[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]



 
  JIHADIST USE OF SOCIAL MEDIA--HOW TO PREVENT TERRORISM AND PRESERVE 
                               INNOVATION 

=======================================================================

                                HEARING

                               before the

                    SUBCOMMITTEE ON COUNTERTERRORISM
                            AND INTELLIGENCE

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             FIRST SESSION

                               __________

                            DECEMBER 6, 2011

                               __________

                           Serial No. 112-62

                               __________

       Printed for the use of the Committee on Homeland Security
                                     

                 [GRAPHIC(S) NOT AVAILABLE TIFF FORMAT]
                                     

      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               ----------

                        U.S. GOVERNMENT PRINTING OFFICE 

74-647 PDF                       WASHINGTON : 2012 

For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; 
DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, 
Washington, DC 20402-0001 


                     COMMITTEE ON HOMELAND SECURITY

                   Peter T. King, New York, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Daniel E. Lungren, California        Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Michael T. McCaul, Texas             Henry Cuellar, Texas
Gus M. Bilirakis, Florida            Yvette D. Clarke, New York
Paul C. Broun, Georgia               Laura Richardson, California
Candice S. Miller, Michigan          Danny K. Davis, Illinois
Tim Walberg, Michigan                Brian Higgins, New York
Chip Cravaack, Minnesota             Jackie Speier, California
Joe Walsh, Illinois                  Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania         Hansen Clarke, Michigan
Ben Quayle, Arizona                  William R. Keating, Massachusetts
Scott Rigell, Virginia               Kathleen C. Hochul, New York
Billy Long, Missouri                 Janice Hahn, California
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
            Michael J. Russell, Staff Director/Chief Counsel
               Kerry Ann Watkins, Senior Policy Director
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director

                                 ------                                

           SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE

                 Patrick Meehan, Pennsylvania, Chairman
Paul C. Broun, Georgia, Vice Chair   Jackie Speier, California
Chip Cravaack, Minnesota             Loretta Sanchez, California
Joe Walsh, Illinois                  Brian Higgins, New York
Ben Quayle, Arizona                  Kathleen C. Hochul, New York
Scott Rigell, Virginia               Janice Hahn, California
Billy Long, Missouri                 Bennie G. Thompson, Mississippi 
Peter T. King, New York (Ex              (Ex Officio)
    Officio)
                    Kevin Gundersen, Staff Director
                    Alan Carroll, Subcommittee Clerk
              Stephen Vina, Minority Subcommittee Director



                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Patrick Meehan, a Representative in Congress From 
  the State of Pennsylvania, and Chairman, Subcommittee on 
  Counterterrorism and Intelligence..............................     1
The Honorable Jackie Speier, a Representative in Congress From 
  the State of California, and Ranking Member, Subcommittee on 
  Counterterrorism and Intelligence..............................     3

                               Witnesses

Mr. William F. McCants, Analyst, Center for Naval Analysis:
  Oral Statement.................................................     6
  Prepared Statement.............................................     7
Mr. Andrew Aaron Weisburd, Director, Society for Internet 
  Research:
  Oral Statement.................................................     8
  Prepared Statement.............................................    10
Mr. Brian Michael Jenkins, Senior Advisor to the President, Rand 
  Corporation:
  Oral Statement.................................................    13
  Prepared Statement.............................................    14

                                Appendix

Mr. Evan F. Kohlmann with Josh Lefkowitz and Laith Alkhouri:
  Prepared Statement.............................................    27


  JIHADIST USE OF SOCIAL MEDIA--HOW TO PREVENT TERRORISM AND PRESERVE 
                               INNOVATION

                              ----------                              


                       Tuesday, December 6, 2011

             U.S. House of Representatives,
                    Committee on Homeland Security,
         Subcommittee on Counterterrorism and Intelligence,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 2:00 p.m., in 
Room 311, Cannon House Office Building, Hon. Patrick Meehan 
[Chairman of the subcommittee] presiding.
    Present: Representatives Meehan, Cravaack, Long, Speier, 
and Higgins.
    Mr. Meehan. The Committee on Homeland Security, 
Subcommittee on Counterterrorism and Intelligence will come to 
order. The subcommittee is meeting today to hear testimony 
regarding the emerging threat of the use of social media by 
terrorists.
    I note that we expect there to be votes some time after 
3:00, 3:30, and we will do our best. We are very grateful for 
the presence of this distinguished panel and grateful for your 
important testimony, but we will do our best to work through 
the testimony and try to get to as many questions as we can.
    At this moment, I recognize myself for an opening 
statement. I want to welcome today's Subcommittee on 
Counterterrorism and Intelligence hearing on the ``Jihadist Use 
of Social Media.'' I would like to thank you all for joining us 
today, and I especially want to thank our panel of witnesses 
for testifying on this issue.
    Over the past year, the subcommittee has been examining 
threats to the United States homeland from around the world. We 
began to look at al-Qaeda in the Arabian Peninsula, and an al-
Qaeda affiliate in Yemen with a sophisticated media wing led by 
Anwar al-Awlaki, which included Inspire magazine.
    We then turned our attention to the tumultuous events in 
the broader Middle East, and considered how al-Qaeda and other 
terrorist networks would use the upheaval to their advantage. 
Later we held hearings on the threat from the terror networks 
in Pakistan, from Hezbollah's operations in the Western 
Hemisphere and then last week on the emerging threat from 
Nigeria's Boko Haram.
    One common theme throughout all of these hearings was that 
terrorist networks are spreading their message, recruiting 
sympathizers, and are connecting operationally on-line.
    For years, terrorists have communicated on-line, sharing 
al-Qaeda propaganda or writing in on-line forums dedicated 
entirely to the prospect of Islamist terrorism. But they have 
recently evolved with technological changes, utilizing social 
media sites such as Facebook and YouTube to enhance their 
capabilities. The same place the average person posts photos 
and communicates with family and friends are being used by 
enemies to distribute videos praising Osama bin Laden.
    Terrorists also disseminate diatribes glorifying the murder 
of innocents and even make connections with each other 
intentionally or internationally to plot attacks. In the case 
al-Awlaki, jihadists live on virtually even after they have 
been physically removed from the battlefield.
    Prior to entering Congress, I served as the United States 
attorney in eastern Pennsylvania. Shortly after my tenure 
ended, a local woman by the name of Colleen LaRose was arrested 
on her return to the United States as part of a terror plot 
that targeted a Swedish cartoonist.
    LaRose would later become known to the world as Jihad Jane. 
However, what is less well-known to the world was she received 
that moniker because it was the name that she employed on-line, 
where she became a committed jihadist.
    She enthusiastically posted and commented on YouTube videos 
of supporting al-Qaeda and their allies, but her enthusiasm for 
jihad went beyond watching videos and offered moral support as 
well. She made contacts on-line with other jihadis, solicited 
funding, and orchestrated an actual terror plot.
    Her case is a shocking example of how easy it can be to 
find jihadi content on-line and make operational connections 
with others who speak aspirationally about violent acts of 
terror against the homeland.
    The Jihad Jane case is not the only one. Only a few weeks 
ago, Jose Pimentel was arrested for preparing bombs to use in 
attacking targets in New York City. Before his arrest, Mr. 
Pimentel had been active on-line. He ran a blog, held two 
YouTube accounts, and operated a Facebook profile, all 
dedicated to jihadi propaganda.
    In a case that illustrates terrorist recruitment in the 
homeland via social networking, in December 2009 a group of 
five men in Washington, DC were arrested in Pakistan for 
attempting to join militants fighting along the border with 
Afghanistan. Later to become known as the Virginia Five, they 
were reportedly contacted by a Taliban recruiter through 
YouTube after one of the members of the group praised an on-
line video showing attacks on American troops.
    These examples highlight the emerging challenge posed by 
terrorists engaging on-line. The internet was designed to ease 
communication, and it must stay that way. However, we cannot 
ignore the reality that we have been unable to effectively 
prevent jihadi videos and messages from being spread on popular 
social media websites like YouTube and Facebook.
    I have called this hearing today to learn more about what 
has been done and what must be advised as we move forward.
    Another central issue I would like to learn more about is 
whether or not social media websites can become useful sources 
of intelligence in our fight against terrorism. On-line 
movements are traceable, nowhere more often so than on social 
networks which are designed to make connections among people 
much easier.
    I believe the intelligence and law enforcement communities 
can use this open information to combat terrorism and other 
crimes. However, it is essential that civil liberties and 
individual privacy be appropriately protected. I am encouraged 
by recent remarks made by Under Secretary for the Office of 
Intelligence and Analysis, Caryn Wagner, where she indicated 
that the Department of Homeland Security will be working to 
enhance its ability to monitor social media for threats against 
the homeland, and I look forward to learning how that may be 
done as she develops these procedures.
    With that, I look forward to hearing from today's 
witnesses, and I would now like to recognize the Ranking 
Member, the gentlelady from California, Ms. Speier.
    Ms. Speier. Mr. Chairman, thank you for holding this 
hearing and for your continued cooperation. I would also like 
to thank the witnesses for being here today and look forward to 
gaining some insights from you on how terrorists use our social 
media and how the power of social media can be used for both 
countering the narrative used by terrorists and effective 
information sharing of potential terrorist activity.
    Social media is the No. 1 activity on the world wide web, 
we know that, accounting for over 22 percent of all time spent 
on-line in the United States. For instance, Twitter averages 
about 200 million tweets per day, Facebook boasts about 800 
million active users throughout the world. Social media 
spreading messages to many users at one time is commonplace and 
their power has proven to be remarkable.
    When it comes to looking at the power of social media, we 
must look to the Arab Spring. As the Arab Spring ensued, social 
media spread messages to which the world subscribed, followed, 
tweeted and retweeted. For instance, the week before Egyptian 
President Hosni Mubarak's resignation, the total rate of tweets 
about political change in Egypt ballooned ten-fold. The top 23 
videos featuring protests and political commentary had nearly 
5\1/2\ million views. More than 75 percent of people that 
clicked on embedded Twitter links about the Arab Spring were 
from outside the Arab world.
    Social media become a megaphone that disseminated 
information and excitement about the uprisings to our outside 
world. The users of social media in the Middle East caused the 
world to take notice and to witness the revolution. Social 
media enabled these revolutionaries, change agents in their own 
right, to spread their messages beyond national borders to all 
corners of the world.
    Knowing the power of social media and its reach, it is 
quite natural that terrorists groups themselves would try to 
use social media to their advantage. For example, we know that 
former al-Qaeda in the Arabian Peninsula leader, Anwar al-
Awlaki, was known to some as the bin Laden of the internet. The 
late al-Awlaki used various social media such as Facebook, 
blogs, and YouTube videos to try and recruit and develop a 
cadre of terrorists in the United States.
    We know that al-Awlaki used on-line videos to praise those 
who not only perpetrated violent acts against people in the 
United States such as Major Nidal Hasan but also those who 
waged unsuccessful attacks such as the attempted Christmas Day 
Bomber. We also know that the attempted Times Square Bomber, 
Faisal Shahzad, was in contact with al-Awlaki via e-mail.
    What we do not know is how many people have actually been 
radicalized by viewing blogs, news feeds, and tweets by al-
Awlaki and others like him that espouse violent ideology. At 
what point do those influenced by terrorist ideology over the 
internet become real, live terrorists?
    Terrorists acts by design are intended to create fear or 
draw attention to their message regardless of whether the 
message is hatred for a particular group of people, a 
government, or a policy. Terrorists, through their actions, 
also have the agenda of causing economic disruption. Just by 
their menacing and prompting the government to take action and 
extend its financing can sometimes be a win for them.
    Hence, who is the real audience for terrorists on the 
internet? Is the government who terrorists may feel will spend 
its money and energy chasing when it finds potential leads, or 
is it for those that terrorists really feel may be led to 
espouse their ideology and eventually act upon it?
    Since we understand the power of social media as 
effectively used in the Middle East, what can we do to empower 
users of social media to counter the message terrorists spread? 
I am eager to learn today how people can be encouraged to use 
social media to spread the message that America is not a Nation 
that is fearful, but a Nation that is abundant with ideas, 
expression, and innovation.
    We know that a vigilant public can provide essential 
information to law enforcement that thwarts terrorist activity. 
For example the attempted Times Square bombing by Faisal 
Shahzad was prevented by law enforcement who received tips of 
suspicious activity in the area. Are there ways that social 
media providers can partner with the government to mitigate 
terrorist activities on their sites without the fear of strict 
regulation and censorship? How do we encourage the public to 
utilize these platforms to act as our eyes and ears?
    Since social media are such valuable information-sharing 
tools, is it possible for law enforcement to use social media 
to share trends and concerns that may threaten our communities, 
educate the public on how to report suspicious activities, and 
develop new partnerships with the community?
    Is it possible for social media to be used on levels that 
would actually affect the scope of our intelligence gathering? 
For example, a few months ago, the Afghan Taliban exchanged 
tweets with NATO in Kabul during an attack. Can social media 
present unique opportunities for counter-messaging and direct 
engagement with terror groups that our Government is currently 
overlooking?
    I am eager to hear from the witnesses how social media can 
be used to counter the messages espoused by terrorists. I am 
looking forward to hearing how social media can be used to 
share information, how users can be assured that by sharing 
information they will not give up their Constitutional rights. 
With social media being such powerful tools, what steps are 
companies, users, and law enforcement taking to effectively 
thwart terrorists activities? What more should we be doing?
    I have many more questions, Mr. Chairman, but with that I 
will yield back.
    Mr. Meehan. Thank you, Ranking Member Speier. Other Members 
of the committee are reminded that opening statements may be 
submitted for the record.
    So we are pleased to have a distinguished panel of 
witnesses before us today on this very, very important topic. I 
would like to first introduce William McCants. He is an analyst 
at the Center for Naval Analysis where he focuses on al-Qaeda, 
terrorism, and Middle Eastern policies. He is also an adjunct 
faculty at Johns Hopkins Krieger School. From 2009 to 2011, Mr. 
McCants served as the senior adviser for countering violent 
extremism in the Office of the Coordinator for Counterterrorism 
at the U.S. State Department. I will bet you didn't get that 
title on one card.
    Prior to that he was the program manager of the Minerva 
Initiative in OSD policy, an analyst at the Institute for 
Defense Analysis and a fellow with West Point's Combating 
Terrorism Center. McCants is the founder of Jihadica.com, a 
group blog that explains the global jihadi movement. The blog 
has been featured on the cover of the New York Times and rated 
by Technorati as one of the top 100 blogs on global politics. 
Wired Magazine recently described it as the gold standard in 
militant studies. McCants is an editor of the Militant Ideology 
Atlas and author of a forthcoming foreign affairs article on 
al-Qaeda. This fall Princeton University Press is publishing 
McCants' book, Founding Gods, Inventing Nations.
    I next turn to Mr. Andrew Weisburd, and he has been engaged 
in counterterrorism and the collection, analysis, and 
dissemination of intelligence since 2002, primarily focused on 
the use of the internet by al-Qaeda and other Islamist 
extremist organizations and movements. He has been a provider 
of expert services to a variety of organizations since 2003 and 
has engaged in research for organizations such as NATO and the 
United States Department of Justice.
    He is a long-time contract instructor in the practitioner 
education program at the Combating Terrorism Center at West 
Point and regularly provides training and briefings to the FBI 
and CIA. He has a BS in information systems from Southern 
Illinois and an MA in criminology, and he has written various 
books and included a chapter for the FBI Counterterrorism 
Division textbook on comparing jihadi and street gang videos on 
YouTube.
    Last, Mr. Brian Michael Jenkins is a senior adviser to the 
President of the RAND Corporation and is the author of Will 
Terrorists Go Nuclear? and several Rand monographs on 
terrorism-related topics. He formerly served as chair of the 
Political Science Department at RAND. In anticipation of the 
10-year anniversary of 9/11, Jenkins spearheaded the RAND 
effort to take stock of America's policy reactions and give 
thoughtful consideration of the future strategy. That effort is 
presented in The Long Shadow of 
9/11: America's Response to Terrorism. I thank you for 
forwarding a copy of that and I found it very--I recommend it 
as reading to anybody who is considering the analysis of what 
has happened over the last course of the decade from a variety 
of different topics. Very, very provoking. Commissioned in the 
infantry, Jenkins became a paratrooper and a captain in the 
Green Berets. He is a decorated combat veteran, having served 
in the 7th Special Forces Group in the Dominican Republic and 
with the 5th Special Forces Group in Vietnam. He returned to 
Vietnam as a member of the Long Range Planning Task Group and 
received the Department of the Army's highest award for 
service.
    In 1996, President Clinton appointed Jenkins to the White 
House Commission on Aviation Safety and Security. He is a 
research associate at Mineta Transportation Institute, where he 
directs continuing research on protecting surface 
transportation from terrorist attacks.
    So I thank all of our panelists. I know this is a complex 
topic, and there is a lot to be said, so I will ask if you will 
do your best to summarize your written submitted testimony and 
focus on those issues which you think are the most important 
things for us to hear in your written testimony and appreciate 
as well that we will have time for questions. So thank you, Mr. 
McCants, and I now recognize you for your testimony for 5 
minutes.

  STATEMENT OF WILLIAM F. MC CANTS, ANALYST, CENTER FOR NAVAL 
                            ANALYSIS

    Mr. McCants. Thank you, Chairman Meehan, Ranking Member 
Speier, Members of the committee. I appreciate the opportunity 
to testify today on the ways al-Qaeda supporters use social 
media. Most of the research on the subject is confined to 
discussion forums, an older form of social media that allows 
users to comment on topics that interest the group.
    Al-Qaeda forum users are usually anonymous. The links 
between them are unknown, and the administrators heavily 
moderate the discussions. There are only a handful of these 
fora and the most prominent of them only numbers 50,000 
members, many of whom have multiple accounts or, like Aaron and 
I, are researchers, passively watching. Participating on the 
forums may harden the views of al-Qaeda supporters and it may 
push them to take action, but no one is being radicalized on 
them. They are already members of the radical choir singing to 
one another.
    If the internet does play a role in radicalization, it is 
happening elsewhere. Sometimes recruiters fish for susceptible 
youth on mainstream websites, sometimes youth find the content 
themselves on sites like YouTube, led to it out of curiosity or 
following the trail of their own conviction. They then share 
what they find with their acquaintances on social networking 
sites like Facebook. Thankfully, the vast majority of youth who 
watch and read al-Qaeda propaganda are either unaffected or 
choose not to act.
    As tested recently by one anonymous on-line recruiter he 
posited that if you post al-Qaeda propaganda to all of the 
mainstream websites, only .00001 percent of the people who 
viewed it would go out to fight for al-Qaeda and even fewer 
would carry out suicide operations. By his reasoning that is 
10,000 people out of a population of 1 billion Muslims. Those 
numbers might be a bit off, but I don't think by much. We are 
talking about a relatively small number of people.
    Since most people are already fireproofed against al-
Qaeda's call to action, the U.S. Government should focus on 
putting out the fire of criminal activity rather than removing 
the incendiary material. Follow the smoke trail of al-Qaeda 
propaganda, looking for those who celebrate its content and 
distribute it intensively for the purpose of recruitment. 
Chances are that some of them will do something criminal.
    As you might surmise from my testimony, I do not put much 
stock in closing on-line user accounts held by people that do 
not violate our laws. I also do not put much stock in 
intervening with well-meaning outreach programs or removing 
propaganda. There are too many downsides to these approaches. 
They are also unnecessary. The FBI and local law enforcement in 
the United States have done a fair job in finding al-Qaeda 
supporters on-line and arresting them before they hurt anyone. 
They have gotten very good at following the smoke trails and 
putting out the fire of criminal activity.
    However, as social networking on-line becomes more private 
and confined to one's acquaintances, this will be increasingly 
difficult to do. For legal and technological reasons, it is 
harder to get access to information on corporate-owned sites 
like Facebook compared to al-Qaeda-owned forums. Working 
through these issues is outside of my area of expertise, but I 
would close by again emphasizing that the first priority should 
be monitoring and not taking down content. Focus more on 
following the smoke and looking for the fires of criminal 
activity and focus less on removing incendiary materials since 
most people are already fireproof.
    Thank you for your time.
    [The statement of Mr. McCants follows:]
                Prepared Statement of William F. McCants
    Thank you, Chairman Meehan, Ranking Member Speier, and Members of 
the committee. I appreciate the opportunity to testify today on the 
ways al-Qaeda supporters use social media.
    Our understanding of how the internet creates al-Qaeda supporters 
is limited by where we look. With few exceptions, most of the research 
on the subject is confined to discussion forums, an older form of 
social media that allows users to comment on topics that interest the 
group. Al-Qaeda forum users are usually anonymous, the links between 
them are unknown, and the administrators heavily moderate the 
discussions. Everyone on these forums is either a stalwart supporter of 
al-Qaeda or analysts who passively watch. There are just a handful of 
these forums, and the most prominent of them only numbers 50,000 
members, many of whom have multiple accounts or are researchers like 
me. Participating on the forums may harden the views of al-Qaeda 
supporters and push them into taking action but no one is being 
radicalized. They are members of the choir singing to one another. For 
those of us watching, we see only the finished radicalized product and 
not the process that produced it.
    So where and how are al-Qaeda supporters initially radicalized on-
line? The where question is easier to answer than the how: Sometimes 
recruiters fish for susceptible youth on mainstream websites. Sometimes 
youth find the content by themselves on sites like YouTube, led to it 
out of curiosity or by following the trail of their convictions. They 
then share what they find with their acquaintances on social networking 
sites like Facebook. In the so-called ``Five Guys'' case, there is a 
mix of both trends. Young men in the D.C. area watched al-Qaeda videos 
on YouTube and shared them with one another. A Taliban recruiter 
contacted them through YouTube and facilitated their travel to 
Pakistan.
    As the Five Guys case suggests, al-Qaeda supporters use a mix of 
social media to watch and spread the organization's propaganda on-line. 
Some of these sites, like Facebook, are a goldmine for analysts because 
they show the users' connections. But they can also be more difficult 
to penetrate compared to the anonymous discussion forums. A friend 
request from a stranger is unlikely to be answered in the affirmative. 
Because these more closed social networking sites are effective at 
transmitting propaganda, we may yet see the day when an al-Qaeda video 
is solely distributed peer-to-peer without announcement on the 
anonymous discussion forums, thus eluding the media and researchers but 
nurturing the radicalized.
    Thankfully, the vast majority of youth who watch and read al-Qaeda 
propaganda are either unaffected or choose not to act, as attested 
recently by one anonymous on-line recruiter. He posited that if you 
post al-Qaeda propaganda to all of the mainstream websites, only 10% of 
the people will likely look at it. Of those, only 10% will like what 
they see. Of those, only 10% will embrace the idea of jihad. Of those, 
only 10% will propagandize for it. Of those, only 10% will go out to 
fight in a jihad. And of those, only 10% will seek martyrdom. By his 
reasoning, 10,000 people out of a population of one billion Muslims, or 
0.00001%, would go out to fight for al-Qaeda and even fewer would carry 
out a suicide operation. Those numbers might be a bit off but not by 
much. We are talking about a relatively small number of people.
    Because the number of people is so small, it is difficult to say 
why some become active supporters of al-Qaeda and others do not. What 
we can say is that the vast majority of people who watch and read al-
Qaeda propaganda will never act violently because of it. Put 
metaphorically, the material may be incendiary but nearly everyone is 
fireproof. Since that is the case, it is better to spend our resources 
putting out the fires and issuing warnings about the dangers of fire 
rather than trying to fireproof everyone or remove incendiary material.
    Extending the fire metaphor a bit, how do we know where the flames 
are? We look for smoke. In this case, the smoke is the distribution and 
celebration of al-Qaeda propaganda. People who celebrate al-Qaeda 
propaganda on-line and who distribute large amounts of it on mainstream 
websites for the purposes of recruitment should be watched. Chances are 
that a few of them will decide to do something stupid, like Zachary 
Chesser, a recent Muslim convert from the D.C. area who was active in 
on-line recruitment and was arrested while trying to go fight for al-
Shabaab in Somalia.
    As you might surmise from my testimony, I do not put much stock in 
closing on-line user accounts that do not violate our laws. I also do 
not put much stock in intervening with well-meaning outreach programs 
or removing propaganda. There are too many downsides to these 
approaches. They are also unnecessary. The FBI and local law 
enforcement in the United States have done an excellent job in finding 
al-Qaeda supporters on-line and arresting them before they hurt anyone. 
They have gotten very good at following the smoke trails and putting 
out fires.
    I would be willing to revise my approach to on-line radicalization 
if the data warranted it. But there is little research to go on, which 
is striking given how data-rich the internet is. In hard numbers, how 
widely distributed was Zawahiri's last message? Did it resonate more in 
one U.S. city than another? Who were its main distributors on Facebook 
and YouTube? How are they connected with one another? This sort of 
baseline quantitative research barely exists at the moment. Analysts 
are either focused on studying the content of the propaganda or 
absorbed in stopping the next attack by known militants.
    Until this research is done and demonstrates conclusively that al-
Qaeda's on-line propaganda is persuading large numbers of people to act 
on its behalf, I believe the conservative approach I outlined is best, 
particularly since we have not seen a great increase in foiled plots 
and arrests. The U.S. Government should focus on watching those people 
who are actively distributing and celebrating al-Qaeda propaganda on-
line, looking for criminal behavior or attempts to connect with active 
militants. Conversely, the U.S. Government should put much less 
emphasis on stopping people's exposure to al-Qaeda propaganda since it 
is not creating many supporters and it is difficult to stop its 
distribution. In other words, focus less on fireproofing and removing 
incendiary material and focus more on following the smoke and putting 
out fires.
    Thank you for your time.

    Mr. Meehan. Thank you, Mr. McCants.
    I now turn to Mr. Weisburd for your testimony.

   STATEMENT OF ANDREW AARON WEISBURD, DIRECTOR, SOCIETY FOR 
                       INTERNET RESEARCH

    Mr. Weisburd. Good afternoon, Chairman Meehan, Ranking 
Member Speier, Members of the committee. Thank you also for 
this opportunity to appear here today to discuss the threat 
posed by jihadist use of social media.
    The next home-grown violent extremist who either attempts a 
terrorist attack or who is arrested before they can do so will 
be someone I already know something about. Assuming they have a 
YouTube account, they will likely be within 2 degrees of 
separation of someone who has similarly either attempted a 
terrorist attack or has been arrested on terrorism charges. The 
following examples help to illustrate this point.
    Taimour al-Abdaly launched an attack in Stockholm, Sweden. 
Mr. al-Abdaly had connections to Arid Uka. Arid Uka opened fire 
on a bus full of U.S. service personnel at the airport in 
Frankfort, Germany killing two. Arid Uka was connected on-line 
through YouTube to Abu Khalid Abdul-Latif. Mr. Abdul-Latif is 
awaiting trial. He is accused of plotting with friends to 
attack a U.S. military facility in Seattle, Washington. Mr. 
Abdul-Latif had friends in common with Jubair Ahmad. Mr. Ahmad 
of Woodbridge, Virginia pled guilty to one count of material 
support for terrorism at the end of last week. He had made a 
video under the direction of Lashkar-e-Taiba, and he uploaded 
that video for Lashkar-e-Taiba to YouTube.
    Mr. Ahmad had connections to one Mr. Elkhadir Atrash. Mr. 
Atrash was arrested in northern Israel. He was arrested on 
charges of organizing a home-grown al-Qaeda cell based there. 
Not only were all these people connected to each other, but 
they were also connected to networks, known networks of 
extremists and/or terrorist organizations.
    Turning to terrorist media itself and specifically the 
videos, the single most common element to these videos is 
violence. Half of all terrorist videos contain explicit deadly 
violence. The effects of exposure to this violence are 
profoundly negative. The deciding factor, however, in 
determining or--the deciding factor in whether that exposure 
contributes to future violent behavior is context. The context 
in which these extremists experience this violence is not 
merely supportive or permissive of violence, it presents that 
violence as absolutely essential. It is precisely that kind of 
context that Inspire magazine sought to provide. For the home-
grown violent extremists, however, who were targeted or reached 
out to by Anwar al-Awlaki and Samir Kahn of Inspire magazine, 
each release of Inspire magazine was more than just the 
content. Each new edition of Inspire magazine was celebrated as 
though the release of the magazine itself was an event, a 
terrorist attack. While we will be dealing with the content of 
Inspire magazine for some time to come, this string of 
victories is over. Neither Anwar al-Awlaki nor Samir Khan are 
easily replaced.
    Regarding the videos again and regarding the issue of 
countermeasures of what we might do about them, I don't believe 
that Google, operator of YouTube, has an interest in promoting 
violent extremism, and they have already made some effort to 
address this issue. I will note, however, that authenticity is 
of great importance to extremists. Each terrorist media product 
bears a trademark of the associated organization. These 
trademarks of terrorism are signs of authenticity and are 
easily recognized, not only by extremists but also by service 
providers. I would suggest the objective of not driving all 
terrorist media off-line, but to marginalize it and to deprive 
it of these clear indications of authenticity.
    Chairman Meehan, Ranking Member Speier, I would like to 
conclude by thanking you for your service, for your leadership 
on addressing this issue, and I would be happy to answer any 
questions you may have.
    [The statement of Mr. Weisburd follows:]
              Prepared Statement of Andrew Aaron Weisburd
                            06 December 2011
    Good afternoon, Chairman Meehan, Ranking Member Speier, and Members 
of the committee. Thank you for the opportunity to appear before the 
committee today to discuss the nature and threat posed by Jihadist use 
of social media.
                              introduction
    I have been investigating terrorist use of the internet for roughly 
10 years.\1\ For the past 2 years, I have analyzed the YouTube accounts 
of al-Qaeda supporters who have attempted a terrorist attack, or have 
been arrested on terrorism charges. What I find most alarming is that 
each time I look at someone new, I find I already have data on them as 
a result of their being part of the same global community of 
extremists.
---------------------------------------------------------------------------
    \1\ A significant portion of that work finds expression on the 
internet Haganah blog (internet-haganah.com), the site of SoFIR 
(sofir.org), and now the internet Haganah Forum (forum.internet-
haganah.com) and on Twitter (@webradius).
---------------------------------------------------------------------------
                       two degrees of separation
    Taimour al-Abdaly launched a complex attack on Stockholm, Sweden. 
He was killed when one of his bombs detonated prematurely.\2\ He used 
Facebook primarily to keep in touch with family, with one exception. 
That exception was a known associate of American al-Qaeda operative 
Samir Khan.\3\ Al-Abdaly was also an avid consumer of al-Qaeda and 
related extremist videos, as well as of nasheeds--a cappella songs that 
celebrate violent jihad and death by martyrdom. However, he made little 
use of YouTube for social networking, a fact that may reflect some 
amount of training in operational security.\4\
---------------------------------------------------------------------------
    \2\ http://internet-haganah.com/harchives/007103.html.
    \3\ http://internet-haganah.com/harchives/007132.html.
    \4\ http://internet-haganah.com/harchives/007107.html.
---------------------------------------------------------------------------
    Taimour al-Abdaly was connected to Arid Uka,\5\ a young man who 
opened fire on a busload of U.S. military personnel at the airport in 
Frankfurt, Germany, killing two. Particularly in the case of homegrown 
violent extremists, terrorism seems to be as much an expression of an 
identity as of ideology, and the internet provides an ample supply of 
imagery, music, and text from which the aspiring terrorist can assemble 
their identity. In the case of al-Abdaly and Uka, the common element 
was the nasheed.\6\ They shared the same supplier--an as yet 
unidentified individual, most likely also in Europe, who was well-known 
to other extremists on account of his work as a curator of extremist 
songs. The choice of the word supplier is deliberate, and there is a 
similarity to be seen with drug dealing. Such suppliers link many of 
the extremists I have studied. They are people who have acquired a 
reputation on-line of having an ample supply of ``the good stuff,'' 
generally videos, audio files (e.g. nasheeds), and literature, all of 
an extremist nature.
---------------------------------------------------------------------------
    \5\ http://internet-haganah.com/harchives/007251.html.
    \6\ http://internet-haganah.com/harchives/007194.html.
---------------------------------------------------------------------------
    Arid Uka was connected to Abu Khalid Abdul Latif, who is alleged to 
have plotted with friends to attack a military facility in Seattle, 
Washington.\7\ They were linked through multiple individuals on YouTube 
who all associated with a highly radicalized Salafist organization 
operating in Cologne and Frankfurt, Germany.\8\ The organization, Die 
Wahre Religion, is led by Ibrahim Abou Nagie, who is currently under 
indictment for inciting violence and calling for the destruction of 
other religions.\9\ Abdul Latif represents a not uncommon type of 
extremist activism on YouTube. His channel served as a virtual pulpit 
from which he preached regularly in video sermons that almost no one 
came to hear. As he began to move forward with his plot, his comments 
on other YouTube channels became increasingly shrill,\10\ yet he 
stopped short of saying anything that might have warranted opening an 
investigation. While his words may not have clearly indicated terrorist 
intent, Abdul Latif was linked via YouTube to a well-known network of 
homegrown violent extremists here in the United States.\11\
---------------------------------------------------------------------------
    \7\ USA v Abdul Latif & Mujahidh, complaint available at http://
s88179113.onlinehome.us/2011-06-25/USA_v_Abdul-Latif_et-
al%20Complaint.pdf.
    \8\ http://forum.internet-haganah.com/showthread.php?146.
    \9\ http://www.taz.de/Anklage-gegen-Hassprediger/!77963/.
    \10\ http://internet-haganah.com/harchives/007379.html.
    \11\ Ibid.
---------------------------------------------------------------------------
    Abdul-Latif had friends in common with Jubair Ahmad of Woodbridge, 
Virginia, who has been charged with being a member of Lashkar-e-Taiba, 
and making videos for that designated terrorist organization.\12\ The 
common link was once again individuals associated with Die Wahre 
Religion.\13\ Ahmad's alleged membership and direct communications with 
a bona fide terrorist organization is not something one often sees in 
open sources of intelligence. His work as a curator of Lashkar-e-Taiba 
videos appears to be what led to many extremists to link to him (and 
likely also brought him to the attention of the FBI).
---------------------------------------------------------------------------
    \12\ http://www.fbi.gov/washingtondc/press-releases/2011/
woodbridge-man-charged-with-providing-material-support-to-terrorist-
organization.
    \13\ http://internet-haganah.com/harchives/007423.html.
---------------------------------------------------------------------------
    Jubair Ahmad had connections to Elkhadir Atrash, who was arrested 
on charges of organizing a homegrown al-Qaeda cell based in northern 
Israel.\14\ Like Ahmad, Atrash was a supplier, curating YouTube videos 
of two extremist clerics, Abu Nur al-Maqdisi of Gaza, and Abu Muhammad 
al-Maqdisi of Jordan.\15\ In addition to Jubair Ahmad, Atrash was 
connected to a broad range of homegrown violent extremists in the 
United States, throughout Europe, and in Australia.\16\ There is no 
evidence that extremists must progress through on-line activism to 
involvement in real-world terrorist activity. Generally it seems there 
is interplay between the two realms. Nevertheless, Atrash is 
representative of extremists who engage in on-line activism while 
toiling away at the more laborious task of assembling a cell that can 
engage in terrorism, or making the connections necessary to travel to 
some field of jihad.
---------------------------------------------------------------------------
    \14\ http://forum.internet-haganah.com/showthread.php?150.
    \15\ Ibid.
    \16\ http://internet-haganah.com/harchives/007426.html.
---------------------------------------------------------------------------
    These al-Qaeda supporters--part of a global network whose number I 
estimate at a few thousand--were all connected within two or three 
degrees of each other on YouTube. The connections between them should 
be assumed to be weak, rather than strong, but that is not to say such 
weak ties are unimportant.\17\ While a terrorist cell will be composed 
of strongly-tied individuals, it will be from within a weakly-tied 
community that they emerge. Weak ties are the paths along which 
information flows, including militant ideology, and intelligence 
regarding both potential targets for terrorism as well as 
counterterrorism activities. Conversely, the weakness of strong ties is 
that information no longer flows effectively. In the life-cycle of 
terrorist movements and organizations, one sees again and a again a 
particular process: Successful counterterrorism activity, generally in 
the form of arrests and prosecutions, causes communities of extremists 
to fracture. Weak ties break, leaving the strongly tied units with 
fewer sources of support and intelligence. This makes them more 
vulnerable to counter-terrorism, and the process repeats itself.\18\
---------------------------------------------------------------------------
    \17\ For a discussion of weak and strong ties, see ``The Strength 
of Weak Ties'' by Mark S. Granovetter, The American Journal of 
Sociology, Vol. 78, No. 6 (May, 1973).
    \18\ The history of the decline and fall of the German R.A.F. is a 
classic example of these processes at work.
---------------------------------------------------------------------------
       media, computer-mediated communications, and violence \19\
---------------------------------------------------------------------------
    \19\ For a thorough review of these issues, see Jihad, Crime, and 
the Internet by Erez, Weimann, and Weisburd, NIJ2006-IJ-CX-0038 (in 
press), pp. 21-30.
---------------------------------------------------------------------------
    Terrorism--violence for political aims--requires a steady output of 
media for the movement to remain relevant, to maintain morale, and to 
recruit new members. For the terrorist organization or movement, the 
low cost and ease of access of the internet make it an ideal channel 
for the distribution of terrorist media. Terrorism is also a social 
phenomenon. Individuals may act alone, but in almost all cases, the 
terrorist is a product of a community of extremists. The genuine lone 
wolf is extremely rare. Because of their political and social needs, 
social media sites are very attractive to violent extremists. But this 
fails to explain how the combination of people, media, and technology 
contributes to the problem of homegrown violent extremism.
    Computers affect how we experience media and how we interact with 
others. Extremists are as susceptible to these effects as we are. The 
on-line environment is immersive. We feel we are in a place, often 
called cyberspace. When we are on a social media site, we feel that we 
are virtually together with our friends, family, and comrades in arms. 
We feel we are present in the videos we watch. On-line interaction 
brings people closer, faster. On-line relationships get off to a strong 
start, and then move off-line if possible. In the case of two people 
seeking a soulmate, the result may be a happy union. In the case of 
aspiring terrorists, the result may be less positive. On-line social 
networks tend to mirror off-line social networks. People--extremists 
included--use social media to keep in touch with people they already 
know. An individual's ability to get involved in terrorism is directly 
related to who they know, and this is precisely what social media sites 
reveal to us. The benefits of this to law enforcement are enormous.
    In terrorist media, the single most common element is violence.\20\ 
Half of all terrorist videos contain explicit, deadly violence. The 
effects of exposure to such violence are profoundly negative. The 
deciding factor in whether that exposure contributes to future violent 
behavior is context. The context in which extremists experience 
terrorist media is not merely supportive of violence--it presents 
violence as absolutely essential.
---------------------------------------------------------------------------
    \20\ Ibid., and Comparison of Visual Motifs in Jihadi and Cholo 
Videos on YouTube by A. Aaron Weisburd (2009), in Studies in Conflict 
and Terrorism, 32:12 1066-1074.
---------------------------------------------------------------------------
           samir khan, anwar al-awlaki, and inspire magazine
    Each new edition of Inspire was celebrated as a victory, as an 
attack in itself. In that sense, the deaths of al-Awlaki and Khan can 
only help in the battle against homegrown violent extremists. There 
will be no more such events to celebrate. Neither of them is easily 
replaced, and in the event the magazine is re-launched, it is worth 
noting that the work involved in producing the magazine likely 
contributed to the successful targeting of al-Awlaki. Finally, 
information does not preserve itself in perpetuity on the internet. If 
Inspire magazine remains available for download, it will only be 
because activists continue to upload it, and every upload of Inspire 
magazine is an event that will leave a trail, and is an act that--in 
light of the content of the magazine--can likely be investigated and 
prosecuted.
                            countermeasures
    The U.S. intelligence community is already making very effective 
use of the internet to identify and investigate extremists. Some 
additional actions can contribute to undermining the processes that 
enable extremists to engage in violence.
    Producing and distributing media for Foreign Terrorist 
Organizations constitutes material support for terrorism. I would argue 
that a service provider who knowingly assists in the distribution of 
terrorist media is also culpable. While it is in no one's interests to 
prosecute internet service providers, they must be made to realize that 
they can neither turn a blind eye to the use of their services by 
terrorist organizations, nor can they continue to put the onus of 
identifying and removing terrorist media on private citizens. I don't 
believe that Google, operator of YouTube, has an interest in promoting 
violent extremism, and they have already made some effort to address 
this issue, but they can and should do more.
    Branding in terrorist media is a sign of authenticity, and 
terrorist media is readily identifiable as such due to the presence of 
trademarks known to be associated with particular organizations. The 
objective should be not to drive all terrorist media off-line, but to 
drive it to the margins and deprive it of the power of branding, as 
well as to leave homegrown extremists unable to verify the authenticity 
of any given product.
                               conclusion
    Chairman Meehan and Ranking Member Speier, I would like to conclude 
by thanking you for your service and for your leadership in addressing 
this issue.
    I would be happy to answer any questions that you may have.

    Mr. Meehan. Thank you, Mr. Weisburd. I now turn to Mr. 
Jenkins for your testimony.

   STATEMENT OF BRIAN MICHAEL JENKINS, SENIOR ADVISOR TO THE 
                  PRESIDENT, RAND CORPORATION

    Mr. Jenkins. Thank you, Mr. Chairman and Ranking Member 
Speier, Members of the committee, for inviting me to talk to 
you about this important subject.
    Although all terrorist groups use the internet, al-Qaeda is 
the first to fully exploit the internet and the social media. 
This reflects some unique characteristics of al-Qaeda itself. 
It regards itself as a global movement that therefore requires 
a global network of communications to support it. It sees its 
mission as not simply one of creating terror but one of 
awakening the Muslim community. Its leaders regard 
communications as 90 percent of their struggle and therefore, 
despite the security risks, these leaders communicate regularly 
with video and audio messages.
    These are distributed on the official websites, and then 
they are redistributed in a vast number of additional websites, 
but beneath this there is a tier of forums that allow for 
direct participation by on-line jihadists so they can become 
part of the movement themselves.
    Al-Qaeda leans on these cybertactics out of necessity. U.S. 
counterterrorist operations plus unprecedented international 
cooperation among the intelligence services and law enforcement 
organizations of the world have degraded al-Qaeda's operational 
capability.
    As a consequence, al-Qaeda today is more decentralized, 
more dependent on its field commands, its affiliates, its 
allies and above all on its ability to inspire home-grown 
terrorists. In this connection, al-Qaeda has embraced 
individual jihadism and has emphasized do-it-yourself 
terrorism. That is a fundamental shift in strategy.
    Many would-be jihadists begin their journey on the internet 
seeking solutions to their personal crises, validation of their 
anger, the thrill of clandestine activity. Of these, a few move 
beyond the internet to seek terrorist training abroad or to 
plot terrorist attacks here, but overall the response in 
America to al-Qaeda's intense marketing campaign thus far has 
not amounted to very much.
    Indeed, between 9/11 and the end of 2010, a total of 176 
persons, Americans, were identified as jihadists; that is, 
accused of providing material support to one of the jihadist 
groups or plotting terrorists attacks. In fact, despite years 
of on-line jihadist exhortation and instruction, the level of 
terrorist violence in the United States since 9/11 has been far 
below the terrorist bombing campaigns of the pre-internet 
1970s.
    This suggests a failure of al-Qaeda's strategy. It 
indicates that not only are America's Muslims rejecting al-
Qaeda's ideology, not only is this a remarkable intelligence 
ascent, but there are some inherent weaknesses in this on-line 
strategy.
    Al-Qaeda has created a virtual army which has remained 
virtual. Although its strategy depends on individual 
initiative, it offers on-line participants the means of 
vicariously participating in the jihadist struggle without 
incurring personal risks. Indeed, the expression of 
convictions, of commitment, of threats and boasts becomes not a 
summons to arms but, in fact, a distraction from action in the 
real world, a kind of psychologically satisfying video game. 
Therefore we are not seeing the threat yet.
    What does this mean in terms of a response? As the two 
previous witnesses have indicated, this on-line discussion and 
these postings are a source of valuable intelligence. So rather 
than devoting vast resources to shutting down content and being 
dragged into a frustrating game of whack-a-mole--as we shut 
down sites, they open up new ones. Instead, we probably should 
devote our resources to facilitating intelligence collection 
and criminal investigations so that we can continue to achieve 
the successes that we have had thus far in identifying these 
individuals, uncovering these plots and apprehending these 
individuals.
    [The statement of Mr. Jenkins follows:]
            Prepared Statement of Brian Michael Jenkins \1\
---------------------------------------------------------------------------
    \1\ The opinions and conclusions expressed in this testimony are 
the author's alone and should not be interpreted as representing those 
of RAND or any of the sponsors of its research. This product is part of 
the RAND Corporation testimony series. RAND testimonies record 
testimony presented by RAND associates to Federal, State, or local 
legislative committees; Government-appointed commissions and panels; 
and private review and oversight bodies. The RAND Corporation is a non-
profit research organization providing objective analysis and effective 
solutions that address the challenges facing the public and private 
sectors around the world. RAND's publications do not necessarily 
reflect the opinions of its research clients and sponsors.
---------------------------------------------------------------------------
                            December 6, 2011
              is al-qaeda's internet strategy working? \2\
---------------------------------------------------------------------------
    \2\ This testimony is available for free download at http://
www.rand.org/pubs/testimonies/CT371.html.
---------------------------------------------------------------------------
    Terrorists use the internet to disseminate their ideology, appeal 
for support, spread fear and alarm among their foes, radicalize and 
recruit new members, provide instruction in tactics and weapons, gather 
intelligence about potential targets, clandestinely communicate, and 
support terrorist operations. The internet enables terrorist 
organizations to expand their reach, create virtual communities of 
like-minded extremists, and capture a larger universe of more-diverse 
talents and skills.
    While almost all terrorist organizations have websites, al-Qaeda is 
the first to fully exploit the internet. This reflects al-Qaeda's 
unique characteristics. It regards itself as a global movement and 
therefore depends on a global communications network to reach its 
perceived constituents. It sees its mission as not simply creating 
terror among its foes but awakening the Muslim community. Its leaders 
view communications as 90 percent of the struggle.
    Despite the risks imposed by intense manhunts, its leaders 
communicate regularly with video and audio messages, which are posted 
on its websites and disseminated on the internet. The number of 
websites devoted to the al-Qaeda-inspired movement has grown from a 
handful to reportedly thousands, although many of these are ephemeral. 
The number of English-language sites has also increased.
    Al-Qaeda's communications are a distributed effort. Its websites 
fall into three categories: At the top are the official sites that 
carry messages of the leaders. Recognized jihadist figures discuss 
issues of strategy on a second tier. The third tier comprises the many 
chat-rooms and independent websites where followers verbally and 
visually embellish the official communications, fantasize about 
ambitious operations, boast, threaten, and exhort each other to action.
    The quantity and easy accessibility of these sites have attracted a 
host of on-line jihadists, some of whom are technically savvy and 
contribute their skills to the overall communications effort.
    The jihadist enterprise has created on-line magazines such as 
Inspire and has recruited hometown communicators--native-born 
Americans, including al-Qaeda's Adam Gadahn and Anwar al-Awlaki, and al 
Shabaab's Omar Hammami--who understand American culture and can 
communicate in a way that will appeal to young American Muslims. Those 
seeking more direct dialogue can work through the internet to exchange 
messages with jihadist interlocutors.
    Al-Qaeda leans on cyber tactics as much out of necessity as for 
efficiency's sake. U.S. counterterrorist operations have pounded on al-
Qaeda's central command degrading its operational capabilities, while 
unprecedented cooperation among intelligence services and law 
enforcement organizations world-wide has made the jihadists' operating 
environment increasingly hostile. As a result, al-Qaeda today is more 
decentralized, more dependent on its field commands and affiliates and 
on its ability to inspire local volunteers to carry out attacks.
    Al-Qaeda has embraced individual jihad as opposed to 
organizationally-led jihad. Increasingly, it has emphasized do-it-
yourself terrorism. Those inspired by al-Qaeda's message are exhorted 
to do whatever they can wherever they are. This represents a 
fundamental shift in strategy. As part of this new strategy, al-Qaeda 
has recognized on-line jihadism as a contribution to the jihadist 
campaign. Despite some grumbling from jihadist ideologues about on-line 
jihadists not pushing back from their computer screens to carry out 
attacks, the threshold for jihad has been lowered. Action remains the 
ultimate goal but on-line warriors are not viewed as less-dedicated 
slackers.
    Many would-be jihadists begin their journey on the internet, 
seeking solutions to personal crises, validation, and reinforcement of 
their anger, the thrill of clandestine participation in an epic 
struggle. We have no way of counting the number of on-line jihadists. 
There may be thousands. Nor can we calibrate their commitment, which 
can range from merely curious visitor to the most determined fanatic.
    Of these, a few have moved beyond the internet to seek terrorist 
training abroad. Five young American students were arrested in Pakistan 
for attempting to join a terrorist group--they started their journey on 
YouTube. Some American jihadists like Zachary Chesser were inspired to 
set up their own jihadist website. Others like Samir Khan and Emerson 
Begolly exhorted others on-line to carry out terrorist attacks. Still 
others have found sufficient inspiration on the internet to plot or 
carry out terrorist attacks in the United States like Michael Finton, 
who plotted to blow up a Federal building in Illinois, or Major Nidal 
Hasan who killed 13 of his fellow soldiers and wounded 31 others at 
Fort Hood, Texas in 2009. Jose Pimentel apparently radicalized himself 
on the internet, urged others to carry out attacks, then migrated from 
encourager to would-be bomber, following instructions from al-Qaeda's 
Inspire magazine to build his explosive devices.
    Overall, however, the response in America to al-Qaeda's intense 
marketing campaign thus far, has not amounted to much. According to my 
own study of radicalization and recruitment to jihadist terrorism in 
the United States, between 9/11 and the end of 2010, a total of 176 
individuals were arrested or had self-identified as jihadists.\3\ This 
includes those arrested for providing material assistance to jihadist 
groups (Hamas and Hezbollah do not fall into this category), attempting 
to join jihadist fronts abroad, or plotting terrorist attacks. 
(Analysts may ague about the inclusion or exclusion of a few cases, but 
the totals remain small.)
---------------------------------------------------------------------------
    \3\ Brian Michael Jenkins, Stray Dogs and Virtual Armies: 
Radicalization and Recruitment in the United States Since 9/11, Santa 
Monica, CA: The RAND Corporation, 2011.
---------------------------------------------------------------------------
    The number of jihadists identified to date represents a tiny 
turnout among the approximately 3 million American Muslims--six out of 
100,000. There is no evidence of evidence of any vast jihadist 
underground. Most of the cases involve one person.
    There was an uptick in cases in 2009 and 2010, owing mainly to 
recruiting in the Somali community, but the number of homegrown 
terrorists declined between 2009 and 2010. The current year may show a 
further decline in the number.
    The determination of America's jihadists, with a few exceptions, 
appears to be low. Of the 32 terrorist plots discovered between 9/11 
and 2010, only 10 had what could be generously described as operational 
plans. And of these, six were FBI stings. Intentions are there--
provided with what they presume to be bombs, America's jihadists are 
ready to kill, but without external assistance, only four individuals 
attempted to carry out terrorist attacks on their own. Fortunately, 
most also lacked competence. Only three managed to attempt attacks, and 
only two, both lone gunmen, were able to inflict casualties. Suicide 
attacks are rarely contemplated.
    Despite years of on-line jihadist exhortation and instruction, the 
level of terrorist violence in the United States during the past decade 
is far below the terrorist bombing campaigns carried out by a variety 
of groups in the 1970s. The absence of jihadist terrorist activity 
since 9/11 reflects the success of domestic intelligence operations. It 
also indicates that America's Muslim community has rejected al-Qaeda's 
ideology. And it suggests a failure of al-Qaeda's internet strategy.
    It appears that while internet strategies aimed at creating at 
least weak ties among a large number of on-line participants offer 
opportunities to terrorist enterprises like al-Qaeda, such strategies 
also appear to have inherent weaknesses. They may create virtual 
armies, but these armies remain virtual. They rely on individual 
initiative to carry out terrorist actions, but they offer on-line 
participants the means to vicariously participate in the campaign and 
please God without incurring any personal risk. On-line jihadist forums 
may be providing an outlet that distracts jihadists from involvement in 
real-world operations.
    This may be a particular weakness of the jihadist movement, which 
recognizes fervent commitment evidenced by making disruptive threats, 
urging others to carry out attacks, creating terror, rather than 
limiting participation to physical terrorist attacks. If 90 percent of 
the struggle is communications, according to al-Qaeda, then on-line 
jihadism cannot be disparaged. For the virtual warrior, the opportunity 
to display one's convictions, demonstrate one's intentions and prowess 
through boasts, threats, and fantasy attacks on the internet counts as 
achievement. Al-Qaeda's own pronouncements tend to equate the 
declaration of intentions with their achievement. They include among 
their accomplishments what they intend to do. For many young men who 
grew up with the internet, there is no sharp line dividing the real 
world from the virtual world--the virtual world is the real world. On-
line jihadism, then, may be a distraction from the real thing--not a 
call to arms, but a psychologically rewarding videogame.
    Individual participation in an on-line group as opposed to joining 
a real group may further undermine action. While some individuals 
display the resolve to carry out attacks without the reinforcement of 
peers, the history of terrorist plots suggests that peer pressure plays 
an important role in driving a conspiracy toward action. On the 
internet, one can turn off the conspiracy at any time. On-line jihadism 
is readily accessible but it also offers easy off-ramps.
    On-line instruction in terrorist tactics and weapons is important 
for the jihadists, but extremists learned how to make bombs and carried 
on bombing campaigns long before the internet. The most serious 
jihadist plots in the United States have been those in which the 
conspirators had access to hands-on training abroad, which also appears 
to have cemented their radicalization.
    None of this is to be sanguine about the power of the internet for 
terrorists. As it attracts more technically savvy participants, on-line 
jihadism could evolve toward cyberterrorism aimed not merely at 
defacing government websites, but at physical sabotage of critical 
infrastructure.
    What steps might be taken? Advocates of absolute internet freedom 
sometimes declare the internet to be beyond any jurisdiction. But it is 
not self-evident that any attempt to limit on-line hate speech, 
threats, or incitements to violence will violate the Constitution or 
destroy innovation on the internet. European democracies impose limits 
on hate speech. Child pornography is outlawed--it makes no difference 
how many viewers there are. On-line gambling is controlled. The right 
to privacy, in my view, does not guarantee anonymity, but caution is in 
order.
    In addition to defining what content should be barred, any effort 
to limit internet use must realistically assess the ability to monitor 
and impose the restriction and must obtain international agreement in 
order to be effective. As Jonathan Kennedy and Gabriel Weimann point 
out in their study of terror on the internet, ``All efforts to prevent 
or minimize Al Qaeda's use of the internet have proved 
unsuccessful.''\4\ Even China, which has devoted immense resources to 
controlling social media networks with far fewer concerns about freedom 
of speech, has been unable to block the microblogs that flourish on the 
web. Faced with the shutdown of one site, jihadist communicators merely 
change names and move to another, dragging authorities into a 
frustrating game of Whack-A-Mole and depriving them of intelligence 
while they look for the new site. Is this, then, the best way to 
address the problem?
---------------------------------------------------------------------------
    \4\ Jonathan Kennedy and Gabriel Weimann, ``The Strength of Weak 
Terrorist Ties,'' Terrorism and Political Violence, Vol. 23, p. 203, 
citing Gabrial Weimann, Terror on the Internet: The New Arena, The New 
Challenges, Washington, DC: US Institute of Peace Press, 2006.
---------------------------------------------------------------------------
    Government might begin with an assessment of the current actual 
threat. Al-Qaeda's overall recruiting efforts have not produced a 
significant result. On-line jihadism is low-yield ore. Cases of real 
internet recruitment are rare. Appropriate authorities are able to 
successfully engage in attribution operations as new on-line jihadists 
emerge, and the FBI has had achieved remarkable success in using the 
internet to detect conspiracies of one.
    A discussion of how American military commands and intelligence 
agencies wage war in cyberspace lie beyond the scope of this hearing. 
Theoretically, the strategies may include monitoring on-line chatter, 
disrupting or infiltrating websites, intervening overtly or covertly to 
challenge jihadist arguments, even setting up false-front networks to 
attract would-be terrorists. Meanwhile, the terrorist communications 
offer a valuable source of intelligence. Instead of legislating 
restrictions, a more pragmatic approach would aim at facilitating 
intelligence collection and criminal investigations.
    The internet and social media are part of today's battlefield. But 
as of now, the immediate risks posed by al-Qaeda's on-line campaign do 
not justify attempting to impose controls that could be costly to 
enforce and produce unintended consequences. But as the contest 
continues, the situation warrants continued monitoring for signals of 
new dangers.

    Mr. Meehan. Thank you, Mr. Jenkins, and thanks to each of 
the witnesses for your insightful testimony. I know you are the 
ones who have been tracking this activity for some period of 
time. So I now recognize myself for 5 minutes of questions.
    Let me just ask the panel, we have been living with the 
internet now for some time, and it has expanded and grown. Are 
these social networks game-changers in any way with respect to 
the world of terrorism? Or is this just another manifestation, 
as Mr. Jenkins talked about, with individuals who in some ways 
are living in a cyberworld of, I think you used the language, 
virtual reality. I mean how much of the real threat that we are 
seeing on this communications that is taking place within the 
world of Facebook and YouTube with a community of those who are 
wanting to share the message of jihad? Mr. McCants, let me ask 
you.
    Mr. McCants. Thank you. I don't think it is a game-changer 
in the sense that it is leading more people to become 
terrorists. Certainly like-minded individuals are finding it 
much easier to connect with one another, but I don't think we 
are seeing a rapid increase in their numbers. I agree with the 
other two speakers. It is a pretty small number.
    I will say that it is hard to answer your question with 
good data and I think this is one of the main problems 
confronting those who are researching this topic. There is very 
little quantitative studies that have been done of 
radicalization on-line, and it is striking given that how 
quantifiable the internet is.
    Mr. Meehan. How do you know somebody has been radicalized? 
That is the difficulty because I think the testimony was that 
there is a community of individuals that effectively have found 
themselves and they communicate among themselves, but how do we 
know where somebody has moved out of the virtual world and into 
a point which they may carry out an act of jihad, or is it, 
just as you said, follow the smoke and you might find the ones 
that go from aspiration to taking actual steps?
    Mr. McCants. I think so and I think that is a question that 
intelligence organizations are better-positioned to answer but 
for analysts I think you can get pretty far just following the 
trail of propaganda, looking at its distribution. Much of the 
focus is on these older discussion forums. I think for a number 
of the people who study this stuff it is sort of late to come 
to the realization that a lot of the discussion is shifting 
toward these more closed social networking sites like Facebook, 
where it is a lot more difficult to gain access. You can't just 
make a friend request and expect it to be answered.
    So I think it poses a real research problem for analysts on 
the outside and an intelligence-gathering problem for the U.S. 
Government.
    Mr. Meehan. As you answer the questions, Mr. Weisburd, I 
will turn to you, are we getting to a point where in time those 
who really do want to, the official folks that want to 
communicate, do they find sort of this is polluted by all the 
wannabes that are out there at this point in time?
    Mr. Weisburd. If they found it to be polluted, if the 
message was diluted sufficiently that might be beneficial to us 
and detrimental to them. I think though getting back to the 
point of who is it who is merely aspirational, who is it who is 
moving to the next step, the internet is only very rarely going 
to provide you with sufficient indications that that is going 
on. The internet is not an isolated place. Everything that 
happens on-line involves people sitting behind a computer 
screen sitting at the keyboard. So understanding those people 
and taking investigations, if they start on-line off-line can 
be an important aid in doing threat assessment, which is really 
what this all comes down to. We can find extremists on-line. We 
can find where they are located. But when you have to 
prioritize with limited resources who you investigate and who 
you do not or who you apply more resources to and who you do 
not, indications of how you should do that on-line will be few 
and far between. It really requires a more holistic view of the 
person that you are looking at.
    Mr. Meehan. Mr. Jenkins, you talked a little bit about the 
do-it-yourself terrorists that are sort of being invited by 
these forums, driving down to that. Is this the real, I mean 
the limited threat that we are seeing by virtue of this 
expansion into the world of social media?
    Mr. Jenkins. Thus far it has been. Look, terrorists and 
ordinary criminals are always going to be ahead of us in 
exploiting any new technology. Government is always going to be 
behind on this because we don't invent laws for crimes that 
haven't yet occurred. So while they move into exploiting new 
technologies, we have to figure out ways that we can continue 
to keep up with them.
    In fact, your original question, this isn't really a game-
changer on this, but we do have to figure out ways that we can 
keep up with it in terms of our criminal investigations.
    Thus far, in terms of trying to separate who is going to go 
down the path of jihad versus those who are simply going to be, 
invent an avatar and beat their chests in these various sites 
about what they would, what they intend to do, thus far the 
authorities have been pretty good at identifying people and 
indeed moving them into situations where, in fact, their 
intentions----
    Mr. Meehan. One last question because my time is expiring, 
but are we moving them sometimes? Do we find them and then 
create the opportunity and then someone almost lures them into 
taking those next substantive steps that actually turn into 
purported steps toward acts of terrorism?
    Mr. Jenkins. I would hesitate to use the word ``lure'' 
because I don't think we want to get into the issue here of 
entrapment. But certainly by identifying individuals and 
creating opportunities for them to engage in dialogue with 
people who they think are al-Qaeda, a number of these terrorist 
operations that have been uncovered, these terrorist plots, 
were when individuals thought they had connected with a group. 
It turned out for them to be the wrong group. Instead of being 
al-Qaeda it was the FBI. But we can legitimately, I think, 
probe those intentions and see just how far these people are 
willing to go.
    In most cases, although we don't have, we don't have 
numbers of dropouts, we have no way of counting those who take 
the off-ramp, but those who have followed through turn out 
again, to echo what my fellow participants here have said, 
turns out to be a very, very small number. If we are looking 
for something like whether it is .00001 percent or add a zero 
or subtract a zero, that is still a very tiny number. That also 
means, however, that it is an investigative challenge.
    Mr. Meehan. Thank you, Mr. Jenkins. I now turn to the 
Ranking Member, Ms. Speier for her questions.
    Ms. Speier. Mr. Chairman, thank you, and thank you to our 
witnesses. I was pleasantly surprised by the consistency of 
your testimony today, because I was expecting, frankly, that 
there would be a fair amount of discussion seeking to have 
these various sites taken down. But almost to a person you have 
said basically that these are tools for law enforcement to use, 
that it would be far more problematic to take them down than to 
leave them up and that for the most part these aspirants to the 
extent that they are don't come to it via the internet, they 
are already there and then just get confirmation of what they 
believe. Is that a fair statement, would you say?
    Mr. Jenkins. You know, look, it is not as if the internet 
is not a vector of an al-Qaeda infection. Instead the 
individuals come to it as seekers. They are looking for 
something and therefore they search through these sites and 
find sites that resonate with their belief. The internet will 
put them in touch with other people. It will make them a part 
of a broader community, an on-line community. It will reinforce 
their radicalization. But by itself, the internet doesn't get 
them all the way there. In fact, one thing I think is important 
here, a lot of the plots that are being discovered are 
conspiracies of one individual. It is when people had the 
requirement that they actually--before the internet, actually 
had to meet other people, we know in looking at the history of 
these plots that peer pressure, face-to-face peer pressure 
plays an important role. It doesn't have the same power on the 
internet, as I say, because you can turn it off whenever you 
want to. So you can in a sense play at jihadism and you are not 
propelled by that face-to-face peer pressure.
    So the ability to participate as an individual, even the 
on-line instruction, while it is important, in the Pimentel 
case it is important, at the same time, again if you look at 
the most serious plots, the most serious plots had at least one 
individual that had hands-on training. So in terms of action, 
it is still face-to-face contact and hands-on training that 
gets people all the way there.
    Ms. Speier. Okay, so having said that, let me ask each of 
you this question. Is there anything that should keep us up at 
night relative to the internet as a source of jihadist 
fomentation?
    Mr. McCants. No. We are just not seeing the numbers that 
would warrant that kind of worry. Again, if there were better 
research based on good data showing that there were a large 
number of people that were being swayed by this propaganda, 
that would cause me worry, and you would want to monitor their 
activities, but I don't think we even see reason, have reason 
to believe that a large number of people are even being swayed 
much less going the extra step of taking action.
    Ms. Speier. Mr. Weisburd.
    Mr. Weisburd. I find the idea that on my laptop I have 
information that I will find out after the fact is tied to, I 
will have some link between somebody who is involved in 
terrorism who I already know is connected to somebody I didn't 
know. I find that I have got a few thousand people out there 
who some among them are almost certain to become involved in 
terrorism. Who among them is it? I don't know. I really can't 
tell from looking on-line who is going to be the next shooter 
of a bus full of servicemen, for example.
    On the other hand, I think what all of this revolves around 
is that involvement in terrorism is complicated. We tend to, I 
think, underestimate how difficult it is. There are many 
different factors that need to come into play in order for 
somebody to successfully get involved in terrorism and there 
seem to be very many inhibitions, things that get in the way of 
people becoming involved in terrorism. This is good news for 
us. I think if we were going to study the issue, the area to 
study is not so much what is it that enables somebody to become 
involved in terrorism, but what is it that keeps so many other 
people from not getting involved in terrorism, not even 
proceeding into terrorism when they are already what we call 
radicalized. That I think for us is a more productive way to 
proceed.
    Ms. Speier. Thank you. I yield back.
    Mr. Meehan. Thank you, Ranking Member Speier. Now I turn to 
the gentleman from Missouri, Mr. Long.
    Mr. Long. Thank you, Mr. Chairman. Mr. McCants, you were 
talking about most people are fireproof now to zero zero zero 
zero, and you recommend to put out the fire first. How do you 
go about putting that fire out as far as--I mean, is this the 
type of thing the FBI is involved in, that it is doing now?
    Mr. McCants. Yes, sir. That is exactly what I mean. I think 
it is their job to identify where this material on-line is 
being most intensively discussed and distributed to figure out 
who is behind those discussions and that distribution and then 
to watch them, watch them carefully to see if they are going to 
connect with people that are engaged in actual criminal 
activity or if they may decide like a Zachary Chesser from this 
area to go off and fight for a terrorist organization. But they 
are the ones, at least domestically, who are best placed to 
keep tabs on what is happening on-line.
    Mr. Long. Following that up, by you are saying that we need 
better research, and you can research anything on the internet, 
you can find out how many 6-foot-2, blond-headed, left-handed 
people, with one blue eye and one green eye go to certain 
websites. So what is the problem with the research?
    Mr. McCants. I think at the moment a lot of the research is 
either focused on the content of the propaganda or it is 
focused on people that are already about to engage in criminal 
activity and the sort of thing I am interested in is finding 
that smoke trail. For example, Ayman Zawahiri comes out with a 
statement, I think he did so recently, just track it on-line, 
figure out which forums has it gone to, who has been sharing it 
with one another----
    Mr. Long. Why is that difficult? Like I say, why is the 
research so difficult?
    Mr. McCants. I don't think the research is difficult. It s 
a matter of having the manpower and the interest in doing it. 
So far, that has been lacking.
    Mr. Long. Okay. Then Mr. Weisburd, Inspire magazine, is it 
deceased along with al-Awlaki, or is it still a publication?
    Mr. Weisburd. The name Inspire magazine can certainly be 
revived. It would probably require somebody in al-Qaeda in 
Arabian Peninsula giving permission at least for that to happen 
since it was their product. But Inspire magazine was really the 
culmination of some years of work both on the part of Mr. Al-
Awlaki and the part of Mr. Khan. As I said, neither of these 
gentlemen is easy to replace. The skills required to produce, 
to gather together the content to turn out a magazine on a 
regular basis are nontrivial. Certainly the hardware, the 
computers that they using to produce it for all I know were in 
the vehicle they were in when it was hit by the missile. So you 
have none of the little bits and pieces that turn out to be a 
magazine at the end of the day.
    It could be revived. I don't believe it would be the same 
because of the quality of the personnel who were involved in 
the original incarnation should there be further incarnations 
of it. But as a thing in itself and as an expression of al-
Awlaki and Khan and what they were doing, as I said, that 
Inspire magazine is deceased.
    Mr. Long. Al-Awlaki will be so difficult to replace, and I 
have heard that before from other people in testimony, but what 
is your assessment? Why will he be as difficult as it seems? He 
is pretty high-profile, and what was unique to him that would 
prevent something like that from happening in the future?
    Mr. Weisburd. He was particularly good at taking the core 
message of what they describe as a global jihad and 
synthesizing it and sort of speaking directly to his followers 
in plain terms and language they could understand. You hear 
that response from the people who followed him, that they 
listened to Anwar al-Awlaki, and he made everything clear. The 
rest of it was maybe a little more complicated, but you could 
follow Anwar al-Awlaki's arguments.
    The other thing to remember about al-Awlaki is that because 
he worked in English first and foremost, his material was 
accessible to everybody who doesn't read and write and speak 
Arabic, which is a much larger potential audience for his 
message because when it comes to people who are say in 
Indonesia or people who are in Turkey or people who are in 
Europe or the United States, English becomes the common 
language, it is the language they use in on-line discourse, it 
is on English language sites that they gather, it is on English 
language sites that they collect. Among English-speaking 
leading jihadists, there really is nobody who comes to mind 
readily who has quite what al-Awlaki had.
    Mr. Long. Thank you and I yield back.
    Mr. Meehan. Thank you, Mr. Long. I now turn to the 
gentleman from New York, Mr. Higgins.
    Mr. Higgins. Thank you, Mr. Chairman. Just a couple of 
things, one of the most influential forces in the entire world, 
the Arab Spring of last year, amazingly was an 83-year-old 
retired professor, former Harvard professor by the name of 
Eugene Sharp. Eugene Sharp wrote a book called From 
Dictatorship to Democracy. Because of social media, Twitter, 
Facebook, YouTube, his ideas that were written and developed 
over a 20-year period were available to young 20-year-olds, 
revolutionaries in the streets of Tahrir Square in Egypt. I 
think the point here is that when you look at social media, 
Twitter, Facebook, YouTube, these are all commodities. These 
are tools of collaboration. The only thing that you can't 
commoditize is the imagination that you bring to these tools of 
collaboration.
    In Tom Friedman's book, The World is Flat, one chapter is 
dedicated to the whole notion, and he says that, the chapter is 
called 11/9 or 9/11, on 11/9/1989 the Berlin Wall fell. We all 
know what happened on 9/11. He says in a chapter of this book 
that in 1999, two airlines were started because of the tools of 
collaboration, social media, the ability to outsource services 
that we never knew existed before. One was started by an 
entrepreneur from Salt Lake City by the name of David Neeleman. 
He started JetBlue airlines. He outsourced the establishment of 
a new fleet of jets to an American company called Boeing. He 
outsourced the financing of his new airline to American 
financiers in the Southwest. He financed the reservation system 
to housewives and retirees sitting in their homes in Salt Lake 
City. You call JetBlue airlines and you are talking to a 
retiree who is in his living room taking your reservation and 
built one of the most successful airlines in the history of the 
world.
    But we also know from the 9/11 report another airline was 
started in Kandahar, Afghanistan by Osama bin Laden. He 
outsourced the planning of his plot to Khalid Sheikh Mohammed. 
He outsourced the pilot training to small flight schools in 
Miami. He outsourced the financing to financiers in United Arab 
Emirates.
    The point is that both airlines were designed to fly into 
New York City, JetBlue to JFK to bring loved ones together, to 
promote commerce, to be a force for good in the world, and al-
Qaeda into Lower Manhattan to exact a death and destruction 
beyond human compensation.
    The point is that these tools of collaboration are 
available to everybody, for organization, for aspirational 
purposes. What matters most and what is most elusive and most 
difficult to deal with is the imagination that you bring to 
these tools of collaboration and how do we as a free society 
best influence whether or not the imagination brought to these 
tools of collaboration that are available to everybody are for 
good or evil?
    I would just ask you to comment on that.
    Mr. Jenkins. It is an interesting comparison although in 
terms of 9/11, they were able to succeed because the al-Qaeda 
of that day was a much more centralized enterprise, despite the 
fact that it outsourced these various components. I mean Khalid 
Sheikh Mohammed was in al-Qaeda's central core. They had 
readily accessible training camps that brought from around the 
world would-be jihadists a continuing talent show from which 
they could select people for missions. The finances came into a 
central point. In other words, there was a lot more centrality 
and coordinating of possibilities in the al-Qaeda of 9/11 than 
the al-Qaeda of today.
    One of the things we have succeeded in doing in 10 years is 
dispersing those training camps and pounding on that al-Qaeda 
central core and dispersing this. So it is a very different 
kind of organization today.
    Can the these tools be used to attract all sorts of varying 
talent? Yes. Samir Khan represents a new generation that came 
along. Anwar al-Awlaki did. If you cast the net broadly, they 
are--and this is one of the dangers that the internet does 
propose--you can cast your net very, very broadly. It may be 
low-yield ore, but you are going to look to bring together some 
talent here and there.
    What they are having difficulty with, however, is still 
creating or recreating that kind of connectivity that enables 
them to carry out a strategic operation on the scale of 9/11. 
So instead we get smaller-scale plots, smaller-scale attacks 
and, as indicated by one of the other witnesses, even the 
recognition that failure is a contribution to the cause. Now 
that is lowering the threshold considerably.
    We are going to be dealing with that for a long time. But I 
think there has been progress in destroying their capacity to 
carry out these kind of centrally directed operations.
    Mr. Meehan. Thank you, Mr. Higgins. I turn to the gentleman 
from Minnesota, Mr. Cravaack.
    Mr. Cravaack. Thank you, Mr. Chairman. Thank you for the 
panel, for being here today. I very much appreciate your 
insight. It seems, and correct me if I am wrong, but it seems 
at least right now that a social media is more an echo chamber 
where people that are, like you said, Mr. Weisburd, is kind of 
just feeding off of each other. Would that be a fair 
assumption?
    Mr. Weisburd. The jihadist forums in particular as opposed 
to the later social media sites, say like Facebook or YouTube, 
the forums are echo chamber, absolutely. Dissenting opinion is 
simply not allowed. I think the reason why for example YouTube 
is perceived as something of a risk is that people who are--it 
is where jihadist content can be put in front of a mainstream 
audience, and so there is always some concern that this content 
is going to be appealing to some people who might otherwise not 
be exposed to it, who have no idea where the jihadist forums 
are, don't know where to go or cannot get into them. How great 
a risk that is I think is easily overstated. As Mr. McCants 
said, people tend to be, as he put it, fireproofed. There are 
all these inhibitions in terms of getting involved in terrorist 
activity. So I am not particularly alarmed about it. But I 
would not think it fair to describe say YouTube as an echo 
chamber. In terms of countermeasures it is useful to note that 
as well because unlike on a jihadist forum where I can't 
confront somebody with their extremism, on YouTube, YouTube is 
not going to remove people on their website, users of their 
website because they are too extreme, okay, YouTube is not 
going to intervene in that. So you have the opportunity to 
interact with people on a site like YouTube that you don't have 
on the jihadist forums precisely because YouTube is not 
controlled by al-Qaeda as opposed to the forums. So there is an 
opportunity there.
    Mr. Cravaack. Would both other panelists agree with that?
    Mr. McCants. Yes, I would agree. It is striking to me that 
after 10 years with two wars in the Middle East and all of the 
turmoil that they have caused such a fertile field for 
grievance to grow, and the growth of all of this social media 
for people with these grievances to connect, and yet you still 
have a very small number of people who are responding 
positively to al-Qaeda's message, and of them an even smaller 
slice that are willing and able to undertake violence. To me 
that is what is striking about al-Qaeda supporters using social 
media, is that, yes, they are connecting with one another, but 
it is such a small number and they are able to undertake such 
few attacks in this country.
    Mr. Cravaack. Thank you. Mr. Jenkins, do you feel the same 
way?
    Mr. Jenkins. I would agree with that. Despite the 
developments we have seen, the dramatic developments in the 
internet in the last 10, 15 years, and despite this intense 
retail campaign by al-Qaeda, and even recruiting of native-born 
communicators who understand an American audience and can 
communicate in an effective way, they are not selling a lot of 
cars. I mean, as a marketing operation this is not really 
working for them, and as I say, it may in fact be a 
distraction.
    Now, that doesn't mean, however, that we ought to be 
sanguine about the future on this. This is something that 
requires continued monitoring. One thing that we probably need 
to be concerned about is that to what extent can they translate 
those who have a desire to connect via the internet and to do 
something but not to take the personal risks of carrying out a 
bombing, what sort of malevolent mischief can they get up to on 
the internet itself? Can they move from denial of service 
attacks to, if they go in that direction, can they move in the 
direction of even sabotage via the internet?
    Right now I think that is a bit of a reach, but this is not 
something that we ignore because we are doing well so far. I 
think this is something that we have to continually watch, see 
what the trends are and maintain our ability to try to 
intercept it going in depending on what direction it goes in.
    That doesn't mean shut down sites. What it means is that 
our intelligence and our ability to operate in this new 
technological environment has to be equal to theirs.
    Mr. Cravaack. Thank you for your comments. Moving forward 
then, what I am hearing from you is that we should monitor the 
situation and use it as an intelligence-gathering operation. 
Thank you, sir, and I am out of time. I yield back.
    Mr. Meehan. Thank you, Mr. Cravaack. I just have one 
follow-up question myself. Mr. Jenkins, you were talking about 
an issue which did strike me as you were describing in your 
earlier testimony the virtual, almost aspirational level in 
which people can check in and check out of the conversation, 
but in that virtual world the one connection that we have there 
is to our infrastructure, to other kinds of things where they 
are connected to the internet. What is the possibility or 
likelihood of somebody continuing down that path and playing 
the game, but for the first time they really are connecting to 
infrastructure that we have here in the United States?
    Mr. Jenkins. I wouldn't be able to comment on the 
probability of that. That is a question that calls for 
prophecy. But certainly we have to accept that as a possibility 
and continue to watch this. If the internet and social media 
are able to attract a large number of individuals, then there 
are going to be among that people of diverse capabilities and 
talents. So there is a possibility in a sense of if you have 
that many coming in of a mutation in some direction that could 
put us off running in a new direction. So we are dealing with 
fast-moving technology and we are dealing with a large 
population of individuals most of whom don't strap on bombs to 
themselves, and that is the positive. But will they find other 
ways of satisfying their desires to contribute beyond simply 
talking about this? That is something we want to watch for. So 
that becomes an intelligence concern as well.
    Ms. Speier. Maybe just one last question, Mr. Chairman. 
Based on what you have testified to, do we look at the five 
guys from Virginia as just being unusual in that it appears 
that they were radicalized on the internet and then went to 
Pakistan to seek training, correct?
    Mr. Weisburd. I think the key point of that is that they 
were five guys who knew each other in the real world and then 
they were also using the internet. But the fact that there was 
a group of them who could come together and collectively get it 
together to go off to Pakistan is the significant part. For one 
individual to go off to Pakistan to try and go to a training 
camp would be scary for that lone individual. It requires a lot 
of courage basically to try and do something that risky. Five 
individuals can collectively sort of get their act together to 
go and try and do that. That is really I think the key. That is 
what you look for in investigations. You are looking for people 
who have some sort of group, you know who are part of a group 
that is moving forward, because for an individual to engage in 
terrorism it is much more difficult than for a group of people. 
Organizations are much more effective than these disparate 
groups.
    Ms. Speier. All right. Thank you.
    Mr. Meehan. I want to thank the witnesses for your valuable 
testimony and the Members for their questions. The Members of 
the committee may have some additional questions for witnesses. 
We will ask if they do submit those to you, you do your best to 
respond if you can. The hearing record will be open and held as 
such for 10 days.
    So without objection, the committee stands adjourned. Thank 
you for your testimony.
    [Whereupon, at 3:10 p.m., the subcommittee was adjourned.]


                            A P P E N D I X

                              ----------                              

  Statement of Evan F. Kohlmann with Josh Lefkowitz and Laith Alkhouri
                            December 6, 2011
the antisocial network: countering the use of on-line social networking 
            technologies by foreign terrorist organizations
    Though the term ``social networking'' tends to conjure up immediate 
visions of Facebook and Twitter, the origins of the term are far less 
humble. In the era before the existence of the internet, social 
networking was the process of conventional human interaction that took 
place in key locations like schools, marketplaces, religious centers, 
and sports events. Consequently, for traditional terrorist 
organizations like al-Qaeda's first generation, the critical social 
networking hubs consisted of secretive guesthouses, a handful of 
notoriously extremist mosques, and fixed training camps scattered 
alongside the Afghan-Pakistani border.
    In the wake of the September 11, 2001 terrorist attacks on the 
United States, these conventional hubs were quickly targeted by the 
United States and its allies. Under overwhelming pressure, training 
camps were shut down, guesthouses raided, and notorious recruiters 
jailed. Al-Qaeda Inc. was seemingly put out of business. Yet, as new 
generations have come of age in the internet era, the al-Qaeda 
organization has spread its on-line presence, establishing a tenacious 
beachhead in cyberspace. In the face of constant pressure from U.S. law 
enforcement and intelligence agencies, al-Qaeda has defiantly organized 
a cabal of critical jihadi-oriented on-line social networking forums. 
Likewise, its members, allies, and supporters heavily populate 
conventional services like YouTube and Facebook. And for those who make 
contact with groups like al-Qaeda and the Pakistani Taliban through 
these services, the reality is no less meaningful than having done so 
in person. This is the primary emerging frontier of al-Qaeda 
recruitment and financing.
    In fact, the word ``emerging'' hardly captures the reality of what 
is actually happening right now on the internet. Each week, new 
internet personalities disappear from the web on a mission to live out 
their outlandish jihadi fantasies. Flashpoint Global Partners has 
identified at least 120 such individuals (including U.S. nationals) who 
have graduated from being mere ``pajama-hideen'' to taking a real role 
in terrorist activity over the past 7 years. Of these 120 hardcore 
extremists, more than half are now dead--killed in a barrage of 
Predator drone strikes, failed bomb-making activities, and in 
gunbattles with the U.S. military and various other ``infidel'' 
adversaries. The numbers increase dramatically each month. On August 
14, 2011, users on the radical ``Ansar al-Mujahideen'' chat forum were 
notified that one of their fellow members, ``Hafid Salahudeen'', had 
been killed in a U.S. drone missile attack in Pakistan's restive 
Waziristan region along the Afghan border.\1\ Only 1 week later, on 
August 23, 2011, another ``Ansar al-Mujahideen'' user ``Khattab 76'' 
was reported dead after clashes with the Egyptian military in the Sinai 
Peninsula, where he had gone to ``fight the Zionists.''\2\ According to 
Ansar forum administrators, inspired by what he saw on the web, 
``Khattab 76'' had made several previous failed efforts to join al-
Qaeda in both Iraq and Afghanistan.\3\ On September 18, 2011, 
moderators on al-Qaeda's premiere ``Shamukh'' web forum advised their 
comrades that user ``Qutaiba'' had departed for Algeria to join al-
Qaeda in the Islamic Maghreb (AQIM). They quoted a final message from 
him sent over the internet: ``I am here amongst the mujahideen in the 
Islamic Maghreb . . . I advise my beloved ones to join the convoy 
before it is too late . . . Your brothers in AQIM are waiting for 
you.''\4\
---------------------------------------------------------------------------
    \1\ http://www.as-ansar.com/vb/showthread.php?t=46237. August 14, 
2011.
    \2\ http://www.as-ansar.com/vb/showthread.php?t=46873. August 23, 
2011.
    \3\ http://www.as-ansar.com/vb/showthread.php?t=46873. August 23, 
2011.
    \4\ http://www.shamikh1.info/vb/showthread.php?t=127866. September 
18, 2011.
---------------------------------------------------------------------------
    Arguably, the most famous individual to self-recruit on the 
internet using al-Qaeda's social networking websites was a young 
Jordanian doctor named Humam al-Balawi (a.k.a. ``Abu Dujanah al-
Khorasani''). On December 30, 2009, al-Balawi--a former administrator 
on top-tier al-Qaeda social networking forums--blew himself up at a 
secret CIA base along the Afghan-Pakistani border.\5\ At the time, CIA 
and Jordanian intelligence agents believed they had successfully 
recruited al-Balawi as a double agent to help hunt down Dr. Ayman al-
Zawahiri and other top al-Qaeda figures. In fact, al-Balawi was 
offering a starkly different perspective to his associates on the 
jihadi web forums. In an interview published on al-Qaeda's ``Al-
Hesbah'' forum in September 2009, only 3 months previous, al-Balawi 
appealed, ``How can I encourage people to join the jihad while I'm 
staying away from it? . . . How do I become a burning wick for others 
follow the light of? Can any sane person accept that? Not me.''\6\ As 
for al-Qaeda's social networks, he crowed, ``I left behind on the 
forums some brothers who are dearer to me than members of my own 
family. When I meet any mujahid here who knows about the forums, I rush 
to ask him who he knows from al-Hesbah--as he might be one of those 
whom we loved in the cause of Allah, from amongst the administrators or 
members, and I would hug him as one brother longing for another.''\7\ 
These now-prophetic warning signs were ignored by many at the time, who 
dismissed al-Balawi's threats as merely inflated internet rhetoric. It 
came at an enormous cost--seven CIA agents killed, including some of 
the agency's top experts on al-Qaeda.
---------------------------------------------------------------------------
    \5\ Oppel, Richard A. Jr., Mark Mazetti, and Souad Mekhennet. 
``Attacker in Afghanistan Was a Double Agent.'' New York Times. January 
4, 2010.
    \6\ ``Vanguards of Khorasan'' Magazine. Vol. 1; Issue 15 (September 
2009).
    \7\ ``Vanguards of Khorasan'' Magazine. Vol. 1; Issue 15 (September 
2009).
---------------------------------------------------------------------------
    Al-Qaeda itself is well aware of the key role that jihadi web 
forums are playing in recruiting a new generation of militants willing 
to sacrifice themselves on its behalf. No longer are internet-based 
social networks the exclusive domain of aspiring, would-be terrorist 
neophytes. Indeed, the veteran Yemeni explosives expert accused by the 
U.S. Government of helping organize al-Balawi's deadly suicide bombing 
attack, Hussain al-Hussami, was likewise an active user on the Al-
Hesbah on-line forum.\8\ On October 1, 2009, he posted a request on the 
forum on behalf of ``the Jalaludeen Haqqani Organization'': ``dear 
brothers, I have some Shariah and military guides printed in the 
Russian language, and I want to translate them into Arabic. If you can 
assist me, whether with software, websites, or translators, may Allah 
reward you generously.''\9\
---------------------------------------------------------------------------
    \8\ Baldor, Lolita and Matt Apuzzo. ``Top Al Qaeda Operative 
Reportedly Killed In U.S. Drone Attack.'' Associated Press. March 17, 
2010.
    \9\ http://www.alfaloja.net/vb/showthread.php?t=86082. October 1, 
2009.
---------------------------------------------------------------------------
    Recognition of the brave new world of terrorist communications and 
recruitment has reached the highest echelons of al-Qaeda. In June 2010, 
the group released an audio message from Shaykh Mustafa Abu al-Yazid--
third-in-command behind Usama Bin Laden and Ayman al-Zawahiri--hailing 
``my brothers--the shadowy knights of the [jihadi] media, a school 
whose alumni includes the hero `Abu Dujanah al-Khorasani' . . . and 
those who remain and continue their efforts and sacrifices'' and 
calling on them ``to stand in the trench that Allah has chosen them for 
their own well-being . . . You are the thundering voice of jihad, its 
mighty arrows, and its roaring weapons that have caused so much concern 
amongst politicians at the White House.''\10\ Yet, perhaps what is most 
startling about this phenomenon is the sharp increase in the use of 
brand-name U.S. commercial social networking services such as YouTube, 
Twitter, and Facebook by terrorist organizations and their supporters. 
On password-protected top-tier al-Qaeda web forums, contributors are 
boasting that ``YouTube is among the most important media platforms in 
supporting the mujahideen, as it is ranked third in the world with more 
than 70 million daily visitors.''\11\ This is reflected in the 
increasing occurrence of hardcore jihadi videos hosted by YouTube as 
evidenced in Federal terrorism cases.
---------------------------------------------------------------------------
    \10\ As-Sahab Media Foundation. ``He Who Equips a Fighter Has Waged 
Battle Himself, by the Mujahid Shaykh Mustafa Abu al-Yazid-May Allah 
Accept Him.'' First released: June 15, 2010.
    \11\ http://www.al-faloja.info/vb/showthread.php?t=62982. May 16, 
2009.
---------------------------------------------------------------------------
   On February 1, 2011, Colleen R. LaRose (aka ``Jihad Jane'') 
        pled guilty to charges in the Eastern District of Pennsylvania, 
        including conspiring to provide material support to 
        terrorists.\12\ LaRose was an unusually prolific presence on 
        YouTube; court documents highlighted a particular posting--
        under the name ``JihadJane''--in which she indicated she was 
        ``desperate to do something somehow to help'' suffering 
        Muslims.\13\
---------------------------------------------------------------------------
    \12\ ``Pennsylvania Woman Pleads Guilty in Plot to Recruit Violent 
Jihadist Fighters and to Commit Murder Overseas''. U.S. Department of 
Justice Press Release. February 1, 2011.
    \13\ U.S. v. LaRose. Eastern District of Pennsylvania. Criminal No. 
10-123. Superseding Indictment. Filed April 1, 2010.
---------------------------------------------------------------------------
   On February 24, 2011, Northern Virginia resident Zachary 
        Chesser was sentenced to 25 years in prison ``for communicating 
        threats against the writers of the South Park television show, 
        soliciting violent jihadists to desensitize law enforcement, 
        and attempting to provide material support to Al-Shabaab, a 
        designated foreign terrorist organization.''\14\ According to 
        court filings, ``Chesser . . . started his own YouTube.com 
        homepage, utilizing userID LearnTeachFightDie, where he posted 
        videos and hosted discussions. Chesser explained that this name 
        perfectly symbolized his philosophy at the time: Learn Islam, 
        teach Islam, fight for Islam, and die in the name of Islam . . 
        . ''. After closing that account, ``he then opened a YouTube 
        site utilizing user name AIQuranWaAlaHadeeth.''\15\
---------------------------------------------------------------------------
    \14\ ``Virginia Man Sentenced to 25 Years in Prison for Providing 
Material Support and Encouraging Violent Jihadists to Kill U.S. 
Citizens.'' U.S. Department of Justice Press Release. February 24, 
2011.
    \15\ U.S. v. Chesser. Eastern District of Virginia. Criminal No. 
1:10mj504. Affidavit of FBI Special Agent Mary Brandt Kinder. Filed 
July 21, 2010.
---------------------------------------------------------------------------
   Joseph Jeffrey Brice was charged in May 2011 for making and 
        detonating an Improvised Explosive Device--consisting of TATP, 
        APAN, and ANFO--along a highway in Washington State. According 
        to court filings, Brice--who was seriously injured in the 
        blast--set up a YouTube channel that ``was used to post videos 
        that depicted the use of explosives. Some of these videos 
        contained the embedded logo of the Al-TawhidWal Jihad (al-Qaeda 
        in Iraq) and a jihad chant soundtrack, known as Nashid . . . 
        two of them depicted the use of explosives in the Clarkston, 
        Washington vicinity.'' He also posted numerous comments on 
        YouTube. For example, on January 8, 2011, in response to the 
        shooting of Congresswoman Gifford, he wrote, `` . . . as long 
        as it's one more dead American kuffar, what difference does it 
        make to me if she is a democrat or a gop?'' On December 27, 
        2010, he wrote, ``NPED [non-primary explosives detonator] can 
        now be purchased in most states legally through pyrotechnic 
        dealers.''\16\
---------------------------------------------------------------------------
    \16\ Re: 538 Riverview Boulevard No. 3. Clarkston, WA. 99403. 
Affidavit of FBI Special Agent Leland C. MeEuen. May 6, 2011.
---------------------------------------------------------------------------
   On December 2, 2011, Virginia resident Jubair Ahmad pled 
        guilty to providing material support to Lashkar-e-Taiba 
        (LeT).\17\ According to DOJ, ``in September 2010, Jubair 
        produced and uploaded a propaganda video to YouTube on behalf 
        of LeT, after communications with a person named `Talha.' In a 
        subsequent conversation with another person, Jubair identified 
        Talha as Talha Saeed, the son of LeT leader Hafiz Mohammed 
        Saeed. Talha and Jubair allegedly communicated about the 
        images, music, and audio that Jubair was to use to make the 
        video. The final video contained images of LeT leader Hafiz 
        Saeed, so-called jihadi martyrs, and armored trucks exploding 
        after having been hit by improvised explosive devices.''\18\
---------------------------------------------------------------------------
    \17\ ``Pakistani National Living in Woodbridge Pleads Guilty to 
Providing Material Support to Terrorist Organization.'' U.S. Department 
of Justice Press Release. December 2, 2011.
    \18\ ``Woodbridge Man Charged with Providing Material Support to 
Terrorist Organization''. U.S. Department of Justice Press Release. 
September 2, 2011.
---------------------------------------------------------------------------
    Nor has this phenomenon been limited to the United States. In the 
United Kingdom, a 21-year-old woman, Roshanara Choudhry, made headlines 
in May 2010 when she stabbed and attempted to assassinate British MP 
Stephen Timms at a community center in East London. According to 
British authorities, ``When interviewed by police, Choudhry said she 
stabbed Mr Timms because he voted for the Iraq war and she wanted to 
achieve `punishment' and `to get revenge for the people of Iraq'.''\19\ 
In her police interview, she explained that she ``wanted to be a 
martyr'' because ``that's the best way to die.'' She further told the 
interviewer that she had adopted that perspective after listening to 
lectures by Yemeni-American cleric Anwar al-Awlaki, killed in a U.S. 
drone strike in Yemen in September 2011. Asked how she found out about 
al-Awlaki, she explained, ``On the internet . . . if you go on YouTube, 
there's a lot of his videos there and if you do a search they just come 
up. I wasn't searching for him, I just came across him. I used to watch 
videos that people used to put up about like how they became 
Muslim.''\20\
---------------------------------------------------------------------------
    \19\ ``Woman sentenced to life imprisonment for attempted murder of 
MP''. Metropolitan Police Service Press Release. November 3, 2010.
    \20\ Roshonara Choudhry police interview. Interview conducted on 
May 14, 2010, in Forest Gate police station.
---------------------------------------------------------------------------
    It is often forgotten that YouTube is not merely a video hosting 
site, but also a formidable social networking forum. Contributors can 
draw the attention of registered subscribers who then are able to 
comment on video uploads and communicate back and forth with the 
original source. Users subscribe to each other's feeds based on mutual 
interests--in this case, various aspects of al-Qaeda and violent 
extremism. The process is so efficient and precise that it has 
repeatedly attracted the interest of the Pakistani Taliban, not merely 
to spread propaganda, but also to engage in a dialogue with viewers and 
even recruit those interested in joining a foreign terrorist 
organization. On December 9, 2009, five young Muslim-American men from 
the Washington, DC area were arrested by authorities in the Pakistani 
town of Sargodha. The men were accused of attempting to join al-Qaeda 
forces on the Afghan-Pakistani border. According to a Pakistani police 
report quoted by ABC News and the New York Times, a Taliban recruiter 
first made contact with the group via Ahmed Abdullah Minni, who had 
``repeatedly posted comments on YouTube praising videos showing attacks 
on American troops.''\21\ The 20-year-old Minni had allegedly ``become 
a regular feature'' on YouTube with his campaign of on-line vitriol--so 
much so that a Pakistani Taliban recruiter known as ``Saifullah'' took 
an interest and began writing back to him.\22\
---------------------------------------------------------------------------
    \21\ Shane, Scott. ``Web Posts Began Tale of Detained Americans.'' 
New York Times. December 14, 2009.
    \22\ See: ``Interrogation Report: Profiles of the Foreigners 
held''. Abbas Majeed Khan Marwat PSP, ASP/UT SARGODHA. Available at: 
http://a.abcnews.com/images/Blotter/ht_interrogation_report_091211.pdf.
---------------------------------------------------------------------------
    The Pakistani Taliban carried on their brazen recruitment campaign 
using YouTube in May 2010. Within days of a failed car bombing in Times 
Square, New York by Faisal Shahzad, a naturalized American recruited by 
the Pakistani Taliban, the group published a video recording featuring 
its leader Hakimullah Mehsud boasting of its role in the would-be 
attack.\23\ The video was posted by an official Taliban on-line courier 
``TehreekeTaliban'' registered as a contributor on YouTube, who engaged 
in a back-and-forth discussion with critics and supporters in the 
comment section on the video. One respondent asked, ``what is he 
saying? Can someone translate?'' The courier replied, ``subtitles are 
in English, you can easily understand inshaALLAH.'' When another viewer 
condemned the Taliban for their role in the Times Square incident, 
``TehreekeTaliban'' insisted, ``I would recommend you to read Quran 
again with good translation and . . . to do learn . . . from a good 
shaykh like Imam Anwar Al-Awlaki. You can download his lectures from 
net, just search google.''\24\
---------------------------------------------------------------------------
    \23\ http://www.youtube.com/user/TehreekeTaliban. May 2, 2010.
    \24\ http://www.youtube.com/user/TehreekeTaliban. May 2, 2010.
---------------------------------------------------------------------------
    As the social networking website Facebook has quickly become a 
ubiquitous part of many Americans' on-line activity, it too has enjoyed 
increased significance as an amplifier for violent extremist viewpoints 
and a way for al-Qaeda supporters to identify each other and build 
budding relationships. In March 2010, one user on al-Qaeda's then-
preeminent ``Fallujah Islamic Network'' appealed, ``the least we can do 
to support the Mujahideen is to distribute their statements and 
releases.'' He added, ``we wish from the brothers to also distribute 
the statement via Youtube and widely . . . and on Facebook.''\25\ The 
user offered a cautionary note about using Facebook: ``the suggested 
method is to always access it via proxy, otherwise you're in danger. 
Make one e-mail on Yahoo that's dedicated for the [on-line] battle 
only. After creating the email, register on Facebook under an pseudonym 
with the email you created, and via which the account will be 
activated. Search for all the profiles and groups.''\26\
---------------------------------------------------------------------------
    \25\ http://www.al-faloja.info/vb/showthread.php?t=105942. March 6, 
2010.
    \26\ http://www.al-faloja.info/vb/showthread.php?t=105942. March 6, 
2010.
---------------------------------------------------------------------------
    Like YouTube, the role of Facebook in terrorism investigations can 
be charted as it increasingly surfaces as evidence in Federal criminal 
indictments. In December 2010, Baltimore resident Antonio Martinez was 
charged with plotting to attack an Armed Forces recruiting station in 
Catonsville, Maryland. As recounted in a press release from the U.S. 
Department of Justice, ``Martinez was arrested . . . after he attempted 
to remotely detonate what he believed to be explosives in a vehicle 
parked in the Armed Forces recruiting station parking lot.''\27\ 
According to the USDOJ:
---------------------------------------------------------------------------
    \27\ ``Maryland Man Charged in Plot to Attack Armed Forces 
Recruiting Center''. U.S. Department of Justice Press Release. December 
8, 2010.

``On September 29, 2010, Martinez publicly posted on his Facebook 
account a statement calling for violence to stop the oppression of 
Muslims, and that on October 1, 2010, he publicly posted a message 
stating that he hates any person who opposes Allah and his prophet . . 
. On October 8, 2010, an FBI confidential source (CS) brought these 
public postings to the attention of the FBI. On October 10, 2010, in 
response to these postings, the CS began communicating with Martinez 
through Facebook . . . During Martinez' discussions with the CS over 
Martinez' Facebook page, Martinez wrote that he wanted to go to 
Pakistan or Afghanistan, that it was his dream to be among the ranks of 
the mujahideen, and that he hoped Allah would open a door for him 
---------------------------------------------------------------------------
because all he thinks about is jihad.''

    Additionally, on October 17, 2011, Martinez allegedly posted the 
following on his Facebook page: ``I love Sheikh Anwar al Awalki for the 
sake of ALLAH. A real inspiration[sic] for the Ummah, I dont care if he 
is on the terrorist list! May ALLAH give him Kireameen.'' Court filings 
further note that his Facebook ``Friends'' included ``two radical 
Islamist websites affiliated with a radical group called Revolution 
Muslim: Call to Islam--a United Kingdom-based on-line movement 
dedicated to the implementation of Sharia law world-wide (as stated on 
its website); and Authentic Tawheed--a pro-jihad group providing links 
on its website to materials put out by known terrorists such as Anwar 
al-Aulaqi.''\28\
---------------------------------------------------------------------------
    \28\ U.S. v. Antonio Martinez. District of Maryland. Case No. 10-
4761 JKB. Complaint. Filed December 8, 2010 and U.S. v. Antonio 
Martinez. District of Maryland. Case No. 10-4761 JKB. Government 
Response to Defendant's Motions to Dismiss Indictment and Suppress 
Statements and Seized Evidence. Filed September 27, 2011.
---------------------------------------------------------------------------
    There is no doubt that YouTube and Facebook have been making 
genuine efforts in an attempt to thwart the on-line activities of al-
Qaeda supporters and violent extremists. However, a quick search for 
jihadi videos on YouTube is a fairly compelling demonstration that 
these efforts have thus far been insufficient in addressing the 
problem. On-line jihadists have reacted with mirth at YouTube's overly-
optimistic strategy of relying on its own users to self-police and help 
to flag individual illicit contributions. The service has, in fact, 
added a category to its content feedback flags labeled ``Promotes 
terrorism''--that which is ``intended to incite violence . . . This 
means . . . videos on things like instructional bomb making . . . [or] 
sniper attacks. Any depictions of such content . . . shouldn't be 
designed to help or encourage others to imitate them.''\29\ Repeated 
violations can lead to a user being kicked off YouTube, whose stated 
policy is that ``if your account is terminated you are prohibited from 
creating any new accounts.''\30\ Nonetheless, there is minimal 
enforcement of this policy and users with terminated accounts often 
simply create new accounts under different user names, many of which 
are only minor variations of their blocked accounts. A user on al-
Qaeda's top-tier ``Fallujah Islamic Network'' instructed his associates 
in May 2009 that if on-line adversaries start to ``search for jihad 
clips . . . so that users can vote to delete them . . . then we must 
make them pull out their hair by re-uploading deleted scenes, 
commenting on them, and supporting them. Remember that YouTube is the 
biggest media podium, so the jihad videos should appear right in the 
face of those who enter it.''\31\
---------------------------------------------------------------------------
    \29\ http://www.google.com/support/youtube/bin/
answer.py?hl=en&answer=139838. Last accessed December 2, 2011.
    \30\ http://www.youtube.com/t/community_guidelines. Last accessed 
December 2, 2011.
    \31\ http://www.al-faloja.info/vb/showthread.php?t=62982. May 16, 
2009.
---------------------------------------------------------------------------
    YouTube and its parent company Google have defended their seeming 
inability to prevent their video sharing service from being manipulated 
by al-Qaeda supporters and other violent extremists. According to 
YouTube, ``More than 24 hours of video are uploaded every minute.''\32\ 
Due to the sheer volume of new videos being posted each day, YouTube 
asserts it is ``simply not possible'' to prescreen content \33\ and 
thus relies on its user community to flag inappropriate material. Yet, 
with this amount of incoming new material, it is equally fanciful to 
assume that YouTube's user community possesses the subject matter 
expertise or contextual background to effectively block the spread of 
violent extremist content. Without some sort of automated filtering 
process, it does not seem realistic to believe that the use of YouTube 
by terrorists and jihadi extremists will begin to decrease.
---------------------------------------------------------------------------
    \32\ http://www.youtube.com/t/faq. Last accessed December 2, 2011.
    \33\ Benett, Brian. ``YouTube is Letting Users Decide on Terrorism-
Related Videos.'' Los Angeles Times. December 12, 2010.
---------------------------------------------------------------------------
    If Google is indeed serious about addressing this problem, the 
company should start by leveraging its own existing technological 
solutions to ensure known violent extremist content is not distributed 
via YouTube. A quick comparison with how YouTube manages copyright 
violations is instructive. YouTube utilizes a system called ``Content 
ID'' whereby ``Rights holders deliver YouTube reference files (audio-
only or video) of content they own, metadata describing that content, 
and policies on what they want YouTube to do when we find a match. We 
compare videos uploaded to YouTube against those reference files. Our 
technology automatically identifies your content and applies your 
preferred policy: Monetize, track, or block.''\34\ Users deemed to be 
acting in violation of copyright law are ``required to attend `YouTube 
Copyright School,' which involves watching a copyright tutorial and 
passing a quiz to show that you've paid attention and understood the 
content before uploading more content to YouTube.''\35\ It is hardly a 
great jump in logic to apply this same strategy to the large, but 
hardly unmanageable subset of notorious open-source terrorist 
propaganda videos--archives of which are maintained by private 
organizations like Flashpoint Global Partners. YouTube has been able to 
effectively block the majority of pornographic video contributions, 
reportedly through the use of specific algorithms; similar algorithms 
should be developed to stem the flow of violent extremist content.
---------------------------------------------------------------------------
    \34\ http://www.youtube.com/t/contentid. Last accessed December 2, 
2011.
    \35\ http://youtube-global.blogspot.com/2011/04/youtube-copyright-
education-remixed.html. Last accessed December 2, 2011.
---------------------------------------------------------------------------
    In a further development, YouTube's parent Google has recently 
acquired Pitt-Patt, a Carnegie-Mellon spin-off that is considered to 
have market-leading facial recognition software.\36\ This technology 
can theoretically be leveraged to identify offending video content and 
user profile photos that match those of known terrorists, leading to at 
least an automatic flagging--if not full deregistration--of the 
account. Avatar images featuring depictions of high-profile terrorists, 
such as Usama bin Laden and Anwar al-Awlaki, or the watermarked logos 
of groups such as Shabaab al-Mujahideen and al-Qaeda in Iraq, are 
unfortunately nowadays common on YouTube. However, when paired with the 
right image recognition filter, these watermarks and avatars can 
provide a powerful, effective roadmap to identify suspect contributors 
engaged in illicit activity. Similar technology could potentially also 
be deployed with similar effect by Facebook, Twitter, and other 
commercial social networking services beset with infiltration by 
supporters of violent extremism.
---------------------------------------------------------------------------
    \36\ http://www.pittpatt.com. Last accessed December 2, 2011.
---------------------------------------------------------------------------
    If real progress is to be made towards cleansing on-line social 
networks of terrorists and their supporters, the U.S. Congress must 
bring pressure to bear on commercial providers who are themselves being 
victimized in the process to start acting more like aggrieved victims 
instead of nonchalant bystanders. While any proposed curbs on the 
freedom of speech should always naturally give one cause for a moment's 
hesitation, in this case, it is unclear why official terrorist 
recruitment material is any less of an odious concern for YouTube or 
Facebook than pornography. Unfortunately, current U.S. law gives few 
incentives for companies like YouTube for volunteering information on 
illicit activity, or even cooperating when requested by U.S. law 
enforcement. If such companies are to be trusted to self-police their 
own professed commitments to fighting hate speech, then they must be 
held to a public standard which reflects the importance of that not 
unsubstantial responsibility.