Traps on the Internet

Unit 5
Unit 5. Traps on the Internet
Part A. Listening (Total: 20 marks)
Transcript
Internet Safety
Twenty years ago, kids in school had never even heard of the internet. Now, I’ll be you can’t
find a single person in your school who hasn’t at least heard of it. In fact, many of us use it on
a regular basis and even have access to it from our homes! The ‘net’ in internet really stands
for network. A network is two or more computer connected together so that information can
be shared, or sent from one computer to another. The internet is a vast resource for all types
of information. You may enjoy using it to do research for a school project, downloading your
favorite songs or communicating with friends and family. Information is accessed through
web pages that companies, organizations and individual create and post. It’s kind of like a
giant bulletin board that the whole world uses! But since anyone can put anything on the
internet, you also have to be careful and use your best judgement and a little common sense.
Just because you read something on a piece of paper someone sticks on a bulletin board
doesn’t mean it’s good information, or even correct, for that matter. So you have to be sure
that whoever posted the information knows what they’re talking about, especially if you’re
doing research! But what if you’re just emailing people? You still have to be very careful. If
you’ve never met the person that you’re communicating with online, you could be on
dangerous ground! You should never give out any personal information to someone you
don’t know, not even your name! And just like you can’t believe the information on every
website out there, you can’t rely on what strangers you ‘meet’ on the internet tell you either.
Just like you could make up things about yourself to tell someone, someone else could do the
same to you!
1
Unit 5
Take 1 minute to read the following questions. Listen to the recording. Mark down useful
notes and answer the following questions.
1. Decide whether the following statements are True (T) or False (F). (8 marks, 2 marks each)
a) Most people surf the internet regularly. T
b) Anyone can create a website. T
c) The information on the internet is correct. F
d) It’s quite safe to talk to strangers online. F
2. Why do students use the internet? Circle the reasons given in the text.
(8 marks, 2 marks each)
A. To do research
B. To download videos
C. To chat
D. To do online shopping
E. To send emails
F. To download songs
3. Make true sentences according to the recording by matching Column A with Column B.
Write the letter in the space provided. (4 marks, 1 mark each)
Column A
1. Never give
2. Don’t believe
3. Don’t rely on
4. Use
Column B
A. What strangers tell you
B. A little common sense
C. Personal information
D. All the information on the
internet
2
Answer (Write the letter here)
1. ____C______
2. ____D______
3. ____A______
4. ___ B______
Unit 5
Part B. Reading (Total: 30 marks)
Read the following articles and then answer the questions.
Passage 1 (20 marks)
Source: The Hong Kong Standard
By Natalie Wong
Date: September 22, 2010
Cops hold 19 in teen internet sex racket
Four students were among 19 people arrested in an internet racket luring teenagers to provide
sex services.
Police revealed that eight of the suspects acted as agents, including a 16-year-old female
student. Another eight provided sex services, while the remaining three were their customers.
Chief inspector Chan Chiu-chin, of New Territories North Regional Crime Headquarters, said:
"The agents got to know the teenagers through online chatrooms using fake identities. After
two to three months, the victims were invited for a meeting outside and were later sexually
assaulted.
"Then agents followed up by luring or threatening them into providing sex services for
customers who paid HK$500 to HK$1,200 a time, of which up to half was taken by the
agents."
Those arrested face charges of criminal intimidation and "controlling another person for
purpose of unlawful sexual intercourse or prostitution."
The online activities were noticed by the police about six months ago.
About 50 officers, including those undercover, were deployed to probe the suspected use of
the internet for setting traps and sexually assaulting youngsters.
Police did not disclose how many teenagers had been lured or threatened into providing sex.
However they said eight of them were in custody because, after providing sexual services,
they also helped to lure friends to join the racket. The three boys and five girls are aged 16 to
22.
3
Unit 5
Chan added: "Some committed the crime after being threatened that their personal data or
intimate photos would be posted with others on the internet."
Police said the racket was not related to any triad activities. They seized 23 computers and 26
mobile phones from homes in Kowloon and the New Territories for further investigation.
Tam Wai-yi, assistant regional crime prevention officer, said warning tags have been posted
on eight online chatrooms and forums.
Questions
Answer questions 1 to 7 using information from the above article. Choose the best answer for
each question and write your answer in the space provided.
1. What was the reason for the arrest of the people? (2 marks)
A. Luring teenagers to provide sex services.
B. Selling pirate CDs.
C. Taking drugs.
2. When was the online activities been noticed by the police? (2 marks)
A. About two months ago.
B. About half a year ago.
C. About one year ago.
3. The teenagers in custody are: (2 marks)
A. Boys only.
B. Girls only.
C. Both boys and girls.
4. Which of the following statements is not correct? (2 marks)
A. The racket was related to triad activities.
B. 23 computers and 26 mobile phones were seized.
C. A 16-year-old female student acted as an agent to lure teenagers to provide sex
services.
5. According to the article, what was the greatest amount the agent got a time for sex
services? (2 marks)
A. HK$500
B. HK$600
C. HK$700
4
Unit 5
6. What are the charges faced by those arrested? (6 marks)
Those arrested face charges of criminal intimidation (2 marks) and "controlling
another person (2 marks) for purpose of unlawful sexual intercourse or prostitution."
(2 marks)
7. Where did the police seize the 23 computers and the 26 mobile phones in the arrest?
(4 marks)
They were seized from homes in Kowloon (2 marks) and the New Territories (2 marks).
Passage 2 (10 marks)
Source: http://www.comptechdoc.org/basic/internetscams/
Avoiding Internet Traps
[1] The internet, although an excellent source of information and way to communicate is
filled with many dangerous traps set by many shady people. Just as in the real world there are
many people who would take advantage of others, the same is true of the internet. This
tutorial is designed to help the reader be wise to the ways that would be used to take
advantage of others and avoid the problems they would cause. There are some general rules
that should be followed to avoid traps on the internet and several types of traps that will be
discussed here. Traps included in this brief tutorial include:



[2] Internet Scams - Designed to steal from you, many scams will either attempt to get
account login information from you or banking or credit card information.
[3] Computer Viruses - Computer viruses either exploit a defect in software running
on your computer or they will try to trick you into running some code which will
infect your computer. In any event, once your computer is infected, the person who
wrote the virus could get control of your computer, get information from your
computer, or potentially monitor your activity on the internet including your logon
information used to access on-line banking or other financial transactions on the
internet.
[4] Adware - Adware usually comes with a program that has some other purpose.
Once installed it will cause ads to pop up on your screen very often and will interfere
seriously with the performance of your computer. Usually it takes someone with a
computer background to remove adware programs because they are hidden on your
computer by their creators. Some programs exist which will remove most adware.
5
Unit 5


[5] Spyware - Similar to adware but I do not consider it to be as bad. It also usually
comes with a program that has another purpose. The creators sometimes tell you up
front that their programs contain spyware. Its main purpose is to monitor your internet
activity for marketing purposes.
[6] Spam - Junk e-mail.
[7] This tutorial, in the process of explaining how to avoid internet traps will show some
examples of viruses, and internet scams. You may safely click on the links provided in these
examples since they have been rendered harmless and in fact these links will provide some
humorous entertainment.
General Trap Avoidance Rules





[8] Be sure of who you are dealing with. Don't be fooled into believing that you are
receiving an e-mail from a reputable party when in fact you are receiving an e-mail
from a con artist.
[9] Check the reputation of the party you are dealing with. This will help you to avoid
many problems including the problems caused by loading programs onto your
computer that may have a sinister purpose.
[10] Never send money or personal information such as banking or credit card
information to unknown or untrusted parties.
[11] Be wary about storing social security information or banking information on your
computer and if you do this, be sure you take appropriate security measures to secure
any systems that store this type of information.
[12] Keep confidential information about yourself confidential such as credit card
numbers, bank account numbers, social security numbers, and even your e-mail
address. You can create e-mail addresses specifically to give to untrusted parties, then
delete them when you receive too much spam.
6
Unit 5
Questions
Answer questions 1 to 5 using information from the above article. Choose the best answer for
each question and write your answer in the space provided. (2 marks each)
1. ‘shady’ in line 2 of paragraph 1 means…
A. sheltered from direct light from the sun
B. dishonest or illegal
C. describes someone or something about which little is known
2. What is the main purpose of this article?
To help the reader be wise to the ways that would be used to take advantage of others
and avoid the problems they would use.
3. What are the steps of the running of computer viruses?
a. infect your computer
b. the person who wrote the virus gets control of your computer
c. the person monitors your activity on the internet including your logon
information used to access on-line banking or other fincncial transactions on
the internet
d. exploit a defect in software running on your computer
A. b->c ->d->a
B. c ->d->a->b
C. d->a->b->c
4. Which of the following is correct?
A. Internet scams are designed to trick you into running some code which will infect your
computer.
B. The writer thinks that spyware is better than adware.
C. It is safe to send personal information to unknown parties.
5. How can we avoid the problems caused by loading programmes onto our computer that
may have a sinister purpose?
We can check the reputation of the party we are dealing with.
7
Unit 5
Part C. Writing (Total: 30 marks)
Write about 300 words on the following topic.
Expository writing:
Have you ever fallen into any Internet traps? If yes, could you describe your experience?
If no, how do you avoid those traps?
The purpose of a piece of expository writing is to inform, describe, explain, or define the
author's subject to the reader.
You are reminded of the importance of clear handwriting and the need for planning and
proofreading.
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
8
Unit 5
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
9
Unit 5
Part D. Speaking (Total: 20 marks)
Find a partner or make an appointment with an ELLRC instructor to talk about the following
topic for 1.5 to 2 minutes. You have 1 minute to think about what you are going to say. You
can make some notes to help you if you wish.
What do you think are the traps online nowadays? Give two to three examples.
The student may talk about:
-Internet scams
-computer viruses
-spam
-spyware, and so on.
10