contestada

in a situation where phishing attackers attempt to steal personal information, which of the following federal acts can be used to prosecute such a crime?