tyb!
As a brief refresher for those that do not yet understand.
Espionage:
United States v. Pollard (1987): Jonathan Pollard, a civilian intelligence analyst, was convicted of espionage for passing classified information to Israel. While not treason in the legal sense, the act of spying for a foreign power is akin to subversion or betrayal of one's country.
Sedition and Seditious Conspiracy:
United States v. Rahman (1995): Omar Abdel-Rahman (the "Blind Sheikh") and others were convicted of seditious conspiracy for plotting to bomb various New York City landmarks. This case exemplifies how subversive activities aimed at overthrowing or undermining the government can be legally addressed without invoking the treason charge directly.
United States v. Stewart (2005): Lawyer Lynne Stewart was convicted of providing material support to terrorists and conspiracy to defraud the United States by aiding Omar Abdel-Rahman. Although not treason, her actions were seen as undermining U.S. security.
Cyberterrorism or Cyber Warfare:
United States v. Aleynikov (2010): While not directly treason, this case involved Sergey Aleynikov, who was convicted under the Economic Espionage Act for stealing Goldman Sachs' high-frequency trading code. Though the conviction was later overturned, it highlights how cyber activities can be seen as acts against national or economic security.
Cyber Espionage Cases: There are numerous cases involving cyber espionage, where individuals are charged with hacking into government or corporate systems to steal information, often on behalf of or for the benefit of foreign entities. These are often prosecuted under the Computer Fraud and Abuse Act (CFAA) or similar statutes.
Propaganda:
Gillars v. United States (1970): As mentioned earlier, Mildred Gillars ("Axis Sally") was convicted of treason for broadcasting Nazi propaganda, which can be seen as a form of psychological warfare or subversion through media.
Terminology:
Asymmetric Warfare: This term could apply to acts by civilians where traditional military confrontations are not used but rather unconventional methods like cyber-attacks, propaganda, or economic sabotage.
Fifth Column Activities: Refers to subversive activities by a group or individuals within a country sympathetic to an enemy, aiming to undermine the country from within.
Hybrid Warfare: Encompasses a blend of conventional warfare, irregular tactics, and cyber operations, often including activities by civilians or non-state actors.
Information Warfare: Involves the use of information and communication technologies to influence public opinion or to disrupt, corrupt, or usurp critical information systems.