Official Text
“Whoever uses computer resources to conduct espionage, including stealing classified information or trade secrets.”
Legal Analysis
Elements to Prove:
- Using computer resources.
- Conducting espionage.
- Stealing classified information.
Potential Defenses:
- No espionage.
- Authorized access.
- Legitimate activities.
Practical Examples
What Constitutes the Offense:
Stealing classified information, corporate espionage, digital spying.
What Doesn't Constitute:
Authorized access, legitimate research, or lawful activities.
Punishment
Imprisonment up to 10 years, and Fine