Adding unauthorized access to a computer to the offenses for which an investigative or law enforcement officer may lawfully intercept specified communications under specified circumstances; adding unauthorized access to a computer to the offenses for which specified individuals may receive a court order to intercept specified communications; etc.