Thursday, 26 February 2015

Cyber crime - video

https://www.youtube.com/watch?v=Nu7c5t8JnYA
https://www.youtube.com/watch?v=mCt2hzpyWZc
https://www.youtube.com/watch?v=NDVO0Nhufow
https://www.youtube.com/watch?v=dNh2e2QFxOQ

Cyber crime - video

Describe each video in 5 sentences:
https://www.youtube.com/watch?v=m0iaRn2WwPw
https://www.youtube.com/watch?v=vKS2Cfj_NAs&list=PLIJh7bG6WS8Cu9kXZhK9uQdVOj1MvmRwo&index=2
https://www.youtube.com/watch?v=daF-_Q9lfg0

Twitter ends link with JustSpotted.com after ‘stalker’ warnings - text 5



Twitter ends link with JustSpotted.com after ‘stalker’ warnings


A Twitter has ended its relationship with JustSpotted.com after criticism the site will help people to stalk celebrities. The website, which is due to launch next week, is designed to track the movements of stars using updates from social networking sites. Postings from celebs’ Twitter accounts and sightings by fans will be used to put together a map showing where the stars are. It had been developed in co-operation with Twitter and other social networking websites to collate news of 7,000 celebrities who advertise their activities through the internet.

B Privacy campaign group Big Brother Watch reacted angrily to news of JustSpotted.com’s imminent launch and spokesman Daniel Hamilton said: “Aside from being hugely intrusive, it is a gift to stalkers and people regarded as being very strange or eccentric who could misuse it to harass celebrities.” PR expert Richard Hillgrove told the Independent he feared what could happen to people featured on the site if there are negative stories about them in the press.

C “This site can be used to facilitate a witch-hunt. You could create vigilantism, that’s a very dangerous aspect of it,” he warned. Their concerns were echoed by lawyers and Twitter has now decided to withdraw its support. Lawyer Rod Dadak said the site might break anti-stalking laws. “I don’t think this site will survive,” he said. “It could be seen as inciting people to pay celebrities a visit. It could amount to a criminal offence, and it is certainly invading privacy.”

D Matt Graves, a spokesman for the microblogging service, said: “This is not the product we licensed, and we have terminated their agreement.” Twitter had previously agreed to provide postings of celebrities to the team behind JustSpotted.com, but the new service was being marketed as a search engine project when the deal was negotiated.

E JustSpotted.com will go ahead as scheduled, using other applications to sift data from Twitter accounts. Its backers insist it cannot be used to stalk celebrities, as the real-time nature of the website means people will not be able to react quickly enough to sightings.



backer – příznivec
imminent launch – blízké spuštění
intrusive – dotěrný
nature – povaha
posting – aktualizování, příspěvek
sighting – pozorování
to facilitate – napomáhat, usnadnit
to sift – prošetřit
to terminate – ukončit
track – stopovat
vigilantism – bdělost



1) Read the article and match each of the headings to a paragraph.
1 Twitter has decided to stop its support
2 JustSpotted.com could be misuse it to harass celebrities
3 JustSpotted.com will go ahead
4 Matt Graves’ reaction
5 Introduction
2) Read the article again and answer the questions.
1 What is the article about?
2 What is JustSpotted.com? What does it do?
3 What is Twitter? What do its representatives say?
4 What does lawyer Rod Dadak think?
5 What is your opinion about JustSpotted.com?

3) Explain the following words.
1 stalker
2 criminal offence
3 to invade privacy
4 Twitter accounts
5 to stalk celebrities

What are social networks? How can they be misused? What information shouldn’t we publish there? What crimes are connected with using social networks?

Adjusted to:
Read more: http://www.metro.co.uk/news/844196-twitter-ends-link-with-justspotted-com-after-stalker-warnings

Net users try to avoid phish hooks - text 4



Net users try to avoid phish hooks


A In November 2002, when an e-mail attachment known as the W32/Mimail-I worm posed as a Web site link from online payment company PayPal, hundreds of people were duped into exposing their personal bank account information. The use of viruses, spam and Web sites to defraud financial institutions and their customers is a relatively new Internet phenomenon. Phishing crimes have been on the rise throughout the world and are increasingly coming from Central and Eastern Europe.

B “It is very important for consumers to not believe everything,” said Karel Pavlík of the Consumer Defence Association. He said phishing is not yet a common practice here, but he thinks it could be a growing problem as people start to use bank cards and credit cards set up for online purchases.

C North America has been the worst target of phishing. Customers of TD Canada Trust, Citibank, Ebay’s PayPal and Visa have all unwittingly spread account numbers, passwords and other sensitive information. Experts say the threat from phishing could potentially have a devastating impact on consumer trust in e-commerce and e-banking. The open nature of the Internet makes it easy for criminals to hide, say police and consumer advocates.

D While most crimes have been linked to the United States, where online transactions are more common, there have been a large number of phishing cases traced to Central Europe. U.S. intelligence recently cooperated with online auction site Ebay to look into a number of scams that came from Romania, resulting in the arrest of more than 100 people. One man, Dan Marius Stefan, was convicted of stealing nearly $500,000 (13.5 million Kč) through phishing and is now serving 30 months in a Romanian prison.

E Since 2002 the Czech Republic has taken a proactive approach to the issue by banning unsolicited advertising, including spam. The government called for greater fines of 10 million Kč, a penalty that would place the country near the top of the European Union scale. The government complied regulations on spam with European Commission in 2002. “This proposal harmonized Czech law with European law,” said OPDP spokeswoman Hana Štěpánková. “It allows people like you and me to decide who has our data. It makes our position stronger.”



duped – podvedený
nature – povaha
to pose – představovat
unsolicited – nevyžádaný
unwittingly – nevědomky, bezděčně



1) Read the article and match each of the headings to a paragraph.
1 Phishing has a devastating impact on consumer trust
2 Consumers should not believe everything
3 Regulations in the Czech Republic
4 Relatively new Internet phenomena
5 A number of scams came from Romania

2) Read the article again and answer the questions.
1 What is the article about?
2 What are relatively new Internet phenomena?
3 Which parts of the world are the worst targets of phishing?
4 What sensitive information is endangered?
5 What proactive approach has been taken in the Czech Republic?

3) Explain the following words.
1 personal bank account
2 spam
3 phishing crime
4 online purchase
5 password
6 e-banking

What is a spam? How can we protect our e-mail accounts against spam? What does it usually contain? What is a computer fraud? What are types of frauds?


Adjusted to:

http://www.praguepost.com/archivescontent/39188-net-users-try-to-avoid-phish-hooks.html

Jailed web sex offender is ‘parent’s worst nightmare’ - text 3

Jailed web sex offender is ‘parent’s worst nightmare’


A A judge branded a man a “parent’s worst nightmare” as he jailed him for two-and-a-half years for making indecent images of children he met through internet chat sites aimed at teenagers. Police found that Nicholas Bennett, 31, claimed to be aged just 15 on at least one occasion when talking to girls who told him they were under 16. He was sentenced at Maidstone Crown Court on Monday after pleading guilty to 10 sexual offences at an earlier hearing, a spokeswoman for Kent Police said. Bennett’s victims were between 11 and 16, with one living as far away as Sydney, Australia.

B He was arrested last year after a woman told police he tried to blackmail her by threatening to post images on the internet that she sent him as a child if she refused to engage in further role-play with him. Officers from the public protection crime unit then executed a search warrant at his home and arrested him on suspicion of possession of indecent images of children.

C On his computer equipment they also found records from chat showing a number of internet conversations he had had with children, along with evidence of him having posed as a 15-year-old boy by supplying false images of himself. Bennett told officers he spoke with teenagers but denied any of his internet chat was with children although police believe Bennett made contact with the girls through a teen chat website and it is suspected he used information found on social networking sites about the teenagers he spoke to befriend them.

D Detective Constable Mikaela Stevens, who led the investigation, said of the woman who made the initial report to police: “Her courage and co-operation with officers was important in bringing this offender before the courts and in identifying other children he had abused and also preventing further children from coming into contact with him in the future.”

E Bennett admitted five offences of causing or inciting pornography, four counts of making indecent images of children and one count of causing or inciting sexual activity with a child. Judge Philip Statman also gave him a 10-year sex offences prevention order and he must sign the sex offenders register for life.



indecent – neslušný, obscénní
nightmare – noční můra
pleading guilty – doznání viny
search warrant – příkaz k domovní prohlídce
threatening – hrození
to blackmail – vydírat
to brand – označit
to incite – podněcovat
to sentence – potrestat



1) Read the article and match each of the headings to a paragraph.
1 Stevens’ opinion
2 Bennett spoke to teenagers and claimed to be 15
3 Bennett arrested after blackmailing
4 Bennett’s sentence
5 Introduction
2) Read the article again and answer the questions.
1 What is the article about?
2 Who is Nicholas Bennett? What did he do?
3 What was found on Bennett’s computer?
4 Where did he contact teenagers? What did he want from them?
5 What sentence was he given?

3) Explain the following words.
1 sexual offence
2 to arrest
3 indecent images of children
4 teen chat website
5 pornography

What is child pornography? Who is a paedophile? What are chat sites? How can they be misused? How can we protect children against contacts with paedophiles?

Adjusted to:
http://www.metro.co.uk/home/827597-jailed-web-sex-offender-is-parents-worst-nightmare

Hackers see little risk in breaking law - text 2

Hackers see little risk in breaking law


A A hacker group from Slovakia called binary.division got inside the e-mail Web site Post.cz and set up the system to regurgitate passwords when a username was entered instead of requiring one. For four minutes the site was under the hacker’s control, until technicians at Czech OnLine, Post’s parent company, shut the system down.

B The hackers, who were virtually untraceable, did no harm other than disrupting operations for a few moments, but that doesn’t mean it won’t be worse next time. While the October 13 attack on the Post.cz site is hardly an anomaly, most Czech companies refuse to report hacker activity against their Web sites for fear of damaging their reputation and possibly their value, said Jiří Dastych, a major in the police presidium who deals with computer crime.

C Daniel Nalevajko, customer support director for Czech OnLine, said he isn’t surprised companies fail to report intrusions into their servers or on their Web sites. He said customers could desert a company they think can’t protect their private data. Seznam.cz routinely finds hackers trying to either break into their Web portal site or attempting to overload their system, said Petr Naidr, the company’s technical director. Even if the company notices the intrusion, tracking a hacker is difficult because attacks can come from any corner of the globe.

D “Hackers don’t avoid any countries,” Naidr said. “He can be sitting in the next room, be in another city, in a different country or on another continent.” Since most hacker intrusions are resolved by network administrators or Internet service providers, many companies don’t even think to contact police or don’t believe they can help, he added. And if a company’s site experiences a lot of traffic each day – like the e-mail site Post.cz and the portal Seznam.cz – it is also extremely difficult to weed out which hit was malicious.

E While the rate of computer hacking attacks are still not at the same level as in the United States – where more people have access to the Internet and computers – Nalevajko said he expects intrusions from Czech hackers to increase. For now, hackers tend to show off their skill than doing any real damage. But the instances of hackers trying to establish back-door access or copying databases is on the rise, Dastych said. Despite companies’ vigilance against intrusion, hacking will probably remain a fear for Czech firms with a Web presence. “We thought our site was pretty secure, but someone was too clever,” Nalevajko said.



desert – opustit
disrupting – přerušující
intrusion – vstup, vetření se
malicious – konaný ve zlém úmyslu
overload – přetížit
to regurgitate – opakovat
to tend to – inklinovat k
untraceable – nevystopovatelný
vigilance – ostražitost



1) Read the article and match each of the headings to a paragraph.
1 Seznam tracks for hackers
2 Hackers disrupted operations
3 There will be more hackers in the Czech Republic
4 Hackers can be anywhere
5 Binary.division got inside Post.cz

2) Read the article again and answer the questions.
1 What is the article about?
2 Who are binary.division? What have they done?
3 Who is Jiří Dastych? What does he say?
4 Where can hackers be found?
5 Why do the attacked companies rarely contact the police?

3) Explain the following words.
1 username
2 Web sites
3 hacker
4 private data
5 e-mail site

Who is a hacker? What does a hacker do? Whose computer networks do they break into? How can hackers misuse information and data?

Adjusted to:
 http://www.praguepost.com/archivescontent/32866-hackers-see-little-risk-in-breaking-law.html

Facebook and Twitter training lined up for student detectives - Text 1



Facebook and Twitter training lined up for student detectives


A Facebook, Twitter and other social networks will be used by detectives to track down killers and other criminals. This new approach has been revealed by police leaders. The move is part of great changes being made to the training given to thousands of student investigators to bring their work into the 21st century.

B As well as new information on tracking down suspects through social networking sites, where wanted people may reveal valuable clues, updated training exercises include examining how to gather the best information from computers, mobile phones and other electronic devices. Students of police schools will also receive guidance on how best to investigate honour-based violence, record evidence of domestic abuse and solve the problem of rape, while another new material will link to a national collection of footprints made by specific shoes as well as how to collect financial information.

C Deputy Chief Constable Nick Gargan, acting head of the NPIA (National Policing Improvement Agency), commented that modernized training is very important. “This programme is an important part of the career training for detectives and the new schooling covers sensitive areas of policing where limited guidance existed in the past,” he noted. “These improvements are exactly what detectives need to solve the problems and of modern policing effectively.”

D Gargan also added: “The changes underline the importance to having a national agency to provide guidance and train detectives to a single high standard so they can work on investigations in any part of the country and give their colleagues and the public the best quality service in fighting crime.”

E Earlier this year, escaped prisoner Craig Lynch mocked police with clues about his location on Facebook during four months on the run. In London, detectives have been examining Facebook and Twitter posts relating to the murder of 17-year-old Marvin Henry during a suspected fight between rival gangs.



clue – vodítko, stopa
guidance – poradenství, řízení
posts – příspěvky
rape – únos, znásilnění
to mock – vysmívat se
to reveal – odhalit
to track down – vystopovat
to underline – vyzdvihnout, zvýraznit



1) Read the article and match each of the headings to a paragraph.
1 Students of police schools will receive special guidance
2 National agency is needed to provide guidance
3 Cases of cybercrime
4 Social networks will be used by detectives
5 Nick Gargan’s comments

2) Read the article again and answer the questions.
1 What is the article about?
2 What will social networks be used for by the police?
3 Who is Nick Gargan? What does he say?
4 Why is a national agency needed?
5 What has police found out on Facebook and Twitter so far?

3) Explain the following words.
1 suspect
2 social networking sites
3 domestic abuse
4 investigation
5 murder

What is computer crime? What are types of computer criminality? What are social networks? What are they used for? How can they be misused?

Adjusted to:
http://www.metro.co.uk/news/845579-student-detectives-to-get-facebook-and-twitter-training

Computer criminality – Vocabulary

Computer criminality – Vocabulary



altering the data – změna údajů
anti-spam laws – protispamové zákony
bank fraud – bankovní podvod
bulk email – hromadný email
circumvent – podvést
commercial purpose – komerční účel
commission – pověření, zplnomocnění
content of websites – obsah webových stránek
criminal offence – trestný čin
cyber stalking – počítačové pronásledování
cybercrime – počítačová kriminalita
device – zařízení
distasteful – odporný
domestic abuse – domácí zneužívání
e-banking – internetové bankovnictví
e-mail site – emailová stránka
encrypt the data – zakódovat data
exploitation – zkoumání
extortion – vydírání
fraud – podvod
hacker – hacker
identity theft – krádež identity
indecent images of children – porno fotky dětí
information warfare – informační boj
investigation – vyšetřování
malware – počítačová nečistota
misusing existing system tools – zneužívání systémových nástrojů
murder – vražda
netcrime – internetová kriminalita
network – internetová síť
obscene – obscénní, nemravný, nahatý
offensive – útočný
online purchase – online obchodování
output – výstup, produkt, tvorba
password – heslo
personal bank account – osobní bankovní účet
phishing crime – kriminalita vedoucí k získávání citlivých informací
phishing scams – phishingové podvody
pornography – pornografie
private data – soukromá data
record keeping – uchovávání záznamů
sexual offence – sexuální čin
social networking sites – sociální sítě
software packages – soubory programů, softwarové balíčky
source of evidence – zdroj důkazů
spam – spam
stalker – stalker, stopař
stored data – uložená data
suspect – podezírat
teen chat website – web s chatem pro teenagery
theft of classified information – loupež důvěrných informací
to arrest – zatknout, zadržet
to blackmail – vydírat mailem
to conceal unauthorized transactions – zamlčet neopravněné transakce
to invade privacy – útok na soukromí
to stalk celebrities – sledování známých osobností
Twitter accounts – účty na Twitteru
unauthorized – neoprávněný
unlawful – nezákonný
unsolicited sending – nevyžádaná pošta
username – uživatelské jméno
Web sites – webové stránky
writing code – kód dokumentu

Computer crime – Vocabulary



Explain the following words.


altering the data
anti-spam laws
bank fraud
bulk email
commercial purpose
commission
content of websites
criminal offence
cyber stalking
cybercrime
device
domestic abuse
e-banking
e-mail site
encrypt the data
exploitation
fraud
hacker
identity theft
indecent images of children
information warfare
investigation
malware
misusing existing system tools
murder
netcrime
network
online purchase
output
password
personal bank account
phishing crime
phishing scams
pornography
private data
record keeping
sexual offence
social networking sites
software packages
source of evidence
spam
stalker
stored data
suspect
teen chat website
theft of classified information
to arrest
to blackmail
to conceal unauthorized transactions
to invade privacy
to stalk celebrities
Twitter accounts
unauthorized
unlawful
unsolicited sending
username
Web sites
writing code

Computer crime – Questions

Answer the following questions.
What is computer crime?
What are types of computer criminality?
What are social networks?
What are they used for? How can they be misused?
What information shouldn’t we publish there?
What crimes are connected with using social networks?
Who is a hacker?
What does a hacker do?
Whose computer networks do they break into?
How can hackers misuse information and data?
What is child pornography?
Who is a paedophile?
What are chat sites?
How can they be misused?
How can we protect children against contacts with paedophiles?
What is a spam?
How can we protect our e-mail accounts against spam?
What does it usually contain?
What is a computer fraud?
What are types of frauds?

Computer crime – Study material

Computer crime – Study material

Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Netcrime refers, more precisely, to criminal exploitation of the Internet.
Computer crime encompasses a broad range of potentially illegal activities. It may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
Examples of crimes that primarily target computer networks or devices would include:
  • Computer viruses
  • Denial-of-service attacks
  • Malware (malicious code)
Examples of crimes that merely use computer networks or devices would include:
  • Cyber stalking
  • Fraud and identity theft
  • Information warfare
  • Phishing scams
A computer can be a source of evidence. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators.
Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful to varying degrees. As applied to email, specific anti-spam laws are relatively new, however limits on unsolicited electronic communications have existed in some forms for some time.
Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by:
  • Altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;
  • Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect;
  • Altering or deleting stored data;
  • Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.
Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information.
The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal. Many jurisdictions place limits on certain speech and ban racist, politically subversive, or inflammatory material that tends to incite hate crimes.
One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.
Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties (cyber bullying, cyber stalking, harassment by computer, hate crime, Online predator, and stalking). Any comment that may be found derogatory or offensive is considered harassment.

Hacker or cracker, who accesses a computer system by circumventing its security system.

Adjusted to:
http://en.wikipedia.org/wiki/Computer_crime

Case n. 2 – 3 (Increasing of maintenance of the minor son)



Case n. 2 – 3 (Increasing of maintenance of the minor son)

A mother of minor children came to the Municipal Authority of Jihlava, the Department of Social Affairs, the Department of Social and Legal Protection of Children to ask for help in solving the situation in which she got.
According to her notification, she has been married twice. A minor child was born from the first marriage – a son, who was put in her custody. The minor boy attends 2nd class of primary school today. His father is obliged to contribute to the maintenance of the son with 1300 Czech crowns a month based on the judgment of the District Court in Jihlava ref P 384/2006-75 of 19th May 2006, which entered into force 3rd July 2006. The father does not contribute beyond the maintenance of his son by any extra amount of money; he meets him irregularly – on average once or twice a month throughout the weekend. Otherwise, he shows little interest – just as f.e. congratulations to his birthday, Christmas.
From the mother's second marriage a 2.5-year-old child was born, who the mother is currently on parental leave with. Her husband is 42 years old and he was released from his job on 31st July 2012 (he had been employed by the last employer for 7 years). The family has a permanent residence in Luka nad Jihlavou, Nová 83.

Task:

Focus on the situation of mother’s older minor child. Tell the mother what proposal she should submit.

Key words and phrases to be solved:

-          The Municipal Authority of Jihlava (preferably local authority)
-          The Department of Social and Legal Protection of Children
-          Married for the second time
-          A minor son was born from the first marriage
-          The boy attends second grade of primary school
-          The father is obligated to maintenance of the son by amount of 1,300 CZK per month
-          The father does not contribute beyond the maintenance of his son by any extra amount of money
-          From the second marriage a 2.5-year-old child was born
-          The mother is currently on parental leave
-          Her husband is 42 years old
-          The family has a permanent residence in Luka nad Jihlavou, Nová 83

Solution:

Increasing of maintenance of the minor son

Due to the fact that the minor's needs have increased significantly with entering primary school, the mother should submit a proposal to increase maintenance. The proposal should be submitted by the District Court in Jihlava in quadruplicate. One copy is intended into the guardianship records of the minor child and other to the participants of proceedings – i.e. mother, father and minor child represented by a guardian, who is legally appointed by the court. (Initiate guardianship proceedings)
Within the burden of proof mother and father are heard and requested for reports on income of the parents and relation to real estate; furthermore, the evidence on the costs, which are associated with the needs of the child (linked to education, leisure and health status). After the burden of proofs proceeds, the court gives judgment. The maintenance of the minor child can be increased with the retroaction of three years – in this case, entering primary school is the determinative time period. (proceeding course)
The judgment is given to all participants who shall have the right to lodge an appeal within 15 days since its delivery and can lodge an appeal through the court that determined in the first level (i.e. the District Court). A second level appeal will be determined be the Regional Court. The guardian will be appointed again, and it newly decides in re after the burden of proceeding. Against the above mentioned decisions of the Regional Court can no longer be appealed. (appeal procedure)
Key words and phrases to be solved:
-          A proposal to increase maintenance of a minor child
-          The proposal is submitted to the District Court in quadruplicate
-          The participants are mother, father and a minor child represented by a guardian
-          The guardian of the minor child is appointed by the court
-          In the frame of the burden of proceedings, the mother and father are heard by the court
-          The court will require a report on the income of the parents and the costs that are associated with the needs of the child
-          After the burden of proofs proceeds, the court gives its judgment
-          The court can determine increasing of maintenance of the minor child with the retroaction of three years
-          A written copy of the judgment must be delivered personally to all participants
-          The participants may lodge an appeal within 15 days from the judgment
-          The appeal is submitted through the District Court
-          The Regional Court decides on the appeal

The case is based on the following legislation:
Material:
The Family Act (94/1963 Coll., As amended)
The Law on Social and Legal Protection of Children (359/1999 Coll., As amended)
Process:
Civil Procedure (99/1963 Coll., As amended)