Sentiment Analysis: Combating Cybercrime, Fraud, and Predatory Schemes Against American Citizens

Executive Order: 14390
Issued: March 6, 2026
Federal Register Doc. No.: 2026-04826

1) OVERALL TONE & SHIFTS​‌​‍⁠

The​‌​‍⁠ order opens with urgent, emotionally charged language framing cybercrime and fraud as existential threats to American families and youth, then transitions into procedural and directive language as it assigns agency responsibilities and timelines. The rhetorical register shifts noticeably from Section 1's victim-centered moral framing — emphasizing harm, vulnerability, and exploitation — to the bureaucratic and operational language of Sections 2 through 5, which specify interagency coordination mechanisms, action plan deadlines, and legal carve-outs.

The overall tone is assertive and protective, positioning the federal government as a defender against foreign criminal networks. The closing general provisions adopt the standard neutral-legal register common to executive orders, tempering the urgency of earlier sections with jurisdictional and appropriations caveats.

2) SENTIMENT CATEGORIES​‌​‍⁠

Positive sentiments (as the order frames them)

Negative sentiments (as the order describes them)

Neutral/technical elements

Context for sentiment claims

3) SECTION-BY-SECTION SENTIMENT PROGRESSION​‌​‍⁠

Section 1 — Purpose and Policy

Section 2 — Combating Scam Centers and Cybercrime

Section 3 — Victim Restoration Program

Section 4 — International Engagement

Section 5 — General Provisions

4) ANALYTICAL DISCUSSION​‌​‍⁠

Alignment​‌​‍⁠ of sentiment with substantive goals

The order's emotional framing in Section 1 — centering vulnerable victims, destroyed youth, and stolen savings — serves a clear rhetorical function: it constructs a moral urgency that justifies the broad, multi-agency mandate and establishes the policy aspiration of "potential offensive actions," a phrase that appears in the declaratory section but is not given specific legal or operational form in the sections that follow. The sentiment architecture moves from harm identification (Section 1) to institutional response (Section 2) to victim remedy (Section 3) to international coercion (Section 4), creating a logical emotional arc that mirrors a law enforcement narrative structure: crime, investigation, prosecution, restitution, and deterrence. This alignment between tone and structure is deliberate and internally consistent. The order's positive sentiments — protection, restoration, coordination — are consistently paired with negative characterizations of TCOs and non-cooperative foreign states, reinforcing a binary framing of the policy landscape.

Potential impacts on relevant stakeholders

The order's language has differential implications for identifiable stakeholder groups. Victims of cyber-enabled fraud are addressed sympathetically and are the stated beneficiaries of the Victim Restoration Program, though the order conditions this on funds actually seized and on the Attorney General's discretionary recommendation. State, local, Tribal, and territorial governments are framed as partners requiring capacity-building support, suggesting the order perceives a gap in sub-federal defensive capability. Foreign governments — particularly those the order characterizes as tolerating TCO activity — are addressed in strikingly coercive terms, with the Secretary of State directed to "demand" enforcement and impose a specific and expansive set of consequences up to and including the expulsion of foreign officials and diplomats. Private-sector cybersecurity firms are framed as operational partners rather than regulated entities, a notably cooperative rather than regulatory posture. The order's reference to "Secretary of War" (an archaic title not used in current U.S. government structure since 1947, when it was replaced by "Secretary of Defense") is a notable textual anomaly in the document.

Comparison to typical executive order language

The order's Section 1 is more emotionally explicit than is typical for executive orders, which conventionally open with policy statements in neutral administrative language. Phrases such as "destroying the lives of our youth" and "shadow economy fueled by stolen identities, coercion, forced labor, and human trafficking" are more characteristic of political speeches or legislative findings than standard executive order preambles. The directive sections (2–4) are more conventionally structured, using standard interagency coordination language and timeline-based mandates, with the notable exception of Section 4's unusually punitive diplomatic language. The general provisions in Section 5 are entirely standard boilerplate. The overall document thus blends campaign-style rhetorical framing with conventional administrative machinery, a pattern observed in several executive orders issued during political transition periods when establishing public-facing policy identity is a concurrent goal alongside operational direction.

Character as a political transition document and analytical limitations

The order exhibits characteristics common to early-term executive orders: it establishes new coordinating bodies, directs reviews and action plans rather than specifying final policy outcomes, and uses strong declaratory language to signal priorities without yet committing to specific resource allocations. The linkage of the NCC to Executive Order 14159 — an immigration enforcement order — is a structural choice that embeds cybercrime response within a broader national security and border enforcement framework, which reflects a particular ideological framing of these issues as interconnected. This analysis is limited by its focus on textual sentiment rather than implementation capacity, legal sufficiency, or empirical accuracy of the order's factual claims. The absence of evidentiary citations in the order means that the severity and scope of harms described cannot be independently assessed from the document itself. Additionally, sentiment analysis of policy documents captures rhetorical intent rather than operational effect, and the two may diverge significantly in practice.