Back to dashboard Read module

Quiz reading view

Quiz 1Q — Beyond CFAA: Economic Espionage Act, Espionage Act, State Statutes

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Beyond CFAA: Economic Espionage Act, Espionage Act, State Statutes, and Trespass to Chattels as learned.

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Beyond CFAA: Economic Espionage Act, Espionage Act, State Statutes, and Trespass to Chattels as learned.

Type Quiz
Updated 2026-04-17
Reading time 10 min read
Questions 10

Check the reading before you move on.

01q-missing-statutes.md | Last updated: 2026-04-17

**DISCLAIMER:** Educational purposes only. Not legal advice.

Question 1

The Economic Espionage Act has two distinct offenses under §§ 1831 and 1832. What is the key distinction between them, and how does it affect the maximum sentence?

Question 2

Xu Yanjun, a deputy division director of China's Ministry of State Security, was convicted in S.D. Ohio in 2021 for recruiting GE Aviation engineers to steal turbofan engine designs. His case is historically significant for two reasons. Which answer correctly identifies both?

Question 3

Zheng Xiaoqing, a principal engineer at GE Power, exfiltrated thousands of turbine technology files when he left for a Chinese competitor. He embedded the files into the binary code of a sunset photograph using steganography and transmitted them via email. Under which EEA section was he charged, and why — rather than § 1831?

Question 4

A security researcher reverse-engineers a competitor's IoT firmware to study its authentication protocol. The firmware contains undisclosed proprietary encryption logic the competitor developed at significant cost and kept secret under NDA. The researcher publishes findings that expose the full algorithm. Which of the following best describes the EEA exposure?

Question 5

Chelsea Manning had authorized access as an Army intelligence analyst to SIPRNET, the classified military network. She downloaded approximately 700,000 documents and transmitted them to WikiLeaks. She was convicted under the Espionage Act, not solely under the CFAA. What does her case establish about the Espionage Act's authorization requirement?

Question 6

Reality Winner was identified as the source of a leaked NSA intelligence report through a forensic technique that exploited physical evidence embedded in the printed document she mailed to The Intercept. What technique identified her?

Question 7

California Penal Code § 502 (CDAFA) is generally considered more plaintiff-friendly than the federal CFAA for civil suits. Which of the following correctly identifies the two most significant ways § 502 expands civil liability beyond the federal CFAA?

Question 8

Under New York Penal Law § 156.10, what element elevates unauthorized computer access from a Class A misdemeanor (§ 156.05) to a Class E felony (computer trespass)?

Question 9

The trespass to chattels doctrine was significantly limited for digital activity by Intel Corp. v. Hamidi (Cal. 2003). A former Intel employee sent mass emails to Intel workers criticizing the company's employment practices. Intel blocked him repeatedly and he circumvented the blocks. The California Supreme Court ruled against Intel. What was the court's central holding?

Question 10

A company discovers that a web scraper is consuming 1.4% of its total server capacity without authorization. The company has blocked the scraper's IP addresses multiple times and the operator has circumvented each block. The company is based in California and wants to pursue all available legal theories. Which combination of claims is available and correctly matched to its requirements?