[House Hearing, 111 Congress]
[From the U.S. Government Printing Office]
U.S. STRATEGY FOR COUNTERING JIHADIST
WEB SITES
=======================================================================
HEARING
BEFORE THE
SUBCOMMITTEE ON TERRORISM, NONPROLIFERATION AND TRADE
OF THE
COMMITTEE ON FOREIGN AFFAIRS
HOUSE OF REPRESENTATIVES
ONE HUNDRED ELEVENTH CONGRESS
SECOND SESSION
__________
SEPTEMBER 29, 2010
__________
Serial No. 111-130
__________
Printed for the use of the Committee on Foreign Affairs
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Available via the World Wide Web: http://www.foreignaffairs.house.gov/
______
U.S. GOVERNMENT PRINTING OFFICE
61-516PDF WASHINGTON : 2010
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON FOREIGN AFFAIRS
HOWARD L. BERMAN, California, Chairman
GARY L. ACKERMAN, New York ILEANA ROS-LEHTINEN, Florida
ENI F.H. FALEOMAVAEGA, American CHRISTOPHER H. SMITH, New Jersey
Samoa DAN BURTON, Indiana
DONALD M. PAYNE, New Jersey ELTON GALLEGLY, California
BRAD SHERMAN, California DANA ROHRABACHER, California
ELIOT L. ENGEL, New York DONALD A. MANZULLO, Illinois
BILL DELAHUNT, Massachusetts EDWARD R. ROYCE, California
GREGORY W. MEEKS, New York RON PAUL, Texas
DIANE E. WATSON, California JEFF FLAKE, Arizona
RUSS CARNAHAN, Missouri MIKE PENCE, Indiana
ALBIO SIRES, New Jersey JOE WILSON, South Carolina
GERALD E. CONNOLLY, Virginia JOHN BOOZMAN, Arkansas
MICHAEL E. McMAHON, New York J. GRESHAM BARRETT, South Carolina
THEODORE E. DEUTCH, CONNIE MACK, Florida
FloridaAs of 5/6/ JEFF FORTENBERRY, Nebraska
10 deg. MICHAEL T. McCAUL, Texas
JOHN S. TANNER, Tennessee TED POE, Texas
GENE GREEN, Texas BOB INGLIS, South Carolina
LYNN WOOLSEY, California GUS BILIRAKIS, Florida
SHEILA JACKSON LEE, Texas
BARBARA LEE, California
SHELLEY BERKLEY, Nevada
JOSEPH CROWLEY, New York
MIKE ROSS, Arkansas
BRAD MILLER, North Carolina
DAVID SCOTT, Georgia
JIM COSTA, California
KEITH ELLISON, Minnesota
GABRIELLE GIFFORDS, Arizona
RON KLEIN, Florida
Richard J. Kessler, Staff Director
Yleem Poblete, Republican Staff Director
------
Subcommittee on Terrorism, Nonproliferation and Trade
BRAD SHERMAN, California, Chairman
GERALD E. CONNOLLY, Virginia EDWARD R. ROYCE, California
DAVID SCOTT, Georgia TED POE, Texas
DIANE E. WATSON, California DONALD A. MANZULLO, Illinois
MICHAEL E. McMAHON, New York JOHN BOOZMAN, Arkansas
SHEILA JACKSON LEE, Texas J. GRESHAM BARRETT, South Carolina
RON KLEIN, Florida
C O N T E N T S
----------
Page
WITNESSES
Mr. Mansour Al-Hadj, Director, Reform in the Arab and Muslim
World Project, The Middle East Media Research Institute........ 6
Christopher Boucek, Ph.D., Associate, Middle East Program,
Carnegie Endowment for International Peace..................... 16
Gregory S. McNeal, J.D., Associate Professor of Law, Pepperdine
University..................................................... 23
LETTERS, STATEMENTS, ETC., SUBMITTED FOR THE HEARING
Mr. Mansour Al-Hadj: Prepared statement.......................... 8
Christopher Boucek, Ph.D.: Prepared statement.................... 19
Gregory S. McNeal, J.D.: Prepared statement...................... 26
APPENDIX
Hearing notice................................................... 54
Hearing minutes.................................................. 55
U.S. STRATEGY FOR COUNTERING JIHADIST WEB SITES
----------
WEDNESDAY, SEPTEMBER 29, 2010
House of Representatives,
Subcommittee on Terrorism,
Nonproliferation and Trade,
Committee on Foreign Affairs,
Washington, DC.
The subcommittee met, pursuant to notice, at 1:30 p.m., in
room 2175, Rayburn House Office Building, Hon. Brad Sherman
(chairman of the subcommittee) presiding.
Mr. Sherman. I want to thank our witnesses for being here.
I know that the title of this hearing uses the term
``jihadist,'' which is widely used in the intelligence and
antiterrorism community. I realize that the term ``jihad'' is
sometimes used in Islam to describe a personal struggle; and,
accordingly, I will use the word ``terrorist'' or
``extremist,'' not that the term ``jihadist'' does not also
carry with it the meaning, but it has secondary and tertiary
meanings as well, and obviously those engaged in a personal
reflection and struggles to improve themselves are not the
focus of these hearings.
We have seen extremists use the Internet for a growing
number of activities, including recruitment, propaganda,
psychological warfare, and soliciting financial support.
Today's hearing is to focus on how to best counter those
activities and basically to ask the question: Why aren't we
doing so?
The growing number of instances in which the Internet is
used for extremist activity is quite long. For example, in
March, the Washington Post reported that extremists used the
Internet to pass along U.S. operational information to
insurgents in Iraq. Perhaps the best-known example is Major
Hasan, the Fort Hood shooter who was influenced by extremist
propaganda on the Internet. The five men in Northern Virginia
who traveled via Pakistan to attack U.S. troops in Afghanistan
made contact with the extremist organization over the Web as
well.
We see groups like Fajr, which not only maintain their own
Web site but have a dedicated nexus to communicate with other
extremist groups. One can find the many books and essays
pushing the extremist position on the line, and you can find
instructions on how to download extremist content onto your
cell phone.
The question is, what is our response? The politically
correct response is for us to monitor what is going on and
maybe detect who is visiting these sites. We did a great job of
determining which sites Major Hasan visited after the terrorist
incident. Keep in mind that our enemies have decided that, even
though we have the capacity to monitor, the Internet serves
their purpose. So those that argue that our ability to monitor
means that extremist Web sites are helping us more than they
are helping our enemies have got to reflect on the fact that
our enemies have analyzed this and come to the exact opposite
conclusion. The other approach, also politically correct, is to
reply, read everything on the Internet, and write an essay as
to why the extremists are wrong and we are right.
Both of these responses to terrorists' use of the Internet
have a number of advantages. They are polite, they are
politically correct, and they involve hiring many people with
master's degrees in foreign affairs. Being polite and hiring
lots of people with master's degrees in foreign affairs may be
the chief mission of our State Department and other national
security bureaucracies.
I would prefer to see us shut down these sites. Now, you
can argue the First Amendment, but the fact is that while you
cannot scream fire in a crowded theater, you also cannot
legally try to raise money for terrorists or provide an article
how to ``Make a bomb in the kitchen of your mom'' or advocate
that people do so. What we are talking about here are sites
that are not protected by the U.S. First Amendment.
The advocacy of taking violent action against Americans
certainly poses just as great a danger as yelling ``fire'' in a
crowded theater. We are going to be told that there are lots
and lots of Web sites, that is true, but they tend to get their
content from 5 or 10 or 15 providers. So if we should down
every Web site that provides original content, we will have
shut down the propaganda machine, the finance machine, the
recruitment machine that the terrorists are deploying on the
Internet.
Now, private citizens have been working to shut down
extremist Web sites by contacting companies who host these Web
sites and urging them to take them down. In addition, the U.S.
military, in at least one publicly reported case, decided to
shut down a Web site.
I am going to try to save some of your time by skipping
some of my prepared remarks here.
Yet we still have not only the many examples I mentioned
before, but also Colleen LaRose, commonly called Jihad Jane,
who was arrested in Philadelphia after months of trying to
recruit jihadist extremists in the United States. The Los
Angeles Times reports that this individual was just one of a
dozen domestic terrorist cases that the FBI disclosed in 2009,
all of which used the Internet as a tool.
Anwar al-Awlaki, an extremist leader with ties to al-Qaeda,
is now being credited as being the brains behind online
recruitment, particularly in a magazine written in English. I
mentioned his most famous article regarding making a bomb in a
kitchen.
The terrorists very much want to recruit operatives that
are legally entitled to be in the United States and culturally
familiar with the United States so that they can act without
creating suspicion. The best and easiest way for them to reach
out to American citizens, legal residents, and those familiar
with our culture is through the Internet.
During the Bush administration, the military began
formulating plans for a cyberattack to shut down a Saudi Web
site, which they reportedly did. Interestingly, the Web site,
according to the Washington Post, was being operated by a joint
Saudi-CIA operation in order to collect intelligence on the
extremists and possible Saudi insurgents. A better degree of
coordination might be called for in our efforts.
There is, of course, the naming and shaming, trying to get
Web site providers to take down certain Web sites. This is not
always successful. We have people here with technical expertise
who can perhaps advise us on whether the United States can do
what we are told high school students are able to do, and that
is to take down a Web site. And as I pointed out, we could
take, remove the content from hundreds of Web sites if we were
able to take down 5 or 10 other sites that are providing the
content.
Now, it is attractive to say, well, we should just read
what the jihadists put up or what the extremists and terrorists
put up and then respond. Because a lot of us grew up in
politics, and when you have a good argument, you prevail. I
have never had an argument good enough to get 99 percent of the
people in my district to agree with me and only 1 percent to
agree with my opponent.
But if I ever did come up with such a good argument, that
would be fine for my electoral purposes, but it wouldn't be
successful here. Because if 1 percent of those visiting these
Web sites do what the Web site authors want them to do, which
is to become terrorists, then the fact that 99 percent are
convinced to do otherwise hardly provides us with much solace.
The only way to be 100 percent convinced or 100 percent
sure that 100 percent of the people who are visiting a Web site
are not persuaded by it is to make sure that nobody is visiting
the Web site. Anything else leaves you struggling to get 50,
60, 70 percent of the people who are visiting that Web site to
not be convinced by it. So I look forward to using these
hearings to see whether we are going to be a polite country or
a safe country.
With that, I yield to the distinguished ranking member from
Orange County, California, Mr. Royce.
Mr. Royce. Thank you, Mr. Chairman.
I followed your argument there on the percentages, but I
thought it was interesting because I saw a story the other day
out of Pakistan that indicated that only 2 percent of people in
Pakistan believe that al-Qaeda was responsible for 9/11. So
perhaps the environment is even less conducive in terms of
trying to make a case when you are dealing with people that
have so much disinformation.
One of the questions all of us have is how is it possible
that this very dangerous jihadist ideology is spreading. The
argument that the heart of this is really being spread through
the Internet is an interesting one. I know personally from
conversations that I have had with a number of people who have
been radicalized that that played a key role, that that was at
the heart of how they came to these conclusions.
I think it is following the way in which this is being used
not only as a tool to recruit and indoctrinate but the way
that, beyond that, it is becoming sort of a virtual radical
Madrassa, these Deobandi schools that we see in Pakistan. Now
we have these on the Internet. They are walking people through
this logic or this argument, and they are being used to fund-
raise, they are being used to train, they are being used to
plot attacks. And if we think about 9/11, you know, al-Qaeda
used an extremist Web site to help plot that 9/11 attack.
Today Hezbollah is particularly adept. Following up on that
competing terrorist organization, they have become adept at
doing this; and, obviously, it is done pretty cheaply. So you
have got really a virtual caliphate, as somebody once mentioned
here. Obviously, many are using these Web sites to target
Americans with apparent success.
We had the 9-11 Commission report recently by Tom Kean and
Lee Hamilton. From time to time, they make pronouncements on,
you know, the current state of play and the war on terror and
they have warned about complacency about home-grown terrorism
and they said we have been--their words--``stumbling blindly''
trying to combat it.
We see the ever steady pace at which this recruiting and
these attacks are increasing. The report that was filed by the
members of the commission said they found it--again, their
words--``fundamentally troubling'' that there is no Federal
Government agency or department specifically charged with
identifying the radicalization and recruitment of Americans
into this process of being radicalized and then becoming
terrorists. And, of course, it is the Internet that is central
to that radicalization and recruitment.
So what to do about these Web sites? There is a debate
about whether they should be taken down or whether they should
be monitored, as the chairman referenced.
Intelligence can be gained on occasion, but we need the
tools and focus to aggressively attack these sites. At the end
of the day, we are at war. It is a declared war on the other
side. They have declared war on the U.S., and we should act
like we understand that. We should respond to that. One witness
offers legislative suggestions that I look forward to hearing.
I commend Mr. Poe, my colleague, who is not with us yet for
this hearing. He contacted YouTube, and he expressed his
concern over the rise of terrorist groups posting on it after
he witnessed some of these videos.
Some argue that we should be actively monitoring to counter
radical Internet messages, debating some of these finer points
over the justification of terrorist acts, for example. I
understand the concept, but I don't know if our Government has
the ability to effectively execute such a policy which requires
a set of specialized and uncommon skills and very deep
understanding, if you are thinking about somebody sitting there
engaged in this kind of a debate. We should know also, I think,
that a bad effort at this would do us harm. If we tried to do
this and do it badly, we would be in more trouble.
One academic calls radical Islam on the Internet ``a
virtual community of hatred.'' How you embark on this is a very
difficult question and they are very tough waters for a
bureaucracy to dive into.
Given that they have declared war on us on the Internet,
the answer is to take them down. The answer is the obvious
answer, don't give them the ability to continue to recruit and
to plan. I would have a bit more confidence if the
administration better understood the totalitarian ideology that
we are facing.
Six years ago, the 9-11 Commission found that ``we are not
threatened by `terrorism,' some `generic evil' but specifically
by `Islamist terrorism.' ''
This remains the threat today, but the commission's
straight talk is shunned by this administration which prefers
to speak of ``violent extremism.'' That's the very generic
threat that the commission rejected. They wanted to name this
threat for what it was. This blindness is one reason, perhaps,
that we are ``stumbling blindly,'' as Kean and Hamilton
regrettably concluded.
Mr. Chairman, I yield back.
Mr. Sherman. I wonder if we have an opening statement from
the vice chairman of the committee.
Mr. Scott. Well, I will be very brief, but I would like to
make a couple of statements about this very timely and
important issue.
I think if there ever was an example of our becoming
servants of the machines that were created to serve us, this is
clearly an example of it.
The Internet sort of reminds me of the rope that is thrown
down to a man fallen from a cliff. He can either use that rope
to pull himself up or use that rope to hang himself.
The Internet and the use of it by terrorists and criminal
activity is just mushrooming, and we have got to have the
ability to be able to adapt our capability of thwarting the
terrorists' use of it as quickly as we can.
The topic of today's hearing is one of increasing
importance as we move through the 21st century and as we
continue our offensive against terrorist groups, be they
foreign or jihadist, including al-Qaeda, or domestic, as more
and more are rapidly becoming.
The rise of social network and communications platforms
like Facebook, Twitter, all allow for great, creative, and
political and economic promise for all of us. It could be a
rope to pull ourselves up.
But as we have seen all over the world, political movements
and demonstrations have been organized through such Internet
portals from the streets of Tehran to right here in Main
Street, U.S.A. Spreading messages to the masses has become far
easier in our interconnected world, and we have got to make
sure that the United States, our country, remains at the
forefront of the developing cyberworld in order to advance our
Nation's interests and to promote freedom and democracy abroad.
Likewise, this case of communications allows for enemies of
our basic freedoms, enemies of democracy, to recruit for their
destructive causes. While pursuing our strategic
communications, encountering the recruitment attempts of
terrorist groups, we also must make sure that we don't use this
to hang ourselves, that our vigilance is tempered by our
respects to those rights that are endowed by our Creator, that
we cherish and that are enumerated within our Constitution, the
values that we represent.
And this is what I believe should be our primary focus in
this hearing today. It is a delicate balance I think that we
walk.
We have got to be able to intercept and unscramble
encrypted messages. But we have got to balance it. We have got
to balance our security needs with protecting the privacy, with
protecting the democracy, protecting the freedoms.
Inherent in that freedom is our individual citizen's right
to privacy. So we have got a challenge here and let us hope
that at the end of the day that we use this rope we have to
indeed pull ourselves up to a better country, a better world,
and not allow it to hang us.
With that, Mr. Chairman, I yield back.
Mr. Sherman. Mr. Manzullo, do you have an opening
statement?
Mr. Manzullo. No.
Mr. Sherman. I should note that both witnesses and members
will have 5 business days or longer, if they ask me for it
later, to put their full statements in the record.
I should also say--just to clarify things--I think we are
all talking about the same enemy, that is to say, those who
believe in the use of terrorism or other violent means and are
inspired by a corrupted interpretation of Islam and a corrupted
interpretation of the concept of Islamic jihad.
First, I would like to introduce our first witness, Mansour
Al-Hadj. He is the director of the Reform in the Arab and
Muslim World Project for the Middle East Media Research
Institute, MEMRI. Please proceed.
STATEMENT OF MR. MANSOUR AL-HADJ, DIRECTOR, REFORM IN THE ARAB
AND MUSLIM WORLD PROJECT, THE MIDDLE EAST MEDIA RESEARCH
INSTITUTE
Mr. Al-Hadj. Mr. Chairman, Ranking Member Royce, and
distinguished members of the subcommittee, thank you for
allowing me to serve as a panelist on this important topic.
My name is Mansour Al-Hadj. I was born and raised a devout
Muslim in Saudi Arabia. I earned my degree in Sharia and
Islamic Studies at the International University of Africa in
Sudan.
I am the director of MEMRI's Reform in the Arab and Muslim
World Project. My work involves focusing on liberal voices and
advocates of reform in the Arab and Muslim world, including
those who speak out against online jihad.
As a youth, I was taught to hate America, the West, Jews
and Christians. I was taught to love jihad and those who wage
it. Religious settlements and Islamist pamphlets turned me into
an extremist by teaching me that Muslims are backward because
we don't implement Sharia.
My transformation away from extremism came after reading
the writing of a peace activist who denounced violence and
supports the use of nonviolent means of social change. Today, I
see many Muslims stuck in the same conflict I was. The
difference is that today Muslims have much more access to the
source of extremist ideas online through jihadist forums and
Web sites.
Jihadist forums on Web sites have played a role in several
recent terror acts in the United States such as the Fort Hood
shooting and the failed Times Square bombing. I personally
witnessed the powerful effect a propaganda campaign can have on
a young mind. As a student in Sudan, one government recruitment
effort during the civil war was a jihadist TV series. This show
documented jihadi fighters imparting their love for jihad. I
still remember how fascinated I was by their stories and how I
longed to become one of them.
Just as the Sudanese Government managed to market the war
to recruit thousands to join their jihad, terror organizations
such as al-Qaeda are actively recruiting thousands through the
Internet. Islamist organizations primarily use the Internet for
spreading their message and propaganda. It is considered to be
an integral part of their jihad, and they invest tremendous
resource in it.
It is impossible to imagine the development of global jihad
movement without the Internet. Through MEMRI's research of
jihadi Web sites, it has discovered that many of them are
hosted by Internet service providers in the U.S. that are
unaware of the content due to the language barrier.
MEMRI addressed Congress on this issue in July, 2007. We
suggested dealing with the problem by notifying ISPs in the
United States about what they host in the hope that they would
voluntarily remove the sites. In the week that followed, 32 out
of 50 ISPs questioned removed the jihadi sites.
Opposition to closing these sites came in several
varieties. First Amendment rights, the Web sites are a source
of valuable intelligence, and the difficulty in dealing with a
large number of Web sites were all given as a reason to keep
the sites active.
However, we at MEMRI believe that if the key jihadi Web
sites are shut down, the rest of them will dry up. Most
importantly, the number of jihadist Web sites has decreased in
recent years. Currently, the number of highly dangerous sites
is less than 10.
It is important to mention that terrorist organizations are
always on the lookout for other channels to propagate their
ideology. As jihadists encounter increasing difficulty with
their Web sites, they discovered Western social media outlets
such as YouTube, Facebook, and Twitter.
In fact, YouTube is a primary clearinghouse for one of
America's most wanted terrorists, Anwar al-Awlaki, who provided
spiritual guidance and inspiration for several recent
successful and failed terror attacks in the U.S. al-Awlaki's's
presence in YouTube is the result of the shutting down of his
Web site shortly after the Fort Hood shooting.
At that time, MEMRI reported that al-Awlaki's Web site was
hosted by an ISP in California. Within 2 hours of the report's
publication, the ISP removed al-Awlaki's Web site.
In conclusion, online jihad is a dangerous foe. The U.S.
must confront it exactly as it confronts other forms of
extremism on other fronts around the world, both within and
beyond its border. As with its military ventures, the U.S. must
initiate cooperation with its allies, international
organizations, and the business community. Experience shows
that this can indeed be done.
Mr. Chairman, this concludes my opening remarks. Thank you
again for inviting me today. I welcome any questions that you
or the members may have.
[The prepared statement of Mr. Al-Hadj follows:]
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Mr. Sherman. I want to thank you for that testimony and I
believe your written testimony is longer and, without
objection, will be made as a part of the record. I recommend to
my colleagues the first illustrative paragraph of your written
testimony.
Next I would like to introduce Christopher Boucek. He is an
associate in the Carnegie Middle East Program where his
research focuses on security challenges in the Arabian Gulf and
North Africa. Please proceed.
STATEMENT OF CHRISTOPHER BOUCEK, PH.D., ASSOCIATE, MIDDLE EAST
PROGRAM, CARNEGIE ENDOWMENT FOR INTERNATIONAL PEACE
Mr. Boucek. Mr. Chairman, Ranking Member, and distinguished
members of the subcommittee, thank you very much for the
opportunity to be here today to speak about this very important
topic. I think I would like to keep my remarks relatively
brief, as my written testimony has been entered into the
record, so we can move on to questions that you may have.
As we all know and as was mentioned in the opening
statements, the issue of Web sites promoting and propagating
jihadist terrorist ideology is a serious concern. I think it is
important that we keep in mind what the Internet does and how
this plays with recruitment and radicalization. It serves as a
system to propagate and perpetuate an ideology as well as
provide ideological cohesion and a sense of belonging across
great distances. It is an unrivaled source for connectivity for
sharing information, as well as knowledge, inspiration,
propaganda, recruitment, and fund-raising efforts.
What I would really like to do is focus on three aspects
that I outlined in my written testimony.
The first is a need for measured response, which I think
would fall somewhere between the polite versus safe setup that
we heard in the opening remarks. I would propose that there is
a need for a very strong and coordinated approach to dealing
with these issues, and I think that has to come from a basis of
understanding what these issues are all about and how the
Internet is being used. There are times that I would say that
certain Web sites should be shut down or named and shamed, as
have been outlined.
I would also say that we need to weigh this against the
unintended consequences that can arise from doing so. There is
a value, a considerable value for keeping some of these Web
sites available for law enforcement intelligence as well as
research efforts. I think we also need to keep in mind that
over the last several years a number of experts have pointed
out how there is a decreasing value in both shutting these down
and as using them for surveillance or research methods. So I
think this issue has an awful lot of nuance in it.
I would like to pick up on a point that was made by the
previous witness, which is the use of YouTube, especially the
use of YouTube by al-Qaeda in the Arabian Peninsula. About 3
months ago, a new YouTube channel appeared branded as AQAP, the
Islamist al-Qaeda organization based in Yemen, their media
outlet. This features all of AQAP's videos subtitled into
English.
No longer do you need to have access to Arabic. No longer
do you need to be able to navigate Web forums. In conjunction
with English language propaganda material, you can now use
Google and YouTube to access this material, and it is
everywhere. Taken in the case of Anwar al-Awlaki, his sermons
and lectures are available widespread, not just on YouTube but
on an infinite number of outlets.
It is important to keep in mind that shutting down these
Web sites will not completely eliminate the sentiment behind
them, and I think this leads me into my next point, which is
the need for an increased sense of counter-engagement, I guess
the read and talk aspect.
And I think what I would say here is that it is important,
I think, for us to keep in mind that al-Qaeda is fueled by an
ideology and a set of ideas and a set of grievances, and we
need to understand these, and there are some individuals--there
are multiple pathways to radicalization, and there are some
individuals who are motivated through religion, who benefit
from religious discussion. And there are a number of programs
in other countries--Internet-based, radio-based, television-
based interactive programs--to discuss these issues.
We don't need to do this all ourselves, and oftentimes we
probably should not be, and there are ways in which I think we
can support these programs in other countries. We can support
moderate--moderate voices that speak out in the region against
violence. This comes with a caveat that some of those voices
that are speaking out against violence are probably also
speaking out on issues that would be of great displeasure to a
number of people in this country. So we need to weigh the
balance of these issues.
The last point I would like to make is how we look forward
on some suggestions, and this is why I would highlight need for
research and further research. I guess this is no surprise
coming from an academic and a researcher. I think, basically, I
would say that it is unbelievable to me that almost 10 years
into this struggle we have yet to fully set up a way to address
dealing with these issues.
If you look 10 years into the Cold War, we had a much, much
better developed understanding of the Soviet Union, China,
communism, socialism, the Russian language, Chinese. We are
nowhere near that dealing with this issue. Across military,
universities, higher education, I mean, this is shocking to me
and I think this is something that we need to fix straightaway.
I think we also need to keep in mind that the Internet is
not always a perfect mirror for what is going on in the ground
in a lot of these countries. I think it is very easy to use the
Internet to try to understand what is going in places where
most Americans don't go, if it is Peshawar or Marab or other
places, but there is no replacement for actual on-the-ground
field research and interaction with people.
With that, I would like to highlight several other points,
and I think that there are ways that, because this is an
argument based on ideology and ideas, we can highlight the
flaws and the inherent discrepancies in these arguments. I
think doing this in conjunction with the more rigorous shut-
down approach is probably where I would say we should head
forward.
With that, I would like to conclude my remarks. Thank you
very much, and I look forward to your questions.
[The prepared statement of Mr. Boucek follows:]
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Mr. Sherman. We will now hear from our third witness, Mr.
Gregory McNeal. Mr. McNeal is an associate professor of law at
Pepperdine University School of Law located immediately
adjacent to the 27th Congressional District and previously
found in the 24th Congressional District of California. He has
also served in an advisory capacity on counterterrorism policy
to the Departments of Defense and Justice.
Mr. McNeal.
STATEMENT OF GREGORY S. MCNEAL, J.D., ASSOCIATE PROFESSOR OF
LAW, PEPPERDINE UNIVERSITY
Mr. McNeal. Chairman Sherman, Ranking Member Royce,
distinguished members of the subcommittee, it is an honor to be
here today to speak about the threat of terrorist Web sites and
the U.S. strategy to counter them.
As a professor at Pepperdine University, I specialize in
national security law and policy, and I have written
specifically about the threat of terrorist Web sites.
As a California resident, it is an honor to be here
speaking before the subcommittee, which has been so ably led by
California representatives, Congressmen Sherman and Royce.
In the era of home-grown terrorist plots, terrorist Web
sites are a grave threat to national security, which require a
three-pronged approach to combating them. That approach
combines monitoring for intelligence value, elimination and
destruction for operational gains, and co-optation for
propaganda and ideological value. My remarks today and my
written testimony focus on the elimination and destruction of
terrorist Web sites.
Eliminating selected extremist Web sites will enhance our
ability to collect intelligence by narrowing the field of enemy
sites we must monitor. A small number of Web sites will allow
for target efforts to undermine the jihadist message. Finally,
efforts which keep the enemy on the move impose costs on them.
They delegitimize them and at the margins make it more
difficult for potential recruits to become radicalized.
Today's headlines about a plot to engage in coordinated
Mumbai-style terrorist attacks reveals the critical importance
of countering the terrorist Web presence. Home-grown, low-
sophistication, high-casualty plots are increasingly
facilitated by jihadist Web sites.
Consider just a handful of our close calls here within the
United States.
Nidal Hasan, the Fort Hood attacker, was inspired by and
radicalized by terrorist Web sites. Those Web sites now hold
him up as a symbol of successful, home-grown attacks.
Najibullah Zazi, who planned a second series of attacks
against the New York City subway system, was radicalized and
educated through jihadist Web sites.
Faisal Shahzad, the Times Square bomber, was radicalized
through terrorist Web sites. It was there that he found his
inspiration and fixity of purpose that drove him to carry out
his attack.
Internet images of jihad were the singular tie binding
together the efforts of the Fort Dix plotters. And, moreover,
in the case of Ohio terrorists Mohammad Amawi, Marwan El-Hindi
and Wassam Mazloum, terrorist Web sites were the motivating and
enabling factor in the recruitment, providing them with
information about how to build bombs.
The common theme running throughout nearly every attempted
attack since September 11 is a radical ideology. That ideology
finds its home in a small core of Web sites with close
operational ties to al-Qaeda. Those core forums are the
mainstream media of extremist ideology. They have the label of
legitimacy. Their stories, videos, training materials, and
directives are picked up by mirror sites and repeated
throughout the Web. We should be disrupting their operations.
I would like to address a common myth that shutting down
terrorist Web sites does not work. I say this is a myth
because, to date, there has been no concerted government effort
to shut down these sites. I readily admit that the terrorist
Web presence cannot be eliminated, but that is not the goal of
what I am advocating for. Rather, the goal I believe we should
be pursuing is to impose costs on our enemies in time and
resources to narrow their potential Web hosts and corral them
into places of our choosing so we can monitor and co-op them.
It should not be easy for our enemies to recruit, train, and
proselytize.
The Internet is not a battlefield that should operate
according to the directives of our enemies. Rather, it is a
battle space that we should own. On the traditional
battlefield, few would argue that we should forego killing and
capturing terrorists merely because they may be quickly
replaced. Yet when it comes to the Internet that is exactly
what those who are opposed to shutting down these Web sites are
advocating for. Now, I am speaking in terms of warfare.
However, the fight against terrorist Web sites must be an
interagency effort. The intelligence community, the military,
law enforcement, and the State Department are all key players
in a comprehensive strategy to counter the threat of jihadist
Web sites. However, this should not be solely the province of
the executive branch. In fact, I believe that comprehensive
legislation directing and prescribing the activities of each
agency in the cyber realm is essential to national security.
Congress can and should make its mark before the executive
branch takes actions on its own, forming precedent without
policy. The threat of jihadist Web sites is one part of a
broader need for legislation directing of our Nation's cyber
war efforts. The key to countering the influence of terrorist
Web sites is to first ensure that those Web sites do not
receive any support from U.S. Web hosts. This can be
accomplished through application of existing laws and shaming
techniques. Second, we should eliminate selected sites using
existing statutes and Treasury regulations. Third, we should
work with allies to target those individuals who are supporting
Web sites abroad that are beyond the reach of our law. And,
finally, when necessary, actions should be taken by the
Pentagon's Joint Functional Component Command Network-Warfare
Unit and Cyber Command to shut down selected Web sites.
However, this should only be done after coordination and
consultation with the intelligence, law enforcement, and
diplomatic community; and Congress should be regularly informed
of these actions. Following these steps will go a long way
toward countering the influence of jihadist Web sites.
This concludes my formal remarks.
[The prepared statement of Mr. McNeal follows:]
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
Mr. Sherman. I thank you, Professor, and since you are
suggesting legislation--my law school professors used to assign
homework. I have always wanted to reverse that. So if you
haven't done so already, your homework assignment is to draft
proposed legislation implementing what you are talking about.
Unless you have already done that.
Mr. McNeal. Mr. Sherman, I would be happy to work with the
committee on drafting that legislation.
Mr. Sherman. And they say this job doesn't have perks. I
just gave a homework assignment to a law professor.
We are going to hear, first, questions from our ranking
member, Mr. Royce.
Mr. Royce. Let me ask a question of Mansour. You mentioned
that your move away from radical Islam or jihadist thinking
came as a result of an article that you read. I wondered if you
had read that on a Web site or if it was a pamphlet. I am
wondering how that idea got in circulation. You were in Sudan,
I think, at the time?
Mr. Al-Hadj. Saudi Arabia.
Mr. Royce. Saudi Arabia. I would also ask if--that is
Khales--what did you say his name was? Khales Jalabi?
Mr. Al-Hadj. Khales Jalabi, yes.
Mr. Royce. Is he widely read today? Is there sort of a
movement in Saudi Arabia?
No, not really?
Mr. Al-Hadj. Not really. He basically is considered like a
bad guy or something because he is against jihad. I mean, he
interprets Koran and jihad in Koran in another way, in a
peaceful way, and the radicals don't like him.
Mr. Royce. Tell me a little bit, real quickly.
Somebody behind you wanted to make a comment, I guess.
Ms. Alhani. Yes, because you were asking him about Khales
Jalabi, I would just add something he didn't know maybe, that
he is a Syrian writer. He writes--but, as you know, a writer.
He is Islamic, but he is not a radicalist or criminalist
either.
Mr. Royce. I see.
Mr. Sherman. Normally, we don't hear from anyone sitting in
the audience, but you are allowed to--but the one requirement
is that the woman who just spoke needs to identify herself for
the record. Can you give us your name, please?
Ms. Alhani. I am Fawziah Alhani. I am a human rights
activist. I was attending another conference here.
Mr. Sherman. Thank you for your name.
Mr. Royce. What I was trying to understand better was, in
society, you went to a particular school and in that school
these ideas were prevalent. Was the institution that you were
in dissimilar in some ways to other schools or do you think
this is sort of the mindset that many teachers have?
Mr. Al-Hadj. Yes. I went to college in Sudan, the
International University of Africa. In that university there
are students from all parts of Africa and the world. Actually,
there are American students, too.
That is an Islamic university. The things that they are
teaching there are just anti-Western things; and, actually,
one--many of the students at the time when I was there, they go
and wage jihad. They are highly respected. They don't have to
attend any classes, and they would really pass the exams
without anything. And, actually, one of my professors died--he
lost his life in this jihad.
So the Islamist Government of Sudan, doing this, you know,
to spread their ideology, they want to have as many Islamic
States in Africa or around the world. So they are spreading
this through bringing students, giving them free scholarships
to come to this particular school, and teaching them this anti-
Western and anti-human rights and things.
So the day of the 9/11, when the Towers hit, I was there. I
was a student there, and all that you hear is the cheers and
people were very happy, without knowing what happened, who did
that. Just because America was hit, it's something very happy
for them.
Mr. Royce. I have been to Sudan and Darfur. One of the
concerns I have about the particular institutions that we are
talking about is the way they push martyrdom but also the way
they pushed sort of a genocidal campaign, originally in South
Sudan, and now it is in Darfur. But in South Sudan that is when
you were there, they were pushing this idea.
And just to get off the topic for a minute, is it realistic
to think that the government in Khartoum, with this recent
history of promoting the type of jihad that we saw carried out,
including the genocidal campaigns, would be willing to allow
for the south to secede if that is the referendum's outcome
that is in Sudan? You don't have to answer that, but I do
wonder.
The Sudan Government has made this agreement, but given
what the old National Islamic Front Government did in terms of
creating this atmosphere, I wonder if it is possible for them
to live with the result of the referendum in the south.
Mr. Al-Hadj. Well, right now, they are coming with some
ideas. They actually are thinking of delaying the referendum;
and, you know, they are really bothered by, you know, American
support for the right for southern Sudanese to choose whether
they stay united with one Sudan or have their own country. But
for them that would be problematic, and I don't think they
would allow that to happen.
Mr. Royce. One other quick question. In Saudi Arabia, how
prevalent do you think the teaching in the textbooks and so
forth--what is the prevailing view on this kind of activity?
What is the mindset in the schools?
Mr. Al-Hadj. Well, I was--I went to school in Saudi Arabia,
and the textbooks are really--they are anti-Western things.
They teach us that, you know, a Muslim and Jewish are enemies
at the end of the day, and sometimes in the future they will
fight each other. And even the trees and stone will help the
Muslim kill the Jewish. So these things, I--you know, they
taught me these things.
Mr. Royce. Yes.
Mr. Al-Hadj. And one of the things that, you know, I now
feel really sorry about it, that, in the past, they taught us
the story of our Prophet Muhammad killing a whole tribe, the
Banu Qurayza tribe in Medina, because of treason or something.
When I hear that story, when I was young, you know, it didn't
make any difference. I didn't feel any sorry. I didn't think
that the Prophet, you know, had done something really horrible.
So, you know, there is no way of questioning the history of
Islam. And, actually, right now, one religious guy in Saudi
Arabia, he is one of the writers of the textbooks, the new
textbooks. He is really radical, and he actually wants to have
like separation in the grand mosques so women can be, you know,
on one side and men can be on the other side, and he is one of
the people who is writing the books for kids.
So it is in there, and it needs to be reformed.
Mr. Royce. If I could ask one more question, and I will ask
that of Dr. McNeal.
You mentioned in your testimony, Dr. McNeal, that Treasury
has not aggressively attempted to cut off cyber services to
terrorism supporters, not even key al-Qaeda facilitators. I was
going to ask you why, and what grade would you give that effort
in the last administration as well as in this administration?
What is afoot here?
Mr. McNeal. I would be hesitant to give a, grade only
because I haven't seen all the papers before me to grade all of
them. But Treasury can do more, and it is obvious they can do
more. In my written remarks, I highlighted a Web site of a key
al-Qaeda facilitator who is still receiving domain-name
services from a company in Oregon. This was as of Monday, I
conducted the search and found the Web site myself. It included
some Google-translated passages of advocacy of jihad. So that
suggests to me on the surface that there could be a resource
issue or a focus issue.
So that is not meant to disparage the efforts of those at
Treasury, but, rather, suggest that maybe greater direction or
focus needs to be placed on this problem. And I don't think
across the executive branch there has been a focus on these Web
sites, as indicated by both your opening remarks and
Congressman Sherman's opening remarks. So it is a matter of
motivation rather than a matter of desire, I think.
Mr. Royce. Thank you.
I am out of time. I yield back, Mr. Chairman.
Mr. Sherman. Thank you, Mr. Royce.
I should point out that Congressman Ellison may be back. He
is not a member of this subcommittee, but he does have the
great honor of serving on the full committee, and he will be
allowed to ask questions of the witnesses after members of the
subcommittee have completed their questioning.
With that, I will recognize Mr. Scott.
Mr. Scott. Thank you, Mr. Chairman.
Mr. Al-Hadj, your testimony and your comments are both
enlightening and yet troubling, because it seems to me the
culture of many of our Muslim countries and the whole attitude
of the younger generations that are coming along, the anti-
West, anti-United States, anti-Jewish sentiment appears to be
growing instead of receding. Is that a fair statement?
Mr. Al-Hadj. I think so, yes, because of many things. These
things, they are in the saying of the prophet. And the media in
the Middle East is always trying to show the U.S. as the cause
of every problem on Muslim people around the world. So it is an
anti-Western notion that really keeps on growing. And something
that the Muslim community here in the United States are not
doing is to speak out and go and tell people that we are not
disenfranchised here in America. We enjoy all the freedom and
things.
I came to this country 5 years ago. And when I chat with my
friends, they ask me, Hey, are you allowed to go to the mosque?
Does nobody cause you any problems? Are Muslims hated in
America? But this is not true. I don't see an anti-Muslim
thing. But when you see the media and the Muslim activists or
Muslim organizations when they appear in the media, they are
always trying to make themselves as victims, and there is
really anti-Muslim things going on in America, but this is not
true.
Mr. Scott. There has to be some element of responsibility
taken by the leadership in some of our more moderate Muslim
countries. What is holding that back? Is there a fear, there is
a reluctance? Because no matter what we do--I mean, if somebody
hates you because you are Jewish or if somebody hates you
because you are from the United States, no matter what we do,
we are not the instrument that can change that.
Something has to change within the culture over there, and
I just don't see positive forward leadership on the part of
people who you would feel--educated, who work with this
country, have relationships with it--not taking the leadership
in these Muslim communities to correct this perception. No
matter what we do, we may get interception dealing with the
Internet, but that is not going to stop until we can change
some attitudes and reverse this trend of anti-Americanism and
anti-Israel and Jewish feelings within the Muslim world.
Quite honestly, the tragedy of the situation is that if it
does not happen, we are headed down a very, very dangerous road
here if we don't get some cooperation from the Muslim world and
the leadership to help correct this perception. Because if what
you say is true of how these younger people are just getting
this hatred, unfounded, we are not the answer to that because
we are the devil to them, we are the Satan to them. It has to
come from the Muslim community itself.
I don't want to belabor that, but I hope we have some signs
of hope there. Do we? Do we have some signs of hope that we can
get some counter--to me that is the best counterterrorism we
could have, help coming from the Muslim communities to
straighten out a lot of the misinformation that is formulating
these attitudes that make these young people ripe for
recruitment.
I just came from a trip over into Africa and went into the
Casablanca area. And that country, Morocco, surprisingly, is a
leading country in recruiting terrorists. And supposedly it is
our friend. I mean, we give money there, Rick's Cafe is there;
a great American movie was named for it called Casablanca--you
probably don't remember that--starring Humphrey Bogart some
years ago.
But anyway, I would hope that this committee hearing can at
least--we can make a dramatic statement that we need to get
greater cooperation from the moderate Muslim leadership in the
world to help us in this. I think that is going to be the way
it will do.
But let me ask you, Mr. McNeal, in your testimony you wrote
that independent watchdog sites stand in the best position to
monitor jihadi extremist sites. Let me ask you in relationship
to that, what is being done to ensure that independent watchdog
sites are acting legally and appropriately?
Mr. McNeal. It would be difficult to imagine how, short of
them shutting a Web site down themselves, how they would be
violating the law. Generally, these independent watchdog sites
monitor these Web sites and then use shaming techniques to try
to get the Web sites shut down.
We heard Mr. Al-Hadj's example about--I think it was 32 out
of 50 or something, pretty good result, of Internet service
providers who, once they are notified that these jihadist Web
sites are present on their servers, they shut them down
voluntarily. And so, short of these watchdog groups engaging in
some sort of denial of service attack, there isn't a violation
of the law there.
And I think actually that these watchdog groups should be
encouraged in that respect, because the Web is so expansive,
the Web sites are so dynamic in switching servers that the
Federal Government wouldn't be able to do it on its own. This
is sort of the equivalent of your local neighborhood watch
providing tips to law enforcement about crimes being committed
in the community.
I think the shortfall is that when these Web sites inform
law enforcement--or Treasury, let's say, about the presence--
when these watchdogs inform law enforcement about the presence
of these Web sites, it is not always followed up on. And we
have tools to issue cease-and-desist orders to Web hosts who
are providing services to designated groups; however, if it is
a nondesignated group, it is just a person advocating jihad,
there is currently no law which allows us to have that type of
material removed from a Web site. The YouTube examples that
were cited earlier are a prime example of that. But I think for
the most part these groups, unless they are conducting direct
attacks against Web sites, are not violating the law.
Mr. Scott. Okay. Let me go back to you for a moment, Mr.
Boucek--I don't mean to murder everybody's name up there, but I
did get McNeal right. I could handle that.
You wrote that to get ahead of al-Qaeda and Islamic
extremism more broadly, we will need to shift to be proactive
and not just reactive.
That brings me to the point I mentioned first in my
questioning with Mr. Al-Hadj; and that is, what more can we do
to encourage the moderate voices? Because I sincerely believe
this is the key going forward. We have got to figure out a way
to break down this wall and to turn this attitude around or
else we are just chasing our tail here.
What do you think more we could do to encourage the
moderate voices in the Arab and Muslim world, some that have
already, to a degree, spoken out against violence and
extremism? What more can we do, or should we be doing to
encourage this? Are you satisfied with where we are?
Mr. Boucek. Thank you very much.
I think this is an excellent question. I think there is an
awful lot that we can do, because there are an increasing
number of moderate voices speaking out against violence in the
region. I think you could come up with a huge list of clerics
and sheiks and officials throughout the Muslim world, in Saudi
Arabia and Egypt, who have spoken out saying that violence and
terrorism is wrong and have taken action to criminalize these
activities.
I think there are things we can do to help get that message
out. I think we can begin by probably starting from a position
that we need to know more about them so we can talk about them.
But also I think there are ways that we can help get those
messages out by promoting cooperation amongst different
countries. So sharing best practices and technologies for how
to get these messages out, how to do education. I also think
there are probably ways that you can manipulate search results
and do other things, which is far beyond my technical
education.
I think another interesting point that I think leads to
something you mentioned earlier in your remarks is this issue
of this rising anti-American or anti-Western sentiment. I think
there are lots of causes for that. And I think it is not just
religious motivation, I think it is a whole range of things
from social conditions, governments, education, corruption,
that feed into this process. So I think we need to step back
and say that there is a much larger cause for it.
I think we also need to recognize that as there are many
pathways of how people do get into violence or radicalization,
people do step back from it. There is a growing body of
research to suggest that people do leave militant groups and
terrorist organizations. Once we understand this better, we can
help facilitate that process, I think.
Mr. Sherman. I will now call upon Mr. Ellison for 5 minutes
of questioning.
Mr. Ellison. Well, let me thank Chairman Sherman for this
hearing. I think it is very important. Unfortunately, due to
multiple demands, I wasn't able to hear all of the testimony,
but I appreciate the work that you all have done. I think it is
important.
I think that we don't know nearly enough, and the pursuit
of how to be more effective in countering violent
radicalization is something we all have to devote more time and
energy to. But since I didn't get to hear everything, let me
just throw out a few ideas I have had and perhaps I can get
your reaction.
I think that what needs to happen most of all here is that
these Web sites need to have some competition of ideas. And
what I mean by that is that if you suppress a Web site--and any
Web site that is proposing violent radicalization or how to--I
think you just get rid of it and that is the right thing to do.
But one that is just offering these extremist ideas, I think it
may be more effective to compete with their ideology rather
than simply suppress it. And the reason why is that these
people who--it seems to me their essential argument is that
America is at war with Islam. America is not at war with any
religion. America is at peace with all religions.
But if they want to argue that America is at war with
Islam, the most effective thing to do is not simply to suppress
the argument, but to actually take that argument head-on by
talking about a number of things like our Constitution and
freedom of religion, by talking about how Muslim Americans are
doing, actually prospering pretty well; by talking about how
leaders like Michael Bloomberg have stood up and said that the
Manhattan Islamic Center has as much right to be there as any
other institution does; how the President stood up and spoke on
this issue; and how leaders--Muslim, Christian, Jewish of
various faiths--said that the threatened Koran burning was
reprehensible.
I mean, I think that we should take on this claim that
America is at war with Islam, because I am clear that it is
not; and yet if we just suppress it and don't really offer a
competing vision, then we may be missing an opportunity, and we
might even hand these people an opportunity to say, See, this
is just them trying to--they don't want you to hear our side,
kind of, argument.
Let me also offer you these ideas because I know the title
of this hearing today is Jihadist Web sites. Personally, I
don't like the terminology. And the reason why is that, to a
Western audience the word ``jihad'' is a foreign word, it
sounds scary, it is certainly used in a scary way, and so it
whips us up over here in America. But to the Arabic-speaking
world, it is much more akin to the term ``freedom fighter.'' So
why would we let----
Mr. Sherman. Mr. Ellison, in my opening remarks I did
comment on the preferred term being something along the lines
of ``terrorist'' or ``extremist,'' and discussed how the word
``jihadist'' might----
Mr. Ellison. Yes. And that is not meant as a critique, and
I appreciate your acknowledging that, Chairman Sherman. And let
me just say this quite simply, and you all may agree or
disagree, from the standpoint of Anwar al-Awlaki, he wants to
associate what he is talking about with Islam so that he can go
out to the Muslim world and say, I am the standard bearer for
Islam and I want you to do this in defense of Islam. Well, we
should strip them of that and say, You are not representing
Islam, you are representing murder and killing. And so they
would love to use Islam as a veneer to sort of market their
ideas, and I think we should really figure out how do we deny
them that.
I was making this point with somebody a few months ago and
they said, Well, this is what they call themselves. I said,
Well, that is exactly why we shouldn't call them that. None of
us would say that Timothy McVeigh is a freedom fighter, even if
he called himself that; we call him a mass murderer. Well, we
should call Anwar al-Awlaki a promoter of mass murder and we
should call Osama bin Ladenan actual mass murderer.
So whenever we say Islamic terrorists, Islamic--we are
always associating it with Islam. I think that we think we are
standing up against the bad guys, but I think we may
unwittingly be actually helping to reinforce their argument.
I haven't dropped it yet, but I am actually really sort of
thinking a lot about perhaps a study bill on violent
radicalization. I know Jane Harman has done this in the past.
It was met by many people in the civil rights and civil
liberties community with opposition, because they thought it
would lead to violation of human and civil rights.
I guess I am running out of time, but if I may, could I
wrap up, Mr. Chairman?
Mr. Sherman. You may.
Mr. Ellison. I think that we don't know enough about the
topic, which is why we profile, which is why we stop the guy
with the worry beads and the beard and kick him off the plane,
when we are letting the other one go by who is the real danger.
I have pontificated long enough. Thank you very much for
listening. And if there is ever any time, I would love to hear
your views on what I said.
Mr. Sherman. I thank the gentleman.
I would comment that in my district, a mosque is being
built, and the only controversy is whether it has enough
parking spaces.
An article in the Case Western Reserve University Journal
of International Law discusses the strategy for containing and
removing terrorist material through a process of shaming those
who provide the Web sites to extremists. Limiting the countries
which host these Web sites, they argue, will make it easier to
track and control.
Dr. Boucek, is the strategy of just naming, shaming,
viable? And in particular, in your testimony you talk about
YouTube, and apparently al-Qaeda in the Arabian Peninsula has a
site. I know I have a site, Keith has a site, David has a site.
Is that site still up just because nobody has bothered to
contact YouTube, or is it up because YouTube has decided to
leave it up?
Mr. Boucek. Thank you very much.
Taking your last point first, I cannot tell you why it is
still up. At least earlier this week, on Monday----
Mr. Sherman. Are you aware of anybody who has contacted
YouTube and said, ``Hey, do you know about this?''
Mr. Boucek. There are some people who have mentioned this
before. I don't think it is very well known that there is this
site. Probably more disturbing, the video content that is
available has been replicated across any number of other sites
now. The very concerning thing to me, though----
Mr. Sherman. You obviously find these sites. When you
personally find them, do you drop a line to YouTube? Do they
read their mail?
Mr. Boucek. In this case, no, I have not.
Mr. Sherman. Well, homework assignments are not limited to
law professors. To start this out, give me a list of the sites.
I will put a letterhead on top of it just to make sure that it
is read by somebody at a more senior level and we will see what
happens.
Mr. McNeal. Chairman Sherman, just on that point, may I
interject?
Mr. Sherman. Yes.
Mr. McNeal. About a year ago, Senator Lieberman sent
letters to YouTube requesting this, and their response was they
will evaluate content that is flagged as inappropriate, but
they value individuals' free-speech rights. So we have a legal
limitation because under section 230 of the Communications
Decency Act, Web providers, it is up to them whether or not
they can take something down and determine whether or not it is
obscene.
Mr. Sherman. Well, this is not obscene; this is put up by a
terrorist organization. This seems to have some of the content
of al-Qaeda in the Arabian Peninsula. This is the official site
of al-Qaeda. I don't think there is any doubt that our
terrorism laws do not allow U.S. corporations to do business
with terrorist organizations.
Mr. Boucek. I am able to explain why this particular
YouTube channel is still available.
Over the summer, in July----
Mr. Sherman. Well, we have a law professor here as well.
Let's say somebody is inspired by this site, and let's say they
kill somebody; are you certain that YouTube would escape civil
liability?
Mr. McNeal. I am certain they would escape criminal
liability. I am not certain if they would escape civil
liability. I believe the issue and the argument that was put
forth by YouTube, when this came up last year, is that it is
difficult for them to isolate the identity of who it is. And so
their site may say, We are the official YouTube channel of al-
Qaeda in the Arabian Peninsula. But YouTube is unable to verify
that, and therefore their policy is one of openness and
dialogue and shout-down, that type of thing.
Mr. Sherman. Terrorism laws would be absolutely meaningless
if you could do business with a terrorist organization
operating under its own name and say, ``Well, there was no
certified letter from a deity proving that there was in fact a
terrorist organization.''
Mr. McNeal. Chairman Sherman, we are in agreement on this.
I think that more action needs to be taken and screws need to
be turned against these service providers, whether they are the
biggest, YouTube, or the smallest----
Mr. Sherman. Well, I don't know how much money YouTube
makes and how much its executives make, but they are
endangering people throughout America for their own profit. And
it is not out of great loyalty to the concept of the First
Amendment, it is out of great loyalty to money. They feel that
if they let everybody on, that just makes a little bit more
money for them. And for them to endanger lives nationwide for
that reason is a decision that they have made. And if they want
to take down my site, they are welcome to. As a matter of fact,
this will be up on my site.
Yes.
Mr. Boucek. I think the only point that I can contribute to
this is that in the beginning of July there was the release of
this English-speaking magazine, ``Inspire,'' that you had
alluded to in your opening remarks. Shortly thereafter, this
channel appeared. I think one can draw the conclusion that
there is a connection. As of this week when I checked this
channel, all of the videos are still available, and this person
is accessing this site frequently and updating this material.
Mr. Sherman. So this is a secondary site that is taking its
content from the site of YouTube----
Mr. Boucek. No. This is the YouTube channel that we have
been discussing.
Mr. Sherman. Okay. So this is a channel that brands itself
as the official site of al-Qaeda in the Arabian Peninsula.
Mr. Boucek. That is correct. It brands itself as the media
arm for AQAP. And the very concerning thing, which I think we
have all highlighted, is that you no longer need to have much
knowledge or language capacity to access this. You can get all
of these videos and you can consume them, just knowing English
from anywhere.
Mr. Sherman. Now, does the content of this site advocate
violent action against Americans?
Mr. Boucek. I think al-Qaeda in the Arabian Peninsula has
been very clear about its positions.
Mr. Sherman. I know what their positions are, but in terms
of what they have chosen to put up.
Mr. Boucek. In some of the videos they have been advocating
violence against American interests, American allies, American
partners. I think that there is no reason why this should be
available. I can't give you an answer on that.
Mr. Sherman. And is there material there that provides
useful information to those who wish to be terrorists as to how
to make a bomb, how to sneak in a bomb?
Mr. Boucek. Just real quickly I would say, as opposed to
``Inspire'' magazine that provides actual tactical
information--how to assemble explosives, what to bring on
jihad, how to engage in operations--what this does is provide
you with the theological and ideological justifications to get
you to that point.
Mr. Sherman. Okay. But it is a little bit more provable
that something is reprehensible when it says, Here is how to
make a bomb, rather than, ``Here is why American foreign policy
is so bad that you should hate America.'' There are aspects of
U.S. policy that I personally hate.
Let me hear from Mr. Al-Hadj.
Mr. Al-Hadj. Thank you, Mr. Chairman.
As I was coming to this hearing, one of the jihadi Web
sites linked its site to a Facebook account. And the last thing
I saw was a post on how you can make a car bomb like the one
Faisal Shahzad did. And they are encouraging people, like
specific details on how you can make----
Mr. Sherman. I am going to ask you to suspend for just 1
second.
Please proceed.
Mr. Al-Hadj. Yes. As I was coming here, there was this post
on Facebook----
Mr. Sherman. And let me just remark for the record, the
U.S. Government does have efforts to put things up on the Web
that are part of our public diplomacy program to debunk what
terrorists have to say. I know that is important to the
gentleman from Minnesota.
As to whether there will be further efforts is something I
can talk to him about on the floor. But I do think the record
should reflect that while we are discussing what the terrorists
are doing on the Web site, we are of course using the Internet
to communicate a much more wholesome message.
The gentleman will proceed.
Mr. Al-Hadj. So Facebook was posting the same post that was
on this jihadi Web site, encouraging lone wolves or individuals
who want to persecute an operation or a suicide mission, how
specifically--with small details how to make a car bomb, what
should you buy, like materials, easy materials, very accessible
to everybody--how you can make a car bomb and do it.
Mr. Sherman. So you go to Facebook, and then that refers
you to a site that gives you not just ideology, but ``how to''
practical information for terrorism.
Mr. Al-Hadj. You go to the jihadi Web site and there is a
Facebook sign on it saying, ``You can join us on Facebook.'' So
once you click there, you will receive whatever they post in
there.
Mr. Sherman. Thank you.
Mr. McNeal, we can always ask somebody to take material
down. Some sites in certain countries won't do that. How easy
is it for us as a technical matter to just use cyber attack and
take the site down?
Mr. McNeal. We have the capacity. There was an example I
think that you alluded to in your opening remarks that was
reported in the Washington Post about a site that was known
as--the term in the field is a ``honey pot.'' It is
purposefully set up to bring in terrorists and track them. This
was a joint operation between the CIA and the Saudi Government.
Mr. Sherman. And that is the one we took down?
Mr. McNeal. That is the one we took down. But actually, the
debate over it was a healthy one that we should be having more
of. The reason we took it down is that our commanding general
in Iraq, General Odienero, said that this site was in fact
costing American lives. And there was an interagency fight
between DOD and the Intelligence Community on whether or not to
take the site down.
Mr. Sherman. Was it taken down because it was a site
sponsored by the U.S. Government and they just flipped the off
switch, or did we cyber attack a site that another government
agency was paying to put up?
Mr. McNeal. From the public reports, we took out a site
that was run by the Saudi Government, with the cooperation of
the Central Intelligence Agency. The rationale for it was that
the site was providing information about how to conduct
coordinated attacks on U.S. troops in Iraq. And what happens in
these types of interagency----
Mr. Sherman. Did we use a cyber attack to take it down?
Mr. McNeal. Yes, it was a denial-of-service attack. The
collateral consequences of that, though, were that not only was
this site taken down, there were some sites in Texas and other
places that were affected by taking out the server.
The reason these debates come up is--it was partly alluded
to in my written remarks, in that there are many who believe
that keeping these sites up provides an intelligence value. And
so the fight between DOD and the Intelligence Community was
that if you leave it up, we could continue to observe and learn
more about what these individuals are doing. And that is the
primary push from the Intelligence Community's perspective is
always to gather more information to connect the dots.
It was healthy, I think, that we had that debate between
taking it out and leaving it up, but it was an ad hoc one
through a task force, rather than an agency or a division
within an agency structure to force us to have that type of
communication.
Mr. Sherman. Now, with regard to sites that are not
maintained by ourselves or other governments that we are
cooperating with, are we able to determine at least the e-mail
address of those who are visiting the sites?
Mr. McNeal. Not necessarily the e-mail address, but IP
address logs, server logs, can tell us----
Mr. Sherman. That is only if the Web site server and
provider cooperates with us. So if there is, for example, in
Iran a Web site server and the Iranian Government chooses not
to cooperate with us, then by monitoring the site we can know
what the terrorists want to say, but we have no idea who they
are saying it to.
Mr. McNeal. For the most part, that is correct, Mr.
Chairman. There are people who, through covert methods, can
infiltrate networks and find information out irrespective of
the location of the network.
The bigger challenge, I think, is that, particularly with
regard to foreign Web hosts, is that because they are beyond
the reach oftentimes of U.S. laws, we don't have a lot of ways
to turn the screws to them, unless we were to back out sort of
one level from that site and, almost like a trade embargo, say
that you, Web provider, can no longer do Internet business with
U.S. service providers if you continue to provide service to
that Web site.
And then the Iranian company, to use your example, would
have to choose between supporting this one Web site or losing
all of its commercial traffic from the United States. I think
that would probably be an easy choice.
Mr. Sherman. But the argument is gathering intelligence
versus taking down the terrorist site. And the question is, are
we really able to gather valuable intelligence? And there are
two aspects of this intelligence: What do terrorists want to
say? Second, which individuals seem interested in what
terrorists have to say--which, by the way, includes many people
in this room.
And you are saying that the second type of information is
probably available only with the cooperation of the site Web
provider.
Mr. McNeal. These are more forums than Web sites, so unless
an individual posing as a member of the forum could get inside
and be seen as a legitimate person who is communicating and
supporting ongoing activities.
Mr. Sherman. And even if you knew somebody was part of that
forum, they might not use their real name.
Mr. McNeal. Right. But the goal, Mr. Chairman, would be to
engage that person in conversation about operational plots they
might want to take part in, and then go from the cyber world to
the real world. There are some examples of us doing this in
cooperation with law enforcement in Europe.
Mr. Sherman. Well, I think we end this hearing with more
specific knowledge, but we end this hearing in the same
position; and that is that we will use the Internet for our own
public diplomacy effort. We will certainly monitor what
terrorists have to say, and that will help us with our own
public diplomacy. And we will occasionally be able to detect
who on these sites mean us harm.
But we are unsuccessful in taking down sites--often we are
unsuccessful--by sending people letters, and we are manifestly
unable to take down these sites through cyber attack, because
we are constrained by our own politeness. And being polite is
good as long as it doesn't cost American lives.
So I thank everyone for coming. Additional statements can
be made for the record. I believe we are being called for a
vote. I want to thank our vice chair and our ranking member for
being here at the hearing.
Thank you.
[Whereupon, at 3:05 p.m., the subcommittee was adjourned.]
A P P E N D I X
----------
Material Submitted for the Hearing Record
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|