44
New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes
Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firms competitors to foreign nations.
A competitor sabotages a companys computer system to destroy or cripple the firms operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing.
Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
1. How many kinds of crimes are mentioned in the passage?
[A]. 7. [B]. 8. [C]. 9. [D]. 10
2. What is the purpose of a competitor to sabotage a companys computer?
[A]. His purpose is to destroy or weaken the firms operational ability.
[B]. His purpose is to weaken firms competitive capability and get it.
[C]. His purpose is to buy the rivals company at a relatively low price.
[D]. His purpose is to steal important data.
3. Which of the following can be labeled as a politically motivated sabotage of a computer system?
[A]. Sabotage of a university computer. [B]. Sabotage of a hospital computer.
[C]. Sabotage of computer at a secret training base. [D]. Sabotage of a factory computer.
4. What does the author mean by Homicide could take a new form?
[A]. There is no need to use a gun in killing a person. [B]. Criminals can kill whoever they want by a computer.
[C]. The computer can replace any weapons. [D]. The function of a computer is just like a gun.
参考答案:BBCB
10句雅思阅读长难句结构分析
雅思阅读背景材料:女性成为受教育的主体
雅思阅读材料:the retirement of Ronaldo
雅思阅读材料:Law could stop student fees of 9,000 pound
雅思阅读备考笔记:T/F/NG题解答方法
雅思阅读材料:Japan halt whaling
雅思阅读答题技巧:填表题
雅思阅读备考笔记:电影学习推荐
雅思阅读水平的自测方法
雅思阅读材料:农民工的困扰 Problems for migrants
雅思阅读高分技能:速度
雅思阅读备考的四个实用原则
如何充分使用雅思阅读真题?
雅思阅读材料:Chevron's dirty fight in Ecuador
雅思阅读备考中的4个方面
雅思阅读备考笔记:复习计划
雅思阅读材料:Signs of spring delayed by freeze
实例解析雅思阅读T/F/NG题型特点
6种雅思阅读文章的段落结构
雅思阅读材料:China is the world's second largest economy
雅思阅读背景知识:苏格拉底
雅思阅读模拟题:The College
雅思阅读材料:What make of Justin Bieber?
雅思阅读T/F/NG题型例题解析
详解雅思阅读选择题的双胞胎原则
雅思阅读材料:Hosni Mubarak resigns
雅思阅读高分的三个窍门:提速是关键
雅思阅读材料:Dial F for Facebook
雅思阅读T/F/NG题型实战练习
雅思阅读背景词汇:环境资源
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |