recommended reading

Is One Act of Cyber Vandalism Worth 25 Years in Jail?

Pedro Rufo /

Matthew Keys is in some hot water.

The deputy social media editor for Thompson Reuters was federally indicted Thursday on three counts of conspiracy to hack the Tribune Company, his former employer. If he's convicted, Keys faces up to 30 years in prison and a $750,000 fine. According to the indictment (PDF), first obtained by The Huffington Post's Ryan Reilly, Keys made himself known to a member of the hacking collective Anonymous and offered up login information that allowed Anonymous to change information displayed on The Los Angeles Times.

Keys' indictment is a big deal for obvious reasons, but also because it's the second case this year in which legal action has raised momentous ethical questions concerning Internet crimes. It's impossible to read the potential penalties at stake and not think of Aaron Swartz, the Reddit co-founder and RSS developer who committed suicide after allegedly violating the Computer Fraud and Abuse Act. According to prosecutors, Swartz wilfully committed a massive act of intellectual property theft when he downloaded millions of articles from JSTOR, the online repository for academic research. Swartz' defenders argued that even if he had stolen the content, he hurt nobody -- and therefore the sentence he faced was vastly disproportionate to the nature of the crime.

By most accounts, the prosecutors came away from the encounter looking like the bad guy -- critics charged them with pursuing Swartz to the point of suicide just because they could. The moral issues raised by his case, meanwhile, are still unresolved. That's why Keys' case is so important: the precedents established here will go a long way toward establishing how the Internet functions and governs itself.

What we have here is another potential Swartz-type situation where every incentive is telling prosecutors to go after Keys as aggressively as they did Swartz, if not more so. From the government's perspective, what Keys allegedly did was a Very Serious Crime. Keys' actions resulted in a hacking attempt against a major U.S. company. With Washington newly alerted to the threat of cyber espionage, it's understandable that the government would want to deter network penetrations of all kinds. Deterrence requires stiff penalties -- ones the government isn't afraid to enforce.

Those who would defend Keys might argue that what he did was no more harmful than when Swartz scraped his gazillionth article from JSTOR. Based on the damage he allegedly caused -- indirectly, at that -- what penalty should such a crime deserve? In the next few weeks, expect a public battle over the severity of not just his supposed crime, but of Internet crimes writ large.

Yes, Matthew Keys is in hot water. But how hot will be largely up to us.

(Image via Pedro Rufo / )

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.