(7)
with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any—
(A)
threat to cause damage to a protected computer;
(B)
threat to obtain information from a protected computer without authorization or in excess of authorization or to impair the confidentiality of information obtained from a protected computer without authorization or by exceeding authorized access; or
(C)
demand or request for money or other thing of value in relation to damage to a protected computer, where such damage was caused to facilitate the extortion;
shall be punished as provided in subsection (c) of this section.