Computer crime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of the crime (Moore 2000). Netcrime refers, more precisely, to criminal exploitation of the Internet.[1]
Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it.[2]
On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as  espionage financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat.

Now we can define espionage as practice of obtaining military, political, commercial, or other secret information by means of spies or illegal monitoring devices. Espionage and economic espionage is under the cover of computer crime and I think based on the information that I found from several references  current status of espionage under international law is applicable in cyberspace. Therefore, in my mind there is no need to reinterpret espionage under international law in cyberspace. There is no need for new treaties to regulate or control espionage in cyberspace among nations. (Romero,2001)



References:

[1]Mann and Sutton 1998: >>Netcrime: More change in the Organization of Thieving. British Journal of Criminology; 38: 201-229.http://bjc.oxfordjournals.org/cgi/content/abstract/38/2/201.

Moore, R. (2005) "Cybercrime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing.

Jorge h. Romero(2001) " Cyber espionage 2010: Is the current status of Espionage under International Law applicable  in Cyberspace?"