[Senate Report 114-295] [From the U.S. Government Publishing Office] 114th Congress } { Report 2d Session } SENATE { 114-295 _______________________________________________________________________ COMBAT TERRORIST USE OF SOCIAL MEDIA ACT OF 2016 __________ R E P O R T OF THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE TO ACCOMPANY S. 2517 TO REQUIRE A REPORT ON UNITED STATES STRATEGY TO COMBAT TERRORIST USE OF SOCIAL MEDIA, AND FOR OTHER PURPOSES [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] July 11, 2016.--Ordered to be printed ____________ U.S. GOVERNMENT PUBLISHING OFFICE WASHINGTON : 2016 COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS RON JOHNSON, Wisconsin Chairman JOHN McCAIN, Arizona THOMAS R. CARPER, Delaware ROB PORTMAN, Ohio CLAIRE McCASKILL, Missouri RAND PAUL, Kentucky JON TESTER, Montana JAMES LANKFORD, Oklahoma TAMMY BALDWIN, Wisconsin MICHAEL B. ENZI, Wyoming HEIDI HEITKAMP, North Dakota KELLY AYOTTE, New Hampshire CORY A. BOOKER, New Jersey JONI ERNST, Iowa GARY C. PETERS, Michigan BEN SASSE, Nebraska Christopher R. Hixon, Staff Director Gabrielle D'Adamo Singer, Chief Counsel Elizabeth McWhorter, Senior Professional Staff Member Gabrielle A. Batkin, Minority Staff Director John P. Kilvington, Minority Deputy Staff Director Mary Beth Schultz, Minority Chief Counsel Harlan C. Geer, Minority Senior Professional Staff Member Laura W. Kilbride, Chief Clerk Calendar No. 551 114th Congress} { Report SENATE 2nd Session } { 114-295 ====================================================================== COMBAT TERRORIST USE OF SOCIAL MEDIA ACT OF 2016 _______ July 11, 2016.--Ordered to be printed _______ Mr. Johnson, from the Committee on Homeland Security and Governmental Affairs, submitted the following R E P O R T [To accompany S. 2517] The Committee on Homeland Security and Governmental Affairs, to which was referred the bill (S. 2517) to require a report on United States strategy to combat terrorist use of social media, and for other purposes, having considered the same, reports favorably thereon with amendments and recommends that the bill, as amended, do pass. CONTENTS Page I. Purpose and Summary..............................................1 II. Background and Need for the Legislation..........................2 III. Legislative History..............................................5 IV. Section-by-Section Analysis......................................6 V. Evaluation of Regulatory Impact..................................6 VI. Congressional Budget Office Cost Estimate........................7 VII. Changes in Existing Law Made by the Bill, as Reported............7 I. PURPOSE AND SUMMARY The purpose of S. 2517, the Combat Terrorist Use of Social Media Act of 2016, is to require the President to provide Congress with the strategy of the United States to combat terrorists' and terrorist organizations' use of social media. The bill also requires the President to provide Congress with a report and evaluation of the United States' efforts, to date, to combat terrorists' and terrorist organizations' use of social media. II. BACKGROUND AND THE NEED FOR LEGISLATION In 2015, President Barack Obama identified the following groups as the preeminent security threat to our country: Al Qaeda, the Islamic State in Iraq and Syria (ISIS), and their affiliates.\1\ --------------------------------------------------------------------------- \1\See generally, National Security Strategy, The White House 20 (2015), available at https://www.whitehouse.gov/sites/default/files/ docs/2015_national_securitystrategy.pdf. --------------------------------------------------------------------------- According to the Federal Bureau of Investigation (FBI), approximately 250 Americans have either traveled, or attempted to travel, to Syria and Iraq.\2\ --------------------------------------------------------------------------- \2\E-mail correspondence between HSGAC Comm. staff and FBI Congressional Affairs Liaison, May 23, 2016 (on file with Comm. staff). --------------------------------------------------------------------------- Homegrown violent extremists are also increasingly conducting simple, opportunistic attacks at home.\3\ In the wake of international efforts to deter foreign fighters from joining ISIS in Iraq and Syria, the terrorist group's message is ``if you cannot travel, kill where you are.''\4\ This makes the approximately 900 ISIS-inspired individuals the FBI was investigating throughout the country in late 2015 especially alarming.\5\ From two or three homegrown violent extremist attacks a year in 2009, the number of these incidents jumped to a dozen just five years later in 2014, and more than doubled in 2015.\6\ --------------------------------------------------------------------------- \3\See generally, Threats to the Homeland: Hearing Before S. Comm. on Homeland Sec. & Governmental Affairs, 114th Cong. (2015) (statement of Nicholas Rasmussen, Director, National Counterterrorism Center), available at http://www.hsgac.senate.gov/download/?id=83C519E9-9310- 4587-B00F-07179D39C0AD [hereinafter Threats to the Homeland]. \4\Threats to the Homeland (statement of James Comey, Director, The Federal Bureau of Investigation at 1). \5\Lorenzo Vidino & Seamus Hughes, ISIS in America: From Retweets to Raqqa, The George Washington University Program on Extremism (Dec. 2015), https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/ ISIS%20in%20America%20-%20Full%20Report_0.pdf. [hereinafter ISIS in America: From Retweets to Raqqa]. \6\Threats to the Homeland (statement of Nicholas Rasmussen, Director, National Counterterrorism Center at 2). --------------------------------------------------------------------------- Examples of recent incidents include attacks in 2009 in Little Rock, Arkansas and Ft. Hood, Texas; bombings at the Boston Marathon in Boston, Massachusetts and shootings in Chattanooga, Tennessee in 2013; shootings in Garland, Texas and San Bernardino, California in 2015; and the attack in Orlando, Florida in 2016.\7\ --------------------------------------------------------------------------- \7\See generally, The Ideology of ISIS: Hearing Before the S. Comm. on Homeland Sec. & Governmental Affairs, 114th Cong. (2016); Terrorism Gone Viral: Attack in Garland, Texas and Beyond: Hearing Before H. Homeland Sec. Comm., 114th Cong. (2015) (statement of Michael B. Steinbach, Assistant Director, the Federal Bureau of Investigation), available at http://docs.house.gov/meetings/HM/HM00/20150603/103513/ HHRG-114-HM00-Wstate-SteinbachM-20150603.pdf; see also ISIS in America: From Retweets to Raqqa at 3-4, 31. --------------------------------------------------------------------------- Spreading a poisonous ideology via the Internet In May 2008, Committee staff published a report titled Violent Islamist Extremism, the Internet, and the Homegrown Terrorist Threat warning about the increased frequency with which United States-based militants are active online.\8\ The internet allows groups like ISIS to distribute their poisonous ideology unbound by national borders, requiring homeland security efforts to consider countering this ideology online.\9\ The 9/11 Review Commission described the online radicalization efforts of these groups as ``an unprecedented challenge'' that ``transcends geographic boundaries and demographics.''\10\ --------------------------------------------------------------------------- \8\Staff of S. Comm. on Homeland Security and Governmental Affairs, 110th Cong., Violent Islamist Extremism, the Internet, and the Homegrown Terrorist Threat (Comm. Print, May 8, 2008), available at http://www.hsgac.senate.gov//imo/media/doc/IslamistReport.pdf. \9\S. Comm. on Homeland Sec. & Governmental Affairs, 112th Cong., Special Report, Ticking Time Bomb: Counterterrorism Lessons from the U.S. Government's Failure to Prevent the Fort Hood Attack, 7, 18-9 (Feb. 2011); see also J.M. Berger & Jonathan Morgan, The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter, The Brookings Project on U.S. Relations with the Islamic World No. 20 (2015), available at http://www.brookings.edu//media/research/ files/papers/2015/03/isis-twitter-census-berger-morgan/ isis_twitter_census_berger_morgan.pdf; National Consortium for the Study of Terrorism and Responses to Terrorism (START), Transcending Organization: Individuals and the `Islamic State' (2014). \10\9/11 Review Commission, The FBI: Protecting the Homeland in the 21st Century (Mar. 2015), available at https://www.fbi.gov/stats- services/publications/protecting-the-homeland-in-the-21st-century. --------------------------------------------------------------------------- Department of Homeland Security Secretary Jeh Johnson has testified before this Committee that terrorist groups use the internet to ``inspire individuals to conduct attacks within their own homelands.''\11\ Between 2014 and June 2016, homegrown violent jihadists plotted 76 total plots in the United States.\12\ --------------------------------------------------------------------------- \11\Threats to the Homeland (statement of Jeh Johnson, Secretary, Dep't of Homeland Security). \12\Jerome P. Bjelopera, Cong. Research Serv., R44110, The Islamic State's Acolytes and the Challenges They Pose to U.S. Law Enforcement (2016). --------------------------------------------------------------------------- Groups like ISIS and Al Qaeda value strategic communication as integral to the advancement of their political agendas.\13\ It allows them to establish legitimacy through historical or religious narratives that resonate with target audiences and potential supporters.\14\ Al Qaeda's current leader once stated, ``We are in a battle, and more than half of this battle is taking place in the battlefield of the media.''\15\ An American citizen who once served as a terrorist group commander, propagandist, and recruiter further elaborated on this stance that ``[t]he war of narratives has become even more important than the war of navies, napalm, and knives.''\16\ --------------------------------------------------------------------------- \13\Naureen Chowdhury Fink & Jack Barclay, Mastering the Narrative: Counterterrorism Strategic Communication and the United Nations, Center on Global Counterterrorism Cooperation, 20-21 (Feb. 2013), available at http://globalcenter.org/wp-content/uploads/2013/03/ Feb2013_CT_StratComm.pdf; Carsten Bockstette, Jihadist Terrorist Use of Strategic Communication Management Techniques, European Center for Security Studies at 5 (Dec. 2008), available at http:// www.marshallcenter.org/mcpublicweb/MCDocs/files/College/F_Publications/ occPapers/occ-paper_20-en.pdf; Gregory L. Keeney & Detlof von Winterfeldt, Identifying and Structuring the Objectives of Terrorists, CREATE Homeland Security Center (Aug. 2009), available at http:// research.create.usc.edu/cgi/ viewcontent.cgi?article=1142&context=nonpublished_reports. \14\Joanna Nathan & Antonio Giustozzi, Decoding the New Taliban: Insights from the Afghan Field 23-42 (2012) (explaining that the extensive efforts undertaken by the Taliban to frame the fight as jihad imply that they view the legitimacy conveyed by these words as a critical source of strength in their fight); Will McCants, The ISIS Apocalypse: The History, Strategy, and Doomsday Vision of the Islamic State 56 (1st ed. 2015) (explaining that Osama bin Laden was so frustrated with Western media's shortening of Al Qaeda's full name, Qa'idat al-Jihad, to a word that had nothing to do with Islam that he considered changing the group's name to one that would force the media and United States government to acknowledge the Islamic nature of the group and reinforce his narrative that the West was at war with Islam.). \15\Office of the Director of Nat'l Intelligence, Letter from al- Zawahiri to al-Zarqawi (Oct. 2005), available at http://fas.org/irp/ news/2005/10/dni101105.html. \16\U.S. Dep't of State, Remarks of Alberto Fernandez, Coordinator for the Center for Strategic Counterterrorism Communications, Conference at the Newseum (Dec. 2013), available at http:// www.state.gov/r/cscc/releases/218606.htm. --------------------------------------------------------------------------- The National Consortium for the Study of Terrorism and Responses to Terrorism (START) notes that ``the internet played an increasingly pivotal role'' in the radicalization of foreign fighters.''\17\ In 2002, just 37 percent of Americans attempting to travel to join terrorist groups were influenced by the internet in some way,\18\ compared to 83 percent in 2015.\19\ Furthermore, as the internet's influence has increased, the average time from initial radicalization to the decision to travel has decreased from approximately 16 months in 2002 to less than 10 months in 2015.\20\ The window of opportunity for intervention before criminal action is diminishing. --------------------------------------------------------------------------- \17\Overview: Profiles of Individual Radicalization in United States-Foreign Fighters (PIRUS-FF), START Consortium (Apr. 2016), available at https://www.start.umd.edu/pubs/START_PIRUS- FF_InfographicSeries_April2016.pdf. \18\Id. \19\Id. \20\Id. --------------------------------------------------------------------------- Inadequate Federal response Despite this accelerating and increasing threat to the homeland, numerous experts have testified before this Committee that the United States currently lacks a comprehensive strategy to combat and counter terrorist narratives online.\21\ It may be the case that no message is powerful enough to neutralize this threat. However, identifying narrative themes that influence homegrown violent extremists can inform an alignment of words and deeds that undercut perceived inconsistencies often exploited by terrorist propaganda.\22\ A Federal review of terrorist narratives for these themes and a subsequent national strategy to combat and counter those narratives will ensure consistency among United States policies, actions, and words. --------------------------------------------------------------------------- \21\Inside the Mind of ISIS: Understanding Its Goals and Ideology to Better Protect the Homeland: Hearing Before the S. Comm. on Homeland Sec. & Governmental Affairs, 114th Cong. (2016) (statement of Jessica Stern, Boston University); see also Jihad 2.0: Social Media in the Next Evolution of Terrorist Recruitment: Hearing Before the S. Comm. on Homeland Sec. & Governmental Affairs, 114th Cong. (2015) (statement of Daveed Gartenstein-Ross, Foundation for Defense of Democracies). \22\Cristina Archetti, Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age, Terrorism Research Institute (2015), http://www.terrorismanalysts.com/pt/index.php/pot/ article/view/401/html. --------------------------------------------------------------------------- Whereas the Center for Global Engagement's Twitter account has only garnered approximately 26,600 followers and sent approximately 12,000 tweets, pro-ISIS accounts (numbering anywhere between 46,000 and 90,000 in over 100 countries) collectively share an average of 133,422 tweets per day to a much larger audience of followers.\23\ Despite its rebranding and efforts to identify a successful counter-narrative, the Center for Global Engagement is still trying to develop a narrative as viral as those spread by extremist organizations such as ISIS.\24\ --------------------------------------------------------------------------- \23\J.M. Berger & Jonathon Morgan, The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter, The Brookings Institute (Mar. 2015), http://www.brookings.edu//media/ research/files/papers/2015/03/isis-twitter-census-berger-morgan/ isis_twitter_census_berger_morgan.pdf; see also Global Engagement, Twitter, https://twitter.com/TheGEC (approximations as of June 8, 2016). \24\William D. Casebeer & James A. Russell, Storytelling and Terrorism: Towards a Comprehensive `Counter-Narrative Strategy,' IV, Strategic Insights, Center for Contemporary Conflict at the Naval Postgraduate School (Mar. 2005), http://www.au.af.mil/au/awc/awcgate/ nps/casebeer_mar05.pdf; see also Michael Jacobson, Learning Counter- Narrative Lessons from Cases of Terrorist Dropouts, The Washington Institute for Near East Policy (Jan. 2010), http:// www.washingtoninstitute.org/policy-analysis/view/learning-counter- narrative-lessons-from-cases-of-terrorist-dropouts; Naureen Chowdhury Fink & Jack Barclay, Mastering the Narrative: Counterterrorism Strategic Communication and the United Nations, Center on Global Counterterrorism (Feb. 2013), http://globalcenter.org/wp-content/ uploads/2013/03/Feb2013_CT_ StratComm.pdf; Alberto M. Fernandez, Here to Stay and Growing: Combating ISIS Propaganda Networks, The Brookings Institute (Oct. 2015), http://www.brookings.edu//media/research/files/ papers/2015/10/combating-isis-propaganda-fernandez/is- propaganda_web_english.pdf. --------------------------------------------------------------------------- Requiring a national strategy to counter online radicalization In the 2011 ``Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in the United States,'' this Administration committed to creating a strategy to counter online radicalization.\25\ The Administration has not yet provided such a strategy.\26\ --------------------------------------------------------------------------- \25\The Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in the United States, The White House 20 (2011), https://www.whitehouse.gov/sites/default/files/sip-final.pdf. \26\See generally Countering Online Radicalization in America, Bipartisan Policy Center 7 (Dec 2012), available at http:// cdn.bipartisanpolicy.org /wp-content/uploads/sites/default /files/ BPC%20 _Online%20Radicalization %20Report.pdf. --------------------------------------------------------------------------- Accordingly, S. 2517, the Combat Terrorist Use of Social Media Act of 2016, requires the Administration to provide Congress with a comprehensive strategy aimed at aligning Federal efforts to disrupt and counter violent extremist messaging online. The bill also requires the Administration to provide a report to Congress that not only details the role social media plays in domestic and foreign radicalization, but also evaluates current government efforts to combat and counter terrorists' use of social media. The required national strategy to counter online radicalization should be informed by a study of a wide range of terrorists' and terrorist organizations' online recruitment efforts and, if possible, include organizations and individuals that adhere to a range of ideologies. While a national strategy will aim to counter all terrorist online radicalization, it should prioritize preventing violent extremism and terrorism that is inspired by Al Qaeda, ISIS, and their affiliates.\27\ In addition, in an effort to clarify ambiguous national security related terms of art, S. 2517 notably defines the term ``radicalization'' for the first time in Federal statute. --------------------------------------------------------------------------- \27\See generally National Security Strategy, The White House 20 (2015), https://www.whitehouse.gov/sites/default/files/docs/ 2015_national_security_strategy.pdf. --------------------------------------------------------------------------- Finally, S. 2517 protects the First Amendment rights of Americans engaged in constitutionally-protected behavior while demanding the guidance necessary to build an effective, whole- of-government approach to counter online radicalization. Included in both the report and evaluation is a requirement that the Administration assess the impact that efforts to combat terrorists' use of social media may have on the civil rights and civil liberties of United States persons not engaged in terrorist activities. The national strategy to counter online radicalization should be crafted to ensure the civil rights and civil liberties of United States persons are protected as required by current law. III. LEGISLATIVE HISTORY Chairman Ron Johnson and Senator Joni Ernst introduced S. 2517 on February 9, 2016, which was referred to the Committee on Homeland Security and Governmental Affairs. Senator Cory Booker joined as a cosponsor on February 11, 2016. The Committee considered S. 2517 at a business meeting on February 10, 2016. Chairman Johnson offered one amendment to define ambiguous terms of art and strengthen civil rights and civil liberty protections for United States persons. The Committee adopted the amendment and ordered the bill, as amended, reported favorably, both by voice vote. Senators present for both the vote on the amendment and the vote on the bill were: Johnson, McCain, Portman, Paul, Lankford, Ayotte, Ernst, Sasse, Carper, McCaskill, Tester, Baldwin, Heitkamp, Booker, and Peters. Similar legislation, H.R. 3654, the Combat Terrorist Use of Social Media Act of 2015, passed the House of Representatives by voice vote and under suspension of the rules on December 16, 2015. IV. SECTION-BY-SECTION ANALYSIS OF THE BILL, AS REPORTED Section 1. Short title This section provides the bill's short title, the ``Combat Terrorist Use of Social Media Act of 2016.'' Section 2. Definitions This section defines ``appropriate congressional committees,'' ``domestic terrorism,'' ``international terrorism,'' ``radicalization,'' and ``United States person.'' Section 3. Report on strategy to combat terrorist use of social media Section 3 requires the President to transmit to the appropriate Congressional committees a report on terrorists' and terrorist organizations' use of social media and efforts of the United States to combat such use. The report is required to evaluate the role of social media in radicalization and assess the impact that efforts to combat terrorists' use of social media may have on the civil rights and civil liberties of United States persons not engaged in terrorist activities. The report is to be transmitted no later than 90 days after enactment of S. 2517. Section 3 also requires the President to submit to the appropriate Congressional committees an evaluation of the United States' efforts to combat the use of social media by terrorists and terrorist organizations and recommendations for improvements. This evaluation is required to assess the impact of such efforts on the civil rights and civil liberties of United States persons who are not engaged in terrorism. This evaluation is to be submitted within 180 days of enactment. The report and evaluation required under this section shall be submitted in an unclassified form, and may include a classified annex to protect intelligence sources and methods. Section 4. Policy and comprehensive strategy to counter terrorists' and terrorist organizations' use of social media Section 4 requires the President to submit a comprehensive strategy to counter the use of social media by terrorists and terrorist organizations. This strategy must be submitted within 180 days of enactment, in an unclassified form, and may include a classified annex to protect intelligence sources and methods. Section 5. Prohibition on New Regulatory Authority Section 5 makes clear that the bill does not provide the President or any Federal department or agency with authority to promulgate regulations or set standards for non-Federal entities. V. EVALUATION OF REGULATORY IMPACT Pursuant to the requirements of paragraph 11(b) of rule XXVI of the Standing Rules of the Senate, the Committee has considered the regulatory impact of this bill and determined that the bill will have no regulatory impact within the meaning of the rules. The Committee agrees with the Congressional Budget Office's statement that the bill contains no intergovernmental or private-sector mandates as defined in the Unfunded Mandates Reform Act (UMRA) and would impose no costs on state, local, or tribal governments. VI. CONGRESSIONAL BUDGET OFFICE COST ESTIMATE March 18, 2016. Hon. Ron Johnson, Chairman, Committee on Homeland Security and Governmental Affairs, U.S. Senate, Washington, DC. Dear Mr. Chairman: The Congressional Budget Office has prepared the enclosed cost estimate for S. 2517, the Combat Terrorist Use of Social Media Act of 2016. If you wish further details on this estimate, we will be pleased to provide them. The CBO staff contact is Mark Grabowicz. Sincerely, Keith Hall. Enclosure. S. 2517--Combat Terrorist Use of Social Media Act of 2016 S. 2517 would require the President, within 90 days of the bill's enactment, to submit to the Congress a report on terrorists' use of social media and an overview of current efforts to counter those activities. Within 180 days of the bill's enactment, the President would be required to submit to the Congress a comprehensive strategy to counter terrorists' use of social media and an evaluation of current efforts to combat such use of social media. Based on the cost of similar activities, CBO estimates that implementing the bill would cost less than $500,000 over the 2017-2021 period; such spending would be subject to the availability of appropriated amounts. Because enacting S. 2517 would not affect direct spending or revenues, pay-as-you-go procedures do not apply. CBO estimates that enacting the legislation would not increase net direct spending or on-budget deficits in any of the four consecutive 10-year periods beginning in 2027. S. 2517 contains no intergovernmental or private-sector mandates as defined in the Unfunded Mandates Reform Act and would impose no costs on state, local, or tribal governments. On January 13, 2016, CBO transmitted a cost estimate for H.R. 3654, the Combat Terrorist Use of Social Media Act of 2015, as passed by the House of Representatives on December 16, 2015. The two pieces of legislation are similar and CBO's estimate of the budgetary effects are the same. The CBO staff contact for this estimate is Mark Grabowicz. The estimate was approved by H. Samuel Papenfuss, Deputy Assistant Director for Budget Analysis. VII. CHANGES IN EXISTING LAW MADE BY THE BILL, AS REPORTED Because this legislation would not repeal or amend any provision of current law, it would make no changes in existing law within the meaning of clauses (a) and (b) of paragraph 12 of rule XXVI of the Standing Rules of the Senate. [all]