Oh I’m fully aware of classified data on unauthorized networks. This, however doesn’t fit the mold of the statute you were referring to earlier.
What might fit better here is U.S.C T.18 P.1 Ch. 37 § 798.
As I said, it seems a perfect fit to me. How does it not fit, and what does your code reference that you believe fits better, and why?