记录,当然比文字更加中立、客观、可信。而我们能够将一些不该忘却
房地产中介服务行业信用档案按照()的原则进行。
Gesturesareanimportantmeansto______messages.
最新回复
(
0
)