- •Государственное образовательное учреждение
- •Courts and trials (topical vocabulary)
- •Set Work
- •I. Study the above given lexical units.
- •II. Give words for the following definitions.
- •III. Translate into English:
- •Crime and punishment
- •Set Work
- •Set Work
- •Set Work
- •I. What would you have done?
- •II. Look at these statements. What do you think about them?
- •III. Look at this list of ‘crimes’. Try and rate each crime on a scale from 1-10. (1 is a minor misdemeanor, 10 is a very serious crime.) They are in no order.
- •IV. Compare your list with another student’s. Which of you would be the harsher judge? Which would be the kinder?
- •Thief challenges dose of shame as punishment
- •Set Work
- •Women behind bars
- •Set Work
- •VI. State the idea behind the lines below and enlarge on it.
- •VII. Sum up the key points of the article.
- •VIII. Points for discussion.
- •Justice in los angeles
- •Set Work
- •V. Points for discussion.
- •VI. Sum up the article and single out its main points. Черное плюс белое равняется красному?
- •Set Work
- •I. Think of the best English equivalents of:
- •II. Say what you know about:
- •III. Points for discussion.
- •IV. Comment on the choice of the headline.
- •Set Work
- •VIII. Enlarge on the idea.
- •IX. Points for discussion.
- •X. Role play.
- •Set Work
- •Set Work
- •VI. Give the gist of the article.
- •VII. Points for discussion.
- •Век бы свободы не видать!
- •Set Work
- •Set Work
- •I. Say what is meant by the following words and word combinations. Reproduce the situations in which they were used.
- •II. Find in the article the English for:
- •III. Interpret the lines below.
- •IV. Comment on the author’s choice of the headline and formulate the key idea running through the article.
- •V. Points for discussion.
- •How british burglars pick their victims
- •Set Work
- •I. Master the pronunciation of the words below. Learn and translate them.
- •II. Explain what is meant by:
- •III. Look through the article for the following English equivalents of:
- •IV. State the difference between the words below. Give examples to illustrate their usage.
- •V. Translate the following sentences.
- •VI. Pete (the burglar described in the article) says he is ten stone. How many kilos is it? How many stones do you weigh?
- •VII. Interpret the idea expressed in the lines below.
- •VIII. Points for discussion.
- •A life inside
- •I. Define the following words and word combinations. Reproduce the situations in which they occur.
- •II. Scan the article for the English equivalents of:
- •III. State the difference between the words below. Give examples to illustrate their usage.
- •IV. Explain what is meant by:
- •V. Say whether you agree or disagree with the lines below.
- •Set Work
- •I. Explain the meaning of the words below. Say how they were used in the article.
- •II. Give the English equivalents of the following word combinations:
- •III. Comment on the statements below.
- •IV. Translate the following sentences.
- •V. Points for discussion.
- •VI. Speak about your stand on capital punishment as “the only way to deter criminals”. To back up either of your viewpoints use the key statements.
- •«Палач является в застенок со всеми инструментами» так добивались правды
- •Set Work
- •III. Practise the pronunciation of the words below:
- •IV. Explain what is meant by:
- •V. State the difference between the following words, give examples to illustrate their usage.
- •VI. What other arguments for and against capital punishment can you add to the list?
- •40 Тезисов в осуждение убийцы
- •Set Work
- •Set Work
- •I. Choose the correct meaning according to the passage.
- •II. Give the Russian equivalents of the following vocabulary units:
- •III. Say if the problem of capital punishment has always been vital. Back up your opinion. Как, где и за что казнят
- •Set Work
- •Set Work
- •Set Work
- •Set Work
- •Set Work
- •II. Find in the article the Russian for:
- •III. Say if you share the idea expressed in the sentences below:
- •IV. Explain the difference between:
- •V. Points for discussion.
- •VI. Render the article into English, trying to use as many words under study as you can.
- •VII. Comment on the headline and formulate the author’s message.
- •Inside the new alcatraz
- •Set Work
- •IX. Points for discussion.
- •X. Comment on the headline.
- •XI. Describe a prison for hard-core criminals, as you see it. Смертникам жизнь хуже расстрела
- •Set Work
- •Set Work
- •I. Think of the best English equivalents of:
- •II. Say what you know about:
- •State power and crime
- •Set Work
- •I. Say what is meant by the words and word combinations below:
- •II. Find in the article the English for:
- •III. Say how you understand the lines below and enlarge on the idea.
- •IV. Is it possible to oppose the demoralization of the very fundaments of the life of the nation? What is the general path of the sanitation of public life and the state itself?
- •V. Sum up the main points of the article. Какие законы нам не указ Почему россияне не верят в законы
- •Set Work
- •I. Think of the best English equivalents of:
- •II. What’s the English for?
- •The holocaust in the dock
- •Set Work
- •VII. Give the gist of the article.
- •VIII. Describe the Swiss-Nazi case and formulate the author’s vision of the problem.
- •IX. How is the Swiss-Nazi case likely to end? What’s the rub? Will justice be done at long last? the making of a suicide bomber
- •Set Work
- •I. Master the pronunciation of the words below. Learn and translate them.
- •II. Explain the meaning of the words below. Say how they were used in the article.
- •III. Look through the article for the English equivalents of:
- •IV. Say what you know about:
- •V. Write out expressions with the word “suicide” and explain what they mean.
- •VI. Say whether you agree or disagree with the following statements and enlarge on them.
- •VII. Points for discussion.
- •VIII. Do a library research on some terrorist organisation and make a short report in class. Terrorist infiltrations
- •Set Work
- •VI. Comment on the author’s choice of the headline and formulate the message.
- •VII. Points for discussion.
- •VIII. Say if you’ve read any of the books mentioned in the article. Do such kinds of books appeal to you? hacking for dollars
- •Set Work
- •I. Learn and practise the pronunciation of the words below. Translate them into Russian.
- •II. Define the computer-related word combinations used in the article. Reproduce the context in which they were used.
- •III. Find in the article the English for:
- •IV. Say what is meant by the words and word combinations below. How were they used in the article?
- •V. State the difference between the words below. Give examples to illustrate their usage.
- •VI. Clarify the idea behind the following lines.
- •VII. Outline the main points of the article and dwell upon each of them.
- •VIII. Points for discussion.
- •IX. Make up a dialogue between two cybercops. Use the words from the article.
- •Set Work
- •I. Learn the pronunciation of the words below. Translate them into Russian.
- •II. Define the words and word combinations below. Say how they were used in the article.
- •III. Scan the article for the English equivalents of:
- •IV. Look through the article for the word combinations with the word “online.” Write them out and explain what they mean.
- •V. Explain what is meant by:
- •VI. Fill in the correct preposition. Check against the text.
- •VII. Say how you understand the following lines.
- •VIII. Points for discussion.
- •Internet как инструмент совершения киберпреступлений
- •Set Work
- •I. Render the above given article into English.
- •II. Points for discussion.
- •Spyware hits business
- •Set Work
- •I. Master the pronunciation of the words below. Learn and translate them.
- •II. Explain what is meant by:
- •III. Look through the article for the English equivalents of:
- •IV. What do the following abbreviations stand for:
- •V. State the difference between the words below. Give examples to illustrate their usage.
- •VI. Add some more words to the given string.
- •VII. Fill in the correct prepositions. Check against the text.
- •VIII. Interpret the lines below.
- •IX. Points for discussion.
- •Mobile phone crime blitz launched
- •Set Work
- •Set Work
- •VI. Sum up the key points of the article.
- •VII. Points for discussion.
- •The gentleman thief
- •Set Work
- •Drugs and crime
- •Set Work
- •I. Transcribe and learn the following words:
- •II. Find out and say what is meant by:
- •III. Say what you know about the units of weight mentioned in the article. In what connections were they used?
- •IV. Reveal the difference between:
- •V. Say how you understand:
- •VI. Learn the pronunciation of the following deadly drugs.
- •VII. Give English equivalents for:
- •VIII. Answer the following questions.
- •IX. Translate the following sentences into English.
- •Наркотикам – бой…и герл
- •Set Work
- •Set Work
- •I. Define the words and word combinations below. Reproduce situations in which they occur in the article.
- •II. Look through the article for the following English equivalents:
- •III. Specify the meaning of the prefix over-. Write out the examples with this prefix from the article and explain their meaning. Think of some other examples and dwell upon them.
- •IV. Say how you understand the given lines.
- •V. Points for discussion.
- •Тяга к наркотикам ничуть не ослабла
- •Set Work
- •Set Work
- •I. Say what is meant by the following vocabulary units and in what connection they are used in the article.
- •Вам марихуаны? пожалуйста!
- •Set Work
- •Set Work
- •V. What addictive substances are mentioned in the article? In what ways are they consumed by addicts?
- •VI. Explain how you understand the following phrases:
- •VII. State the difference between the words below. Give examples to illustrate their usage.
- •VIII. Interpret the idea expressed in the given lines.
- •IX. Give the gist of the article and formulate its key idea.
- •X. Comment on the headline.
- •XI. Points for discussion.
- •A shot of sanity
- •Set Work
- •VIII. Give the gist of the article and say what you think of the idea put forward by the author.
- •IX. Points for discussion.
- •Cocaine cartel smashed
- •Set Work
- •I. Think of the best English variant to say:
- •Set Work
- •Set Work
- •I. Supply the English equivalents for the following words and word combinations:
- •Set Work
- •Set Work
- •I. What answers to the above questions does the article offer?
- •II. Scan the article for the English equivalents of the Russian words below and learn them.
- •III. Explain what is meant by:
- •IV. Make up a dialogue (based on the words from task II) between two criminologists.
- •V. Points for discussion.
- •I. Render the below article into English.
- •II. Say whether you share the author’s thesis. How it all starts inside your brain
- •Set Work
- •I. Master the pronunciation of the words below. Learn and translate them.
- •II. Define the following words and word combinations below. Reproduce the situations in which they occur.
- •III. Scan the article for the English equivalents of:
- •IV. Explain what the following abbreviations stand for.
- •V. State the difference between the words below. Give examples to illustrate their usage.
- •VI. Explain how you understand:
- •VII. Say what you know about:
- •VIII. Find in the article the evidence to support the following statements.
- •IX. Points for discussion.
- •Агрессивное поведение запрограммировано еще при рождении преступник разрушает сам себя
- •Set Work
- •VI. Sum up the main points of the article and say if you share the journalist’s stand.
- •VII. Points for discussion.
- •1. Is society or are people to blame for different misdemeanors and felonies? 2. How can people be made less aggressive? of criminals and ceos
- •Set Work
- •V. Interpret the lines below.
- •VI. Say what you know about:
- •VII. Sum up the key points of the article and formulate the author’s thesis.
- •VIII. Comment on the choice of the headline.
- •IX. Points for discussion.
- •Set Work
- •VI. Do you agree that:
- •VII. Sum up the key points of the article.
- •VIII. Points for discussion.
- •Death penalty
- •Убийство должно караться смертью!
- •Cops and robbers (and drug pushers and murderers…)
- •I. Read the following article to find out:
- •Computer hacking – high-tech crime
- •II. Find words or phrases in the text which mean the same as:
- •III. Now complete these statements by choosing the answer which you think fits best.
- •Vocabulary Tests
- •I. Crime. Put each of the following words and phrases into its correct place in the passage below.
- •II. Law breakers. Give the name of the defined law breaker.
- •III. Law breakers. Match the criminal with the definition.
- •IV. Law breakers. Choose the right answer.
- •V. Law breakers. Choose the correct answer.
- •VI. Law breakers. By moving vertically or horizontally (forwards or backwards) find twelve kinds of criminal.
- •VII. Police. Choose the right answer.
- •VIII. Trial. If you commit a crime you may be:
- •IX. Trial. Choose the right answer.
- •X. Trial. Choose the right answer.
- •XI. Punishment. Match each punishment with its description.
- •XII. Punishment. Choose the right answer.
- •XIII. Punishment. Put each of the following words and phrases into its correct place in the passage below.
- •Trial by Jury
- •XIV. Crime and punishment. Choose the right answer.
- •XV. Crime and punishment. Choose the word or phrase that best keeps the meaning of the original sentence if it is substituted for the capitalized word.
- •Vocabulary Test
- •Фантастический процесc
- •Set Work
- •Твое имя в грязи
- •Methods and measures
- •Третье место за воровство
- •Is a crime crackdown a challenge of the time?
- •Государственное образовательное учреждение высшего профессионального образования «Липецкий государственный педагогический университет»
- •398020 Г. Липецк, ул. Ленина, 42
Set Work
I. Render the above given article into English.
II. Points for discussion.
Is the internet widely used as a means of committing crimes?
Should the Internet information be censored anyhow? Is it expedient? Is it possible?
What makes computer crimes paradoxical?
How do cyber criminals and victims differ from the ones who deal with crime in real life?
Spyware hits business
Spyware used to mean annoying pop-up ads at home. Now it’s a tool of corporate espionage.
Antonio Messana was confused. As the systems and technology director of information systems at Banca Fideuram, an asset-management firm based in Rome, Italy, Messana helped the company implement a €1.5 million security revamp, starting in 2000. But 18 months ago he noticed a 20 percent increase in calls to IT help desk. PCs had slowed to a crawl, and employees were getting frustrated with pop-up windows, which appeared every 10 minutes, even when users were offline. “No one understood what was happening,” Messana says. After several weeks, he realized what was wrong: Banca Fideuram had been infected with spyware.
Spyware hit home PCs with a vengeance in about 2002, but business IT specialists thought that corporate firewalls and other security measures would keep the problem at bay. They were wrong. In the past year, businesses have increasingly realized that spyware companies are a major threat to them as well. In fact, the problem has gotten so severe that many corporate IT departments have begun to view spyware as their biggest or second-biggest security threat, says Brian Burke, an analyst at IDC, a Massachusetts-based market-research firm. Indeed, in a 2005 survey by ITtoolbox, an information provider for the IT industry, 88 percent of business professionals detected spyware on their networks in the past 12 months.
Corporate firewalls have proven ineffective against scourge because they often don’t prevent employees from downloading files through the Web browser, the main channel through which spyware sneaks onto computers. This can happen in several ways. The more begin forms of spyware – marketing software that tracks Web sites people go to and generates targeted pop-up adds – are often secretly bundled in “free” music, games and screensavers. Other forms of spyware, however, generally hack into networks using techniques such as the “drive-by download”: software installs itself on a PC the moment the user clicks on a Web site. This more malicious form of spyware is used to steal personal information and trade secrets for profit.
Once inside PCs, spyware is becoming increasingly difficult to detect and remove. The latest versions hide out in the most integral parts of Microsoft’s popular Windows operating system; that makes it difficult to remove without damaging the computer. If that’s not tricky enough, spyware companies have found ways to hide from the computer itself. “These programs are blowing smoke to disguise the presence of the files,” says Eric Howes, a spyware expert and a graduate student at the University of Illinois. Spyware companies are also building multiple programs onto each computer to monitor each other. “If one [piece of spyware] goes down, the others replace it,” says Howes. “We’re at the point now where if you remove 100 [pieces of spyware] and miss one, it’s all going to come back.”
This burgeoning threat is costing businesses some big money – almost $350 a year per PC in administrative and help-desk expenses, estimates the Radicati Group, a Palo Alto, California, technology market-research firm. And in the past year, antispyware spending has skyrocketed. IDC says antispyware revenue stood at $12 million in 2003 and expects it to reach $106 million this year. It’s no wonder. Banca Fideuram, for instance, has roughly €60 billion in assets under management; to protect itself, the company pays Computer Associates, the New York-based computer giant, roughly €250,00 per year for its eTrust Pest Patrol antispyware protection. Thus far, Computer Associates has installed antispyware software on each of the company’s 2,000 PCs. By next year, all 5,000 private bankers that the firm deals with will have protection as well.
But the problem isn’t likely to end there – not for Banca Fideuram or anybody else. Spyware companies have a huge financial incentive to invent more treacherous ways of circumventing security measures. “These guys have business teams [and] market plans,” says Roger Thompson, director for malicious-content research at Computer Associates. The surreptitious nature of the industry makes hard information scarce, but Web-root, a Colorado-based security company, estimates that spyware is $2 billion-a-year business.
In the past year the problem has grown large enough that even Microsoft is getting into the antispyware market. The company released a free test version of its antispyware product in January and it plans to offer support on the enterprise level, though it hasn’t said when. Microsoft’s entry has some rival antispyware companies peeved. Gregor Freund, the CEO of Zone Labs, a San Francisco, California-based security company, says Microsoft deserves some of the blame for spyware’s rapid proliferation; its Web browsers and operating system, he says, have security flaws that make them vulnerable to infiltration. “The extent that Microsoft wants to profit by jumping into the security industry instead of fixing their product… seems to me like an inherent conflict of interest,” says Rick Carlson, the president of Aluria, an antispyware vendor in Orlando, Florida. Microsoft argues that it’s unreasonable to expect every potential security hole to be patched without sacrificing some degree of user freedom on the Internet. The company adds that it’s aggressively improving overall computer security, especially as it relates to spyware.
Not everyone is crying foul about Bill Gates & Co.’s latest foray. Other antispyware companies have welcomed Microsoft’s entry, even it means greater competition. They think the firm will help spawn much-needed innovation, and that the market is big enough for many parties to succeed. “It’s not possible for any company to identify and prevent all forms of spyware,” says Fernando Francisco, the vice president of strategy and business at Lavasoft, an antispyware vendor in Helsinki, Finland.
Corporations, meanwhile, are taking a hard look at their own advertising practices, which may have inadvertently helped fuel the spyware industry. Their advertising spending has a way of trickling down through the big advertising firms to smaller and smaller Internet marketing firms, which are paid by the number of hits on particular Web sites.
To keep these firms from supporting spyware-related activities, companies such as America Online have implemented a zero-tolerance policy. Some Internet-advertising firms have done the same. “We’re at a point now where I wouldn’t be comfortable endorsing any of the [major Internet marketing] companies,” says Jeff Lanctot, the vice president of media and client services at Avenue A/Razorfish, an interactive advertising agency. “[Their] strategies until the last year or so was to get big by any means necessary, and then once you get [there] you ask the industry to forgive you for the sins of the past.”
Now, spyware analysts say corporate pressure is forcing Internet-marketing firms to clean up their acts, or at least appear to be doing so. Leading firms such as Claria, WhenU and 180 Solutions, which call themselves adware or sponsorware and deny any connection to spyware, are now making strides to show their bona fides, says Kent Allen the head of the Research Trust, an online market-research firm. Lawmakers are also beginning to draw a hard line. New York State Attorney General Eliot Spitzer filed a lawsuit in April against Intermix Media, claiming the Los Angeles, California-based company does not give users proper consent before loading their PCs with marketing software. Intermix says it has stopped distributing these programs and the two parties have reached an agreement in principle.
With spyware growing more threatening and harder to remove, this mounting pressure is good news for firms like Banca Fideuram. At war against a shadowy, well-financed enemy, businesses will need all the help they can get.
R.M. Schneiderman
/Newsweek, Aug.22, 2005/