{"id":1346,"date":"2017-09-27T17:44:33","date_gmt":"2017-09-27T17:44:33","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/?post_type=chapter&#038;p=1346"},"modified":"2019-01-19T16:37:46","modified_gmt":"2019-01-19T16:37:46","slug":"13-1-crimes-involving-national-security","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/chapter\/13-1-crimes-involving-national-security\/","title":{"raw":"13.1 Crimes Involving National Security","rendered":"13.1 Crimes Involving National Security"},"content":{"raw":"<img class=\"alignnone size-full wp-image-1653\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3630\/2017\/09\/19163550\/Bribery.png\" alt=\"\" width=\"200\" height=\"144\" \/>\r\n<div class=\"textbox\">Bribery is the act of giving or receiving something of value in exchange for some kind of influence or action in return, that the recipient would otherwise not alter. <a class=\"q ruhjFe NJLBac fl\" href=\"https:\/\/en.wikipedia.org\/wiki\/Bribery\">Wikipedia<\/a><\/div>\r\n&nbsp;\r\n<div>\r\n<div class=\"informalfigure medium block\"><\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch13_ep01\" class=\"epigraph block\">\r\n<p id=\"storm_1.0-ch13_p01\" class=\"para\"><em>Bribery, of course, connotes a voluntary offer to obtain gain, where extortion connotes some form of coercion.<\/em><\/p>\r\n<p class=\"attribution\">\u00a0\u00a0\u00a0--<a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=189694239263939940&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">U.S. v. Adcock<\/em><\/a>, cited in <a class=\"xref\" href=\"http:\/\/open.lib.umn.edu\/criminallaw\/chapter\/13-3-perjury-bribery-and-obstruction-of-justice\/#storm_1.0-ch13_s03_s02\">Section 13.3.2 \"Bribery Elements\"<\/a><\/p>\r\n\r\n<\/div>\r\n<div id=\"storm_1.0-ch13_s01_n01\" class=\"bcc-box bcc-highlight\">\r\n<h3 class=\"title\">Learning Objectives<\/h3>\r\n<ol id=\"storm_1.0-ch13_s01_l01\" class=\"orderedlist\">\r\n \t<li>Define the elements of treason, and analyze treason\u2019s evidentiary requirements and grading.<\/li>\r\n \t<li>Define the elements of sedition, and analyze sedition grading.<\/li>\r\n \t<li>Define the elements of various forms of sabotage, and analyze sabotage grading.<\/li>\r\n \t<li>Define the elements of espionage, and analyze espionage grading.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"storm_1.0-ch13_s01_p01\" class=\"para editable block\">The government is tasked with keeping the nation safe from domestic and international attacks on the government and citizens. National security is an issue that affects the entire country, so most of the regulation in this area is <em class=\"emphasis\">federal<\/em>, rather than <em class=\"emphasis\">state<\/em> (Pennsylvania v. Nelson, 2011). Criminal statutes protecting the government can encroach on the individual freedom to protest government action and can also affect privacy interests, which subjects them to enhanced constitutional scrutiny similar to the crimes against the public reviewed in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/12-1-quality-of-life-crimes\">Chapter 12 \"Crimes against the Public\"<\/a>. This section explores crimes against the nation, such as treason, sedition, sabotage, and espionage. <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/13-2-crimes-involving-terrorism\/#storm_1.0-ch13_s02\">Section 13.2 \"Crimes Involving Terrorism\"<\/a> examines terrorism and the USA PATRIOT Act. The last section of this chapter discusses other crimes against the government that are primarily <em class=\"emphasis\">state<\/em> regulated, such as perjury, bribery, and obstruction of justice.<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Treason<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s01_p01\" class=\"para editable block\">Article III \u00a7\u00a03 of the US Constitution defines <span class=\"margin_term\"><a class=\"glossterm\">treason<\/a><\/span> and specifies the evidentiary requirements for any treason trial. The founding fathers wanted to ensure that the government would not charge an individual with treason without significant and reliable proof. Treason was punishable by death in England, so it was a constant threat to anyone who disagreed with the ruling party. Although the treason clause in the Constitution is modeled after the early English law defining treason, it omits a section that criminalized \u201cimagining the death of the King\u201d and also limits Congress\u2019s authority to extend or expand the crime of treason or to lighten the evidentiary requirements.<\/p>\r\n<p id=\"storm_1.0-ch13_s01_s01_p02\" class=\"para editable block\">The pertinent section of the Constitution states, \u201cTreason against the United States shall consist only in levying War against them, or, in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.\u201d<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Treason Elements and Grading<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s01_s01_p01\" class=\"para editable block\">The <strong class=\"emphasis bold\">criminal act<\/strong> element required for treason is levying war against the United States <strong class=\"emphasis bold\">or<\/strong> adhering to the enemy by giving aid and comfort (18 U.S.C. \u00a7 2381, 2011). Prosecutions for treason are practically nonexistent, so case law in this area is dated, yet still constitutes viable precedent. In <a class=\"link\" href=\"http:\/\/law2.umkc.edu\/faculty\/projects\/ftrials\/burr\/marshallopinion.html\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">U.S. v. Burr<\/em><\/a>, 25 F Cas 55 (1807), a case involving then-vice president Aaron Burr\u2019s prosecution for treason, the US Supreme Court held that levying war means an actual assembling of men, not a <strong class=\"emphasis bold\">conspiracy<\/strong> to levy war, nor a mere <em class=\"emphasis\">enlistment<\/em> of men. In <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=2403758675000151464&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">Haupt v. U.S.<\/em><\/a>, 330 U.S. 631 (1947), the US Supreme Court held that the defendant\u2019s acts of harboring and sheltering his son in his home, helping him to purchase an automobile, and obtain employment constituted providing aid and comfort to the enemy because the defendant\u2019s son was a spy and saboteur. The criminal intent element required for treason is most likely the <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong> to commit an act of levying war or the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to betray the United States by giving aid and comfort to enemies (Cramer v. U.S., 1945). The <em class=\"emphasis\">Constitution<\/em> specifies the evidentiary requirements that two witnesses testify to an overt act of treason or that the defendant confess in open court, although this is not set forth in the federal treason statute (18 U.S.C., 2011). As stated in <a class=\"link\" href=\"http:\/\/supreme.justia.com\/us\/325\/1\/\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">Cramer v. U.S.<\/em><\/a>, 325 U.S. 1, 34, 35 (1945), \u201cEvery act, movement, deed, and word of the defendant charged to constitute treason must be supported by the testimony of two witnesses,\u201d and it is not enough that the elements of treason can be <em class=\"emphasis\">inferred<\/em> from the witness statements. Treason is <strong class=\"emphasis bold\">graded<\/strong> as a felony that can merit the death penalty or prohibit the defendant from ever holding federal office (18 U.S.C. \u00a7 2381, 2011).<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s01_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of a Case Lacking Treason Elements and Evidentiary Requirements<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s01_s01_s01_p01\" class=\"para editable block\">Benedict is identified as a person of interest in a treason case. A government agent posing as an enemy spy invites Benedict to dinner, and they discuss the decline of the United States and whether or not they should \u201cdo something about it.\u201d At the conclusion of the dinner, Benedict picks up the tab. Thereafter, Benedict is arrested for treason and refuses to incriminate himself by responding to law enforcement interrogation. It is unlikely that Benedict will be convicted of treason in this case. Benedict paid for the government agent\u2019s dinner, which could constitute providing <strong class=\"emphasis bold\">aid<\/strong> to the enemy. However, Benedict indicated a hesitancy to take further action, which does not satisfy the requirement that he act with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to <em class=\"emphasis\">betray<\/em> the United States. In addition, only the government agent can testify as to Benedict\u2019s act of paying for a meal because Benedict is asserting his right to remain silent. Therefore, the constitutional requirement that two witnesses testify about the overt act charged as treason is not satisfied. The intent element and evidentiary requirement for treason are lacking, so Benedict probably will not be subject to prosecution for and conviction of this offense.<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s01_s01_s01_f01\" class=\"figure large editable block\" style=\"max-width: 600px;margin: auto\">\r\n<p class=\"title\"><span class=\"title-prefix\">Figure 13.1<\/span> Crack the Code<\/p>\r\n<a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/a3c7cd3ea6fe8aa146e5a9ae5e81e721.jpg\"><img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210348\/a3c7cd3ea6fe8aa146e5a9ae5e81e721.jpg\" alt=\"Crack the Code\" \/><\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch13_s01_s02\" class=\"section\">\r\n<h2 class=\"title editable block\">Sedition<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s02_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Sedition<\/a><\/span> criminalizes the incitement of insurrection or revolution by seditious speech or writings and, as such, is subject to the restrictions set forth in the First Amendment. The first federal law prohibiting sedition was the Sedition Act enacted in 1798 and repealed by Thomas Jefferson after his election as president. The current federal statute criminalizing sedition was originally enacted in 1940 and is codified at <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002385----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02385<\/a>. Conspiracy to commit sedition is codified at <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002384----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02384<\/a>. Many states have similar provisions (51 Pa. Cons. Stat. Ann. \u00a7 6018, 2011). Like treason, sedition is rarely prosecuted.<\/p>\r\n<p id=\"storm_1.0-ch13_s01_s02_p02\" class=\"para editable block\">The <strong class=\"emphasis bold\">criminal act<\/strong> element required for sedition is either advocating, aiding, teaching, organizing or printing, publishing, or circulating written matter that advocates, aids, or teaches the overthrow of the US government or any state, district, or territory thereof by <em class=\"emphasis\">force<\/em> or <em class=\"emphasis\">violence<\/em> (18 U.S.C. \u00a7 2385, 2011). The criminal intent element required for sedition is the <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong> to advocate, aid, teach, or organize, or the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to print, publish, or circulate written matter that advocates, aids, or teaches the violent government overthrow. In <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=14369441513839511604&amp;q=Yates+v.+U.S.&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">Yates v. U.S.<\/em><\/a>, 354 U.S. 298 (1957), the US Supreme Court held that only advocacy directed at <em class=\"emphasis\">promoting unlawful action<\/em> could be constitutionally prohibited. Advocacy of an \u201cabstract doctrine\u201d was protected by the First Amendment as free speech (Yates v. U.S., 2011). Sedition is <strong class=\"emphasis bold\">graded<\/strong> as a felony that can prohibit the defendant from obtaining employment with the US government for a minimum of five years postconviction (18 U.S.C. \u00a7 2385, 2011).<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s02_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Sedition<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s02_s01_p01\" class=\"para editable block\">Mo, a disgruntled immigrant who has been denied citizenship, decides he wants to overthrow the US government and supplant it with a new government that will grant the citizenship privileges he desires. Mo prints up leaflets advocating the overthrow of the government by placing a series of bombs in strategic and specifically named places and passes them out every Saturday in front of varied places known for ethnic diversity throughout the city. Mo has most likely committed sedition in this example. Mo <strong class=\"emphasis bold\">printed written matter<\/strong> advocating the overthrow of the US government by <em class=\"emphasis\">unlawful<\/em> action, using <em class=\"emphasis\">force<\/em> and <em class=\"emphasis\">violence<\/em>. Mo\u2019s intent was to get rid of the current government so that he could gain citizenship, which is <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong>. Thus Mo\u2019s conduct probably constitutes sedition, and he may be subject to prosecution for and conviction of several counts of this offense.<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s02_s01_f01\" class=\"figure large editable block\" style=\"max-width: 600px;margin: auto\">\r\n<p class=\"title\"><span class=\"title-prefix\">Figure 13.2<\/span> Diagram of Sedition<\/p>\r\n<a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/a008072755c93ca47791cf30652bbd79.jpg\"> <img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210351\/a008072755c93ca47791cf30652bbd79.jpg\" alt=\"Diagram of Sedition\" \/><\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch13_s01_s03\" class=\"section\">\r\n<h2 class=\"title editable block\">Sabotage<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s03_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Sabotage<\/a><\/span> is criminalized at <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sup_01_18_10_I_20_105.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02151<\/a> et seq., which includes several different forms of this offense. Many states have similar provisions (RCW \u00a7 9.05.060, 2011). In general, sabotage is destroying, damaging, or defectively producing (<strong class=\"emphasis bold\">criminal act<\/strong> and <strong class=\"emphasis bold\">harm<\/strong>) property with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong>, <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong>, or <strong class=\"emphasis bold\">negligently<\/strong> to impede the nation\u2019s ability to prepare for or participate in war and national defense and is detailed in the following United States Codes:<\/p>\r\n\r\n<ul id=\"storm_1.0-ch13_s01_s03_l01\" class=\"itemizedlist editable block\">\r\n \t<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002152----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02152<\/a> focuses on destroying or damaging harbor-defense property.<\/li>\r\n \t<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002153----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02153<\/a> focuses on destroying or damaging war material, premises, or utilities.<\/li>\r\n \t<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002154----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02154<\/a> focuses on producing defective war materials, premises, or utilities.<\/li>\r\n \t<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002155----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02155<\/a> focuses on destroying or damaging national defense material, premises, or utilities.<\/li>\r\n \t<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002156----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02156<\/a> focuses on producing defective national defense material, premises, or utilities.<\/li>\r\n<\/ul>\r\n<p id=\"storm_1.0-ch13_s01_s03_p02\" class=\"para editable block\">Both 18 U.S.C. \u00a7\u00a7\u00a02153 and 2154 have the <strong class=\"emphasis bold\">attendant circumstance<\/strong> that the conduct occur during <em class=\"emphasis\">war<\/em> or a <em class=\"emphasis\">national emergency<\/em>. All the sabotage statutes <strong class=\"emphasis bold\">grade<\/strong> sabotage as a felony, with sentences ranging from five to thirty years\u2019 incarceration in federal prison.<\/p>\r\n<p id=\"storm_1.0-ch13_s01_s03_p03\" class=\"para editable block\">Sabotage is prosecuted more often than treason and sedition, and there have been some extremely interesting criminal sabotage cases, including <a class=\"link\" href=\"http:\/\/query.nytimes.com\/mem\/archive-free\/pdf?res=F30E17F93C5D147A93C1A81783D85F4C8185F9\" target=\"_blank\" rel=\"noopener\">sabotage indictments<\/a> against a corporation manufacturing defective raincoats for the armed forces during wartime, a <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=11613341251816441831&amp;q=%2218+U.S.C.+2153%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">sabotage trial<\/a> for the burning of an ROTC building on the Washington University campus after the Kent State University riots, a <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=7553337375799284681&amp;q=%2218+U.S.C.+2153%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">sabotage trial<\/a> for defendants who stole copper wire from a railroad track that was used to ship war materials, and the <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=17683910058222877377&amp;q=%2218+U.S.C.+2155%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">sabotage indictment<\/a> of Osama bin Laden for <span class=\"margin_term\"><a class=\"glossterm\">extraterritorial<\/a><\/span> (outside the United States) activity.<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s03_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Sabotage<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s03_s01_p01\" class=\"para editable block\">Review the example in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/13-1-crimes-involving-national-security\/#storm_1.0-ch13_s01_s02_s01\">Section 13 \"Example of Sedition\"<\/a> with Mo. Add to this example and imagine that Mo gets no response to his fliers and becomes enraged. He decides to get back at the United States for not allowing him to become a US citizen by harming its national security and exposing it to attack by enemy forces. He thereafter hacks into the computer system used by the US Department of Defense and damages it so that it is out of commission for two weeks. Mo has most likely committed the federal crime of <strong class=\"emphasis bold\">sabotage<\/strong>. Mo <strong class=\"emphasis bold\">damaged<\/strong> national defense material with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to interfere with the nation\u2019s security and defense, which is prohibited under 18 U.S.C. \u00a7\u00a02155, whether or not it is wartime or during a national emergency. Thus Mo may be subject to prosecution for and conviction of this offense and could face many years of incarceration for his conduct.<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s03_s01_f01\" class=\"figure large editable block\" style=\"max-width: 600px;margin: auto\">\r\n<p class=\"title\"><span class=\"title-prefix\">Figure 13.3<\/span> Diagram of Sabotage<\/p>\r\n<a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/3db246e6476438770611cb8a661679f0.jpg\"><img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210357\/3db246e6476438770611cb8a661679f0.jpg\" alt=\"Diagram of Sabotage\" \/><\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch13_s01_s04\" class=\"section\">\r\n<h2 class=\"title editable block\">Espionage<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s04_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Espionage<\/a><\/span>, also known as \u201cspying,\u201d is criminalized at <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sup_01_18_10_I_20_37.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a0792<\/a> et seq. Originally part of one of the early versions of the Sedition Act of 1918, the crime of espionage has a colorful history and many interesting criminal prosecutions similar to criminal sabotage. Federal espionage statutes criminalize various acts, depending on whether the conduct occurs during <em class=\"emphasis\">peace<\/em> or during <em class=\"emphasis\">war<\/em>. During times of peace, it is criminal espionage to gather, transmit, or attempt to gather or transmit defense information (<strong class=\"emphasis bold\">criminal act<\/strong>) with <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong>, or with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> that it will be used to damage the United States or assist any foreign nation (18 U.S.C. \u00a7 793, 2011). During times of war, it is criminal espionage to collect, record, publish, or communicate information about military activities or to attempt any of the foregoing (<strong class=\"emphasis bold\">criminal act<\/strong>) with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> that the information will be transmitted to the enemy (18 U.S.C. \u00a7 794(b), 2011). Espionage is graded as a <strong class=\"emphasis bold\">felony<\/strong>, with potential sentencing of life in prison or the death penalty (18 U.S.C. \u00a7 792 et seq., 2011).<\/p>\r\n<p id=\"storm_1.0-ch13_s01_s04_p02\" class=\"para editable block\">Some interesting criminal espionage cases are the <a class=\"link\" href=\"http:\/\/listverse.com\/2007\/08\/24\/top-10-famous-spies\/\" target=\"_blank\" rel=\"noopener\">Rosenberg case<\/a>, where a married couple conspired to pass nuclear secrets to the Soviets and were later executed pursuant to the death penalty, the <a class=\"link\" href=\"http:\/\/articles.cnn.com\/2001-08-24\/us\/spy.timeline_1_trofimoff-hanssen-military-secrets?_s=PM:US\" target=\"_blank\" rel=\"noopener\">Hanssen case<\/a>, where an FBI agent sold state secrets to Moscow for $1.4 million in cash and diamonds, and the <a class=\"link\" href=\"http:\/\/abcnews.go.com\/WNT\/story?id=1187030&amp;page=1\" target=\"_blank\" rel=\"noopener\">Aragoncillo case<\/a>, where a White House employee stole intelligence documents from White House computers and e-mailed them to the Philippines.<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s04_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Espionage<\/h2>\r\n<p id=\"storm_1.0-ch13_s01_s04_s01_p01\" class=\"para editable block\">Review the example given in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/13-1-crimes-involving-national-security\/#storm_1.0-ch13_s01_s03_s01\">Section 13 \"Example of Sabotage\"<\/a> with Mo and his computer hacking. Change the example so that before Mo damages the US Department of Defense computer system, he copies some information from different top-secret sites and sends them to operatives in an enemy nation with this message: \u201cI have stolen this information directly from the US Department of Defense. I have also disabled their computer system, which will probably take some time to repair. Now is an excellent time to attack the United States.\u201d He thereafter severely damages the computer system. In this example, Mo has most likely committed both sabotage and espionage. As stated in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/13-1-crimes-involving-national-security\/#storm_1.0-ch13_s01_s03_s01\">Section 13 \"Example of Sabotage\"<\/a>, Mo probably committed sabotage when he <strong class=\"emphasis bold\">damaged<\/strong> national defense material with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to interfere with the nation\u2019s security and defense. When Mo copied top-secret information and sent it to an enemy nation, along with informing the nation that the US Department of Defense computer system was disabled, he <strong class=\"emphasis bold\">gathered<\/strong> and <strong class=\"emphasis bold\">transmitted<\/strong> information with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> that it be used to injure the United States. Thus Mo has probably committed both sabotage and espionage and may be subject to prosecution for and conviction of these offenses.<\/p>\r\n\r\n<div id=\"storm_1.0-ch13_s01_s04_s01_n01\" class=\"video editable block\">\r\n<h3 class=\"title\">Video of the President Informing the Nation bin Laden Is Dead<\/h3>\r\n<p class=\"simpara\">President Obama on the Death of Osama bin Laden<\/p>\r\n<p id=\"storm_1.0-ch13_s01_s04_s01_p03\" class=\"para\">President Obama\u2019s speech explaining Osama bin Laden\u2019s death is shown in this video:<\/p>\r\n<a class=\"replaced-iframe\" href=\"http:\/\/www.youtube.com\/v\/ZNYmK19-d0U\">(click to see video)<\/a>\r\n\r\n<\/div>\r\n<div id=\"storm_1.0-ch13_s01_s04_s01_t01\" class=\"table block\">\r\n<p class=\"title\"><span class=\"title-prefix\">Table 13.1<\/span> Comparing Treason, Sedition, Sabotage, and Espionage<\/p>\r\n\r\n<table style=\"border-spacing: 0px\" cellpadding=\"0\">\r\n<thead>\r\n<tr>\r\n<th>Crime<\/th>\r\n<th>Criminal Act or Harm<\/th>\r\n<th>Criminal Intent<\/th>\r\n<th>Attendant Circumstance(s)<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td>Treason*<\/td>\r\n<td>Levy war, or give aid and comfort to enemies<\/td>\r\n<td>Most likely, general intent or knowingly to levy war, specific intent or purposely to betray the United States with aid and comfort<\/td>\r\n<td><\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Sedition<\/td>\r\n<td>Advocating or printing matter that advocates the forceful or violent overthrow of the US government<\/td>\r\n<td>General intent or knowingly to advocate, specific intent or purposely when printing matter that advocates the forceful or violent overthrow of the US government<\/td>\r\n<td><\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Sabotage<\/td>\r\n<td>Varies: either destroying, damaging, or producing defective property that impedes US defense capabilities<\/td>\r\n<td>Varies: specific intent or purposely, general intent or knowingly or negligently<\/td>\r\n<td>Certain conduct must take place during war or a national emergency<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Espionage<\/td>\r\n<td>Spying<\/td>\r\n<td>Varies: either general intent or knowingly, or specific intent or purposely that information will be transmitted to the enemy<\/td>\r\n<td>Certain conduct must take place during war<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<tfoot>\r\n<tr>\r\n<th colspan=\"4\">*Includes the evidentiary requirement of the testimony of two witnesses or the defendant\u2019s confession in open court<\/th>\r\n<\/tr>\r\n<\/tfoot>\r\n<\/table>\r\n<\/div>\r\n<div id=\"storm_1.0-ch13_s01_s04_s01_n02\" class=\"bcc-box bcc-success\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"storm_1.0-ch13_s01_s04_s01_l01\" class=\"itemizedlist\">\r\n \t<li>The criminal act element required for treason is levying war against the United States or adhering to the enemy by giving the enemy aid and comfort. The criminal intent element required for treason is most likely the general intent or knowingly to commit an act of levying war, or the specific intent or purposely to betray the United States by giving aid and comfort to enemies. Treason also has the constitutional evidentiary requirement that two witnesses corroborate the acts of treason or that the defendant confess in open court. Treason is graded as a felony.<\/li>\r\n \t<li>The criminal act element required for sedition is advocating, aiding, teaching, organizing, or printing, publishing, or circulating written matter that advocates, aids, or teaches the overthrow of the US government by force or violence. The criminal intent element required for sedition is the general intent or knowingly to advocate, aid, teach, or organize or the specific intent or purposely to print, publish, or circulate written matter that advocates, aids, or teaches the forceful or violent government overthrow. Sedition is graded as a felony.<\/li>\r\n \t<li>The criminal act and harm elements required for sabotage vary but are generally damaging, destroying, or producing defective property that impedes the US national defense or ability to participate in or prepare for war. The criminal intent element required for sabotage also varies but is either specific intent or purposely, general intent or knowingly, or negligent intent, depending on the criminal act. Some forms of sabotage require the attendant circumstance that the conduct occurs during wartime or a national emergency. Sabotage is graded as a felony.<\/li>\r\n \t<li>Espionage is spying (criminal act) with general intent or knowingly, or the specific intent or purposely to transmit information to another nation. Some forms of espionage require the attendant circumstance that the conduct occurs during wartime. Espionage is graded as a felony.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div id=\"storm_1.0-ch13_s01_s04_s01_n03\" class=\"bcc-box bcc-info\">\r\n<h3 class=\"title\">Exercises<\/h3>\r\n<p id=\"storm_1.0-ch13_s01_s04_s01_p02\" class=\"para\">Answer the following questions. Check your answers using the answer key at the end of the chapter.<\/p>\r\n\r\n<ol id=\"storm_1.0-ch13_s01_s04_s01_l02\" class=\"orderedlist\">\r\n \t<li>Stephanie stands in front of a mosque and advocates for the overthrow of the US government. Is Stephanie committing <strong class=\"emphasis bold\">sedition<\/strong>? Why or why not?<\/li>\r\n \t<li>Read <em class=\"emphasis\">U.S. v. Kabat<\/em>, 797 Fed.2d 580 (1986). Did the US Court of Appeals for the Eighth Circuit uphold the defendants\u2019 convictions for sabotage when, as nuclear protestors, they intentionally damaged US missiles? Why or why not? The case is available at this link: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=5276967647790252481&amp;q=sabotage+%222155%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=1992\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=5276967647790252481&amp;q= sabotage+%222155%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=1992<\/a>.<\/li>\r\n \t<li>Read <em class=\"emphasis\">In re Squillacote<\/em>, 790 A.2d 514 (2002). Did the District of Columbia Court of Appeals hold that conspiracy to commit espionage and attempted espionage are crimes of <strong class=\"emphasis bold\">moral turpitude<\/strong> that could support the defendant\u2019s disbarment? The case is available at this link: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=8408409521873710428&amp;q=espionage+%22793%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=8408409521873710428&amp;q= espionage+%22793%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<h2>References<\/h2>\r\n<em class=\"emphasis\">Cramer v. U.S.<\/em>, 325 U.S. 1 (1945), <a class=\"link\" href=\"http:\/\/supreme.justia.com\/us\/325\/1\" target=\"_blank\" rel=\"noopener\">http:\/\/supreme.justia.com\/us\/325\/1<\/a>.\r\n\r\n<em class=\"emphasis\">Pennsylvania v. Nelson<\/em>, accessed May 1, 2011, 350 U.S. 497 (1956), <a class=\"link\" href=\"http:\/\/supreme.justia.com\/us\/350\/497\/case.html\" target=\"_blank\" rel=\"noopener\">http:\/\/supreme.justia.com\/us\/350\/497\/case.html<\/a>.\r\n\r\nRCW \u00a7\u00a09.05.060, accessed May 1, 2011, <a class=\"link\" href=\"http:\/\/apps.leg.wa.gov\/rcw\/default.aspx?cite=9.05.060\" target=\"_blank\" rel=\"noopener\">http:\/\/apps.leg.wa.gov\/rcw\/default.aspx?cite=9.05.060<\/a>.\r\n\r\n<em class=\"emphasis\">Yates v. U.S.<\/em>, 354 U.S. 298, 318 (1957), accessed April 30, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=14369441513839511604&amp;q=Yates+v.+U.S.&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=14369441513839511604&amp;q= Yates+v.+U.S.&amp;hl=en&amp;as_sdt=2,5<\/a>.\r\n\r\n18 U.S.C. \u00a7\u00a0792 et seq., accessed May 1, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sup_01_18_10_I_20_37.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sup_01_18_10_I_20_37.html<\/a>.\r\n\r\n18 U.S.C. \u00a7\u00a0793, accessed May 1, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00000793----000-.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00000793----000-.html<\/a>.\r\n\r\n18 U.S.C. \u00a7\u00a0794(b), accessed May 1, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00000794----000-.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00000794----000-.html<\/a>.\r\n\r\n18 U.S.C. \u00a7\u00a02381, accessed April 29, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002381----000-.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002381----000-.html<\/a>.\r\n\r\n18 U.S.C. \u00a7\u00a02385, accessed April 30, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002385----000-.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002385----000-.html<\/a>.\r\n\r\n51 Pa. Cons. Stat. Ann. \u00a7\u00a06018, accessed April 30, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/pennsylvania\/military-affairs\/00.060.018.000.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/pennsylvania\/military-affairs\/00.060.018.000.html<\/a>.","rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1653\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3630\/2017\/09\/19163550\/Bribery.png\" alt=\"\" width=\"200\" height=\"144\" \/><\/p>\n<div class=\"textbox\">Bribery is the act of giving or receiving something of value in exchange for some kind of influence or action in return, that the recipient would otherwise not alter. <a class=\"q ruhjFe NJLBac fl\" href=\"https:\/\/en.wikipedia.org\/wiki\/Bribery\">Wikipedia<\/a><\/div>\n<p>&nbsp;<\/p>\n<div>\n<div class=\"informalfigure medium block\"><\/div>\n<\/div>\n<div id=\"storm_1.0-ch13_ep01\" class=\"epigraph block\">\n<p id=\"storm_1.0-ch13_p01\" class=\"para\"><em>Bribery, of course, connotes a voluntary offer to obtain gain, where extortion connotes some form of coercion.<\/em><\/p>\n<p class=\"attribution\">\u00a0\u00a0\u00a0&#8212;<a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=189694239263939940&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">U.S. v. Adcock<\/em><\/a>, cited in <a class=\"xref\" href=\"http:\/\/open.lib.umn.edu\/criminallaw\/chapter\/13-3-perjury-bribery-and-obstruction-of-justice\/#storm_1.0-ch13_s03_s02\">Section 13.3.2 &#8220;Bribery Elements&#8221;<\/a><\/p>\n<\/div>\n<div id=\"storm_1.0-ch13_s01_n01\" class=\"bcc-box bcc-highlight\">\n<h3 class=\"title\">Learning Objectives<\/h3>\n<ol id=\"storm_1.0-ch13_s01_l01\" class=\"orderedlist\">\n<li>Define the elements of treason, and analyze treason\u2019s evidentiary requirements and grading.<\/li>\n<li>Define the elements of sedition, and analyze sedition grading.<\/li>\n<li>Define the elements of various forms of sabotage, and analyze sabotage grading.<\/li>\n<li>Define the elements of espionage, and analyze espionage grading.<\/li>\n<\/ol>\n<\/div>\n<p id=\"storm_1.0-ch13_s01_p01\" class=\"para editable block\">The government is tasked with keeping the nation safe from domestic and international attacks on the government and citizens. National security is an issue that affects the entire country, so most of the regulation in this area is <em class=\"emphasis\">federal<\/em>, rather than <em class=\"emphasis\">state<\/em> (Pennsylvania v. Nelson, 2011). Criminal statutes protecting the government can encroach on the individual freedom to protest government action and can also affect privacy interests, which subjects them to enhanced constitutional scrutiny similar to the crimes against the public reviewed in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/12-1-quality-of-life-crimes\">Chapter 12 &#8220;Crimes against the Public&#8221;<\/a>. This section explores crimes against the nation, such as treason, sedition, sabotage, and espionage. <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/13-2-crimes-involving-terrorism\/#storm_1.0-ch13_s02\">Section 13.2 &#8220;Crimes Involving Terrorism&#8221;<\/a> examines terrorism and the USA PATRIOT Act. The last section of this chapter discusses other crimes against the government that are primarily <em class=\"emphasis\">state<\/em> regulated, such as perjury, bribery, and obstruction of justice.<\/p>\n<div id=\"storm_1.0-ch13_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">Treason<\/h2>\n<p id=\"storm_1.0-ch13_s01_s01_p01\" class=\"para editable block\">Article III \u00a7\u00a03 of the US Constitution defines <span class=\"margin_term\"><a class=\"glossterm\">treason<\/a><\/span> and specifies the evidentiary requirements for any treason trial. The founding fathers wanted to ensure that the government would not charge an individual with treason without significant and reliable proof. Treason was punishable by death in England, so it was a constant threat to anyone who disagreed with the ruling party. Although the treason clause in the Constitution is modeled after the early English law defining treason, it omits a section that criminalized \u201cimagining the death of the King\u201d and also limits Congress\u2019s authority to extend or expand the crime of treason or to lighten the evidentiary requirements.<\/p>\n<p id=\"storm_1.0-ch13_s01_s01_p02\" class=\"para editable block\">The pertinent section of the Constitution states, \u201cTreason against the United States shall consist only in levying War against them, or, in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.\u201d<\/p>\n<div id=\"storm_1.0-ch13_s01_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">Treason Elements and Grading<\/h2>\n<p id=\"storm_1.0-ch13_s01_s01_s01_p01\" class=\"para editable block\">The <strong class=\"emphasis bold\">criminal act<\/strong> element required for treason is levying war against the United States <strong class=\"emphasis bold\">or<\/strong> adhering to the enemy by giving aid and comfort (18 U.S.C. \u00a7 2381, 2011). Prosecutions for treason are practically nonexistent, so case law in this area is dated, yet still constitutes viable precedent. In <a class=\"link\" href=\"http:\/\/law2.umkc.edu\/faculty\/projects\/ftrials\/burr\/marshallopinion.html\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">U.S. v. Burr<\/em><\/a>, 25 F Cas 55 (1807), a case involving then-vice president Aaron Burr\u2019s prosecution for treason, the US Supreme Court held that levying war means an actual assembling of men, not a <strong class=\"emphasis bold\">conspiracy<\/strong> to levy war, nor a mere <em class=\"emphasis\">enlistment<\/em> of men. In <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=2403758675000151464&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">Haupt v. U.S.<\/em><\/a>, 330 U.S. 631 (1947), the US Supreme Court held that the defendant\u2019s acts of harboring and sheltering his son in his home, helping him to purchase an automobile, and obtain employment constituted providing aid and comfort to the enemy because the defendant\u2019s son was a spy and saboteur. The criminal intent element required for treason is most likely the <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong> to commit an act of levying war or the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to betray the United States by giving aid and comfort to enemies (Cramer v. U.S., 1945). The <em class=\"emphasis\">Constitution<\/em> specifies the evidentiary requirements that two witnesses testify to an overt act of treason or that the defendant confess in open court, although this is not set forth in the federal treason statute (18 U.S.C., 2011). As stated in <a class=\"link\" href=\"http:\/\/supreme.justia.com\/us\/325\/1\/\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">Cramer v. U.S.<\/em><\/a>, 325 U.S. 1, 34, 35 (1945), \u201cEvery act, movement, deed, and word of the defendant charged to constitute treason must be supported by the testimony of two witnesses,\u201d and it is not enough that the elements of treason can be <em class=\"emphasis\">inferred<\/em> from the witness statements. Treason is <strong class=\"emphasis bold\">graded<\/strong> as a felony that can merit the death penalty or prohibit the defendant from ever holding federal office (18 U.S.C. \u00a7 2381, 2011).<\/p>\n<div id=\"storm_1.0-ch13_s01_s01_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of a Case Lacking Treason Elements and Evidentiary Requirements<\/h2>\n<p id=\"storm_1.0-ch13_s01_s01_s01_s01_p01\" class=\"para editable block\">Benedict is identified as a person of interest in a treason case. A government agent posing as an enemy spy invites Benedict to dinner, and they discuss the decline of the United States and whether or not they should \u201cdo something about it.\u201d At the conclusion of the dinner, Benedict picks up the tab. Thereafter, Benedict is arrested for treason and refuses to incriminate himself by responding to law enforcement interrogation. It is unlikely that Benedict will be convicted of treason in this case. Benedict paid for the government agent\u2019s dinner, which could constitute providing <strong class=\"emphasis bold\">aid<\/strong> to the enemy. However, Benedict indicated a hesitancy to take further action, which does not satisfy the requirement that he act with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to <em class=\"emphasis\">betray<\/em> the United States. In addition, only the government agent can testify as to Benedict\u2019s act of paying for a meal because Benedict is asserting his right to remain silent. Therefore, the constitutional requirement that two witnesses testify about the overt act charged as treason is not satisfied. The intent element and evidentiary requirement for treason are lacking, so Benedict probably will not be subject to prosecution for and conviction of this offense.<\/p>\n<div id=\"storm_1.0-ch13_s01_s01_s01_s01_f01\" class=\"figure large editable block\" style=\"max-width: 600px;margin: auto\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 13.1<\/span> Crack the Code<\/p>\n<p><a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/a3c7cd3ea6fe8aa146e5a9ae5e81e721.jpg\"><img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210348\/a3c7cd3ea6fe8aa146e5a9ae5e81e721.jpg\" alt=\"Crack the Code\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch13_s01_s02\" class=\"section\">\n<h2 class=\"title editable block\">Sedition<\/h2>\n<p id=\"storm_1.0-ch13_s01_s02_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Sedition<\/a><\/span> criminalizes the incitement of insurrection or revolution by seditious speech or writings and, as such, is subject to the restrictions set forth in the First Amendment. The first federal law prohibiting sedition was the Sedition Act enacted in 1798 and repealed by Thomas Jefferson after his election as president. The current federal statute criminalizing sedition was originally enacted in 1940 and is codified at <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002385----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02385<\/a>. Conspiracy to commit sedition is codified at <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002384----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02384<\/a>. Many states have similar provisions (51 Pa. Cons. Stat. Ann. \u00a7 6018, 2011). Like treason, sedition is rarely prosecuted.<\/p>\n<p id=\"storm_1.0-ch13_s01_s02_p02\" class=\"para editable block\">The <strong class=\"emphasis bold\">criminal act<\/strong> element required for sedition is either advocating, aiding, teaching, organizing or printing, publishing, or circulating written matter that advocates, aids, or teaches the overthrow of the US government or any state, district, or territory thereof by <em class=\"emphasis\">force<\/em> or <em class=\"emphasis\">violence<\/em> (18 U.S.C. \u00a7 2385, 2011). The criminal intent element required for sedition is the <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong> to advocate, aid, teach, or organize, or the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to print, publish, or circulate written matter that advocates, aids, or teaches the violent government overthrow. In <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=14369441513839511604&amp;q=Yates+v.+U.S.&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\"><em class=\"emphasis\">Yates v. U.S.<\/em><\/a>, 354 U.S. 298 (1957), the US Supreme Court held that only advocacy directed at <em class=\"emphasis\">promoting unlawful action<\/em> could be constitutionally prohibited. Advocacy of an \u201cabstract doctrine\u201d was protected by the First Amendment as free speech (Yates v. U.S., 2011). Sedition is <strong class=\"emphasis bold\">graded<\/strong> as a felony that can prohibit the defendant from obtaining employment with the US government for a minimum of five years postconviction (18 U.S.C. \u00a7 2385, 2011).<\/p>\n<div id=\"storm_1.0-ch13_s01_s02_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Sedition<\/h2>\n<p id=\"storm_1.0-ch13_s01_s02_s01_p01\" class=\"para editable block\">Mo, a disgruntled immigrant who has been denied citizenship, decides he wants to overthrow the US government and supplant it with a new government that will grant the citizenship privileges he desires. Mo prints up leaflets advocating the overthrow of the government by placing a series of bombs in strategic and specifically named places and passes them out every Saturday in front of varied places known for ethnic diversity throughout the city. Mo has most likely committed sedition in this example. Mo <strong class=\"emphasis bold\">printed written matter<\/strong> advocating the overthrow of the US government by <em class=\"emphasis\">unlawful<\/em> action, using <em class=\"emphasis\">force<\/em> and <em class=\"emphasis\">violence<\/em>. Mo\u2019s intent was to get rid of the current government so that he could gain citizenship, which is <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong>. Thus Mo\u2019s conduct probably constitutes sedition, and he may be subject to prosecution for and conviction of several counts of this offense.<\/p>\n<div id=\"storm_1.0-ch13_s01_s02_s01_f01\" class=\"figure large editable block\" style=\"max-width: 600px;margin: auto\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 13.2<\/span> Diagram of Sedition<\/p>\n<p><a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/a008072755c93ca47791cf30652bbd79.jpg\"> <img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210351\/a008072755c93ca47791cf30652bbd79.jpg\" alt=\"Diagram of Sedition\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch13_s01_s03\" class=\"section\">\n<h2 class=\"title editable block\">Sabotage<\/h2>\n<p id=\"storm_1.0-ch13_s01_s03_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Sabotage<\/a><\/span> is criminalized at <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sup_01_18_10_I_20_105.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02151<\/a> et seq., which includes several different forms of this offense. Many states have similar provisions (RCW \u00a7 9.05.060, 2011). In general, sabotage is destroying, damaging, or defectively producing (<strong class=\"emphasis bold\">criminal act<\/strong> and <strong class=\"emphasis bold\">harm<\/strong>) property with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong>, <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong>, or <strong class=\"emphasis bold\">negligently<\/strong> to impede the nation\u2019s ability to prepare for or participate in war and national defense and is detailed in the following United States Codes:<\/p>\n<ul id=\"storm_1.0-ch13_s01_s03_l01\" class=\"itemizedlist editable block\">\n<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002152----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02152<\/a> focuses on destroying or damaging harbor-defense property.<\/li>\n<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002153----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02153<\/a> focuses on destroying or damaging war material, premises, or utilities.<\/li>\n<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002154----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02154<\/a> focuses on producing defective war materials, premises, or utilities.<\/li>\n<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002155----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02155<\/a> focuses on destroying or damaging national defense material, premises, or utilities.<\/li>\n<li><a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002156----000-.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a02156<\/a> focuses on producing defective national defense material, premises, or utilities.<\/li>\n<\/ul>\n<p id=\"storm_1.0-ch13_s01_s03_p02\" class=\"para editable block\">Both 18 U.S.C. \u00a7\u00a7\u00a02153 and 2154 have the <strong class=\"emphasis bold\">attendant circumstance<\/strong> that the conduct occur during <em class=\"emphasis\">war<\/em> or a <em class=\"emphasis\">national emergency<\/em>. All the sabotage statutes <strong class=\"emphasis bold\">grade<\/strong> sabotage as a felony, with sentences ranging from five to thirty years\u2019 incarceration in federal prison.<\/p>\n<p id=\"storm_1.0-ch13_s01_s03_p03\" class=\"para editable block\">Sabotage is prosecuted more often than treason and sedition, and there have been some extremely interesting criminal sabotage cases, including <a class=\"link\" href=\"http:\/\/query.nytimes.com\/mem\/archive-free\/pdf?res=F30E17F93C5D147A93C1A81783D85F4C8185F9\" target=\"_blank\" rel=\"noopener\">sabotage indictments<\/a> against a corporation manufacturing defective raincoats for the armed forces during wartime, a <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=11613341251816441831&amp;q=%2218+U.S.C.+2153%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">sabotage trial<\/a> for the burning of an ROTC building on the Washington University campus after the Kent State University riots, a <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=7553337375799284681&amp;q=%2218+U.S.C.+2153%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">sabotage trial<\/a> for defendants who stole copper wire from a railroad track that was used to ship war materials, and the <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=17683910058222877377&amp;q=%2218+U.S.C.+2155%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">sabotage indictment<\/a> of Osama bin Laden for <span class=\"margin_term\"><a class=\"glossterm\">extraterritorial<\/a><\/span> (outside the United States) activity.<\/p>\n<div id=\"storm_1.0-ch13_s01_s03_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Sabotage<\/h2>\n<p id=\"storm_1.0-ch13_s01_s03_s01_p01\" class=\"para editable block\">Review the example in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/13-1-crimes-involving-national-security\/#storm_1.0-ch13_s01_s02_s01\">Section 13 &#8220;Example of Sedition&#8221;<\/a> with Mo. Add to this example and imagine that Mo gets no response to his fliers and becomes enraged. He decides to get back at the United States for not allowing him to become a US citizen by harming its national security and exposing it to attack by enemy forces. He thereafter hacks into the computer system used by the US Department of Defense and damages it so that it is out of commission for two weeks. Mo has most likely committed the federal crime of <strong class=\"emphasis bold\">sabotage<\/strong>. Mo <strong class=\"emphasis bold\">damaged<\/strong> national defense material with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to interfere with the nation\u2019s security and defense, which is prohibited under 18 U.S.C. \u00a7\u00a02155, whether or not it is wartime or during a national emergency. Thus Mo may be subject to prosecution for and conviction of this offense and could face many years of incarceration for his conduct.<\/p>\n<div id=\"storm_1.0-ch13_s01_s03_s01_f01\" class=\"figure large editable block\" style=\"max-width: 600px;margin: auto\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 13.3<\/span> Diagram of Sabotage<\/p>\n<p><a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/3db246e6476438770611cb8a661679f0.jpg\"><img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210357\/3db246e6476438770611cb8a661679f0.jpg\" alt=\"Diagram of Sabotage\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch13_s01_s04\" class=\"section\">\n<h2 class=\"title editable block\">Espionage<\/h2>\n<p id=\"storm_1.0-ch13_s01_s04_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Espionage<\/a><\/span>, also known as \u201cspying,\u201d is criminalized at <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sup_01_18_10_I_20_37.html\" target=\"_blank\" rel=\"noopener\">18 U.S.C. \u00a7\u00a0792<\/a> et seq. Originally part of one of the early versions of the Sedition Act of 1918, the crime of espionage has a colorful history and many interesting criminal prosecutions similar to criminal sabotage. Federal espionage statutes criminalize various acts, depending on whether the conduct occurs during <em class=\"emphasis\">peace<\/em> or during <em class=\"emphasis\">war<\/em>. During times of peace, it is criminal espionage to gather, transmit, or attempt to gather or transmit defense information (<strong class=\"emphasis bold\">criminal act<\/strong>) with <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong>, or with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> that it will be used to damage the United States or assist any foreign nation (18 U.S.C. \u00a7 793, 2011). During times of war, it is criminal espionage to collect, record, publish, or communicate information about military activities or to attempt any of the foregoing (<strong class=\"emphasis bold\">criminal act<\/strong>) with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> that the information will be transmitted to the enemy (18 U.S.C. \u00a7 794(b), 2011). Espionage is graded as a <strong class=\"emphasis bold\">felony<\/strong>, with potential sentencing of life in prison or the death penalty (18 U.S.C. \u00a7 792 et seq., 2011).<\/p>\n<p id=\"storm_1.0-ch13_s01_s04_p02\" class=\"para editable block\">Some interesting criminal espionage cases are the <a class=\"link\" href=\"http:\/\/listverse.com\/2007\/08\/24\/top-10-famous-spies\/\" target=\"_blank\" rel=\"noopener\">Rosenberg case<\/a>, where a married couple conspired to pass nuclear secrets to the Soviets and were later executed pursuant to the death penalty, the <a class=\"link\" href=\"http:\/\/articles.cnn.com\/2001-08-24\/us\/spy.timeline_1_trofimoff-hanssen-military-secrets?_s=PM:US\" target=\"_blank\" rel=\"noopener\">Hanssen case<\/a>, where an FBI agent sold state secrets to Moscow for $1.4 million in cash and diamonds, and the <a class=\"link\" href=\"http:\/\/abcnews.go.com\/WNT\/story?id=1187030&amp;page=1\" target=\"_blank\" rel=\"noopener\">Aragoncillo case<\/a>, where a White House employee stole intelligence documents from White House computers and e-mailed them to the Philippines.<\/p>\n<div id=\"storm_1.0-ch13_s01_s04_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Espionage<\/h2>\n<p id=\"storm_1.0-ch13_s01_s04_s01_p01\" class=\"para editable block\">Review the example given in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/13-1-crimes-involving-national-security\/#storm_1.0-ch13_s01_s03_s01\">Section 13 &#8220;Example of Sabotage&#8221;<\/a> with Mo and his computer hacking. Change the example so that before Mo damages the US Department of Defense computer system, he copies some information from different top-secret sites and sends them to operatives in an enemy nation with this message: \u201cI have stolen this information directly from the US Department of Defense. I have also disabled their computer system, which will probably take some time to repair. Now is an excellent time to attack the United States.\u201d He thereafter severely damages the computer system. In this example, Mo has most likely committed both sabotage and espionage. As stated in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/13-1-crimes-involving-national-security\/#storm_1.0-ch13_s01_s03_s01\">Section 13 &#8220;Example of Sabotage&#8221;<\/a>, Mo probably committed sabotage when he <strong class=\"emphasis bold\">damaged<\/strong> national defense material with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to interfere with the nation\u2019s security and defense. When Mo copied top-secret information and sent it to an enemy nation, along with informing the nation that the US Department of Defense computer system was disabled, he <strong class=\"emphasis bold\">gathered<\/strong> and <strong class=\"emphasis bold\">transmitted<\/strong> information with the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> that it be used to injure the United States. Thus Mo has probably committed both sabotage and espionage and may be subject to prosecution for and conviction of these offenses.<\/p>\n<div id=\"storm_1.0-ch13_s01_s04_s01_n01\" class=\"video editable block\">\n<h3 class=\"title\">Video of the President Informing the Nation bin Laden Is Dead<\/h3>\n<p class=\"simpara\">President Obama on the Death of Osama bin Laden<\/p>\n<p id=\"storm_1.0-ch13_s01_s04_s01_p03\" class=\"para\">President Obama\u2019s speech explaining Osama bin Laden\u2019s death is shown in this video:<\/p>\n<p><a class=\"replaced-iframe\" href=\"http:\/\/www.youtube.com\/v\/ZNYmK19-d0U\">(click to see video)<\/a><\/p>\n<\/div>\n<div id=\"storm_1.0-ch13_s01_s04_s01_t01\" class=\"table block\">\n<p class=\"title\"><span class=\"title-prefix\">Table 13.1<\/span> Comparing Treason, Sedition, Sabotage, and Espionage<\/p>\n<table style=\"border-spacing: 0px\" cellpadding=\"0\">\n<thead>\n<tr>\n<th>Crime<\/th>\n<th>Criminal Act or Harm<\/th>\n<th>Criminal Intent<\/th>\n<th>Attendant Circumstance(s)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Treason*<\/td>\n<td>Levy war, or give aid and comfort to enemies<\/td>\n<td>Most likely, general intent or knowingly to levy war, specific intent or purposely to betray the United States with aid and comfort<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Sedition<\/td>\n<td>Advocating or printing matter that advocates the forceful or violent overthrow of the US government<\/td>\n<td>General intent or knowingly to advocate, specific intent or purposely when printing matter that advocates the forceful or violent overthrow of the US government<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Sabotage<\/td>\n<td>Varies: either destroying, damaging, or producing defective property that impedes US defense capabilities<\/td>\n<td>Varies: specific intent or purposely, general intent or knowingly or negligently<\/td>\n<td>Certain conduct must take place during war or a national emergency<\/td>\n<\/tr>\n<tr>\n<td>Espionage<\/td>\n<td>Spying<\/td>\n<td>Varies: either general intent or knowingly, or specific intent or purposely that information will be transmitted to the enemy<\/td>\n<td>Certain conduct must take place during war<\/td>\n<\/tr>\n<\/tbody>\n<tfoot>\n<tr>\n<th colspan=\"4\">*Includes the evidentiary requirement of the testimony of two witnesses or the defendant\u2019s confession in open court<\/th>\n<\/tr>\n<\/tfoot>\n<\/table>\n<\/div>\n<div id=\"storm_1.0-ch13_s01_s04_s01_n02\" class=\"bcc-box bcc-success\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"storm_1.0-ch13_s01_s04_s01_l01\" class=\"itemizedlist\">\n<li>The criminal act element required for treason is levying war against the United States or adhering to the enemy by giving the enemy aid and comfort. The criminal intent element required for treason is most likely the general intent or knowingly to commit an act of levying war, or the specific intent or purposely to betray the United States by giving aid and comfort to enemies. Treason also has the constitutional evidentiary requirement that two witnesses corroborate the acts of treason or that the defendant confess in open court. Treason is graded as a felony.<\/li>\n<li>The criminal act element required for sedition is advocating, aiding, teaching, organizing, or printing, publishing, or circulating written matter that advocates, aids, or teaches the overthrow of the US government by force or violence. The criminal intent element required for sedition is the general intent or knowingly to advocate, aid, teach, or organize or the specific intent or purposely to print, publish, or circulate written matter that advocates, aids, or teaches the forceful or violent government overthrow. Sedition is graded as a felony.<\/li>\n<li>The criminal act and harm elements required for sabotage vary but are generally damaging, destroying, or producing defective property that impedes the US national defense or ability to participate in or prepare for war. The criminal intent element required for sabotage also varies but is either specific intent or purposely, general intent or knowingly, or negligent intent, depending on the criminal act. Some forms of sabotage require the attendant circumstance that the conduct occurs during wartime or a national emergency. Sabotage is graded as a felony.<\/li>\n<li>Espionage is spying (criminal act) with general intent or knowingly, or the specific intent or purposely to transmit information to another nation. Some forms of espionage require the attendant circumstance that the conduct occurs during wartime. Espionage is graded as a felony.<\/li>\n<\/ul>\n<\/div>\n<div id=\"storm_1.0-ch13_s01_s04_s01_n03\" class=\"bcc-box bcc-info\">\n<h3 class=\"title\">Exercises<\/h3>\n<p id=\"storm_1.0-ch13_s01_s04_s01_p02\" class=\"para\">Answer the following questions. Check your answers using the answer key at the end of the chapter.<\/p>\n<ol id=\"storm_1.0-ch13_s01_s04_s01_l02\" class=\"orderedlist\">\n<li>Stephanie stands in front of a mosque and advocates for the overthrow of the US government. Is Stephanie committing <strong class=\"emphasis bold\">sedition<\/strong>? Why or why not?<\/li>\n<li>Read <em class=\"emphasis\">U.S. v. Kabat<\/em>, 797 Fed.2d 580 (1986). Did the US Court of Appeals for the Eighth Circuit uphold the defendants\u2019 convictions for sabotage when, as nuclear protestors, they intentionally damaged US missiles? Why or why not? The case is available at this link: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=5276967647790252481&amp;q=sabotage+%222155%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=1992\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=5276967647790252481&amp;q= sabotage+%222155%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=1992<\/a>.<\/li>\n<li>Read <em class=\"emphasis\">In re Squillacote<\/em>, 790 A.2d 514 (2002). Did the District of Columbia Court of Appeals hold that conspiracy to commit espionage and attempted espionage are crimes of <strong class=\"emphasis bold\">moral turpitude<\/strong> that could support the defendant\u2019s disbarment? The case is available at this link: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=8408409521873710428&amp;q=espionage+%22793%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=8408409521873710428&amp;q= espionage+%22793%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<h2>References<\/h2>\n<p><em class=\"emphasis\">Cramer v. U.S.<\/em>, 325 U.S. 1 (1945), <a class=\"link\" href=\"http:\/\/supreme.justia.com\/us\/325\/1\" target=\"_blank\" rel=\"noopener\">http:\/\/supreme.justia.com\/us\/325\/1<\/a>.<\/p>\n<p><em class=\"emphasis\">Pennsylvania v. Nelson<\/em>, accessed May 1, 2011, 350 U.S. 497 (1956), <a class=\"link\" href=\"http:\/\/supreme.justia.com\/us\/350\/497\/case.html\" target=\"_blank\" rel=\"noopener\">http:\/\/supreme.justia.com\/us\/350\/497\/case.html<\/a>.<\/p>\n<p>RCW \u00a7\u00a09.05.060, accessed May 1, 2011, <a class=\"link\" href=\"http:\/\/apps.leg.wa.gov\/rcw\/default.aspx?cite=9.05.060\" target=\"_blank\" rel=\"noopener\">http:\/\/apps.leg.wa.gov\/rcw\/default.aspx?cite=9.05.060<\/a>.<\/p>\n<p><em class=\"emphasis\">Yates v. U.S.<\/em>, 354 U.S. 298, 318 (1957), accessed April 30, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=14369441513839511604&amp;q=Yates+v.+U.S.&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=14369441513839511604&amp;q= Yates+v.+U.S.&amp;hl=en&amp;as_sdt=2,5<\/a>.<\/p>\n<p>18 U.S.C. \u00a7\u00a0792 et seq., accessed May 1, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sup_01_18_10_I_20_37.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sup_01_18_10_I_20_37.html<\/a>.<\/p>\n<p>18 U.S.C. \u00a7\u00a0793, accessed May 1, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00000793----000-.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00000793&#8212;-000-.html<\/a>.<\/p>\n<p>18 U.S.C. \u00a7\u00a0794(b), accessed May 1, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00000794----000-.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00000794&#8212;-000-.html<\/a>.<\/p>\n<p>18 U.S.C. \u00a7\u00a02381, accessed April 29, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002381----000-.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002381&#8212;-000-.html<\/a>.<\/p>\n<p>18 U.S.C. \u00a7\u00a02385, accessed April 30, 2011, <a class=\"link\" href=\"http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002385----000-.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.law.cornell.edu\/uscode\/718\/usc_sec_18_00002385&#8212;-000-.html<\/a>.<\/p>\n<p>51 Pa. Cons. Stat. Ann. \u00a7\u00a06018, accessed April 30, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/pennsylvania\/military-affairs\/00.060.018.000.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/pennsylvania\/military-affairs\/00.060.018.000.html<\/a>.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-1346\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Criminal Law. <strong>Provided by<\/strong>: University of Minnesota Libraries Publishing . <strong>Located at<\/strong>: <a target=\"_blank\" href=\"http:\/\/open.lib.umn.edu\/criminallaw\/\">http:\/\/open.lib.umn.edu\/criminallaw\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/\">CC BY-NC-SA: Attribution-NonCommercial-ShareAlike<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":23485,"menu_order":1,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Criminal Law\",\"author\":\"\",\"organization\":\"University of Minnesota Libraries Publishing \",\"url\":\"http:\/\/open.lib.umn.edu\/criminallaw\/\",\"project\":\"\",\"license\":\"cc-by-nc-sa\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-1346","chapter","type-chapter","status-publish","hentry"],"part":1335,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/users\/23485"}],"version-history":[{"count":4,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1346\/revisions"}],"predecessor-version":[{"id":1654,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1346\/revisions\/1654"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/parts\/1335"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1346\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/media?parent=1346"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapter-type?post=1346"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/contributor?post=1346"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/license?post=1346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}