There tends to be two types of cybercrime; utilizing information for financial gain and the uploading of information onto the internet for public notice. Typically, when cybercrime is mentioned, people often think of cyber criminals gaining access to bank accounts, the abduction of someone’s identity, and the destabilization of society through pornography, guns for hire, cyber stalking, and terrorism. On the other hand, there are hackers that believe they are broadcasting proprietary or classified information to the public which has a right to know and access. How do you prosecute these different types of cyber-crimes? Robert Tappan Morris was the first person prosecuted under the Computer Fraud and Abuse Act in 1989. Mr. Morris created and released a virus onto the internet in his attempt to measure the extent of the internet. His worm awarded him three years-probation and a $10,000 fine (Cybercrime 2). Needless to say, over twenty years later, it is doubtful that this light of a sentence would be handed out today. Since 2013, the U.S. government has increased its defenses against cyber-attacks from foreign sources. The Defense Department has a Cyber Command division which is in charge of ensuring the American infrastructure, such as the power grid and the Defense Department’s computer …show more content…
All criminals should be executed to the fullest extent of the law, regardless if the information is stolen for financial gain or given away. Shown below is a list of maximum sentences on computer crimes as reported by Dale E. Williams (“Cybercrime”). As with all crimes, penalties are handed out by judges, who often times do not penalize criminals to the fullest extent. Technology keeps growing by leaps and bounds and criminals and terrorists have adapted to these advancing changes, and so must law enforcement. We cannot tie the hands of intelligence agencies to combat our ever evolving technology, by pleading an affront to our constitutional right of free speech. The person who claims this right and then becomes a victim of internet crime themselves, almost always does a turnabout and rails at law enforcement to find and punish the criminals. Unfortunately it is an era of technology and the criminals are well versed in their capability to use it to their