Introduction - Charity begins at home
In this first section you are going to read about cybercrime. Do you know anything about it? Have you been a victim of any sort of cybercrime? Do you think it is a real issue, or do you think that people are exaggerating it? First let’s find out about you and your passwords.
This first section contains 5 steps. Work them through step by step.
Step
Activity
1. Speaking
Give answer to questions and statements about cybercrime.
2. Reading
Read an article about social media, rich people and crime. Answer questions. Complete sentences.
3. Grammar
Past continuous vs Past simple. Fill in exercise, tick statements, read Grammar Desks.
4. Reading
Read a text about a password from school, fill in words in the text.
Speaking
Now that we know about passwords, let’s think about cybercrime in general.
Read the sentences and decide which ones you think are true.
Which statements do you think are true?
Cybercrime makes more money than illegal drug trafficking.
Every 3 seconds an identity is stolen.
Without a security package, your computer can become infected within four minutes of connecting to the Internet.
Where do you think this information came from?
Police website
A school website page for parents
Computer anti-virus website
Other ...
Which of the following activities are classified as cybercrime?
someone hacking your computer
identity theft
a bank robbery
a car theft
You have answered these questions. Now discuss with a classmate.
Did you have the same answers?
Can you think of another cybercrime or did you have an experience with a cybercrime yourself?
Step 2 - Reading
Reading
You’re going to read an article about social media, rich people and crime.
Look at the picture in the text below.
What do you think had happened before the photo was taken? Do you recognize the person in the picture?
Choose:
He has just robbed a bank.
He was playing a game of monopoly.
He has filed for bankruptcy.
Now read the text and decide if the following statements are true (T) or false (F).
By David Batty
From selfies on super-yachts to posing with private jets, the young heirs of the uber-wealthy have attracted worldwide envy by showing off their lavish lifestyles on social media.
But these self-styled rich kids of Instagram are, often unwittingly, revealing their parents’ hidden assets and providing evidence for investigators to freeze or seize assets worth tens of millions of pounds, and for criminals to defraud their families. Leading cyber security firms said they were using evidence from social media in up to 75% of their litigation cases, ranging from billionaire divorces to asset disputes between oligarchs, with the online activity of super-rich heirs frequently providing the means to get passed their family’s security. Oisín Fouere, managing director of K2 Intelligence in London, said social media was increasingly their “first port of call”.
Daniel Hall, director of global judgment enforcement at Burford Capital, said their targets in such cases tended to be slightly older people who were not really active Instagram, Facebook and Twitter, but whose children, employees and associates often were. The firm recently managed to seize a “newly acquired private jet” in a fraud case because one of the two fraudsters had a son who posted a photograph on social media of himself and his father
standing in front of the plane. The growing significance of social media in litigation was recently
illustrated by rapper 50 Cent, who was ordered by a Connecticut court to explain a photo on
Instagram in which he posed with stacks of $100 bills that spelled out “broke”, months after filing
for bankruptcy. The rapper claimed the money was fake. Investigators often use location search tools
which enable them to throw a virtual “geo-fence” around a certain building or area and gather all of
the social media posted from there in real time.
Another cyber security company uncovered multimillion-pound hidden assets in a divorce case last
year by monitoring the location of the children’s social media posts. The court ordered the husband
to give his wife $30m, but he claimed not to have such assets. “We monitored social media, particularly
for his young adult kids, and found a lot of posts from the same geo-tagged sites,” said Beckett.
“Cross-referencing that with land registry and other similar bodies overseas, we found several properties
that were registered in the name of this person. “We went to court with a list of assets that we
conservatively estimated at $60m, which the court then seized until he settled the amount that had
been ordered.”
Beckett said the social media indiscretions of super-rich heirs were also leaving their families vulnerable
to fraud and extortion.
There has been a huge rise in such cases in the last year, as cybercrime groups increasingly target wealthy
families as well as corporations.
Jordan Arnold, the head of private client services at the firm, said it was helping the super-rich to devise family
social media policies that set out a code of conduct for posting sensitive content, such as images of their
properties, yachts and jets.
Source: https://www.theguardian.com/
De onderstaande antwoorden moet je zelf nakijken; vergelijk jouw antwoorden met de goede
antwoorden, en geef aan in welke mate jouw antwoorden correct zijn.
De onderstaande antwoorden moet je zelf nakijken; vergelijk jouw antwoorden met de goede
antwoorden, en geef aan in welke mate jouw antwoorden correct zijn.
Reading
Read this text. Complete with the verbs below and put them into the correct form: simple past or past continuous. Some are negative forms.
Choose from: access / be / change / charge / copy / do / gain / log / look / realise / receive / try / type
Last year, the police .....[1]..... a 9th grader for an offense against a school computer system. The young boy .....[2]..... unauthorized access to the system and he .....[3]..... onto the systems with the school’s administrative password. Noone .....[4]..... him permission.
He .....[5]..... a teacher’s profile and .....[6]..... the name to a favourite cartoon character. But he .....[7]..... at any tests or scores on the system.
His mum said ‘He .....[8]..... to do anything bad, and he .....[9]..... anything serious. He’s a good boy – most of the time”.
Last year the same boy .....[10]..... a three day suspension for a similar crime. The boy, who cannot be identified, said ‘Honestly, it .....[11]..... so easy to do.
The teacher .....[12]..... in his password really slowly and then I .....[13]..... that he .....[14]..... from a piece of paper. Noone does that!”
Step 5 - Task
Task: Writing 'I logged onto my account as usual and there it was.
A photo of me copying some work from a friend. I felt sick. I never copy.
But how was this photo on my Facebook wall. And who posted it?'
Write the story explaining how someone could do that.
First answer the following questions.
How did they get your password/ get into your account?
Dit lesmateriaal is gepubliceerd onder de Creative Commons Naamsvermelding-GelijkDelen 4.0 Internationale licentie. Dit houdt in dat je onder de voorwaarde van naamsvermelding en publicatie onder dezelfde licentie vrij bent om:
het werk te delen - te kopiëren, te verspreiden en door te geven via elk medium of bestandsformaat
het werk te bewerken - te remixen, te veranderen en afgeleide werken te maken
voor alle doeleinden, inclusief commerciële doeleinden.
Leeromgevingen die gebruik maken van LTI kunnen Wikiwijs arrangementen en toetsen afspelen en resultaten
terugkoppelen. Hiervoor moet de leeromgeving wel bij Wikiwijs aangemeld zijn. Wil je gebruik maken van de LTI
koppeling? Meld je aan via info@wikiwijs.nl met het verzoek om een LTI
koppeling aan te gaan.
Maak je al gebruik van LTI? Gebruik dan de onderstaande Launch URL’s.
Arrangement
Oefeningen en toetsen
True or false
Past continuous vs past simple
IMSCC package
Wil je de Launch URL’s niet los kopiëren, maar in één keer downloaden? Download dan de IMSCC package.
Oefeningen en toetsen van dit arrangement kun je ook downloaden als QTI. Dit bestaat uit een ZIP bestand dat
alle
informatie bevat over de specifieke oefening of toets; volgorde van de vragen, afbeeldingen, te behalen
punten,
etc. Omgevingen met een QTI player kunnen QTI afspelen.
Wikiwijs lesmateriaal kan worden gebruikt in een externe leeromgeving. Er kunnen koppelingen worden gemaakt en
het lesmateriaal kan op verschillende manieren worden geëxporteerd. Meer informatie hierover kun je vinden op
onze Developers Wiki.