Text
A defendant shall be punished by imprisonment for not more than ten months.
However, the execution of the above punishment shall be suspended for a period of two years from the date this judgment becomes final and conclusive.
Reasons
Punishment of the crime
1. Violation of the Act on Promotion of Utilization of Information and Communications Network and Information Protection, etc. (Violation of Information and Communications Network);
(a) No one shall cause a trouble to a communications network by sending a large amount of signals or data with the intention of hindering the stable operation of the information and communications network, letting the person process an unlawful order, etc.;
Nevertheless, the Defendant designated and notified the Defendant of the illegal sports gambling site, etc., which would lead to an attack against D, E, F, G, H, I, J, K, and L (D: D, E, E, G, H, I, K, and L, in a manner that the attack against distribution service is distributedly and simultaneously at the same time, the attack against the system is not used for the original intended purpose due to the lack of resources of the system). The Defendant, accordingly, led other accomplices to take overall control of the attack against D, E, F, G, H, I, J, K, and L, and accordingly, conspired to conduct a attack against D, E, G, H, I, K, and L in compliance with the direction of the Defendant.
Accordingly, on October 21, 2015, the Defendant made use of the attack server installed in the North-gu Incheon apartment 101 Dong 2201 at the port around the port of port around October 21, 2015 to transmit a large amount of traffic from 10 bits to 300 bits, which is an illegal sports gambling site, to create symptoms leading to or leading to the above site server. In addition, from around that time to August 2016, the Defendant made an attack on DNA over 326 times in total, such as the list of crimes (1) in attached Form.
(b) No person who intrudes into an information and communications network shall intrude the network without legitimate access authority or beyond the permitted access authority.
The Defendant, along with his name-free boxes (C’’), D, J,O, P, Q, requests the Defendant to acquire personal information, and the Defendant.