Official Text
“Whoever uses computer resources to commit acts of terrorism, including cyber attacks on critical infrastructure.”
Legal Analysis
Elements to Prove:
- Using computer resources.
- Committing acts of terrorism.
- Intent to cause harm or disruption.
Potential Defenses:
- No terrorist acts.
- Authorized activities.
- Legitimate research.
Practical Examples
What Constitutes the Offense:
Cyber attacks on government systems, hacking critical infrastructure, digital terrorism.
What Doesn't Constitute:
Authorized security testing, legitimate research, or lawful activities.
Punishment
Imprisonment for Life, or up to 10 years, and Fine