★★☆US Takes Action Against Cyber Theft Threat

2013年02月27日 ★★☆, 2013年6月以前の記事, Internet, VOA.

Read and understand the article. If you may have any difficult words to pronounce and words you cannot understand, always ask your teacher.

*Teachers will divide the article into 2-3 paragraphs to help you understand and check the pronunciation of the difficult words.

Vocabulary

*Read the words carefully.

  1. spy /ˈspaɪ/ (n.) a person who tries secretly to get information about a country or organization for another country or organization
  2. espionage /ˈɛspijəˌnɑ:ʒ/ (n.) the things that are done to find out secrets from enemies or competitors; the activity of spying
  3. hacking /ˈhækɪŋ/ (v.) to secretly get access to the files on a computer or network in order to get information, cause damage, etc.
  4. strike /ˈstraɪk/ (vb.) to attack someone or something suddenly
  5. accusation /ˌækjəˈzeɪʃən/ (n.) a claim that someone has done something wrong or illegal; a charge that someone has committed a fault or crime

Article

US Takes Action Against Cyber Theft Threat

* Read the text below

MP3 Download (right-click or option-click and save)

(1)The United States has announced a plan to fight the quickly growing threat from cyber spies and Internet attackers known as hackers. America’s Attorney General Eric Holder recently said that ever – improving technology is making it easier for people and countries to strike at the United States

(2)Mister Holder said the Justice Department is fighting back aggressively. He said it is working with various states and government agencies to find and bring to justice those involved in cyber theft and cyber espionage. And, the attorney general called for increased co-operation with private companies. He described the importance of keeping trade secrets a secret.

(3)Attorney General Eric Holder: “A single trade secret can be worth millions – or even billions – of dollars. Trade secret theft can require companies to lay off employees, close factories, to lose sales and profits, to experience a decline in competitive position and advantage, or even to go out of business.”

(4)The new policy also calls for fines and trade actions against individuals and countries that target American trade secrets.

(5)The plan was announced the day after the American information security company Mandiant published the findings of its investigation of cyber-attacks. It reports that more than 140 companies have been attacked since 2006. The targets include some of the biggest companies in the United States, companies like Apple Computer, Facebook, Lockheed Martin, CocaCola and many others.

(6)Mandiant says hacking groups in China are responsible for most of the attacks. They include groups known as “Comment Crew” and “Shanghai Group”. Mandiant also charges that the attacks come from an organization called “Advanced Persistent Threat 1” or “APT1”.

(7)It says “APT1” is a part of the Chinese military, the People’s Liberation Army, Unit 61398.

(8)In addition to companies and banks, the hackers are also reported to strike state, federal and international agencies and organizations. Among the areas targeted are satellites, information technology, telecommunications, aerospace, public administration and scientific research.

(9)But Mandiant also says the Chinese want to find out how to control important parts of the United States’ infrastructure. That includes power grids and other utilities.

(10)China’s Foreign Ministry spokesman Hong Lei denies Mandiant’s accusations. He says the report is unprofessional and irresponsible. He said the company makes charges without providing evidence.

Discussion

*Let’s talk about the article base on the questions below

  1. How often do you use the internet? Can you cite any problems the internet has created? How about the problems it has solved?
  2. How do you protect your computer or any other gadgets against computer viruses and cyber thefts?
  3. Is your country giving adequate countermeasures for this kind of crime? How?

 

English Compositions

*Let’s make English compositions using the words from the article.

(1) espionage

EX) He said it is working with various states and government agencies to find and bring to justice those involved in cyber theft and cyber espionage.

(2) hack

EX) Mandiant says hacking groups in China are responsible for most of the attacks.