Which of the following is not an example of a computer used as a target of crime

A) knowingly accessing a protected computer to commit fraud
B) sccessing a computer system without authority
C) illegally accessing stored electronic communication
D) threatening to cause damage to a protected computer
E) breaching the confidentiality of protected computerized data