The document discusses the benefits of the Cyberstorm program, which allows the government to identify weaknesses in companies' information systems. It then presents three scenarios of cyber crimes that the program could help prevent: (1) an insider stealing credit reports and financial data to sell, (2) malicious software updates that enable access to critical information, and (3) abuse by an outside IT expert rather than an employee. The consequences of these crimes are discussed, noting many cyber criminals are never caught. Sources on cybersecurity and cyber crime are also listed.