Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity Education & TrainingGovernment: Federal, State and Local

Sovereign citizens: Threats and law enforcement responses

By Dean C. Alexander
Sovereign citizens: the threat they present to law enforcement, enterprise security and more
December 30, 2020

According to various estimates, there are several hundred thousand sovereign citizen adherents in the United States, a type of anti-government extremists. These individuals believe that the U.S. federal government is illegitimate and that they are “freemen,” outside the control of government. Sovereign citizens eschew all affiliations and interactions with the federal government, while giving primacy to the power of the county law enforcement official, the sheriff. Furthermore, this mindset is comprised of pseudo-legal jargon as well as sometimes coupled with various conspiracy theories of militia groups: from a world-government trend to a foreign cabal controlling the U.S. and from the existence of UN troops and FEMA concentration camps on U.S. soil.

Indeed, there has been some overlap between those who espouse sovereign citizen and radical militia ideologies; the latter being stringent Second Amendment supporters with an, often, strong strain of anti-government precepts, tied with the fear that government authorities will confiscate guns and weapons of U.S. citizenry. Some individuals embrace traditional sovereign citizen, extremist militia and other radical tenets.

In the past several years, sovereign citizens have increasingly been involved in criminal activities nationwide, including fraud as well as threats and violence against government officials, particularly law enforcement.

Among the more prominent examples of sovereign citizen violence against law enforcement are the:

  • 2018 killing of a police officer in Locust Grove, Georgia, by Tierre Guthrie;
  • 2017 murder of a police officer in Three Forks, Montana by Lloyd and Marshall Barrus;
  • 2016 killings of three police officers in Baton Rouge by Gavin Long;
  • 2014 killing of two Las Vegas Police Department officers by Jerad and Amanda Miller;
  • 2012 killing of two sheriff’s deputies in Louisiana by a family-linked sovereign citizen cabal;
  • and the 2010 killing of two West Memphis police officers by father-son team Jerry and Joe Kane.

These murders are indicative of the types of threats law enforcement have faced from sovereign citizens for more than three decades, which arose with the sovereign citizen progenitor, the Posse Comitatus group.

Against this backdrop, it is crucial that U.S. law enforcement is made aware of the dynamics of the threat of sovereign citizens and craft solutions to combat this growing homeland security challenge. Security leaders at the enterprise level should also be educated on the issue, as potential insider threats abound in this area as well.

 

With that in mind, this article addresses the key issues that security leaders and law enforcement should consider regarding this domestic threat:

1. What they think?

While there is no uniformity in sovereign citizen ideology, most believe that the government is illegitimate, and prefer autonomy from the government. They believe there is no need to pay taxes, obtain licenses or registrations, pay fees, or participate in court proceedings.

They may characterize their activities as personal and non-commercial, claiming autonomy from the government. Others may establish fictitious organizations or nations, asserting they have diplomatic immunity. Some believe that they can pay off debts and other obligations by accessing a fictitious U.S. Treasury account.

They can be hostile or aggressive vis-à-vis law enforcement, prosecutors, judges and other government officials. Their hatred for government may lead to them purposely targeting with violence in preplanned attacks or in dynamic situations.

Concurrently, they may be involved in “paper terrorism,” meaning they file frivolous lawsuits and try to put liens on real estate and personal property in the hopes of getting a financial settlement or having their targets ignore their illegal activities.

2. How can you tell if you are interacting with a sovereign citizen?

Their Car: May have no license plate, fake license plate, anti-government stickers, anti-government posters/leaflets.

Their Home: Surveillance cameras, security fences, anti-government stickers, anti-government posters/leaflets.

When you interact with them they may: Claim that they are a sovereign citizen traveling upon the land, uncooperative (no response, cite statutes/law claiming you are in the wrong), ask you for your delegation of authority, allege that you have no authority to stop/question them, share with you fraudulent documents (e.g., driver’s license, car registration, insurance), threaten you with lawsuits/liens on your property, threaten you verbally/physically, drive away during traffic stop, try to harm you with their car/weapon.

3.  What you should be concerned about when interacting with a sovereign citizen?

Car/Home/Elswhere: Do they have weapons (particularly firearms)? Are they video/audio recording your conversation? Are there additional persons in the car?

Officers should look for possible criminal activity in the realm of weapons, drugs, proceeds of crime, money laundering, components of explosives, fraudulent documents/currency, fraud, extortion, illegitimate government filings, etc.

4. Typical crimes that sovereign citizens have been convicted of, include:

  •  Interfering with officer duties, threats against officer;
  •  Murder, solicitation of violence;
  •  Impersonating an officer, diplomat;
  •  Forged documents, forged currency, fraudulent financial instruments;
  •  Mail, wire, bank fraud;
  •  Advocating the overthrow of the federal government;
  •  Tax violations (failure to pay, evading taxes, fraudulent returns);
  •  Debt elimination scheme;
  •  Extortion;
  •  Numerous traffic infractions (no registration, license, insurance).

5.   So, then what?

  1. First, determine if the person claims to be a sovereign citizen.
  2. Next, ensure your safety, (Are they agitated/aggressive? Does this appear to be the first time/nth time they had negative interaction with police?)
  3. Assess if they are a threat to you or others.
  4. See if they have committed or plan on committing a crime.
  5. Ask questions, gather documents/flyers/evidence.
  6. Based on what they say or do, what crimes have they committed (or do they plan on committing)?
  7. Reach out to supervisor, fusion center, Joint Terrorism Task Force or intelligence zone officer.
  8. File a suspicious activity report.
  9. Be aware of possible retribution by sovereign citizens such as lawsuits in state or federal court, liens on your home/personal property, possible filing of involuntary bankruptcy, or threat or attack at your home.
KEYWORDS: domestic terrorism enterprise risk management law enforcement law enforcement officer sovereign citizen movement sovereign citizen security training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dean alexander 200px

Dean C. Alexander is Director of the Homeland Security Research Program and Professor at the School of Law Enforcement and Justice Administration at Western Illinois University. He is the author of the new book, Family Terror Networks (2019), available at Amazon.com. He is also a valued member of Security’s Editorial Advisory Board.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Sovereign Citizen Threat to U.S. Security

    The Sovereign Citizen Movement: Threats and Responses

    See More
  • Mask enforcement amid the COVID-19 pandemic is difficult

    The challenge of mask enforcement amid the pandemic

    See More
  • Brussels Attacks Indicative of Jihadist Threats Facing the United States

    Brussels Attacks Indicative of Jihadist Threats Facing the United States

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing