The catalyst behind the QAnon movement originated in 2017, when an anonymous user claiming to have high level vetting clearance made a series of posts on 4Chan announcing that Hillary Clinton was due to be arrested, and that President Donald Trump was leading an effort to call to challenge influential heavyweights such as Barack Obama, Hillary Clinton and George Soros. Now, the main drive of the movement is that President Trump is leading a secret campaign against “elite Satan-worshipping paedophiles” in powerful positions.
What might seem like farfetched conspiracy theories have been accepted, in part at least, by thousands across the globe.
The nature of this movement brings unique considerations for intelligence and security operators. The motivators of its followers are not, in any sense, materialistic but are rooted in a social justice which supersedes state and federal laws, social conformity and even religion. This is well demonstrated in an early incident now known as “Pizzagate”.
After the DNC emails were hacked and released by Wikileaks, an online theory emerged suggesting that the reference to “Pizza” in John Podesta’s emails was in fact code relating to child sex trafficking. In response to these allegations, Edgar Maddison Welch armed himself with an AR15 and effectively raided the pizzeria in question. Prior to the raid he was reported to have said that he needed to sacrifice “the lives of a few for the lives of many” and to fight “a corrupt system that kidnaps, tortures and rapes babies and children in our own backyard.”. Whilst Walsh was reported to have been a deeply religious man, his motivation was not religiously motivated. He was motivated to challenge a “corrupt state” and believed he would genuinely discover, and thus protect, sex trafficked children.
The author of QAnon has set forth that it is the duty of the people to challenge the state and be “prepared to fight”. Another interesting element to the QAnon threat vector is that the theory itself is self-fulfilling in the sense that any contest to its legitimacy is used as support for a ‘coverup’.
There have been a number of further armed incidents connected to the following of the QAnon conspiracy, recently resulting in the arrest of Joshua Macias and Antonio LaMotta, who travelled to Philadelphia carrying a homemade AR-15 style rifle and 117 rounds of ammunition with no weapons permits during the recent election. This demonstrates the ability for the online community to enable real world aggressors.
In responding to this new threat, security and intelligence operators must extend their awareness of the operating environment, on and offline. This means utilizing an intelligence resource to obtain a detailed understanding of the movement, and how it nominates targets.
As always, the security function should be threat responsive which means that operators should:
When developing intelligence there are some important considerations:
Defined intelligence allows practitioners to scale their team accordingly, without it they are guessing from purely imagined scenarios. Without responding to emerging trends in the threat environment, close protection teams risk becoming stagnant and unresponsive to current issues.
The design of the security detail should then consider threats, specific and general, and how those threats may manifest themselves. Only on considering these can the team plan accordingly and deploy suitable resources.
Quintel Intelligence and ETS Risk Management have partnered together for over 8 years.
Quintel’s Risk Investigations offering provides services to high profile persons that require a discrete and specific consideration rather than a simple open source opinion piece masquerading as a client focused product. Working with ETS protective security services, the teams are able to focus on their areas of specific expertise to deliver a high quality service.
Global Risk Investigations
92 Albert Embankment
London, SE1 7TY
+44 (0)203 948 1988