[House Hearing, 111 Congress]
[From the U.S. Government Printing Office]
INTERNET TERROR RECRUITMENT AND TRADECRAFT: HOW CAN WE ADDRESS AN
EVOLVING TOOL WHILE PROTECTING FREE SPEECH?
=======================================================================
HEARING
before the
SUBCOMMITTEE ON INTELLIGENCE,
INFORMATION SHARING, AND
TERRORISM RISK ASSESSMENT
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED ELEVENTH CONGRESS
SECOND SESSION
__________
MAY 26, 2010
__________
Serial No. 111-67
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC] [TIFF OMITTED] TONGRESS.#13
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
63-091 WASHINGTON : 2010
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office, http://bookstore.gpo.gov. For more information, contact the
GPO Customer Contact Center, U.S. Government Printing Office.
Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, gpo@custhelp.com.
COMMITTEE ON HOMELAND SECURITY
Bennie G. Thompson, Mississippi, Chairman
Loretta Sanchez, California Peter T. King, New York
Jane Harman, California Lamar Smith, Texas
Peter A. DeFazio, Oregon Daniel E. Lungren, California
Eleanor Holmes Norton, District of Mike Rogers, Alabama
Columbia Michael T. McCaul, Texas
Zoe Lofgren, California Charles W. Dent, Pennsylvania
Sheila Jackson Lee, Texas Gus M. Bilirakis, Florida
Henry Cuellar, Texas Paul C. Broun, Georgia
Christopher P. Carney, Pennsylvania Candice S. Miller, Michigan
Yvette D. Clarke, New York Pete Olson, Texas
Laura Richardson, California Anh ``Joseph'' Cao, Louisiana
Ann Kirkpatrick, Arizona Steve Austria, Ohio
Bill Pascrell, Jr., New Jersey Vacancy
Emanuel Cleaver, Missouri
Al Green, Texas
James A. Himes, Connecticut
Mary Jo Kilroy, Ohio
Dina Titus, Nevada
William L. Owens, New York
Vacancy
Vacancy
I. Lanier Avant, Staff Director
Rosaline Cohen, Chief Counsel
Michael Twinchek, Chief Clerk
Robert O'Connor, Minority Staff Director
------
SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK
ASSESSMENT
Jane Harman, California, Chair
Christopher P. Carney, Pennsylvania Michael T. McCaul, Texas
Yvette D. Clarke, New York Charles W. Dent, Pennsylvania
Laura Richardson, California Paul C. Broun, Georgia
Ann Kirkpatrick, Arizona Peter T. King, New York (Ex
Al Green, Texas Officio)
James A. Himes, Connecticut Vacancy
Bennie G. Thompson, Mississippi (Ex
Officio)
Michael Blinde, Staff Director
Natalie Nixon, Deputy Chief Clerk
Meghann Peterlin, Minority Subcommittee Lead
C O N T E N T S
----------
Page
Statements
The Honorable Jane Harman, a Representative in Congress From the
State of California, and Chair, Subcommittee on Intelligence,
Information Sharing, and Terrorism Risk Assessment............. 1
The Honorable Michael T. McCaul, a Representative in Congress
From the State of Texas, and Ranking Member, Subcommittee on
Intelligence, Information Sharing, and Terrorism Risk
Assessment..................................................... 3
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Chairman, Committee on
Homeland Security.............................................. 4
Witnesses
Mr. Bruce Hoffman, Professor, Edmund A. Walsh School of Foreign
Service, Georgetown University:
Oral Statement................................................. 6
Joint Prepared Statement....................................... 9
Mr. Brian Michael Jenkins, Senior Adviser, The Rand Corporation:
Oral Statement................................................. 14
Joint Prepared Statement....................................... 16
Mr. Anthony D. Romero, Executive Director, American Civil
Liberties Union:
Oral Statement................................................. 19
Joint Prepared Statement....................................... 21
Mr. John B. Morris, Jr., General Counsel, Center for Democracy
and Technology:
Oral Statement................................................. 28
Joint Prepared Statement....................................... 30
Mr. John Philip Mudd, Senior Research Fellow, Counterterrorism
Strategy Initiative, New America Foundation:
Oral Statement................................................. 36
Joint Prepared Statement....................................... 38
INTERNET TERROR RECRUITMENT AND TRADECRAFT: HOW CAN WE ADDRESS AN
EVOLVING TOOL WHILE PROTECTING FREE SPEECH?
----------
Wednesday, May 26, 2010
U.S. House of Representatives,
Committee on Homeland Security,
Subcommittee on Intelligence, Information Sharing, and
Terrorism Risk Assessment,
Washington, DC.
The subcommittee met, pursuant to call, at 10:04 a.m., in
Room 311, Cannon House Office Building, Hon. Jane Harman [Chair
of the subcommittee] presiding.
Present: Representatives Harman, Carney, Green, Himes,
Thompson (ex officio), McCaul, and Dent.
Ms. Harman. The subcommittee will come to order. The
subcommittee is meeting today to receive testimony on the
question of ``Internet Terror Recruitment and Tradecraft: How
Can We Address an Evolving Tool While Protecting Free Speech?''
Let me say that again, ``How Can We Address an Evolving Tool
While Protecting Free Speech?''
I would like to welcome our witnesses.
Recent terror attacks and plots have taught us that the
lonely, vulnerable, or disaffected are just a few mouse clicks
away from terrorist recruiters. The anonymity of the internet
and the sheer speed of communications across it make it an easy
tool for recruiting and for streamlining terror group training
and operations.
According to the FBI, the Christmas day bomber, Umar Farouk
Abdulmuttalab, was recruited on the internet and trained in
just 6 weeks.
A Philadelphia woman, Colleen LaRose, who assumed the name
Jihad Jane on-line, apparently used YouTube and other websites
to post communications about staging attacks in the United
States, Europe, and South Asia.
The Fort Hood shooter, Major Malik Hasan, used e-mail to
recontact an American cleric in Yemen, Anwar al-Awlaki, who
just last weekend posted another internet video calling for the
death of more civilians modeled after Hasan's point-blank
assault of deploying service members in the medical units in
Fort Hood. To remind us, Hasan killed 13 and wounded 31.
Hasan's family attended the Dar al-Hijrah Islamic Center in
Falls Church, Virginia, where al-Awlaki was preaching in 2001.
Around the same time, two 9/11 hijackers worshipped at the
mosque.
Najibullah Zazi, who was arrested last year when his plot
to bomb the New York subway was uncovered, searched beauty
salon and home improvement store websites on multiple occasions
for chemicals to make a bomb. He also researched bomb-making
instructions from internet sites.
Adam Gadahn, an American citizen from California, now
serves as al-Qaeda's English language spokesman under the
pseudonym Azzam al-Amriki. He has produced propaganda videos
that are circulated over the internet which encourage Muslims
join the global extremist movement and take part ``in slitting
the throats of the infidel.''
The dilemma is that the internet is a forum for free speech
and global commerce. But the underside is that it can also be a
forum for violence and global terror. How to respect individual
freedom and access and yet find those who abuse the internet
and stop them before they act is a huge and difficult
challenge.
Let me be clear, and many have heard me say this over and
over and over again, liberty and security are not a zero sum
game. We don't get more of one and less of the other. We get
more of both or less. In fact, we must get more of both.
Security without the liberties that our Constitution protects
and Americans treasure is not security.
Our subcommittee has been wrestling with this problem for a
while, and as many know, this is our third hearing on the
threat posed to the U.S. homeland by violent extremism.
The purpose of today's hearing is to analyze the use of the
internet as a facilitator for recruitment training and
development of terror plots. The problem is the internet
combines speed and anonymity in a way that complicates law
enforcement and intelligence work exponentially.
I am very glad that Anthony Romero, the able Executive
Director of the ACLU and well-known commentator on this issue,
is here at my personal invitation to testify about how to guard
the privacy and civil liberties of individuals who use the
internet for the right reasons. I consult with Anthony
regularly, and I thank him for being here.
But I also thank our other witnesses, also friends and
colleagues, who have thought deeply and written extensively on
these topics. Dr. Bruce Hoffman, a professor at Georgetown
University, will discuss the evolving nature of the terror
network tactics on the internet. Your testimony is excellent,
Bruce.
Brian Jenkins, from California, a senior adviser at the
RAND Corporation, will discuss his latest report, ``Incidents
of Jihadist Terrorist Radicalization in the U.S. Since 9/11.''
Phil Mudd, who retired from the FBI this year as Associate
Executive Director of the National Security Branch, will
discuss U.S. efforts to conduct surveillance of internet
communications and how the FBI currently intervenes.
We will also hear from John Morris, General Counsel for the
Center for Democracy and Technology.
Welcome to you all.
As difficult and controversial as this subject is, we need
to find the right way and place to intercept those who would do
us harm. Developing a strategy around the internet is not
optional. It has to be part of the equation.
I now yield 5 minutes to the Ranking Member for an opening
statement.
Mr. McCaul. Thank you, Madam Chair. Thank you for having
this very timely and important hearing. I want to thank the
witnesses on our distinguished panel. You are among the top
experts in the country on this issue. Thank you for being here.
The threat of terror seen on the internet to recruit others
and spread their ideology is very real. While I know there is
debate about what we can do about it, I don't think anyone here
could dispute the fact that terrorists are successfully using
the internet to help spread their message.
The internet allows extremists the freedom to meet, work
together, research and plan attacks, and inspire others to
attack, without ever leaving their home. According to some
estimates, over 5,000 jihadists websites and web forums are
currently operational. This number continues to climb, with an
estimated 900 more appearing every year.
Terrorists once had to travel to terror camps in Pakistan
to receive indoctrination and training. Now, aspiring
terrorists only need to open their laptop and connect to the
internet. The internet and e-mail continue to play an integral
role in recent terror plots. One example that Madam Chair
underscored was the threat by Colleen LaRose, better known as
Jihad Jane, a blonde-haired, blue-eyed, native-born American
who actively solicited conspirators to travel abroad to commit
terror attacks; and at Fort Hood, just north of my district in
Texas, Nidal Hasan brutally murdered 13 innocent people after
exchanging e-mails with the radical cleric in Yemen. Al-
Awlaki's on-line lectures were cited as inspiring Shahzad, the
bomber in the recent Times Square attack. Al-Awlaki has
repeatedly posted messages and videos on-line encouraging the
murder of Americans.
As we continue to debate how to attack and defeat this
enemy, I believe the answer must include combating the jihadi
propaganda so readily available on the internet. We must work
with our private sector and community partners to counter the
terrorist narrative. At a more basic level, if we are going to
look seriously at terrorists' use of the internet, there are
issues that must be addressed in order to protect the
fundamental American rights guaranteed by the Constitution.
For instance, should the Government be monitoring jihadi
websites and chat rooms, and how can that be done effectively
while protecting Constitutional rights?
There is little expectation of privacy, in my judgment, on-
line, especially when the internet is used to spread violent
radical Islam or recruit others to participate in jihad.
Similarly, there is a debate among many counterterrorism
experts whether we should allow these websites to remain up and
running. Does shutting them down turn off an important source
of information for investigators? Or does it effectively
disrupt terrorists' communications?
An attack was prevented in Dallas when FBI agents
monitoring an extremist website forum noted violent messages
being posted by al-Smadi and set him up in a sting operation.
This shows there is value to monitoring these websites. But is
there a point where it is of greater value to shut them down,
and at what point does terrorist use of the internet cross the
line from free speech to illegal activity?
Al-Awlaki's radical lectures available on the internet are
known to inspire and incite terrorist acts. Are these lectures
protected as free speech?
Another issue I hope to address is the responsibility of
the private sector to self-monitor the content on their
websites for danger, much like the street vendor in Times
Square who saw something and said something to prevent an
attack. At what point does the responsibility lie with the web
host to identify and report potential threats? At what point
does terrorist use of the internet cross the line from free
speech to illegal activity?
Al-Awlaki's radical lectures available on the internet are
known to inspire and incite terrorist attacks. Are they
protected as free speech?
I believe this is similar to one of the issues raised in
the Supreme Court cases as to whether yelling fire in a theater
is covered under the First Amendment.
These are just a few examples of the complex issues that I
look forward to exploring at this hearing, and let me once
again thank Madam Chair for holding this important hearing.
With that, I yield back.
Ms. Harman. Thank you, Mr. McCaul. The Chair now yields 5
minutes to the Chairman of the full committee for an opening
statement.
Mr. Thompson. Thank you very much, Madam Chair, and I
compliment you for this hearing. As you know, a number of
things have occurred over the last 6 months that has put more
light on this situation.
One of the most important messages this committee has
worked to communicate is that the concept of homeland security
is more than just the sum of many working pieces. Yes, homeland
security is about stopping terrorist attacks. Yes, homeland
security is about responding to disasters, both natural and
manmade. But homeland security is also about giving the
American public, our citizens, a sense of security and freeing
them from fear.
Terrorists want nothing more than to shatter our security
and make us fearful. Their acts by design are intended to
create fear to draw attention to their message, regardless of
whether that message is hatred for a particular group of
people, a government, or a government policy. While we
understand why terrorists use fear in that way, what we have
struggled to understand is why individuals are drawn to
participate in these kinds of acts. What leads an individual
down the path from radical thought to violence?
Many of our homeland security-related policies are directed
towards prevention of terrorist acts and overcoming the fear
created by those acts themselves. However, very little of our
focus is upon any kind of fear, the fear generated by what we
do not understand.
Because we are seeing a trend involving cases of
individuals move from radical thought to violent action, we
already heard from just a few examples this morning an
important part of helping us free from fear is to strive to
understand and, if possible, disrupt the process.
As a communication tool, however, the internet is already
used in many ways as an important piece of that process that we
must work to understand. Because we are working to understand
the recruitment and radicalization process, it is equally
important that we understand the uses of which individuals
undergo are encouraging this process with tools like the
internet.
However, freedom from fear also means that people should
also not fear their Government and, in particular, should not
fear the homeland security and law enforcement organizations
that are working to provide that security. A person should also
be free from fear that their communication or free expression,
both on-line and off, are not subject to improper law
enforcement scrutiny. This is why it is so important that we
have the conversation like the one we are about to have today.
To free us from fear, we must develop our understanding of
terrorist recruitment and radicalization and the tools used to
facilitate that process, but we also ensure that we are
exploring the issues in a way that is protective of our rights
to hold and express radical or unpopular ideas and privacy.
For that reason, I welcome this panel of witnesses. I hope
you can help us shed some light on how we can go about managing
this delicate balancing act.
Thank you, and I yield back, Madam Chair.
Ms. Harman. Thank you, Mr. Chairman.
Other Members of the subcommittee are reminded that under
subcommittee rules, opening statements may be submitted for the
record.
I now welcome our witnesses this morning.
Dr. Bruce Hoffman is a Professor of Security Studies at
Georgetown University's Edmund A. Walsh School of Foreign
Service and a member of the National Security Preparedness
Group, the successor to the 9/11 Commission. Before working at
Georgetown, Professor Hoffman held the corporate Chair in
Counterterrorism and Counterinsurgency at the RAND Corporation
in its Washington office. Between 2004 and 2006, Professor
Hoffman was scholar in residence at the CIA, during which he
served in a variety of advisory roles. He has conducted field
work on terrorism in Afghanistan, Argentina, Pakistan, India,
Northern Ireland, and Iraq, among others.
Our second witness, Brian Michael Jenkins, is Senior
Adviser at the RAND Corporation and an expert on political
violence and sophisticated crime. He, too, is very
sophisticated, I should add. From 1989 to 1998, Mr. Jenkins was
the Deputy Chairman of Kroll Associates, an international
investigative and consulting firm. Before this he worked at
RAND as Chairman of its Political Science Department. He also
held the rank of Captain in the U.S. Army's Green Beret,
serving both in the Dominican Republic and Vietnam.
Anthony Romero, as I mentioned, is the Executive Director
of the ACLU. He took this position 4 days before September 11,
and the ACLU soon after launched the National Safe and Free
Campaign to Protect Basic Freedoms in a Time of Crisis. He is a
frequent commentator on virtually everything that has happened
in the legal domain and policy domain since 9/11, and the ACLU
has filed litigation on issues like the torture and abuse of
detainees in U.S. custody. He has also presided over the most
successful membership growth in ACLU history. During his
tenure, the staff has doubled and the budget has tripled.
Pretty impressive.
Mr. John Morris is the General Counsel at the Center for
Democracy and Technology, CDT, and Director of CDT's internet
Standards Technology and Policy Project. Prior to joining CDT
in 2001, Mr. Morris was a partner at Jenner & Block, where he
litigated ground-breaking cases in internet and First Amendment
law. He was the lead counsel in the landmark case Reno v. ACLU,
where the Supreme Court unanimously overturned the
Communications Decency Act of 1996 and extended the highest
level of Constitutional protection to free speech on the
internet. In 2009, Mr. Morris was appointed to the
Communication Security Reliability and Interoperability Council
of the Federal Communications Commission to ensure civil
liberties are considered in developing law enforcement
communications technologies.
Finally, Phil Mudd. Mr. Mudd is a Senior Research Fellow
for the Counterterrorism Strategy Initiative at the New America
Foundation. Most of us have known him a long time, as he served
as senior intelligence adviser at the FBI. In 2005, he was
appointed First Deputy Director of the FBI's National Security
Branch. He began his Government service when he joined the CIA
in 1985, served there in a variety of roles, including Deputy
National Intelligence Officer for Near East and South Asia and
as CIA detailee to the White House National Security Council
and ultimately Deputy Director of the Counterterrorism Center.
He has received numerous awards for his Government service,
including the CIA Director's Award, the George H.W. Bush Award
for Excellence in Counterterrorism, and the first ever William
Langer Award for Excellence in Analysis.
Without objection, your full statements will be inserted in
the record.
We will now ask Dr. Hoffman to summarize his statement in 5
minutes, more or less. I do understand that you have some
slides to show us.
Mr. Hoffman. Yes, actually videos.
Ms. Harman. Videos to show us.
STATEMENT OF BRUCE HOFFMAN, PROFESSOR, EDMUND A. WALSH SCHOOL
OF FOREIGN SERVICE, GEORGETOWN UNIVERSITY
Mr. Hoffman. Madam Chair, Mr. Chairman, Members of the
committee, thank you for the opportunity to testify today.
Twice in the past 6 months, the United States was just
minutes away from another tragedy of unmitigated horror. Once
again, terrorists had breached our security and nearly
succeeded in killing and harming Americans in the skies of our
country and on its streets.
In both instances had it not been for the malfunctioning of
the terrorist's explosive devices and the quick and effective
intervention of our fellow citizens, America would have fallen
victim to the worst terrorist attack since September 11, 2001.
These two incidents appear to be part of an emerging
pattern of terrorist threats in the United States. During 2009,
a record 10 jihadi or jihadi-inspired plots or incidents and
one tragically successful attack occurred. Furthermore, at
least two dozen persons were indicted in the United States on
terrorism charges last year, another record.
Thus far, in 2010, there have been four incidents. It is
therefore difficult to be complacent when an average of one
plot is now being uncovered per month for the past year or
more, and perhaps even more are being hatched that we don't
know about.
While it is easy to dismiss as amateurish many of these
plots, incidents, and failed attacks, we do so at our peril. In
point of fact, what appears to be amateurishness, such as the
most recent abortive car bomb plot in New York City's Times
Square and the attempt last Christmas day to affect the in-
flight bombing of a Northwest Airlines passenger jet, may be
more of a reflection of the attack having been rushed.
Fears that a would-be attacker might be identified and
interdicted by authorities may thus account for what appears to
be a more compressed operational tempo or faster soup-to-nuts
process by which a recruit is deployed operationally.
The sheer diversity of the perpetrators and nature of their
plots is also remarkable. But as disparate and diverse as they
may appear, the one thing that the majority of them had in
common was the role that the internet played in their
respective plots and often in their radicalization.
Terrorism has often been understood to be a violent means
of communication. Communication is essential for a terrorist
movement, not just for the obvious purposes of summoning
publicity and attention through their violence acts but also to
ensure their longevity and very survival.
Given this constellation of requisite sustainable
resources, motivated minions, energized recruits, along with
generous sympathizers and supporters, it is not surprising that
the weapons of terrorism today are no longer simply the guns
and bombs they have always been but now include computers, the
internet, and the world wide web.
Because of the internet, the art of terrorist communication
has now evolved to a point where terrorists can effortlessly
and effectively control the communication of their ideology of
hate, intolerance, and violence, determining the content,
context, and medium over which their message is projected and
towards precisely the audience or multiple audiences they seek
to reach.
The recent Times Square plot involving a naturalized
American citizen of Pakistani descent is a wake-up call. The
wishful thinking that the American melting pot provided a
firewall against the radicalization and recruitment of American
citizens along with U.S. residents arguably lulled us into a
false sense of complacency that homegrown terrorism couldn't
happen here. By stubbornly wrapping ourselves in this false
security blanket, we missed a rare chance 3 years ago to get in
front of this issue and potentially fully understand how
Americans might be radicalized and recruited to terrorism.
In 2007, the Chair of this subcommittee introduced House
Resolution 1955, the Violent Radicalization and Homegrown
Terrorism Prevention Act, which would have established a
National commission to study domestic terrorism. Although the
bill passed the House, it never came to a vote in the Senate.
Given that the terrorist threat has changed so appreciably
since the 9/11 Commission concluded its work 6 long years ago,
we require the same fresh look and new approaches that would
have been this commission's remit. In this case, such a body
would have provided a baseline assessment of terrorist
radicalization recruitment processes and make policy
recommendations about how to counter them by drawing on a
comprehensive survey of the experiences and best practices of
other countries.
Instead, 10 years into the war on terrorism, important
questions remain unanswered. The two most salient, in my view,
are who, in fact, is responsible in the U.S. Government to
identify radicalization when it is occurring and then to
interdict attempts at recruitment? Most critically, have
terrorists discovered our Achilles heel in that we currently
have no strategy to counter this type of threat or to interdict
radicalization and prevent terrorist recruitment?
Thank you, Madam Chair. May I show these two videos?
Ms. Harman. Yes. Without objection, yes. Please show them.
They are not very long, are they?
Mr. Hoffman. No, and you can feel free to cut them off
because the message I think will be very clear in the first 15
to 30 seconds. The first video is very much the kind of thing
that you would see on MTV.
[Video shown.]
Mr. Hoffman. It ends with an image of the World Trade
Center collapsing.
[Video shown.]
Ms. Harman. Is this video still on the website someplace?
Mr. Hoffman. It is readily available. It has been on the
web for 6 years now. You can see it is geared to an audience of
people that are aren't terribly religious, but it hooks them
with an MTV-like presentation and a catchy beat. The second one
is more religious. It is a capella, so there is no music. It is
a traditional nasheed.
Ms. Harman. Thank you.
Mr. Hoffman. If I may say, the singer in that is an
American citizen, someone named Omar Hammami, who is from
Alabama, who was featured. If you saw the New York Times
Magazine article in January, by Andrea Elliott, he was the
jihad next door.
[The statement of Mr. Hoffman follows:]
Prepared Statement of Bruce Hoffman*
---------------------------------------------------------------------------
* My affiliation with Georgetown University is for identification
purposes only. This testimony presents the views of the witness only
and does not nor is it meant to reflect those of Georgetown University.
---------------------------------------------------------------------------
26 May 2010
Twice in the past 6 months, the United States was just minutes away
from another tragedy of unmitigated horror. Once again, terrorists had
breached our security and nearly succeeded in killing and harming
Americans in the skies above our country or on its streets. In both
instances, had it not been for the malfunctioning of the terrorists'
explosive devices and the quick and effective intervention of our
fellow citizens, America would have fallen victim to the worst
terrorist attacks since September 11, 2001.
These two incidents are part of an emergent pattern of terrorist
threats in the United States. During 2009, a record ten jihadi or
jihadi-inspired plots or incidents and one tragically successful
attack, at Fort Hood, Texas that claimed the lives of thirteen persons,
occurred.\1\ Furthermore, at least two dozen persons were indicted in
the United States on terrorism charges last year \2\--another record.
Thus far in 2010 there have been four incidents. It is therefore
difficult to be complacent when an average of one plot is now being
uncovered per month over the past year or more--and perhaps even more
are being hatched that we don't yet know about.
---------------------------------------------------------------------------
\1\ See Brian Michael Jenkins, Would-Be Warriors: Incidents of
Jihadist Terrorist Radicalization in the United States Since September
11, 2001 (Santa Monica, CA: RAND Corp., 2010), pp. 13-17.
\2\ One source puts this figure at 41 persons. See Steve Kroft,
``Homegrown Terror,'' 60 Minutes, CBS News, 9 May 2010 accessed at:
http://www.cbsnews.com/video/watch/
?id=6470178n&tag=contentMain;cbsCarousel.
---------------------------------------------------------------------------
While it is easy and perhaps also comforting to dismiss as
``amateurish'' these plots, incidents, and failed or foiled attacks, we
do so at our peril. In point of fact, what appears as
``amateurishness''--such as the most recent abortive car bomb plot in
New York City's Times Square and the attempt last Christmas day to
effect the in-flight bombing of a North West Airlines passenger jet--
may be more a reflection of the attack having been rushed. Terrorists,
we often forget, play the odds and pin their faiths and hopes on
eventually simply getting lucky. Over a quarter of a century ago, the
Irish Republican Army famously taunted then-Prime Minister Margaret
Thatcher after a bomb failed to kill her at the 1984 Conservative Party
conference in Brighton, England: ``Today we were unlucky, but remember
we only have to be lucky once. You will have to be lucky always.''\3\
Our terrorist enemies today doubtless embrace the same logic.
---------------------------------------------------------------------------
\3\ Quoted in Peter Taylor, Brits (London: Bloomsbury, 2001), p.
256.
---------------------------------------------------------------------------
Indeed, at a time, for example, when the capability of the Tehrik-
i-Taliban or Pakistani Taliban, (TTP)--whom both the U.S. Attorney
General Eric Holder and senior Obama administration counterterrorism
adviser John Brennan have gone on record as stating was behind the
Times Square plot, having provided money and direction to the hapless
bomber, Faisal Shahzad \4\--and al-Qaeda in Pakistan are being
relentlessly degraded by the U.S. drone attacks, both groups as well as
allied and associated organizations may feel pressed to implement an
operation either sooner or more precipitously than they might otherwise
prefer. Fears that a would-be attacker might be identified and
interdicted by authorities may thus account for what appears to be a
more compressed operational tempo or faster ``soup to nuts'' process by
which a recruit is deployed operationally.
---------------------------------------------------------------------------
\4\ Anne E. Kornblut and Karin Brulliard, ``U.S. blames Pakistani
Taliban for Times Square bomb plot,'' Washington Post, 10 May 2010.
---------------------------------------------------------------------------
The complaint sworn against Shahzad in Federal court, for instance,
reveals a very fast 4-month process from planning to training to Times
Square.\5\ He reportedly only received 3 to 5 days of bomb-making
training. The TPP, al-Qaeda and other terrorist groups may thus be
prepared to accept this trade-off between shorter training periods
leading to accelerated operations in order to dispatch ``clean skin''
recruits before they can be identified and detected. Indeed, this
likely represents a reasonable trade-off and excellent return on a very
modest investment. The terrorists groups have expended little effort
and energy training alleged ``walk-ins'' like Shahzad who present
terrorist organizations with a low-cost opportunity to strike in the
United States.
---------------------------------------------------------------------------
\5\ United States of America v. Faisal Shahzad, Defendant, Case
1:10-mj-00928-UA Filed 4 May 2010.
---------------------------------------------------------------------------
This is part and parcel of an al-Qaeda strategy that it also has
pushed on other groups. It is a strategy that is deliberately designed
to overwhelm, distract, and exhaust the terrorists' adversaries. There
are two components to this strategy: one economic and the other
operational. In terms of the economic dimension, al-Qaeda has never
claimed it could or would defeat U.S. militarily. Instead, it seeks to
wear us down economically through increasing expenditures on domestic
security and overseas military commitments. Given the current global
economic downtown, this message arguably now has greater resonance with
al-Qaeda's followers and supporters and indeed perhaps even with new
recruits. The operational dimension seeks to flood already stressed
intelligence and law enforcement with ``noise'': low-level threats from
``lone wolves'' and other jihadi ``hangers on''--e.g., the ``low
hanging fruit'' are designed to consume the attention of law
enforcement and intelligence in hopes that this distraction will permit
more serious terrorist operations to go unnoticed and thereby sneak in
``beneath the radar'' and in fact succeed.\6\
---------------------------------------------------------------------------
\6\ See Bruce Hoffman ``American Jihad,'' The National Interest,
no. 107, May/June 2010, pp. 17-27; and, idem, ``Al-Qaeda's New Grand
Strategy,'' Washington Post (Sunday Outlook section), 10 January 2010.
---------------------------------------------------------------------------
The sheer diversity of the perpetrators and nature of their U.S.
plots is also remarkable. These have included highly trained al-Qaeda
operatives like Najibullah Zazi, the Afghan-born U.S. resident who
sought to replicate the 7 July 2005 suicide attacks on London transport
in Manhattan; motivated, but less competent, recruits like Shahzad and
the five youths from a Washington, DC suburb who last December sought
training in Pakistan to fight in Afghanistan but, had they been
successful in establishing contact with a Pakistan-based terrorist
group, could just as well have been deployed back to United States;
dedicated sleeper agents like the U.S. citizen David Headley whose
reconnaissance efforts on behalf of Lashkar-e-Taiba (LeT), a
longstanding al-Qaeda ally, were pivotal to the November 2008 Mumbai,
India attack's success; bona fide ``lone wolves'' like Major Nidal
Hasan, the Fort Hood shooter, and other individuals with murkier
terrorist connections like Abdulhakim Muhammad (nee Carlos Bledsoe), an
African-American convert to Islam who returned from Yemen last year and
killed a U.S. military recruiter and wounded another in Little Rock,
Arkansas and has now claimed in court to have done so on behalf of
AQAP--the same group responsible for Christmas day plot; and, finally,
the incompetent, wannabe terrorists who are easily entrapped and
apprehended such as the four parolees and converts to Islam who
attempted to bomb 2 Bronx synagogues and an upstate air national guard
base, the Jordanian national who overstayed his U.S. tourist visa and
plotted to bomb a downtown Dallas office tower last September, and
another convert who wanted to blow up a Springfield, IL Federal
building that same month, among others.
Well over a year ago we became aware of radicalization and
recruitment occurring in the United States when Somali-Americans
started disappearing from the Minneapolis-St Paul, Minnesota area and
turning up in Somalia with an al-Qaeda affiliate called al Shabab
(``the youth''). Administration officials and others believed it was an
isolated, one-off phenomenon. But it was not restricted to a small
number of individuals in one place as the grand juries that have been
sitting in Minneapolis-St Paul and San Diego, California attest along
with the on-going FBI investigations in Boston and two locations in
Ohio, among other places. The number of Somali-Americans who left the
United States to train in Somalia was also far higher than initially
believed (numbering upwards of some 30 persons) and furthermore once
they were in Somalia they were in fact being trained by a senior and
long-established al-Qaeda commander.
In sum, the case of the Somali-Americans thus turned out to be a
Pandora's box. By not taking the threat of radicalization and
recruitment actually occurring in the United States more seriously and
sooner we failed to comprehend that this was not an isolated
phenomenon, specific to Minnesota and this particular immigrant
community, but that it indicated the possibility that an albeit
embryonic terrorist radicalization and recruitment infrastructure had
been established in the United States. Shahzad is thus the latest
person to jump out of this particular Pandora's box.
As disparate and diverse as the above list of individuals may
appear, the one thing that the majority of them had in common was the
role that the internet played in their respective plots and often their
radicalization. For example:
Zazi conducted several internet searches to identify and
obtain commercially available materials for the bombs he
intended to use in attacks on the New York City subway;\7\
---------------------------------------------------------------------------
\7\ United States District Court Eastern District of New York
against Najibullah Zazi, Defendant, Memorandum Of Law In Support Of The
Government's Motion For A Permanent Order Of Detention, 09-CR-663
(RJD), 24 September 2009, pp. 5, 7, and 11-12.
---------------------------------------------------------------------------
Hasan exchanged at least 18 e-mails between December 2008
and June 2009 with Anwar al Awlaki, an operational officer with
al-Qaeda in the Arabian Peninsula (AQAP);\8\
---------------------------------------------------------------------------
\8\ Brian Ross and Rhonda Schwartz, ``Major Hasan's E-Mail: `I
Can't Wait to Join You' in Afterlife,'' ABC News, 19 November 2009
accessed at http://abcnews.go.com/print?id=9130339.
---------------------------------------------------------------------------
Colleen LaRose used the online monikers ``Fatima La Rose''
and ``JihadJane'' allegedly to recruit others in the United
States and abroad, supposedly to carry out a terrorist attack
in Sweden.\9\ She boasted in e-mails how, given her
appearance--e.g., a petite, blue-eyed, blonde--she could
``blend in with many people.'' She also sought to recruit other
Western women who looked like her.\10\ David Kris, an assistant
attorney general in the Department of Justice's National
Security Division, was quoted in the Washington Post as stating
that the fact that a suburban American woman stands accused of
conspiring to support terrorists and traveling overseas to
implement an attack ``underscores the evolving nature of the
threat we face'';\11\
---------------------------------------------------------------------------
\9\ See United States District Court for the Eastern District of
Pennsylvania, United States Of America v. Colleen R. LaRose, 10-Cr-123,
4 March 2010, pp. 3-8.
\10\ Quoted in Ibid., p. 3.
\11\ Quoted in Carrie Johnson, ``JihadJane, an American woman,
faces terrorism charges,'' Washington Post, 10 March 2010.
---------------------------------------------------------------------------
Hosam Smadi, the young Jordanian national implicated in the
Dallas, Texas bomb plot, according to his indictment, allegedly
belonged to ``an online group of extremists . . . who espoused
violence.'' It further stated that Smadi ``stood out based on
his vehement intention to actually conduct terrorist attacks in
the United States'';\12\
---------------------------------------------------------------------------
\12\ Quoted in United States District Court for the Northern
District of Texas, United States Of America v. Hosam Maher Husein
Smadi, 3:09-MJ-286, 24 September 2009, p. 1. See also, Ibid., pp. 2 and
5; and, ``Jordanian accused in Dallas bomb plot goes to court,''
CNN.com, 25 September 2009 accessed at: http://
cnn.site.printthis.clickability.com/pt/cpt?action=cpt&title-Jordan.
---------------------------------------------------------------------------
Michael Finton, a U.S. citizen, implicated in a plot to bomb
a Federal building in Springfield Illinois, claimed both to
have been influenced by an al-Qaeda video and to have obtained
``all that he could . . . use the internet to look up all he
needed to know to conduct such an attack . . . ''.\13\
---------------------------------------------------------------------------
\13\ Quoted in United States District Court for the Central
District of Illinois, United States Of America v. Michael C. Finton,
09-3048-M, 24 September 2009, pp. 11 and 15. See also, Ibid., p. 17.
---------------------------------------------------------------------------
David Headley, the U.S. citizen who allegedly carried out
reconnaissance and surveillance operations on behalf of both
Pakistani jihadi terrorist organizations and al-Qaeda was
actively involved in on-line user groups and chat room forums
\14\ as was one of his alleged co-conspirators, Tahawur
Rana.\15\
---------------------------------------------------------------------------
\14\ See United States District Court for the Northern District of
Illinois, United States Of America v. Ilyas Kashmiri, et al., 09 CR 830
October 2009, pp. 13 and 20.
\15\ Idem., United States Of America v. Tahawur Rana, 18 October
2009, pp. 4, 8, 14, 24, and 42.
---------------------------------------------------------------------------
Tarek Mehanna, a U.S. citizen charged with conspiracy to
provide material support to terrorists allegedly made extensive
use of the internet, amassing, according to the criminal
complaint filed against him in Federal court, ``Video files,
audio files, images, stored messages, word processed documents
and cached web pages'';\16\
---------------------------------------------------------------------------
\16\ United States District Court of Massachusetts, United States
Of America v. Tarek Mehanna, 09-10017-GAO CR 830, November 2009, pp. 2-
3, 10-11, 14-30, 39-40, 43-49, & 56-73.
---------------------------------------------------------------------------
Bryant Neal Vinas, a U.S. citizen from Long Island, New York
who traveled to Pakistan to enlist in al-Qaeda and, in addition
to providing information to facilitate an al-Qaeda plot to blow
up a Long Island Rail Road train inside New York's Pennsylvania
Station, participated in an attack on U.S. military forces in
Afghanistan, is believed to have been radicalized as a result
of ``visiting jihadist Web sites'';\17\
---------------------------------------------------------------------------
\17\ Quoted in William K. Rashbaum and Souad Mekennet, ``L.I. Man
Helped Qaeda, Then Informed,'' New York Times, 23 July 2009.
---------------------------------------------------------------------------
Umar Farouk Abdulmuttalab, the AQAP operative who attempted
to bomb a North West airlines flight on Christmas day, 2009 was
in regular contact with the aforementioned Anwar al Awlaki;\18\
and,
---------------------------------------------------------------------------
\18\ Mark Hosenball, et al., ``The Radicalization of Umar Farouk
Abdulmuttalab,'' Newsweek, 2 January 2010.
---------------------------------------------------------------------------
Faisal Shahzad has been widely reported to have viewed
radical jihadi material on the internet and apparently has
admitted to having been inspired by al Awlaki as well.\19\
---------------------------------------------------------------------------
\19\ See Scott Shane and Souad Mekhennet, ``Imam's Path From
Condemning Terror to Preaching Jihad,'' New York Times, 8 May 2010.
---------------------------------------------------------------------------
TERRORISM AS COMMUNICATION AND THE INTERNET AS A CRITICAL MEANS OF
RADICALIZATION AND RECRUITMENT
Terrorism has long been understood to be a violent means of
communication. The terrorist act itself is of course designed to
attract attention and then, through the publicity that it generates, to
communicate a message. Indeed, nearly a quarter of a century ago, Alex
Schmid and Janny de Graaf observed that, ``Without communication there
can be no terrorism.''\20\ But communication is essential for a
terrorist movement not just for the obvious purposes of summoning
publicity and attention, but also to ensure its longevity and very
survival. Indeed, without effective communications, a terrorist
movement would be unable to recruit new members into its ranks,
motivate and inspire existing members to carry on with the struggle
despite formidable odds, as well as expand the pool of active
supporters and passive sympathizers from which the movement draws its
sustenance.
---------------------------------------------------------------------------
\20\ Alex Schmid and Janny de Graaf, Violence As Communication:
Insurgent Terrorism and the Western News Media (Beverly Hills, CA:
Sage, 1982), p. 9.
---------------------------------------------------------------------------
Given this constellation of requisite sustainable resources--
motivated minions, energized recruits, along with generous sympathizers
and supporters--it is not surprising that the weapons of terrorism are
no longer simply the guns and bombs that they always have been, but now
include the mini-cam and videotape, editing suite and attendant
production facilities; professionally produced and mass-marketed CD-
ROMs and DVDs; and, most critically, the lap-top and desk-top
computers, CD burners and e-mail accounts, and internet and world wide
web. Indeed, largely because of the internet--and the almost unlimited
array of communications opportunities that it offers--the art of
terrorist communication has now evolved to a point where terrorists can
effortlessly and effectively control the communication of their
ideology of hate, intolerance, and violence: determining the content,
context, and medium over which their message is projected; and towards
precisely the audience (or multiple audiences) they seek to reach.\21\
---------------------------------------------------------------------------
\21\ See, for example, the 2004 video clip, ``Dirty Kuffar,'' aimed
at British youth at http://video.google.com/
videoplay?docid=9083681522527526242#docid=-4283987610134255997; and, an
al Shabaab video clip aimed at Americans and Westerners in general from
2009 ``English Nasheed Rap by Shabab Al-Mujahideen (Blow by Blow)'' at
http://www.youtube.com/watch?v=ODGRd_DKchw.
---------------------------------------------------------------------------
The implications of this development have been enormous. The
internet, once seen as an engine of education and enlightenment, has
instead become an immensely useful vehicle for terrorists with which to
peddle their baseless propaganda and manifold conspiracy theories,
lies, and clarion call to violence.\22\ These sites alarmingly present
an increasingly compelling and indeed accepted alternative point of
view to the terrorists' variegated audiences.\23\ This was of course
precisely al-Qaeda's purpose in creating its first website,
www.alneda.com, and maintaining a variety of successor sites ever
since: To provide an alternative source for news and information that
the movement itself could exert total control over.
---------------------------------------------------------------------------
\22\ See, for instance, the ``Iraq'' tab at www.kavkazcenter.com
and the ``Iraqi Resistance Report'' tab at www.jihadunspun.com as well
as such sites as www.islammemo.cc/taqrer/one_news.asp?Idnew=292;
www.la7odood.com; www.balagh.com/thaqafa/0604ggpz.htm; and
www.albasrah.net: all accessed on 6 July 2005.
\23\ See, also, Dina Temple-Raston, ``Al-Qaeda media Blitz Has Some
On Alert,'' Morning Edition, National Public Radio, 8 April 2009
accessed at: http://www.npr.org/templates/story/
story.php?storyId=102735818.
---------------------------------------------------------------------------
Because of its geographical reach, ubiquity, modest costs, and
ability to communicate in real-time, the internet has thus become the
terrorists' favored means of propaganda dissemination and incitement to
violence. As Professor Gabriel Weimann of Haifa University notes in his
seminal study Terror on the Internet, when he began studying this
phenomenon nearly a decade ago, there were only about 12 terrorist
group websites. By the time he completed his research in 2005 the
number had grown to over 4,300--``a proliferation rate of about 4,500
percent per year.''\24\ And, by the time the book was published the
following year, the number had jumped to over 5,000 websites.\25\
Today, experts estimate that there are well over 7,000 such sites.
---------------------------------------------------------------------------
\24\ Gabriel Weimann, Terror on the Internet: The New Arena, the
New Challenges (Washington, DC: United States Institute of Peace Press,
2006), p. 105.
\25\ Remarks by Professor Gabriel Weimann, book launch event held
at the U.S. Institute of Peace, Washington, DC on 17 April 2006.
---------------------------------------------------------------------------
Thus, virtually every terrorist group in the world today has its
own internet website and, in many instances, maintain multiple sites in
different languages with different messages tailored to specific
audiences. The ability to communicate in real time via the internet,
using a variety of compelling electronic media--including dramatic
video footage, digital photographs, and audio clips accompanied by
visually arresting along with savvy and visually appealing web design--
has enabled terrorists to reach a potentially vast audience faster,
more pervasively, and more effectively than ever before. The changing
face of terrorism in the 21st Century is perhaps best exemplified by
the items recovered by Saudi security forces in a raid during on an al-
Qaeda safe house in Riyadh in late spring 2004. In addition to the
traditional terrorist arsenal of AK-47 assault rifles, explosives,
rocket-propelled grenades, hand grenades, and thousands of rounds of
ammunition that the authorities the police expected find, they also
discovered an array of electronic consumer goods including: Video
cameras, laptop computers, CD burners, and the requisite high-speed
internet connection. According to ``60 Minutes'' investigative
journalist Henry Schuster, the videos:
``had been part of an al-Qaeda media blitz on the web that also
included two on-line magazines full of editorials and news digests,
along with advice on how to handle a kidnapping or field-strip an AK-47
assault rifle. The videos mixed old appearances by bin Laden with slick
graphics and suicide bombers' on-camera last wills and testaments. They
premiered on the internet, one after the other, and were aimed at
recruiting Saudi youth.''\26\
---------------------------------------------------------------------------
\26\ Henry Shuster, ``Studios of Terror: Al Qaeda's Media
Strategy,'' CNN International.Com, Tracking Terror, 16 February 2005,
accessed at http://207.25.71.245/2005/WORLD/meast/02/15/
schuster.column/index.html.
As Tina Brown, the doyenne of post-modern media, has pointed out:
the ``conjunction of 21st-century internet speed and 12th-century
fanaticism has turned our world into a tinderbox.''\27\
---------------------------------------------------------------------------
\27\ Tina Brown, ``Death by Error,'' Washington Post, 19 May 2005.
---------------------------------------------------------------------------
CONCLUSION
The recent Times Square plot involving a naturalized American
citizen of Pakistani descent is a wake-up call. The wishful thinking
that the American ``melting pot'' theory provided a ``fire wall''
against the radicalization and recruitment of American citizens--
whether naturalized or born here--along with U.S. residents (green card
holders), arguably lulled us into a sense of complacency that home-
grown terrorism couldn't happen here. The British similarly believed
before the 7 July 2005 London suicide attacks that there was perhaps a
problem with the Muslim communities in Europe but certainly not with
British Muslims in the United Kingdom who were better integrated,
better education, and wealthier than their counterparts on the
continent.
By stubbornly wrapping ourselves in this false security blanket we
lost 5 years to learn from the British experience. Indeed, the United
States missed a rare chance 3 years ago to get in front of this issue
and potentially fully understand how Americans are radicalized and
recruited to terrorism. In 2007, the Chair of this same sub-committee
introduced House Resolution 1955, the ``Violent Radicalization and
Homegrown Terrorism Prevention Act of 2007,'' which would have
established a National commission to study domestic terrorism. Although
the bill passed the House of Representatives, it never came to a vote
in the Senate. Given that the terrorist threat has changed so
appreciably since the 9/11 Commission concluded its work 6 years ago,
we require the same fresh look and new approaches that would have been
this commission's remit. Moreover, these days it seems bipartisan
commissions are the only way our Government can accomplish anything
terrorism-related. In this case, such a body would have provided a
baseline assessment of terrorist radicalization and recruitment
processes, and made policy recommendations about how to counter them by
drawing on a comprehensive survey of the experiences and best practices
of other countries--and by better understanding how terrorist groups
might target and attract Americans and U.S. residents into their ranks.
Instead, 10 years into the war on terrorism, the big questions that
the commission proposed in H.R. 1955 may have shed critical light on
lamentably remain unanswered. What do we do when the terrorists are
like us? When they conform to the archetypal American immigrant success
story? When they are American citizens or American residents? When they
are not perhaps from the Middle East or South Asia and in fact have
familiar-sounding names? Or, when they are ``petite, blue-eyed,
blonde'' suburban housewives who, as the infamous Jihad Jane boasted,
``can easily blend in''?
Who in fact is responsible in the U.S. Government to identify
radicalization when it is occurring and then interdict attempts at
recruitment? Is this best done by Federal law enforcement (e.g., the
FBI) or State and local jurisdictions working closely with Federal
authorities? Is it a core mission for a modernized, post-9/11 FBI? Or
for the Department of Homeland Security (DHS)? Can it be done by the
National Counterterrorism Center (NCTC), even though it has only a
coordinating function and relies on other agencies for intelligence
collection, analysis, and operations? What is the role of the Office of
the Director of National Intelligence (ODNI) in home-grown terrorism
and recruitment and radicalization? Will coming to grips with these
challenges be the remit of the next FBI Director given the incumbent's
impending retirement?
And, finally and most critically, have terrorists discovered our
Achilles Heel in that we currently have no strategy to counter this
type of threat or to interdict radicalization and prevent terrorist
recruitment?
Ms. Harman. Thank you, Dr. Hoffman.
Mr. Jenkins, you are recognized for 5 minutes.
STATEMENT OF BRIAN MICHAEL JENKINS, SENIOR ADVISER, THE RAND
CORPORATION
Mr. Jenkins. Madam Chair, Mr. Chairman, thank you very much
for the opportunity to address this important topic.
I have submitted written testimony, but let me here just
underscore some of the aspects of current terrorist recruiting.
Nearly 9 years after 9/11, the principal terrorist threat
comes from a galaxy of jihadist groups that subscribe to al-
Qaeda's ideology of global arms struggle. Their terrorist
campaign has become more decentralized, relying more on al-
Qaeda's affiliates and on on-line exhortation to individual
followers to do whatever they can wherever they are. Such
attacks may take the form of operations planned from abroad
like the Christmas day airline bombing attempt or do-it-
yourself attempts by homegrown terrorists.
These attempts are not evidence of our failure to protect
the Nation. They reflect the fact that we are at war, and as in
any war, the other side attacks.
According to a recent RAND paper, there were 46 reported
cases of radicalization and recruitment to jihadist terrorism
in the United States between 9/11 and the end of 2009. A few
more cases have been added in 2010. In all, 125 persons were
identified in these cases. The number of cases and the number
of persons involved, as Dr. Hoffman has pointed out, both
increased sharply in 2009, underscoring the fact that
radicalization and the recruitment to jihadist terrorism do
happen here.
Fortunately, al-Qaeda's exhortations are not resonating
among the vast majority of Muslim Americans. There are veins of
extremism. There are handfuls of hotheads, but no apparent deep
reservoirs from which al-Qaeda can easily recruit.
The U.S. criminal justice system seems to be working. With
the exception of Jose Padilla, the individuals arrested in
these cases were brought before U.S. courts and convicted or
now await trial.
Most of these American jihadists appear to have radicalized
themselves rather than having been recruited in the traditional
sense.
The process of radicalization and recruitment to terrorist
violence reflects a combination of individual circumstances and
ideological motivation. Jihadists cite assaults on Islam to
justify their violence, as we saw in these videos, but the
volunteers also view jihad as a chance to gain status in a
subculture that exalts violence to be perceived as a warrior,
as a hero in an epic struggle. Again we saw in the videos here
use of the term ``glorious past'' or ``restoring honor.'' These
are recurring themes.
Al-Qaeda's ideology also has become a vehicle for revolving
individual discontents, an opportunity to transcend personal
problems, a path to glory. This individualistic quality of
self-recruitment suggests a strategy that focuses on dissuading
individuals from joining al-Qaeda's version of jihad. The
message to would-be terrorists should be that they will be
detected, apprehended, and treated as ordinary criminals. There
will be no applause. There will be no glory.
Reinforcing this message requires the active cooperation of
the American Muslim community, which is the target of this
jihadist recruiting. Community policing can facilitate that
cooperation. Now that doesn't involve the authorities in
religious or ideological debates, which remain matters for the
community. It simply requires building trust between local
communities and local authorities.
But community cooperation will not prevent all terrorist
attempts. The domestic intelligence collection is essential.
Only three of the 25 homegrown plots to carry out attacks in
the United States, including the failed Times Square bombing,
got as far as implementation. Only two of those attempts
resulted in casualties, both carried out by lone gunmen.
Now that is an undeniable intelligence success. But we have
to do better than that. Our current emphasis on information
sharing, which certainly has improved, shouldn't distract us
from the difficult and always delicate task of information and
intelligence collection.
Many homegrown terrorists begin their journey to violent
jihad on the internet. It is accessible to seekers, reinforcing
and channeling their anger, it creates on-line communities of
like-minded extremists, it facilitates clandestine
communications. Yet, it is important that we keep this in
perspective.
Despite the continuous, incessant on-line exhortations to
Americans from these jihadist websites, while they have
produced an army of on-line jihadists, that has resulted in
only a tiny cohort of jihadists in the real world. Moreover,
the internet has proved to be a source of valuable intelligence
leading to arrests.
One last point. I have no doubt that jihadists will attempt
further terrorist attacks in this country, and that some will
succeed; That is war. But needless alarm, divisive finger-
pointing, and unreasonable demands for absolute protection will
only encourage terrorists' ambitions to make America tremble in
fear and bankrupt itself in a quest for security, which is
precisely what our terrorist foes hope to achieve.
Thank you.
[The statement of Mr. Jenkins follows:]
Prepared Statement of Brian Michael Jenkins\1\
---------------------------------------------------------------------------
\1\ The opinions and conclusions expressed in this testimony are
the author's alone and should not be interpreted as representing those
of RAND or any of the sponsors of its research. This product is part of
the RAND Corporation testimony series. RAND testimonies record
testimony presented by RAND associates to Federal, State, or local
legislative committees; Government-appointed commissions and panels;
and private review and oversight bodies. The RAND Corporation is a
nonprofit research organization providing objective analysis and
effective solutions that address the challenges facing the public and
private sectors around the world. RAND's publications do not
necessarily reflect the opinions of its research clients and sponsors.
---------------------------------------------------------------------------
May 26, 2010
NO PATH TO GLORY
DETERRING HOMEGROWN TERRORISM \2\
---------------------------------------------------------------------------
\2\ This testimony is available for free download at http://
www.rand.org/pubs/testimonies/CT348/.
---------------------------------------------------------------------------
Madame Chair, Members of the subcommittee, thank you very much for
the opportunity to address this important topic. It is an honor to
again testify before Congress and, for the third time, before Members
of this subcommittee. The views I express are my own. I do not speak on
behalf of any department, agency, organization, or political agenda.
A Determined, Resilient, Opportunistic, and Adaptable Foe
Nearly 9 years after 9/11, the principal terrorist threat still
comes from a galaxy of jihadist groups that subscribe to or have been
influenced by al-Qaeda's ideology of a global armed struggle against
the West. The complexity of the movement defies easy assessment. The
ability of al-Qaeda's central leadership to directly project its power
through centrally planned and managed terrorist attacks has been
reduced. Terrorist organizations now confront a more hostile operating
environment: Al-Qaeda has not been able to carry out a major terrorist
attack in the West since the London bombings of 2005. For the time
being, it has concentrated its resources and efforts on the conflicts
in Afghanistan and Pakistan.
This should not imply that we are at a tipping point in the
struggle against terrorism. Al-Qaeda, its affiliates, and its allies,
remain determined to continue to attack, and they have proved to be
resilient, opportunistic, and adaptable, capable of morphing to meet
new circumstances. Complacency on our part would be dangerous.
A More Decentralized Terrorist Campaign
To carry on its international terrorist campaign, al-Qaeda now
relies on its affiliates, principally in North Africa, Iraq, and the
Arabian Peninsula, and on its continuous exhortation to followers to do
whatever they can, wherever they are. Other terrorist groups, while
concentrating on local contests, have adopted al-Qaeda's vision of a
global struggle and may launch their own attacks or assist volunteers
seeking support.
Emphasis on Do-It-Yourself Terrorism
The United States remains al-Qaeda's primary target. Some analysts
believe that al-Qaeda is under growing pressure to prove that it can
carry out another attack on U.S. soil in order to retain its
credentials as the vanguard of the jihadist movement. Such an attack
could take the form of an operation planned from abroad, like the
Christmas day airline bombing attempt, or it could be do-it-yourself
attempts by homegrown terrorists responding to al-Qaeda's call to
action. Inevitably, one or more of these attacks may succeed.
Terrorist attempts are not evidence of our failure to protect the
Nation from terrorism, nor should they be cause for feigned outrage and
divisive finger-pointing. They provide opportunities to learn lessons
and improve defenses. The attempts reflect that we are at war--although
the term has been largely discarded--and as in any war, the other side
attacks.
America's Homegrown Terrorists
According to a recent RAND paper, there were 46 reported cases of
radicalization and recruitment to jihadist terrorism in the United
States between 9/11 and the end of 2009.\3\ This number does not
include attacks from abroad. In all, 125 persons were involved in the
46 cases. Two more cases and several more arrests in 2010 bring the
total to 131 persons. Half of the cases involve single individuals; the
remainder are tiny conspiracies. The number of cases and the number of
persons involved both increased sharply in 2009. Whether this presages
a trend we cannot yet say. But these cases tell us that radicalization
and recruitment to jihadist terrorism do happen here. They are clear
indications of terrorist intent. The threat is real.
---------------------------------------------------------------------------
\3\ Brian Michael Jenkins, Would-Be Warriors: Incidents of Jihadist
Terrorist Radicalization in the United States Since September 11, 2001,
Santa Monica: The RAND Corporation OP-292-RC, 2010.
---------------------------------------------------------------------------
No Deep Reservoirs of Potential Recruits
Fortunately, the number of homegrown terrorists, most of whom are
Muslims, is a tiny turnout in a Muslim American community of perhaps 3
million. (By contrast, several thousand Muslim Americans serve in the
U.S. armed forces.) Al-Qaeda's exhortations to violence are not
resonating among the vast majority of Muslim Americans. There are veins
of extremism, handfuls of hotheads, but no deep reservoirs from which
al-Qaeda can recruit. America's would-be jihadists are not Mao's fish
swimming in a friendly sea.
The cases do not indicate an immigration or border-control problem.
Almost all of those arrested for terrorist-related crimes are native-
born or naturalized U.S. citizens or legal permanent residents. Most of
them have lived in the United States for many years. There is no
evidence that they were radicalized before coming to the United States.
No armies of ``sleepers'' have infiltrated the country.
The Criminal Justice System Works
The cases also tell us that the U.S. criminal justice system works.
With the exception of Jose Padilla, who was initially held as an enemy
combatant, the individuals arrested in these cases (except for those
who left to join jihad fronts abroad) were brought before U.S. courts
and convicted or now await trial.
About a quarter of those identified have links with jihadist
groups--al-Qaeda, Lashkar-e-Taiba, or the Taliban--but there is no
underground network of foreign terrorist operatives, and there are no
terrorist gangs in the United States like those active in the 1970s,
when the level of terrorist violence was much higher than it is today.
Amateurs are Still Dangerous
Twenty-five of the 131 terrorists identified in the United States
since 9/11 received some kind of terrorist indoctrination or training.
Judging by the results, it was not very good. Al-Qaeda clearly has
quality-control problems. The plots have been amateurish. Only two
attempts succeeded in causing casualties--significantly, both were
carried out by lone gunmen, a problem in the United States that
transcends terrorism. But amateurs are still dangerous. There is no
long mile between the terrorist wannabe and the lethal zealot.
America's jihadists may suffer from substandard zeal. Only one
became a suicide bomber, although Major Nidal Hasan may not have
expected to survive his murderous rampage at Fort Hood. The rest
planned to escape.
Most American jihadists appear to have radicalized themselves
rather than having been recruited in the traditional sense. However,
itinerant proselytizing recruiters appear in some of the cases, and
active recruiting does occur in prisons. Many homegrown terrorists
begin their journey to violent jihad on the internet.
Diverse Personal Motives
The process of radicalization and recruitment to jihadist terrorist
violence is complex and reflects a combination of individual
circumstances and ideological motivations. Personal crisis and
political cause are often paired in the process.
What does the jihadist acolyte seek in terrorism? Although
recruitment may involve the rhetoric of religious belief, turning to
violent jihad does not seem to result from profound religious
discernment. Few jihadists appear to have more than a superficial
knowledge of Islam. On the other hand, radicalization and recruitment
do appear to be opportunities for an ostentatious display of piety,
conviction, and commitment to their beliefs, ultimately expressed in
violence.
Jihadists often use the need to avenge perceived assaults on
Islam--insults to the religion, atrocities inflicted upon its
believers, aggression by infidels against its people and territory,
anger at specific U.S. policies--to justify their actions. These
certainly are jihadist recruiting themes, but volunteer terrorists also
view jihad as an opportunity for adventure, a chance to gain status in
a subculture that exalts violence, to overcome perceived personal
humiliation and prove manliness, to demonstrate prowess, to be
perceived as a warrior in an epic struggle.
For lonely hearts, joining jihad offers a camaraderie that can
sweep the more malleable along to schemes they would otherwise not have
contemplated. For those who feel powerless, violent action offers the
secret pleasures of clandestinity and power that come with the decision
to kill.
Al-Qaeda's ideology also has become a vehicle for resolving
personal discontents, an opportunity to start life over, to transcend
personal travail and turmoil through bloody violence, to soothe a
restless soul with the spiritual comfort of an absolute ideology that
dismisses the now as a brief passage between a glorious mythical past
and eternal paradise. The jihadist may see terrorism as a path to glory
in every sense of that word.
The Message to Would-Be Terrorists: No Path to Glory
Dealing with domestic radicalization does not mean countering
jihadist propaganda. It means applying the law. What one believes is a
matter of conscience. What one does to impose his or her beliefs on
others concerns everyone. When a course of action involves the threat
or use of violence, it becomes a matter of law. America's response to
homegrown terrorism must, above all, be based upon the law.
The individualistic quality of radicalization and recruitment to
jihadist terrorism in the United States suggests a counter-recruitment
strategy that focuses on dissuading individuals from joining al-Qaeda's
version of jihad. This can be accomplished not through ideological or
theological debate with al-Qaeda's on-line communicators, but by
deterrence through arrests, by treating terrorists and would-be
terrorists as ordinary criminals, by stripping them of political
pretensions.
The message to would-be terrorists should be that they can trust no
one. They will fail. They will be detected and apprehended. They will
be treated as ordinary criminals and will spend a long time in a prison
cell. They will receive no applause. They will disgrace their families
and their communities. They will be labeled fools. Their lives will be
wasted. There will be no glory.
Authorities could go further and consider something like Italy's
so-called ``repentant program,'' in which convicted terrorists were
offered reduced sentences in return for their cooperation. This kind of
program differs from routine plea-bargaining and from efforts abroad to
rehabilitate terrorists. A ``repentant'' program would reward those who
not only provide authorities with operational intelligence, but also
contribute to understanding the recruitment process itself, and who
actively participate in efforts to discourage others from following the
same destructive path. It would let the denunciations of al-Qaeda
motivator al-Awlaki come from his own acolytes.
Local Authorities are Best Placed to Counter Recruiting
Preventing future terrorist attacks will require the active
cooperation of the American Muslim community, which is the target of
jihadist recruiting. It will require effective domestic intelligence
collection. Both are best accomplished by local authorities.
The first line of defense against radicalization and recruitment to
jihadist terrorism in the Muslim-American community is the Muslim-
American community. America's invasion of Iraq, its support for
Ethiopia's invasion of Somalia, and its current military efforts in
Afghanistan and Pakistan have created some pockets of resentment, but
polls indicate little support for al-Qaeda's jihadist fantasies among
American Muslims. Cooperation against terrorism means more than the
public denunciations of al-Qaeda that many non-Muslim Americans demand
as proof of Muslims' patriotism, nor should tips to police be the sole
metric.
Much of the defense against jihadist radicalization will be
invisible--quiet discouragement, interventions by family members and
friends, and when necessary, discreet assistance to the authorities.
Reports indicate that this is already taking place.
Community policing can maintain the cooperation that is needed.
This does not involve police in religious or political debates, which
are matters for the community. It requires building and maintaining
trust between the community and local authorities and understanding
local communities and diasporas, their problems, and their concerns.
Community cooperation will not prevent all terrorist attempts.
Respected community leaders may have limited influence over more
radical elements or may have no clue about tiny conspiracies or
individuals who are on an interior journey to terrorism.
Members of the community must realize that while they play an
important role in discouraging terrorism, they cannot be intermediaries
in criminal investigations or intelligence operations aimed at
preventing terrorist attacks. American Muslims should not regard
themselves or be perceived by others as targets because they are
Muslims. But being Muslim brings no privileged or separate status.
Disruption of Terrorist Plots: An Undeniable Intelligence Success
Twenty-five of the reported cases of homegrown terrorism involved
plots to carry out attacks in the United States. Only three--including
the failed Times Square bombing attempt--got as far as implementation,
an undeniable intelligence success. And no doubt, other terrorist plots
have been disrupted without arrests, while the publicized success of
authorities has had a deterrent effect on still other plotters.
Intelligence has improved since 9/11. Federal Government agencies
share more information with each other and with local police
departments and fusion centers, although there are still some problems.
But connecting dots is not enough, and the emphasis on information-
sharing should not distract us from the difficult and delicate task of
domestic intelligence collection.
Domestic Intelligence Collection Remains Haphazard
The diffuse nature of today's terrorist threat and the emphasis on
do-it-yourself terrorism challenge the presumption that knowledge of
terrorist plots will come first to Federal authorities, who will then
share this information with State and local authorities. It is just as
likely--perhaps more likely--that local law enforcement could be the
first to pick up the clues of future conspiracies.
Local police departments are best placed to collect domestic
intelligence. Their ethnic composition reflects the local community.
They know the territory. They don't rotate to a new city every 3 or 4
years. They report to local authorities. But they often lack an
understanding of intelligence and require resources and training.
Despite the clear need for improved domestic intelligence,
collection remains haphazard. The Joint Terrorism Task Forces are
extremely effective, but they are case-oriented, and investigation
differs from intelligence. The fusion centers are venues for sharing
information and have diverse responsibilities, but few collect
intelligence.
An Army of On-Line Jihadists but Few Terrorists
The internet plays an important role in contemporary terrorism, as
jihadists have effectively demonstrated. It allows global
communications, critical to a movement determined to build an army of
believers. It facilitates recruiting. It is accessible to seekers,
reinforcing and channeling their anger. It creates on-line communities
of like-minded extremists, engaging them in constant activity. It is a
source of instruction. It facilitates clandestine communication.
The internet, however, has not enabled al-Qaeda, despite its high
volume of sophisticated communications, to provoke a global intifada.
Its websites and chat rooms outnumber its Western recruits. Its on-line
exhortations to Americans have produced a very meager return--an army
of on-line jihadists, but only a tiny cohort of terrorists in the real
world. And while the internet offers would-be terrorists a continuing
tutorial on tactics and improvised weapons, again thus far, this has
not yet significantly improved terrorist skills.
Moreover, the internet provides insights into jihadist thinking and
strategy and has proved to be a source of intelligence leading to
arrests. This must be kept in perspective when considering
countermeasures. These might include ways to address the issue of
anonymity and facilitate investigations--and here, terrorist use of the
internet represents only one facet of a much larger problem of cyber-
crime.
I have no doubt that jihadists will attempt further terrorist
attacks. Some will succeed. That is war. But I also have no doubt that
these attacks will not defeat this republic or destroy its values
without our active complicity, as long as we do not yield to terror.
Ms. Harman. Thank you very much. Mr. Romero.
STATEMENT OF ANTHONY D. ROMERO, EXECUTIVE DIRECTOR, AMERICAN
CIVIL LIBERTIES UNION
Mr. Romero. Good morning, Chairman Harman, Ranking Member
McCaul and other Members of the subcommittee. Thank you for the
opportunity to testify on behalf of the American Civil
Liberties Union about the need to preserve our rights to
privacy and free speech even in times of threat to our Nation.
We commend you, Chair, for recognizing that our founding
principles must not be sacrificed in the name of National
security.
However, by billing this hearing as an examination of
recruitment of new terrorists using internet facilities, the
subcommittee suggests an inherent evil in allowing the internet
to continue without some change to its current open forum. We
are here to implore this committee to resist leveling its
legislative guns at the most democratic form of modern
communication.
The internet is our most important communications medium.
It has been and must remain the most open marketplace of ideas.
Any suggestion to limit this marketplace will not only be a
direct and immediate harm to the speech and privacy rights of
law-abiding Americans, but it would also erode the very
principles that make our country the beacon of freedom to
people around the globe.
To be clear, the internet is not our enemy. Terrorists are
our enemies.
Now some suggest taking down websites containing terrorist-
laden material is necessary like the ones we saw today. But
such discretion is exactly the kind of censorship that the
Supreme Court has repeatedly cast aside in more than 20 years.
In 1984, Justice Blackmun cautioned ``By placing discretion in
the hands of an official to grant or deny a license, such a
statute creates a threat of censorship that by its very
existence chills free speech.'' In the landmark case of Reno v.
ACLU the Court again clearly extended protection to internet
speech saying ``Our cases provide no basis for qualifying the
level of First Amendment scrutiny that should be applied to
internet speech.''
Our history, our Nation's history is replete with
regrettable Government actions restricting free speech and
privacy rights in the name of National security. Consider the
Alien and Sedition Act of 1798 during a time of conflict with
France. One measure made it a crime to publish false,
scandalous, and malicious writing against the Government or its
officials.
The Sedition Act of 1918 in which Congress prohibited the
use of ``disloyal, profane, scurrilous, or abusive language
about the government, the flag, or the Armed Forces.'' It also
outlawed anything that caused others to view the Government or
its institutions with contempt.
The Cold War brought about a red scare characterized by
Congressional witch hunts orchestrated by Senator Joseph
McCarthy and the House Un-American Activities Committee, which
ruined the careers of thousands of loyal Americans based purely
on their associations or their beliefs.
The COINTELPRO spying program, in which the FBI opened over
500 domestic intelligence files between 1960 and 1974 targeting
people solely on their political affiliations and beliefs and
created a list of 26,000 individuals who would be rounded up in
an event of National emergency.
Now if our history is any indication, some of the policies
adopted in the wake of 9/11, such as lowering the threshold for
electronic surveillance or efforts that might try to rein in
certain kinds of on-line communications, that these two will be
ultimately seen as a stain on our Nation's reputation as the
leading protector of individual rights.
The best antidote to harmful speech is not censorship, but
more speech. Not only will we stand by the principles we hold
dear, but we will show the world and ourselves that we are not
afraid of dissent. We will show that we are not afraid of the
cacophony that must be our democracy.
On a practical level, by keeping the internet free from
censorship, we will provide new clues to our law enforcement
and intelligence personnel tasked with the difficult and
necessary job of seeking out those who would do us real harm.
We must also not forgo our traditional notions of privacy
in the mad scramble to provide false notions of security. Our
system, based on the existence of probable cause and judicial
oversight, provides an appropriate balance that preserves
personal privacy while providing law enforcement and
intelligence officials with the tools they need.
Fear, or fear mongering, must not drive Government policies
any longer. Protecting the First and Fourth Amendments,
honoring our values, and making sure that we keep this country
both safe and free is the only way to approach the crisis that
does, in fact, confront us.
Thank you very much.
[The statement of Mr. Romero follows:]
Prepared Statement of Anthony D. Romero
May 26, 2010
Good morning Chair Harman, Ranking Member McCaul, and Members of
the subcommittee. Thank you for the opportunity to testify on behalf of
the American Civil Liberties Union (ACLU), its more than half a million
members, countless additional supporters and activists, and 53
affiliates Nation-wide. The ACLU is one of the Nation's oldest and
largest organizations committed to defending the Constitution and Bill
of Rights in the courts and before the Executive and Legislative
branches of Government. The ACLU is concerned about the need to
steadfastly preserve our rights to privacy and free speech even in
times of threat to our Nation. We all acknowledge the Government's
legitimate interest in protecting the Nation from terrorism and in
stemming actions that further the unlawful, violent acts of terrorist
groups. But just because a threat exists does not justify the erosion
of principles that are at the core of our Constitutional identity. The
Constitution requires precision in pursuing legitimate Government goals
to ensure the Government properly distinguishes between confederates of
terrorist groups who seek to facilitate their unlawful aims, and others
whose legitimate First Amendment-protected activity brings them into
association with such groups. Sacrificing our civil liberties in the
pursuit of security is unwise, unnecessary, and counterproductive to
preventing extremist violence.
We commend this subcommittee for recognizing that our founding
principles must not be sacrificed in the name of homeland security.
Merely by billing this hearing as an examination of recruitment of new
terrorists using internet facilities, however, the subcommittee
suggests an inherent evil in allowing the internet to continue to exist
in its current open form. Since terrorists use the internet to recruit
new terrorists, as the narrative goes, Congress must do something to
stop such on-line activity. We leave it to others to debate whether
evidence shows that terrorists' use of the internet makes them more
effective or simply more vulnerable to interception of their
communications. Instead we are here to implore this subcommittee not to
level its legislative guns at this most democratic of communications
tools. The internet is merely a communications medium. It should remain
the most open marketplace of ideas, where those who believe in the
American system of individual rights should out-argue those who would
advocate harm to our homeland. Any suggestion to limit this marketplace
would not only be a direct and immediate harm to the speech and privacy
rights of law-abiding Americans, it would also erode those very
principles that make our country the beacon of freedom to people around
the globe.\1\
---------------------------------------------------------------------------
\1\ Our statement before this subcommittee in December 2009
addressed our concern that some envisioned an overly rigid ``path to
extremism'', whereas the best evidence suggests there is no fixed path
and that there are many ways that individuals come to take violent
action--whether based on extremist beliefs or not. In that hearing, we
argued for a focus on how individuals become predisposed to violence
and not on the nature of any ideology, since ideology--even extremist
ideology--need not be inherently violent. Statement of Michael W.
Macleod-Ball, House Committee on Homeland Security, Subcommittee on
Intelligence, Information Sharing, and Terrorism Risk Assessment,
Violent Extremism: How Are People Moved from Constitutionally-Protected
Thought to Acts of Terrorism? (Dec. 15, 2009).
---------------------------------------------------------------------------
Without doubt, the rise of communications technologies presents
challenges to those interested in preserving traditional civil
liberties standards. Nearly 50 years ago, in a case involving the
wearing of an undercover ``wire'', Chief Justice Earl Warren
anticipated many legal disputes of the more recent past. ``The
fantastic advances in the field of electronic communication,'' he wrote
in 1963, ``constitute a greater danger to the privacy of the
individual.''\2\ Four years later, the Chief Justice also foresaw that
measures adopted in the name of National security often posed special
dangers to individual rights--an argument that bears directly on any
proposal to limit the internet in the name of fighting terrorism. In
U.S. v. Robel, he wrote:
---------------------------------------------------------------------------
\2\ Lopez v. U.S., 373 U.S. 427, 441 (1963) (Warren, J.,
concurring).
``This concept of `National defense' cannot be deemed an end in itself,
justifying any exercise of legislative power designed to promote such a
goal. Implicit in the term `National defense' is the notion of
defending those values and ideals which set this Nation apart . . .
[O]ur country has taken singular pride in the democratic ideals
enshrined in its Constitution, and the most cherished of those ideals
have found expression in the First Amendment. It would indeed be ironic
if, in the name of National defense, we would sanction the subversion .
. . of those liberties . . . which make the defense of our Nation
worthwhile.''\3\
---------------------------------------------------------------------------
\3\ U.S. v. Robel, 389 U.S. 258, 264 (1967).
Today, we urge this subcommittee to stand strong for freedom as you
work to protect our Nation from harm. If you find that our enemies are
using the internet to recruit, we encourage use of the internet to
dissuade. At the same time, we can and should be using their on-line
communications to learn as much as is lawfully possible about those who
would do us harm and their activities and motives, following proper law
enforcement and intelligence procedures and with appropriate judicial
oversight. We urge you to leave the internet alone as an unfettered
place of freedom and anonymity--and preserve the rights to speech and
privacy for all those law abiding Americans who use these ``fantastic''
forms of electronic communications.
I. FIRST AMENDMENT FREEDOMS
The First Amendment to the United States Constitution guarantees
freedom of religion, speech, press, petition, and assembly.\4\ These
protections are based on the premise that open and unrestrained public
debate empowers democracy by enriching the marketplace with new ideas
and enabling political and social change through lawful means.\5\ These
freedoms also enhance our security. Though ``vehement, caustic and
sometimes unpleasantly sharp attacks on Government and public
officials'' have to be endured under our Constitutional system of
Government, the uninhibited debate these freedoms guarantee is
recognized as ``essential to the security of the Republic'' because it
ensures a Government responsive to the will of the people.\6\ Moreover,
as Justice Louis Brandeis explained, our Nation's Founders realized
that the greater threat to security lay not in protecting speech, but
in attempting to suppress it:
---------------------------------------------------------------------------
\4\ U.S. Const., amend. 1: ``Congress shall make no law respecting
an establishment of religion, or prohibiting the free exercise thereof;
or abridging the freedom of speech, or of the press; or the right of
the people peaceably to assemble, and to petition the Government for a
redress of grievances.''
\5\ See U.S. v. Associated Press, 52 F. Supp. 362, 372 (S.D.N.Y.
1943); Roth v. U.S., 354 U.S. 476, 484 (1957).
\6\ See New York Times Co. v. Sullivan, 376 U.S. 254, 270 (1964),
quoting Stromberg v. California, 283 U.S. 359, 369 (1931).
``Those who won our independence . . . knew that order cannot be
secured merely through fear of punishment for its infraction; that it
is hazardous to discourage thought, hope, and imagination; that fear
breeds repression; that repression breeds hate; that hate menaces
stable Government; that the path of safety lies in the opportunity to
discuss freely supposed grievances and proposed remedies, and that the
fitting remedy for evil counsels is good ones. Believing in the power
of reason as applied through public discussion, they eschewed silence
coerced by law--the argument of force in its worst form. Recognizing
the occasional tyrannies of governing majorities, they amended the
Constitution so that free speech and assembly should be
guaranteed.''\7\
---------------------------------------------------------------------------
\7\ Whitney v. California, 274 U.S. 357, 375-376, (1927),
(Brandeis, J., concurring).
Some who seek to curtail the use of email and websites by purported
terrorists would do so by taking down websites. In order to do so,
though, someone in Government would have to be assigned the job of
deciding what sites to censor and what sites to leave in place. Such
discretion is exactly the kind of censorship that the Court has
repeatedly cast aside. Justice Harry Blackmun addressed the notion of
such discretionary censorship. ``By placing discretion in the hands of
an official to grant or deny a license, such a statute creates a threat
of censorship that by its very existence chills free speech.''\8\ More
specifically, the Supreme Court has held that internet speech is
protected to the full extent of the First Amendment.\9\ ``[O]ur cases
provide no basis for qualifying the level of First Amendment scrutiny
that should be applied to this medium.''\10\ There is simply no fair
and just way to draw a line that protects the rights of those who are
merely controversial from those who are pursuing a more sinister
objective.\11\ Accordingly, such recommendations must yield to the
enduring power of our First Amendment.
---------------------------------------------------------------------------
\8\ Secretary of State of Md. v. Munson Co., 467 U.S. 947, 964 n.
12 (1984).
\9\ Reno v. ACLU, 521 U.S. 844, 870 (1997).
\10\ Id.
\11\ ``[T]he mere abstract teaching . . . of the moral propriety or
even moral necessity for a resort to force and violence, is not the
same as preparing a group for violent action and steeling it to such
action.'' Brandenburg v. Ohio, 395 U.S. 444, 448 (1969) (per curiam)
(quoting Noto v. U.S., 367 U.S. 290, 297-98). The Brandenburg opinion
set aside a state statute that barred advocacy of the propriety of
violence or voluntary assembly for such criminal purposes. Id.
---------------------------------------------------------------------------
II. THE RIGHT TO PRIVACY
The Fourth Amendment to the U. S. Constitution establishes the core
of our understanding of our right to privacy.\12\ In short, government
may not invade an individual's privacy without justifying the need for
doing so to a court. Courts have applied this basic principle to
different forms of communications, including letters, telephone
conversations, and other more advanced forms.\13\ Anticipating the
oncoming development of privacy law, Justice William Douglas asserted
that the right to be let alone is ``indeed the beginning of all
freedoms''.\14\
---------------------------------------------------------------------------
\12\ U.S. Const., amend. 4: ``The right of the people to be secure
in their persons, houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no Warrants shall
issue, but upon probable cause, supported by Oath or affirmation, and
particularly describing the place to be searched, and the persons or
things to be seized.''
\13\ See Ex parte Jackson, 96 U.S. 727, 733 (1877) (letters and
sealed packages); Katz v. U.S., 389 U.S. 347, 352 (1967) (telephone
communications); Kyllo v. U.S., 533 U.S. 27, 34 (2001) (changing
technology should not erode society's expectation of privacy).
\14\ Public Util. Comm'n v. Pollak, 343 U.S. 451, 467 (1952)
(Douglas, J., dissenting).
---------------------------------------------------------------------------
Some have argued that the on-line presence of websites advocating
terrorist causes justifies casting aside the Fourth Amendment standard
to chase down anyone who might have visited any such site. Just as the
mere use of the internet as a tool does not justify setting aside our
speech rights, so too should the privacy right remain untouched. No
court will stand in the way of a legitimate and well-founded Government
application for a search of electronic communications when probable
cause exists to believe that wrongdoing has occurred or is about to
occur. To now further blur the line that defines when law enforcement
may secretly invade one's personal communications will inevitably lead
to abuse--as it has already done.\15\
---------------------------------------------------------------------------
\15\ Substantial exceptions to the norm of requiring judicial
approval for such searches have already been adopted. The USA PATRIOT
Act and amendments to the Foreign Intelligence Surveillance Act provide
major loopholes to traditional standards. We oppose those exceptions
and have challenged some of them in court. Numerous reports, including
those of the DOJ Inspector General, document abuses of these special
authorities. Their existence serves as even further basis to argue
against any form of additional extrajudicial surveillance authority for
the purpose of seeking out those who visit websites relating in some
way to terrorism or terrorist activities.
---------------------------------------------------------------------------
III. GOVERNMENT INFRINGEMENT ON CIVIL LIBERTIES IN TIMES OF CRISIS
As Congress grapples with determining what it can do to help reduce
the threat of terrorism within our borders, it is important to keep in
mind that our Nation's history is replete with regrettable Governmental
actions restricting speech and privacy rights in the name of protecting
the country. Indeed the ACLU was founded in 1920 to come to the defense
of immigrants, trade unionists, and political activists who were
illegally rounded up by the thousands in the infamous Palmer raids
during America's first ``red scare,'' a period of significant anarchist
violence. Rather than focusing on finding the perpetrators of the
violence, the Government sought anyone who supported similar political
views, associated with disfavored organizations or wrote or spoke in
opposition to Government policies. Lawyers who complained of the abuse,
which included torture, coerced confessions, illegal searches and
arrests, were subject to investigation themselves.\16\
---------------------------------------------------------------------------
\16\ SELECT COMM. TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO
INTELLIGENCE ACTIVITIES, U.S. SENATE, 94TH CONG., FINAL REPORT ON
SUPPLEMENTAL DETAILED STAFF REPORTS ON INTELLIGENCE ACTIVITIES AND THE
RIGHTS OF AMERICANS (BOOK III), S. Rep. No. 94-755, at 385 (1976),
available at: http://www.aarclibrary.org/publib/church/reports/book3/
html/ChurchB3_0196b.htm.
---------------------------------------------------------------------------
We are able to see such actions for what they are when they occur
in foreign lands. When Google was the subject of a sophisticated
cyberattack and subsequently revealed that the Chinese government
wanted its cooperation in blocking access to sites based on political
content, the world was naturally aghast.\17\ But in contemporaneous
public discourse we tend not to apply the same standards when our own
Government attempts to take similar actions to restrict civil liberties
in the name of National security. It is only well after the
precipitating crisis has passed that we tend to see our own
Government's actions in a clearer light.
---------------------------------------------------------------------------
\17\ ``Google Said to Have Made No Progress in China Dispute,''
Bloomberg Businessweek (Mar. 23, 2010) (available at http://
www.businessweek.com/news/2010-03-23/google-said-to-have-made-no-
progress-in-two-month-china-dispute.html).
---------------------------------------------------------------------------
The pattern of abusive Government action in the United States in
times of crisis goes much further back than the Palmer raids of the
1920s and continues to today.
Alien and Sedition Acts.--Congress enacted four bills in
1798 during a time of conflict with France. The Federalists in
the John Adams administration strongly objected to the
dissenting voices of those led by Thomas Jefferson and other
Democratic-Republicans, who were generally sympathetic to the
French cause. Of the four laws, the Sedition Act made it a
crime to publish ``false, scandalous, and malicious writing''
against the Government or its officials. Negative reaction led
to Jefferson's election in 1800 and the laws ultimately expired
or were repealed.\18\
---------------------------------------------------------------------------
\18\ An Act for the Punishment of Certain Crimes against the United
States, ch. 74, 1 Stat. 596 (available at http://avalon.law.yale.edu/
18th_century/sedact.asp).
---------------------------------------------------------------------------
Anarchist Exclusion Act.--Congress passed this law to
authorize the deportation of immigrants who subscribed to
anarchist ideas. Adopted at a time of unrest concerning
immigration into the United States, the Anarchist Exclusion Act
was re-adopted following the assassination of President
McKinley by the American son of Polish immigrants. The law's
authorities were expanded to allow wider discretion for
deportations in the Immigration Act of 1918.\19\
---------------------------------------------------------------------------
\19\ An Act to Regulate the Immigration of Aliens into the United
States, ch. 1012, 32 Stat. 1222.
---------------------------------------------------------------------------
Sedition Act of 1918.--Congress prohibited the use of
``disloyal, profane, scurrilous, or abusive language'' about
the Federal Government, the flag, or the armed forces. It also
outlawed anything that caused others to view the Government or
its institutions with contempt. It was repealed in 1920 after
the war ended, but those convicted under its terms generally
received sentences of 10 to 20 years.\20\
---------------------------------------------------------------------------
\20\ Stone, Geoffrey R., Perilous Times: Free Speech in Wartime
from the Sedition Act of 1798 to the War on Terrorism (2004)
(hereinafter Stone, Perilous Times).
---------------------------------------------------------------------------
Justice Department GID.--Following World War I, the
Department of Justice General Intelligence Division (GID), the
precursor agency to the Federal Bureau of Investigation (FBI),
collected 150,000 secret files ``giving detailed data not only
upon individual agitators connected with the radical movement,
but also upon organizations, associations, societies,
publications and social conditions existing in certain
localities.''\21\ By the GID's own account the warrantless
searches, arrests, and deportations were not useful in
identifying suspected terrorists or other criminal activity.
Rather, its claimed success was in ``wrecking the communist
parties in this country'' and shutting down ``the radical
press.''\22\
---------------------------------------------------------------------------
\21\ SELECT COMM. TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO
INTELLIGENCE ACTIVITIES, U.S. SENATE, 94TH CONG., FINAL REPORT ON
SUPPLEMENTAL DETAILED STAFF REPORTS ON INTELLIGENCE ACTIVITIES AND THE
RIGHTS OF AMERICANS (BOOK III), S. Rep. No. 94-755, at 386 (1976),
[hereinafter, CHURCH REPORT] available at: http://www.aarclibrary.org/
publib/church/reports/book3/html/ChurchB3_0196b.htm.
\22\ Id. at 387.
---------------------------------------------------------------------------
State investigations.--The New York State Legislature
initiated a 2-year investigation from 1919 to 1920 into the
spread of radical ideas. The Joint Legislative Committee to
Investigate Seditious Activities (commonly referred to as the
Lusk Committee) ultimately produced a report, Revolutionary
Radicalism: Its History, Purpose and Tactics, which ``smeared
liberals, pacifists, and civil libertarians as agents of
international Communism.''\23\ Though thousands were arrested,
few were prosecuted or deported and little incriminating
information was obtained during the committee's
investigation.\24\
---------------------------------------------------------------------------
\23\ Samuel Walker, In Defense of American Liberties: A History of
the ACLU (1990) at 16.
\24\ The Lusk Committee: A Guide to the Records of the Joint
Committee to Investigate Seditious Activities: A Guide to the Records
Held in the New York State Archives, available at: http://
www.archives.nysed.gov/a/research/res_topics_bus_lusk.shtml.
---------------------------------------------------------------------------
Smith Act.--Congress outlawed the publication of any printed
matter advocating the overthrow of the Government and required
the registration of all non-citizen adult residents in 1940.
The law was used for a number of high profile political
prosecutions against isolationists, pro-fascists, and
communists in the 1940s and 1950s, including one of the early
leaders of the ACLU. The law fell into disuse after several
convictions were set aside by the Supreme Court in the late
1950s.\25\
---------------------------------------------------------------------------
\25\ 18 USC 2385. See also Stone, Perilous Times.
---------------------------------------------------------------------------
McCarthy hearings and House Un-American Activities
Committee.--The Cold War brought about a new red scare
characterized by Congressional witch hunts orchestrated by
Senator Joseph McCarthy's Permanent Subcommittee on
Investigations and the House Un-American Activities Committee,
which ruined the careers of many loyal Americans based purely
on their associations. In particular, their work helped to
blacklist people from certain industries and in particular the
entertainment industry in the late 1940s and 1950s based solely
on political views of those who were targeted.\26\
---------------------------------------------------------------------------
\26\ Goodman, Walter, The Committee (1968); Whitfield, Stephen J.,
The Culture of the Cold War (1996).
---------------------------------------------------------------------------
COINTELPRO.--The FBI ran a domestic counter-intelligence
program that quickly evolved from a legitimate effort to
protect the National security from hostile foreign threats into
an effort to suppress domestic political dissent through an
array of illegal activities. The Senate Select Committee that
investigated COINTELPRO (the ``Church Committee'') said the
``unexpressed major premise of . . . COINTELPRO is that the
Bureau has a role in maintaining the existing social order, and
that its efforts should be aimed toward combating those who
threaten that order.''\27\ Instead of focusing on violations of
law, these investigations targeted people based on their
beliefs, political activities and associations. FBI opened over
500,000 domestic intelligence files between 1960 and 1974, and
created a list of 26,000 individuals who would be ``rounded
up'' in the event of a National emergency.\28\ The FBI used the
information it gleaned from these improper investigations not
for law enforcement purposes, but to ``break up marriages,
disrupt meetings, ostracize persons from their professions and
provoke target groups into rivalries that might result in
deaths.''\29\
---------------------------------------------------------------------------
\27\ CHURCH REPORT, at 7.
\28\ Id., at 6-7.
\29\ Id., at 5.
---------------------------------------------------------------------------
Warrantless surveillance after 9/11.--The Bush
administration authorized a sweeping program of surveillance of
electronic communications without Congressional approval. While
some in Congress spoke out against the program, Congress
ultimately not only authorized much of the surveillance after-
the-fact, but also granted immunity to the large
telecommunications companies that gave the Government access to
the communications records in question.\30\ In 2008, Congress
legislated an even broader warrantless spying program when it
passed the Foreign Intelligence Surveillance Act (FISA)
Amendments Act, which permits the Government to intercept all
international internet activity without an individualized
warrant based on probable cause to believe that a crime or act
of terrorism has been or will be committed, even if one party
to the communication is a U.S. person within the boundaries of
the United States.\31\
---------------------------------------------------------------------------
\30\ ACLU letter to U. S. Senate, ``Vote NO on H.R. 6304, the FISA
Amendments Act--Oppose Warrantless Surveillance and Immunity for
Telecommunications Companies'' (Jun. 25, 2008) (available at http://
www.aclu.org/files/images/general/asset_upload_file902_35782.pdf).
\31\ 50 U.S.C. 1881-1881g. Allegations of abuse go well beyond
the electronic surveillance issues referenced here. Many American
Muslim community leaders and members have pointed to the selective and
disproportionate enforcement of counterterrorism laws against American
Muslim individuals and charities as evidence of discriminatory,
religion-based targeting of Muslims and their charitable organizations.
See Blocking Faith, Freezing Charity: Chilling Muslim Charitable Giving
in the War on Terrorism Financing, ACLU (Jun. 2009) (available at
www.aclu.org/human-rights/report-blocking-faith-freezing-charity).
Congress must avoid conflating the real issue of terrorism recruiting
with the right to dissent or the right to practice one's religious
beliefs.
---------------------------------------------------------------------------
National security letter abuses.--The month after 9/11,
Congress enacted the USA PATRIOT Act which greatly expanded the
FBI's ability to access private records without judicial
oversight. The FBI actually went further and abused the vastly
expanded authorities it received under the new law. It used the
authority to acquire records having no relation to National
security and it used NSLs to circumvent other authorities
requiring judicial oversight.\32\ The USA PATRIOT Act
unconstitutionally amended other provisions of surveillance
laws so that the Government could obtain communications and
records of individuals who are not suspected of engaging in or
preparing for an act of terrorism.\33\
---------------------------------------------------------------------------
\32\ A Review of the FBI's Use of National Security Letters, DOJ
Office of Inspector General (Mar. 2007) (available at http://
www.justice.gov/oig/special/s0703b/final.pdf).
\33\ See 50 U.S.C. 1861, as amended by Section 215 of the USA
PATRIOT Act. This statute permits Government to obtain a secret court
order for ``any tangible thing'' upon showing ``relevance'' to a
foreign intelligence investigation, such as a list of every person who
visits a certain website, a list of every person who entered a certain
search term into a search engine, or the identity of an anonymous
poster on a website.
---------------------------------------------------------------------------
Unfortunately, we have not yet seen the outrage and curative
legislation to the Executive branch's unilateral initiation of
systematic surveillance of email and telephone records without
Congressional authorization in the years following 2001. It did not
exist in sufficient force to cure those unlawful executive actions,
just as it did not exist in sufficient force to immediately overturn
the Sedition Act or the Anarchist Exclusion Act or the Smith Act.
Perhaps we are still too close the shocking events of September 11 and
we remain blind to the harm that arises out of such restrictions on our
freedoms. If history is any indication, however, in time these laws
will be seen as a stain on our Nation's reputation as the leading
protector of individual rights--and any attempt to limit speech on the
internet, even for the purpose of protecting the homeland, will surely
be viewed by later generations in the same harsh light as we now view
the Alien and Sedition Acts and the hearings of the House Un-American
Activities Committee and the actions of the FBI under COINTELPRO.
IV. PROTECT SPEECH AND PRIVACY ON THE INTERNET
A report by the Senate Homeland Security and Governmental Affairs
Committee (HSGAC) entitled Violent Islamist Extremism, the Internet,
and the Homegrown Terrorism Threat placed inordinate and inappropriate
significance on the role of the internet in the radicalization
process.''\34\ The internet is simply a tool for communication and the
expression of ideas--some beneficial, some benign, some harmful. In
that sense, the internet is like the printing press or the postal
service or the telephone. Focusing on the tools used to transmit
despised ideas as the key to solving our security problem only
increases the likelihood that censorship on the internet will be part
of a proposed solution. Indeed, shortly after the publication of the
HSGAC report Senator Joseph Lieberman sent a letter to Google calling
on them to take down ``terrorist content.''\35\ We are concerned that
this subcommittee, seeking to reduce on-line recruits to terrorist
causes, will make the same mistakes made by countless lawmakers
throughout our history.
---------------------------------------------------------------------------
\34\ United States Senate Committee on Homeland Security and
Governmental Affairs Majority and Minority Staff Report, ``Violent
Islamist Extremism, The Internet, and the Homegrown Terrorist Threat,''
(May 8, 2008). The report noted, for instance, that ``For those who
want to know more about violent Islamist ideology, immense caches of
information and propaganda are available on-line,'' and ``the internet
can play a critical role throughout the radicalization process, the
potential end point of which is planning and executing a terrorist
act.'' Id. at 5, 10.
\35\ Letter from Senator Joseph Lieberman to Dr. Eric Schmidt,
Chairman of the Board and Chief Executive Officer, Google, Inc., (May
19, 2008) at: http://lieberman.senate.gov/newsroom/
release.cfm?id=298006.
---------------------------------------------------------------------------
Government censorship violates the First Amendment and undermines
democracy. Moreover, any attempt to censor the internet would be futile
and counterproductive. Electronic content is ubiquitous and easily
transferable. Media removed from one source is often duplicated
elsewhere, and a closed website can soon reopen in another guise and at
another location. Lt. Col. Joseph Felter, Ph.D., Director of the
Combating Terrorism Center at West Point, told the HSGAC that
``[a]ttempts to shut down websites have proven as fruitless as a game
of whack-a-mole.''\36\ Such attempts at censorship would only bring
greater attention to the objectionable content.
---------------------------------------------------------------------------
\36\ Statement of Lt. Col. Joseph Felter, Hearing before the Senate
Committee on Homeland Security and Governmental Affairs, ``The
Internet: A Portal to Violent Islamist Extremism,'' (May 3, 2007), at:
http://www.investigativeproject.org/documents/testimony/224.pdf.
---------------------------------------------------------------------------
It is vital to the freedom of all Americans that free speech on the
internet be protected. It is possible that the unique nature of the
cyber-revolution has posed some challenges in protecting the
internet.\37\ But such a conclusion would not be unique to the
internet. ``Each medium of expression . . . may present its own
problems.''\38\ Nevertheless, our ``profound national commitment to the
free exchange of ideas'' requires that we meet those challenges to
preserve fundamental freedoms, on the internet just as rigorously as in
other forms of communication.\39\
---------------------------------------------------------------------------
\37\ Universal City Studios, Inc. v. Corley, 273 F. 3d 429, 433 (2d
Cir. 2001).
\38\ Southeastern Promotions, Ltd. v. Conrad, 420 U.S. 546, 557
(1975).
\39\ Harte-Hanks Comm., Inc. v. Connaughton, 491 U.S. 657, 686
(1989).
---------------------------------------------------------------------------
Courts acknowledge the importance of keeping the web's channels of
communication open and free from discrimination. The United States
Supreme Court has concluded that speech on the internet is entitled to
the highest level of protection under the First Amendment. Any attempts
to censor its content or silence its speakers are viewed with extreme
disfavor.\40\
---------------------------------------------------------------------------
\40\ See, e.g., Ashcroft v. ACLU, 542 U.S. 656 (2004) (upholding a
preliminary injunction of the Child Online Protection Act); Reno v.
ACLU, 521 U.S. at 844 (striking down certain provisions of the
Communications Decency Act).
---------------------------------------------------------------------------
In addition, courts recognize that the public has a First Amendment
interest in receiving the speech and expression of others. ``[T]he
right of the public to receive suitable access to social, political,
aesthetic, moral and other ideas and experiences'' is one of the
purposes served by the First Amendment.\41\ Indeed, the ``widest
possible dissemination of information from diverse and antagonistic
sources is essential to the welfare of the public.''\42\ The internet
has become the principal source for the public to access this diversity
of ideas--good ideas, bad ideas, and all those in between.\43\
---------------------------------------------------------------------------
\41\ Red Lion Broad. Co. v. FCC, 395 U.S. 367, 390 (1969).
\42\ Metro Broad., Inc. v. FCC, 497 U.S. 547, 566-67 (1990)
(quoting Associated Press v. U.S., 326 U.S. 1, 20 (1945)).
\43\ Over one billion people have used the internet, including
nearly 70 percent of all people in North America. See http://
www.internetworldstats.com/stats.htm (visited on Oct. 4, 2006).
---------------------------------------------------------------------------
Courts also understand that ``the internet represents a brave new
world of free speech.''\44\ Specifically, the internet provides unique
opportunities for speech and discourse. Unlike other communication
media, ``the internet has no `gatekeepers'--no publishers or editors
controlling the distribution of information.''\45\ As a result, the
internet does not suffer from many of the limitations of alternative
markets for the free exchange of ideas. Therefore, courts have
vigorously protected the public's right to uncensored internet access
on First Amendment grounds.
---------------------------------------------------------------------------
\44\ Blumenthal v. Drudge, 992 F. Supp. 44, 48 n. 7 (D.D.C. 1998)
(quoting Sanford & Lorenger, Teaching an Old Dog New Tricks; The First
Amendment in an Online World, 28 Conn. L. Rev. 1137 (1996)).
\45\ Id.
---------------------------------------------------------------------------
In a similar vein, Congress has enacted legislation to protect and
promote free speech on the internet. In the 1996 Telecommunications
Act, Congress found that ``[t]he rapidly developing array of internet
and other interactive computer services available to individual
Americans represent an extraordinary advance in the availability of
educational and informational resources to our citizens.''\46\ Congress
further declared that it is the policy of the United States ``to
encourage the development of technologies which maximize user control
over what information is received by individuals, families, and schools
who use the internet.''\47\ Congress therefore immunized internet
providers and users from any liability for publishing ``any information
provided by another information content provider.''\48\
---------------------------------------------------------------------------
\46\ 47 U.S.C. 230(a)(1).
\47\ 47 U.S.C. 230(b)(3).
\48\ 47 U.S.C. 230(c)(1).
---------------------------------------------------------------------------
V. CONCLUSION
The best antidote to harmful speech is more speech expressing
countervailing messages. It is far better in this context, then, to do
the best possible job to oppose the messages with which we disagree
than to stifle them and drive them underground. Not only will we stand
by the principles we hold dear, we will show that we are not afraid of
dissent and that we will stand toe-to-toe with all comers and stand
proud of our faith in our institutions and principles. Moreover, by
refusing to yield to those who would censor the internet, we provide
new clues to our law enforcement and intelligence personnel tasked with
the difficult job of seeking out those specific individuals who would
do us harm. Active censorship would minimize the availability and
utility of such information.
Similarly, we must not forego our traditional notions of privacy in
the race to provide security. Our well-tested system, based on the
existence of probable cause to believe wrongdoing has occurred or is
about to occur and appropriate judicial oversight, has served our
country well. That system provides an appropriate balance that
preserves the personal privacy of our fellow Americans, while providing
law enforcement and intelligence officials the tools they need.
Disrupting that balance would put later prosecutions at risk while
necessarily heightening Government intrusion into the private affairs
of wholly innocent individuals.
Fear should not drive our Government policies. As Justice Louis
Brandeis reminds us:
``To courageous, self-reliant men, with confidence in the power of free
and fearless reasoning applied through the processes of popular
government, no danger flowing from speech can be deemed clear and
present unless the incidence of the evil apprehended is so imminent
that it may befall before there is opportunity for full discussion . .
. Such must be the rule if authority is to be reconciled with
freedom.''\49\
---------------------------------------------------------------------------
\49\ Whitney v. California, 274 U.S. 357, 376, (1927), (Brandeis,
J., concurring).
---------------------------------------------------------------------------
The statement is just as true applied to standards of personal
privacy. Protecting our First and Fourth Amendment freedoms will both
honor our values and keep us safe.
Ms. Harman. Thank you, Mr. Romero.
I just would underscore the title of this hearing in light
of what you have just said, which is: ``Internet Terror
Recruitment and Tradecraft: How Can We Address an Evolving Tool
While Protecting Free Speech?''
Now I yield 5 minutes to Mr. Morris to summarize his
testimony.
STATEMENT OF JOHN B. MORRIS, JR., GENERAL COUNSEL, CENTER FOR
DEMOCRACY AND TECHNOLOGY
Mr. Morris. Madam Chair, Mr. Chairman, Ranking Member
McCaul, and Members of the committee, on behalf of the Center
for Democracy and Technology I would like to thank you for the
opportunity to testify, and I would like to applaud the
committee for, as Chair Harman just pointed out, for focusing a
hearing on the need to balance free speech versus the need to
protect this country, both of which are very important needs.
On the key Constitutional question let me just start by
simply agreeing with the analysis presented by Mr. Romero.
The First Amendment places important limitations on
Governmental actions to restrict speech, even speech by those
who would do harm to the United States, and these
Constitutional principles must underlie any analysis of
Governmental responses to terror recruiting. In the context of
the internet, these concerns are even more challenging.
But beyond the Constitutional issues, I would like to spend
a few minutes looking at the broader statutory context in which
speech on the internet arises. A key question that is implicit
in this hearing is what, if anything, can the Government do to
stop the recruiting of terrorists on-line? That leads to the
question of should we require service providers who facilitate
internet communications to act to somehow stop the terror
recruiting?
So in the language of the internet, the service providers
are often called, at least legally called, intermediaries. The
ISPs that allow you access to the internet, the on-line
websites, and services like YouTube and Facebook are all
intermediaries whose services enable users, including both
speakers and listeners, to exchange ideas and communicate on-
line.
These intermediaries are really what sets the internet
apart from other forms of mass communications. With newspapers
and TV, the owner of the newspaper or the owner of the TV
station is the one who picks and chooses what gets put up and
communicated to the masses. But on the internet, in contrast,
anyone can publish to the entire world often for little or no
money. This openness has transformed our society, allows all of
us, including terrorists, to become content creators, creating
a vast audience, reaching a vast audience without having to own
a newspaper or a TV station. As Mr. Romero says, that really
has transformed our society for the better.
But this new structure has led to new questions such as
should intermediaries, should the ISPs and the web hosting
companies be responsible or legally liable for the content that
their users put up?
In 1996, Congress took a very strong action to answer this
question and to protect on-line intermediaries from
responsibility for the content that their users post. As part
of the Telecommunications Act of 1996, Congress passed what is
now known as simply Section 230 of the Communications Act.
Section 230 says in its simple terms that on-line service
providers cannot be held to be responsible for the content
posted by their users.
This intermediary protection has been extraordinarily
successful and is directly responsible for the explosive growth
of innovative and dynamic new services. But by protecting on-
line providers, Congress enabled the huge range of social
networking and video sharing sites and other Web 2.0 services
that enable individual citizens and constituents to speak on-
line.
So as this committee considers the problem of on-line
terror recruiting, we would urge it to keep in mind how vital
intermediary protection has been to the growth of the internet.
If Congress were to somehow make on-line services responsible
to keep terror recruiting off of the internet, that could have
a significant harmful effect on the growth of the internet.
Let me look at one example, just to look at YouTube, the
YouTube video sharing service. On that site, users post 24
hours of video every single minute of every day. If Congress
compelled YouTube to examine each one of these videos before
allowing it to be posted on-line to be sure that it didn't have
objectionable content, YouTube simply couldn't continue to
operate as an open forum for user expression. The same is true
of countless other forums and blogs where users post hundreds
of thousands of comments every hour.
The protection for intermediaries has been a key foundation
for the success of the internet, and a decision to undo that
would raise some grave concerns about the future of the
internet.
It doesn't mean that there is nothing that can be done. To
speak to what Congressman McCaul asked about self-monitoring,
YouTube is another good example. They have terms of service
that specifically allow them to take down incitements to
violence. I don't know if these videos were on YouTube, I don't
know what YouTube would say about these particular videos. But
videos that really do incite violence, YouTube will certainly
look at. They have a 24/7 staff to review complaints about
videos, and I think they would take prompt action.
Thanks very much.
[The statement of Mr. Morris follows:]
Prepared Statement of John B. Morris, Jr.
May 26, 2010
FREE SPEECH AND ONLINE INTERMEDIARIES IN AN AGE OF TERROR RECRUITMENT
Chair Harman, Ranking Member McCaul, and Members of the
subcommittee: On behalf of the Center for Democracy & Technology
(CDT),\1\ I thank you for the opportunity to testify today. The issues
raised by on-line terror recruiting are difficult ones, made
challenging by the Constitutional and statutory implications of any
Governmental attempts to regulate on-line speech. We applaud the
subcommittee for holding this hearing, which directly looks at the free
speech questions raised, and we appreciate the opportunity to address
the implications that regulation of terror recruiting could have for
on-line free speech, as well as for innovation and competition on the
internet.
---------------------------------------------------------------------------
\1\ The Center for Democracy & Technology is a non-profit public
interest organization dedicated to keeping the internet open,
innovative, and free. Among our priorities is preserving the balance
between security and freedom in an age of terrorism. CDT has offices in
Washington, DC, and San Francisco.
---------------------------------------------------------------------------
INTRODUCTION AND OVERVIEW
Terrorism is a defining threat in our society today, and the use of
any medium of communications--including the internet--to recruit foot
soldiers for terror attacks on the United States is a serious concern.
It is understandable and appropriate that this subcommittee should
consider possible Governmental responses to this concern, and the legal
and Constitutional implications of such responses.
There are a number of possible Governmental responses to on-line
terror recruitment, including (among others) seeking to directly
prohibit speakers from posting such content and seeking to require on-
line service providers to prevent such speech from being posted in the
first place, or otherwise holding service providers responsible for the
speech. This testimony first looks at the First Amendment issues raised
by any Governmental attempt to restrict on-line speech. The testimony
then focuses on one possible response--seeking to make on-line websites
and services responsible for policing user content for on-line terror
recruitment activities, or otherwise be held liable for such content.
This possible response is one part of a larger question of whether
on-line ``intermediaries'' should be liable or responsible for content
posted by their users. The term ``on-line intermediary'' encompasses
conduits (such as ISPs) and platforms (such as social networks and
video sharing sites) that allow users to access on-line content and
communicate with one another. In 1996, Congress enacted broad and
strong protection for intermediaries from attempts to impose liability
on them for content posted by others, or otherwise force them to police
the content posted on-line. This intermediary liability protection has
been extraordinarily successful and is directly responsible for the
explosive and innovative growth of on-line services that we have
experienced over the past decades. By protecting on-line providers from
intermediary liability, Congress enabled a huge range of innovative new
websites to offer social networking, video sharing, and other ``Web
2.0'' services that have transformed how we do business and socialize
on-line.
A decision by Congress to step back from such protections and to
impose obligations on service providers to police on-line content--even
in the effort to fight terrorism--would have serious and harmful
implications both for free speech on-line and for innovation and
competition in on-line services. We urge this subcommittee to exercise
great caution as it considers what steps would be appropriate to
respond to on-line terror recruiting.
INTELLIGENCE AND LAW ENFORCEMENT CONSIDERATIONS
Before addressing the range of issues raised by terror recruiting,
we would like to raise a threshold question for the subcommittee to
consider. A mandate requiring the removal of terror recruiting content
on-line could be counterproductive to the fight against terrorism. On-
line content gives insight into terrorist groups' intentions and
methods. In a range of contexts, on-line content provides law
enforcement and intelligence agencies with a wealth of information
about the messages of terrorists groups, as well as the sources of the
communications. Using appropriate legal process, Government agencies
may be able gain invaluable information about terrorist operations by
monitoring on-line sites and services. It is thus not clear that a
broad mandate to block or remove this type of content would be the most
effective response to it.
TERROR RECRUITING AND THE FIRST AMENDMENT
As Congress considers possible responses to terror recruiting, it
must confront an unavoidable fact: that most of the ``anti-American''
speech of terrorists and other enemies of the United States is
protected speech under our First Amendment. The modern First Amendment
shields from Government regulation even speech that calls for the
demise of the United States, so long as the speech does not cross the
line into an incitement to violence or a ``true threat.''
As the Constitutional context for the subcommittee's consideration
of terror recruiting, it should consider at least two important strands
of First Amendment doctrine: First, the limits on restrictions on
violent content and content that might incite violence, and second, the
limits on the Government's ability to impose a ``prior restraint'' on
unlawful speech.
Violence, Incitement to Violence, and True Threats
On-line content that seeks to recruit for a terrorist cause may
contain three different types of content that have been addressed in
First Amendment cases: Depictions of violence, incitement to violence,
and ``true threats'' of violence.
While the U.S. Supreme Court has deemed certain sexual content to
be obscene--and thus outside of the protection of the First Amendment--
the Court has never declared that violent expressive content should be
excluded from First Amendment protection. In a 1948 case focused on
crime story magazines, the Supreme Court concluded that depictions of
violence in the magazines are ``as much entitled to the protection of
free speech as the best of literature.''\2\ Consistent with that
conclusion, courts have rejected attempts to characterize violent
content as ``obscene'': ``Material that contains violence but not
depictions or descriptions of sexual conduct cannot be obscene.''\3\
And last month, in a case involving depictions of animal cruelty, the
Supreme Court again declined to expand the realm of Constitutionally
permissible speech restrictions past the few categories of speech it
has historically included.\4\ As Chief Justice Roberts wrote in that
case:
---------------------------------------------------------------------------
\2\ Winters v. New York, 333 U.S. 507, 510 (1948).
\3\ Video Software Dealers Ass'n v. Webster, 968 F.2d 684, 688 (8th
Cir. 1992). See also Eclipse Enters., Inc. v. Gulotta, 134 F. 3d 63, 66
(2d Cir. 1997) (``We decline any invitation to expand these narrow
categories of [unprotected] speech to include depictions of
violence.'').
\4\ United States v. Stevens, 559 U.S.____ (2010) (available at
http://www.supremecourt.gov/opinions/09pdf/08-769.pdf).
``The First Amendment itself reflects a judgment by the American people
that the benefits of its restrictions on the Government outweigh the
costs. Our Constitution forecloses any attempt to revise that judgment
simply on the basis that some speech is not worth it. The Constitution
is not a document `prescribing limits, and declaring that those limits
may be passed at pleasure.' ''\5\
---------------------------------------------------------------------------
\5\ Id. at ____ (quoting Marbury v. Madison, 1 Cranch 137, 178
(1803)).
In light of these decisions, terrorist communications that simply
depict violent or terrorist acts would likely be beyond the reach of
Government regulation.\6\
---------------------------------------------------------------------------
\6\ The Supreme Court recently agreed to review a case concerning
violent content and minors, see Video Software Dealers Ass'n v.
Schwarzenegger, 556 F. 3d 950 (9th Cir. 2009), cert. granted, 559 U.S.
____ (2010), but that appeal is unlikely to affect the Constitutional
analysis of a broader restriction on violent content.
---------------------------------------------------------------------------
Speech that incites violence, however, can in some context be
regulated, but the First Amendment nevertheless protects speech that
merely advocates for violence. In its 1969 decision in Brandenburg v.
Ohio, the Supreme Court held that:
``[T]he constitutional guarantees of free speech and free press do not
permit a State to forbid or regulate advocacy of the use of force or of
law violation except where such advocacy is directed to inciting or
producing imminent lawless action and is likely to incite or produce
such action.''\7\
---------------------------------------------------------------------------
\7\ Brandenburg v. Ohio, 395 U.S. 444, 447 (1969). See also Hess v.
Indiana, 414 U.S. 105 (1973) (speech of antiwar protestor not intended
to incite violence).
A few years later, the Court made clear that to be advocacy of
violence could be prohibited only where there was evidence that
challenged speech was ``intended to produce, and likely to produce,
imminent disorder.''\8\
---------------------------------------------------------------------------
\8\ Hess, 414 U.S. at 109 (1973) (finding that speech of antiwar
protestor was not intended to incite violence).
---------------------------------------------------------------------------
In evaluating terror recruitment, a court applying the Brandenburg
test would consider whether the speech would likely yield ``imminent''
violence. A related but murkier area of the law is the First Amendment
jurisprudence allowing the prohibition of a ``true threat.'' Generally,
the First Amendment will not protect statements that convey a direct
threat of violence against particular individuals, but the courts have
struggled to provide a clear test by which to gauge a ``true threat.''
In its 1969 decision in Watts v. United States, the Supreme Court
concluded that an anti-war protester who threatened the President was
not making a ``true threat.''\9\ In 2003, although not speaking for a
majority of the Court, Justice O'Connor explained that a ``true
threat'' was ``where a speaker directs a threat to a person or group of
persons with the intent of placing the victim in fear of bodily harm or
death.''\10\ But the Supreme Court has made clear in the ``true
threat'' context that ``mere advocacy of the use of force or violence
does not remove speech from the protection of the First
Amendment.''\11\
---------------------------------------------------------------------------
\9\ Watts v. United States, 394 U.S. 705 (1969).
\10\ Virginia v. Black, 538 U.S. 343. 360 (2003).
\11\ NAACP v. Claiborne Hardware Co., 458 U.S. 886, 927 (1982).
---------------------------------------------------------------------------
Only a few reported cases have addressed the use of the internet in
the incitement of or threat of violence. In United States v. Harrell,
the defendant was convicted of posting a terrorist threat to an
internet chat site on the day following the September 11, 2001,
terrorist attacks on the United States; the defendant apparently did
not raise, and the court did not address, any First Amendment issues
concerning the incident.\12\
---------------------------------------------------------------------------
\12\ United States v. Harrell, 207 F. Supp. 2d 158 (S.D.N.Y. 2002).
---------------------------------------------------------------------------
In Zieper v. Reno, the courts addressed a case in which a U.S.
Attorney's office attempted (with some brief success in November 1999)
to suppress the display on a website of a video film ``which depicted a
planned military takeover of New York City's Times Square during the
millennial New Year's Eve.''\13\ According to allegations made in a
later action for damages and injunctive relief, Federal officials
sought to block public access to the film; the website owner removed
the film from the internet, but later restored it and the Federal
officials took no further action. In the damages action, the district
court concluded that the plaintiffs had adequately pleaded a First
Amendment violation.\14\
---------------------------------------------------------------------------
\13\ Zieper v. Reno, 30 Media L. Rep. 2164, 2164 (S.D.N.Y. 2002).
See also Zieper v. Reno, 111 F. Supp. 2d 484 (D.N.J. 2000).
\14\ Zieper v. Metzinger, 62 Fed. Appx. 383 (2nd Cir. 2003). In
another case, a Federal court concluded that a website operator who
listed names, addresses, and telephone numbers of law enforcement
personnel was protected by the First Amendment, since that information,
even if made available with the intent to harm, could not be a threat.
See Sheehan v. Gregoire, 272 F. Supp. 2d 1135 (W.D. Wash. 2003).
---------------------------------------------------------------------------
The most significant case concerning violence or threats of
violence over the internet involved an anti-abortion website. In
Planned Parenthood of Columbia/Willamette, Inc. v. American Coalition
of Life Activists, plaintiff doctors (who provided medical services
including abortions to women) challenged a website that contained
``Wanted'' style posters targeting doctors (and some of the doctors
targeted were in fact murdered). The Ninth Circuit Court of Appeals
concluded that the ``Wanted'' posters did constitute a ``true threat''
and thus were not protected under the First Amendment.\15\
---------------------------------------------------------------------------
\15\ Planned Parenthood of Columbia/Willamette, Inc. v. Am. Coal.
of Life Activists, 290 F. 3d 1058, 1087-88 (9th Cir. 2002).
---------------------------------------------------------------------------
Under the prevailing First Amendment jurisprudence, any attempt to
regulate terror recruiting on the internet would likely face strong
First Amendment challenges, but depending on the precise language of
the recruiting message and whether it contained a ``true threat'' or an
incitement to imminent violence, it is possible that such speech could
Constitutionally be subject to criminal penalties.
Prior Restraints
Beyond the question of whether terror recruiting can
Constitutionally be penalized is the question of whether such speech
could be the subject of a prior restraint--that is, whether it could be
restricted on a blanket basis, in advance, and without a full panoply
of procedural safeguards.
The concern over prior restraints on speech is central to our First
Amendment jurisprudence. The First Amendment was first conceived as a
prohibition on prior restraints, in response to the seventeenth century
English system that licensed all printing presses and prevented
anything from being printed without prior permission from the governing
authorities.\16\ As the Supreme Court made clear in the leading modern
prior restraint case, Bantam Books, Inc. v. Sullivan, ``[a]ny system of
prior restraints of expression comes to this Court bearing a heavy
presumption against its Constitutional validity.''\17\ The Government
bears ``a heavy burden of showing justification for the imposition of
such a restraint.''\18\ As evidenced by the case involving the
``Pentagon Papers,'' even a strongly asserted claim of National
security may not overcome the presumption against prior restraints.\19\
---------------------------------------------------------------------------
\16\ See Near v. State of Minn. ex rel. Olson, 283 U.S. 697, 713-14
(1931) (discussing original focus of First Amendment).
\17\ Bantam Books, Inc. v. Sullivan, 372 U.S. 58, 70 (1963).
\18\ Org. for a Better Austin v. Keefe, 402 U.S. 415, 419 (1971).
\19\ New York Times Co. v. United States, 403 U.S. 713 (1971).
---------------------------------------------------------------------------
The courts have allowed prior restraints to stand only in the
narrowest of contexts. For example, because obscene material has been
declared to be unprotected under the First Amendment, the courts have
allowed prior restraint of specific obscene items. But, even with
content that is not protected by the First Amendment, the First
Amendment requires that strict procedural safeguards be implemented and
followed before a prior restraint would be upheld.\20\ In a long line
of cases, the Supreme Court has articulated clear procedures that must
be followed, including (a) an adversarial hearing, (b) with the burden
on the Government, and (c) with clear opportunity for prompt judicial
review and appeal.\21\ The Supreme Court has made clear that any prior
restraint of speech can only ``take[] place under procedural safeguards
designed to obviate the dangers of a censorship system.''\22\
---------------------------------------------------------------------------
\20\ See, e.g., Freedman v. State of Md., 380 U.S. 51 (1965).
\21\ See, e.g., Freedman, 380 U.S. at 58-59; Southeastern
Promotions Ltd. v. Conrad, 420 U.S. 546, 560 (1975); FW/PBS, Inc. v.
City of Dallas, 493 U.S. 215, 227 (1990).
\22\ Southeastern Promotions, 420 U.S. at 560 (quoting Freedman,
380 U.S. at 58).
---------------------------------------------------------------------------
Moreover, the problems raised by prior restraints are even greater
on the internet, where on-line content can change frequently and
quickly, and where the primary means of identifying content (``IP
addresses'' such as ``124.45.23.98,'' and world wide web ``URLs'' such
as ``http://www.cdt.org'') are only pointers to potentially changing
content. Thus, even if content on a particular day at a particular
website is determined by a court to be a ``true threat'' or an
incitement to violence, the content could change the next day and the
prior determination of illegality would not apply to the new content.
The Supreme Court has made clear that a finding that a particular
publication or venue was found to contain or display illegal content
was not enough to justify imposing a prior restraint on future content
in the publication or at the venue.\23\ Consistent with the Court's
holdings, in 2004 a district court in Pennsylvania struck down as
unconstitutional a State prior restraint law that applied to
websites.\24\
---------------------------------------------------------------------------
\23\ See Near v. Minnesota ex rel. Olson, 283 U.S. 697 (1931)
(holding where publication was a magazine); Vance v. Universal
Amusement Co., Inc., 445 U.S. 308 (1980) (holding where venue was a
movie theatre).
\24\ See Ctr. for Democracy & Tech. v. Pappert, 337 F. Supp. 2d
606, 656 (E.D. Pa. 2004).
---------------------------------------------------------------------------
The Supreme Court sets a very high bar against prior restraints.
The Court has noted:
``The presumption against prior restraints is heavier--and the degree
of protection broader--than that against limits on expression imposed
by criminal penalties. Behind the distinction is a theory deeply etched
in our law: A free society prefers to punish the few who abuse rights
of speech after they break the law than to throttle them and all others
beforehand.''\25\
---------------------------------------------------------------------------
\25\ Vance, 445 U.S. at 316 n. 13.
---------------------------------------------------------------------------
beyond the constitution: protection for online intermediaries
In considering possible approaches to terror recruiting, a
threshold question is whether the Government can Constitutionally
regulate or prohibit the speech at issue. If the speech falls into a
category that can be restricted, then the Government can consider using
the criminal law to penalize the speech.
The question of whether the Government can do more--such as to try
to prevent the speech from occurring in the first place--raises the
prior restraint issues discussed above. In the internet context, this
question also raises another vital issue: What responsibilities, if
any, should be placed on the service providers and other intermediaries
to control the targeted content?
To assess this question, it is critical that the subcommittee
understand the broader context of the strong intermediary liability
protection that has marked the United States' approach to on-line
content since the early days of the commercial internet. This
protection has played an essential part in supporting the innovation
and growth that we have experienced in on-line services. As important
as the fight against terrorism unquestionably is, we urge the
subcommittee not to go down the path of seeking to impose liability or
responsibility for content on intermediaries.
The Need for Strong Protections for Intermediaries
The global internet has become a vibrant and essential platform for
economic activity, human development, and civic engagement. Every day,
millions of journalists, educators, students, business people,
politicians, and ordinary citizens go on-line to speak, access
information, and participate in nearly all aspects of public and
private life.
Internet service providers (ISPs), websites, on-line services, and
a range of other technology companies act as conduits and platforms for
speech. These ``intermediaries'' play critical roles in getting
information and ideas from one corner of the on-line world to another,
and they provide valuable forums for speech, from the political to the
mundane--forums that are open, up-to-the-minute, and often free of
charge.
The openness of these forums means, of course, that some users will
post content or engage in activity that is unlawful or otherwise
offensive. Liability for on-line content can arise in a number of
situations, including for defamation, obscenity, invasion of privacy,
or intellectual property infringement. This reality raises important
policy questions that have an impact on the growth of the on-line
environment: Specifically, should technological intermediaries such as
ISPs and on-line services be held liable for or be responsible to
police content posted by their users and other third parties?
The answer in the United States has been to protect intermediaries
from responsibility to police content posted by users.\26\ While users
themselves should remain responsible for their unlawful on-line
activities, policies protecting intermediaries from liability for
content posted by third parties expand the space for expression and
innovation and promote the internet as a platform for a wide range of
beneficial activities. The history of the internet to date shows that
providing broad protections for intermediaries against liability is
vital to the continued robust development of the internet.
---------------------------------------------------------------------------
\26\ In appropriate cases and pursuant to lawful process,
intermediaries do continue to be required to respond to law enforcement
subpoenas concerning on-line speakers who post illegal content.
---------------------------------------------------------------------------
The internet developed and flourished because of an early U.S.
policy framework based on competition, openness, innovation, and trust.
This framework places power in the hands not of centralized
gatekeepers, but rather of the users and innovators at the edges of the
network. Importantly, this approach provides broad protections from
liability for ISPs, web hosts, and other technological intermediaries
for unlawful content transmitted over or hosted on their services by
third parties (such as users).
It is vital to understand the reasons why intermediary liability
protection is so important for free speech on the internet. When
intermediaries are liable or responsible for the content created by
others, they will strive to reduce their liability risk. In doing so,
they are likely to overcompensate, blocking even lawful content. In
this way, intermediary liability chills expression on-line and
transforms technological intermediaries into content gatekeepers.
Indeed, holding intermediaries broadly liable for user content
greatly chills their willingness or ability to host any content created
by others. Liability creates strong incentives to screen user content
before it is posted on-line, creating an indirect prior restraint on
speech and inevitably leading to less user-generated content overall.
In some instances, entire platforms for expression simply could not
exist because the sheer volume of content would make it impossible or
economically unviable for the company to screen all user-generated
content. As one example, users post over 24 hours of video to YouTube
every minute.\27\ If liability concerns or an obligation to keep
certain videos off of the service compelled YouTube to examine each
video before allowing it to be posted on-line, YouTube could not
continue to operate as an open forum for user expression. The same is
true of the countless forums and blogs where users post hundreds or
thousands of comments every hour.
---------------------------------------------------------------------------
\27\ Ryan Junee, ``Zoinks! 20 Hours of Video Uploaded Every
Minute!'', Broadcasting Ourselves ;), May 20, 2009, http://youtube-
global.blogspot.com/2009/05/zoinks-20-hours-of-video-uploaded-
every_20.html. Representatives of Google have recently stated that the
current figure is 24 hours of video posted every minute.
---------------------------------------------------------------------------
Intermediary liability also creates another problematic incentive:
Intermediaries will tend to over-block content and self-censor,
especially where definitions of illegal content are vague and
overbroad. In the face of threatened liability or policing
responsibility, intermediaries will err on the side of caution in
deciding what may be allowed. This incentive is especially strong (and
can cause particular damage) when intermediaries are not able to easily
determine if the content is unlawful on its face.\28\
---------------------------------------------------------------------------
\28\ For example, while a private party may allege that certain
content is defamatory or infringes copyright, such determinations are
usually made by judges and can involve factual inquiry and careful
balancing of competing interests and factors. ISPs and on-line service
providers are not well-positioned to make these types of
determinations.
---------------------------------------------------------------------------
In 1996, to address these concerns, Congress took strong action to
insulate on-line intermediaries from liability. As part of the
Telecommunications Act of 1996, Congress enacted Section 230 of the
Communications Act.\29\ Now known simply as ``Section 230,'' the
statute advances three policy goals: (1) To promote the continued rapid
and innovative development of the internet and other interactive media;
(2) to remove disincentives to voluntary self-screening of content by
service providers; and (3) to promote the development of tools (like
filters) that maximize user control over what information the user
receives online.
---------------------------------------------------------------------------
\29\ 47 U.S.C. 230. In addition to Section 230, Congress has also
protected intermediaries through Section 512 of the Digital Millennium
Copyright Act, 17 U.S.C. 512, which protects intermediaries from
liability so long as they afford copyright holders a means to have
copyright violations taken down. Beyond the statutory bases for
liability protection, there are strong arguments that the First
Amendment would require such protection in at least some contexts.
---------------------------------------------------------------------------
To advance its first goal, Section 230 gives intermediaries \30\
strong protection against liability for content created by third-party
users.\31\ Section 230 has been used by interactive on-line services as
a screen against a variety of claims, including negligence, fraud,
defamation, violations of Federal civil rights laws, and violations of
State criminal laws.\32\
---------------------------------------------------------------------------
\30\ Section 230 calls these intermediaries ``interactive computer
services.'' 47 U.S.C. 230(c)(1).
\31\ The statute provides: ``No provider or user of an interactive
computer service shall be treated as the publisher or speaker of any
information provided by another information content provider.'' 47
U.S.C. 230(c)(1).
\32\ See, for example, Center for Democracy & Technology, ``CDT
Joins Briefs Urging Courts to Properly Apply 230 of the CDA,'' Policy
Post 14.4, March 31, 2008, http://www.cdt.org/policy/cdt-joins-briefs-
urging-courts-properly-apply-section-230-cda. See also Electronic
Frontier Foundation, ``Section 230 Protections,'' Bloggers' Legal
Guide, http://www.eff.org/issues/bloggers/legal/liability/230.
---------------------------------------------------------------------------
It is precisely these protections that led to the dramatic growth
of social networking and other interactive, user-generated content
sites that have become vibrant platforms for expression in the United
States and all over the world. It is no surprise that almost all ``Web
2.0'' innovation on-line has taken place in the United States, which
has the strongest protections for intermediaries. Without Section 230,
entry barriers for new internet services and applications that allow
user-generated content would be much higher, dampening the innovation
we have seen in interactive media. The threat of liability would also
tend to close the market to start-ups, which are often unable to afford
expensive compliance staffs (thereby entrenching existing market
players).
Protection for intermediaries has been a key foundation for the
success of the internet. A decision to undo that foundation, and to
seek to impose responsibility on online intermediaries for problematic
content--including terror recruiting--would threaten the continued
growth and innovation that has been the hallmark of the internet.
Terms of Service
The first operative part of Section 230-- 230(c)(1)--provides
strong and important protection to intermediaries, but the second part
provides a different type of protection: protection from liability for
a provider's voluntary decision to remove content. Under
230(c)(2)(a), intermediaries can block or take down content they
believe is inappropriate, without fear of liability to the poster of
the content.
This protection has encouraged all of the leading Web 2.0 sites and
services to promulgate robust ``terms of service'' that specify types
of content that are not permitted on the sites. Thus, for example, most
leading social networks and video sharing sites have rules against
sexually explicit material, and they routinely remove even legal
content if it violates their terms of service. These self-regulatory
efforts illustrate how a policy of protecting intermediaries from
liability is compatible with--and can even help serve--other societal
interests.
These terms of service will often prohibit terror recruiting
content of the types discussed above. As one illustration, the terms of
service from one leading video sharing site--YouTube.com--contain a
number of prohibitions that could bar a video promoting terrorism:
Graphic or gratuitous violence is not allowed. If your video
shows someone being physically hurt, attacked, or humiliated,
don't post it.
YouTube is not a shock site. Don't post gross-out videos of
accidents, dead bodies, or similar things intended to shock or
disgust . . .
We encourage free speech and defend everyone's right to
express unpopular points of view. But we don't permit hate
speech (speech which attacks or demeans a group based on race
or ethnic origin, religion, disability, gender, age, veteran
status, and sexual orientation/gender identity).
Things like predatory behavior, stalking, threats,
harassment, intimidation, invading privacy, revealing other
people's personal information, and inciting others to commit
violent acts or to violate the Terms of Use are taken very
seriously. Anyone caught doing these things may be permanently
banned from YouTube.\33\
---------------------------------------------------------------------------
\33\ Excerpts from YouTube Community Guidelines, available at
http://www.youtube.com/t/community_guidelines (last viewed May 24,
2010).
---------------------------------------------------------------------------
YouTube has in the past taken down terrorist videos that violate
its terms of service, and there is nothing to suggest that it and other
leading on-line services will not do so in the future.\34\
---------------------------------------------------------------------------
\34\ Thomas Claburn, ``Senator Lieberman Wants Terrorist Videos
Removed From YouTube,'' InformationWeek, May 20, 2008, available at
http://www.informationweek.com/news/internet/google/
showArticle.jhtml?articleID=207801148 (last viewed May 24, 2010).
---------------------------------------------------------------------------
Although relying on voluntary enforcement of terms of service will
not lead to the complete removal of terror recruiting content from the
internet, it will make such content less available, and will do so in a
manner that is consistent with both the First Amendment and the
statutory regime of intermediary protection.
CONCLUSION
CDT would like to thank the subcommittee for holding this important
hearing to consider both the problem of terror recruiting as well as
the free speech implications of efforts to address the problem. We
appreciate the opportunity to testify today and we look forward to
working with the subcommittee on these issues.
Ms. Harman. Thank you very much.
Mr. Mudd.
STATEMENT OF JOHN PHILIP MUDD, SENIOR RESEARCH FELLOW,
COUNTERTERRORISM STRATEGY INITIATIVE, NEW AMERICA FOUNDATION
Mr. Mudd. Madam Chair, Mr. Chairman, Ranking Member and
others, I have to say at the outset I don't have any formal
remarks. I would like to make a few comments. It is a real
honor to be here. It is my first time to be here as a private
citizen outside of 24 years in Government. There aren't a lot
of rewards from the Government but to get a letter from the
committee saying please come talk to us, you guys made my day.
So thank you.
Ms. Harman. Not everyone would feel that way.
Mr. Mudd. I guess it ain't over yet. Right?
A couple of thoughts I guess from the outset.
First, we are not going to stop internet recruitment and
radicalization. It ain't going to happen in the world of
internet and the information age. So we can work on it, we can
chip away at it, but it is not going to stop.
Second, we mistake this group in this country often as a
terrorist group. I'm talking about al-Qaeda. It is not. It is a
revolutionary organization. Revolutionary organizations can't
win without an ideology that wins. In the 21st Century, that
ideology is spread by the internet. So this is an important
meeting because this is not a group whose end is to kill
civilians by taking out airplanes and buildings. Its end is to
recruit people who think and act as the organization wants them
to think and act, even if these people never met an al-Qaeda
member. So ideology is important. I wouldn't call them a
terrorist group. I would call them a revolutionary
organization.
Third, and the reason I think they are going to lose, they
are not jihadists, they are not terrorists, and we are not
talking about hate speech. They are murdering criminals. They
hate to be called that. They should be called that. Khalid
Sheikh Mohammed is not a terrorist. He murdered 3,000 people.
So when I think about this issue, what I think about is showing
the murder of an innocent, Nick Berg, on the internet. I don't
think about a terrorist act. I don't care if jihadists and
Yemen want to talk about jihad, that is fine. If you want to
talk about murdering innocents, that is what I worry about. It
is not about jihad, and it is not about terrorism. They are not
terrorists. They are revolutionaries. Their revolution is about
killing innocents.
So let me transition to a few thoughts.
As we deal with this, I think we have to watch the
transition into terrorism, and in the paper Brian Jenkins wrote
is really instructive. Now I remember sitting around the table
with George Tenet in 2002 and watching the paramilitary
campaign unfold at the nightly 5 o'clock meetings. I use the
word ``paramilitary'' advisedly. It is a campaign on the ground
in Afghanistan. Then we transition into one of the worst
periods as I remember as a professional, 2003, watching the
series of attacks in places like Saudi Arabia and Southeast
Asia and saying, boy, we are in deep trouble. Attacks by people
who are al-Qaeda affiliates or al-Qaeda members in places like,
again, the heartland, Saudi Arabia and Indonesia. Fast forward
to the last year 2009, 2010. The revolutionary movement has led
to people in Dallas, Chicago, New York, Atlanta, Miami, and
California. Most of the people involved in this activity are
native-born Americans, are people who are American citizens
born of foreign immigrants. They are not people--Zazi would be
an exception, the Denver kid. They are people who took the
message, may have some affiliation or connection with al-Qaeda,
often they don't, but the revolution is spreading, and one of
the ways it spreads is the internet. There is no question about
that.
Let me close with a few thoughts on the practicalities of
this and things I would think about if I were you. Three or
four questions come up when you sit around the table and watch
this stuff for 9 years.
First, what do you do with the service provider? Can you
force him to say, you can't put that Nick Berg video up? I say
Nick Berg because that is about as far as you can get down the
road of a brutal showing of the murder of an innocent. I'm not
talking about whether we're looking at websites where someone
again talks about jihad, I'm talking about showing and
glorifying the murder of a human being who has a soul.
So what do you do with service providers? Can you force
them to take it out?
The second is what about people who upload that stuff? What
do you do with them practically, not only in terms of
legislation, but can we follow them and should we? I want to
get back to that in just a second. I promise not to take too
much time.
The third, obviously, is what to do with the websites. Can
we just shut them off? I know there is a question about balance
between operations and whether we learn from those websites and
ideology. I can tell where I side, and hope you figure out
where I am going. This is an ideological group and you might
have short-term gains operationally, but in general I would say
make sure they can't spread the ideology, because that is
spreading the revolution.
One final thought, and then I will close. When you are
talking about looking at people, one of the things you want to
think about, I believe, is what I would call sort of the
algorithm of intelligence. We are not just talking about a
person in Texas or New Jersey who is looking at someone like
al-Awlaki. The question I would have as a career analyst and
someone who managed intelligence operations would be if you
have someone who travels repeatedly to Pakistan, it is doing
modeling, who travels repeatedly to Pakistan, who is under the
age of 35, who traveled alone, who paid for his ticket with
cash, and who is looking at al-Awlaki's website, I am asking
how do you deal with the situation where you put that in the
mix and you have seen that kind of activity not only in the
United States but in Western Europe, do you think that is okay
to look at someone? Because note in everything I said there is
no predicate that says that individual did anything wrong.
There is just modeling, as I learned in the past, that shows me
there ain't no learn in the second kick of the mule. I have
seen this happen before. People who look like that.
Okay, cautionary note as I close. If we are going to go
down this road, and I'm not suggesting we do, I just want to be
sort of, I have done this a long time, sort of offer you some
suggestions. You are going to hit a lot of dry holes. So
someone who says you should have, you could have found Hasan, I
am going to say, okay, make sure you understand that 200 people
who fit that same model are going to be pretty ticked off. So
think about that. Think about when that story breaks, that we
found Hasan, but 200 people who we also looked at because they
had the same sort of modeling characteristics popped up.
The second thing I would say is think about the resources
to do this. I'm sure Brian and Bruce can talk about this better
than I can. You are not talking about a couple of people
engaged in looking at these websites. Tens of thousands. So I
don't represent the Bureau any more, but I want a free lunch
from Director Mueller. If you want to do this, you are talking
about asking analysts and agents to look at a funnel of tens of
thousands of people, not only here, but partnering in visa
waiver countries and then necking down that number and not only
doing the analysis to do that but cutting hundreds of leads to
the field to say divert yourself from white collar crime or
public corruption or other terrorism investigations and go look
at someone because we kind of sort of think he fits the model
for activity.
So thanks for having me. It really is a pleasure to be
here.
[The statement of Mr. Mudd follows:]
Prepared Statement of John Philip Mudd
May 26, 2010
We often consider al-Qaeda and its affiliates and followers as
terrorists: Individuals who conduct attacks that down aircraft, destroy
buildings, and murder innocents. Terrorism is a tactic, however, not an
end. Al-Qaeda's end is ideological, an effort to spark a global
revolution among like-mindeds who see as their first goal the ouster of
the United States and its allies from Muslim lands and the overthrow of
regimes viewed by al-Qaeda as corrupt. Messaging is central to this
end, an end that entails reaching individuals who may never meet a
formal al-Qaeda member. This is a campaign of ideas.
The internet is a brilliant tool for spreading ideology, and al-
Qaeda uses the tool effectively. The conversation we have today will be
far more about how to stop the spread of the ideology behind al-Qaeda--
a long-term goal--than about how curbing internet-inspired violence can
stop attacks in the near term. We are engaged in a long campaign
against an idea, not a short war against a group. If we assume that
this is an ideological battle, digital strikes may be as important as
kinetic strikes. As one U.S. general has said, this battlefield is the
battlefield of the mind. And the internet is proving, time and again,
as a powerful tool to poison minds of those who then enter the
battlefield.
There are balancing issues to deal with here. Is it worth attacking
internet sites that can quickly morph? Can we use internet tracking to
look for individuals who might commit acts of violence? How does the
ideological benefit of blocking internet activity balance against
operational interests in watching internet activity? And, of course,
how much of what we see is legitimate free-speech activity?
We are concluding 9 years of post-9/11 operations. Noteworthy are
two facts that should affect our conversation:
First, most attacks post-9/11 have been conducted by al-
Qaeda affiliates and like-minded individuals, not al-Qaeda
members themselves. This is in stark contrast to the major
attacks in East Africa in 1998; in Yemen in 2000; and in the
United States in 2001. The message of venom has spread.
Second, most individuals connected to al-Qaeda-inspired
activity in this country are converts or native-born Muslims.
We see very few plots linked to al-Qaeda recruits that fit the
mold we might have expected when we accelerated this campaign 9
years ago. The message of venom has spread.
We can make great progress in the ideological campaign. Our
adversary has clearly telegraphed their weaknesses: They fear that they
are on ideological thin ice when they kill innocents, and we should
talk about this. This is a long campaign, and we have many chapters to
go. Historians may well write the next chapters, in years to come, with
less focus on how many innocents died than on how many lives were saved
as al-Qaeda's ideology crumbled under its own weight.
Ms. Harman. Thank you, Mr. Mudd. I think we will all agree
that we all had a full spectrum of views on this panel.
It is now time for questions.
Again, thanks to the witnesses for very careful testimony,
very thoughtful, very provocative, very informative testimony,
I think probably the best we have seen in a series of hearings
on this very difficult topic.
I want to put a proposition before you and just ask if you
agree with me. I am yielding to myself for 5 minutes for
questions, and then we will go to others.
I keep saying that security and liberty are not a zero sum
game. You either get more of both or less of both. I also keep
saying that the expression of radical views, even if we dislike
them, are protected by our First Amendment in our Constitution,
no matter how much we dislike them, and some of them are
odious, I think we would all agree, and I could list some but
we don't need to go there. But violent behavior is not
protected by our Constitution. The hard piece is finding that
line, that transition, between the expression of radical views
and someone with radical beliefs, which are protected, who then
becomes someone willing to engage in violent behavior.
So let me ask all of you just going down the road, and we
will start with Dr. Hoffman, do you agree that there is no zero
sum game if we are trying to live our values in this country?
Do you agree that it is appropriate to try to find a way to
intervene at that magic point where radical views become
violent behavior?
Mr. Hoffman. Absolutely, Madam Chair. This is why I am such
an outspoken supporter of your legislation that never passed,
because I think we need an empirical foundation before we can
attempt to do that.
I think, very clearly, our adversaries have communication
strategy. As I said in my testimony, I think, lamentably, we
don't; and that is what we need. Only based, I think, on a
thorough understanding of the process, can we develop one. But
I think the opposite reaction, which is to stick our head in
the sands, in essence to say that we don't have a problem here,
means that we are on a path to seeing, unfortunately, a
successful event like Times Square or like the Northwest
Airlines flight on Christmas day.
Ms. Harman. Thank you.
Mr. Jenkins.
Mr. Jenkins. I certainly don't see liberty and security as
a zero sum game. I agree with you on that.
On the issue of radicalization versus action, that is the
important distinction here. I think all of us have spoken about
radicalization and recruitment to terrorism violence. That
point is the real challenge. After 9/11, as a consequence of
concern about terrorism, we have been pushing the authorities
to move further upstream; that is, to intervene in a preventive
fashion rather than to simply react in the traditional law
enforcement mode. But, in that process, that is delicate, how
far upstream we can push that. At what point does thought
become action?
Ms. Harman. You nailed it, Mr. Jenkins.
Mr. Romero.
Mr. Romero. Well, of course, I very much agree with you,
Chair, about the fact that safety and freedom do not have to be
a zero sum game. But yet when we often talk about balancing
safety and freedom, we are often taking about a Faustian
bargain. It is an effort to give up some of the freedoms in the
name of National security, and that is where I think we go
wrong.
I think the question you posed to us about where you draw
that line is actually quite easy to answer and rather well
established. Go back to the Supreme Court, Brandenburg v. Ohio;
very clear. The line between speech and ideas and conduct is
very clear in that case. It applies. There it says, you can bar
speech that is causing imminent lawless conduct. Imminent
lawless conduct. If it is not imminent, it is protected. If it
is not lawless, it is protected. If it is not conduct, it is
protected. So mere advocacy of violence, as we saw on these
videos, while loathsome and disgusting, are certainly protected
by the First Amendment and certainly must remain a part of our
body politic.
Ms. Harman. Thank you.
Let me just follow up with you for one second. So if
someone goes on a bomb-making site on the internet--how to make
a dirty bomb, how to make a nuclear bomb; pick one--should that
person have an expectation of privacy because that person is
exercising his free speech rights to surf the web, or should we
perhaps decide that that person could be about to engage in
imminent conduct and monitor him or her?
Mr. Romero. First, let's deal with the practicality of the
reality. I think in the aftermath of September 11 we have given
law enforcement intelligence officials enormous tools to use
the internet and to surveil individuals. The PATRIOT Act, for
instance, grants enormous latitude under National Security
Letters to be able to intercept communications on the web. The
amendments to the Foreign Intelligence Surveillance Act have
given enormous powers to our law enforcement officials--we
often think too many powers--with insufficient judicial
oversight.
The fact that one goes on a website to see how a bomb might
be created, that alone should not be a reason to put a person
under surveillance. What if I am a journalist writing a book on
the Times Square bomber? I want to understand how he put it
together. I want to give the most thorough analysis of what was
going on, how he did it. I want to show the diagram of the car
in my book. I want to be able to explain to the American public
how easy it is to build a bomb. Should then I, as a journalist
or an author, find myself on an FBI list? That is where we have
to continue to look at the line between speech and conduct.
Ms. Harman. Thank you.
Mr. Morris.
Mr. Morris. Frankly, I am not sure I can add much beyond
what Mr. Romero said. I certainly agree there is not a zero sum
game for security and freedom, and I think we can achieve both.
It is important that we work to achieve both.
As my testimony detailed--written testimony--and I think
probably Mr. Romero's, I assume, and the Brandenburg case,
there is another line of Supreme Court cases about true
threats, whether a particular piece of speech is an actual
direct threat of harm to someone. Those can be Constitutionally
restricted. But the Supreme Court has made very clear that
merely advocating the use of force is not by itself
Constitutionally prohibitable.
Ms. Harman. Thank you.
Mr. Mudd.
Mr. Mudd. I think that is right. If someone wants to get on
the web and talk about jihad, I think that is their right. If
they want to talk about recruiting somebody to go to
Afghanistan to fight, that is against the law and that is going
to murder American soldiers. So, to me, I view it again as sort
of a criminal issue, not as an ideological issue. Ideology is
whatever you want to believe.
Second, I would again go back to the practical and talk
about resources. Even if someone were to tell me--and I would
be uncomfortable participating in this--if someone were to tell
me, you need to go look at all jihadists, it is not practical
in resource terms.
Last two thoughts, one technical. I think there is a big
distinction between looking at people who are searching the web
and looking at people who are engaged in chat rooms and talking
in chat rooms that are publicly accessible, a big difference
there. I am not a technical expert or legal expert, but, to my
mind, those are fundamentally different activities.
Finally, I sort of want to throw you a curve ball, maybe. I
think we in this country beat ourselves up a lot on ideology.
The adversary, I believe--and I spent 9 years watching them--
thinks we are doing better than they are, and they believe they
are losing the war of ideology. I would argue if you look at
Pew Research studies, they are, because they murder too many
people.
Ms. Harman. Thank you very much.
The Chair now yields 5 minutes to the Ranking Member for
questions.
Mr. McCaul. Thank you, Madam Chair. This has been an
excellent discussion.
Mr. Romero, I thought you pointed out many cases where the
Federal Government has overreached in its power and abused that
power. We want to make that sure we never do that again. I
think that is one of the points of having this hearing.
Mr. Mudd, you talked a lot about the spreading of ideology.
I agree with you it is a revolution in their mindset. Some of
these websites and some of what is available on the internet is
really horrific stuff. You point out some of these executions,
beheadings, whether it is in the jihad Islamic world or whether
it is the drug cartels. It is all readily available. It is
pretty bad stuff.
I think, Mr. Romero, you answered my first question; and
that is, at what point is internet speech not protected? I
think the cases have been fairly clear it is imminent lawless
conduct. Of course, that is a judgment call in many cases on
the part of law enforcement as to what is imminent lawless
conduct.
I also think there is a difference, obviously, between
censoring speech and monitoring speech on the internet. I
wanted to expand on that.
For instance, listed on Islamic websites is a ``must own,''
and it is available on Amazon.com, the Preparatory Manual of
Explosives, third edition. It is about 570 pages, 166
explosives, readily available, on how to build a bomb. It is a
little concerning when you see the Islamic website saying this
is a ``must own,'' go to this website, when we have had 15
terror plots in the last year alone. In many of these cases,
they are looking at doing just this, building explosive
devices.
So I guess what I want to throw out to the panel with the
limited time I have, I think we have covered the censor issue
fairly well in terms of the standard. But in terms of
monitoring this, like in the case of Hasan, which I wish they
had shared that information with Fort Hood. They may have been
able to stop that. But that is an information-sharing issue.
What can we do to monitor the activities on these websites?
Mr. Mudd.
Mr. Mudd. I was afraid that was coming.
I would go back to a point I made earlier and maybe make
the conversation a little more complicated. I think just
looking at people who buy books, practically speaking, it is
not doable. But I would go back to say, okay, what if you have
somebody who--or a series of criteria that says we have
somebody who, again, has cash tickets to Pakistan, is under the
age of 30. He has had multiple trips over 30 days. I say over
30 days because I want to look for people who probably have had
some training. Go through whatever criteria you want. Then,
wait a minute, now he is up on the web buying a book.
I don't want to argue one way or another. I just want to
tell you that is the practical question I probably would have
if I were back in Government, not whether somebody buys a book
but whether you think it is okay, representing the will of the
people, to look at people who have a series of behaviors that
almost anybody I think would say, freedom of speech aside, I
would say that is kind of worrisome.
Mr. McCaul. Anybody else care to take that on?
Mr. Romero. Sure. I think that the line drawing is very
much a difficult question, no doubt. I think it is made even
more difficult because we have granted our law enforcement
intelligence officials such sweeping powers that they are
literally adding more hay onto the haystack, making it he
harder to find the couple of needles.
We need not look any further than some of the internal
reports from the FBI itself, the Office of Inspector General,
about the misuse and overbroad use of National security
letters. We see that already. Frankly, that, I think, should
have us think again about whether or not we have given too many
surveillance powers that make the haystack all the larger, make
finding the real individuals who have shown some conduct to be
suspicious to be the actual targets of our investigations.
I think, to your point, I am very much heartened by your
point that we can leave censorship aside. It is both the right
thing and it is also a practical thing. Censorship never works.
You try to shut down any website, it will pop up anywhere else
across the globe. The internet is a global phenomenon, and the
best thing we can do is assure its robustness in our country
and make sure that we use it to the best of our abilities.
Mr. McCaul. Following up on that, is there any point where
content is so inappropriate that it shouldn't be allowed on the
internet or is it just--are we looking more at the conduct of
individuals?
Mr. Romero. Well, the Supreme Court has also ruled on these
issues. There is established law dealing with issues of
pornography, dealing with issues of obscenity, that we don't
need new rules or regulations on it.
What we perhaps do need perhaps is a fuller discussion, as
my colleague Mr. Morris said, about how we work with these new
forms of communications and make sure that they have proper
guidelines for their users, make sure that they themselves
understand the importance of their civic responsibility.
But the internet is our common forum. It is the new common
grounds. It is the Boston Square. We want to keep that open and
free. It is too essential to who we are now as Americans and as
individuals in the 21st Century.
Mr. McCaul. I see my time has expired. Thank you.
Ms. Harman. I now yield 5 minutes to the Chairman of the
full committee, Mr. Thompson of Mississippi.
Mr. Thompson. Thank you very much, Madam Chair. This is an
absolute wonderful discussion.
Just to try to frame it a little broader, the House Un-
American Activities Committee's hearing was held in this very
room. So, from a historical analysis, somebody would say, wow,
we are back here again.
So the public policy question I think for us is: How do we
look at the internet in its present form and structure some
guidelines or protocols that provide the intelligence
community, law enforcement community, with tools necessary to
identify situations that we deem harmful? The other public
policy question is: Is it solely the burden of Government to do
that, is it those sites themselves to help police it, or is
there a public responsibility in some of this? If a member of
the public got on a site and said, I think something is wrong
with this site, it looks like it is going somewhere, should we
encourage them to report it to someone, or just what do we do?
I am kind of giving you three things to do, and I will back
up. Dr. Hoffman, we can go down the line for comments.
Mr. Hoffman. Well, I may be horribly reductionist, but I
think a lot of the reason we have this debate is--because I
agree completely we shouldn't be censoring the internet. I am
not even sure we should be monitoring it, either. I agree
completely. But I think the problem is that we default toward
these very intrusive approaches.
Because, for instance, unlike the United Kingdom, we don't
have programs that seek to work with the community. We don't
have a dedicated office anywhere in Government such as the Home
Office in the United Kingdom has that works with local
communities that attempts to identify processes of
radicalization and recruitments and then interdict them on the
ground--precisely as you say, sir--to enlist public support. We
don't have a strategy like contest or an arm of it like the
British do.
That is why I think it is so important to get our hands
around what we do about the problem itself by enlisting the
community and enlisting the public. Already, of course, it is
not just the public. There are many private entities and NGOs
that monitor the internet--SITE Intelligence Group, NEFA
Foundation, the Investigative Project, and so on. So this is
being done.
But the question is: How we can enlist the public and
members of the community more to inoculate ourselves against
this phenomenon without having any kind of approach or any
strategy, without identifying anyone in the Federal Government
to facilitate this process? I am not saying it is necessarily a
Federal responsibility, either. I think a lot can be done by
local and States' jurisdictions. But, in the absence of all
that, we fall back on how we control the source of information.
That I don't think is the issue.
Mr. Thompson. Mr. Jenkins.
Mr. Jenkins. Let me take a very pragmatic view here.
Although this material on the internet is, as you pointed out,
it is odious, it is offensive, it is troubling, it does assist
in recruitment. On the other hand, the fact is it is producing
very few active terrorists. The number of English language
websites vastly exceeds the number of terrorists it has
produced. So, as a marketing effort, it would be judged a
failure.
Second, it is a source of intelligence.
Third, any type of shutdown would require an enforcement
effort, a policing effort, that would end up in an on-line cat-
and-mouse game that would simply divert valuable resources from
investigative and intelligence functions. So we ought not
create additional demands on our already-stretched resources,
and so I would rather see us look at how we can devote those
resources in a proper way to take advantage of the internet.
Let me give you just an interesting anecdote here. At
jungle warfare school, there is an old sergeant that gives the
same speech to every incoming class. He says, the jungle is not
your enemy, not your friend. The jungle is neutral. Learn how
to operate in the jungle. You can keep from getting hurt, and
you occasionally turn it to your advantage.
The reality is that the new electronic jungle is what we
are dealing with here. We are not going to make it go away. We
are not going to be able to knock down the trees. We are going
to have to figure out how to operate in it to keep from getting
hurt and occasionally turn it to our advantage.
Mr. Romero. Chairman Thompson, first, I want to thank you
for the history lesson about the history of this room. There
were a number of ACLU board members and staff who were at this
table those years ago. So it is delightful to be here in such a
hospitable and much better climate than my organization was
perhaps 40 years ago.
I think you raise exactly the right question, sir; and I
think where we can look to some guidance is the newly completed
and not fully released yet Senate Intelligence Committee report
that tried to investigate about what went wrong with some of
these investigations.
As far as we can tell from the redactions, they point out
that they already did have individualized information on many
of the individuals that were cited in your opening statement.
There was a failure to share that information among relevant
Federal agencies. There was a failure to communicate. There
were mistakes made, misspellings of names that did not cross
each other in databases.
That for me, sir, goes back to the question that perhaps
the challenge is not that we lack certain surveillance powers
that we need to fight the war on terror more effectively.
Perhaps it means that we have too great surveillance powers
which collect too much data, making the work of good law
enforcement and FBI officials all the more difficult to cull
through that volume. I think if we can narrow down the
haystack, just to stick with my one metaphor, allow our
officials to really comb through a much smaller haystack, they
will be much more apt and able to really identify the
individuals who might do us harm.
I think it is a place to have some discussions. I hear
complaints from within the FBI itself that talk about the great
volume. You remember Coleen Rowley, the FBI Director out of
Minnesota, talking about the difficulty of all of these
investigations that were initiated and that made the work of
local law enforcement FBI officials all the more difficult. So
perhaps we need to be talk about reining it in to make our law
enforcement efforts more effective, not giving them more.
Mr. Morris. To address one of the questions you raised,
Chairman Thompson, is all of the leading service providers that
are really popular service providers in the United States, like
YouTube or Facebook or really the whole gamut of Flickr for
images and the like, they all have very prominently on the
pages--on the video page--on every video page on YouTube is a
``report abuse'' button. Anyone who sees a video that is
disturbed by the video or offended by it, they can click that
button; and that immediately gets into a process where within a
couple of hours a human will actually review the reported
video.
So I do think that the leading sites are in fact allowing
citizens to take action and to report things. None of these
sites want to have content that is really--the videos of
murders, I can't imagine any leading American site would want
to have that on their server. So I think that is one way that
citizens can interact.
But I would also just note, to echo something Mr. Romero
said a few minutes ago, that trying to take this down, trying
to really stomp it, will simply make it harder to monitor and
harder to keep track of.
Fifteen years ago, there was a great concern about dial-a-
porn in this country, sexy telephone calls. Parents were able
to tell the telephone company, block all 900 numbers. So there
was an easy solution. But Congress imposed more burdens on the
dial-a-porn industry; and, in response, the dial-a-porn
industry moved overseas. It made it so that it was much harder
for parents to block access to the overseas dial-a-porn that
kids still today could, in fact, access.
That is an example where, if you try to regulate speech too
much, you will simply make it go somewhere else and it will
still be available and in this context--in the terror
recruiting context--it will be harder to monitor.
Mr. Hoffman. A couple of things I would think about, again,
if you are going down the road of what to write and what to
talk about. Let's say we are in a situation where we do
takedown after takedown and 70 percent happen to be accessing a
website hosted by a certain service provider. If I were the FBI
Director or the Deputy, I would want to call that service
provider and I would love for that service provider to have the
protection to say I am not going to be sued if I take that
down. So I don't know the technicalities of that, but that
would not be an uncommon experience in the world I live in.
I am not referring to a phone call. I am referring to the
fact a lot of these websites are everywhere. I don't know what
latitude a service provider has when he gets that phone call to
prevent himself from getting sued if he just randomly takes out
a website.
Second, if you are a military commander--and we haven't
talked about this, so I want to lay it on the table--in a place
like Iraq, and you are dealing with an entity that is fighting
U.S. soldiers and by the magic of electrons has a website
hosted by a U.S. ISP, I would say that military commander ought
to have the authority to take that out--and the latitude to do
that.
Last, I might have gotten this wrong, but I must say I am
not comfortable with the haystack analogy. The American people
in some ways haven't asked for an FBI anymore, Federal Bureau
of Investigation. They have asked for a Federal bureau that
prevents events from happening. When we investigate or the
Bureau investigates an event afterward, to the best
investigators in the world, and that is not good enough.
Almost by definition I thought the 2005 reform legislation
now is a part of that. Because I went over as the first deputy
in the National Security Branch, the CIA person over to the
FBI. I thought the intent behind the legislation was, darn it,
you guys better do intelligence better so you collect enough to
make sure bad stuff doesn't happen. We don't want to see
another attack where you say, you know, if we had collected
more, we could have prevented something.
The lessons you learn on the inside from things like Fort
Hood and from Times Square are: Don't make a mistake. Don't
make a mistake. Don't ever make a mistake. So some of the
dialogue might be, what do you expect when you create a
National security service, in essence, and what kind of dialog
do we have with the American people, when almost unspoken their
expectations have evolved to the point where they want a
Federal service that prevents and not just investigates?
Mr. Thompson. Thank you very much. You have been very
generous with the time.
Ms. Harman. Thank you, Mr. Chairman.
Consistent with committee rules, we are recognizing the
other Member who was here before the gavel; and that is Mr.
Carney of Pennsylvania. We will follow that with Mr. Dent of
Pennsylvania.
Mr. Carney. I try to be punctual, ma'am.
I have got to tell you folks, I appreciate you being here.
This, for me, is very exciting, because this is my syllabus for
my class in terrorism I taught at Penn State, and you are all
here now in the flesh. This is great.
I actually have a couple of questions. One deals with sort
of a practical approach we haven't talked about in terms of
what sorts of things incite recruitment.
Let's apply that toward the argument we are having today
about: Should we try the terrorists in civilian court or
military court? What do you think from your opinions is more
inciteful to them, what gives them more impetus to want to join
up, seeing a trial in a civilian court or having a more
secretive military tribunal proceeding go on?
We can start down the line here. Dr. Hoffman.
Mr. Hoffman. Well, sir, you have posed an enormously
difficult question, because one of the problems is we don't
understand how terrorists radicalize and recruit individuals. I
would say there isn't any one set profile or any one set
pattern, and that is why it is very difficult to counter. I
couldn't tell you whether seeing a trial in a civilian court or
a military commission has more effect in terms of
radicalization and recruitment.
What I can say is that certainly the trials by military
commissions have become--and Guantanamo as well--have become a
hot-button issue that is used on many of these sites constantly
to inflame opinion. But, at the end of the day, is the war on
terrorism going to end whether we try people one place or the
other? Amongst our implacable enemies, it doesn't matter. They
don't see civilian courts as any benefit. But I think as a
recruitment tool, though, we do see them constantly going back
to Guantanamo, to military commissions, and so on.
Mr. Jenkins. I think we make a distinction between those we
may apprehend abroad and how we treat those and under the
specific circumstances there. Although I think we can, within
the realm of even military commissions, guarantee a fairness.
If we are talking about U.S. citizens, we are talking about
people here in the United States, as I pointed out in my
testimony, the criminal justice system is working. These have
been successful arrests and successful convictions.
I believe--and this is a personal view--that there is a
utility in stripping these individuals of any political
pretensions. As I indicated in testimony before another
committee in the Senate when I was asked about Major Hasan, as
to whether he was a terrorist or not, I said he is a terrorist,
but the important thing is we have him on 13 counts of murder,
and that will be the basis for the trial.
So I think there is utility in removing all pretensions of
political from this and bringing individuals before a jury of
their peers and saying, you are not being prosecuted for your
beliefs. Beliefs are personal business. When those beliefs--how
one imposes those beliefs on others is a matter of community
concern. When that imposition takes the form of criminal acts,
it is a matter of the law.
So I think our ultimate defense against terrorist
recruiting is the application of the law.
Mr. Carney. Thank you.
Mr. Romero.
Mr. Romero. I very much appreciate your question. I must
say that I am delighted to be able to make this segue, because
it is the other passion that I work on quite extensively.
I personally have spent about 25 days at Guantanamo. I have
been there close to a dozen times observing the military
commissions. Let me be quite clear. They are a debacle. They
will never work. They have never worked. If we don't believe
that that is not going to inflame further incitement against
Americans, we are fooling ourselves. The laws that govern the
military commissions are a joke, even under the new revisions.
They allow hearsay evidence. They allow forms of coerced
evidence.
The most recent military commission, it just happened last
week where I had a colleague--I was away at another business
trip and couldn't go--where we are trying to charge a 15-year-
old boy who was videotaped crying, with his hands over his
head, charging him as an adult; the one in which we just kicked
out three reporters from the military commissions because we
don't want them to be covering it all that well. Astonishing.
If we don't think that breaking those basic rules which are
firmly established in criminal court is not helping inflame
further anti-American interests, we are fooling ourselves.
Unfortunately, the Obama administration has its head as much in
the sand on this issue as its predecessor administration. It
would do well for us to take up that issue in much greater
length.
Mr. Carney. Mr. Morris.
Mr. Morris. I am not sure my organization has taken a
formal position on that, but personally I could not agree more
that, for someone in America, arrested in America, they should
be tried in our criminal justice system. For us to move away
from the values and the Constitutional protections that this
country is built upon I think can only hurt our country and
help the terrorists.
Mr. Carney. Thank you.
Mr. Mudd.
Mr. Mudd. I am not sure I am the right person to comment on
the legal issues. Others have.
One clear point about ideology. This revolutionary opponent
wants to be seen on a par with us. We are the head of the
snake. We should never give them that courtesy. Jihad is an
honor for them, and they want to be terrorists. So my point
would be, where they are tried is in somebody else's inbox. You
and I both have a role in portraying who they are as they are
tried. This is critically important. They are chump-change,
murdering criminals. They murdered women and men who will never
see their children, and those children will never have a proper
family. They are criminals. So wherever they are tried, we
should be careful as a Government not to give the adversary
what they want.
The flip side, we have a great opportunity here. The
adversary has told us what they don't want. They haven't
signaled it. They have told us. They struggle to explain why
they murder innocents.
I would encourage you to look at what the second in charge,
Iman al Zawahiri, says in his only internet interview. First
question out of the box, it is his choice to take this
question, spring of 2008. It is a question from Algeria. How do
you explain the murder of innocents? They can't explain it.
Research data, polling data across the Middle East, Muslim
lands, will show you when there is an attack in Muslim lands
where Muslims die, people start to say, I don't like these
guys.
Mr. Carney. Thank you all.
Ms. Harman. How about one more short question?
Mr. Carney. I guess this could all be a one-word answer
from you all, but it is probably going to require more. Can al-
Qaeda or the terrorists or the jihadists win a strategic
victory through the internet?
Mr. Jenkins. No, they can't. Look, it is about building an
army of believers. While they have spread their ideology to a
certain degree, they are locked in their own little universe of
discourse. What will happen in the long run, I am persuaded, is
that the ideology will never be defeated thoroughly, but in
fact this movement will become increasingly irrelevant. When we
are up to the 250th message from Obama bin Laden or Adam
Gadahn, what relevance is that going to have to a young man in
the Middle East looking for a job or some kid in the United
States on the internet? The message by itself is not going to
enable them to achieve a strategic victory. It hasn't thus far.
Mr. Mudd was correct in pointing out they are complaining
about the failure of their messages to get through. They are
reaching out on this. So no strategic victory for them.
Ms. Harman. Does anyone disagree with that?
Mr. Mudd. No.
Mr. Hoffman. I wouldn't disagree, Madam Chair, but, at the
same time, I think through the internet--in response to
Representative Carney, no. But I think what our enemies have
constantly said, they have never said they are going to defeat
us militarily--has never said. He said they are going to wear
us down.
What worries me is that as long as they are still able to
replenish their ranks, as long as they are able to attract an
increasingly more diverse set of recruits, even in the ones and
twos--I think Mr. Mudd and Mr. Jenkins are absolutely right. As
a mass movement, al-Qaeda will never succeed.
I am not even sure that is al-Qaeda's goal. It is a very
unique type of organization. They are terrorists, and
terrorists are small in number, and they seek to win
disproportionate victories. I think what they see is just
eventually wearing us down. In that sense, it will be a
strategic victory, but this is something that sustains them.
Until we are more effective at choking off the supply of
recruits, this war will continue to go on.
Mr. Mudd. Two quick comments.
I agree with the comments from Brian Jenkins. I would
caution if we have another major event in this country we all
have a responsibility to keep cool and move forward. Because
they will be looking at that as forget about how many people
died. That will be the tragedy. The tragedy will be their
ability to exploit our reaction. The reaction will be more
dangerous in some ways than the action. Because they will be
looking for the next Ghraib.
I can tell you I talked to a lot of people who went to
Iraq. I am talking about terrorists. That was a devastating--
far more--it was devastating to this country. Forget about it
in terms of what we had overseas.
So I guess my one asterisk is we are still a country
struggling to manage how we respond to catastrophic incidents
of terrorism. They would like nothing more than to have us
overreact and give them some internet successes that would
really resonate, I think.
Mr. Romero. If I may just pick up one quick thread from Mr.
Mudd. While I completely agreed with his earlier points about
how we have shifted our expectations in our society after 9/11,
I think it is an enormous mistake to lead the American people
down a path where we have them believe that we can prevent the
next terrorist attack. To have a Federal Bureau of Prevention
is just not feasible or possible. It will happen. The next
attack will certainly happen. Our political leadership, I
think, have shrugged the responsibility by not talking
competently and clearly with the American people to prepare
them for the inevitability of a terrorist attack.
Anyone living in Israel or Britain or France or in the
Basque section of Spain, none of those residents believe that
there won't ever be another car bombing or another terrorist
attack. Yet we lull our Americans into thinking that we can
fight the impossible. I think the more we can inoculate the
American public on the inevitability of the next attack, the
better off we will be to keep our heads cool when it does
indeed occur.
Mr. Carney. Thank you.
Ms. Harman. Your 12 minutes have expired.
I can't resist, though, saying to Mr. Romero, we are not
shrugging our responsibility. One of the things this
subcommittee tries to do, and the historic occupant of this
space, as has been pointed out by our Chairman, is to change
that legacy and make it one where we are protecting our
Constitution, living our values, but also protecting our
country. That is a very tricky thing to get done.
I agree with you that there is no such thing as 100 percent
security. I never promised that. But surely we can use the
right tools consistent with our Constitution to make Americans
as secure as we possibly can. That is an oath we take, to
protect and defend the Constitution, but also to protect and
defend the security of the United States.
Mr. Dent for 5-ish minutes, like everyone else.
Mr. Dent. Thank you, Madam Chair.
Anwar al-Awlaki has been identified by our intelligence
agency, as many of you have pointed out in your testimony, as a
direct source of radicalization to a number of recent terrorist
events, even going back as far as 9/11. As you know, al-Awlaki
is located in Yemen, but he communicates with individuals in
the United States through the internet. Do we address on-line
radicalization efforts and threats from overseas differently
from how we address those domestic radicalization threats?
Go down the line starting, with Dr. Hoffman.
Mr. Hoffman. We address them differently. Of course, we
have the Voice of America, which is the main communications
arms of the United States Government.
I think one of our failings is we don't have a strategy for
countering radicalization overseas as well. If you look at, for
instance, Voice of America, over 90 percent of its budget is
dedicated to newspapers, radio, and television, traditional
means of communication. That is what I read every day and
listen to.
People my age, in their 50s, are not joining terrorist
organizations; and that is why I put up those two videos. It is
young people that they are trying to enlist; and it is young
people who are motivated, who are animated, who are inspired by
MTV-like presentations.
Yet this has been one of much frustrations. I think for a
brief period of time when Under Secretary Glassman was at the
Department of State we did have the beginnings of a strategy
and an effective effort to reach out to this core demographics
of terrorists, the youth. But it has fallen by the wayside, as
near as I can tell. That, I think, is the problem.
Rather than talking about censoring or monitoring the
internet, we should be doing a much better job and a much more
effective job at using the same medium to counter these
messages. Yet, at least from my perspective, we do extremely
little. It is not prioritized, and it has not been resourced in
this struggle.
Mr. Dent. Thank you.
Mr. Jenkins.
Mr. Jenkins. I would echo those comments.
I do think we have to make a distinction between what we do
overseas and what we do domestically. Overseas, we certainly
can and ought to engage in counterpropaganda activities. We had
an elaborate effort to do this in past struggles. We have not
had in the same attention, resources, strategy to do that this
time. We simply don't have the instruments. We haven't thought
it through. So we don't have what I refer to as a front-end
strategy. We pound on operational capabilities, but we really
haven't thought clearly how we try to break that cycle before
it comes to operational capabilities.
Domestically, we are going to be more restricted,
appropriately, in what we can do in terms of Government
information programs. Moreover, I believe that counter-
radicalization is best done at the local level. I think it is
entirely appropriate at the Federal level to examine the
ramifications of radicalization and recruitment to terrorist
violence, to understand how that takes place to improve our
comprehension of that process.
I would be wary of the Federal Government program to deal
with a Muslim American community as I would be wary of a
Federal Government program to deal with any other community.
This is best done at the local level. It is done by the
community itself. It is facilitated----
Mr. Dent. Like at the mosque level? When you said ``at the
local level'', who?
Mr. Jenkins. Not even at the mosque level.
What is interesting, what we do know about the recruiting
process, it is not a result of profound religious discernment.
This is not a religious conversion that is taking place. You
have got a lot of young people, as Dr. Hoffman correctly points
out, who are solving all sorts of personal issues and see all
sorts of personal opportunities in this to cross that line. So
it is not religious. It is done by the community. It is done by
the families. This is going to be largely invisible. You have
families intervening to keep sons and daughters from going down
dangerous paths. You have interventions by very close
acquaintances. That is something the authorities are not going
to have the knowledge of.
What you do have at the local level, however, is a reaching
out by the authorities, in many cases through the police, to
develop that understanding of their local communities, to make
those communities aware of what is taking place, that there is
recruiting going on, Somalis or others, and to provide an open
line for communications.
Now those local police, those local authorities, answer to
locally elected officials; and I think that is a much safer
place for that to take place.
Mr. Romero. I think, first, on the ability to intercept
international communications to Americans here, or vice versa,
we have granted that power already under the amendments to the
Foreign Intelligence Surveillance Act. In fact, we think we
have granted too great a power, where your communications,
should you go on vacation to Mexico and then you e-mail your
office or your wife, can be intercepted by law enforcement
officials without the proper judicial oversight that we would
otherwise see. So I think from the law enforcement perspective
and the legal powers----
Mr. Dent. Go ahead.
Mr. Romero. More importantly, I think to your point about
radicalization overseas, what perhaps is most--of greatest
fodder is the continued racial profiling domestically. Because
we look bad. When we pull a kid off an airplane because he has
a shirt with Arabic script on it, or we pull another one--that
is a client of ours in a lawsuit--or we have another kid pulled
off of an airplane because he is studying Arabic flashcards,
that becomes fodder for just how bad we are against Muslims.
So I encourage your committee, as you think about other
committees and other hearings, that the extent to which very
extensive racial profiling against Muslims and Arabs in America
is continued only hurts the efforts you are endeavoring to do
in homeland security in this committee.
Mr. Morris. To look at your question from a narrow angle of
service providers, the source of a video posted to YouTube
ultimately is irrelevant. If it comes from overseas or if it
comes from a domestic service, if it violates YouTube's terms
of service, they will take it down. So on that angle there is
probably not a distinction for American-hosted service
providers.
Actually, to answer something that Mr. Mudd raised, those
service providers in fact do have statutory protection if they
choose to take something down because it is offensive or
violates their terms of service.
Mr. Mudd. Just on that really narrow operational question,
if you sit at the FBI sort of executive table and the CIA
executive table on counterterrorism operations, the way the
services operate looking at terrorists through the internet,
there is no comparison, fundamentally different. Anybody who
thinks we have to have a domestic intelligence service, it is
not correct. It is not a good forum to talk about that. But
just--the foreign intelligence service focuses on knowledge and
doesn't spend a lot of time saying, what is the law in Timbuktu
for whether I can get somebody's hard drive? A domestic service
says, what is right to do? Then how do I provide security,
given what is right and lawful to do? Very different ways of
attacking problems.
Just quickly, I am not a big believer in influence
campaigns. They are hard to run, especially in a democratic
society. We leak a lot. We are operating in an environment
where, first, we don't have any legitimacy; and, second, these
guys are destroying themselves already through blood and mayhem
of 9 years.
2003 in Saudi Arabia, killed too many people.
Zarkawi had been something of a hero in Jordan. Suicide
bombers at wedding in Jordan in 2005. Instantly, people say,
what are we up for here? I mean, they sure don't like America,
but they sure don't understand when people come in and kill
their own.
Same thing happened in Iraq. We talk about the surge, which
was significant. But we had the internal communications, which
are now public, of al-Qaeda talking to Zarkawi saying, don't
kill all those civilians. We have been down this road. He
killed too many civilians, and the Awakening Council said,
we're done with these foreigners. We're going to kill them.
The last thing I would say, if you want to read people who
do this from a liberal society, Western society, you can get on
the web at Contest Strategy--that is the formal name for it,
Contest--from the British Home Office. Section 9 explicitly
talks about the counter-radicalization campaign from the Home
Office. You probably would be surprised of how open they talk
about going against what we probably would characterize as
domestic free speech. It is a great read, and the people who
run that program are a serious talent.
Mr. Dent. Can I just ask one quick question to Mr. Jenkins?
You stated in your testimony, Mr. Jenkins, that the
majority of the 131 U.S. homegrown terrorists identified by
Iran are native-born or naturalized U.S. citizens or illegal
permanent residents. Do you have any further breakdowns on
these numbers by category?
Mr. Jenkins. I do have a report which has a breakdown of
those for whom we have complete information on. Only a
handful--by the way, there are two or three that were illegal
in the sense that they had overstayed a visa or have entered
the country illegally.
The breakdown between native-born and naturalized?
Mr. Dent. Naturalized, correct.
Mr. Jenkins. It is in a report, and I don't have it at the
tip of my tongue.
Mr. Dent. Native-born, naturalized, and legal permanent
resident. If you could get that to us after the hearing.
Mr. Dent. I am way over my time, so I yield back.
Ms. Harman. Thank you, Mr. Dent.
Thank you to an amazing panel.
We have had a number of hearings on this issue, just to
point out for the record. Our last one was on community
outreach. We are very sensitive to the issue of racial
profiling. We are very sensitive to the issue of anti-Muslim or
anti-Arab rhetoric.
I joked the last time--it is not really a joke--but that
Jihad Jane was blond, with blue eyes, and that we should think
about people in the future--and Mr. Dent's constituent; let's
have it out here--from a variety of backgrounds with a variety
of views--I know Mr. Jenkins strongly agrees with this--who
will turn to violent extremism.
The issue for this hearing is, what role does the internet
play in all this? I think we had quite a full discussion of
what role it plays and what role it doesn't play and what the
dangers are of getting involved in censorship on the internet.
I was listening, and I actually agree.
On the other hand, I want us to be as creative as possible
in trying to get ahead of this problem and trying to--perhaps
you are right, Mr. Romero--reduce the haystack but to find a
way consistent with our values and our Constitution to use the
right law enforcement tools and intelligence tools to identify
that small number of people who would really be capable of and
intend to do us harm.
That is the challenge. I fear that if we don't work on
this, and we do have another major attack, the victims--in
addition to innocent civilians who will be murdered, the other
victim will be our Constitution. So it is extremely important
to work carefully ahead of the next problem to reinforce both
security and liberty.
That is where my head is. That is what I think we should be
doing. I think that that will overturn the legacy of this
particular room, where the occupants around this table, or at
least the Chairman of the committee, had a very different
vision.
So I thank you for appearing. Please continue to help us.
We need you, all of you; and we are going to call on you
regularly, as we already do.
Finally, I think that the way we win this challenge against
us is to win the argument; and the way we win the argument is
to live our values.
The subcommittee hearing stands adjourned.
[Whereupon, at 11:52 a.m., the subcommittee was adjourned.]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|