Official Text
“Whoever uses computer resources or electronic communication to conduct terrorist activities, including cyber attacks on critical infrastructure, government systems, or public utilities.”
Legal Analysis
Elements to Prove:
- Using computer resources or electronic communication.
- To conduct terrorist activities.
- Including cyber attacks on critical systems.
Potential Defenses:
- No terrorist activities.
- Authorized cybersecurity testing.
- Legitimate activities.
Practical Examples
What Constitutes the Offense:
Cyber attacks on critical infrastructure, digital terrorism, electronic terrorist activities.
What Doesn't Constitute:
Legitimate cybersecurity testing, authorized penetration testing, or lawful activities.
Punishment
Imprisonment for Life, or up to 10 years, and Fine