{"id":3409,"date":"2012-11-02T13:31:34","date_gmt":"2012-11-02T17:31:34","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/nsj\/?p=3409"},"modified":"2012-11-02T22:03:47","modified_gmt":"2012-11-03T02:03:47","slug":"national-security-crime","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2012\/11\/national-security-crime\/","title":{"rendered":"National Security Crime"},"content":{"rendered":"<p><strong>By Erin Creegan* &#8212;<\/strong><\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol-3-Creegan-FINAL.pdf\">Click here to read the full text of the Article<\/a><strong><\/strong><strong><\/strong><strong><\/strong><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/01\/Vol.-3-Thravalos-final-edits2.pdf\"><strong><br \/>\n<\/strong><\/a><\/p>\n<p>Although there is no shortage of attention to each of the varied threats to national security, each of these threats (and the available government responses to them) are most often treated as independent subject matters. Yet there are significant connections between these apparently distinct criminal offenses, although little work has been done to draw such connections and develop a framework for studying national security criminal law as a unified discipline. This Article takes the first step towards building such a curriculum by integrating the criminological and legal aspects of crime in the national security realm. It examines four categories of crimes\u2014treason, espionage, sabotage, and terrorism\u2014and the applicable federal statutes available to prosecutors to combat these threats to national security. The Article then proceeds to draw upon interdisciplinary connections across these disparate crimes to examine why individuals engage in both violent and \u201cwhite-collar\u201d national security crime. Looking at tools ranging from wiretap authorizations to classification systems, the Article addresses what the Government can do to detect, prevent, prosecute and punish national security crimes.<\/p>\n<p>* Trial Attorney, U.S. Department of Justice, National Security Division, Counterterrorism Section; Adjunct Professor of International Criminal Law at the University of Maryland\u2014 College Park, Criminology and Criminal Justice; Adjunct Professor of Scholarly Writing in International Law at the George Washington University Law School. The opinions represented in this paper are those of the author and do not express the positions of the United States Government in any way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><b>Erin Creegan<\/p>\n<p>3 Harv. Nat\u2019l Sec. J. 373 (2012)<\/b><\/p>\n<p>Although national security threats are often treated independently, Erin Creegan draws connections among four categories of crimes \u2014 treason, espionage, sabotage, and terrorism \u2014 to address what the Government can do to detect, prevent, prosecute and punish national security crimes. <\/p>\n<p><p><i>Picture courtesy of U.S. Immigration and Customs Enforcement<\/i><\/p>\n","protected":false},"author":1,"featured_media":3412,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[242],"tags":[],"class_list":["post-3409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-main"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2012\/11\/ICE-cyber_crimes_center.jpg?fit=225%2C194&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-SZ","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/3409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=3409"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/3409\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media\/3412"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=3409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=3409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=3409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}