Political Science
Introduction
The organization that has been picked for analysis within this assignment appears to be relatively well-known across the nation. Sovereign Citizens (also known as Freemen) has certain similarities with traditional terrorist organizations and at the same time possesses certain unique, distinctive features which make it not only appealing for certain categories of citizens, but also increasingly dangerous for the national security in many ways.
This research is composed of four main parts. The first one is a brief analytical description of the organization from the historical, functional and structural points of view. The next three parts address the following issues:
- Efficiency of data collection programs for the purpose of gathering information concerning present and future activities of Sovereign Citizens and evaluation of their threat to other citizens and governmental institutions.
- The range of members of the U.S. Intelligence Community which would be the best collectors of information regarding Sovereign Citizens.
- The list of analysis strategies that would be most appropriate for the assessment of activities of Sovereign Citizens.
Organization overview
Sovereign Citizens movement traces back its history back to 1990-ies, although certain precedents regarding it might have happened even earlier. Although it is identified by some researchers as a radical right-wing movement, there is a reason to believe that it has own distinctive features and cannot be positioned within the ordinary political range. The ideology of the movement is based on the concepts of anarchy and “paper terrorism”. Denouncing legal authorities and respective procedures, its members tend to neglect such processes as paying taxes, obtaining driver’s licenses as well as sharing personal information with governmental institutions. The core beliefs of the group depend on the concept of multiple conspiracies against the American nation, in general, and themselves, in particular. The main activities of the group include but are not limited to faking tax reports, identity thefts, massive spamming of governmental organizations and even armed assaults on law enforcers and civilians. Although being decentralized and lacking unified leadership, the group is composed of a wide range of individuals who interact primarily by means of specialized seminars, online events and social media. There is a reason to believe that the group consists primarily of socially, personally and financially insecure people who nevertheless possess a certain amount of technical proficiency. Due to the fact that a certain amount of serious crimes is being associated with the organization, it may be considered to be a terrorist threat and treated and analyzed respectively.
Data collection programs
The range of the data collection programs which are suitable for the case of Sovereign Citizens derives from the nature of the organization. This is a primarily domestic network (at least, there is no sufficient information concerning foreign involvement at the moment) which heavily depends on social media as an element of integration and propaganda. Due to these reasons it may be said that certain data collection programs are fitting the present pattern of group’s activities, and some more may be used in case of further territorial and functional expansion of the organization.
Social media and the Internet, in general, are being obviously used by Sovereign Citizens for the following purposes:
- Information exchange through forums, message boards and chats;
- Promotion of ideological materials;
- Sharing organizational information concerning current and upcoming gatherings;
- Search for information concerning illegal activities.
- MUSCULAR – the data collection system which is being currently applied by Google for gathering metadata on users. Unusual search requests, choice of radical videos and exchange of sensitive information through mail are easily identifiable through this program and may provide grounds for a more detailed investigation of both online and offline activities of selected individuals.
- PRISM (SIGAD) – this system used by the National Security Agency is generally aimed at gathering information about terrorist and anti-American activities both within U.S. borders and beyond. As Sovereign Citizens impose a potential terrorist threat, the usage of this program is well justified. It may be also useful for tracking activities within the dark sector of the Internet, similar to the recently shut TOR network.
- STELLAR WIND – also a system developed by NSA and also used by DoD, primarily aimed at gathering of international information of military nature. It may be used in the future in case if the organization of interest gains contacts with other terrorist cells around the world.
Involvement of the U.S. Intelligence Community
At the present stage of its development Sovereign Citizens’ movement is indeed attracting attention of domestic intelligence. Identity thefts, illegal firearms and improper use of communication channels with governmental institutions lie within jurisdiction of the U.S. Department of Justice, which National Security Branch under the FBI is most likely already gathering respective information. However, if the nature of the organization and its activities undergo further evolution towards terrorism, Sovereign Citizens are likely to become an object of close attention from other members of the intelligence community:
- National Security Agency – in case of development of domestic terrorism ideology and practice;
- Central Intelligence Agency – in case if the movement attempts getting in touch with foreign sponsors or tries to harm interests of the American government and citizens overseas;
- Office of Intelligence and Analysis of the U.S. Department of Homeland Security – in case if further activities of the organization or its separate members involve violation of the U.S. border and immigration regulations;
- Office of Terrorism and Financial Intelligence of the U.S. Department of the Treasury – in case if the organization starts receiving centralized funding both from the American soil and abroad.
The paradigm of further development of the organization is not easy to predict, however it is not impossible that all these IC members will start and keep gathering information on Sovereign citizens over time.
Intelligence analysis strategies
Strategies of data analysis regarding membership, activities and plans of this organization can be separated into two clusters – structural and functional.
All the analysis methods mentioned above may and should be used together so as to get the most comprehensive and realistic image of the terrorist organization, determine its strengths and weaknesses, and shut it down.
Conclusion
America is the most powerful nation in the world, and it has plenty of enemies both inside and outside of its borders. It is a duty of every governmental official and every citizen to resist the attempts of sabotaging the American system of values and the American way of life. It is especially annoying that America’s own citizens are acting against the national interests and cause substantial harm to the well-balanced and efficient system of governmental and public relations. On the other hand, the intelligence community of the United States has all it takes to detect such attempts and prevent terrorist activities. There is a hope that the situation with Sovereign Citizens will not be an exception, and their hazardous actions will be put to an end.
Bibliography
Sovereign Citizens: A Growing Domestic Threat to Law Enforcement. FBI Counterterrorism Analysis Section. Web. Retrieved from http://www.fbi.gov/stats-1 services/publications/law-enforcement-bulletin/september-2011/sovereign-citizens
Domestic Terrorism: The Sovereign Citizen Movement. U.S. Department of Justice, Federal Bureau of Investigations. Web. Retrieved from http://www.fbi.gov/news/stories/2010/april/ sovereigncitizens_041310