Computer Crime in Hong Kong

A2

Computer Crime in Hong Kong

Introduction

Police say there are fewer computer crimes. But, some crimes now cost much more money.

Main Body

The number of computer crimes went down in 2025 and 2026. Fewer people reported these crimes to the police. However, hacking is more dangerous. Hackers stole more money in 2025 and 2026. They attack banks and digital money companies. One company lost 20 million dollars because of a mistake in their software. Police see many threats. They tell companies to check their computers. Companies must protect their passwords and fix holes in their systems. Police are worried about new technology. They worry about blockchain and cloud computing. These tools can help hackers steal money.

Conclusion

There are fewer crimes, but hacking is a big problem for banks.

Learning

📉 Moving from 'Now' to 'Then'

In the text, we see two ways to talk about the past. Look at these words:

  • Went down (The number... went down)
  • Stole (Hackers stole...)
  • Lost (One company lost...)

The Simple Rule: When we talk about 2025 or 2026, we don't use 'go' or 'steal'. We change the word to show the time has passed.

GoWent StealStole LoseLost


🛠️ Action Words for Safety

To reach A2, you need words that tell people what to do. The police in the article use these:

  1. Check (Look at it carefully)
  2. Protect (Keep it safe)
  3. Fix (Make it work again)

Example:

  • Check your email.
  • Protect your phone.
  • Fix the computer.

Vocabulary Learning

computer
a machine that can store, retrieve, and process information
Example:I use a computer to write my homework.
crime
an illegal act that is punishable by law
Example:The police investigate many crimes every year.
police
people who enforce the law and keep order
Example:The police helped the victim find the stolen money.
fewer
a smaller number of something
Example:There are fewer cars on the road during holidays.
money
paper or coins used to buy goods and services
Example:She saved her money for a new phone.
hacking
the act of breaking into a computer system illegally
Example:Hacking can steal personal information from users.
banks
places where people keep and manage money
Example:He went to the banks to deposit his paycheck.
software
computer programs that perform tasks
Example:The software updates fix many bugs.
threat
a danger or risk that may cause harm
Example:The threat of flooding made the town evacuate.
protect
to keep safe from danger or harm
Example:Use a password to protect your account.
password
a secret word or phrase used to access a computer or account
Example:Never share your password with strangers.
cloud
a network of computers that store data over the internet
Example:She backs up her photos to the cloud.
B2

Analysis of Cybersecurity Trends and Financial Risks in Hong Kong

Introduction

Law enforcement officials have reported a strange trend: while the total number of technology crimes is falling, the financial damage caused by targeted hacking attacks is increasing.

Main Body

Data from the Cyber Security and Technology Crime Bureau shows that the overall number of tech-related crimes has dropped. In 2025, reported cases fell by 6.9% to 31,571, and the first quarter of 2026 saw a further 15% decrease. However, the financial impact of hacking has become more severe. Losses from hacking rose from HK$25.5 million in 2024 to HK$62.6 million in 2025, with another 70% increase in early 2026. This increase is caused by high-value attacks on banks and cryptocurrency services. For example, one contractor used a system weakness to steal about HK$20 million in digital currency. Furthermore, the number of cyber threats targeting the region rose to over 1.54 million in 2025, which is more than double the previous year. Consequently, the police have emphasized the need for regular system audits and better management of user passwords to prevent data leaks. Looking ahead, the police have identified blockchain technology as a major risk. They warned about problems such as stolen private keys and fake deposit attacks. Additionally, they noted that new developments in quantum technology and cloud computing could create significant security challenges in the future.

Conclusion

Although general technology crime is decreasing, the high cost of professional hacking remains a serious risk for institutions.

Learning

⚡ The 'Contrast' Pivot: Moving from Simple to Sophisticated

At an A2 level, you likely use 'but' for everything. To reach B2, you need to master Logical Contrast. The article doesn't just say things are different; it uses specific 'pivots' to connect opposing data.

🔍 The Pivot Breakdown

Look at this specific flow from the text:

*"...reported cases fell... However, the financial impact... has become more severe."

Why this is B2: Instead of starting a new sentence with "But," the author uses "However," followed by a comma. This signals to the reader: "I am about to change the direction of the argument."

🛠️ Upgrading Your Toolkit

Stop using "But" at the start of sentences. Try these B2 alternatives found in or inspired by the text:

  • However, \rightarrow Use this to introduce a surprising contrast.
  • Although... \rightarrow Use this to acknowledge a fact before making your main point. (Example from text: "Although general technology crime is decreasing, the high cost... remains a serious risk.")

📈 The 'Cause and Effect' Chain

B2 fluency is about showing how one thing leads to another. Notice the phrase "Consequently".

  • A2 style: The police said we need audits because of the attacks.
  • B2 style: Attacks increased; consequently, the police emphasized the need for audits.

Pro Tip: "Consequently" is a high-level way to say "so" or "as a result." It transforms a basic observation into a professional analysis.

Vocabulary Learning

trends (n.)
general direction or tendency in which something is developing or changing
Example:Recent trends in cybersecurity show a shift towards AI-based threats.
high-value (adj.)
worth a large amount of money
Example:The attackers targeted high-value accounts to maximize their gains.
cryptocurrency (n.)
digital or virtual currency that uses cryptography for security
Example:Investors are cautious about the volatility of cryptocurrency.
contractor (n.)
a person or company hired to perform work
Example:The contractor was responsible for installing the security system.
system weakness (n.)
a flaw or vulnerability in a system that can be exploited
Example:The hacker exploited a system weakness to gain unauthorized access.
digital currency (n.)
money that exists only in digital form and can be transferred electronically
Example:Digital currency can be transferred instantly across borders.
cyber threats (n.)
potential dangers or attacks that occur in the digital environment
Example:Companies must prepare for cyber threats to protect their data.
audits (n.)
formal examinations of records or systems to ensure accuracy and security
Example:Regular audits help identify security gaps.
passwords (n.)
sequences of characters used to authenticate a user’s identity
Example:Strong passwords are essential for protecting accounts.
data leaks (n.)
unintended release or exposure of confidential information
Example:Data leaks can damage a company's reputation.
blockchain (n.)
a distributed ledger technology that records transactions in a secure, immutable way
Example:Blockchain ensures transparency and immutability of records.
private keys (n.)
secrets used to access encrypted data or digital assets
Example:If private keys are lost, the associated funds become inaccessible.
C2

Analysis of Cybersecurity Trends and Financial Volatility within the Hong Kong Special Administrative Region.

Introduction

Law enforcement authorities have reported a divergence between the declining frequency of general technology crimes and the escalating financial impact of targeted hacking operations.

Main Body

Quantitative data from the Cyber Security and Technology Crime Bureau indicates a contraction in the aggregate volume of technology-related offenses. In 2025, reported cases decreased by 6.9 percent to 31,571, while the first quarter of 2026 saw a 15 percent reduction in case numbers and a 10 percent decline in total losses to HK$1.29 billion compared to the preceding year. Notwithstanding this general downward trend, the financial severity of hacking incidents has intensified. Losses attributed to hacking rose from HK$25.5 million in 2024 to HK$62.6 million in 2025, with a further 70 percent surge in losses recorded during the first quarter of 2026, totaling HK$21.2 million. This escalation is attributed to high-value incursions targeting financial institutions and virtual asset service providers. A primary exemplar of this trend involved the exploitation of a system vulnerability by a software outsourcing contractor, resulting in the unauthorized transfer of approximately HK$20 million in cryptocurrencies. Furthermore, the volume of identified cyber threats targeting the SAR exceeded 1.54 million in 2025, representing a more than twofold increase over 2024 figures. Consequently, the police have advocated for the implementation of rigorous systemic audits, the rectification of internet-facing loopholes, and the stringent management of identity privileges to preclude the leakage of credentials. Regarding prospective vulnerabilities, the force has identified blockchain technology as a critical area of concern. Specific risks include the exploitation of smart contract vulnerabilities, the theft of private keys, and the execution of fake deposit attacks via cross-chain bridges. Additionally, the potential for systemic disruption posed by quantum technology and cloud computing has been noted as a significant future consideration.

Conclusion

While the overall incidence of technology crime is diminishing, the financial impact of sophisticated hacking remains a critical institutional risk.

Learning

The Architecture of 'Precision Contrast'

To bridge the gap from B2 to C2, a learner must move beyond simple contrast markers (like but or however) and master Syntactic Subordination for Nuance. The provided text exemplifies a high-level linguistic phenomenon: the use of concessive precursors to frame a paradoxical reality.

◈ The Pivot: "Notwithstanding this general downward trend..."

At the B2 level, a student would likely write: "The number of crimes went down, but the cost of hacking increased." This is grammatically correct but rhetorically flat.

At the C2 level, we employ Notwithstanding, a preposition used here to acknowledge a fact while simultaneously stripping it of its relevance to the primary argument.

Analysis of the mechanism:

  1. The Concession: "this general downward trend" (Acknowledging the quantitative data).
  2. The Pivot: "Notwithstanding" (Signaling that the following information is more critical than the preceding).
  3. The Intensification: "the financial severity... has intensified" (The core thesis).

◈ Lexical Density & Nominalization

C2 mastery is characterized by the ability to pack complex ideas into noun phrases, reducing the need for repetitive verbs. Observe the shift from action to state:

  • B2 Approach: "If people don't manage who has access to the system, credentials might leak."
  • C2 Approach (Text): "...the stringent management of identity privileges to preclude the leakage of credentials."

Key Linguistic Upgrades identified in the text:

  • Preclude (v.) \rightarrow Replaces prevent or stop for a more formal, legalistic tone.
  • Incursion (n.) \rightarrow Replaces attack or break-in to suggest a strategic penetration of a boundary.
  • Aggregate volume (adj + n) \rightarrow Replaces total number to provide a more clinical, statistical precision.

◈ Semantic Collocation: The 'Institutional' Register

Note the pairing of adjectives and nouns that create an air of authority. To write at C2, you must stop using generic adjectives (big, bad, serious) and use domain-specific qualifiers:

  • Rigorous \rightarrow systemic audits
  • Stringent \rightarrow management
  • Critical \rightarrow institutional risk

By aligning these specific descriptors with abstract nouns, the writer establishes an 'Expert Persona,' a hallmark of C2 proficiency.

Vocabulary Learning

divergence (n.)
the state of being different or moving in different directions
Example:The divergence between the two reports highlighted conflicting interpretations of the data.
escalating (adj.)
increasing rapidly or intensifying
Example:The escalating tensions between the neighboring countries raised international concern.
contraction (n.)
a reduction in size, amount, or scope
Example:The economic contraction this quarter led to widespread layoffs.
aggregate (adj.)
combined or total; all together
Example:The aggregate cost of the project exceeded initial estimates.
intensify (v.)
to become stronger, more intense, or more severe
Example:The storm intensified as it moved toward the coast.
surge (n.)
a sudden powerful increase or rise
Example:A surge in demand for the product caused a shortage.
high‑value (adj.)
of great worth or importance
Example:The high‑value assets were secured with multiple layers of protection.
exemplar (n.)
a model or example that is considered perfect or typical
Example:Her work served as an exemplar for emerging artists.
exploitation (n.)
the act of using something for one's own benefit, often unfairly
Example:The exploitation of loopholes led to regulatory changes.
vulnerability (n.)
a weakness that can be exploited by an attacker
Example:The software's vulnerability was patched in the latest update.
unauthorized (adj.)
not officially permitted or approved
Example:The unauthorized access triggered an immediate security alert.
cryptocurrencies (n.)
digital currencies that use cryptography for security
Example:Investors are wary of the volatility of cryptocurrencies.
exceeding (adj.)
going beyond a limit or expectation
Example:The company's profits are exceeding expectations.
representing (v.)
standing in for or symbolizing something or someone
Example:She was representing her country at the conference.
twofold (adj.)
double in size, amount, or effect
Example:The new policy will result in a twofold increase in efficiency.
advocated (v.)
recommended or supported enthusiastically
Example:The committee advocated for stricter environmental regulations.
implementation (n.)
the act of putting a plan or system into effect
Example:The implementation of the new system was delayed.
rigorous (adj.)
strict, thorough, or exact in procedure or standards
Example:The rigorous testing ensured product reliability.
rectification (n.)
the act of correcting or fixing an error
Example:The rectification of the error required a full audit.
internet‑facing (adj.)
exposed to or accessible from the internet
Example:Internet‑facing servers must have robust firewalls.
stringent (adj.)
strict or severe in terms of rules or requirements
Example:Stringent security protocols were enforced after the breach.
preclude (v.)
to prevent or make impossible
Example:The new guidelines preclude the use of outdated software.
prospective (adj.)
expected or likely to happen in the future
Example:Prospective investors were invited to the briefing.
critical (adj.)
of great importance or urgency
Example:The critical data was lost during the outage.
risk (n.)
the possibility of loss, harm, or danger
Example:The risks of cyber‑attacks are increasing.
theft (n.)
the act of taking something without permission
Example:The theft of personal data was traced back to the hacker.
execution (n.)
the act of carrying out a plan or task
Example:The execution of the plan required coordination.
fake deposit attacks (n.)
fraudulent schemes that trick victims into depositing money
Example:The company warned employees about fake deposit attacks.
cross‑chain bridges (n.)
connections that allow interaction between different blockchain networks
Example:Cross‑chain bridges enable interoperability between blockchains.
systemic disruption (n.)
a large‑scale disturbance that affects an entire system
Example:Systemic disruption can cripple entire industries.
quantum (adj.)
relating to the principles of quantum mechanics
Example:Quantum computing promises unprecedented processing speeds.
cloud computing (n.)
using remote servers over the internet to store, manage, and process data
Example:Cloud computing has transformed data storage.
significant (adj.)
notable, important, or substantial
Example:The study found a significant correlation.
consideration (n.)
careful thought or attention given to something
Example:The decision required thorough consideration.
diminishing (adj.)
becoming less in amount, intensity, or importance
Example:The threat of piracy is diminishing.
sophisticated (adj.)
complex, advanced, or refined
Example:The attackers used sophisticated malware.
institutional risk (n.)
risk faced by an institution that could affect its stability or reputation
Example:The board assessed institutional risk before the merger.