Cybercrime v456

Cybercrime v456

Cybercrime

Introduction

Introduction - Charity begins at home
In this first section you are going to read about cybercrime. Do you know anything about it? Have you been a victim of any sort of cybercrime? Do you think it is a real issue, or do you think that people are exaggerating it?  First let’s find out about you and your passwords.

This first section contains 5 steps. Work them through step by step.

Step Activity
1. Speaking Give answer to questions and statements about cybercrime.
2. Reading Read an article about social media, rich people and crime. Answer questions. Complete sentences.
3. Grammar Past continuous vs Past simple. Fill in exercise, tick statements, read Grammar Desks.
4. Reading Read a text about a password from school, fill in words in the text.
5. Task Write a story about crime, answer questions.

 

Difficult words? Search these on Cambridge Dictionaries

 

Step 1 - Speaking

Speaking
Now that we know about passwords, let’s think about cybercrime in general.
Read the sentences and decide which ones you think are true.

Which statements do you think are true?

  1. Cybercrime makes more money than illegal drug trafficking.
  2. Every 3 seconds an identity is stolen.
  3. Without a security package, your computer can become infected within four minutes of connecting to the Internet.

Where do you think this information came from?

  1. Police website
  2. A school website page for parents
  3. Computer anti-virus website
  4. Other ...

Which of the following activities are classified as cybercrime?

  1. someone hacking your computer
  2. identity theft
  3. a bank robbery
  4. a car theft

You have answered these questions. Now discuss with a classmate.

  • Did you have the same answers?
  • Can you think of another cybercrime or did you have an experience with a cybercrime yourself?

Step 2 - Reading

Reading
You’re going to read an article about social media, rich people and crime.
Look at the picture in the text below.

What do you think had happened before the photo was taken? Do you recognize the person in the picture?
Choose:

  1. He has just robbed a bank.
  2. He was playing a game of monopoly.
  3. He has filed for bankruptcy.

Now read the text and decide if the following statements are true (T) or false (F).

By David Batty

From selfies on super-yachts to posing with private jets, the young heirs of the uber-wealthy have attracted worldwide envy by showing off their lavish lifestyles on social media.
But these self-styled rich kids of Instagram are, often unwittingly, revealing their parents’ hidden assets and providing evidence for investigators to freeze or seize assets worth tens of millions of pounds, and for criminals to defraud their families. Leading cyber security firms said they were using evidence from social media in up to 75% of their litigation cases, ranging from billionaire divorces to asset disputes between oligarchs, with the online activity of super-rich heirs frequently providing the means to get passed their family’s security. Oisín Fouere, managing director of K2 Intelligence in London, said social media was increasingly their “first port of call”.
Daniel Hall, director of global judgment enforcement at Burford Capital, said their targets in such cases tended to be slightly older people who were not really active Instagram, Facebook and Twitter, but whose children, employees and associates often were. The firm recently managed to seize a “newly acquired private jet” in a fraud case because one of the two fraudsters had a son who posted a photograph on social media of himself and his father
standing in front of the plane. The growing significance of social media in litigation was recently
illustrated by rapper 50 Cent, who was ordered by a Connecticut court to explain a photo on
Instagram in which he posed with stacks of $100 bills that spelled out “broke”, months after filing
for bankruptcy. The rapper claimed the money was fake. Investigators often use location search tools
which enable them to throw a virtual “geo-fence” around a certain building or area and gather all of
the social media posted from there in real time.
Another cyber security company uncovered multimillion-pound hidden assets in a divorce case last
year by monitoring the location of the children’s social media posts. The court ordered the husband
to give his wife $30m, but he claimed not to have such assets. “We monitored social media, particularly
for his young adult kids, and found a lot of posts from the same geo-tagged sites,” said Beckett.
“Cross-referencing that with land registry and other similar bodies overseas, we found several properties
that were registered in the name of this person. “We went to court with a list of assets that we
conservatively estimated at $60m, which the court then seized until he settled the amount that had
been ordered.”
Beckett said the social media indiscretions of super-rich heirs were also leaving their families vulnerable
to fraud and extortion.
There has been a huge rise in such cases in the last year, as cybercrime groups increasingly target wealthy
families as well as corporations.
Jordan Arnold, the head of private client services at the firm, said it was helping the super-rich to devise family
social media policies that set out a code of conduct for posting sensitive content, such as images of their
properties, yachts and jets.
Source: https://www.theguardian.com/

Toets:True or false

Read the sentences and complete with words from the text.

 
  1. When he died, the family discovered that he had ............... in several countries.
  2. These included a ............... which was a castle that had been built in the 17th century.
  3. It took the police several years to ............... the exact nature of the tax fraud.
  4. His wife ............... her beautiful necklace, which had been his last present to her.
  5. Parents ............... not to know as much about social media as their children.
  6. Police look at computers for ............... in cybercrime.

 

Step 3 - Grammar

Grammar
Let’s look at ..... past continuous vs past simple. Fill in the correct form of the verb in brackets.

Exercise:Past continuous vs past simple

Write down all the statements that are correct.

  1. The past simple is used for completed actions in the past.
  2. The past continuous is used for a continuous action in the past.
  3. The past continuous is used to set the scene in a story.
  4. You cannot have a sentence with two verb tenses that are the same.

Were these exercises difficult for you? Read again the theory in the Grammar Desks.

KB: Past continuous
KB: Simple pas

Step 4 - Reading

Reading
Read this text. Complete with the verbs below and put them into the correct form: simple past or past continuous. Some are negative forms.
Choose from:
access / be / change / charge / copy / do / gain / log / look / realise / receive / try / type

Last year, the police .....[1]..... a 9th grader for an offense against a school computer system. The young boy .....[2]..... unauthorized access to the system and he .....[3]..... onto the systems with the school’s administrative password. Noone .....[4]..... him permission.
He .....[5]..... a teacher’s profile and .....[6]..... the name to a favourite cartoon character. But he .....[7]..... at any tests or scores on the system.
His mum said ‘He .....[8]..... to do anything bad, and he .....[9]..... anything serious. He’s a good boy – most of the time”.
Last year the same boy .....[10]..... a three day suspension for a similar crime. The boy, who cannot be identified, said ‘Honestly, it .....[11]..... so easy to do.
The teacher .....[12]..... in his password really slowly and then I .....[13]..... that he .....[14]..... from a piece of paper. Noone does that!”

Step 5 - Task

Task: Writing
'I logged onto my account as usual and there it was.
A photo of me copying some work from a friend. I felt sick. I never copy.
But how was this photo on my Facebook wall. And who posted it?'


Write the story explaining how someone could do that.
First answer the following questions.

  1. How did they get your password/ get into your account?
  2. When did this happen?
  3. How can people change photos?
  4. Why do people do things like this?

Answers

B1: Cyber crime

Step 1 Speaking

All statements are true.

This information came from:
3. computer anti-virus website http://us.norton.com/cybercrime-definition (adapted)

All of them could be defined as cybercrime if they involved a computer and /or a network.

Step 2 Reading

Answer = 3: 50 Cent pleads poverty on Instagram. Photograph: 50 cent Instagram

  1. = assets
  2. = property
  3. = uncover
  4. = showed off
  5. = tend
  6. = evidence

Step 3 Grammar

Statements: 1, 2 and 3 are correct.

Step 4 Reading

  1. = charged
  2. = gained
  3. = logged
  4. = gave
  5. = accessed
  6. = changed
  7. = didn't look
  8. = wasn't trying
  9. = didn't do
  10. = received
  11. = was
  12. = was typing
  13. = realized
  14. = was copying
  • Het arrangement Cybercrime v456 is gemaakt met Wikiwijs van Kennisnet. Wikiwijs is hét onderwijsplatform waar je leermiddelen zoekt, maakt en deelt.

    Auteur
    VO-content
    Laatst gewijzigd
    2017-08-01 12:09:07
    Licentie

    Dit lesmateriaal is gepubliceerd onder de Creative Commons Naamsvermelding-GelijkDelen 4.0 Internationale licentie. Dit houdt in dat je onder de voorwaarde van naamsvermelding en publicatie onder dezelfde licentie vrij bent om:

    • het werk te delen - te kopiëren, te verspreiden en door te geven via elk medium of bestandsformaat
    • het werk te bewerken - te remixen, te veranderen en afgeleide werken te maken
    • voor alle doeleinden, inclusief commerciële doeleinden.

    Meer informatie over de CC Naamsvermelding-GelijkDelen 4.0 Internationale licentie.

    Aanvullende informatie over dit lesmateriaal

    Van dit lesmateriaal is de volgende aanvullende informatie beschikbaar:

    Leerniveau
    VWO 6; VWO 4; VWO 5;
    Leerinhoud en doelen
    Engelse taal en cultuur; Lezen; Gesprekken voeren; Spreken; Luisteren en kijken; Schrijven;
    Eindgebruiker
    leerling/student
    Moeilijkheidsgraad
    gemiddeld
    Trefwoorden
    arrangeerbaar, leerlijn, rearrangeerbare

    Gebruikte Wikiwijs Arrangementen

    VO-content Engels. (2021).

    Cybercrime h45

    https://maken.wikiwijs.nl/98841/Cybercrime_h45

  • Downloaden

    Het volledige arrangement is in de onderstaande formaten te downloaden.

    Metadata

    LTI

    Leeromgevingen die gebruik maken van LTI kunnen Wikiwijs arrangementen en toetsen afspelen en resultaten terugkoppelen. Hiervoor moet de leeromgeving wel bij Wikiwijs aangemeld zijn. Wil je gebruik maken van de LTI koppeling? Meld je aan via info@wikiwijs.nl met het verzoek om een LTI koppeling aan te gaan.

    Maak je al gebruik van LTI? Gebruik dan de onderstaande Launch URL’s.

    Arrangement

    Oefeningen en toetsen

    True or false

    Past continuous vs past simple

    IMSCC package

    Wil je de Launch URL’s niet los kopiëren, maar in één keer downloaden? Download dan de IMSCC package.

    QTI

    Oefeningen en toetsen van dit arrangement kun je ook downloaden als QTI. Dit bestaat uit een ZIP bestand dat alle informatie bevat over de specifieke oefening of toets; volgorde van de vragen, afbeeldingen, te behalen punten, etc. Omgevingen met een QTI player kunnen QTI afspelen.

    Meer informatie voor ontwikkelaars

    Wikiwijs lesmateriaal kan worden gebruikt in een externe leeromgeving. Er kunnen koppelingen worden gemaakt en het lesmateriaal kan op verschillende manieren worden geëxporteerd. Meer informatie hierover kun je vinden op onze Developers Wiki.