[House Hearing, 115 Congress]
[From the U.S. Government Publishing Office]
WORLD-WIDE THREATS: KEEPING AMERICA SECURE IN THE NEW AGE OF TERROR
=======================================================================
HEARING
BEFORE THE
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED FIFTEENTH CONGRESS
FIRST SESSION
__________
NOVEMBER 30, 2017
__________
Serial No. 115-41
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC NOT AVAILABLE IN TIFF FORMT]
Available via the World Wide Web: http://www.govinfo.gov
__________
U.S. GOVERNMENT PUBLISHING OFFICE
29-474 PDF WASHINGTON : 2018
----------------------------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Publishing Office,
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center,
U.S. Government Publishing Office. Phone 202-512-1800, or 866-512-1800 (toll-free).
E-mail, [email protected].
COMMITTEE ON HOMELAND SECURITY
Michael T. McCaul, Texas, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Peter T. King, New York Sheila Jackson Lee, Texas
Mike Rogers, Alabama James R. Langevin, Rhode Island
Lou Barletta, Pennsylvania Cedric L. Richmond, Louisiana
Scott Perry, Pennsylvania William R. Keating, Massachusetts
John Katko, New York Donald M. Payne, Jr., New Jersey
Will Hurd, Texas Filemon Vela, Texas
Martha McSally, Arizona Bonnie Watson Coleman, New Jersey
John Ratcliffe, Texas Kathleen M. Rice, New York
Daniel M. Donovan, Jr., New York J. Luis Correa, California
Mike Gallagher, Wisconsin Val Butler Demings, Florida
Clay Higgins, Louisiana Nanette Diaz Barragan, California
John H. Rutherford, Florida
Thomas A. Garrett, Jr., Virginia
Brian K. Fitzpatrick, Pennsylvania
Ron Estes, Kansas
Don Bacon, Nebraska
Brendan P. Shields, Staff Director
Steven S. Giaier, General Counsel
Michael S. Twinchek, Chief Clerk
Hope Goins, Minority Staff Director
C O N T E N T S
----------
Page
STATEMENTS
The Honorable Michael T. McCaul, a Representative in Congress
From the State of Texas, and Chairman, Committee on Homeland
Security:
Oral Statement................................................. 1
Prepared Statement............................................. 4
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security:
Oral Statement................................................. 6
Prepared Statement............................................. 7
The Honorable Sheila Jackson Lee, a Representative in Congress
From the State of Texas:
Prepared Statement............................................. 8
WITNESSES
Panel I
Honorable Elaine C. Duke, Acting Secretary, U.S. Department of
Homeland Security:
Oral Statement................................................. 15
Prepared Statement............................................. 16
Mr. Christopher A. Wray, Director, Federal Bureau of
Investigation, U.S. Department of Justice:
Oral Statement................................................. 25
Prepared Statement............................................. 26
Mr. Nicholas J. Rasmussen, Director, The National
Counterterrorism Center, Office of the Director of National
Intelligence:
Oral Statement................................................. 31
Prepared Statement............................................. 33
Panel II
Mr. David B. Rausch, Chief of Police, City of Knoxville,
Tennessee:
Oral Statement................................................. 112
Prepared Statement............................................. 114
Rabbi Abraham Cooper, Associate Dean, Director, Global Social
Action Agenda, Simon Wiesenthal Center:
Oral Statement................................................. 118
Prepared Statement............................................. 121
Mr. J. Richard Cohen, President, Southern Poverty Law Center:
Oral Statement................................................. 124
Prepared Statement............................................. 125
FOR THE RECORD
The Honorable J. Luis Correa, a Representative in Congress From
the State of California:
Statement of Dr. Erroll G. Southers, Professor of the Practice
of Governance, Director, Safe Communities Institute,
Director, Homegrown Violent Extremism Studies, Sol Price
School of Public Policy, University of Southern California... 52
The Honorable Clay Higgins, a Representative in Congress From the
State of Louisiana:
Speech by the Ambassador of the State of Israel to the Center
for Security Policy's Freedom Flame Award Dinner............. 57
Article, ``Mainstream Conservative Groups Alarmed to be Found
on `Hate Map' '', Washington Times........................... 61
Article, ``Wealthy Southern Poverty Law rakes in Hollywood,
Silicon Valley cash after Charlottesville'', Washington Times 63
The Honorable Bonnie Watson Coleman, a Representative in Congress
From the State of New Jersey:
Statement of the Feminist Majority Foundation.................. 64
The Honorable James R. Langevin, a Representative in Congress
From the State of Rhode Island:
Statement of The National Consortium for the Study of Terrorism
and Responses to Terrorism................................... 69
The Honorable Nanette Diaz Barragan, a Representative in Congress
From the State of California:
Article, ``Border Patrol Says Texas Checkpoints To Remain Open
During Hurricane Harvey'', Texas Tribune..................... 89
The Honorable Donald M. Payne, Jr., a Representative in Congress
From the State of New Jersey:
Statement of the Anti-Defamation League........................ 92
The Honorable Martha McSally, a Representative in Congress From
the State of Arizona:
Letter......................................................... 108
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security:
Statement of the Council on American-Islamic Relations (CAIR).. 152
APPENDIX
Questions From Chairman Michael T. McCaul for Elaine C. Duke..... 157
Questions From Honorable Scott Perry for Elaine C. Duke.......... 161
Questions From Ranking Member Bennie G. Thompson for Elaine C.
Duke........................................................... 164
Questions From Honorable Val Demings for Elaine C. Duke.......... 169
Questions From Honorable Scott Perry for Christopher A. Wray..... 169
Questions From Ranking Member Bennie G. Thompson for Christopher
A. Wray........................................................ 173
Questions From Honorable Val Butler Demings for Christopher A.
Wray........................................................... 174
Questions From Honorable Scott Perry for Nicholas J. Rasmussen... 174
Questions From Ranking Member Bennie G. Thompson for Nicholas J.
Rasmussen...................................................... 175
Questions From Honorable Val Butler Demings for Nicholas J.
Rasmussen...................................................... 176
Questions From Honorable Scott Perry for Richard Cohen........... 177
Questions From Honorable Clay Higgins for Richard Cohen.......... 182
WORLD-WIDE THREATS: KEEPING AMERICA SECURE IN THE NEW AGE OF TERROR
----------
Thursday, November 30, 2017
U.S. House of Representatives,
Committee on Homeland Security,
Washington, DC.
The committee met, pursuant to notice, at 10:06 a.m., in
room HVC-210, Capitol Visitor Center, Hon. Michael T. McCaul
(Chairman of the committee) presiding.
Present: Representatives McCaul, Rogers, Barletta, Perry,
Hurd, McSally, Ratcliffe, Donovan, Higgins, Rutherford,
Garrett, Fitzpatrick, Estes, Bacon, Thompson, Jackson Lee,
Langevin, Richmond, Keating, Vela, Coleman, Rice, Correa,
Demings, and Barragan.
Chairman McCaul. The Committee on Homeland Security will
come to order.
The committee's meeting today to examine the most serious
threats confronting our homeland. Before I recognize myself for
an opening statement, I would like to take a moment to welcome
the newest member of our committee, Don Bacon. Don has served
nearly 30 years in the Air Force, and his experience in
cybersecurity and airborne reconnaissance will prove greatly
beneficial to this committee.
Thank you, sir, for being here.
Mr. Bacon. Thank you, Chairman.
Chairman McCaul. I now recognize myself for an opening
statement.
I would like to thank each of the witnesses: Acting
Secretary Elaine Duke, FBI Director Christopher Wray, NCTC
Director Nick Rasmussen for joining us today. You represent
thousands of patriotic men and women who go to work every day
to ensure the safety of their fellow Americans. Everyone on
this committee is extremely grateful for your service.
Director Rasmussen, for over two decades you have helped
navigate an unprecedented landscape in combat terrorism around
the globe. You have been a great partner to me and to this
committee, and I would like to call you a friend. We all wish
you the best of luck in--I hate to say retirement because that
is--in whatever you do after this.
Mr. Rasmussen. OK.
Chairman McCaul. This past year has been a particularly
devastating one. In just the last month, we witnessed another
terror attack in downtown New York, and over the summer, parts
of America, including my home State of Texas, were greatly
impacted by hurricanes and other natural disasters. We also saw
several heinous acts of violence that included the mass
shootings in Las Vegas, Sutherland Springs, and the hate-fueled
homicides in Portland and Charlottesville. Tens of millions of
Americans also felt the effects of cyber attacks from hackers
and other cyber criminals. These are just a few of the horrors
that hit our homeland.
On Islamist terrorism, over the Thanksgiving break, an
ISIS-affiliated group attacked a mosque in northern Sinai that
left 300 people, including 27 children, dead. While this attack
was thousands of miles away, it was a reminder of the savage
nature of an enemy that always has our homeland in its sights.
In the aftermath to 9/11, the Department of Homeland Security
was created to prevent further attacks, and I believe we are
better prepared than we were 16 years ago.
However, in that time, al-Qaeda has expanded its global
presence, and ISIS has conquered parts of countries,
slaughtered innocent civilians, and inspired new followers. By
using encrypted technology and by spreading incessant
propaganda across the internet, jihadists are recruiting new
members and planning new attacks. This has been obvious by a
series of vehicle homicides across Europe. Cities known for
their history and culture, like Paris, Berlin, London, Nice,
Barcelona, and Brussels, are becoming more familiar as terror
targets. The attack on Halloween in New York was proof that our
homeland is also susceptible to this line of attack.
Terrorists are answering Sheikh Adnani's call to kill
Westerners using whatever means necessary wherever they are.
While our enemies are always adjusting their tactics, we know
that our aviation sector is still their crown jewel of targets.
Earlier this month, our committee was briefed about aspects
of airport security. To our dismay, it was made clear that we
have a long ways to go. We must do more to address a threat
also posed by foreign fighters who have fled the battlefield
and remain one flight away. Consequently, we have identified
key areas that need improvements, and look forward to working
with the TSA to see them through.
To help defeat terrorists, we must work with private tech
companies to limit their communication capabilities and use all
of our economic and military resources to dry up their funding
and crush them on the battlefield.
When it comes to border security, another on-going
challenge is keeping our borders secure. Human traffickers,
gangs like MS-13, drug smugglers, and potential terrorists are
continually looking for new ways to sneak into our country. We
must do whatever we can to stop this illegal entry, especially
those who wish to do us harm.
In October, this committee took a big step in the right
direction by passing the Border Security for America Act. This
legislation, which I introduced, calls for building additional
physical barriers, including a wall, fencing, new technology,
and a surge in personnel. It targets drug and human traffickers
at our ports of entry and will help identify visa overstays
through the full deployment of a biometric entry-exit system,
which the 9/11 Commission recommended. Our homeland cannot be
secure without strong borders. I look forward to getting this
bill to the floor.
Natural disasters. This year's hurricane season devastated
many cities and towns in my home State of Texas, in Louisiana,
Florida, Puerto Rico, and the U.S. Virgin Islands. After
Hurricane Harvey, I personally toured much of the wreckage back
home. Roads were flooded, homes destroyed, and many people lost
their lives. However, I was amazed by the strength demonstrated
by people who braved dangerous conditions to support one
another. Texans helping Texans. I was also impressed by the
quick action taken by our heroic first responders and by the
emergency response at the Federal, State, and local levels,
thanks to a coordinated effort led by FEMA. A broader recovery
will take a long time. But I know that if we continue to work
together, we will be able to successfully rebuild these
communities that were shattered by these powerful storms.
On the issue of cybersecurity, America's cybersecurity
networks are under attack. In September, we learned that
Equifax had been successfully hacked, and 145.5 million people
may have been affected by the breach. Last week, it was also
reported that 57 million people use Uber, that they may have
had their personal information stolen from a cyber attack in
2016. This cannot continue. Fortunately, our committee has made
strengthening DHS cybersecurity a top priority.
In 2014, bipartisan committee efforts resulted in the
enactment of legislation that provided DHS expedited hiring
authorities, ensure DHS is assessing its cybersecurity work
force, and clarified the Department's role in cybersecurity of
Federal networks. In 2015, the Cybersecurity Act provided
liability protections for public-to-private and private-to-
private cyber threat information sharing. We have had some
success, but we need to do better. That is why this committee
passed a bill to elevate the operational capabilities of DHS's
cyber office to better protect digital America.
Finally, on the issue of domestic terror attacks. Domestic
terror attacks and violence ignited by White supremacists, the
KKK, or anyone else who preaches prejudice must not be
tolerated. As I have stated before, threatening the safety of
others and using intimidation tactics to advance political or
religious beliefs is simply unacceptable in the United States.
Too often we are seeing that our differences lead to violence,
and this must be stopped.
As a Nation, we should stand together and reject any type
of hatred that seeks to divide our neighbors as enemies. This
is an issue we will explore further in our second panel.
In conclusion, Homeland Security must be bipartisan. The
terrorists don't check our party affiliation. There are
certainly other threats, from ballistic missiles, weapons of
mass destruction programs in North Korea and Iran, to the
continued undermining of American interests by nation-states,
including Russia. As we face these threats, we must put our
homeland security before partisanship and politics. I am proud
to say that this committee has had a long track record of doing
just that.
We have improved information sharing for counterterrorism
efforts, increased support for first responders, and in July,
passed the first-ever comprehensive reauthorization of DHS with
an overwhelming bipartisan support. This reauthorization will
allow DHS to more faithfully carry out its mission of
safeguarding our homeland, our people, and our values. I am
hopeful that the Senate will finally take up this vital bill as
soon as possible.
So with that, I want to thank again these very prominent
and important witnesses for appearing here before this
committee.
With that, I recognize the Ranking Member.
[The prepared statement of Chairman McCaul follows:]
Statement of Chairman Michael T. McCaul
November 30, 2017
I would like to thank each of the witnesses, Acting Secretary
Elaine Duke, FBI Director Christopher Wray, and NCTC Director Nick
Rasmussen for joining us today. You represent thousands of patriotic
men and women who go to work every day to ensure the safety of their
fellow Americans.
Everyone on this committee is extremely grateful for your service.
Director Rasmussen--for over 2 decades you have helped navigate an
unprecedented threat landscape and combat terrorism around the globe.
You have been a great partner to this committee and we all wish you the
best of luck in retirement.
This past year has been a particularly devastating one. In just the
last month we witnessed another terror attack in downtown New York and
over the summer, parts of America, including my home State of Texas,
were greatly impacted by hurricanes and other natural disasters.
We also saw several heinous acts of violence that included the mass
shootings in Las Vegas and Sutherland Springs, and the hate-fueled
homicides in Portland and Charlottesville.
Tens of millions of Americans also felt the effects of cyber
attacks from hackers and other cyber criminals. These are just a few of
the horrors that hit our homeland.
islamist terrorism
Over the Thanksgiving break, an ISIS-affiliated group attacked a
mosque in the northern Sinai that left 305 people, including 27
children, dead. While this attack was thousands of miles away, it was a
reminder of the savage nature of an enemy that always has our homeland
in its sights.
In the aftermath of 9/11, the Department of Homeland Security was
created to prevent further attacks and I believe we are better prepared
than we were 16 years ago. However, in that time al-Qaeda has expanded
its global presence and ISIS has conquered parts of countries,
slaughtered innocent civilians, and inspired new followers.
By using encrypted technology and by spreading incessant propaganda
across the internet, jihadists are recruiting new members, and planning
new attacks. This has been obvious by a series of vehicular homicides
across Europe. Cities known for their history and culture: Paris,
Berlin, London, Nice, Barcelona, and Brussels, are becoming more
familiar as terror targets.
The attack on Halloween in New York City was proof that our
homeland is also susceptible to this new line of attack. Terrorists are
answering Sheik Adnani's call to kill Westerners using whatever means
necessary wherever they are. And while our enemies are always adjusting
their tactics, we know that our aviation sector is still their crown
jewel of targets.
Earlier this month, our committee was briefed about aspects of
airport security. To our dismay, it was made clear that we have a long
way to go.
We must do more to address the threat posed by foreign fighters who
have fled the battlefield and remain one flight away.
Consequently, we have identified key areas that need improvements
and look forward to working with TSA to see them through.
To help defeat terrorists, we must work with private tech companies
to limit their communication capabilities, and use all of our economic
and military resources to dry up their funding and crush them on the
battlefield.
border security
Another on-going challenge is keeping our borders secure. Human
traffickers, gangs like MS-13, drug smugglers, and potential terrorists
are continually looking for new ways to sneak into our country.
We must do whatever we can to stop this illegal entry, especially
of those who wish to do us harm.
In October, this committee took a big step in the right direction
by passing the Border Security for America Act.
This legislation, which I introduced, calls for building additional
physical barriers, which include a wall, fencing, new technology, and a
surge in personnel.
It targets drug and human traffickers at our ports of entry and
will help identify visa overstays through the full deployment of a
Biometric Entry-Exit System. Our homeland cannot be secure without
strong borders and I look forward to getting this bill to the floor.
natural disasters
This year's hurricane season devastated many cities and towns in
Texas, Louisiana, Florida, Puerto Rico, and the U.S. Virgin Islands.
After Hurricane Harvey, I personally toured much of the wreckage
back home. Roads were flooded, homes were destroyed, and many people
lost their lives.
However, I was amazed by the strength demonstrated by people who
braved dangerous conditions to support one another; Texans helping
Texans.
I was also impressed by the quick action taken by our heroic first
responders and by the emergency response at the Federal, State, and
local levels, thanks to a coordinated effort led by FEMA.
A broader recovery will take a long time. But I know that if we
continue to work together, we'll be able to successfully rebuild the
communities that were shattered by these powerful storms.
cybersecurity
America's cybersecurity networks are also under constant attack.
In September, we learned that Equifax had been successfully hacked
and 145.5 million people may have been affected by the breach. Last
week it was reported that 57 million people who use Uber, might have
had their personal information stolen from a cyber attack in 2016. This
cannot continue.
Fortunately, our committee has made strengthening DHS's
cybersecurity mission a top priority. In 2014, bipartisan committee
efforts resulted in enactment of legislation that provided DHS
expedited hiring authority; ensured DHS is assessing its cybersecurity
workforce; and clarified the Department's role in the cybersecurity of
Federal networks.
In 2015, the Cybersecurity Act provided liability protections for
public-to-private and private-to-private cyber threat information
sharing. We have had some success, but we need to do more. And that is
why this committee passed a bill to elevate and operationalize DHS's
cyber office to better protect digital America.
domestic terror attacks
Finally, domestic terror attacks and violence ignited by white
supremacists, the KKK, or anyone else who preaches prejudice, must not
be tolerated. As I have stated before, threatening the safety of others
and using intimidation tactics to advance political or religious
beliefs is simply unacceptable.
Too often, we are seeing that our differences lead to violence and
this must be stopped.
As a Nation, we should stand together and reject any type of hatred
that seeks to divide our neighbors as enemies. This is an issue we will
explore further in our second panel.
conclusion/homeland security must be bipartisan
There are certainly other threats--from ballistic missiles and WMD
programs in North Korea and Iran, to the continued undermining of
American interests by nation-states including Russia. As we face these
threats we must put our homeland security before partisanship and
politics.
I am proud to say that this committee has a long track record of
doing just that.
We have improved information sharing for counterterrorism efforts
and increased support for first responders. In July, the House passed
the first-ever, comprehensive reauthorization of DHS with an
overwhelming bipartisan vote.
This reauthorization will allow DHS to more faithfully carry out
its mission of safeguarding our homeland, our people, and our values,
and I am hopeful the Senate will take up this vital bill as soon as
possible.
Once again, I'd like to thank today's witnesses for joining us and
for their continued cooperation with our committee.
I look forward to discussing how we can best tackle these world-
wide threats so we can best secure our Nation.
Mr. Thompson. Thank you, Mr. Chairman. Thank you for
holding this hearing on keeping America secure from terrorism.
Hang on just a minute.
I would also like to thank both panels of witnesses for
today.
In the wake of the disturbing rise of domestic terrorism in
recent years, Democratic Members of this committee have
repeatedly asked for a hearing on this important topic. While
this hearing is our annual one examining world-wide threats, a
great deal of our conversation will likely be focused on a
terror threat from right here at home. Incidents like the 2015
killing of 9 churchgoers by a white supremacist at Mother
Emanuel Church in Charleston and the hate-fueled violence that
left a young woman dead and 19 others injured during a white
supremacist rally in Charlottesville earlier this year,
highlight the threat posed by domestic extremists.
Domestic terrorist organizations have even adopted some of
the same techniques for recruitment and radicalization as
foreign terrorist organizations, using the internet to reach
followers and coordinate their actions.
[Video shown.]
Mr. Thompson. Unfortunately, President Trump insists on
fueling the fire of hatred and extremism in America calling
marchers in Charlottesville very fine people. Just yesterday,
retweeting inflammatory anti-Muslim videos posted by a far-
right British organization. James Clapper, the former director
of national intelligence, called Trump's retweeting of the
videos bizarre and disturbing, and said his action undermines
our relationship with our friends and allies.
Americans should be able to look to our President for a
steady hand and responsible leadership in uncertain times. But
unfortunately, President Trump consistently conducts himself in
a way that jeopardizes our security and is not befitting the
office he holds.
Also, though they cannot say so themselves, the President's
actions make the already difficult jobs of the witnesses
joining us on the first panel today even harder. The Department
of Homeland Security, Federal Bureau of Investigation, and
National Counterterrorism Center play key roles in securing the
homeland from terrorists, both foreign and domestic. I hope to
hear from these witnesses today about the challenges they face,
what emerging threats we should be aware of, and how Congress
can support them in their mission, consistent with our American
laws and values.
Since much of our focus is typically on foreign terrorists,
today, I am especially interested in hearing how the witnesses
assess the threat from domestic extremists and terrorist
groups, and learning what can be done to protect us from this
rising concern.
I also look forward to hearing from our second panel of
witnesses on this topic later this morning. They bring special
expertise on domestic extremism and terrorism issues, and I
hope Members will hear what they have to say and engage in a
thoughtful dialog.
The Southern Poverty Law Center, in particular, is
dedicated to fighting hate and seeking justice and equality for
all Americans. I look forward to their recommendations for
countering the ideologies that are inspiring violence in
America.
I had hoped to have the NAACP testify as well, but the
invitation was issued less than 24 hours prior to the hearing,
and the late notice prevents their participation today. I look
forward to inviting them to testify at a future hearing.
In closing, I want to say that we know there are those
around the world who seek to come here and do Americans harm.
Those charged with preventing such attacks have the unwavering
support of all the Members of this committee, consistent with
the laws and values of our Nation. I hope that some attention
and resources will be dedicated to fighting domestic extremism
and terrorism here at home to ensure the security of all
Americans.
Again, I thank the Chairman for holding today's hearing,
and look forward to a productive discussion. I yield back.
[The statement of Ranking Member Thompson follows:]
Statement of Ranking Member Bennie G. Thompson
November 30, 2017
In the wake of the disturbing rise in domestic terrorism in recent
years, Democratic Members of this committee have repeatedly asked for a
hearing on this important topic. While this hearing is our annual one
examining world-wide threats, a great deal of our conversation will
likely be focused on the terror threat from right here at home.
Incidents like the 2015 killing of 9 churchgoers by a white
supremacist at Mother Emmanuel Church in Charleston and the hate-fueled
violence that left a young woman dead and 19 others injured during a
white supremacist rally in Charlottesville earlier this year highlight
the threat posed by domestic extremists.
Domestic terrorist organizations have even adopted some of the same
techniques for recruitment and radicalization as foreign terrorist
organizations, using the internet to reach followers and coordinate
their actions.
Unfortunately, President Trump insists on fueling the fire of
hatred and extremism in America, calling the marchers in
Charlottesville ``very fine people'' and just yesterday retweeting
inflammatory anti-Muslim videos posted by a far-right British
organization. James Clapper, the former director of national
intelligence, called Trump's re-tweeting of the videos ``bizarre and
disturbing'' and said his action undermines our relationship with our
``friends and allies.''
Americans should be able to look to our President for a steady hand
and responsible leadership in uncertain times, but unfortunately
President Trump consistently conducts himself in a way that jeopardizes
our security and is not befitting of the office he holds.
Also, though they cannot say so themselves, the President's actions
make the already difficult jobs of the witnesses joining us on the
first panel today even harder. The Department of Homeland Security,
Federal Bureau of Investigation, and National Counterterrorism Center
play key roles in securing the homeland from terrorists both foreign
and domestic.
I hope to hear from these witnesses today about the challenges they
face, what emerging threats we should be aware of, and how Congress can
support them in their mission, consistent with our American laws and
values.
Since much of our focus is typically on foreign terrorists, today I
am especially interested in hearing how the witnesses assess the threat
from domestic extremist and terrorist groups and learning what can be
done to protect us from this rising concern.
I also look forward to hearing from our second panel of witnesses
on this topic later this morning. They bring special expertise on
domestic extremism and terrorism issues and I hope Members will hear
what they have to say and engage in a thoughtful dialog.
The Southern Poverty Law Center in particular is dedicated to
fighting hate and seeking justice and equality for all Americans, and I
look forward to their recommendations for countering the ideologies
that are inspiring violence in America. I had hoped to have NAACP
testify as well, but their invitation was issued less than 24 hours
prior to the hearing and the late notice prevents their participation
today. I look forward to inviting them to testify at a future hearing.
In closing, I want to say that we know there are those around the
world who seek to come here and do Americans harm. Those charged with
preventing such attacks have the unwavering support of all the Members
of this committee, consistent with the laws and values of our Nation.
I hope that the same attention and resources will be dedicated to
fighting domestic extremism and terrorism here at home to ensure the
security of all Americans.
Chairman McCaul. The Ranking Member yields back.
Other Members are reminded opening statements may be
submitted for the record.
[The statement of Honorable Jackson Lee follows:]
Statement of Honorable Sheila Jackson Lee
Thank you Chairman McCaul and Ranking Member Thompson for convening
this hearing and affording us, the Homeland Security Committee, the
opportunity to hear testimony on ``World-wide Threats: Keeping America
Secure in the New Age of Terror.''
Terrorism threats that local, State, and Federal law enforcement
must be prepared to meet is significantly different than what was seen
on September 11, 2001.
I was here on the day of the attacks and I will never forget the
Members who were there with me as we sang God Bless America on the
steps of the Capitol.
The days and weeks following the attacks we were uncertain what
threat might come and how many lives might be lost as we worked to put
resources in place to deal with an enemy that might be among us.
Over the past 16 years we have learned a great deal.
Those who wish to do us harm can come from any race, religion,
ethnicity, or political persuasion.
We are better prepared to face these challenges as one Nation
united against a common foe.
My primary domestic security concerns are how to maintain a united-
United States by:
preventing foreign fighters and foreign-trained fighters
from entering the United States undetected;
countering international and home-grown violent extremism;
preserving Constitutional rights and due process for all
persons;
addressing the uncontrolled proliferation of long-guns that
are designed for battlefields and not hunting ranges;
controlling access to firearms for those who are deemed to
be too dangerous to fly;
protecting critical infrastructure from physical and cyber
attack;
creating equity and fairness in our Nation's immigration
policies; and
strengthening the capacity of the Department of Homeland
Security and the Department of Justice to meet the challenges
posed by weapons of mass destruction.
I join my colleagues in welcoming the witnesses for both panels:
The first panel witnesses are:
The Honorable Elaine C. Duke, acting secretary, DHS;
Christopher Wray, director of the FBI; and
Nicholas J. Rasmussen, director of the National
Counterterrorism Center will be testifying at the hearing.
The second panel witnesses are:
Mr. J. Richard Cohen, president, Southern Poverty Law
Center;
Mr. David B. Rausch, chief of police, city of Knoxville,
Tennessee testifying on behalf of the International Association
of Chiefs of Police; and
Rabbi Abraham Cooper, associate dean, director, Global
Social Action Agenda, Simon Wiesenthal Center.
I regret that Mr. Derrick Johnson, president and chief executive
officer, NAACP, was issued an invitation with less than 24 hours before
today's hearing.
Mr. Chairman and Ranking Member I ask that another timely
invitation to testify be issued to Mr. Derrick Johnson for an
opportunity to give testimony to the full committee.
I have served on the Committee on Homeland Security from its
inception.
The threats poised to our country by terrorists who seek to do us
harm is real and needs adequate funding, the support of Congress and
the professionals that comprise the ranks of the Department of Homeland
Security, the Department of Justice, the State Department, and the
Department of Defense to keep our Nation safe.
I am humbled and inspired by what the men and women of these
agencies do each day to keep our Nation secure.
Their efforts have not gone unnoticed and their success is evident
in that this Nation has not experienced an attack on the scale that was
carried out on September 11, 2001.
hurricane harvey recovery needs aggressive action by fema
Acting Secretary Duke, I thank you and the men and women of the
Department of Homeland Security for your work to aid areas impacted by
this year's devastating Hurricane Season to recover.
The President promised the people of Texas that he would provide
what was needed to recover; now we need him to keep that promise.
Residents of the State of Texas who are facing the long road to
recovery need $55 billion for home flood mitigation, repair,
replacement, and home buyouts.
There are other States with pressing needs related to disaster
recovery.
The funding being considered is inadequate and unrealistic for the
scope of the damage caused by the multiple disasters that befell the
United States earlier this year.
The President needs to understand that the Texas and Florida
Delegations are in full agreement regarding the need to meet the
disaster recovery needs of the States and territories.
There are particular concerns for our seniors who survived the
terrible storms that ravaged the Texas Coast, Florida, U.S. Virgin
Islands, and Puerto Rico because so many of them are alone, while
trying to the do difficult and hard job of cleaning out their homes, or
removing debris from their yards.
The work is not done in my State of Texas.
Thousands of families have no home because of the storm, and many
more thousands are living in gutted out shells of structures they once
called home and too many others are sleeping in cars.
Houston's response to the immediate disaster was impressive and
all-encompassing for the size and complexity of the disaster caused by
unprecedented flooding due to Hurricane Harvey.
The efforts of Mayor Turner and the work of the public works
department, police, and first responders, as well as Federal and State
agencies that were joined by citizen volunteers to help save thousands
of lives.
This success gave the impression that everything is working in
Houston following Hurricane Harvey when the reality could not be
farther from the truth.
Over a thousand square miles of Texas Coast was impacted by the
greatest flood to impact the mainland of the United States in the
history of the Nation.
We have communities that are struggling to find the new normal that
FEMA officials warned Texans would need to accept following the
historic flood.
There are particular concerns for our seniors who survived the
terrible storms that ravaged the Texas Coast, Florida, U.S. Virgin
Islands, and Puerto Rico because so many of them are alone, while
trying to the do difficult and hard job of cleaning out their homes, or
removing debris from their yards.
The work is not done in my State of Texas there are thousands of
families who have no home to return to following the historic flood.
We have communities that are struggling to find the new normal that
FEMA officials warned Texans would need to accept following the
historic flood.
The effort is being made difficult by a lack of appreciation by the
administration of the true cost of recovery for Texas, Florida, the
U.S. Virgin Islands and Puerto Rico.
We must have full funding for the hard-hit areas of the United
States so that recovery is not piece-meal.
The people in my State also need a fair, compassionate, and
equitable process for requesting and receiving aid.
FEMA has proven that it is excellent at disaster response, but is
showing that they are not very good at recovery management for
individuals and families.
Fundamentally, recovery for people and families in an impact area
that is as large are the Hurricane Harvey disaster requires an approach
that partners with non-profit and civic organizations.
Houston has a well-established community of aid agencies who could
aid residence with Harvey damage in successfully navigating the FEMA
registration.
Today, thousands of Houstonians and residents throughout the Harvey
impact zone are being denied assistance because the FEMA process is not
working.
Each family in the impact zone should have a non-profit agency
caseworker who provides support, assesses the health, security, and
safety of living arrangements as it relates to storm damage then makes
sure they register for the types of assistance that is appropriate for
their needs.
FEMA application process did not account for multiple heads of
household who lived at one address; nor do the literacy and access to
transportation that would be needed to reach Recovery Assistance
Centers.
A denial from most of my constituents means they give up, when what
may be needed is a proof of residence or a document about losses
incurred.
This is why Community Block Grant dollars are needed to address the
loss of housing that FEMA is missing due to the flaws in the
application and approval of assistance process.
The administration risks a shut-down over not adequately meeting
the needs of hurricane-impacted areas.
future strategies in combating isis/al-qaeda
The noticeable decline in messages attributed to ISIS and al-Qaeda
is evidence that they are diminishing in strength on the battle's front
lines.
We must be prepared to greet these groups or their re-incarnations
aggressively as they seek refuge in remote areas around the globe and
disrupt their attempts to plot violent attacks against our Nation.
As we see a reduction in large-scale terrorist activity and the
emergency of lone wolves the mission and the work to successfully fight
terrorism is going to change.
Over the last year we have become aware of Russia interference in
our National elections and witnessed an increasing threat of a nuclear
ICBM-capable North Korea.
We must resist the temptation to look for threats where none
exists; there will be ample work to be done as real security threats
emerge.
My concern in this regard are how the tools provided to identify
and combat terrorism threats might be used to unjustly target.
It has been brought to my attention that there are cases of airport
workers who as a condition of employment must have access to the
sterile areas of airports.
In one case, brought to my attention by a constituent of the 18th
Congressional District, who had her security clearances from 2008
through 2010 and again in 2013 until this year when it came up for
renewal.
The renewal was denied by Custom and Border Protection (CPB)
without an explanation or due process consideration that would allow
her an opportunity to reply to a specific issue or accusation that may
have been the reason for the denial.
My office was informed that the denial is based upon information
provided by a third-party agency report to CPB regarding my
constituent.
It is my concern that we get security protocols right especially in
cases where the target of an accusation who has a benefit or right that
is controlled by a Federal agency that is prohibited from providing any
details regarding the charge or claim made.
She has gone to the extraordinary effort of getting an FBI
background check done to see if there was anything that would cause her
clearance to be denied and it came back without anything to report.
She stated in her letter seeking my assistance that her attempts to
get information from CPB resulted, in her words of ``feelings of being
discriminated against because she was African American and Muslim
although she is a citizen of the United States.''
Her overriding concern is the damage being done to her reputation
for something she is not able to get any information about which
prevents her from responding.
The initial days following September 11, 2001 we may have
considered that to allow agencies in the intelligence and law
enforcement to share data there needed to be a shield regarding the
source of information.
The need for a shield between intelligence and law enforcement
agencies may still be necessary, but if that is the case an impartial
third party should review these cases.
It is important to note that in the case of my constituent she
continues to go to the airport to work.
Today, if a person is accused of something that cost a security
clearance, but never charged with a crime, can be denied employment
based upon an accusation, which is why there is a need to have greater
scrutiny to ensure that what is reported has occurred.
African Americans, Hispanics, Native Americans, Muslims, Asians,
Jews, and immigrants are living in an America where intolerance and
bias are not only becoming more blatant, but in some cases echoed by
the President of the United States.
I ask that the leadership of each component and office for the
Department of Homeland Security and Department of Justice be reminded
that our enemies are not of a particular race, religion, ethnicity, or
political persuasion.
We must each be more willing to question, doubt, and challenge
actions and accusations that puts those who are targets of white
supremacists at risk.
Not having to worry about anyone ever challenging the story told or
revealing the identity of the teller may be shielding a sexual predator
who was rejected or a bigot who wants to inflict harm on a person
because of their differences.
I want to give you a letter and the casework file including a
privacy act release to you Acting Secretary Elaine Duke and request
your personal attention to resolving this matter in an equitable
manner.
black identity extremism
The notion of creating a new phrase without consideration for the
history of the struggles of people in this Nation who only ask to be
treated as human beings is incredible.
The lack of appreciate for what the issues are from the perspective
of sociologists and criminologists is hard to reconcile.
The FBI has a diversity problem that it has done all of the right
things to address--recruiting at Historical Black Colleges and
Universities.
There is diversity in the recruitment work done to collect
applications, but the hiring for the FBI continues a balance of about
88% white males, 7% Hispanic and 5% African America and 3% other.
This is why the BIE report was possible, when it should have been a
non-starter.
I can tell you that the temperature for racial tolerance in the
environment is very inhospitable.
It is easy for a document that has the emblem of the FBI affixed to
it to have serious and dire consequences for the safety of African
Americans.
history of surveillance & the black community
This administration continues the same vile tactics used in well-
documented stories of civil rights leaders who were profiled, targeted,
and killed for insisting that black people receive equitable treatment
under the law in a country whose Constitution guarantees it.
Under FBI Director Edgar Hoover's leadership, the Counter
Intelligence Program (COINTELPRO), a covert, often illegal, campaign
was mounted to break up the civil rights movement and ``neutralize''
activists they perceived as threatening.
COINTELPRO was used to surveil and discredit civil rights
activists, members of the Black Panther Party and any major advocates
for the rights of black people in our Nation's history.
COINTELPRO allowed the FBI to falsify letters in an effort to
blackmail Martin Luther King Jr. into silence.
This was such a disgraceful period in our Nation's history that our
recent FBI Director, James Comey, kept a copy of a 1963 order
authorizing Hoover to conduct round-the-clock surveillance of Martin
Luther King Jr. on his desk as a reminder of Hoover's abuses.
The FBI's dedicated surveillance of black activists follows a long
history of the U.S. Government aggressively monitoring protest
movements and working to disrupt civil rights groups, but the scrutiny
of African Americans by a domestic terrorism unit was particularly
alarming to some free-speech campaigners.
FBI: Black Lives Matter and the Black Identity Extremists Report
Today the FBI continues its once intrusive, abhorrent, and illegal
targeting of black activists by labeling the Black Lives Matter
movement as Black Identity Extremism.
We know that the Department of Homeland Security has been
surveilling Black Lives Matter activists since 2014, but there's no way
to know what's next.
With this recent report, the FBI has legitimized the idea that
black activism is a threat and should be treated accordingly--with
violent force.
Despite Charlottesville and all the other harms inflicted by
emboldened white nationalists, the FBI has instead, chosen to target a
group of American citizens whom merely decry the injustice seen and
felt throughout their communities.
Despite numerous unarmed black individuals, particularly, young
black men that are disproportionately the victims of police shootings,
the FBI would like us to believe this is not a reality.
Instead, the FBI's report claims there is a danger in black
activism by asserting that violence inflicted on black people at the
hands of police is ``perceived'' or ``alleged,'' not real.
This month the Congressional Black Caucus has written to the FBI
director, Christopher Wray, to express our concern over the recent
``Intelligence Assessment'' report.
We have requested a briefing on both the origins of its research
and the FBI's next intended step based on its findings. No response as
of date.
We should be allowed to exercise our Constitutional and fundamental
rights of free speech.
We should not be restricted and criminalized when we demand that
those we elect to office exercise justice and fairness.
This FBI report will further inflame an already damaged police/
community relation under the leadership of Attorney General Jeff
Sessions.
Sessions has dismantled all the safeguards installed under Attorney
General Holder's leadership, thus, returning our justice system to the
broken system under Ashcroft.
Sessions has unleashed a merciless approach to ``all'' crimes
including low-level drug-related cases, and demands that his attorneys
prosecute every case to the fullest extent of the law.
In doing so, Sessions has taken away any prosecutorial discretion
once available to prosecutors throughout our justice system under U.S.
law.
The FBI in this Trump administration has returned to the era of
Director Edgar Hoover, in their unleashing of this damaging,
discriminative, and unconstitutional COINTELPRO 2.0.
With these lethal forms of attacks on the African American
community from both the DOJ and the FBI, where is justice?
White Supremacy and Hate Groups
The work of civil rights and equal rights is not easy--pursing non-
violence when violence is the goal of the groups most opposed to the
existence of African Americans, Hispanics, Native Americans, Jews, and
others.
The Simon Wiesenthal Center is renowned for its commitment to
harmony and peace through understanding.
The Simon Wiesenthal Center is a global human rights organization
researching the Holocaust and hate in a historic and contemporary
context.
The Center confronts anti-Semitism, hate, and terrorism, promotes
human rights and dignity, stands with Israel, defends the safety of
Jews world-wide, and teaches the lessons of the Holocaust for future
generations.
They have a constituency of over 400,000 households in the United
States, it is accredited as an NGO at international organizations
including the United Nations, UNESCO, OSCE, Organization of American
States (OAS), the Latin American Parliament (PARLATINO) and the Council
of Europe.
The Center's educational arm, founded in 1993, challenges visitors
to confront bigotry and racism, and to understand the Holocaust in both
historic and contemporary contexts.
The Museum has served over 5 million visitors with 350,000 visiting
annually including 150,000 students.
Over 1.5 million children and youth have participated in the Museum
experience and its programs.
Over 200,000 adults have been trained in the Museum's customized,
professional development programs which include Tools for Tolerance,
Teaching Steps to Tolerance, Task Force Against Hate, National
Institute Against Hate Crimes, Tools for Tolerance for Teens, and
Bridging the Gap.
mass shootings in the united states
In 2015, there were 372 mass shootings and 33,636 deaths due to
firearms in the United States while guns were used to kill about 50
people in the United Kingdom. More people are typically killed with
guns in the United States in a day (about 85) than in the United
Kingdom in a year.
We must have an accountable and responsive Government to address
the number of and level of violence caused by mass shooters who attack
groups or individuals with weapons of war.
No one or any place is safe from the mass shooter, including
Members of the United States Congress who were participating in a
baseball practice game when a mass shooter attacked.
Since that shooting targeting Members of Congress occurred we have
seen hundreds of people either killed or injured by mass shooters
incidents in Las Vegas, Nevada, and Southerland Springs, Texas.
We must have a comprehensive approach to addressing access to
firearms by persons who should not have them and the need for mental
health services to address underlying causes of suicides and violent
crime.
russian interference/the muslim ban/daca/temporary protective status
revocation
Russia
President Trump from his first week in office communicated his
views regarding immigration, immigrants, and Russia interference in our
Nation's elections.
Prior to taking the Presidential oath of office, he indicated that
he had doubts about intelligence community reports that Russia had
orchestrated a well-coordinated attack of our election.
His doubts of our own intelligence on Russia's hostile actions
embolden Russian President Putin to deny the charge, which he continued
to do so until later Putin acknowledged that some ``patriotic'' element
inside of Russia may have interfered with the U.S. election.
We know that no truly patriotic Russian would dare to interfere in
an American election without the full knowledge of Russia's ever-
present surveillance agencies.
As a former KGB chief and spymaster, Vladimir Putin would not allow
anything to take place of this nature without his knowledge or
approval.
DACA and Temporary Protected Status
Many Members of this committee have questions for the panels
regarding other important homeland security issues, such as the rise of
violence from white supremacist groups; mass shootings committed
against groups and individuals, the temporary protection status of
Haitians, Hondurans, Salvadorians, and as well as the status of
Deferred Action for Childhood Arrivals (DACA) other immigrant
communities who are living in fear of the next Executive Order from
this administration.
Immigration
On Friday, January 27, 2017, the President signed an Executive
Order suspending all resettlement of Syrian refugees indefinitely, and
resettlement of all other refugees for 120 days.
The order also imposed a 90-day ban on entry of nationals from 7
predominately Muslim countries: Iraq, Syria, Iran, Sudan, Libya,
Somalia, and Yemen.
This action triggered public condemnation and resistance that has
landed the Executive Order in the Federal courts where it has
repeatedly been ruled to be unconstitutional in both of its iterations
(e.g., Trump Muslim Ban No. 1, Trump Travel Ban No. 2).
This was just the beginning of the Trump's administration pattern
of targeting and profiling people deemed to be unworthy of
Constitutional protection or consideration of due process.
In February, reports of heightened Immigration and Customs
Enforcement actions came to the attention of Members of Congress.
Immigration and Customs Enforcement made 35 percent more arrests
Nation-wide in roughly the first 3 months of the Trump administration
compared to the same period last year.
Nation-wide, ICE made 41,898 arrests from January 20 through April
29.
During this same period in 2016 there were only 31,128 arrests
according to ICE data.
Twenty-six percent (26%) of this year's arrests were of people who
had not been convicted of a crime, which is up from 14 percent last
year.
There is little reason to doubt that the motivation behind the
Trump Executive Orders and immigration policies is to target and remove
Hispanics and Muslims.
What is worse is the treatment of pregnant women and girls who are
placed in detention centers.
These centers do not have medical facilities or full-time medical
staff because they are not prisons.
It is not a crime to be in the United States without documents; it
is a civil matter.
We have seen the process turned into a form of punishment when this
should never have been allowed to happen.
Women and girls who are pregnant are not getting adequate medical
care and what is worse of the charges of intention abuse of women with
difficult pregnancies who are held without access to health care.
Simply put, the actions taken by this administration are
jeopardizing long-held tenants of our Nation; that all are created
equal and endowed by their Creator with certain inalienable rights.
Trump's actions are not making Americans safer; they are in fact
making them less safe and more fearful.
The reports by local law enforcement of a steep decline in the
number of sexual assault cases from the Hispanic community and in some
cases an increase in sexual assault cases by non-Hispanics is alarming.
The corrosive nature of unchecked criminal activity will be felt
far beyond the communities where violence and crime are allowed to
fester.
The impact on our Nation's fiscal health, National security, and
economic stability as a direct result of these anti-immigrant actions
are yet to be fully calculated.
In my efforts to effectively work on the behalf of constituents of
the 18th Congressional District, I can attest to the human toll.
Some of the direct impacts are felt most acutely by the most
vulnerable: Children of parents who left home one morning never to
return; international medical students planning to come to study
medicine in the United States; and the security of our Nation's most
fundamental institution--free and fair public elections.
Temporary Protected Status
On November 20, 2017, you announced the administration was ending a
humanitarian program that has allowed some 59,000 Haitians to live and
work in the United States since an earthquake ravaged their country in
2010.
Haitians with what is known as Temporary Protected Status will be
expected to leave the United States by July 2019 or face deportation.
This decision regarding Haitians followed another revocation of
Temporary Protected Status of for 2,500 Nicaraguans in October.
These announcements have also caused concern among other groups who
are in the United States under a Temporary Protected Status.
The temporary status covers some 435,000 people from 9 countries,
who came to the United States legally after a natural disaster or war.
Temporary Protected Status designations were created by a law
signed by President George Bush in 1990.
Haiti, the poorest country in the Western Hemisphere, is still
struggling to recover from the earthquake and relies heavily on money
its expatriates send to relatives back home.
The Haitian government had asked the Trump administration to extend
the protected status.
the human toll of trump administration polices
International medical graduates (IMGs) fill a vital role in the
U.S. health care system by serving as a source of primary care
physicians in rural communities throughout the United States.
They comprise 26% of physicians in practice and 24% of residents in
specialty programs in the United States.
All IMGs go through U.S. medical licensing examination and
credentialing verification to receive certification from the
Educational Commission for Foreign Medical Graduates to become eligible
to enter the U.S. graduate medical education process.
Compared with U.S. graduates, IMGs tend to practice in primary care
specialties and in underserved and rural areas.
Severe shortages of primary care physicians in underserved areas of
the United States were a persistent problem that seemed intractable
until international medical students began to fill the void.
There are other impacts that adversely affect small business
owners, veterans, families in every State where ICE deportations have
risen.
There is an important issue regarding ICE enforcement actions
related to the display of the word ``POLICE'' by ICE agents.
As a Member of the Committee on Judiciary and Ranking Member for
the Subcommittee on Crime, Terrorism, Homeland Security, and
Investigation, I am acutely aware of the important role law enforcement
fills.
I was concerned that ICE's use of ``POLICE'' would link their
immigration enforcement activity with routine police and crime
prevention, which would chill the willingness of immigrant communities
to help police and report crime.
I am sad to say that my worst fears have been borne out by reports
by the chiefs of police for Houston and Los Angeles that in fact
reports of sexual assault have sharply declined.
My final observation of the first few months of this administration
is the willingness to cause injury where none needs to be inflicted.
I appreciate your assistance, Mr. Secretary, in reuniting a child
from Jordan with his family after he was caught up in the Muslim ban.
Another constituent, Mr. Jose Ernesto Escobar, who owns a small
business, has not committed a crime, has complied with requirements
that he routinely report to DHS, has yet to be reunited with his family
after having filled an administrative appeal regarding a surprise
attempt to deport him.
The administrative appeal is essential to balance immigration
policies with due process rights, which extend protections to non-
citizens in our Nation's constitutional democracy.
Unfortunately, ICE ignored the due process requirements of Mr.
Escobar's administrative appeal after assurances that the agency would
comply with the appeals processes and instead deported Mr. Escobar back
to El Salvador--a country he had not lived in since he was a child
following devastating earthquakes.
I look forward to the testimony of today's witnesses and the
question-and-answer opportunity that will follow.
Thank you. I yield back the balance of my time.
Chairman McCaul. We are pleased to have two distinguished
panels of witnesses before us. Today, our first panel includes
the Honorable Elaine Duke, acting secretary of the United
States Department of Homeland Security; the Honorable
Christopher Wray, director of the FBI; and the Honorable
Nicholas Rasmussen, director of the National Counterterrorism
Center. The witnesses' full written statements will appear in
the record.
The Chair now recognizes Secretary Duke for an opening
statement.
STATEMENT OF HONORABLE ELAINE C. DUKE, ACTING SECRETARY, U.S.
DEPARTMENT OF HOMELAND SECURITY
Ms. Duke. Good morning, Chairman McCaul, Ranking Member
Thompson, and distinguished Members of this committee. It is my
honor to testify here before you this morning on behalf of the
men and women of Department of Homeland Security, who shield
our Nation from threats every single day, often in extremely
dangerous environments.
We are reminded of that this past week when we lost Border
Patrol agent Rogelio Martinez in the line of duty. I truly
appreciate and know our country appreciates his service and
sacrifice.
While we do not know for certain the circumstances of his
death, we do know that he courageously chose a dangerous job
with DHS because it was so important to our Nation's security.
When his father was asked why his son chose the Border Patrol,
his son said: I want to defend my country from terrorists. I
want to prevent terrorists and drugs from coming into our
country, and he loved this job.
I want to begin by noting right now that the terror threat
in our country equals and in many ways exceeds the period
around 9/11. We are seeing a surge in terrorist activity
because the fundamentals of terrorism have changed. Our enemies
are crowdsourcing their violence on-line and promoting a do-it-
yourself approach that involves using any weapons their
followers can get their hands on. We saw this just last month
here on our own soil when a terrorist killed and wounded
pedestrians in New York City using a rented vehicle. But New
Yorkers rallied and they refused to be intimidated by this
heinous attack.
I also want to make it clear that DHS is not standing on
the side lines as these threats proliferate, and we will not
allow frequent terrorism to become the new normal. The primary
international terror threat facing our country is from global
jihadist groups. However, the Department is also focused on the
threat of domestic terrorism. Ideologically motivated violence
here in the United States is a danger to our Nation, our
people, and our values.
We are tackling the overall terror threat in the United
States head-on in two ways. First, we are rethinking homeland
security for this new age. There is no longer a home game and
away game. The line is blurred and the threats are connected
and across borders. That is why DHS is moving toward a more
integrated approach, bringing together intelligence,
operations, interagency engagement, and international action
like never before.
Second, we are raising the bar in our security posture
across the board to keep dangerous individuals and goods from
entering the United States. That includes building a wall in
the Southwest Border and cracking down on transnational
criminal organizations that bring drugs, violence, and other
threats to our communities.
Illegal immigration puts our communities and country at
risk, which is why our border security strategy is multi-
layered and includes robust interior enforcement operations to
deter and prevent illegal entry.
We are also strengthening everything from traveler
screening to information sharing. We now require all foreign
governments to share critical data with us on terrorists and
criminals and to help us confidently identify their nationals.
We must know who is coming into our country and make sure they
do not pose a threat. That is why I recommended, and the
President approved, tough but tailored restrictions against
countries that pose a risk and which are not complying with our
security requirements.
We are trying to stay a step ahead of emerging threats. We
are planning next to launch a new Office of Countering Weapons
of Mass Destruction next week to consolidate and elevate DHS's
efforts to guard against chemical, biological, radiological,
and nuclear threats.
Separately and additionally, our global aviation security
plan is making it harder for terrorists to target U.S.-bound
aircraft with concealed explosive or by using corrupted
insiders. At the same time, we are rededicating ourselves to
terrorism prevention to keep terrorists from radicalizing our
people, and our newly reorganized Office of Terrorism
Prevention Partnerships will lead this charge.
Finally, we have stepped up DHS's efforts to protect soft
targets, which will not only help better defend our country
against terrorists, but against tragedies we have witnessed
like that in Las Vegas and Texas.
Americans are also alarmed by the spike in terrorist
attacks. DHS is engaging with Congress on legislation that
would establish a new operating component dedicated to
cybersecurity.
On behalf of the entire Department, I appreciate the
critical role this committee plays. Thank you for holding this
hearing. I look forward to answering your questions.
[The prepared statement of Ms. Duke follows:]
Prepared Statement of Elaine C. Duke
November 30, 2017
Chairman McCaul, Ranking Member Thompson, and distinguished Members
of the committee, I would like to thank you for inviting me to testify
on the threats facing our great Nation and what we are doing to
confront them. First though, I would like to recognize the service of
former Secretary John Kelly. While his tenure at the Department of
Homeland Security (DHS) ended early, his impact was substantial.
General Kelly visibly lifted the morale of the Department, set a new
standard for leadership, and--most importantly--established the
foundation for historic improvements in our Nation's security. The
Department has not missed a beat since his departure, and it is my
honor to continue to advance the work he set in motion until such time
as the Senate votes to confirm the President's nominee, Kirstjen
Nielsen.
Make no mistake, the threats our country faces are serious. Our
enemies and adversaries are persistent. They are working to undermine
our people, our interests, and our way of life every day. Whether it is
the violent menace posed by international and domestic terrorists or
the silent intrusions of cyber adversaries, the American people will
not be intimidated or coerced. I am proud that the men and women of DHS
are driven to address these challenges, and they are more than equal to
the task.
I would like to stress three themes today.
First, we are rethinking homeland security for a new age. We
sometimes speak of the ``home game'' and ``away game'' in protecting
our country, with DHS especially focused on the former. But the line is
now blurred. The dangers we face are becoming more dispersed, and
threat networks are proliferating across borders. The shifting
landscape is challenging our security, so we need to move past
traditional defense and non-defense thinking. This is why DHS is
overhauling its approach to homeland security. We are bringing together
intelligence, operations, interagency engagement, and international
action in new ways and changing how we respond to threats to our
country.
Second, we are ``raising the baseline'' of our security posture--
across the board. DHS is looking at everything from traveler screening
to information sharing, and we are setting new standards to close
security vulnerabilities. Since 9/11, we have spoken too often of the
weaknesses in our systems without taking enough decisive action to fix
them for the long haul. This administration aims to change that. At the
Department, we are building an action-oriented, results-centric
culture. We are pushing our border security strategies and pressing
foreign partners to enhance their security so that terrorists,
criminals, and other threat actors are stopped well before they reach
our shores.
Third, this unprecedented hurricane season has truly tested us as a
Nation and tested many of our assumptions about what works in disaster
response and recovery. While each year the hurricane season officially
comes to an end on November 30, the lessons that we are learning from
the response and recovery operations that we are performing this year,
under the most difficult circumstances possible, will transform the
field of emergency management forever.
homeland security in a new age of terrorism
Today, the magnitude of the threat we face from terrorism is equal
to, and in many ways exceeds, the 9/11 period. While we have made it
harder for terrorists to execute large-scale attacks, changes in
technology have made it easier for adversaries to plot attacks in
general, to radicalize new followers, and to recruit beyond borders.
The problem is compounded by the use of simple, ``do-it-yourself''
terrorist tactics.
The rising tide of violence we have seen in the West is clear
evidence of the serious threat. Acts of terrorism and mass violence
against soft targets have become so frequent that we associate them
with the names of cities that have been victimized: Paris, San
Bernardino, Brussels, Orlando, Istanbul, Nice, Berlin, London,
Barcelona, and most recently in New York City on Halloween. As our
Government takes the fight to groups such as ISIS and al-Qaeda, we
expect operatives to disperse and focus more heavily on external
operations against the United States, our interests, and our allies.
We are seeing an uptick in terrorist activity because the
fundamentals of terrorism have evolved. This includes changes in
terrorist operations, the profile of individual operatives, and the
tactics they use. With regard to operations, terrorist groups
historically sought time and space to plot attacks. But now they have
become highly networked on-line, allowing them to spread propaganda
world-wide, recruit on-line, evade detection by plotting in virtual
safe havens, and crowd-source attacks. The result is that our
interagency partners and allies have tracked a record number of
terrorism cases.
Terrorist demographics have also created challenges for our front-
line defenders and intelligence professionals. ISIS, al-Qaeda, and
other groups have managed to inspire a wide array of sympathizers
across the spectrum. While a preponderance are young men, they can be
young or old, male or female, wealthy or indigent, immigrant or U.S.-
born, and living almost anywhere.
The change in terrorist tactics has likewise put strain on our
defenses. Global jihadist groups are promoting simple methods,
convincing supporters to use guns, knives, vehicles, and other common
items to engage in acts of terrorism. At the same time, they are
experimenting with other tools--including drones, chemical weapons, and
artfully concealed improvised explosive devices--to further spread
violence and fear. We have also seen a spider web of threats against
the aviation sector, which remains a top target for global jihadist
groups. In short, what was once a preference for large-scale attacks is
now an ``all-of-the-above'' approach to terrorism. This is particularly
exacerbated by the increased emphasis on so-called soft targets.
Locations, venues, or events associated with public gatherings are
increasingly appealing targets for terrorists and other violent
criminals because of their accessibility and the potential to inflict
significant physical, psychological, and economic damage.
The Department is also concerned about violent extremists using the
battlefield as a testbed from which they can export terror. We continue
to see terrorist groups working to perfect new attack methods in
conflict zones that can then be used in external operations. Operatives
are packaging this expertise into blueprints that can be shared with
followers on-line. In some cases, terrorists are even providing the
material resources needed to conduct attacks. We recently saw this in
Australia, when police foiled a major plot to bring down an airliner
using a sophisticated explosive device reportedly shipped by an ISIS
operative overseas.
The primary international terror threat facing the United States is
from violent global jihadist groups, who try to radicalize potential
followers within our homeland and who seek to send operatives to our
country. However, the Department is also focused on the threat of
domestic terrorism and the danger posed by ideologically-motivated
violent extremists here in the United States. Ideologies like violent
racial supremacy and violent anarchist extremism are a danger to our
communities, and they must be condemned and countered.
The Department is not standing on the sidelines as these threats
spread. And we will not allow pervasive terrorism to become the new
normal. We are closely monitoring changes to our enemies' tactics, and
we are working to stay a step ahead of them. This means ensuring that
our security posture is dynamic, multi-layered, and difficult to
predict. We are doing more to identify terrorists in the first place,
changing our programs and practices to adjust to their tactics, and
working with our interagency and international partners to find
innovative ways to detect and disrupt their plots.
DHS is also working to help our State, local, Tribal, territorial,
and private-sector partners--and the public--to be better prepared. We
actively share intelligence bulletins and analysis with homeland
security stakeholders Nation-wide to make sure they understand trends
related to terrorism and violent extremist activity, know how to guard
against nascent attack methods, and are alerted to the potential for
violent incidents. For example, in the days prior to the tragic events
in Charlottesville, the DHS Office of Intelligence and Analysis
partnered with the Virginia Fusion Center to produce and distribute an
assessment alerting State and local law enforcement to an increased
chance for violence at the upcoming demonstration.
DHS is working closely with private industry and municipalities to
help secure public venues and mass gatherings that might be targeted by
terrorism and violent extremist activity. We have also continued to
refine our outreach to make sure members of the public report
suspicious activity and don't hesitate to do so. Sadly, we have seen
many attacks at home and around the world that could have been stopped
if someone had spoken up. We want to break that pattern of reluctance.
In many of these areas, we will continue to need Congressional
assistance. The President's fiscal year 2018 budget calls for a number
of counterterrorism improvements that need robust funding. But more
must be done to keep up with our enemies. In some cases, DHS and other
departments and agencies lack certain legal authorities to engage and
mitigate the emerging dangers we are seeing. For example, we lack the
authorities needed to counter threats from unmanned aircraft systems
(UAS). We know that terrorists are using drones to conduct aerial
attacks in conflict zones, and already we have seen aspiring terrorists
attempt to use them in attacks outside the conflict zone.
Earlier this year, the administration delivered a Government-wide
legislative proposal to Congress that would provide additional counter-
UAS authorities to DHS and other Federal departments and agencies to
legally engage and mitigate UAS threats in the National Airspace
System. I am eager to share our concerns in a Classified setting, and I
urge the committee to help champion efforts to resolve this and other
challenges.
blocking threats from reaching the united states
The Department is undertaking historic efforts to secure our
territory. The goal is to prevent National security threat actors,
especially terrorists and criminals, from traveling to the United
States, while better facilitating lawful trade and travel. The
administration has made it a priority to secure our borders and to
provide the American people the security they deserve. We are making it
harder for dangerous goods to enter our country. And as part of our
across-the-board approach to rethinking homeland security, DHS is
improving to the screening of all categories of U.S.-bound travelers,
including visitors, immigrants, and refugees.
Our forward-leaning counterterrorism approach is exemplified by the
Department's recent aviation security enhancements. As noted earlier,
terrorists continue to plot against multiple aspects of the aviation
sector, in some cases using advanced attack methods. Based on
carefully-evaluated threat intelligence, DHS took action this year to
protect passenger aircraft against serious terror threats. This summer,
we announced new ``seen'' and ``unseen'' security measures,
representing the most significant aviation security enhancements in
many years. Indeed, our on-going Global Aviation Security Plan is
making U.S.-bound flights more secure and will raise the baseline of
aviation security world-wide--including additional protections to
prevent our enemies from placing dangerous items in mail or cargo.
Today, terrorists and criminals are exploiting what they see as a
borderless world, which is why stepping up our border security must be
among the highest National priorities. DHS is actively focused on
building out the wall on the Southwest Border and a multi-layered
security architecture to keep threats from entering America undetected.
We are making measureable progress, and we are cracking down hard on
transnational criminal organizations (TCOs), which are bringing drugs,
violence, and dangerous goods and individuals across our borders. These
organizations have one goal--illicit profit, and they couldn't care
less about the enormous human suffering they cause.
TCOs pose a persistent National security threat to the United
States. They provide a potential means for transferring weapons of mass
destruction (WMD) to terrorists or for facilitating terrorists' entry
into the United States. We have already seen aliens with terror
connections travel from conflict zones into our hemisphere, and we are
concerned that TCOs might assist them in crossing our borders. TCOs
also undermine the stability of countries near our borders, subvert
their Government institutions, undermine competition in world strategic
markets, and threaten interconnected trading, transportation, and
transactional systems essential to free markets.
The Department is fighting back against this threat by using its
full authorities and working in concert with other Federal partners.
DHS is leading the development of a stronger, fused, whole-of-
Government approach to border security. Stove-piped agencies cannot
prevail against highly networked adversaries, which is why we are
bolstering Joint Task Forces to protect our territory and embedding
border security professionals in other relevant departments and
agencies. Our components are working together on initiatives such as
the DHS MS-13 Working Group and the DHS Human Smuggling Cell. The
former, run by U.S. Customs and Border Protection (CBP) and U.S.
Immigration and Customs Enforcement (ICE), is identifying gang members
previously unknown to law enforcement. The latter is a multi-agency
unit staffed by personnel from across the Department that is allowing
us to bring together intelligence and operations to go after human
smuggling organizations more effectively.
We are also developing comprehensive plans to step up security in
the Western Hemisphere and to push the U.S. border outward by shutting
down TCOs and smuggling networks. For example, ICE's Biometric
Identification Transnational Migration Alert Program (BITMAP) is
helping train and equip foreign counterparts to collect biometric and
biographic data on persons of interest and potential threats. The data
allow us to map illicit pathways, discover emerging TCO trends, and
catch known or suspected terrorists and criminals while they are still
far from our border.
Beyond border security, DHS is improving almost every stage of the
vetting process for U.S.-bound travelers. Front-end investigations of
applicants are being modified to more quickly detect individuals with
terror ties, including through ICE's Visa Security Program. Security
checks are being brought into the digital age with measures like
continuous immigration vetting, a real-time, systematic process that
constantly analyzes visa files against law enforcement and intelligence
holdings to identify possible matches to derogatory information. At the
same time, we are gathering additional data from prospective travelers
to more effectively validate their identities and determine whether
they pose a risk to our country.
DHS is better leveraging Unclassified and Classified datasets to
find previously undetected threats. We have already seen real
successes. I cannot get into the details in this setting; suffice to
say that these enhancements have allowed us to detect and disrupt
terror suspects we likely would not have identified otherwise. And at
our ports of entry, CBP's Tactical Terrorism Response Teams are
connecting dots and finding suspicious individuals we might also have
otherwise slipped through the cracks.
In the medium term, DHS is aiming to streamline how we organize our
screening activities. We are examining specific ways to consolidate
screening functions, better integrate intelligence data, leverage law
enforcement information, and fuse our efforts to protect our country.
Both of the witnesses here with me today have been critical partners as
we do this and make sure our National vetting efforts are a top
priority.
The administration is also pursuing major initiatives to improve
international information sharing. Working with the State Department
and interagency, we are pressing foreign countries to provide us more
information on terrorists and criminals, and we are urging them to use
the information our Government already provides to catch global
jihadists and other threat actors residing in or transiting their
territory. DHS is exploring additional measures that could be taken to
require foreign governments to take swifter action and how we can
better assist them in doing so.
For the first time ever, DHS established a clear baseline for what
countries must do to help the United States confidently screen
travelers and immigrants from their territory. As required under
President Trump's Executive Order Protecting the Nation from Foreign
Terrorist Entry into the United States (EO 13780), all foreign
governments have been notified of the new standards, which include the
sharing of terrorist identities, criminal history information, and
other data needed to ensure public safety and National security, as
well as the condition that countries issue secure biometric passports,
report lost and stolen travel documents to INTERPOL, and take other
essential actions to prevent identity fraud.
DHS assessed whether countries met the new standards, in
consultation with the Department of State and the Department of
Justice. Countries that failed to do so were recommended to the
President for travel restrictions or other lawful limitations, which he
imposed through a Presidential proclamation in October. Most foreign
governments have met these minimum standards or are on the path to
doing so. For those that the President has designated for restrictions,
we have indicated that we will consider relief, but first they must
comply with these reasonable, baseline requirements.
This has nothing to do with race or religion, and our goal is not
to block people from visiting the United States. America has a proud
history as a beacon of hope to freedom-loving people from around the
world who want to visit our country or become a part of our enduring
democratic republic. Rather, the goal is to protect Americans and
ensure foreign governments are working with us--and not inhibiting us--
from stopping terrorists, criminals, and other National security threat
actors from traveling into our communities undetected.
We are also focused on working with our foreign partners to close
overseas security gaps that allow dangerous individuals to travel
uninhibited. Many countries, for instance, lack the border security
policies, traveler screening capabilities, intelligence information-
sharing practices, and legal tools to effectively stop terrorist
travel. DHS is examining the full array of tools at our disposal to
incentivize and assist foreign governments in making these improvements
so these individuals are caught before they reach our borders.
I commend the House Homeland Security Committee for examining these
matters as part of its Task Force on Denying Terrorists Entry into the
United States. As you prepare your final recommendations, the
Department stands ready to work with you to implement them.
DHS is not just concerned with threat actors but also threat
agents, such as weapons of mass destruction (WMD). Our intelligence
professionals have seen renewed terrorist interest in WMD and are aware
of concerning developments on these issues, which can be discussed
further in an appropriate setting. That is one reason why the
Department is setting up a focal point within DHS for our work to
protect Americans against chemical, biological, radiological, and
nuclear (CBRN) threats.
The Department's previous approach to addressing CBRN threats was
inadequate and our organization for this mission has been fragmented.
For nearly a decade, DHS considered internally reorganizing to ensure
our Department's counter-WMD efforts were unified. Given the growing
threats and the need to enhance DHS's ability to help respond, I
notified Congress of our intent to create a Countering Weapons of Mass
Destruction (CWMD) Office using the Secretary's re-organization
authority under Section 872 of the Homeland Security Act. We are
exercising this authority for a limited, internal re-organization to
achieve unity of command, and we intend to work collaboratively with
Congress formalize this office and ensure it is postured appropriately
to confront the threat. We look forward to continuing to engage with
this committee as we examine how to consolidate our counter-WMD
efforts, with the goal of ensuring our Nation is safer than ever
before.
preventing terrorist radicalization and recruitment in our communities
In addition to counterterrorism, the Department is rededicating
itself to terrorism prevention. Americans do not want us to simply stop
violent plots, they want us to keep them from materializing in the
first place. As part of this effort, we have launched an end-to-end
review of all DHS ``countering violent extremism,'' or CVE, programs,
projects, and activities. In the coming months we will work to ensure
our approach to terrorism prevention is risk-based and intelligence-
driven, focused on effectiveness, and provides appropriate support to
those on the front lines who we rely on to spot signs of terrorist
activity.
DHS efforts to combat terrorist recruitment and radicalization fall
into four primary lanes.
First, we are prioritizing education and community awareness.
Before terrorists have a chance to reach into communities and inspire
potential recruits, we are making sure those communities are aware of
the threat. This includes extensive outreach to States and localities,
awareness briefings, intelligence products regarding threats and
trends, training for front-line defenders and civic leaders, and more.
Second, we are focused on counter-recruitment. We know that
terrorists will continue to seek new followers through persuasion and
propaganda, which is why we must support efforts to actively push back
against such solicitations. This includes continuing to encourage non-
Governmental organizations to counter-message terrorist propaganda,
leveraging credible voices to dissuade potential recruits, working with
social media companies and supporting their efforts to make on-line
platforms more hostile to terrorists, and more.
Last month, I met with the Interior Ministries of the G7 countries
in Italy and some of the largest technology companies and discussed the
next steps the companies plan to take in the effort to prevent their
platforms from being misused by terrorists, including better
identifying on-line terrorist propaganda and shutting down terrorist
accounts. The meeting emphasized the importance of working together
with our foreign partners while we continue to engage industry on this
important issue. The U.S. Government has already made progress by
supporting the companies' efforts--including the establishment of the
Global Internet Forum to Counter Terrorism--to identify terrorist
content so they can voluntarily remove content that violates their
terms of service as soon as it is discovered.
Many companies, however, still have substantial challenges in
quickly identifying and addressing the volume of terrorist accounts and
propaganda on-line. DHS, along with interagency partners, will continue
sharing information and educating private-sector partners on how to
more quickly identify and address terrorist content. We will also
strongly emphasize the importance of counter-messaging and using
credible voices to fight back against the false narrative of terrorist
groups. Ultimately, as terrorists crowd-source their violence, the best
way to fight back is to turn the crowd against them.
Third, we are emphasizing the importance of early warning. Even
with strong community awareness and counter-recruitment, terrorist
groups will succeed in reaching at least some susceptible minds. That
is why we are working to detect potentially radicalized individuals and
terrorist activity earlier. This includes building trust between
communities and law enforcement, expanding ``If You See Something, Say
SomethingTM''-style campaigns, ensuring there are
appropriate and confidential means for the public to provide tips
regarding suspicious activity, and more.
Finally, DHS is looking at what more can be done to counter-
terrorist recidivism. It is inevitable that some individuals will be
recruited, radicalized, and attempt to engage in terrorist activity. So
we want to make sure that once they are caught they do not return to
violence. A number of inmates with terrorism affiliations are scheduled
for release from U.S. prisons in the next few years. We need to work
with the Department of Justice and its Bureau of Prisons, and other
interagency partners, to make sure they do not return to violence once
released. I look forward to engaging with the committee further on this
subject as we identify effective ways to prevent terrorist recidivism.
This summer the Department announced the award of $10 million in
grants to 26 organizations to advance terrorism prevention efforts.
These grants will help inform our efforts and illuminate what works--
and what doesn't work--in combating terrorist recruitment and
radicalization in our homeland. We look forward to sharing the results
with Congress.
I also want to note that although our terrorism prevention
activities will be risk-based, they will also be flexible enough to
address all forms of terrorism. Any ideologically-motivated violence
which is designed to coerce people or their governments should be
condemned, prevented, and countered. That is why our approach must be
agile so it can help mitigate everything from the global jihadist
threat to the scourge of violent racial supremacy. It must also engage
and not alienate communities targeted by these fanatics. This means
working with people of all races, religions, and creeds as partners in
the fight against terrorism.
securing soft targets
As I mentioned earlier, terrorists and other violent criminals are
placing significant emphasis on attacking soft targets. We have seen
this with recent tragedies in Nevada, New York, and Texas. Although the
Department has previously focused on enhancing the security of such
facilities, it has recently placed further emphasis on assisting the
critical infrastructure community to secure these vulnerable
facilities. For example, the National Protection and Programs
Directorate (NPPD) will make the Department the National leader on
technology, standards, and best practices relating to soft target
security. The intent of the effort is to:
Demonstrably reduce the risk of a successful attack on soft
targets;
Ensure the Department has the capability to support visible
efforts to enhance soft target security in order to safeguard
the American people;
Develop a center of gravity for Department-wide resources
available to support the critical infrastructure community in
securing soft targets;
Promote a dynamic process to identify and address soft
target security gaps based on threats and incidents.
Efforts such as the Hometown Security Initiative, in conjunction
with our programs that provide training and informational resources
focused on active-shooter preparedness, play a key role in preparing
facilities and their employees to proactively think about the role they
play in the safety and security of their businesses and communities.
In addition, the S&T SAFETY Act Program provides important legal
liability protections of qualified anti-terrorism technologies in order
to encourage the development and deployment of effective products and
services that enhance security. The Program is intended to provide
critical incentives for the development and deployment of anti-
terrorism technologies by providing liability protections for
``qualified anti-terrorism technologies.''
defending america's digital frontier
The past year marked a turning point in the cyber domain, putting
it in the forefront of public consciousness. We have long faced a
relentless assault against our digital networks from a variety of
threat actors. But this year, Americans saw hackers, cyber criminals,
and nation-states take their attacks to another level. Our adversaries
have and continue to develop advanced cyber capabilities. They have
deployed them to undermine critical infrastructure, target our
livelihoods and innovation, steal our secrets, and threaten our
democracy.
Cybersecurity has become a matter of National security, and one of
the Department's core missions. With access to tools that were
previously beyond their reach, non-state actors now have the ability to
cause wide-spread disruptions and possibly, destructive attacks. This
is redefining homeland security as we know it. And it is affecting
everyone, from businesses and governments to individuals who get swept
up in data breaches affecting millions of Americans.
Many of these threats are novel, as illustrated by the attacks on
the Ukrainian power grid in 2015 and 2016, and the use of internet-
connected consumer devices to conduct distributed denial-of-service
attacks. Other recent global cyber incidents, such as the WannaCry
ransomware incident in May and the NotPetya malware incident in June
2017, exploited known vulnerabilities in software commonly used across
the globe to create wide-spread disruptive effects and cause economic
loss.
DHS defends from these attacks and provides tools to mitigate on-
going incidents through the National Protection and Programs
Directorate (NPPD), which is in addition to protecting civilian Federal
networks collaborates with State, local, Tribal, and territorial
governments, and the private sector to defend against cyber threats.
Through vulnerability scanning, NPPD limited the scope of potential
incidents by helping stakeholders identify the vulnerability on their
networks so it could be patched before the incident impacted their
systems. Recognizing that not all users were able to install patches,
DHS shared additional mitigation guidance to assist network defenders.
As the incidents unfolded, DHS and our interagency partners led the
Federal Government's incident response efforts in accordance with
agencies' responsibilities set forth in Presidential Policy Directive
41, including providing situational awareness, information sharing,
malware analysis, and technical assistance to affected entities.
Cyber actors continue to target the energy sector with various
goals ranging from cyber espionage to developing the ability to disrupt
energy systems in the event of a hostile conflict. In one recent
campaign, advanced persistent threat actors targeted the cyber
infrastructure of entities within the energy, nuclear, critical
manufacturing, and other critical infrastructure sectors. In response,
DHS, the Federal Bureau of Investigation, and the U.S. Department of
Energy shared information to assist network defenders to identify and
reduce exposure to malicious activity.
In the face of these digital threats, it is a DHS priority to work
with Congress on legislation that would focus our cybersecurity and
critical infrastructure mission at NPPD. We are pursuing changes that
would streamline and elevate NPPD's mission. Through transition from a
headquarters component to a DHS operating component, with better
structure, the DHS Cyber and Infrastructure Security Agency would be
better-positioned to drive our cybersecurity mission.
We are also endeavoring to enhance cyber-threat information sharing
across the globe to stop attacks before they start--and to help
Americans quickly recover. We work closely with technology providers,
information-sharing and analysis centers, sector coordinating councils,
and critical infrastructure owners and operators to brief them on cyber
threats and provide mitigation recommendations, and our hunt and
incident response teams provide expert intrusions analysis and
mitigation guidance to stakeholders who request assistance in advance
of and in response to a cyber incident.
In all its cybersecurity efforts, DHS draws upon its experience in
emergency management and counterterrorism by taking a broad risk
management approach. DHS considers cybersecurity risk within the
landscape of overall threats to the Nation and an assessment of the
likely consequences of cyber incidents which may or may not result in
physical impacts.
To increase the security and resilience of non-Federal critical
infrastructure, DHS leverages information and expertise gained from the
Federal protective mission. DHS makes technical capabilities and
programs available to non-Federal entities and provides cybersecurity
information and recommendations to, and partners closely with, a
variety of private-sector, State, local, Tribal, and territorial, and
international stakeholders. This information and technical assistance
allows our stakeholders to make informed risk management decisions and
to improve their cybersecurity.
At the same time, the U.S. Secret Service and ICE Homeland Security
Investigations work closely with FBI, as well as other law enforcement
partners, to aggressively investigate, disrupt, and dismantle criminal
actors and organizations using cyber space to carry out their illicit
activities. The efforts of the network protection and law enforcement
experts must be increasingly coordinated within the Department and with
other agencies and non-Federal entities. Information about tactics and
trends obtained through law enforcement investigations inform other
network protection efforts, including those through NPPD, to raise the
defensive capabilities of the Nation. And the efforts of network
protectors can identify trends, practices, and potentially new victims
to shape law enforcement investigations. Together these efforts are an
important part of an overall National approach to deterrence by denying
malicious actors access to critical U.S. targets, increasing resilience
of networks, and by identifying and punishing those who try to use
cyber space for illicit purposes.
Bringing together its network protection, law enforcement, risk
mitigation, and emergency management expertise, DHS plays a lead role
in the Federal Government's response to cyber incidents. Such incidents
can result from malicious activity as well as natural or accidental
causes. NPPD and DHS law enforcement components provide assistance to
impacted entities. I&A and component intelligence offices play a
supporting role by providing relevant intelligence support to DHS
components from across the intelligence community. Sector-specific
agencies provide unique expertise and insights to response activities
and help DHS ensure that lessons learned from incidents are
incorporated into efforts to protect critical information systems. DHS
works closely with sector-specific agencies, the Department of Defense,
the Department of Justice, and the FBI before, during, and after
incidents.
In support of these operational efforts, DHS also works to
strengthen the overall security and reliability of the cyber ecosystem.
As cyber space is inherently global, DHS collaborates with the
international community to exchange and advocate for best practices and
promote the development and adoption of normative behavior to increase
security and reliability. Additionally, in order to build up capacity
for tackling emerging challenges and supporting the overall
cybersecurity mission, DHS drives research, development, and technology
transfer efforts and works with industry stakeholders to make the
internet and new technologies, like the internet of things, more
secure. Finally, DHS prioritizes the expansion of its human resource
programs to recruit, hire, develop, and retain personnel with strong
cybersecurity skillsets.
2017 hurricane season
To say the 2017 hurricane season has been historic is an
understatement. To date, we've had four hurricanes make landfall this
season, three of which have been major hurricanes (Harvey, Irma, and
Maria). Prior to Harvey making landfall on August 25, 2017, FEMA was
supporting 28 Presidentially-declared disasters. Since Hurricane Harvey
made landfall in Texas, the President has granted 14 Major Disaster
declarations and 14 Emergency Declarations, while FEMA has authorized
25 Fire Management Assistance Grant declarations. Hurricane Irma was
unique not only because it struck both the U.S. Virgin Islands and
Puerto Rico, but also because it struck the entire State of Florida.
Hurricane Maria, following in quick succession, then struck the U.S.
Virgin Islands and Puerto Rico, more than 1,000 nautical miles from the
mainland United States, devastating an area with already fragile
infrastructure and facing challenging economic circumstances. In a span
of 25 days, DHS, FEMA, and our partners deployed tens of thousands of
personnel across 270,000 square miles in three different regions.
The impacts of these events are substantial. Roughly 25.8 million
people were affected by these three storms--8 percent of the entire
U.S. population. As of November 13, 2017, more than 4.5 million
survivors registered for FEMA assistance, which is a greater number
than Hurricanes Katrina, Rita, Wilma, and Sandy combined. FEMA's
Individual and Households Program (IHP) has thus far approved almost
$2.5 billion in disaster assistance to respond to the three hurricanes,
a number we expect to continue to grow. As of mid-November, National
Flood Insurance Program (NFIP) policy holders filed approximately
121,000 claims, and the NFIP has paid over $5 billion to them.
DHS and FEMA alone cannot deliver assistance to this vast number of
survivors. Unity of effort is required for disaster response and
recovery on any scale, but especially during this historic season. When
emergency managers call for unity of effort, we mean that all levels of
government, non-profit organizations, private-sector businesses, and
survivors must work together--each drawing upon their unique skills and
capabilities--to meet the needs of disaster survivors.
For our part on the Federal level, FEMA called upon the vast
majority of their workforce, while I engaged over 3,800 other Federal
employees through the DHS ``Surge Capacity Force.'' This is
significant. FEMA employees come to FEMA knowing they will be deployed
into disaster areas, work in austere conditions, and assist survivors.
However, when personnel from other Federal agencies volunteer for the
Surge Capacity Force, they volunteer to leave their jobs and families,
receive just-in-time training, and work in an environment that is
completely unfamiliar and outside of their normal job responsibilities.
I am incredibly grateful to my colleagues from across the Federal
Government for supporting this important initiative, and for allowing
their hard-working and dedicated personnel to support disaster
survivors who have been impacted by these historic events. Over 22,300
members of the Federal workforce were deployed to Texas, Florida, the
U.S. Virgin Islands, and Puerto Rico. This includes 13,892 staff from
various offices of the Department of Defense, including the military
services. We could not do this without them.
conclusion
I want to emphasize that we are overhauling homeland security to
cope with changes in the threat landscape. Our leadership team is
breaking down legacy bureaucratic barriers to make DHS operate more
efficiently and effectively to counter threats to our Nation. We are
ramping up unity of effort within the Department and tight
collaboration with law enforcement, the intelligence community, and our
allies. And we are looking at ways to further integrate intelligence
and operations, so that our actions are driven by timely information
and that we respond quickly to new dangers.
Thank you for the opportunity to appear before you today and for
your continued support of DHS. I am committed to working with this
committee to forge a strong and productive relationship as we work to
achieve the shared objective of securing our homeland.
Chairman McCaul. Thank you, Madam Secretary.
The Chair recognizes the FBI director, Christopher Wray.
STATEMENT OF CHRISTOPHER A. WRAY, DIRECTOR, FEDERAL BUREAU OF
INVESTIGATION, U.S. DEPARTMENT OF JUSTICE
Mr. Wray. Thank you, Chairman McCaul, Ranking Member
Thompson, and Members of the committee, for the opportunity to
talk to you today about the threats that we face and the
tremendous work that is being done by the people of the FBI.
I will say that from my prior law enforcement and National
security experience, I already knew how outstanding and
dedicated the men and women of the FBI were, but I have to say
that from the past 3 months here in this job, seeing it from
this perch, has made me feel even more humbled and inspired to
work with them. The people that I get to work with every day
around the country and around the world are mission-focused.
They are passionate and they are utterly determined to be the
very best that they can be to protect the American people and
uphold the rule of law.
In coming back to Government after being gone for about 12
years, what struck me the most is some of the changes that I
have seen: The evolution of the threat, the changes in
technology, the capabilities that have been built. As I have
been getting briefed up on the work we are doing and
encountering first-hand how we do our work in today's
environment, like we just had in New York, what has really
struck me is the magnitude of the threats we face and the
diversity of the threats we face.
On the terrorism front, in addition to international
terrorist groups and home-grown violent extremists, we also
have domestic terrorists intending to influence or coerce our
Government through violent criminal activity. In the cyber
arena, we have not only nation-states, but also sophisticated
criminal actors. In our counterintelligence work, we face
threats from nation-states targeting not just our National
security secrets, but also our ideas and our innovation. They
are doing so not just through traditional intelligence
operatives, but through nontraditional collectors, like
scientists and students and businessmen.
On the terrorism issue in particular, my prior experience
had been very focused on large, structured organizations like
al-Qaeda. To be clear, we still confront threats from
organizations like al-Qaeda, planning large-scale attacks over
long periods of time. But we also face groups like ISIS, who
use social media to recruit followers remotely and to inspire
people to take to the streets with crude but effective weapons,
like hatchets and vehicles.
Smaller in scale but greater in volume, these
organizations, if you can call them organizations, move from
plotting to action in a very short period of time, with very
little planning, using low-tech and widely-available attack
methods. On top of that, these terrorists' use of social media
and encryption technology has made it harder to find their
messages of hate and destruction, leaving even fewer footprints
or dots for us to connect.
The good news is that I have also been very impressed and
pleased at the progress that the FBI has made, since I was last
working with them, particularly in the areas of intelligence
integration and partnerships. Intelligence is now heavily
integrated into every program the FBI has, into our overall
mission, our training, and it drives really everything we do.
In addition to that, the scope and strength of the partnerships
that the Bureau now has with our Federal partners, our State
and local counterparts, members of the intelligence community,
and our international partners are at a whole new level
compared to what I saw when I was in Government before.
So while remarkable progress has been made, we cannot
become complacent, and we need to keep improving to ensure that
we are up to the task in getting ahead of the threat.
As one example, we are now at risk of losing one of the key
tools in our toolkit that is invaluable to all of our National
security programs that I just mentioned. As I mentioned at the
beginning, the speed and agility of our terrorist and
intelligence adversaries has increased at a tremendous pace,
putting a huge premium on matching that speed and agility with
our ability to connect the dots. That is why reauthorization of
FISA section 702, which expires in just a few weeks, is so
incredibly important to our work. It is one of the most
powerful tools that we have to help us evaluate leads and
prioritize threat information. It can tell us quickly whether a
person here in the United States has ties to a terrorist
overseas or if there is someone overseas who is planning an
attack.
Mr. Chairman, Ranking Member, Members of this committee, I
look forward to working with you on these and other significant
challenges. I appreciate the opportunity to be with you today
and I look forward to answering your questions.
[The prepared statement of Mr. Wray follows:]
Prepared Statement of Christopher A. Wray
November 30, 2017
Good morning Chairman McCaul, Ranking Member Thompson, and Members
of the committee. Thank you for the opportunity to appear before you
today to discuss the current threats to the homeland. Our Nation
continues to face a multitude of serious and evolving threats ranging
from home-grown violent extremists to cyber criminals to hostile
foreign intelligence services and operatives. Keeping pace with these
threats is a significant challenge for the FBI. As an organization, we
must also be able to stay current with constantly changing and new
technologies that make our jobs both easier and harder. Our
adversaries--terrorists, foreign intelligence services, and criminals--
take advantage of such modern technology to hide their communications,
recruit followers, plan and encourage espionage, cyber attacks, or
terrorism, to disperse information on different methods to attack the
U.S. homeland, and to facilitate other illegal activities. As these
threats evolve, we must adapt and confront these challenges, relying
heavily on the strength of our Federal, State, local, and international
partnerships.
counterterrorism
Preventing terrorist attacks remains the FBI's top priority. The
terrorist threat against the United States remains persistent and
acute. From a threat perspective, we are concerned with three areas in
particular: (1) Those who are inspired by terrorist propaganda and act
out in support; (2) those who are enabled to act after gaining
inspiration from extremist propaganda and communicating with members of
foreign terrorist organizations who provide guidance on operational
planning or targets; and (3) those who are directed by members of
foreign terrorist organizations to commit specific, directed acts in
support of the group's ideology or cause. Prospective terrorists can
fall into any one of these three categories or span across them, but in
the end the result is the same--innocent men, women, and children
killed and families, friends, and whole communities left to struggle in
the aftermath.
Currently, the FBI has designated the Islamic State of Iraq and al-
Sham (``ISIS'') and home-grown violent extremists as the main terrorism
threats to the homeland. ISIS is relentless and ruthless in its
campaign of violence and has aggressively promoted its hateful message,
attracting like-minded extremists. The threats posed by foreign
fighters, including those recruited from the United States, are
extremely dynamic. These threats remain the highest priority and create
the most serious challenges for the FBI, the U.S. intelligence
community, and our foreign, State, and local partners. We continue to
identify individuals who seek to join the ranks of foreign fighters
traveling in support of ISIS, as well as home-grown violent extremists
who may aspire to attack the United States from within. In addition, we
are confronting a surge in terrorist propaganda and training available
via the internet and social networking media. Due to on-line
recruitment and indoctrination, foreign terrorist organizations are no
longer dependent on finding ways to get terrorist operatives into the
United States to recruit and carry out acts. Terrorists in ungoverned
spaces--both physical and cyber--readily disseminate propaganda and
training materials to attract easily influenced individuals around the
world to their cause. They encourage these individuals to travel, or
they motivate them to act at home. This is a significant transformation
from the terrorist threat our Nation faced a decade ago.
Unlike other groups, ISIS has constructed a narrative that touches
on all facets of life, from career opportunities to family life to a
sense of community. The message isn't tailored solely to those who are
overtly expressing signs of radicalization. It is seen by many who
click through the internet every day, receive social media push
notifications, and participate in social networks. Ultimately, many of
the individuals drawn to ISIS seek a sense of belonging. Echoing other
terrorist groups, ISIS has advocated for lone-offender attacks in
Western countries. Recent ISIS videos and propaganda specifically
advocate for attacks against soldiers, law enforcement, and
intelligence community personnel.
Many foreign terrorist organizations use various digital
communication platforms to reach individuals they believe may be
susceptible and sympathetic to extremist messages, however, no group
has been as successful at drawing people into its perverse ideology as
ISIS. ISIS has proven dangerously competent at employing such tools for
its nefarious strategy. ISIS uses high-quality, traditional media
platforms, as well as wide-spread social media campaigns to propagate
its extremist ideology. Social media also helps groups such as ISIS to
spot and assess potential recruits. With the wide-spread distribution
of social media, terrorists can spot, assess, recruit, and radicalize
vulnerable persons of all ages in the United States either to travel or
to conduct a homeland attack. Through the internet, terrorists overseas
now have direct access into our local communities to target and recruit
our citizens and spread the message of radicalization faster than we
imagined just a few years ago.
ISIS is not the only terrorist group of concern. Al-Qaeda maintains
its desire for large-scale spectacular attacks, however continued CT
pressure has degraded the group, and in the near term al-Qaeda is more
likely to focus on supporting small-scale, readily achievable attacks
against U.S. and allied interests in the Afghanistan/Pakistan region.
Simultaneously, over the last year, propaganda from al-Qaeda leaders
seeks to inspire individuals to conduct their own attacks in the United
States and the West.
In addition to foreign terrorist organizations, domestic extremist
movements collectively pose a steady threat of violence and economic
harm to the United States. Some trends within individual movements will
shift as most drivers for domestic extremism, such as perceptions of
Government or law enforcement overreach, socio-political conditions,
and reactions to legislative actions, remain constant. We are most
concerned about the lone offender attacks, primarily shootings, as they
have served as the dominant mode for lethal domestic extremist
violence. We anticipate law enforcement, racial minorities, and the
U.S. Government will continue to be significant targets for many
domestic extremist movements.
As the threat to harm the United States and U.S. interests evolves,
we must adapt and confront these challenges, relying heavily on the
strength of our Federal, State, local, and international partnerships.
The FBI is using all lawful investigative techniques and methods to
combat these terrorist threats to the United States. Along with our
domestic and foreign partners, we are collecting and analyzing
intelligence concerning the on-going threat posed by foreign terrorist
organizations and home-grown violent extremists. We continue to
encourage information sharing, which is evidenced through our
partnerships with many Federal, State, local, and Tribal agencies
assigned to Joint Terrorism Task Forces around the country. Be assured,
the FBI continues to strive to work and share information more
efficiently, and to pursue a variety of lawful methods to help stay
ahead of threats to the homeland.
intelligence
Integrating intelligence in all we do remains a critical strategic
pillar of the FBI strategy. The constant evolution of the FBI's
intelligence program will help us address the ever-changing threat
environment. We must constantly update our intelligence apparatus to
improve the way we use, collect, and share intelligence to better
understand and defeat our adversaries. We cannot be content to only
work the matters directly in front of us. We must also look beyond the
horizon to understand the threats we face at home and abroad and how
those threats may be connected.
To that end, we gather intelligence, consistent with our
authorities, to help us understand and prioritize identified threats,
to reveal the gaps in what we know about these threats, and to fill
those gaps. We do this for National security and criminal threats, on
both a National and local field office level. We then compare the
National and local perspectives to organize threats into priorities for
each of the FBI's 56 field offices. By categorizing threats in this
way, we place the greatest focus on the gravest threats we face. This
gives us a better assessment of what the dangers are, what's being done
about them, and where we should prioritize our resources.
Integrating intelligence and operations is part of the broader
intelligence transformation the FBI has undertaken in the last decade
to improve our understanding and mitigation of threats. Over the past
few years, we have taken several steps to improve this integration.
First, we established an Intelligence Branch within the FBI, headed by
an executive assistant director who drives integration across the
enterprise. We also developed and implemented a series of integration-
focused forums that ensure all members of our workforce understand and
internalize the importance of intelligence integration. We now train
our special agents and intelligence analysts together at the FBI
Academy where they engage in joint training exercises and take core
courses together prior to their field deployments. As a result, they
are better prepared to integrate their skill sets in the field.
Additionally, our training forums for executives and front-line
supervisors continue to ensure our leaders are informed about our
latest intelligence capabilities and allow them to share best practices
for achieving intelligence integration.
I also urge the Congress to renew section 702 of the Foreign
Intelligence Surveillance Act (``FISA''), which is due to sunset at the
end of this year. Section 702 is a critical tool that the intelligence
community uses properly to target non-U.S. persons located outside the
United States to acquire information vital to our National security. To
protect privacy and civil liberties, this program has operated under
strict rules and been carefully overseen by all three branches of the
Government. Given the importance of section 702 to the safety and
security of the American people, the administration urges Congress to
reauthorize title VII of FISA without a sunset provision.
counterintelligence
The Nation faces a rising threat, both traditional and asymmetric,
from hostile foreign intelligence services and their proxies.
Traditional espionage, often characterized by career foreign
intelligence officers acting as diplomats or ordinary citizens, and
asymmetric espionage, often carried out by students, researchers, or
business people operating front companies, is prevalent. Foreign
intelligence services not only seek our Nation's State and military
secrets, but they also target commercial trade secrets, research and
development, and intellectual property, as well as insider information
from the Federal Government, U.S. corporations, and American
universities. Foreign intelligence services and other State-directed
actors continue to employ more creative and more sophisticated methods
to steal innovative technology, critical research and development data,
and intellectual property, in an effort to erode America's economic
leading edge. These illicit activities pose a significant threat to
National security and continue to be a priority and focus of the FBI.
Our counterintelligence efforts are also aimed at the growing scope
of the insider threat--that is, when trusted employees and contractors
use their legitimate access to steal secrets for personal benefit or to
benefit a company or another country. This threat has been exacerbated
in recent years as businesses have become more global and increasingly
exposed to foreign intelligence organizations. We are also
investigating media leaks, when insiders violate the law and betray the
Nation's trust by selectively leaking Classified information, sometimes
mixed with disinformation, to manipulate the public and advance their
personal agendas.
In addition to the insider threat, the FBI has focused on a
coordinated approach across divisions that leverages both our classic
counter-espionage tradecraft and our technical expertise to more
effectively identify, pursue, and defeat hostile State actors using
cyber means to penetrate or disrupt U.S. Government entities or
economic interests.
Finally, we have initiated a media campaign to increase awareness
of the threat of economic espionage. As part of this initiative, we
have made a threat awareness video, titled ``The Company Man'',
available on our public website, which has been shown thousands of
times to raise awareness and generate referrals from the private
sector.
cyber
Virtually every National security and criminal threat the FBI faces
is cyber-based or technologically-facilitated. We face sophisticated
cyber threats from foreign intelligence agencies, hackers for hire,
organized crime syndicates, and terrorists. These threat actors
constantly seek to access and steal our Nation's Classified
information, trade secrets, technology, and ideas--all of which are of
great importance to our National and economic security. They seek to
strike our critical infrastructure and to harm our economy.
As the committee is well aware, the frequency and impact of cyber
attacks on our Nation's private-sector and Government networks have
increased dramatically in the past decade and are expected to continue
to grow. We continue to see an increase in the scale and scope of
reporting on malicious cyber activity that can be measured by the
amount of corporate data stolen or deleted, personally identifiable
information compromised, or remediation costs incurred by U.S. victims.
Within the FBI, we are focused on the most dangerous malicious cyber
activity: High-level intrusions by State-sponsored hackers and global
organized crime syndicates, as well as other technically sophisticated
attacks.
Botnets used by cyber criminals are one example of this trend and
have been responsible for billions of dollars in damages over the past
several years. The wide-spread availability of malicious software
(malware) that can create botnets allows individuals to leverage the
combined bandwidth of thousands, if not millions, of compromised
computers, servers, or network-ready devices to conduct attacks. Cyber
threat actors have also increasingly conducted ransomware attacks
against U.S. systems, encrypting data and rendering systems unusable--
victimizing individuals, businesses, and even public health providers.
Cyber threats are not only increasing in scope and scale, they are
also becoming increasingly difficult to investigate. Cyber criminals
often operate through on-line forums, selling illicit goods and
services, including tools that can be used to facilitate cyber attacks.
These criminals have also increased the sophistication of their
schemes, which are more difficult to detect and more resilient.
Additionally, many cyber actors are based abroad or obfuscate their
identities by using foreign infrastructure, making coordination with
international law enforcement partners essential.
The FBI is engaged in a myriad of efforts to combat cyber threats,
from improving threat identification and information sharing inside and
outside of Government, to developing and retaining new talent, to
examining the way we operate to disrupt and defeat these threats. We
take all potential threats to public and private-sector systems
seriously and will continue to investigate and hold accountable those
who pose a threat in cyber space.
going dark
The rapid pace of advances in mobile and other communication
technologies continues to present a significant challenge to conducting
court-ordered electronic surveillance of criminals and terrorists.
Unfortunately, there is a real and growing gap between law
enforcement's legal authority to access digital information and its
technical ability to do so. The FBI refers to this growing challenge as
``Going Dark,'' and it affects the spectrum of our work. In the
counterterrorism context, for instance, our agents and analysts are
increasingly finding that communications and contacts between groups
like ISIS and potential recruits occur in encrypted private messaging
platforms.
The exploitation of encrypted platforms presents serious challenges
to law enforcement's ability to identify, investigate, and disrupt
threats that range from counterterrorism to child exploitation, gangs,
drug traffickers and white-collar crimes. We respect the right of
people to engage in private communications, regardless of the medium or
technology. Whether it is instant messages, texts, or old-fashioned
letters, citizens have the right to communicate with one another in
private without unauthorized Government surveillance, because the free
flow of information is vital to a thriving democracy. Our aim is not to
expand the Government's surveillance authority, but rather to ensure
that we can obtain electronic information and evidence pursuant to the
legal authority that Congress has provided to us to keep America safe.
The benefits of our increasingly digital lives, however, have been
accompanied by new dangers, and we have seen how criminals and
terrorists use advances in technology to their advantage.
The more we as a society rely on electronic devices to communicate
and store information, the more likely it is that information that was
once found in filing cabinets, letters, and photo albums will now be
stored only in electronic form. When changes in technology hinder law
enforcement`s ability to exercise investigative tools and follow
critical leads, those changes also hinder efforts to identify and stop
terrorists who are using social media to recruit, plan, and execute an
attack in our country.
In the criminal context, we are seeing more and more cases where we
believe significant evidence resides on a phone, a tablet, or a
laptop--evidence that may be the difference between an offender being
convicted, or acquitted. If we cannot access this evidence, it will
have on-going, significant impacts on our ability to identify, stop,
and prosecute these offenders. In the first 10 months of this fiscal
year, the FBI was unable to access the content of more than 6,000
mobile devices using appropriate and available technical tools, even
though there was legal authority to do so. This figure represents
slightly over half of all the mobile devices the FBI attempted to
access in that time frame.
Where at all possible, our agents develop investigative workarounds
on a case-by-case basis, including by using physical world techniques
and examining non-content sources of digital information (such as
metadata). As an organization, the FBI also invests in alternative
methods of lawful engineered access. Ultimately, these efforts, while
significant, have severe constraints. Non-content information, such as
metadata, is often simply not sufficient to meet the rigorous
Constitutional burden to prove crimes beyond a reasonable doubt.
Developing alternative technical methods is typically a time-consuming,
expensive, and uncertain process. Even when possible, such methods are
difficult to scale across investigations, and may be perishable due to
a short technical life cycle or as a consequence of disclosure through
legal proceedings.
Some observers conceive of this challenge as a tradeoff between
privacy and security. In our view, the demanding requirements to obtain
legal authority to access data--such as by applying to a court for a
warrant or a wiretap--necessarily already account for both privacy and
security. The FBI is actively engaged with relevant stakeholders,
including companies providing technological services, to educate them
on the corrosive effects of the Going Dark challenge on both public
safety and the rule of law.
weapons of mass destruction
The FBI, along with its U.S. Government partners, is committed to
countering the Weapons of Mass Destruction (``WMD'') threat (e.g.,
chemical, biological, radiological, nuclear) and preventing terrorist
groups and lone offenders from acquiring these materials either
domestically or internationally.
Domestically, the FBI's counter-WMD threat program, in
collaboration with our U.S. Government partners, prepares for and
responds to WMD threats (e.g., investigate, detect, search, locate,
diagnostics, stabilization, and render safe WMD threats).
Internationally, the FBI, in cooperation with our U.S. partners,
provides investigative and technical assistance as well as capacity-
building programs to enhance our foreign partners' ability to detect,
investigate, and prosecute WMD threats.
conclusion
Finally, the strength of any organization is its people. The
threats we face as a Nation have never been greater or more diverse and
the expectations placed on the Bureau have never been higher. Our
fellow citizens look to us to protect the United States from all of
those threats, and the men and women of the Bureau continue to meet and
exceed those expectations, every day. I want to thank them for their
dedication and their service.
Chairman McCaul, Ranking Member Thompson, and committee Members, I
thank you for the opportunity to testify concerning the threats to the
homeland. I am happy to answer any questions you might have.
Chairman McCaul. Thank you, Director.
The Chair recognizes the NCTC director, Rasmussen.
STATEMENT OF NICHOLAS J. RASMUSSEN, DIRECTOR, THE NATIONAL
COUNTERTERRORISM CENTER, OFFICE OF THE DIRECTOR OF NATIONAL
INTELLIGENCE
Mr. Rasmussen. Thank you, Mr. Chairman and Ranking Member
Thompson and Members of the committee. As I mentioned during my
testimony before the committee last year, the array of
terrorist actors around the globe is broader, wider, and deeper
than it has been at any point since September 11, 2001. As we
meet here today, the discipline of terrorism prevention is
literally changing beneath our feet every day, and it requires
that we respond with extraordinary agility and flexibility.
I would like to take the opportunity today to share what I
have seen in the way of changes in the terrorism landscape
since I last testified before the committee. I will also say a
few words about areas where we can do a better job of tackling
the threat of those in the homeland who are mobilized to
extremist violence and to strengthen our CT capabilities.
So let me begin with what has changed or what is new with
the overall threat. Those developments fall into three primary
areas. The first of these is the coalition's success in
shrinking the territory that ISIS controls in Iraq and Syria as
compared to a year ago.
The second major trend is an uptick in attacks inspired by
ISIS that we have seen against Western interests around the
globe in the last year as compared to attacks that are directed
by the group from their headquarters in Iraq and Syria.
The third trend I would point to is the resurgence of
aviation threats reaching a level of concern that we in the
intelligence community have not faced since AQAP's printer
package plot back in 2010.
So to start first with ISIS's losses on the battlefield.
ISIS is clearly facing significant battlefield pressure from
U.S. forces and the coalition, and the size of the territory
the group controls is shrinking day by bay. As ISIS copes with
that territorial loss, though, the group will look to preserve
its capabilities by operating more as a covert terrorist
organization and as an insurgency from its few remaining
strongholds in Iraq and Syria. Now, this is undoubtedly good
news. We are winning on the battlefield, but unfortunately,
territorial losses have not translated into a corresponding
reduction in the group's ability to inspire attacks, even
including here at home.
In over the last year, ISIS has inspired numerous attacks,
particularly in the United Kingdom and Europe, and most
recently right at home, as has been discussed earlier, in New
York City on Halloween. The number of arrests and disruptions
we have seen around the globe, while that is a testament to
effective law enforcement and intelligent work, it also tells
us that the global reach of ISIS remains largely intact, even
as the group is being decisively defeated on the battlefield.
Now that uptick in inspired attacks stands in contrast to
the pattern of attacks we saw that were directed and enabled by
the group from Syria in 2015 and 2016. So far this year,
though, we have not seen the group successfully direct a large-
scale sophisticated attack like the Paris and Brussels attacks
in previous years. But the number of inspired attacks, as
Director Wray mentioned, is clearly on the rise. All of this
underscores our belief that there is not a direct link between
the battlefield position of ISIS in Iraq and their capacity to
continue inspiring external attacks. So battlefield losses are
not enough, not sufficient to mitigate alone the threat from
ISIS.
It is also worth me saying, even as we are focused on ISIS
as a primary terrorism challenge, that al-Qaeda has never
stopped being a primary counterterrorism challenge for the
United States and a top tier priority. So even as we point to
ISIS, we continue to see the continued evolution of al-Qaeda as
a resilient organization. We know that al-Qaeda retains the
capability intent to carry out attacks against our allies
around the world.
I will touch quickly now on the third development that has
stood out in the threat environment: The threat to civil
aviation. There is a long history to terrorists seeking
innovative means to carry out aviation attacks. Aviation has
taken center stage again this year, as evidenced by Australian
authorities disrupting a plot back in July by terrorists to
bring explosives aboard an aircraft.
Terrorists have shown themselves to be persistent, out-of-
the-box thinkers with respect to aviation. Aviation-related
threats have long been and will remain near or at the top of
the things that demand our focused attention.
This brings me to my final point: We need to do a better
job of tackling the threat of those mobilized to extremist
violence, particularly here in the homeland. One of things we
do in the intelligence world quite well--that we do quite well,
but we are always looking to improve on--is collecting
intelligence and sharing it with those who need it. We share it
across our various Federal agencies and increased partners
around the country. We also do a great job of pushing
Unclassified information to partners around the country.
But beyond just sharing intelligence, there is certainly
more we can do to prevent home-grown violent extremists from
becoming radicalized, and we need to improve the toolkit that
we use to deal with this problem. In short, we must expand our
investment in terrorist prevention, specifically here in the
homeland, doing what we can to prevent the recruitment of
American youth and ensure that communities are equipped to
respond and prevent all forms of violence.
Now I am proud of the good work that I do, that my folks at
NCTC do in this area, along with Director Wray and Secretary
Duke's teams on this matter, but it is something that I am sure
we could do better at, and I'm sure we should do on a greater
scale. By leveraging all aspects of the elements of the Federal
Government, working with State and local partners, I am certain
that we can create a better and more significant culture of
prevention and resilience across the United States.
I will end there, Mr. Chairman, and once again thank you
and the committee for your continued support of the work we are
doing at NCTC. Speaking personally, thank you for your
friendship, the committee's friendship, and the kind words that
you used earlier today as I move on from Federal Government
service and step down from NCTC at the end of December. But
even though I am grateful for your kind words, I am also
mindful that, whenever I appear before you, I am standing on
the shoulders of many hundreds of talented women and men at
NCTC. Serving alongside those professionals has been the honor
of my life. It is their amazing work that I bring before you as
their representative, and I look forward to answering your
questions. Thank you.
[The prepared statement of Mr. Rasmussen follows:]
Prepared Statement of Nicholas J. Rasmussen
November 30, 2017
Thank you, Chairman McCaul, Ranking Member Thompson, and Members of
the committee, for the opportunity to be with you today. I am pleased
to be joined by my colleagues and close partners, Acting Secretary
Elaine Duke from the Department of Homeland Security (DHS), and
Director Christopher Wray of the Federal Bureau of Investigation (FBI).
threat overview
Over the past 16 years, we have made tremendous progress in our
ability to detect and prevent catastrophic attacks like September 11,
2001. We, along with many of our partners, have built a National
security apparatus that has substantially expanded our ability to
protect the safety and security of our communities. We share more
information--with more frequency and with more partners--than we ever
would have imagined possible a decade ago. And, we have reduced
external threats emanating from core al-Qaeda and the self-proclaimed
Islamic State of Iraq al-Sham, or ISIS, due to aggressive
counterterrorism (CT) actions against these groups.
However, both ISIS and al-Qaeda have proven to be extremely
resilient organizations. ISIS's strategy to project its influence
world-wide, despite geographic losses in Iraq and Syria, by using
attacks and propaganda perpetuates fear and continues to attract
violent extremists who wish to do us harm. Other terrorist groups
around the world also continue to exploit safe havens created by
ungoverned spaces and threaten the United States and our allies.
Therefore, despite the progress we have made, it is our assessment that
the current terrorism threat environment is complex, challenging, and
geographically expansive, as we saw with recent attacks throughout
Europe, in Egypt, and of course in New York City on Halloween. It is
also our assessment that NCTC, along with our Federal partners, must
expand our investment in terrorism prevention, specifically in the
homeland to prevent the recruitment of American youth and ensure we are
equipped to respond to and prevent all forms of violence.
hves
First, allow me to provide an overview of the most immediate threat
to the Homeland which is the threat of violence carried out by
Homegrown Violent Extremists (HVEs), which unfortunately, the recent
vehicle attack in New York City made painfully clear. While there are
multiple factors that mobilize HVEs to violence, ISIS's large-scale
media and propaganda efforts will likely continue to reach and
influence HVEs in the United States. Despite the recent tragic events
in New York, there have been fewer attacks in the United States this
year than the past 2 years, and we are working to determine the
potential factors that may be responsible for this decrease in
successful attacks. Arrests of HVEs remain at similar levels.
What we have seen over time is that HVEs--either lone actors or
small insular groups--tend to gravitate toward soft targets and simple
tactics of opportunity that do not require advanced skills or outside
training. We expect that most HVEs will continue to focus on soft
targets, while still considering traditional targets, such as military
personnel, law enforcement, and other symbols of the U.S. Government.
Some HVEs--such as the Orlando shooter in June 2016 and the San
Bernardino shooters in December 2015--may have conducted attacks
against personally significant targets. The convergence of violent
extremist ideology and personal grievances or perceived affronts likely
played a role in motivating these HVEs to attack. We are still working
to learn more about what may have motivated suspects in other recent
attacks.
isis
ISIS continues to pursue multiple avenues of attack with varying
levels of support provided by the group. Over the course of the year we
have seen a spectrum of attack plots. This spectrum ranges from those
``inspired'' by the group--in which ISIS claims responsibility for
attacks where the attackers had no direct ties to the group--to attacks
``enabled'' by the group--when ISIS reaches out to individuals through
secure communications to prompt an attack--to ``directed'' ones, in
which the group provides direct support from Iraq and Syria to attempt
attacks.
ISIS's reach and narrative, rooted in unceasing warfare against all
enemies, extends beyond the Syria-Iraq battlefield. Since 2014, ISIS
has conducted or inspired attacks ranging in tactics and targets--the
bombing of a Russian airliner in Egypt; the attacks in Paris at
restaurants, a sports stadium, and a concert venue; the killing of
hostages and law enforcement officials at a cafe in Bangladesh; and the
growing number of vehicle attacks such as those carried out in Europe
over the past year--all of which demonstrate how ISIS can capitalize on
local networks on the ground for attacks. The threat landscape is less
predictable and, while the scale of the capabilities currently
demonstrated by most of these violent extremist actors does not rise to
the level that core al-Qaeda had on 9/11, it is fair to say that we
face more threats originating in more places and involving more
individuals than we have at any time in the past 16 years.
As we saw with the July arrests in Australia, and with the attacks
in Belgium and Istanbul last year, terrorists remain focused on
aviation targets because they recognize the economic damage that may
result from even unsuccessful attempts to either down aircraft or
attack airports, as well as the potential high loss of life, and the
attention the media devotes to these attacks. ISIS continues to
innovate and test for security vulnerabilities in order to further its
external operations and challenge our security apparatus. Since the 9/
11 attacks, world-wide security improvements have hardened the aviation
sector but have not entirely removed the threat. Violent extremist
publications continue to promote the desirability of aviation attacks
and have provided information on how to target the air domain.
For these reasons, shrinking the size of territory controlled by
ISIS, and denying the group access to additional manpower and funds in
the form of foreign terrorist fighters and operatives, as well as oil
revenue and other financial resources, remains a top priority. Success
in these areas will ultimately be an essential part of our efforts to
continue reducing the group's ability to pursue external attacks and
diminish its global reach and impact. We have made clear progress in
these areas: ISIS has lost over 90 percent of the territory it once
controlled in both Iraq and Syria; the number of fighters it has in
those countries is significantly down, and its illicit income streams
are down. But despite this progress, ISIS's ability to carry out
terrorist attacks in Syria, Iraq, and abroad has not yet been
sufficiently diminished, and the consistent tempo of ISIS-linked
terrorist activity is a reminder of the group's continued global reach.
The group's external operations capability has been building and
entrenching during the past 2 years, and we do not think battlefield
losses alone will be sufficient to degrade its terrorism capabilities.
As we have seen, the group has launched attacks in periods when it held
large swaths of territory as well as when under significant pressure
from the defeat-ISIS campaign. In addition to its efforts to conduct
external attacks from its safe havens in Iraq and Syria, ISIS's
capacity to reach sympathizers around the world through its robust
social media capability is unprecedented and gives the group access to
large numbers of HVEs.
Over the last 2 years, ISIS has lost several key leaders whose
deaths deprive the group of senior members with unique skillsets.
However, the group's effective propaganda continues to inspire violence
even after the removal of key spokesmen, as we have seen by the range
of radicalized individuals who continue to look to statements by
deceased terrorist figures for guidance and justifications to conduct
attacks. ISIS's media enterprise will probably continue to redirect its
narrative away from losses to emphasize new opportunities, as seen with
ISIS's recent media attention to territories outside the areas it
formerly held in Syria and Iraq. It may also try to paint losses as a
rallying cry for revenge against local security forces and
international CT-actors, including the United States. Despite
international efforts to prevent terrorism on-line, the volume of media
availability and its spread across a multitude of platforms and
websites will continue to be a challenge but we are steadfast in our
containment measures.
Deceased ISIS spokesman and external operations leader Abu Muhammad
al-Adnani's final public statement encouraged ISIS supporters in the
United States to conduct attacks at home instead of traveling to Iraq
and Syria, suggesting that ISIS recognizes the difficulty in sending
operatives to the homeland for an attack. ISIS likely views the United
States as a harder target than Europe because it is further away, U.S.
ports of entry are under far less stress from mass migration, and U.S.
law enforcement agencies are not overtaxed by persistent unrest, as are
some of our counterparts overseas.
The threat environment in Europe is increasingly being driven by
Europe-based individuals and small cells who are inspired by ISIS's
call to act or receive general guidance from ISIS members elsewhere in
the world. The combination of Europe-based operatives and simpler
tactics makes identifying, prioritizing, and disrupting these
individuals' plots more difficult for our European partners to detect
and, is a dynamic that the U.S. Government must consider in order to
effectively aid our European counterparts in identifying and disrupting
future attacks.
ISIS's leveraging of criminal, familial, and communal ties
contributes to its ability to advance plotting in Europe. Many
operatives involved in attacks since 2015 have had similar histories of
criminal involvement, often petty crime, before becoming radicalized.
ISIS's cadre of foreign terrorist fighters remains key in planning
and executing external attacks. While only three of the nearly 50
attacks in Europe since 2015 involved foreign terrorist fighter
returnees, those attacks caused over half of the fatalities, suggesting
that combat experience plays a role in the success of a sophisticated
attack. Two years ago, we confirmed that ISIS successfully sent several
operatives--including at least two of the Paris attackers--from Syria
to Western Europe by having them blend in with the flow of some 1
million migrants, asylum seekers, and refugees who traveled from Turkey
to Greece in 2015. We have not seen ISIS successfully replicate this
attack method in more than a year, probably because of increased border
security and information sharing among our European partners.
al-qaeda
We remain concerned about al-Qaeda's safe haven in Syria because of
the presence of veteran al-Qaeda operatives there, some who have been
part of the group since before the September 11 attacks, and who are
exploiting the conflict there to threaten the United States and our
allies.
The Nusrah Front, also known as Hayat Tahrir al-Sham, is al-Qaeda's
largest affiliate and one of the most capable armed groups operating in
Syria. Its integration of al-Qaeda veterans provides the group with
strategic guidance and enhances its standing within the al-Qaeda global
movement. We believe the Nusrah Front's statement in July 2016
announcing the separation of the group from the broader al-Qaeda
movement was in name only and that Nusrah Front remains part of al-
Qaeda, supporting its ideology and intent to target the West. We will
continue our efforts to counter this group and the threats it poses to
the West.
Al-Qaeda in the Arabian Peninsula, the only known al-Qaeda
affiliate to have attempted a directed attack against the United
States, continues to exploit the conflict in Yemen to gain new recruits
and secure areas of safe-haven, contributing to its enduring threat.
The group continues to threaten and call for attacks against the United
States in its prolific media production, which includes its English-
language Inspire magazine providing instruction and ideological
encouragement for individual actors.
We have constrained al-Qaeda's effectiveness and its ability to
recruit, train, and deploy operatives from its safe haven in South
Asia; however, this does not mean that the threat from core al-Qaeda in
the tribal areas of Pakistan or in eastern Afghanistan has been
eliminated. We believe that al-Qaeda and its adherents in the region
still aspire to conduct attacks and will remain a threat as long as the
group can potentially regenerate capability to threaten the homeland
with large-scale attacks. Al-Qaeda's allies in South Asia--particularly
the Taliban and the Haqqani Network--also continue to present a high
threat to our regional interests.
We are also cognizant of the level of risk the United States may
face over time if al-Qaeda regenerates, finds renewed safe haven, or
restores lost capability. We are on alert for signs that al-Qaeda's
capability to attack the West from South Asia is being restored and
would warn immediately if we find trends in that direction.
We also see increasing competition between violent extremist actors
within South Asia itself, between and among the Taliban, ISIS's branch
in South Asia, and al-Qaeda. This is an additional dynamic that we are
working to understand. While conflict among terrorist groups may well
distract them from their core mission of plotting attacks against
Western targets, conflict also serves to introduce a degree of
uncertainty into the terrorism landscape that raises questions that I
don't think we have answers to yet. This is something we are watching
very closely.
hizballah/iran
In keeping with the diverse set of threats we face, I would be
remiss not to briefly call out the malign activities of Iran and its
partner, Lebanese Hizballah. Iran remains the foremost state sponsor of
terrorism, providing financial aid, advanced weapons and tactics, and
direction to militant and terrorist groups across the Middle East, all
while it cultivates its own network of operatives across the globe as
part of its international attack infrastructure.
Lebanese Hizballah during recent years has demonstrated its intent
to foment regional instability, by deploying thousands of fighters to
Syria to fight for the Syrian regime; providing weapons, tactics, and
direction to militant and terrorist groups in Iraq and Yemen; and
deploying operatives to Azerbaijan, Egypt, Thailand, Cyprus, and Peru
to lay the groundwork for attacks. The group also has devoted
significant resources to expanding its arsenal, including advanced
rocket and missile capabilities that threaten interests along the
eastern Mediterranean and across the Arabian Peninsula.
In the homeland, FBI's arrest in June of two operatives charged
with working on behalf of Hizballah was a stark reminder of Hizballah's
continued desire to maintain a global attack infrastructure that poses
an enduring threat to our interests.
trends
Stepping back, the two trends in the contemporary threat
environment that I highlighted before the committee last year continue
to concern us. The first is the ability of terrorist actors to
communicate with each other outside our reach with the use of encrypted
communications. Most recently, terrorists have begun wide-spread use of
private groups in encrypted applications to supplement traditional
social media for sharing propaganda in an effort to circumvent the
intelligence collection and private-sector disruption of their public
accounts. As a result, collecting information on particular terrorist
activities is increasingly difficult.
The second is that we're seeing a proliferation of a rapidly-
evolving threat or plot vectors that emerge simply by an individual
encouraged or inspired to take action who then quickly gathers the few
resources needed and moves into an operational phase. ISIS is aware of
this, and those connected to the group have understood that by
motivating actors in their own locations to take action against Western
countries and targets, these actors can be effective, especially if
they cannot travel abroad to ISIS-controlled areas. In terms of
propaganda and recruitment, ISIS supporters can generate further
support for their movement, even without carrying out catastrophic,
mass-casualty attacks. This is an innovation in the terrorist playbook
that poses a great challenge. Further, martyrdom videos and official
ISIS claims of responsibility for inspired individuals' attacks
probably allow the group to convey a greater impression of control over
attacks in the West and maximize international media exposure.
terrorism prevention
Given these groups' ability to be innovative, the whole-of-
Government must respond with innovative approaches to prevent the
radicalization to violence and recruitment to terrorism of individuals,
specifically here in the homeland. I would like to talk a bit more
about what NCTC is doing to prevent terrorism and the work that we
assess still needs to be done.
As a Federal Government, we have taken steps to organize and
resource our efforts to prevent terrorism more effectively, under the
leadership of DHS and the Department of Justice. We have been
successful at helping provide communities with the information and
tools they need to identify potential extremists and to engage with
them before they reach the point of becoming an actual terrorist.
NCTC accomplishes this mainly through a series of Community
Awareness Briefings (CAB) and exercises that are produced and presented
in cooperation with our interagency partners. As an example, the CAB,
is an Unclassified presentation on radicalization to violence and
violent extremist recruitment designed to build awareness and catalyze
community efforts to prevent individuals from mobilizing to criminal
activity or violence. We also developed the CAB ``Train-the-Presenter''
Program, which is designed to train local officials to present the CAB
themselves to local audiences. Recently, these were expanded to include
all forms of violent extremism in the United States to respond to a
growing demand from Federal, State, local, and community partners for
tools that reflect the full domestic threat picture.
I am proud of all of the good work our Government--to include my
colleagues at NCTC--is doing to prevent terrorism here in the homeland,
but the reality, as was so tragically demonstrated in New York, is that
we have to do more. The scale at which we undertake these efforts is
too limited, and it is certainly not sized to tackle the kind of
problem we are experiencing here in the homeland today. But we do know
this: Prevention work has a positive impact in the places where we have
tried it, we are poised to receive significant metrics through the good
work of DHS that will help us better evaluate these efforts, and
violent extremism is not a monolith.
The bottom line is that our Government's work to prevent all forms
of violent extremism expands the counterterrorism toolkit beyond the
hard power tools of disruption, it is resource-efficient, and enables
local partners--including law enforcement, social services providers,
schools, and communities--to create alternative pathways that can
protect our youth from a variety of violent foreign and domestic
ideologies. But, we need to reaffirm and expand our commitment to
prevention, both resourcing it at the Federal, State, and local level,
and maintaining a whole-of-Government effort to continue to keep
Americans safe.
conclusion
Chairman McCaul, Ranking Member Thompson, and Members of the
committee, thank you for the opportunity to testify before you one this
morning. As you know, I have announced my retirement from Government
service effective by the end of this year. It has been a pleasure to
work with this committee and I appreciate your continued support for
the counterterrorism mission.
I am certain my successor, along with our FBI and DHS partners,
will carry on the tireless work to defeat the efforts of terrorist
groups around the globe and here at home. There is no doubt that the
world today is more challenging and more dangerous. But I would also
argue that we have more capacity to defend ourselves--more capacity to
keep ourselves safe--than we have ever had before.
It has been my privilege to work with the dedicated men and women
of the National Counterterrorism Center and serving as the director of
this extraordinary organization has been the greatest honor of my
professional life.
Thank you all very much, and I look forward to answering your
questions.
Chairman McCaul. Thank you, Director. Thank you for your
service to our country over the years.
I now recognize myself for questions.
Secretary Duke, we recently held a hearing with a TSA
administrator. Nine-eleven was an aviation attack using
airplanes as guided missiles into the World Trade Center and
the Pentagon. This is still the crown jewel of ISIS and al-
Qaeda. The inspector general produced a report on the findings
in terms of screening at airports, and quite frankly, it was,
in my words, at the last hearing, disturbing to find that the
TSA still has received a failing grade, a failed report card,
when it comes to screening. Now, we heard this in 2015, and now
we are in 2017.
As you know, with the laptop threat, the ability to convert
laptops into bombs and explosive devices to blow up airplanes,
possibly in-bound flights into the United States, I think I
speak for almost every Member of this committee that we need to
take quicker action. There is technology available today. There
are pilot programs today using computer tomography. It is like
going from an X-ray to an MRI.
Now, a lot of us in the committee have seen this, and so I
sent to you a letter requesting that this technology be
deployed, not in 2018 or 2019, but as soon as possible, given
the nature of the threat that exists. Now, can you respond to
that letter?
Ms. Duke. Yes, Mr. Chairman. We agree with you that
computer topography, or CT, is essential as part of our plan to
raise the baseline of aviation security. We are currently
developing the algorithms necessary to fully deploy that, and
agree with you, it is essential for our TSA future.
Chairman McCaul. What the administrator said was, well, we
can't deploy the technology today because we would have to
upgrade the software later. I think we should look at it from
the other way around. We should deploy the technology today and
stop procuring these X-ray machines. Deploy that technology
today and then upgrade the software when it comes available at
a later date.
Do you have any thoughts on that?
Ms. Duke. Yes, I agree. We are moving--we are already
procuring some. Like I said, the algorithms are running
different materials through to make sure that the machines can
detect what we need them to detect. That is in process now, and
we are, along with our foreign partners, working on making that
the new standard for passenger baggage.
Chairman McCaul. I believe that is one of the greatest
threats to the homeland today. So we will be providing follow-
up.
To Director Wray and Rasmussen, you know, the 5 years in my
Chairmanship on this committee I saw the rise of ISIS and the
rise of the caliphate and the rise of external operations and
the threats coming out of that region. I think, fortunately, we
are now seeing the fall of the caliphate, the defeat of ISIS in
Iraq and Syria. But how do you see this threat evolving as we
move on post-caliphate?
Director Wray.
Mr. Wray. Mr. Chairman, I think as Director Rasmussen said
at the beginning, on the one hand, the collapse or the building
collapse of the caliphate is good news. But I think the way we
are concerned about a number of different things that could
come out of that. One is, of course, what everybody in the
world is concerned about is foreign fighters returning. I think
in our instance, what we are primarily seeing there as a risk
is that some of them would return, not directly to the United
States, but perhaps to countries, say in Europe, and then from
there, come into the United States.
Second, we are concerned about home-grown violent
extremists who continue to be inspired by ISIS, even if not
directed in the sort-of classic sense. We know that ISIS is
encouraging fighters who aspired to travel to stay where they
are and commit attacks at home. So those are some of the issues
that I think continue to exist, even with the caliphate
collapsing.
Chairman McCaul. Well, and I think the power of ISIS as
opposed to al-Qaeda is the internet. I know you have worked
with Google, Facebook, Twitter; I have as well. I look forward
to working with you and the Secretary to try to get this stuff,
and NCTC, off of the internet.
Director Rasmussen.
Mr. Rasmussen. I would echo everything Director Wray said,
and just make one simple analytic point about a distinction
that we have observed between al-Qaeda and ISIS over the years.
Al-Qaeda operated, in most ways, as a clandestine covert
organization with barriers to entry that made it difficult for
individuals in many cases to become members. ISIS sought to
become a mass movement. It sought to reach people, regardless
of their prior affiliation with extremism, and to literally
recruit anyone who would come in the door and agree to align
with the ISIS world view. That means that the ISIS variant of
this problem has brought us many more individuals who are
radicalized around the world. So it is a problem that extends
further and wider than the al-Qaeda problem that we face. That
is not to stay it is all bad news. There is plenty we have done
to mitigate the possibility of a large-scale catastrophic
attack, the kind of directed attacks that Director Wray spoke
about earlier, so I am not here to solely point to a bad news
story. I am just pointing out that it is a different kind of
problem today than what we faced a few years ago.
Chairman McCaul. Thank you.
Final question. Secretary Duke, my home State was hit--was
devastated by Hurricane Harvey, parts of my district. Some
Members on this committee have been there many times to see the
devastation. I understand the decision perhaps was not yours
but made of OMB, the office of OMB, but I have to just express
my disappointment on the record at the recent $44 billion, I
think, disaster recovery supplemental request. It was just a
fraction of what my Governor, Governor Abbott, determined that
Texas alone needed to recover. Does not adequately take into
account the devastation in the other areas as well. Of course,
places in my district have flooded three times over the last 2
years. We need flood mitigation efforts. This is something that
Congress will be making decisions on, but we have to entertain,
not only the response recovery, but the flood mitigation.
I would like you to respond to that, recognizing that this
was not probably your decision to make, but I do want to
register my disappointment with the administration on this
issue.
Ms. Duke. Yes, Mr. Chairman. I recognize that the amount in
the supplemental did not totally address all the future needs
of the disasters we experienced this summer. What that was
intended to do is fund the Stafford Act work that needs to be
done. Currently, I have looked at it, and I think it is
appropriate and it is enough for the near term. We do have more
work to do, along with the housing and urban development, and
will be with Texas and the other areas until that work is done.
I think that the innovative housing program we are doing that,
what is known as the section 428 housing program, is going to
be really helpful in restoring Texas.
Chairman McCaul. Well, thank you. I look forward to working
with you on that. Thank you.
With that, the Chair recognizes the Ranking Member.
Mr. Thompson. Thank you very much, Mr. Chairman. In light
of your question, one of the on-going challenges we have is
that Stafford Act jurisdiction is in the Transportation and
Infrastructure Committee, and FEMA is over here with us. Every
time a problem comes up, people look to us and it is where T&I
comes. So that is an on-going battle that we have dealt with
from our inception as a committee, and I hope some of this gets
resolved fairly soon.
Ms. Duke, the inspector general recently notified Congress
that a report on the travel ban was being held up in your
office. Can you provide us details on why it is being held up?
Ms. Duke. There was a disagreement between the Office of
the Inspector General and DHS on privileges, that included
attorney-client privileges and executive privileges. Because
the Attorney General does not agree with those privileges, had
not issued the report. We feel it is important to maintain some
of those privileges, especially since the matter addressed by
the report is under litigation.
I feel comfortable that the privileges we had to assert to
the report were accurate. However, to be absolutely sure and
make sure the public is confident too, we have ordered a third-
party review, independent review, to make sure that the
privileges that we need to redact that report are sound.
Mr. Thompson. But you are aware that the inspector general
concluded that the Department violated certain aspects of the
law relative to the implementation of it?
Ms. Duke. The report itself was based on decision making
that, you know, by practices is executive privilege. So it was
problematic from the start, but we still are committed to
working with the Attorney General and making sure that----
Mr. Thompson. I understand. But you are aware of their
conclusion?
Ms. Duke. Yes, I am. Yes.
Mr. Thompson. All right. Thank you.
Mr. Wray, good to see you again, since we met in another
forum yesterday. Can you share with us your analysis of the
domestic terrorism threat here in America, and what does it
include?
Mr. Wray. Yes, Ranking Member Thompson. As we have
discussed a few times I think, the FBI assesses the domestic
terrorist threat to be a significant one, a major one. It
presents some of the same kind of challenges that we see with
home-grown violent extremists in that you are talking about
loosely confederated people with less communication, less
sophistication in the plotting of the attacks. Sometimes you
have lone offenders, so-called lone wolves, some people like to
use that expression, which makes it more challenging from a
detection and prevention perspective.
At any given time, including right as we sit here today,
the FBI recently has had in the neighborhood of about 1,000
pending domestic terrorism investigations. Those cover the
waterfront, from everything from white supremacists and
sovereign citizens, militias, all the way to anarchists,
environmental extremists, et cetera. But the key point with all
of them is that we are only focused on people who are engaged
in violent criminal activity. That is what we are
investigating, that is what we are focused on. We are not
focused on ideology or opinion or rhetoric.
Mr. Thompson. Thank you. Can you provide the committee with
the most recent reporting on the categorization of those
different terrorists?
Mr. Wray. I would be happy to have my staff get together
with yours and see if we can get you some more helpful and
detailed information on that.
Mr. Thompson. Thank you. One of the things for our
departing NCTC director that the FBI director talked about was
home-grown violent extremism. You referenced that in your
testimony as part of that three-legged stool that you have been
concerned about. Can you share with us why that is a concern of
yours?
Mr. Rasmussen. Absolutely, Mr. Ranking Member. As Director
Wray noted, many of the individuals who we categorize as home-
grown violent extremists don't typically engage in the kind of
behavior that makes detection and disruption easy for the law
enforcement and intelligence community. They aren't necessarily
communicating, they aren't necessarily gathering in large
groups, they aren't necessarily traveling to conflict zones or
engaging in the kind of behavior that would be good predictors
that someone might be interested in carrying out a terrorist
attack. So that puts a tremendous amount of pressure on law
enforcement at the local level and certainly my FBI colleagues
to try to figure out who is the person who is just there
dabbling and sampling and looking at material, and who it the
person that is actually looking to maybe mobilize and actually
act on their beliefs and carry out a terrorist attack. So that
becomes a much different challenge, a much more difficult
challenge than what we face typically in trying to disrupt
sleeper--so-called sleeper cells or other terrorist cells that
might have infiltrated the country from abroad. It is just a
harder problem.
Mr. Thompson. So is your testimony that we need more
funding to address that increasing home-grown terror threat in
this country since you have identified it as a growing
vulnerability for us as a country?
Mr. Rasmussen. I wouldn't necessarily pose it as being only
measured in funding. I think about the communities around the
country where I have had conversations with local law
enforcement, and they clearly desire greater Federal help, I
believe, in understanding the threat landscape and
understanding how it is that these home-grown violent
extremists appear in their midst. So if we can do that through
information sharing, if we can do that through sharing of
personnel and best practices, then that to me would be a
contribution.
I just don't think--I think the scale of the problem is
such that we have to put more effort behind it. I wouldn't
isolate funding alone as the issue.
Thank you. I yield back.
Chairman McCaul. The Chair recognizes the gentleman from
Alabama, Mr. Rogers.
Mr. Rogers. Thank you, Mr. Chairman.
Mr. Wray, in October 2015, Director Comey was testifying
before this committee, and I asked him if he had the resources
he needed to handle the terrorism investigations that were
pending before them, and also to investigate the surge of
attacks on soft targets that were occurring at the time. His
response was, ``To be honest, I don't know.''
So I know the FBI has been stretched thin over the last few
years and had to pull agents off criminal investigations to
look into these terrorist attacks. But I would pose that
question to you. I know you have only been there 3 months, but
have you been able to determine whether or not you have the
resources you need to meet the challenges that you face?
Mr. Wray. Well, at the risk of sounding like my
predecessor, but combined with the fact that I have only been
there for 3 months, I am still taking stock of that. I will
tell you that everywhere I turn, I find people who want the FBI
to do more of something, and some day I would like to find
somebody who would identify something they would like the FBI
to do less of. I haven't met that person yet. So we have a lot
of challenges, as you say.
I think we have matured to the point where we are not
having to pull people off of programs quite the same way that
used to happen. I think as Director Rasmussen said, it is not
just a question of funding; I am not convinced we can spend our
way out of the threat. Some of it is getting smarter, some of
it is working better collaboratively. I am very pleased with
how much better the FBI, which wasn't always that way in long
times past, working with its partners in the Federal law
enforcement, intelligence community, foreign partners, State
and local law enforcement, in particular. So we had to be
smarter, we had to get better technology, and we had to make
sure we have the right resources. Could we do more if we had
more? Absolutely.
Mr. Rogers. Well, we need you to let us know. If you get to
the point that you determine that you need additional resources
to be able to meet your needs, we can't fix it if we don't know
about it, and try to get you what you need. So I would ask you
to not be shy.
Mr. Wray. Thank you for your support.
Mr. Rogers. Thank you.
Secretary Duke, welcome back. A lot of work has gone into
improving our visa security process, but it is clear that
vulnerabilities remain, especially identifying those who are
radicalized over the internet. So can you tell us what, if
anything, is being done to connect the USCIS and the visa
process to the latest intelligence to help vet applicants from
high-risk areas?
Ms. Duke. Sure. We have instituted many new visa review
steps that are going to help with making sure that we have the
true identity of the persons that are applying for visas, and
also that they don't have a criminal purpose in coming here.
One of the biggest things we are doing is the 100 percent
interviews, and also looking at advanced information sharing.
As we talk about some of the other topics, the speed we are
moving at, having that information sharing with the other
countries is absolutely critical, and doing the vetting against
the databases. Also, social media checks, where applicable,
have played a huge role in better vetting of visa applicants.
Those are a few of the areas.
Mr. Rogers. OK. This may not be dramatically different from
that answer, but what steps is DHS taking under the Trump
administration to develop and implement what he has referred to
as extreme vetting?
Ms. Duke. Well, it has been a multi-level step. First, we
decided what vetting should be, what additional steps should we
take in vetting people. Then we compared the country's
performance.
Mr. Rogers. What were those additional steps?
Ms. Duke. Those additional steps were making sure that
passports had biometrics, that we had copies of those
passports, that countries provided us advance information,
those similar types of steps. We have a full report on that
that we can provide. Then we compared the--and the country's
actually using our databases and us using theirs. Then we
compared the country's performance against that, and we have
instituted get-well plans, if you will, for the countries that
don't fully conform to the new vetting standards.
Mr. Rogers. So would you assert then that this new status
of extreme vetting is fully implemented now?
Ms. Duke. It is fully implemented. We always have to get
better. I think that every time we put a fix in place, the
enemy gets--adapts to it, but it is in place.
Mr. Rogers. Great. Thank you very much.
Mr. Chairman, I yield back.
Chairman McCaul. The Chair recognizes the gentleman from
Massachusetts, Mr. Keating.
Mr. Keating. Thank you, Mr. Chairman. Thank you for being
here, and thank you for your service. It is much appreciated.
Secretary Duke, you mentioned that terrorists will use any
weapon at their disposal, you know, on different terrorist
threats, so I have a question for Director Wray in that regard.
There is tens of thousands of individuals, and many of the
attacks we are talking about, guns were clearly a part of this,
and firearms and weapons. Tens of thousands of individuals
removed from the NICS background check, the National Instant
Criminal Background Check, for guns after the FBI changed its
interpretation of and limited who is considered a fugitive from
justice. That decision was made in February. It is now
December. We have no idea how many people bought firearms this
year, even though there are outstanding warrants for their
arrest, just because there is no evidence they crossed State
lines.
Now, how did this decision come to be? Isn't this a gap in
trying to secure our safety and trying to keep these kind of
weapons away from terrorists and their--you know, we have
websites that are telling people and directing people how to
get these kind of weapons, but we have fugitives from justice
now in our own country that aren't being picked up by the NICS
system now. Could you just tell us why that was done, and if
there is something to fix this gap, which I think is a very
serious one?
Mr. Wray. Thank you, Congressman. The change that you are
referring to was the product of several years' long debate, as
I understand it, between the FBI and the ATF about the
interpretation of that prohibiter, the fugitive prohibiter
under the Brady Act. The FBI interpreted it as not requiring
crossing of State lines, and the ATF had interpreted it
differently. Under the prior administration, the Justice
Department came down with a legal determination, prompted in
part by the inspector general, and resolved that legal
disagreement about what the statute meant in favor of the
narrower interpretation that is different from the FBI's
interpretation at the time.
So I think it was in January that that change was--legal
change was declared. The Department, again, under the prior
administration, as I understand it, sent a notification to both
the House and Senate Judiciary Committees notifying them of the
change and the impact of the change and, essentially, inviting
legislative fix. So it may be the kind of thing that can be
addressed through legislation. But once that change went in
place, the FBI promptly complied.
Mr. Keating. Well, thank you for clarifying that. So that
is on our watch now as Members of Congress to change this, and
I hope we do.
Secretary Duke, thank you too for clarifying and agreeing
to move forward on the CT technology and getting that in the
field. That is something our last hearing really had a great
concern about. Thank you for doing that. But Administrator
Pekoske too said that the other issue is a budgetary issue in
moving these things forward. I realized through, you know, the
monies that people pay for a fee outside of things on their own
as they board airplanes, that that money was moved, again by
Congress, away from that.
But can you tell us right now, if we provided that
budgetary assistance, you would be able to move quicker for
that new technology in the field. Do you agree with the
administrator on that?
Ms. Duke. Yes. We have the money to deploy, to build out
complete research and development and deploy some machines. You
know, as the FBI director said, there is always more to do, but
right now, I feel comfortable that we are deploying that
technology. We also have the commitment of some of our foreign
partners.
Mr. Keating. If I could, my time is running out. If indeed
there were more money--he indicated it is a budgetary issue as
well. Is that correct?
Ms. Duke. It is a prioritization issue, yes.
Mr. Keating. All right. I think it is a priority, if we are
going to keep our people safe here in this country that are
traveling in the airlines.
Quickly, the NRC, Nuclear Regulatory Commission, in terms
of cyber attacks, has tried to upgrade requirements for nuclear
plants. I have one in my district facing, in a few years,
decommission, and they have applied for a waiver away from
these cybersecurity upgrades so that it is not there for an
attack.
It is my understanding that Homeland Security really
doesn't have the role, that it is really the NRC. Don't you
think you should have a direct role in this? I think you
should. I don't think the Nuclear Regulatory Commission is the
right agency by itself to be making those kind of safety
considerations in terms of a cyber attack.
Ms. Duke. Yes. To my knowledge, you are correct, that we
don't have that specific role in waiving. We do assist the
critical infrastructure sectors, but do not have that direct
regulatory role.
Mr. Keating. Well, thank you. I would like to engage your
office in terms of trying to suggest ways to shore that up. It
is another gaping hole.
Thank you, and I yield back.
Chairman McCaul. The gentleman yields back.
Just a quick clarification, Madam Secretary. Are the monies
available today to purchase the computer tomography technology?
Ms. Duke. We have some funding for the CT technology. We do
not have the funding to deploy it at every airport.
Chairman McCaul. Would that require a reprogramming by
Congress?
Ms. Duke. That would require--to buy for every airport
would require much more than a reprogramming.
Chairman McCaul. OK. I would like to follow up with you at
a later date on that. Thank you so much.
Ms. Duke. OK.
Chairman McCaul. The Chair recognizes the gentleman from
Pennsylvania, Mr. Perry.
Mr. Perry. Thanks, Mr. Chairman. Thanks, ladies and
gentlemen, for your attendance and your service.
Secretary Duke, you talked a little bit about the vetting
process and the extreme vetting process a little bit. I would
just like to drill down on that a little bit and ask you: Is
there a system to investigate or at least query in a minimal
sense, at least, the intending entrance for an ideological
affinity to some other alien or hostile legal system opposed to
the U.S. Constitution, similar to what was done by the United
States during the Cold War with some of our adversaries whose
potential entrants wanted to come into our country?
Ms. Duke. Yes. An affiliation with an ideology or a country
that is known for ideologies that are contrary to the United
States is something we look at in terms of the extreme vetting.
Mr. Perry. So there is literally a question-and-answer
portion to that? Or when you say you look at it, what does that
mean in practical terms?
Ms. Duke. One of the things we look at is where a person
has traveled to, and if they show a travel pattern in countries
that have a high degree of terrorism, we look at that. We also
look at social media, if appropriate, to see if there is
anything on it that indicates they are following terrorists
websites, those type of things, for example.
Mr. Perry. Well, not only just terrorist websites, but
things that are antithetical to the West and democracy and our
Constitution is what I would be interested in as well. Not only
just terrorism, but that. I am wondering, do you literally
question them? As opposed to just looking at their travel and
maybe social postings, do you ask them: Do you agree with the
United States Constitution? Would you uphold and defend the
United States Constitution? Do you believe that sharia law
should supersede, for instance, the Constitution?
Ms. Duke. I do not know the specific questions of the
interview, but I can get back to you. I do know they adapt
based on the person's scenario.
Mr. Perry. Absolutely. I appreciate it, and I will look
forward to a continuing conversation on that.
Director Wray, thanks for your service. Good luck to you.
Just curious if you can tell me if the FBI has taken any steps
to reverse the previous administration's purge of training
courses and information about Islamism, jihad, sharia, and the
Muslim Brotherhood?
Mr. Wray. Congressman, I am not aware of any on-going
efforts to purge training material.
Mr. Perry. They were purged in the last administration. So
my question is: Have you taken any steps or has the FBI, as you
know it, taken any steps to reverse that purge or include some
of those things that allow us to see in totality the threat
that faces America?
Mr. Wray. I have not studied what has been done in the
training, but I appreciate your bringing that issue to my
attention and I am happy to take a hard look at it.
Mr. Perry. OK. If we could have a continuing conversation
on that as well, I would appreciate it.
Director, antifa operates across the United States in ways
that involve, at least potentially, criminal inter-State
activities, such as inciting riot and conspiracy to incite
riotous behavior. I am wondering if the FBI is doing anything
to counter antifa in that regard, including and investigating
their funding sources?
Mr. Wray. As I mentioned to Ranking Member Thompson, we do
have a very active domestic terrorism program. While we are not
investigating antifa as antifa, that is an ideology and we
don't investigate ideologies, we are investigating a number of
what we would call anarchist extremists investigations, where
we have properly predicated subjects of people who are
motivated to commit violent criminal activity on kind-of an
antifa ideology. So we have a number of active investigations
in that space all around the country.
Mr. Perry. So that space would include individuals, but if
a group itself, even though, like you said, it is an ideology,
but if the group is receiving funding to promote that ideology,
which is not congruent with the law, is that something that you
delve into, especially when it crosses State lines?
Mr. Wray. Well, certainly, any time we are doing a domestic
terrorism investigation, whether it is just into an individual
or to, let's say, a collection of individuals, we do enterprise
investigations when there are multiple individuals working
together. The funding that supports violent criminal activity
is absolutely something we are keenly interested in.
Mr. Perry. OK, I appreciate it.
Finally, Director Rasmussen, regarding antifa and their
international networks, can you describe how the NCTC acts to
counter them, if you do?
Mr. Rasmussen. Thank you for the question, but we actually
don't. With respect to domestic terrorism issues here in the
United States, my agency's mandate and authorities are limited
to matters of international terrorism, and that was in the
founding legislation that created NCTC. So we defer to FBI in
this role.
Mr. Perry. So if there are international connections to
these groups that are operating domestically, you turn that
over, you don't take any----
Mr. Rasmussen. Well, certainly, if there was intelligence
that tied any individual here in the United States to a foreign
terrorist organization, that changes the nature of the problem
and becomes very much a collaborative effort with the FBI.
Mr. Perry. But if it is not a foreign terrorist
organization, but foreign organizations or foreign funding,
does that invoke your authority?
Mr. Rasmussen. Not to my--I don't believe so, unless it
would involve a foreign terrorist organization. But if that
kind of intelligence were to emerge, we would certainly make
sure our FBI colleagues were aware of it.
Mr. Perry. Thank you, sir.
I yield back.
Chairman McCaul. The Chair recognizes the gentlelady from
New York, Miss Rice.
Miss Rice. Thank you, Mr. Chairman.
So this question is for Director Wray. Earlier this week,
Karim Baratov, a Canadian citizen, pled guilty to charges that
he worked for the Russian intelligence service, FSB, as part of
the 2013 Yahoo hack that led to the theft of 500 million Yahoo
accounts, one of the largest cyber breaches in history. Three
other conspirators, including two Russian FSB officers, have
been indicted, but have evaded arrest. This case is the first
time the United States has issued criminal charges against
Russian officials for a cyber attack, even though Russian
aggression has continued to rise in that area.
We have seen large-scale cyber attacks on U.S. companies
Equifax, Uber, Verizon. They are just some of the biggest
breaches this year. What other cyber attacks do you suspect
Russian involvement in?
Mr. Wray. Well, without commenting on any specific
investigation, I think you have put your finger on what we view
as one of the more dangerous emerging threats, which we refer
to as a blended threat, which is the--and it is particularly
seen in the exact example that you mentioned, the Yahoo attack,
where you have the blend of a nation-state actor, in that case
the Russian intelligence service, using the assistance of
criminal hackers, which you think of almost like mercenaries
being used to commit cyber attacks.
One of the reasons we thought that bringing that particular
case was important, even though, as you say, some of the
defendants are Russian Government officials who are safely in
Russia, was to try to highlight to the public the importance of
being vigilant on this threat. So we are seeing emergence of
that kind of collaboration, which used to be two separate
things, really, sort of nation-state actors and criminal
hackers. Now there is this collusion, if you will, that is
occurring on a number of instances.
Miss Rice. What do you think Russia's motivation is for
these attacks?
Mr. Wray. Well, I think Russia is attempting to assert its
place in the world and relying more creatively on a form of
asymmetric warfare to damage and weaken this country
economically and otherwise.
Miss Rice. We have been focused today on terrorist threats
at home and abroad. Should the American people consider
Russia's repeated attempts to breach their personal data as a
terrorist threat?
Mr. Wray. Well, I think it is certainly a threat we should
take seriously as a National security matter or a homeland
security matter. I don't know that we would brand it a
terrorist threat, but I think that, to me, is sort-of a
labeling issue more than anything else. It certainly is a very
serious threat that the public needs to be aware of and that we
are all working collectively to try to do more to combat.
Miss Rice. I guess it depends on what you feel the
motivation is at the end of the day, what their motivation is,
and is this just a part of getting to that ultimate goal?
What steps are you taking to, in your department, taking to
deter these attacks? No. 1. Do you expect any future
indictments of Russian officials, without naming any? Last--or
just on this part of the question, do you believe that they
will ever be extradited and brought to the United States for
trial?
Mr. Wray. Well, taking you to the last part of your
question first, we don't have an extradition relationship with
Russia. So if they stay in Russia, I wouldn't necessarily
expect to see them coming to the United States. On the other
hand, if they travel, that is going to be a challenge for them,
because they are now, at that point, fugitives wanted by the
FBI.
Miss Rice. Would we pursue them then?
Mr. Wray. Absolutely.
As far as what we are doing, we have tried to model more
and more our cyber efforts along the sort-of more developed
front that we have in the terrorism space. So we have--just
like we have JTTFs in all 56 offices, we have cyber task forces
in all 56 field offices that are multi-agency, that have 184
different agencies participating.
We have something called CyWatch, which is a lot like our
National terrorism watch, where we coordinate closely with DHS
and others. We are trying to do more private-sector outreach,
because one of the things that is different in the cyber space
than the terrorist, is the need to kind-of work with the
private sector.
Miss Rice. I am glad to hear you say that, because I think
that is a great idea.
Finally, Russia's interference in the 2016 election was an
unprecedented attack on our democracy. What are you,
specifically your agency, doing to protect our election systems
in 2018?
You know, the Chairman has been really, I think, bravely
outspoken on this issue in talking about how this is not a
political issue, it is an American issue. It is a democratic
issue. Are you working with social media companies to prevent
the dissemination of Russian fake news and limit the effects of
Russian trolls?
Mr. Wray. So first, needless to say, I take any effort to
interfere with our election system by Russia or any other
nation-state or any non-nation-state extremely seriously
because it strikes right at the heart of who we are as a
country. We have, at the FBI, we are focused very much forward-
looking on the next, you know, couple of election cycles.
So we are doing a couple of things. We have a foreign-
influence task force that I have stood up inside the FBI that
brings together different divisions of the FBI, because it is a
multidisciplinary kind of problem. So it has got a
counterintelligence dimension, a cyber dimension, a criminal
investigation dimension. We coordinate closely with DHS, which
has responsibility for the critical infrastructure dimension of
our election system.
We are coordinating with our foreign partners because,
happily for me, we don't have elections every year in this
country, but other countries do, and we can learn from what
Russians and other countries are trying to do with other
elections in terms of the tradecraft, et cetera. So we are
trying to kind of get in front of it and figure out and be on
the lookout for efforts to interfere going forward. So that is,
at a high level, a summary of what we are doing.
Miss Rice. Thank you very much. Thank you, Mr. Chairman.
Chairman McCaul. Thank you.
The Chair recognizes the gentleman from New York, Mr.
Donovan.
Mr. Donovan. Thank you, Mr. Chairman. I thank all of you
for what you do to protect our Nation, and the sacrifices you
and your families make for our families.
Secretary Duke, you noted in your testimony that you are
rethinking homeland security for a new age. In many cases,
however, DHS is still operating on the same authority that it
was issued 15 years ago. Our role, we have to ensure that you
have the tools and the resources you need to address the ever-
changing threatened landscape in our Nation.
As you know, earlier this year, this committee, under the
leadership of Chairman McCaul, crafted, and the House of
Representatives approved, the first-ever comprehensive DHS
reauthorization bill. The bill authorizes vital grant programs
for first responders. It enhances intelligence and information
sharing, and it provides authorities for a number of DHS
components, like ICE, CIS, and the Coast Guard.
What effect will this reauthorization bill have on the
Department's ability to meet its mission? How important is it
that the Senate expeditiously acts on this piece of legislation
for you in your efforts of the brave women and men who work for
you?
Ms. Duke. Thank you. We think the reauthorization bill is
very important to DHS, and what it will do is it will help us
partner with Congress in terms of prioritizing and making sure
that we are focused with laser vision on the homeland security
issues that face our country. So I think it is very important
because this is an enduring threat, and to make sure that we
are unified and focused would be one of the most significant
effects.
Mr. Donovan. How is the lack of action over in the Senate
and the lack of the reauthorization bill that we passed
handcuffing, curtailing your efforts in what you are trying to
achieve for our Nation right now?
Ms. Duke. I think with a lack of authorization, we have
many different opinions and jurisdictions over what should be
the priorities for our Nation. So it makes it more complicated
to move forward crisply and clearly, especially on both the
authorization and on the appropriations side. Where do we put
that next dollar toward what risk in which way?
Mr. Donovan. It sounds to me like there is a lack of
certainty of what the future will hold for the agency unless
Congress acts to allow you to plan and prepare for the future.
Ms. Duke. Yes. It certainly--it does cause--it is a lack of
clarity, definitely.
Mr. Donovan. Thank you very much.
Director, I welcome my fellow New Yorker.
Ranking Member Thompson and my colleague from Pennsylvania,
Mr. Perry, were speaking about this crossing of State lines for
rioting and matters that you are facing now. I am always
concerned about people using disguises and masks, like they did
at the Berkeley riots, preventing their identity from being
revealed to law enforcement.
We are a legislative body that is charged with creating
laws to help you protect our Nation. I have always asked
witnesses at hearings, what tools do you need? What could this
committee do? What could Congress do to aid the brave agents
that work for you? What laws would you like to see us create
that will help you address some of these things, like people
crossing State lines for rioting, enhancing Federal sentencing
for that, disguising their identities during these riots?
I know there are some local laws. I was the prosecutor--I
was the elected DA, one of the five DAs of New York City for 12
years. What could we do for you to help you in the efforts to
protect our Nation and our families?
Mr. Wray. Needless to say, Congressman, that is a question
I would love to answer for hours. So I appreciate the question.
I think, looking down at the clock with the 45 seconds
remaining, the thing I would say more than anything else, I
would urge every Member of this committee to support
reauthorization of section 702, and not to erode the important
tool that we have there.
Just to give some context, the reason why that is so
important, the FBI's ability to query its own database, which
is what 702 allows us to do, is picture a situation where some
person in this country buys a huge amount of hydrogen peroxide.
Nothing wrong with that, necessarily, but we know hydrogen
peroxide is a precursor for terrorist attacks. It can also be
used for other things.
So if the merchant sends the FBI a tip that, hey, somebody
brought an unusual amount of hydrogen peroxide, here is the
email address for it, right now, under 702, the FBI agent doing
a National security investigation can run that email address.
If it turns out that that person is in contact with a known
ISIS recruiter overseas, suddenly, that purchase becomes a lot
more important and we can mobilize the scarce resources we have
talked about in a way to make that a priority.
If 702 is eroded, we lose that ability and we make people
less safe. So there are a lot of tools I think we could add,
but right now, I am very focused on not losing the one that we
need and that we have already. Thank you.
Mr. Donovan. Wonderful. Thank you again for your service.
By the way, Bill Sweeney is a great SAC in New York. Unless you
are going to promote him, leave him there, OK? Thank you.
Chairman McCaul. The Chair recognizes the gentleman from
California, Mr. Correa.
Mr. Correa. Thank you, Mr. Chairman and Ranking Member
Thompson, for holding this important hearing.
One of the very important purposes of this committee is to
assess and address all threats posed to our country. Given the
ISIS-style attack in Charlottesville by white supremacists, I
asked this committee to hold a hearing on white supremacists
terrorism.
In February 2015, the Department of Homeland Security
issued an intelligence assessment warning that sovereign
citizen extremist ideology would prompt violence across the
United States. In May 2017, the Joint Intelligence Bulletin
produced by the FBI and the Department of Homeland Security
stated that white supremacists were responsible for 49
homicides and 26 attacks from 2000 to 2016, more than any other
domestic extreme movement.
We must not take our eyes off the ball in regard to threats
posed to our country. We were unprepared for 9/11, and there is
no excuse if we are not prepared for another large-scale attack
like that of Oklahoma City. With that being said, I want to
thank the FBI and the other agencies.
I have a New York Times article from August that says,
``Bombing plot in Oklahoma City is stopped with the arrest, FBI
says.'' This individual was looking to take out many, many
people. It says here Mr. Varnell espoused an anti-Government
ideology and had expressed an interest in carrying out an
attack that would echo the bombing of the Federal building in
Oklahoma City in April 1995 that killed almost 170 people.
So thank you very much for that very good work, to you and
the other agencies.
Director Wray, and Acting Secretary Duke, as you know,
Congress passed Senate Joint Resolution 49 that was signed by
the President in September. It condemned the racist violence
and domestic terror attacks in Charlottesville, and urged the
President and the administration to use all available resources
to address a growing prevalence of domestic terrorist groups.
My questions are, are you in your organizations doing
anything differently since this resolution was signed?
Ms. Duke. We support the FBI strongly. I think what we have
done recently is make sure that we are doing the training and
the information sharing with the State and local governments.
We believe that with both domestic terrorism and home-grown
violent extremists, two different groups, but they are both
decentralized, and we need the State and local governments,
especially the local, to be one part. So we are working
closely----
Mr. Correa. Acting Secretary, you mentioned earlier as well
that there was a blurring of lines between domestic and
international activities. So following up on your coordination
of locals, do you also--have you put that same effort, will you
put that same effort in coordinating with our allies and our
neighbors to the north and to the south?
Your predecessor here, in this committee, said if those
threats get to the border, we have essentially lost the fight.
So, what are we doing to make sure these terrorist threats
don't get even close to our borders?
Ms. Duke. The most important thing is information sharing
and partnering. We need to know about them early on before they
board planes, before they move.
Mr. Correa. So are you working with our allies and our
neighbors to the north and south?
Ms. Duke. Absolutely. North and south, and also the
European Union and other European countries. But definitely,
Canada, Mexico, the Northern Triangle, and South America.
Mr. Correa. Sir.
Mr. Wray. So on the white supremacists threat in particular
in the wake of Charlottesville, we had a conference call with
all of the SACs, you know, from around the country trying to
make sure that they had learned--they could learn from the
experience in Charlottesville, in particular, and people were
pooling ideas and information about things they were seeing.
We have JTTFs in every field office, and they have that as
one of their specific areas of focus.
Mr. Correa. So I would ask both of you, are you doing
anything different in terms of following databases, updating
databases, trying to track white supremacists groups in the
United States, compared as to the efforts you would put to
track ISIS-style terrorists that are threatening our citizens?
I believe both of those groups pose equal threats. An
American citizen that loses their life to a terrorist attack,
whether it is motivated by ISIS or it is motivated by white
supremacists, it doesn't matter, it is still a tragedy in our
society and our country. So are you doing anything to refocus
to make sure that these white supremacist groups are being
followed and being monitored as you would any other group?
Ms. Duke. One of the major things we have done very
recently is open the Office of Terrorism Prevention
Partnerships, which is making sure every piece of information
we get, the State and local governments have to be at the point
to notice and deal with any types of hate crimes in these
groups. Training and information sharing are two of our major
efforts.
Mr. Wray. We have stepped up investigative interest, but we
do not, as I think you may know, we do not, on the domestic
terrorism front, investigate groups in the same way. In other
words, because of the First Amendment issues and the freedom of
expression issues and the somewhat ugly history that the FBI
has had in the past, we have very specific rules on the
domestic terrorism front where, in order to open an
investigation, there has to be credible evidence of Federal
crime, a threat of force or violence to further a political or
social goal. If we have all of those three things, then we open
a very aggressive investigation.
Mr. Correa. Thank you. Mr. Chairman, I am out of time, but
I would like to ask unanimous consent to submit this statement
for the record. It is by Dr. Erroll Southers from University of
Southern California. It is a statement, ``World-wide Threats
Keeping America Secure in the New Age of Terrorism.''
Chairman McCaul. Without objection, so ordered.
Mr. Correa. Thank you.
[The information follows:]
Submitted for the Record by Honorable J. Luis Correa
Statement of Dr. Erroll G. Southers, Professor of the Practice of
Governance, Director, Safe Communities Institute, Director, Homegrown
Violent Extremism Studies, Sol Price School of Public Policy,
University of Southern California
September 12, 2017
Chairman McCaul, Ranking Member Thompson, and distinguished Members
of the committee, thank you for the opportunity to provide this
statement. The purpose of this statement is to offer insight into the
current landscape of domestic terrorism and offer considerations for
facilitating positive outcomes going forward.
introduction
The ``Unite the Right rally'' in Charlottesville, Virginia, on
August 12 ended in an ISIS-style attack, which was glaring evidence
that the American white nationalist movements have learned from foreign
terrorist groups and eclipsed ISIS as the principal terrorist threats
in the United States, both in social media and off-line.
Three days before the deadly white nationalist rally, the
Department of Homeland Security (DHS) Office of Intelligence and
Analysis (I&A) distributed a confidential warning in coordination with
local, State, and Federal authorities at the Virginia Fusion Center. It
stated that an escalating series of confrontations between white
supremacists and anarchists would likely make the event ``among the
most violent to date.''
I&A's warning was presciently accurate, and DHS has for years
identified right-wing extremism as a pressing domestic terrorist
threat. In 2009, for example, DHS I&A released ``Right-wing Extremism:
Current Economic and Political Climate Fueling Resurgence in
Radicalization and Recruitment,'' which outlined a growing threat from
white supremacist and violent anti-Government groups, largely fueled by
the election of the first African-American president, Barack Obama.
There are many threats to the United States espousing a range of
political ideologies and citing a list of grievances against the
country. As the people of Charlottesville, Charleston, Portland, and
the Maryland campus of Bowie State know all too well, the terrorist
threat from right-wing extremists is manifest. It is essential that
administrators and lawmakers commence counterterrorism considerations
with the solemn acknowledgement that terrorism and violent extremism
are an existential threat to the Nation no matter whether they are
informed by a religious, racist, bigoted, or nationalistic ideology.
home-grown violent extremism
The terrorist threat to the United States most often originates
within the United States. Home-grown violent extremism (HVE) refers to
violence that is committed to advance an ideology and is perpetrated in
the country where the attacker embraced the ideology. An American who
embraces a Muslim Identity ideology within the United States is a home-
grown violent extremist, and so too is an American who embraces an
ideology positing racial superiority and advocating violence. As
tragically demonstrated in a number of victimized communities, the
greatest violent extremist threat to America is home-grown.
The home-grown threat is not homogenous, and U.S. policies must not
treat it as such. Policies prepositioned to focus on the ``other,'' or
engaging in ``otherism,'' are destined to miss the mark. Too often,
U.S. counterterrorism efforts have looked narrowly at the threat from
extremist Muslims. While groups like al-Qaeda and ISIS do present a
valid and immediate threat to the United States, they are not the only
threat, nor are their beliefs the only extremist ideology that demands
violence against the United States and its citizens.
If we are serious about countering the growth of HVE, we need to
legitimately focus our efforts on all forms of it. As a starting point
for that, we need look no further than across the Atlantic to see what
happens when programs intended to counter HVE focus on only one group
and community.
the failures of prevent
In 2003, in an effort to reduce the risk of ``al-Qaeda-inspired''
recruitment, radicalization, and related terrorist incidents, the
United Kingdom launched the Preventing Violent Extremism Strategy
(Prevent). It was considered one of the best in the world when it was
first implemented. At its core, Prevent focused on radicalization and
recruitment prevention (rather than simply HVE detection) and
acknowledged the importance of enlisting the community in the fight
against terrorism. Yet, the Prevent strategy ultimately failed in its
initial form. It focused exclusively on Muslim communities--not unlike
some of the counterterrorism efforts that have been more recently
launched in the United States. Prevent also funded efforts in Muslim
communities based on the size of the Muslim population in a given area,
instilling the perception that the program was geared toward
intelligence gathering in Muslim communities. As a result of poor
design and implementation, the program engendered mistrust, frustrating
efforts to collaborate with communities to address the risk of
recruitment and radicalization.
In the United States, we have headed down a similar (and ultimately
futile) path. This is demonstrated by the fact that community-based
organizations in several cities that were successfully awarded DHS CVE
grant funding rejected the award after learning of the administration's
intent to narrow future counterterrorism efforts on Muslim extremism.
This is one of many consequences of focusing public policy and public
ire on one group of home-grown violent extremists. And meanwhile, the
right-wing extremist threat grows bolder, more violent, and greater in
number.
growing threat from right-wing extremists
Effective homeland security and public safety policy should be
rooted in data. Numerous studies over many years have repeatedly
concluded that the home-grown threat to the United States exceeds that
from foreign nations. Certainly, we must thank the heroic efforts of
our intelligence community and armed services for so effectively
thwarting terrorist threats from abroad. As a result, however, our
greatest terrorist threat is home-grown. If we examine the past 2
years, the evidence is clear.
The ADL report, ``Murder and Extremism in the United States in
2015,'' examined domestic terrorism and extremism in a year that
claimed victims in Charleston, Chattanooga, Colorado Springs, and San
Bernardino. It was the deadliest year of domestic extremist killers
since 1995, the year another home-grown terrorist, Timothy McVeigh,
bombed the Murrah Federal Building in Oklahoma City.
In 2015, domestic extremists killed 52 people, more than the
numbers killed in 2013 and 2014 combined. The report states that four
domestic extremist groups perpetrated the 52 murders, with white
supremacists and extremist Muslims accounting for 38 percent and 37
percent of the fatalities, respectively.
The ADL's 2016 report on U.S. extremism was dominated by the
Orlando nightclub shooting, in which 49 people were murdered by a home-
grown violent extremist. Importantly, however, the data shows that in
the same year, 20 other people had already been murdered by white
supremacists in 11 separate incidents. The Orlando attack was horrific,
but in terms of which home-grown violent extremist groups constitute
the most lethal threat, the death toll from Orlando obscured the fact
that right-wing violent extremism was a far more frequent threat to
manifest.
Meanwhile, law enforcement is increasingly facing attacks from
home-grown extremists. An analysis of ``shots-fired events'' between
law enforcement and home-grown extremists since 2009 reveals there were
77 shots-fired incidents attributed to numerous extremist groups. With
their number of shots-fired events, these included:
White supremacists (38)
Anti-Government extremists (25)
Islamic extremist (9)
Black nationalist (2)
Left-wing extremist (1)
Anti-abortion extremist (1)
Anti-Muslim extremist (1)
Local law enforcement has the best finger on the pulse of domestic
threats in our communities. In that regard, key findings in the ``Law
Enforcement Assessment of the Violent Extremist Threat'' study (2015)
of 382 law enforcement agencies in the United States ``consider anti-
Government violent extremists, not radicalized Muslims, to be the most
severe threat of political violence they face.''
Right-wing extremist groups are also showing an affinity for using
social media to organize and recruit new followers. ISIS was a pioneer
in the use of social media for extremist radicalization and
recruitment. However, a recent study reveals that on Twitter (ISIS's
preferred social platform), American white nationalist movements have
seen their followers grow by more than 600 percent. Additionally, white
nationalists and Nazis had substantially higher follower counts than
ISIS supporters and tweeted more often. In the months leading up to
Charlottesville, leaked chat room discussions ``reveal an intense level
of planning and Nation-wide coordination,'' as ``Unite the Right
demonstrations were dominated by a younger, more tech-savvy generation
of white supremacists than in past protests.''
the importance of formers
Successful forays into field research can yield extraordinary and
important connections. The most valuable relationships in the HVE
domain are those with individuals who have radicalized to an ideology
and later disengaged from it. These ``formers'' are best able to answer
questions about why and how their radicalization took place.
Over several years, the ``formers'' I have interviewed individuals
who formerly counted themselves among the ranks of neo-Nazis,
mujahedeen, skinheads, Lashkar-e-Taiba and anti-Government adherents,
to name a few. The radicalization experiences, as told by formers, are
as dissimilar as their ideologies, but for two common features. First,
they all connect their decisions to explore an extremist ideology to a
``cognitive opening,'' a period in which one's beliefs are malleable
and open to radical change.
Second, their sense of alienation is accompanied with a sense of
altruism and a desire and belief that the status quo can be changed. We
are only beginning to learn the processes and openings that lead
individuals to an extremist ideology. It is only in ``safe spaces''--
where law enforcement, researchers, health practitioners, and other
relevant professionals can engage with ``formers''--that we will be
able to more deeply study why and how radicalization occurs on an
individual level and from that develop more effective techniques for
addressing the most pressing HVE threats.
a whole-of-community approach
The current CVE strategy is under fire after years of mistrust,
based on perceptions about the program's intentions and ultimate goals.
This should come as no surprise, as the CVE initiative in many ways
repeated the mistakes of the UK Prevent program in its first iteration.
Rather than continue down a fruitless path that ultimately alienates
communities, the United States is well-served to explore other methods
for collaborating with threatened communities. Importantly, the
intention should be grounded in the notion that we seek to prevent
extremist recruitment and radicalization--and not profile terrorists. A
community-led strategy, for example, provides a way for all community
stakeholders to identify shared concerns, build consensus and most
importantly, develop strategies and tactics adapted for a community's
local, specific concerns.
Going forward, we must have counseling resources on disengagement
and deradicalization for the diverse ideologies that threaten our
Nation. The goal is to draw them back from the violent extremist fold,
serving as a bridge between the family and institutions like schools,
social services and, if applicable, prosecutors, law enforcement or
employers. In that regard, I caution the administration to avoid the
notion of a ``hotline'' system, and to avoid the use of that term
altogether, should a resource system be considered. The term may be
misinterpreted as a line for providing intelligence information,
removing the critical element of trust, which is desperately needed.
Appropriate policies, processes, and technologies are the
foundations of security. Those elements are most effective when
informed by research and empirical data. This is a complex problem,
most often as unique as the individuals who walk the radicalization
pathway. There is only one element we can influence in this process and
that is the community. Violent extremists do not live in a vacuum, and
all terrorism is local. If we are to enhance social morality,
responsibility, and community integrity, with the intended outcome of
facilitating community-based efforts to identify and explore solutions
to this challenge, it begins with acknowledging and removing policies
cultivating community animosity and stoking alienation. The time to
change our policy toward radicalized Americans is now and that process
begins here.
Chairman McCaul. The Chair recognizes the gentleman from
Louisiana, Mr. Higgins.
Mr. Higgins. Thank you, Mr. Chairman.
Director Wray, thank you for your service to your country.
I specifically thank you for bringing up the importance of 702
as an invaluable tool for your investigative services in
defense of our Nation. I am a strong supporter of it and shall
be a vocal voice as the debates move forward.
Please describe, in at least general terms, what programs
the FBI currently implements to monitor potentially seditious
activity inside U.S. mosques and Islamic centers known to be
affiliated with the Muslim Brotherhood or other Islamic
extremist organizations.
Mr. Wray. Well, Congressman, we investigate international
terrorism matters, global jihadi-inspired directed matters, and
we will follow them wherever they may lead, and in some cases
that may lead to specific individuals. If they are in a mosque
and we are investigating them, then we would continue the
investigation there.
Mr. Higgins. Do you monitor the advertised appearances of
known radical imams that speak at Islamic centers across the
country? I ask this specifically because a known radical imam
spoke in my district recently, and it was completely under the
radar. No media, no law enforcement knowledge. I found out from
my own informant that he appeared within my district and spoke.
So I am wondering, does the FBI monitor the websites and
social media announcements of the movements and the appearances
of known radicalized jihadist imams?
Mr. Wray. We certainly have a variety of social media
exploitation efforts under way that are focused on the kind of
problem you are describing, and we also have, in some cases,
properly predicated investigations of specific subjects. In
some cases, those have been even imams. There have been cases
where we have pursued a matter that even led to, you know,
arrest, indictment, and conviction.
I think back to my prior time in Government in the Justice
Department. There was the case against Abu Hamza, for example,
who was a very active cleric in that space. So again, that is
giving an example of the kind of thing we do.
Mr. Higgins. Just quickly, within this non-Classified
setting, would your investigative efforts include human assets?
Mr. Wray. Absolutely. I appreciate you bringing that up,
because one of the things that I think is increasingly
important with all the kind of challenges that we have
described, all three of us have described in the terrorism
arena, is the ability to use human sources.
Mr. Higgins. Yes, sir.
Mr. Wray. We need to be able to work with the communities
around the country to be able to get people to come forward.
Because when you have somebody who is radicalized in a very
short period of time in some cases, the best hope we have of
finding out before the person commits an attack and kills
somebody, is to have somebody speak up and talk to law
enforcement. So it is important that we earn the confidence of
the community in order to be able to generate human sources,
and that is a very high priority for us.
Mr. Higgins. Thank you sir. And 702 enhances your ability
to use human assets. Is that correct?
Mr. Wray. Yes.
Mr. Higgins. Thank you, sir.
Secretary Duke, thank you for your service to your country,
Madam. I have one question. The U.S. electric grid is
dangerously unsecured against the threat of electromagnetic
pulse based on a nuclear explosion. Can you, within this
setting, please explain what steps the Department of Homeland
Security is taking to secure the U.S. electric grid on an
expedited basis? Further, what can this committee and this body
do to assist in that effort?
Ms. Duke. Yes. This is a relatively new threat that we have
been looking at in our critical infrastructure sector. We have
a strategy that will be completed before the end of this
calendar year, late in December. We will be sharing that
strategy that will help us start to better address the EMP
threat, along with the geomagnetic disturbance threats.
Mr. Higgins. You have a study that will be concluded by the
end of this year?
Ms. Duke. Yes. The target date is December 23 currently.
Mr. Higgins. You will share that with this committee?
Ms. Duke. Yes.
Mr. Higgins. Thank you. Mr. Chairman. I ask that a speech
from the Freedom Flame Award Dinner and two articles from the
Washington Times be included for the record, and I yield the
balance of my time.
Chairman McCaul. Without objection, so ordered.
[The information follows:]
Submitted For the Record by Honorable Clay Higgins
speech by the ambassador of the state of israel to the center for
security policy's freedom flame award dinner
december 14, 2016
Judge Jeanine, thank you for that kind introduction. And thank you
for your exemplary service to this country and for your friendship to
my country.
I want to recognize my fellow honoree Mort Klein. Thank you for
your unshakable commitment to the Jewish future. But Mort, I think
every once in a while, you need to take a stand and tell people what
you really think.
I also want to thank another steadfast friend of Israel, Frank
Gaffney.
Churchill once famously remarked, ``You have enemies. Good. That
means you have stood up for something, sometime in your life.''
Well, if you have enemies, Frank, it's because you have stood up
for something, many times in your life.
And that something is freedom--an unwavering commitment to
freedom--for America, for Europe, for Israel, for everyone.
I think I speak for the people here tonight and for many who are
not here when I say thank you for standing up for all of us.
I also want to thank the Center for Security Policy for giving me
this prestigious award. I deeply appreciate it, even though I don't
think I've earned an award won by the likes of Margaret Thatcher and
Jean Kirkpatrick.
The magnificent Iron Lady, who once made Britain great again, and
the brilliant U.N. Ambassador, who understood that defeating
totalitarianism sometimes meant working with authoritarian regimes,
were two of the West's most powerful voices of moral clarity during the
Cold War.
But while I have not earned this award, the country I have the
privilege of representing certainly has.
Because since the day it was established, Israel has been proudly
holding up freedom's flame in a dark and dangerous Middle East.
During the Cold War, Israel stood faithfully by America's side in a
fight against an evil empire. We defeated Soviet client states on the
battlefield. We safeguarded a vital square on the global chess board.
And we created an island of liberty in a sea of tyranny.
No less important, for decades, Israel has manned freedom's front
lines in the battle against a fanatic ideology that has taken over
large swathes of the Middle East and which endangers my country, the
region and the world.
That ideology is called militant Islam. I use the words militant
Islam very precisely. The enemy we face is not militancy and it's not
Islam--it's militant Islam.
There are many militant individuals and groups. Timothy McVeigh and
Ted Kaczynski can be aptly described as militants. Terror groups like
the FARC and the Tamil Tigers who are responsible for the murder of
tens of thousands of people are militant organizations.
But while these individuals and groups are extremely dangerous,
they are not part of a global movement. Militant Islam is.
The forces of militant Islam have struck in New York and Orlando,
London and Paris, Bali and Bangkok, Sydney and Buenos Aires, and dozens
of other places across the world.
In the Middle East and North Africa, they have struck in every
country between the Straights of Gibraltar and the Khyber Pass.
To be sure, militant Islam is not monolithic. There are Sunni
branches, such as ISIS, al-Qaeda, Boko Haram in Nigeria, al-Shabaab in
Somalia, and Hamas in Gaza.
There are Shia branches, such as the Ayatollah regime in Iran, the
various Shiite militias in Iraq, the Houthis in Yemen and Hezbollah in
Lebanon.
These branches have different theologies.
The militant Sunnis are fixated on the early 7th Century. The
militant Shiites are fixated on the middle of the 10th Century. Perhaps
one day they'll compromise and decide to take us all back to the late
8th Century.
And while militant Islamists always fight Christians, Jews,
Yazidis, Kurds, and other non-Muslims, they also ferociously fight one
another in their battle over who will be the king of the militant
Islamic hill.
Yet for all their differences, all the branches and sub-branches of
militant Islam are rooted in a similar radical ideology and fired by
the same fanaticism.
They all seek to reverse history--and the rise of the West--and
restore Islam to its former glory.
For all of these groups, the answer to their problems is Islam--in
one radical form or another.
That is why the seemingly disparate forces of militant Islam are in
fact part of the same global threat.
And that is why they must be countered as part of a global
strategy.
But ladies and gentlemen, just as the enemy we face is not mere
``militancy,'' the enemy we face is also not Islam.
Islam is a faith with some 1.7 billion adherents throughout the
world. And faiths--including the faith of Islam--are malleable things.
I suspect there are a few people here who disagree with me about
that. They can rightly point to many differences that set Islam apart
from Christianity, Judaism, and other faiths. They can rightly argue
that Islam has a unique theology, has been influenced by a unique
culture or has been shaped by unique geopolitical forces.
But as those skeptics point to the intricacies of theology and
culture, I hope they also consider the historical record--not just of
Islam but of other faiths.
To the best of my knowledge, the New Testament was canonized in the
fourth century.
While the text of that book has not changed since then, the faith
practiced by Christians certainly has.
The Christianity that for centuries justified the slaughter of Jews
all across Europe, and that spread anti-semitism to every corner of the
globe, is not the same Christianity that was preached by abolitionists
who fought slavery in the 19th Century or that is practiced by
Evangelicals in the 21st Century.
So too, the relatively tolerant Islam practiced in 12th Century
Spain and practiced for some 13 centuries in Persia until 1979 is not
the Islam of ISIS or the Islam of today's Ayatollah regime.
Admittedly, it is troubling that to find a more tolerant
Christianity one only need look to the present whereas to find a more
tolerant Islam one must largely look to the past.
But my point is that Islam, like other faiths, has evolved--and I
see no reason why it cannot or will not evolve again.
So do not assume that the forces ascendant in the Muslim world
today will be the same forces ascendant in the future.
Whether that happens or not will mostly depend on changes that will
come from within the Muslim world. But the pace and extent of those
changes depends partly on us as well.
It depends on not painting all Muslims with a single brush and not
declaring nearly one-quarter of the world's population irredeemable.
It depends on recognizing that the greatest victims of militant
Islam are those Muslims who do not accept its unforgiving creed.
And it depends on helping those who seek to reform Islam from
within.
Let me read you the words of one of those reformers.
``I'm really offended when people are intimidated, terrified, and
killed under the pretext that such practices are part and parcel of
divine teaching ordered by God.
I feel offended when destruction and sabotage are promoted as a
heavenly triumph for God on earth. I swear that nothing could ever be
built on destruction, demolition, or murder.''
Those words were not scrawled by a dissident languishing away in
some dungeon in the Middle East.
Those words were spoken last week at a religious university by
Abdel Fatah al-Sisi, the president of Egypt.
And here is another voice from the Middle East commenting about
terror attacks perpetrated in the name of Islam:
``Their only link to Islam is the pretexts they use to justify their
crimes and their folly. They have strayed from the right path, and
their fate is to dwell forever in hell . . . They think--out of
ignorance--that they are engaging in Jihad . . . Is it conceivable that
God . . . could order someone to blow himself up or kill innocent
people? Islam, as a matter of fact, does not permit any kind of
suicide--whatever the reasons or the circumstances.''
Those words were not spoken by some apologist at a liberal think
tank in Washington.
They were delivered 3 months ago in Arabic in a televised speech by
Mohammed VI, the king of Morocco.
Ladies and gentlemen, when the president of Egypt and the king of
Morocco say things like this, something is happening in the Middle
East.
It does not mean that the problem of militant Islam has suddenly
vanished. But it does mean that there are serious partners in the
region who are fighting militant Islam in ideological terms--partners
who cannot be dismissed as secular heretics but who are themselves
devout Muslims who have the credibility to challenge the Islamists'
claims to represent Islam.
Ladies and gentlemen, the reformers within Islam are real, and we
should be doing everything we can to help them.
You know what one of the best ways to help them is? To confront the
Islamists they are fighting--and to defeat those Islamists again and
again and again.
You know, bin Laden said that people follow the strong horse. If
you want proof of that concept, just consider how many Chicago Cubs
fans have suddenly appeared out of nowhere.
You know, until a few weeks ago, I knew a grand total of four Cubs
fans. Now they're all over the place.
Like winning baseball teams, winning ideologies attract more
followers and terror groups that appear to have the wind at their backs
gain more recruits.
That is why the forces of militant Islam must not only be
confronted. They must be routed and vanquished in every part of the
world.
In the Middle East, Israel is engaged in that battle every day
against Iran's terror proxies Hezbollah and Hamas and against various
other terror groups that threaten us from Syria, Sinai, and elsewhere.
Israel will continue to do what is necessary to prevent the
transfer of game-changing weapons to Hezbollah and to ensure that Iran
does not open a new terror front against us in Syria.
Israel would welcome a political settlement in Syria that would
bring an end to the horrible carnage and suffering there.
But Israel will oppose a settlement that cedes Syria to Iran and
its proxies--something that will only increase the threat to us and
others in the future.
Israel will also do what is necessary to defend itself against
Hamas. In Gaza, Iran is helping Hamas and Islamic Jihad develop an
indigenous rocket manufacturing capability--making them less reliant on
smuggling weapons.
To paraphrase an old saying, give a terrorist a rocket and he'll
fire for a day. Teach him how to make rockets, and he'll fire for the
rest of his life.
Besides Israel, there are others Arab states in the region that are
fighting the forces of militant Islam.
This battle against a common enemy has turned many in the Arab
world who were once adamantly opposed to Israel into de facto allies.
Our sincere hope is that this new alliance will enable us to build
lasting bridges of coexistence, something Israel hopes to discuss with
the incoming Trump administration.
But to seize those opportunities, we must work together to confront
the greatest danger of all--the marriage of militant Islam and nuclear
weapons. That is the ultimate game-changer that could lead to the
ultimate nightmare.
To assume that a militant Islamic power would obey the rules that
have been obeyed by all other nuclear powers is to gamble with the
security of the world.
Militant Islamists break the rules. They take over embassies. They
destroy millennial-old statues. They fly into skyscrapers. They make
the unimaginable imaginable.
Militant Islam is capable of anything because it is fundamentally
different. Huntington wrote of a clash of civilizations.
The truth is that there is a competition of civilizations. The last
three decades has witnessed the rise of Asia that has brought billions
of people into the global economy and resulted in a natural realignment
of power between East and West.
But wedged between East and West is militant Islam. And this
civilization--if you want to call it that because it's more like an
anti-civilization--this anti-civilization is in a clash with all the
rest.
Militant Islam does not seek to flex its muscles within the
international order. It seeks to up-end that order.
Everyone who cares about peace should do everything to prevent such
a fanaticism from ever arming itself with nuclear weapons.
That is why Israel so strongly opposed the nuclear deal with Iran.
Had that deal blocked Iran's path to the bomb, believe me, Israel would
have been the first to support it.
But this deal does not block Iran's path to the bomb. It ultimately
paves it.
Rather than dismantle Iran's military nuclear capability, this deal
merely places restrictions on that capability for a limited time--
restrictions that are automatically removed even if Iran does not
change its behavior.
So in 10 to 15 years--actually now it's 9 to 14 years--Iran could
remain the foremost sponsor of terror in the world and legitimately
enrich enough uranium to place it on the cusp of having the material
for an entire nuclear arsenal.
In the mean time, without violating a single clause in the nuclear
deal, Iran can conduct R&D on more and more advanced centrifuges.
And unless it is stopped, Iran will continue to defy U.N. Security
Council resolutions to build intercontinental ballistic missiles for
its future nuclear arsenal.
Here's a news flash. Iran and Israel are on the same continent. So
those ICBMs are not for Israel. They're for you.
As Prime Minister Netanyahu said on ``60 Minutes'' this Sunday,
Israel looks forward to discussing with the Trump administration the
nuclear deal with Iran as well as a dangerous Iranian regime it has
helped strengthen. We hope to forge a common policy with the
administration that can help advance stability and security in our
region.
Ladies and gentlemen, defeating militant Islam will require more
than confronting and defeating its forces in the Middle East. It will
also require not allowing people in our own countries to keep us from
identifying and understanding the enemy.
Because an enemy you refuse to name is an enemy you will never
understand. And an enemy you do not understand is an enemy you will
never defeat.
I recognize that there are those who believe that by naming the
enemy militant Islam people will mistakenly believe that the enemy is
Islam itself rather than a virulent ideology now ascendant in the
Muslim world.
But those who speak euphemistically of ``militants'' or ``violent
extremists'' should not be surprised if others reject such political
correctness and respond by mistakenly replacing militant Islam with
Islam itself.
We must also reject the shameful efforts of some to prevent any
serious discussion about the nature of the enemy we face.
I realized the full extent of those efforts only after a
controversy erupted over my being here tonight.
The day you announced that I was being given this award, the
spokesman at my Embassy received an email from the Southern Poverty Law
Center asking me why I was accepting an award from what they called an
anti-Muslim hate group.
I was a bit surprised. First, because I have known Frank Gaffney
for many years. And while I don't agree with every single thing he says
and believes, Frank is no hater and no bigot.
Second, because I have followed the work of the CSP for many years.
And while I do not agree with every policy position you have taken or
every view expressed by every member of your organization, the CSP is
not only an unabashed defender of Israel, it is also no hate group.
But I must admit, the fact that it was the Southern Poverty Law
Center that was making this allegation got my attention.
Because I always thought highly of that organization. After all,
when I was growing up in this country, the SPLC went after the KKK.
They used the courts to fight against the evil of racial segregation
and systematic discrimination. In my mind, they were the ones who
targeted the real haters of the world. So I read with great interest
what they sent me. And when it came to their allegations against you,
there was nothing that justified the wholesale defamation of this
organization or its leadership.
But then I read some more. I discovered that the SPLC had made up a
list of those whom they label anti-Muslim extremists.
And as I read this list, I was simply stunned.
Daniel Pipes, one of the great scholars of the Middle East, was on
it.
So too was Maajid Nawaz, a former Islamist who now fights against
Islamists.
But the biggest shock of all came when I saw a name on that list of
someone I regard as a hero--Ayaan Hirsi Ali.
For those of you who do not know Ayaan, she was the Dutch
parliamentarian who in 2004 produced a film with Theo Van Gogh called
Submission, which focused on the oppression of women in the Muslim
world.
Because of that film, Van Gogh was assassinated by a fanatic Muslim
and Ayaan was forced into hiding. She has had to live with death
threats and under constant protection ever since.
Yet rather than cower in anonymity, Ayaan writes books, publishes
articles, makes speeches, and fights for her ideas--in particular the
need for sweeping reform in the Muslim world.
Today, Ayaan Hirsi Ali is one of the world's great champions of
freedom, pluralism, and tolerance.
And every self-respecting group that claims to value any of those
things should be defending her not defaming her.
Yet in an Orwellian inversion of reality, a woman whose life is
threatened every day by extremist Muslims is labeled by the SPLC an
anti-Muslim extremist.
Have those who put Ayaan on that list no shame? Have they no
decency?
The SPLC and others who asked me not to come here tonight claim to
support free and open debate. But in reality, they seem to want to
stifle debate.
They preach tolerance for those who look different. But they are in
effect practicing intolerance to those who think different.
Unfortunately, some have amended that famous Voltairian dictum to
be ``I hate what you say and I will never defend your right to say
it.''
I will defame you as an extremist. I will label you a racist and a
bigot. I will put you on the blackest of lists that should be reserved
for Nazis, for the Klan, and for the true enemies of mankind.
Well, ladies and gentlemen, I don't stand with the defamers and the
blacklisters.
I stand with Ayaan Hirsi Ali. We all should stand with Ayaan Hirsi
Ali.
For if we do not stand with her, then the values she champions--the
same values we cherish--will be under threat and the dangers we face
will only grow.
We must not let the defamers and blacklisters succeed. We must not
let them turn into pariahs those erudite scholars and courageous
reformers who are trying to enlighten us about ideologies that threaten
our way of life.
For more than our values are at stake. Our lives are at stake.
Because without the wisdom of those scholars, without the courage of
those reformers, we will have a much more difficult time winning the
fateful battle that is under way.
That is why I am truly honored to accept this freedom flame award
tonight.
I accept it in the name of a country that has proudly held up a
light of liberty and decency in a dark and cruel corner of the world.
Israel will continue to hold that torch high, steeled by our values
and confident in our destiny.
But like free countries everywhere, Israel needs America to hold up
its torch even higher.
The battle is far from over. I am not even sure that we've reached
the end of the beginning.
But I am confident that with the help of organizations like this,
with the clarity and courage of people like Ayaan Hirsi Ali, and with
the support of millions of Americans across this great country, that
the flame of this last best hope on earth will burn brighter than ever
and help secure out common future.
______
Article Submitted For the Record by Honorable Clay Higgins
mainstream conservative groups alarmed to be found on ``hate map''
By Valerie Richardson, Washington Times, August 17, 2017.
Brad Dacus was thousands of miles away in California last weekend
when the Charlottesville protest erupted, so he was flabbergasted when
CNN labeled his Pacific Justice Institute a ``hate group.''
``Here are all the active hate groups where you live,'' said the
CNN wire story headline on Chicago's WGN-TV website.
The article listed the 917 organizations on the Southern Poverty
Law Center's much-disputed ``hate map,'' which names racist groups like
the Aryan Nation alongside mainstream conservative organizations such
as the Alliance Defending Freedom and the Family Research Council.
Mr. Dacus' conservative Sacramento-based institute, which
specializes in religious-liberty cases, was featured on the CNN list
right below the Pacific Coast Knights of the Ku Klux Klan.
``Why is the Southern Poverty Law Center doing this? It's simple.
They want to vilify and isolate anyone that doesn't agree with their
very extremist leftist policy and ideology,'' said Mr. Dacus. ``This
isn't about defending civil rights; this is about attacking civil
rights.''
Other conservative groups blasted CNN and called on the cable
network to retract the article.
``I am shocked that CNN would publish such a false report on the
heels of the Charlottesville tragedy,'' said Mat Staver, Liberty
Counsel's founder and chairman. ``To lump peaceful Christian
organizations, which condemn violence and racism, in with the KKK, neo-
Nazis and white supremacists is offensive. This is the epitome of fake
news and is why people no longer trust the media.''
Conservatives have repeatedly called out media outlets this year
for uncritically repeating the SPLC's ``hate group'' label, calling it
inaccurate and arguing that it has put their organizations at risk for
violence.
It's not hypothetical.
In 2012, Floyd Lee Corkins shot and wounded a Family Research
Council security guard and later told authorities that he wanted to
kill as many employees as possible after finding the group on the
SPLC's ``hate map.''
Tom McClusky, former vice president of government affairs at the
Family Research Council, took to Twitter to say, ``Thanks for the
reminder @CNN of this inaccurate map. Last time I saw it one of my
friends got hit with a bullet. Real responsible reporting.''
Mr. McClusky, now executive director at March for Life Education
and Defense Fund, noted in another tweet that ``@CNN decides to reprint
map that guided shooter to try to kill me & my colleagues because of
our view on marriage.''
In June, Liberty Counsel sued the charity tracker GuideStar for
defamation for adding the SPLC tag to its list of nonprofits. GuideStar
later removed the labels from its listings but said the information
would be available upon request.
``Using the Southern Poverty Center as a source for information
shows that CNN is not interested in reporting news but rather creating
scandal and security threats,'' said Mr. Staver. ``It is well known
that the SPLC label against peaceful, nonviolent people and
organizations has motivated some unhinged people to commit violence.
This is no time to exploit the tragedy of Charlottesville.''
CNN did not immediately return a request for comment Thursday but
did add an editor's note to the story saying that the headline was
changed to make it clear that the information came from the SPLC.
The new headline said, ``The Southern Poverty Law Center's list of
hate groups.'' In addition, CNN said it had replaced the list of 917
``hate groups'' with links to the SPLC website.
``Some critics of the SPLC say the group's activism biases how it
categorizes certain groups,'' said the CNN story. ``But since the FBI
doesn't keep track of domestic hate groups, the SPLC's tally is the
widely accepted one.''
That ``hate group'' listing may be widely accepted on the left, but
it's widely rejected on the right.
Earlier this year, the Philanthropy Roundtable's Karl Zinsmeister
called the SPLC a ``cash-collecting machine,'' pointing to its $50
million in contributions in 2015 and $334 million in holdings. In May,
the Federalist's Stella Morabito called it a ``big-money smear
machine.''
The Alabama-based center added to its coffers Wednesday with a $1
million donation from Apple CEO Tim Cook, who also said he would match
2-1 donations to the SPLC as well as a list of other designated groups
until Sept. 30, citing the Charlottesville clash.
``Apple has been at the forefront of the fight against hate in the
tech industry, and we are truly humbled by its support of our work,''
the SPLC said in a Thursday statement.
Organizations can land on the SPLC's ``hate map'' for a variety of
reasons not limited to racism. Categories include being ``anti-
immigrant'' or ``anti-Muslim,'' as well as being ``racist skinhead,''
``neo-Nazi'' or ``neo-Confederate.''
Most of the conservative groups fall into the SPLC's ``anti-LGBT''
category for their opposition to, for example, same-sex marriage or
transgender bathroom laws.
``Opposition to equal rights for LGBT people has been a central
theme of Christian Right organizing and fundraising for the past three
decades--a period that parallels the fundamentalist movement's rise to
political power,'' the SPLC said on its website.
The ADF this week called out Phoenix news outlets that relied on
SPLC's ``hate map'' for post-Charlottesville stories, including a
report on the NBC-TV affiliate 12News headlined, ``What are Arizona's
hate groups?''
ADF spokeswoman Kerri Kupec said most news outlets may not realize
that the SPLC is not politically neutral but rather avowedly anti-
right.
On its ``Hatewatch'' page, for example, the SPLC states that it
``monitors and exposes the activities of the American radical right.''
``I don't think that most news organizations that SPLC states on
its website that it only goes after groups on the right,'' said Ms.
Kupec. ``They only target people on the right.''
Last month, the ADF blasted ABC and NBC for using the ``hate
group'' designation on a story about a no-press speech by Attorney
General Jeff Sessions at an ADF conference in Dana Point, California.
Article Submitted For the Record by Honorable Clay Higgins
wealthy southern poverty law rakes in hollywood, silicon valley cash
after charlottesville
By Valerie Richardson, Washington Times, August 23, 2017.
The Southern Poverty Law Center has padded its already well-stocked
coffers with at least $2.5 million in donations from celebrities and
corporations following the white-nationalist melee in Charlottesville,
Virginia.
George and Amal Clooney have donated $1 million to ``combat hate
groups,'' while Apple CEO Tim Cook announced gifts of $1 million to the
SPLC and $1 million to the Anti-Defamation League in response to the
deadly Aug. 12 Charlottesville clash.
``We are proud to support the Southern Poverty Law Center in its
efforts to prevent violent extremism in the United States,'' said the
Clooneys in a Monday statement. ``What happened in Charlottesville, and
what is happening in communities across our country, demands our
collective engagement to stand up to hate.''
At the same time, others worry that Charlottesville has obscured
legitimate concerns about the SPLC, which has been accused of juicing
its fundraising by exaggerating the Ku Klux Klan threat.
``These celebrity donations are virtue-signaling. SPLC does not
need the money,'' said Cornell Law School professor William Jacobson in
an email. ``Its 2016 annual report shows over $300 million in
endowment, with program spending (legal and educational) one-tenth that
amount and more than covered by normal annual fundraising.''
Indeed, the $2.5 million comes as fairly small change for the SPLC,
which reported revenue of $54 million in 2015 and spent 22 percent of
its budget on fundraising, versus 64 percent on programs and services,
according to Charity Navigator.
Top-ranked charities ideally spend at least 75 percent of their
budgets on programs and services, as per CharityWatch, which last year
downgraded the SPLC from a ``C+'' to an ``F'' for holding more than
three years' available assets in reserve.
``Unfortunately, these virtue-signaling donations reinforce SPLC's
bad habit of sensationalizing and politicizing `hate' to generate even
more money for its already bloated coffers,'' said Mr. Jacobson, who
runs the right-leaning Legal Insurrection blog.
The criticism has also come from the left. The Nation's Alexander
Cockburn referred in 2009 to SPLC's Morris Dees as the ``archsalesman
of hatemongering,'' while Ken Silverstein of Harper's said in 2010 that
the organization ``shuts down debate, stifles free speech, and most of
all, raises a pile of money, very little of which is used on behalf of
poor.''
In the wake of Charlottesville, however, the SPLC and ADL, which
has a focus on fighting anti-Semitism, have clearly become the go-to
charities for prominent donors.
JPMorgan Chase said in a Monday memo that it would split a $1
million gift between the SPLC and ADL ``to further their work in
tracking, exposing and fighting hate groups and other extremist
organizations.''
Apple has also launched a fundraising tool to allow donors to give
to the SPLC through their digital iTunes accounts.
In accepting the Clooney donation, SPLC president Richard Cohen
warned that President Trump had reanimated the ``radical right.''
``Like George and Amal Clooney, we were shocked by the size,
ugliness, and ferocity of the white supremacist gathering in
Charlottesville,'' Mr. Cohen said in a Monday statement. ``It was a
reflection of just how much Trump's incendiary campaign and presidency
has energized the radical right. We are deeply grateful to the Clooney
Foundation for standing with us at this critical moment in our
country's fight against hate.''
The SPLC has also faced blowback for its liberal advocacy, starting
with its ``hate map,'' which lumps mainstream conservative
organizations with neo-Nazis and the Ku Klux Klan.
Both ABC and NBC repeated the ``hate group'' label in July in
reference to the Alliance Defending Freedom, while CNN recently posted
the SPLC ``hate map'' under the headline, ``Here are all the active
hate groups where you live.''
Among those on the map is the Liberty Counsel, led by Mat Staver,
who denounced the Charlottesville white-supremacist violence and
accused the SPLC of ``exploiting a serious situation to push a self-
centered political agenda.''
``This false labeling is defamatory and dangerous,'' he said in a
Monday statement.
Founded in 1971 to promote civil rights, the SPLC describes itself
as the ``premier U.S. nonprofit organization monitoring the activities
of domestic hate groups and other extremists.''
One woman was killed and 19 injured after an alleged neo-Nazi
sympathizer drove into a crowd in Charlottesville.
Chairman McCaul. The gentleman yields. The Chair recognizes
the gentlelady from New Jersey, Mrs. Watson Coleman.
Mrs. Watson Coleman. Well, thank you, Mr. Chairman. Thank
you to each of you for your testimony and for your service.
One of the types of far-right extremism that is
particularly concerning to me has to do with the anti-abortion
movement and their willingness to engage in very dangerous
actions to express their position.
So with that, I would seek unanimous consent to enter a
statement for the record from the Feminist Majority Foundation,
``Keeping America Secure in the New Age of Terror.''
Chairman McCaul. Without objection, so ordered.
[The information follows:]
Submitted For the Record by Honorable Bonnie Watson Coleman
Statement of the Feminist Majority Foundation
November 30, 2017
The Feminist Majority Foundation (FMF) is a National women's rights
organization dedicated to the elimination of sex discrimination and the
promotion of women's equality and empowerment in the United States and
around the world. In 1989, FMF launched the National Clinic Access
Project with the goal of reducing anti-abortion violence, keeping
women's health clinics open, keeping physicians, patients, and staff
safe, and helping to bring violent anti-abortion extremists to justice.
Anti-abortion violence has plagued U.S. women's reproductive health
clinics for decades. Between 1977 and 2016, there have been hundreds of
crimes committed against reproductive health care facilities and
abortion providers, including at least 11 murders, 26 attempted
murders, 54 bombings, 249 arsons, 98 attempted bombings or arsons, 411
clinic invasions, 100 butyric acid attacks, 239 incidents of assault or
batteries, and 4 acts of kidnapping. There have also been 663 anthrax
or bioterrorism threats, 643 bomb threats, 545 death threats or threats
of harm, and 583 acts of stalking.\1\ These acts are perpetrated by
extremists who use violence to intimidate doctors, patients, and staff,
in order to promote a policy goal of ending women's access to legal
abortion and shutting down women's health clinics.
---------------------------------------------------------------------------
\1\ National Abortion Federation, 2016 Violence and Disruption
Statistics, available at https://prochoice.org/education-and-advocacy/
violence/violence-statistics-and-history/.
---------------------------------------------------------------------------
Under Federal law, domestic terrorism includes ``activities that
involve acts dangerous to human life that are a violation of the
criminal laws of the United States or of any State'' and ``that appear
to be intended to intimidate or coerce a civilian population, to
influence the policy of a government by intimidation or coercion, or to
affect the conduct of a government by mass destruction, assassination
or kidnapping.''\2\
---------------------------------------------------------------------------
\2\ 18 U.S.C. 2331(5).
---------------------------------------------------------------------------
The violent tactics used by anti-abortion extremists, by
definition, fall under the Federal statutory definition of ``domestic
terrorism.'' Whether working alone, or in concert with others, violent
anti-abortion extremists have engaged in criminal activity with the
purpose of intimidating the civilian population--primarily reproductive
health clinic doctors, patients, and staff--in order to influence
Government policy on abortion.
Violent anti-abortion extremists may be using ``right to life''
rhetoric, but in reality, they have unleashed a Nation-wide campaign of
terror. The Feminist Majority Foundation has periodically conducted a
National Clinic Violence Survey since 1993 to measure anti-abortion
violence and harassment. Our survey is one of the most comprehensive
studies of anti-abortion violence and harassment directed at clinics,
patients, health care workers, and volunteers in the United States and
includes abortion providers of various organizational affiliations as
well as independent clinics. Our most recent survey, released in
February 2017, found that in 2016, abortion providers experienced a
marked uptick in violence and threats.\3\ Around 34 percent of the
clinics surveyed reported experiencing the most severe types of anti-
abortion violence and threats of violence in just the first 6 months of
2016, up from around 20 percent in the first 6 months of 2014. Some of
the most frequent types of violence and threats were blocking access to
and invasions of clinics,\4\ stalking, death threats, and bombing
threats. One clinic reported that staff and doctors are repeatedly told
to ``watch our backs'' and ``nobody cares when a murderer gets
killed.'' Out of the clinics reporting high levels of severe violence
and harassment, over 17 percent experienced staff resignations as a
result.
---------------------------------------------------------------------------
\3\ Feminist Majority Foundation, 2016 National Clinic Violence
Survey, available at http://feminist.org/anti-abortion-violence/images/
2016-national-clinic-violence-survey.pdf.
\4\ Blocking access to a reproductive health care clinic, or
conducting a clinic invasion, may violate the Freedom of Access to
Clinic Entrances Act (FACE), 18 U.S.C. 24, which makes it a crime to
use or attempt to use physical obstruction to intentionally injure,
intimidate, or interfere with a person obtaining or providing
reproductive health services.
---------------------------------------------------------------------------
In addition to severe violence and threats of violence, over 45
percent of clinics surveyed experienced targeted intimidation and
threats against staff and physicians, including vandalism of home or
personal property, harassing phone calls or emails, threats of
intimidation of family members, including children, and distribution of
harassing and inflammatory pamphlets--like the ``KILLERS AMONG US''
leaflets featuring doctors' photographs and their home addresses and
personal information.
These types of anti-abortion violence and intimidation must be
given higher priority in order to bring those who commit acts of
terrorism to justice and to prevent violence by defusing volatile
situations, tracing the sources of funding for those who commit anti-
abortion terrorist acts, and by identifying any potential patterns in
the activity of violent anti-abortion extremists.
Many anti-abortion extremists, for example, have been connected
with other extremist groups that present a threat to the U.S.
Government or to the public at large. Scott Roeder, the convicted
killer of Wichita, Kansas abortion provider Dr. George Tiller, was
associated with the anti-Government Montana Freeman militia group.\5\
David Wayne Hull, who was convicted on several Federal charges after,
among other things, he threatened to blow up abortion clinics, self-
identified as the Imperial Wizard of the White Knights of the Ku Klux
Klan.\6\ Convicted sex offender and anti-abortion extremist John Burt
was a member of the Ku Klux Klan.\7\ Burt was the reported ``spiritual
advisor'' to Michael Griffin, the murderer of Pensacola, Florida
abortion provider Dr. David Gunn.\8\ Eric Robert Rudolph, who was once
affiliated with the so-called Christian Identity Movement, a white
nationalist ideology, bombed abortion clinics in Atlanta, Georgia and
Birmingham, Alabama as well as a lesbian nightclub after bombing
Atlanta's Centennial Olympic Park.\9\
---------------------------------------------------------------------------
\5\ Amanda Robb, Not A Lone Wolf, Ms. Magazine (Spring 2010),
http://www.msmagazine.com/spring2010/lonewolf.asp.
\6\ Southern Poverty Law Center, Terror From the Right (Nov. 1,
2015), https://www.splcenter.org/20100126/terror-right.
\7\ Larry Rohter, Towering over Abortion Foes Trial: His Leader,
New York Times (Mar. 5, 1994), http://www.nytimes.com/1994/03/05/us/
towering-over-the-abortion-foe-s-trial-his-leader.html.
\8\ Id.
\9\ Eric Robert Rudolph: Fast Facts, CNN (Sept. 8, 2017), https://
www.cnn.com/2012/12/06/us/eric-robert-rudolph---fast-facts/index.html.
---------------------------------------------------------------------------
The sharing of intelligence across agencies concerning all types of
domestic terrorism, including anti-abortion terrorist activity, and the
robust investigation of anti-abortion crimes and potential anti-
abortion criminal activity is necessary to proactively investigate the
connections between those who commit anti-abortion crimes and white
nationalist or other domestic terrorist groups. In addition, more
resources are needed to train State and local law enforcement to
improve their threat assessment investigations.
There is no indication that anti-abortion violence and intimidation
will go away on its own. Based on FMF monitoring of anti-abortion
threats and violence, we expect that the higher level of severe
violence, harassment, and intimidation of abortion providers has
continued in 2017. Our law enforcement officials must do more, however,
to prevent the next violent attack and end the campaign of terror being
waged against reproductive health care providers, their patients, and
staff.
Mrs. Watson Coleman. Thank you very much.
I have a series of questions, some of which I really would
like quick, quick answers to. Thank you.
This is for you, Secretary Duke, and for you, Director
Wray, because both of you mentioned the importance of
information sharing with our foreign allies. Could you just
elaborate on why that is so significant as quickly as possible?
Ms. Duke. Because we need to know about people and be able
to vet them before they move toward the United States.
Mr. Wray. I would add to that, that in many cases, people
are either crossing borders themselves to commit attacks or
communicating across borders, or at a minimum, facing similar
issues in those countries and in ours so we have to compare
notes.
Mrs. Watson Coleman. Thank you, Director. So it is really
important that we at least maintain this open communication
with people that we have had relationships with that we could
trust that would share this information.
So having said that, do you think that the President's
tweets regarding the British Prime Minister's help further that
cooperation or impair that cooperation?
Ms. Duke. I work with the Home Secretary of Great Britain
and have a very good relationship and focus on that rather than
speaking on tweets.
Mrs. Watson Coleman. Well, in dealing with our allies, do
you find that there is any concern on their part with regard to
how quickly the President will tweet information that is not
accurate, including the most recent ones regarding the far
right supposedly anti-Muslim groups?
Ms. Duke. My personal experience is that they are anxious
to work with us for the threats that Director Wray made, and so
just work on building those toward the mission.
Mrs. Watson Coleman. Would you characterize those tweets
helpful or not?
Mr. Wray. My experience is similar to Secretary Duke's. In
fact, I was just over in the United Kingdom less than about 10
days ago, and met with all of my British counterparts, and I
think the relationship was very strong and productive.
Mrs. Watson Coleman. Well, let's hope so.
Director Wray, you had expressed a strong desire that we
reauthorize 702, section 702, and that it is very vital for you
all to be able to do your job. I wanted to just say that I had
tremendous pause when I read the report on black identity
extremism and its threat to law enforcement. I still have very,
very major concerns about what it communicates to law
enforcement, what to fear, whether or not those fears have been
developed in terms of the research and the analysis. I look
forward to meeting with those analysts who discuss what seems
to be a very skimpy report.
But that kind-of gives me pause to support that kind of
authorization to an agency that would, I think, allow this sort
of poorly-developed report to come out and not demonstrate, in
my opinion, only in my opinion, I guess a commensurate
identification or expression of white identity extremism that
presents a threat to our environment.
Mr. Wray. I would just add, I appreciated our conversation
yesterday.
Mrs. Watson Coleman. I am sorry that I had to leave before
it was completed.
Mr. Wray. But I found it a candid and hopefully
constructive conversation. I look forward to continuing the
dialog on that issue.
I would say, on the white supremacist issue, we do put out
information to State and local law enforcement on that. In
fact, at the IACP conference recently in Philadelphia that I
attended and spoke at, we distributed I think something like
15,000 copies of a video, which I would be happy to make
available to you, about the white supremacist threat to State
and local law enforcements to raise their awareness of that
threat. That is an example, but it is hardly the only example.
Mrs. Watson Coleman. I think it is really important, and I
know it is a difficult discussion for us to have, but I need to
agree with my colleague, Mr. Correa, that if we are really
going to look at the dangers that are confronting our safety
and security of our citizens here in the homeland, that we need
to have a serious discussion of who represents that danger.
While we talk about this on the surface and we kind of skim
and we include it in the larger discussions on very important
issues of homeland security, in and of itself, the threat is so
severe that even organizations who have done research in these
issues find that the threat to our security is greater with
these groups than it is with these sort of foreign fighters or,
you know, foreign-inspired individuals, and we just need to
confront this.
So on the record, I need to ask again that we have a
hearing specifically addressing those issues with those members
of the administration that weigh in, work on, and have
consideration of these issues.
So I thank you. I see that I have gone beyond my time. So,
Mr. Chairman, I yield back the rest of my time.
Chairman McCaul. The gentlelady yields.
The Chair recognizes a former FBI agent from Pennsylvania,
Mr. Fitzpatrick.
Mr. Fitzpatrick. Thank you, Mr. Chairman. I thank you all
for being here, and more importantly, thank you for what you
do. Your work is not easy. We know that and we are here to
support you in any way necessary.
I can report to this committee, regarding Director Wray,
who is leading my former organization, I have spoken and
obviously keep in touch with many of my former colleagues from
the ground all the way up. This is a man that they have come to
respect tremendously. So, Mr. Wray, thank you for leading the
organization that I love.
I think that it warrants further discussion regarding
section 702. Mr. Higgins brought it up briefly. I want this
committee to be fully aware, not only of what you just said
regarding the benefits to the Bureau and to the National
security apparatus regarding 702, but I think what I would like
you to address briefly, sir, is the consequences of not
reauthorizing. What would we not be able to do any more should
section 702 expire?
Mr. Wray. So the real value of 702 to the FBI and to the
protection of the American people is at the front end, at the
very early stages when a tip comes in and we are in an
environment right now, as you have heard from every member of
this panel, where there is a high volume of threats and there
are so few dots, in many cases, to connect with these smaller,
more contained, more loosely-organized situations, so that the
premium on getting the right dots to connect, to understand
which threats are real, which ones are more aspirational, that
is when the value of 702 kicks in.
Right now, under 702, we can query information, and I want
to be sure everybody understands this, this information that
the FBI has already lawfully in its possession. There is no
court that disagrees with that. Right now, they can query that
information and know that this tip from State and local law
enforcement or somebody in the private sector, is one that
really matters, and allows us to mobilize resources to be sure
that we get in front of the threat.
If 702 is walked back, we will, in effect, be starting to
rebuild the wall that existed before 9/11. I implore the
committee not to go there again, because that is something that
we learned the hard way, you know, before and after 9/11.
Mr. Fitzpatrick. Thank you, Mr. Wray. We have a lot of
people on this committee asking what we can do to help. This is
exhibit A where we can help. We have to reauthorize section
702. It is absolutely imperative.
Secretary Duke, I had the honor of visiting Puerto Rico
last week. As you know, this committee has oversight over FEMA.
I describe the experience as heartbreaking and heartwarming all
at the same time, walking through the convention center where
some amazing work is being done, by a great team of Federal
agencies who have challenges.
My concern is, and if you could address this, FEMA is
spread very thin right now. They are responding in Texas; they
are responding in Florida; and they are also responding to what
I believe to be the most challenging situation in Puerto Rico,
logistically being over 1,000 miles off the coast of Florida.
They had an antiquated infrastructure and electrical grid to
begin with. They dealt with a Cat 5 hurricane right through the
island, 190-mile-an-hour sustained winds for a 12-hour period
of time. The citizens there described it to me as a 12-hour
long tornado. It was absolutely devastating.
What are we doing specifically for Puerto Rico, given the
unique challenges logistically and economically that those
people face? Because I think it is important that we constantly
talk about and remind everybody that they are American citizens
too.
Ms. Duke. Right. Puerto Rico and the U.S. Virgin Islands
definitely had some unique challenges. The main thing we are
doing differently is--I will juxtapose it against Texas where
Governor Abbott had a strong infrastructure in place, both
physical infrastructure and the people, to lead the effort, and
we augmented.
What we have done in Puerto Rico, because of their
financial concerns and others, Governor Rossello had a weak
ability to execute his vision. So we have embedded FEMA people
with the Governor and are bolstering his vision, his recovery
efforts even more strongly.
Additionally, we are doing response and recovery
simultaneously. So we are continuing response. Even though it
has tailed off, we are still delivering water, still delivering
meals. But we are actually doing the recovery effort in terms
of rebuilding the infrastructure, so I would say a much
stronger role in supporting the Governor.
Mr. Fitzpatrick. We appreciate it. Please keep the focus on
Puerto Rico. We don't want them to be forgotten. Anything this
committee can do to support that role, please let us know.
Ms. Duke. Thank you.
Mr. Fitzpatrick. I yield back, Mr. Chairman.
Chairman McCaul. The Chair recognizes the gentleman from
Rhode Island, Mr. Langevin.
Mr. Langevin. Thank you, Mr. Chairman. I want to thank our
witnesses for your testimony today.
Before I begin, Mr. Chairman, I would ask unanimous consent
to submit a statement from the START, the National Consortium
for the Study of Terrorism and Responses to Terrorism.
Chairman McCaul. Without objection, so ordered.
[The information follows:]
Statement Submitted For the Record By Honorable James R. Langevin
Statement of The National Consortium for the Study of Terrorism and
Responses to Terrorism
International terrorism casts a long shadow, reaching the American
consciousness from violence-torn nations such as Iraq, Syria, and
Afghanistan, and from our collective memory of the attack of September
11, 2001. Indeed, the 9/11 attack is the most lethal terrorist attack
in the past half century and the world has experienced historically
high levels of terrorist violence over the last 5 years, largely at the
hands of Islamist extremist organizations operating in Muslim-majority
countries.
While the overwhelming majority of that terrorist violence has
occurred in the context of inter- and intra-state conflicts in the
Muslim world, these bonfires have thrown sparks that have reached
Western nation-states in the form of both centrally-planned attacks and
inspired plots with no material support from a foreign-designated
terrorist organization. It is easy to understand how this aggregated
level of global violence, selectively featured in high-definition
terrorist propaganda and amplified on cable news, in combination with
the anomalous lethality of 9/11, can obscure our understanding of
terrorist violence within the United States.
In the United States, however, the nature of terrorist violence
differs significantly from the global picture, primarily due to its
diversity and relative scarcity. In the following passages we draw on
various Unclassified and objective START datasets to highlight the
empirical nature of terrorism in the United States, in some cases
excerpting or adapting text from START publications.\1\ *
---------------------------------------------------------------------------
\1\ A representative sample of those publications are included as
appendices to this statement for the record.
* Supplemental material has been retained in committee files.
---------------------------------------------------------------------------
These data reveal a simple truth; the perpetrators of terrorism in
the United States adhere to a wide variety of ideologies, choose
differing targets and victims, recruit and mobilize violence in
differing patterns, but all pose a threat to American lives and the
fabric of American society. The perception of the threat posed by these
different groups and movements depends largely on ``where one sits'' in
society, as opposed to the empirical nature of their violent attacks
relative to one another. To suggest that there is only one salient form
of terrorism active in the United States is empirically false and puts
American life, liberty, and prosperity at risk.
the extremist crime database, and differences in victimology and
perceived threat\2\
---------------------------------------------------------------------------
\2\ The ECDB is led by researchers at John Jay College of Criminal
Justice, Michigan State University, Seattle University, and Indiana
University-Purdue University, Indianapolis.
---------------------------------------------------------------------------
The ECDB is a relational database that includes information on all
publicly-known violent and financial crimes committed in the United
States by extremists associated with violent Islamist extremists, the
violent Far-Right (FR), and the Animal and Earth Liberation Fronts (ELF
and ALF). The ECDB includes information on the incidents themselves, as
well as their perpetrators, related organizations, and victims. It
currently covers the period between 1990 and 2016.
Drawing on ECDB data on ideologically-motivated homicides occurring
after September 11, 2001 through the end of 2016, we find that 31
Islamist extremist homicide events have resulted in 119 deaths, while
89 Far-Right extremist homicide events have caused 158 deaths.\3\
---------------------------------------------------------------------------
\3\ See Appendix for a START infographic based on ECDB homicide
data published in February 2017 using preliminary 2016 data, which
provides similar data as the finalized data reported in this statement.
During the time of this study, there were no homicides conducted by the
ALF/ELF, the other ideological group studied in the ECDB.
Over the last 25 years, when including the ideological victims of
the 9/11 terrorist attacks and the Oklahoma City bombing, Islamist
extremist offenders have killed nearly 7\1/2\ times more people than
Far-Right extremists in one-fifth as many incidents. However, when
these two outliers are removed, another story unfolds. Under these
circumstances, there are nearly four times as many Far-Right extremist
victims as Islamist extremist victims.
Although both sets of victims had disproportionate numbers of
individuals killed in the line of duty, especially when one considers
the percentage of the general population engaged in active military or
law enforcement service at any given point in time, Islamist extremist
victims were more likely to be military, while Far-Right extremist
victims were more likely to be law enforcement.
In some ways, Islamist extremist victims have characteristics that
are closer to that of ``typical'' homicide victims and even the general
population. This could be a mechanism of the fact that compared to Far-
Right extremist victims, Islamist extremist victims are more likely to
be randomly selected. If an individual is fatally victimized by an
Islamist extremist offender depends on whether they are in the
proverbial wrong place at the wrong time. Far-right extremist victims,
however, are more likely to be targeted purposefully for assassination
based on the offender's previous knowledge of the individual.
This differential form of targeting can impact threat perception of
the various ideological groups; in a separate project START researchers
surveyed law enforcement professionals who indicated that their
relative perceived threat of Islamist extremists decreased in
comparison to the Sovereign Citizen movement following a serious of
homicides in which police officers were killed.\4\
---------------------------------------------------------------------------
\4\ Carter, David, and Steve Chermak, Jeremy Carter, Jack Drew.
``Understanding Law Enforcement Intelligence Processes,'' Report to the
Office of University Programs, Science and Technology Directorate, U.S.
Department of Homeland Security. College Park, MD: START, 2014.
------------------------------------------------------------------------
Potential Threat Potential Threat
Type of Group (2013-14) (2006-07)
------------------------------------------------------------------------
Sovereign Citizens................ 3.20 (1) 2.49 (7)
Islamic Extremists/Jihadists...... 2.89 (2) 3.13 (1)
Militia/Patriot................... 2.67 (3) 2.61 (6)
Racist Skinheads.................. 2.58 (4) 2.82 (3)
Neo-Nazis......................... 2.56 (5) 2.94 (2)
Extreme Animal Rightists.......... 2.54 (6) 2.79 (4)
Extreme Environmentalists......... 2.51 (7) 2.74 (5)
Klux Klux Klan.................... 2.38 (8) 2.47 (8)
Left-Wing Revolutionaries......... 2.36 (9) 2.04 (13)
Extreme Anti-Abortion............. 2.36 (9) 2.30 (11)
Black Nationalists................ 2.34 (11) 2.35 (10)
Extreme Anti-Tax.................. 2.33 (12) 2.47 (8)
Extreme Anti-Immigration.......... 2.33 (12) 2.41 (9)
Christian Identity................ 2.19 (13) 2.59 (8)
Idiosyncratic Sectarians.......... 2.19 (13) 2.13 (12)
Millennial/Doomsday Cults......... 2.17 (15) 1.93 (14)
Reconstructed Traditions.......... 2.13 (16) 2.04 (13)
------------------------------------------------------------------------
These victimization patterns over the last 25 years demonstrate
that ideological victimization from terrorist and extremist violence
varies across ideologies and underlines the importance of future
research in the fields of criminology and victimology in attempting to
understand these differences and reduce victimization risk.\5\
---------------------------------------------------------------------------
\5\ This analysis is excerpted and adapted from, Parkin, William
S., Steven M. Chermak, Joshua D. Freilich, and Jeff Gruenewald.
``Twenty-Five Years of Ideological Homicide Victimization in the United
States of America,'' Report to the Office of University Programs,
Science and Technology Directorate, U.S. Department of Homeland
Security. College Park, MD: START, 2016.
---------------------------------------------------------------------------
profiles of individual radicalization in the united states, and
differences in interdictions \6\
---------------------------------------------------------------------------
\6\ The PIRUS data base is curated by researchers at START at the
University of Maryland. The database is freely available for download
on START's webpage or can be accessed through the project's data
visualization tool at http://www.start.umd.edu/profiles-individual-
radicalization-united-states-pirus-keshif.
---------------------------------------------------------------------------
Profiles of Individual Radicalization in the United States (PIRUS)
is a database of 1,867 Islamist, Far-Left, Far-Right, and single-issue
extremists who have radicalized to violent and non-violent extremism in
the United States from 1948 through 2016. This analysis draws on the
full dataset and illustrates the important differences that exist
across ideological groups, as well as those which distinguish violent
from non-violent extremists. The PIRUS data can be used to explore the
radicalization trajectories of individuals from Far-Right, Far-Left,
and Islamist ideologies.
Individuals adhering to extreme Far-Right views make up the
majority of the database (n=746), followed by Islamist extremists
(n=457), and those on the extreme Far-Left (n=324). However, it is
important to recognize that radicalization in the United States has
generally occurred in several waves. These waves roughly correspond to
the rise of Far-Left extremism in the late 1960's and early 1970's,
Far-Right extremism in the 1980's and 1990's, and Islamist extremism
after 2001.
In addition to the analyses described above, PIRUS captures data on
the progression of the plots pursued by the individuals included in the
dataset, providing insight into the relative success and failure of
individuals from different ideological milieus in perpetrating
violence. In the chart below we can see that while nearly 76 percent of
Islamist plots were disrupted before an attack occurs, 52 percent of
violent Far-Right and 55 percent of violent Far-Left plots, of which
there have been greater overall numbers, were successfully executed.
One possible explanation for this differential is that the
professional counterterrorism community has allocated more resources to
Islamist terrorism. However, another compelling explanation is that the
Federal laws associated with material support for a foreign designated
terrorist organization provides additional tools that the criminal
justice community can use to open investigations and disrupt
international terrorist plots at an earlier stage in the plot
progression than are available for domestic terrorist plots.
Due to Constitutional protections associated with freedom of speech
and freedom of assembly, many of the same behaviors that allow for the
arrest of an al-Qaeda supporter prior to a violent attack are not
chargeable offenses for members of ``domestic'' terrorist groups and
movements like the Environmental Liberation Front or the White
Supremacist movement. The different legal standards for domestic
terrorism and international terrorism generate different criminal
justice outcomes, but also generate confusion about what constitutes
terrorism versus a hate-crime and the relative threat of domestic
terrorism versus international terrorism. Furthermore, it has
contributed to accusations against the U.S. Government of placing an
unwarranted focus on Islamist extremism at the expense of other
threats.
the american terrorism study, and differences in mobilization of
violence \7\
---------------------------------------------------------------------------
\7\ The American Terrorism Study (ATS) is led by researchers at the
Terrorism Research Center at the University of Arkansas.
---------------------------------------------------------------------------
The ATS is an empirical relational database consisting of data on
Federal terrorism-related court cases, persons indicted in these court
cases, and related officially designated terrorism incidents. Variables
include demographic information, terrorist group designations, and
temporal and geospatial data on incidents and antecedent activities
leading to terrorist attacks.
In 2016, the ATS team studied how the planning process affects
outcomes of terrorist plots. Analysis was conducted on 504 terrorism
plots in the United States from 1980-2015.
Data for the analysis included information from:
132 Far-Right terrorism plots
84 Far-Left plots
75 Islamist extremist plots,
126 environmental extremist plots, and
The remaining plots include activities by a variety of other
nationalist/separatist groups as well as single-issue plots.
By studying terrorism across ideologies, as well as the nature of
lone actors versus group-based actors, the ATS team was able to
identify differing geographical and temporal patterns of violence
mobilization that can inform law enforcement interdictions and
investigations when dealing with threats emanating from different
ideological groups active in the United States. For example, AQ-related
and Far-Left perpetrators committed more than half (55 percent and 52
percent, respectively) of their precursor behaviors within 30 miles of
where they lived. In contrast, Far-Right perpetrators committed less
than one-third (31 percent) and environmental perpetrators about one-
fourth (24 percent) of their precursor behaviors within 30 miles of
their residences.\8\
---------------------------------------------------------------------------
\8\ Smith, Brent L., and Paxton Roberts, Kelly Damphousse. ``Update
on Geospatial Patterns of Antecedent Behavior Among Perpetrators in the
American Terrorism Study (ATS),'' Report to Resilient Systems Division,
DHS Science and Technology Directorate. College Park, MD: START, 2013.
---------------------------------------------------------------------------
the global terrorism database, and the relative scarcity and diversity
of u.s. terrorism \9\
---------------------------------------------------------------------------
\9\ This section is adapted from the START Background Briefs,
``Overview: Terrorism in 2016,'' published in August 2017 and
``Ideological Motivations of Terrorism in the United States, 1970-
2016,'' published in November 2017. These are included in the Appendix.
---------------------------------------------------------------------------
According to START's Global Terrorism Data (GTD), 61 terrorist
attacks occurred in the United States in 2016 resulting in the death of
61 victims and 7 perpetrators. As a region, North America experienced
the eighth-largest number of attacks out of 12 regions across the
globe.
----------------------------------------------------------------------------------------------------------------
Percent Percent
Region Total Percent Change Total Percent Change
Attacks of Total from 2015 Deaths of Total from 2015
----------------------------------------------------------------------------------------------------------------
Middle East & North Africa.................... 6,088 45% +2% 19,121 55% +8%
South Asia.................................... 3,628 27% -21% 7,774 22% -6%
Sub-Saharan Africa............................ 2,051 15% +6% 6,591 19% -37%
Southeast Asia................................ 1,078 8% +1% 635 2% -2%
Western Europe................................ 269 2% -20% 238 1% +39%
South America................................. 133 1% -24% 71 0% -44%
Eastern Europe................................ 132 1% -81% 112 0% -86%
North America................................. 72 1% +14% 73 0% +38%
Central Asia.................................. 16 0% +78% 20 0% +54%
Australasia & Oceania......................... 10 0% -29% 0 0% -100%
East Asia..................................... 8 0% -71% 32 0% -74%
Central America & Caribbean................... 3 0% +200% 9 0% .........
-----------------------------------------------------------------
Total................................... 13,488 100% -9% 34,676 100% -10%
----------------------------------------------------------------------------------------------------------------
The majority (85 percent) of the terrorist attacks that took place
in the United States in 2016 were non-lethal, and in three additional
attacks, the only people killed were the assailants. A total of 61
victims were killed in attacks that took place in Orlando (49), Dallas
(5), Baton Rouge (3), New York City (2), Philadelphia (1), and Bristol
(1).
Religious figures and institutions were most frequently targeted in
terrorist attacks in the United States in 2016. These attacks mainly
involved churches, mosques, and synagogues, typically using incendiary
weapons. Nine attacks targeted police in the United States in 2016, 4
of which resulted in the deaths of 9 police officers and 1 bystander.
The assailants in these cases were not affiliated with formal
perpetrator organizations, but espoused racist (anti-white), anti-
police, or jihad-inspired motivations.
In June 2016 an assailant armed with an assault rifle and a handgun
opened fire at Pulse, a gay nightclub in Orlando, Florida. The
assailant then held a number of people hostage inside the nightclub for
3 hours. Forty-nine people were killed and more than 50 people were
injured before law enforcement officers shot and killed the assailant,
identified as Omar Mateen. During the course of the attack, Mateen
pledged allegiance to the Islamic State of Iraq and the Levant (ISIL)
and indicated that he carried out the attack in retaliation for U.S.
airstrikes in Iraq and Syria.
Between 1970 and 2016 terrorist attacks in the United States were
motivated by a variety of ideological perspectives. The following
charts and paragraphs present information from the GTD on terrorist
attacks classified by ideology as part of the Terrorism and Extremist
Violence in the United States (TEVUS) project.
In comparison to the 2000's, there was a sharp decline in the
proportion of terrorist attacks carried out by left-wing,
environmentalist extremists during the first 7 years of the 2010's
(from 64 percent to 12 percent). At the same time, there was a sharp
increase in the proportion of attacks carried out by right-wing
extremists (from 6 percent to 35 percent) and religious extremists
(from 9 percent to 53 percent) in the United States.
The lethality of terrorism in the United States between 1970 and
2016 was characterized by thousands of non-lethal attacks (91 percent)
that were punctuated by relatively rare but deadly, or even
exceptionally deadly, attacks. Although the lethality of attacks during
the 2010 to 2016 time period did not nearly match that of the two prior
decades, this basic pattern remained. For example, of the 68 people
killed in attacks carried out by jihadi-inspired extremists during this
period, 49 died in the Orlando, Florida attack in 2016. Fourteen others
died in San Bernardino, California in a 2015 attack by Syed Farook and
Tashfeen Malik. Likewise, 9 of the 18 people killed by white
supremacists or white nationalists died as a result of Dylann Roof's
2015 attack at Emanuel African Methodist Episcopal Church in
Charleston, South Carolina. Six others were killed when Wade Michael
Page attacked worshippers at a Sikh temple in Oak Creek, Wisconsin.
This demonstrates that the overall trends in terrorism in the United
States with respect to ideology are highly sensitive to the influence
of individual mass-casualty attacks.
Terrorist attacks attributed to formal organizations in the United
States were relatively rare in the years following the September 11
attacks. In particular, attacks that took place between 2010 and 2016
were typically carried out by individual perpetrators who were only
loosely linked to a specific organization or ideological movement. The
motivations for attacks were both diverse and overlapping. In some
cases, they were narrowly focused on issues and in other cases inspired
by broad belief systems. They included both oppositional (anti-) and
affirmative (pro-) views, or sometimes both.
When focusing on formal terrorist organizations that have conducted
attacks in the United States enumerated in the GTD, we again find a
diversity of actors emerging each decade from 1970 through 2013.\10\
---------------------------------------------------------------------------
\10\ This chart is based on data from a derivative dataset of the
GTD that looks at the groups responsible for attacks in the United
States, called the Profiles of Perpetrators of Terrorism in the United
States (PPT-US). See Appendix for PPT-US Research Highlight.
---------------------------------------------------------------------------
dominant ideologies of terrorist groups that emerged each decade
conclusions
Based on several different databases funded through July 1, 2017 by
the U.S. Department of Homeland Security, the U.S. State Department and
the National Institute of Justice, we are able to examine terrorism in
the United States across a range of ideological types. In general, this
analysis shows that the nature of terrorist violence in the United
States differs significantly from the global picture, primarily due to
its diversity and relative scarcity. In particular, the perpetrators of
terrorism in the United States represent a wide variety of ideologies.
Attacks in the 1970's were dominated by Far-Left groups; Far-Right
attacks dominated the 1980's and 1990's; and Islamist groups became
increasingly important following the 9/11 attacks. We also find
important differences in target selection, tactics, and lethality
across different ideological groups. These important differences by
ideology suggest that focusing on only one form of terrorism active in
the United States will result in less effective counterterrorism and
increased risk for American citizens.
Funding for most of the data reported here has now ended but START
is actively seeking support to allow us to keep these data current and
useful for policy makers, counterterrorism professionals, students, and
researchers.
Mr. Langevin. Thank you, Mr. Chairman.
So to Director Wray and Secretary Duke, for both of you, in
your testimony, you reference two major cybersecurity incidents
this year, WannaCry, and NotPetya, under the National Cyber
Incident Response Plan. When a significant cyber incident
occurs, the Department of Justice, acting through the FBI, is
the lead agency for threat response, and DHS is the lead agency
for asset response.
So can you and Director Wray describe how your two agencies
collaborated in response to these incidents and your lessons
learned? How do you see the cyber threat evolving? What gaps do
you see in U.S. defenses in response to recovery efforts?
Ms. Duke. Well, I think the main division is that DHS is
responsible for securing the systems and remediating any
malware. So we are more on the technical side of addressing the
threat, such as WannaCry. We are embedded with the FBI in their
National Cyber Joint Task Force, and then we have our own end-
take.
I think that what we are having to do is really understand,
as the director said earlier, the difference between state
actors, just persons looking for maybe financial gain, and
those hybrid actors. That has become much more difficult. I
think just information sharing and the co-location is huge for
us working together in the future.
Mr. Wray. I would just add that just as the DHS has the
lead in asset protection and asset mitigation, the FBI has the
lead in threat response, which we understand to mean sort of
the pursuit and the attribution and the investigation of the
incident.
I have been encouraged by how much progress has been made
about the cooperation between DHS and FBI on this issue. It has
been a challenge for everybody because it is such an evolving,
challenging technical area. But because of the various
interagency task forces that exist--and there are ones that are
both at the policy coordination level that are sort-of
standing, and then there are specific ones that get stood up in
response to a significant cyber incident. I think the better we
get, and we need to keep getting better, at information sharing
and kind-of cooperation, and including involving the private
sector wherever possible, I think that is how we are going to
ultimately get in front of the threat.
Mr. Langevin. Any gaps in particular?
Ms. Duke. I think one of the biggest gaps is that the role
that critical infrastructure plays in this issue in protecting
our country. So as the director said, having to involve the
private industry in key critical infrastructure sectors.
Mr. Langevin. OK. So, Secretary Duke, while model aircraft
have been available to the general consumer for decades, the
injection of precision navigation and simple-to-use control
interfaces has rapidly expanded the user base of unmanned
aerial vehicles. Combined with the capability to carry small
payloads, such as improvised explosives, these devices now can
be used to commit acts of terror, sadly.
So I have worked with my colleague, Senator Whitehouse from
Rhode Island, to introduce legislation criminalizing the
reckless operation of drones. But that in and of itself cannot
stop committed violent actors. So how is DHS assessing the
rapid increase and the quantities and capabilities of small
UAVs and the potential to be used as an attack vector?
In case my time doesn't run out, Director Wray, as you note
in your testimony, integrating intelligence is the critical
strategic pillar of the FBI strategy. I want to thank you for
your efforts in this domain.
In the international space, the United States provides a
significant amount of intelligence to our foreign partners that
enables them to better protect their own nations from attacks.
Can you and Director Rasmussen comment on how these partners
are reciprocating in information sharing, and what can be done
to improve this cooperation?
Ms. Duke. A quick answer on the unmanned aircraft systems.
This is an area where we lack authority. If there is anything I
would ask of the committee it would be to assist us in getting
authority. We can't even do testing of anti-UAS systems with
our current authorities, and we think this is a major
increasing threat.
Mr. Wray. On the foreign cooperation point, one of the
things that we are doing better now that has, I think,
significantly improved the amount of intelligence flowing back
the other way is through our legat program. We have legats in--
80 legats serving 200 countries. That is our foreign offices of
the FBI.
A lot of those, I just came back from Europe, in
particular, where we are starting to get more and more two-way
flow of information, in particular, from the Brits, but also
from other countries. As they learn more about what would be
valuable, and we get more and more embedded and the level of
trust both ways between the two countries matures, I think that
is another place where, when I look at the kind of cooperation
that exists now between intelligence services and the way it
was back when I was in Government before, it is like night and
day. Doesn't mean it can't be better, and it needs to keep
getting better, but I really feel like we are on the right
track there.
Mr. Rasmussen. I would just add to that that if there was
any modest silver lining in the difficult threat environment
that we face driven by ISIS over the last few years, it has
been the dramatic increase in information sharing globally that
we have seen. Many more countries than ever before view this as
their problem too and simply not something that they can shut
off and ignore and say that is an American problem or that is a
British problem.
So the array, the number of countries that we have active
intelligence sharing arrangements with is in the many, many
dozen now, rather than just a handful of very close partners.
Again, the foreign fighter phenomenon has also helped drive
that kind of information sharing as well. So it is a modest
silver lining, but it is something we can build on for the
range of terrorism threats that we will face in the future.
Mr. Langevin. I want to thank you all for your testimony,
your insights.
Secretary Duke, I think it is pretty outrageous that DHS
can't even do testing on drones and their capabilities.
Mr. Chairman, maybe that is something that we can work on
together to help to change.
Chairman McCaul. I have been looking at this issue for
quite some time. We have seen drones being used in Iraq and
Syria. We have seen drones at the White House, the Capitol. I
do think it is time for us to consider legislation to move some
authorities from the FAA to the Department of Homeland
Security, and I would very much like to work with you.
Mr. Langevin. Thank you, Mr. Chairman. I welcome the
opportunity.
With that, thank you to our witnesses. I will yield back.
Chairman McCaul. The gentleman yields.
The gentleman from Nebraska, General Bacon, is recognized
for the first time.
Mr. Bacon. Thank you, Mr. Chairman. It is an honor to be on
the committee. Defending our Constitution and strengthening our
National security are my most important priorities, and it is
an honor to be on this committee to put some focus on that.
Secretary Duke, I wanted to ask you about what I consider
as one of the most important threats to our country, and that
is the cyber penetration from Russia and China into our energy
infrastructure, our--perhaps our financial networks. How would
you assess the threat that Russia and China poses, say, on a 1
to 10 scale, 10 being the worst? Because what I fear is the
next December 7 we face will be preceded by an energy attack or
a financial sector attack like that. Thank you.
Ms. Duke. It is very strong. On a scale of 1 to 10, I would
say probably a 7 or 8, because what we know is daunting and we
don't know what we don't know. But looking at using cyber to
attack the control systems of critical infrastructure is a
major area of concern that we are working with the critical
infrastructure on.
Mr. Bacon. It seems apparent to me that they are putting a
foundation in to have that capability, if needed. I think we
should be concerned. Do you think we are doing enough to build
resilience in the system or to have back-ups, or is there a lot
more that we can do?
Ms. Duke. I think that it is to the point where the
critical infrastructure sector has really recognized the threat
recently, so I think everyone has the attention. Now it is
implementing the safeties to help try to prevent this.
Mr. Bacon. Thank you.
Director Wray, when I go and talk to the law enforcement in
the Omaha area, I ask them: What is the one thing that we can
do more to help you with, gun violence and things like that? I
hear two things: Do more about straw man purchases. Not enough
is being done there. Also to help off-duty law enforcement to
be able to carry their weapons, or retired.
Would you share those sentiments from our law enforcement
from Omaha?
Mr. Wray. Well, certainly on the straw purchasing side,
when I was a line prosecutor back--as a baby prosecutor, I used
to do a lot of straw purchaser cases. I do think that is a
place where more aggressive enforcement of laws on the books
would be very helpful. Most of that responsibility lies with
ATF. But we work collaboratively with the ATF, who is a great
partner on more organized criminal activity that involves some
of the same kind of firearms crime that you are talking about.
As you may know, the Attorney General is revitalizing
Project Safe Neighborhoods that was a very effective Federal,
State, and local program that existed in the early 2000's that
kind of built off of Project Exile that had been in Richmond to
really try to more strategically focus on gun violence. So I
think that will help the folks in Omaha, among other places.
Mr. Bacon. Thank you. I am going to be working on some
legislation toward that end. Thank you.
Director Rasmussen, as you know, Secretary of Defense
Mattis has changed our strategy. When we get to an area where
ISIS is operating, our policy previously had been to take over
the city, but they would be able to get out, retreat, regroup
somewhere else. Now his strategy is to kill them where they are
at and not let them get out.
Are you seeing effects of the strategy where we are seeing
less of these terrorists leaving Syria, trying to come back
this direction or going to Europe, or are you seeing a
reduction in this terrorist flow?
Mr. Rasmussen. Well, certainly, the territorial aspect of
the fight that I mentioned in my prepared remarks has
accelerated over the course of this year with the dramatic
reduction in the amount of territory ISIS controls. One of the
difficulties and challenges, though, has been that that
campaign has taken a period of time to play out in a sense that
the bad guys, in many cases, knew where we were headed next.
They knew that the effort was focused on Mosul, the largest
city in Iraq that was under ISIS control. They knew we were,
over time, going to move toward Raqqa, the city in eastern
Syria that served as the headquarters for ISIS. That,
unfortunately, allowed many of the actors we would be most
concerned about to bleed out over time ahead of that campaign.
Many chose to fight, to stay and fight, and they chose to stay
and fight and die in defense of the caliphate. But others we
are concerned about have made their way into either the Iraqi
countryside or are trying to find their way out of the conflict
zone.
So it is not necessarily a volume question as much as it is
a quality and quantity question. If the wrong individuals get
out, the wrong individuals who have particular capability or
skill and experience with weapons of mass destruction, those
are the ones we are the most concerned about.
But, yes, I agree. We are absolutely focused on making sure
these individuals do not escape the battlefield.
Mr. Bacon. One last question, if I may. I think we are
doing a lot on the kinetic side, going into the cyber mode for
recruitment, going after the financial end of it. But I have
yet to see how we can do better at undermining the ideology
that recruits lone wolves to help sustain ISIS and al-Qaeda
overseas.
What more can we be doing to undermine the ideology that
does this recruiting?
Mr. Rasmussen. I think there, a soft touch and a little bit
of subtlety is required, because I think we will be most
effective if we are enabling and empowering credible actors who
can speak credibly to those potentially vulnerable populations,
rather than something coming out from the State Department or
with the brand of the United States on it saying this is how
you should behave, this is how you should believe. But if we
can identify and empower and support credible voices within the
communities where this is a problem, it is a better solution.
Mr. Bacon. Thank you. Mr. Chairman, I yield back.
Chairman McCaul. The gentleman yields.
Director, I just wanted to comment, in addition to doing
counterterrorism work as a Federal prosecutor, I was also an
exile prosecutor. Please relay to the Attorney General my
thanks for reviving that program. It is very good. It works. So
thank you.
The Chair now recognizes the gentlelady from Texas, Ms.
Jackson Lee.
Ms. Jackson Lee. I thank you. Let me start out by thanking
each and every one of you for your service to this Nation. My
time is short, and so I will be pointed in my questions.
Secretary Duke, let me first of all offer my sympathy
publicly again as I have done for the loss of life of a Border
Patrol agent just a few weeks ago, and as well, one that is
injured and mending. Thank you for all of the men and women
that work in the Homeland Security Department.
Let me focus on Hurricane Harvey, which, by connection, I
think it impacts the Virgin Islands, and as well, Puerto Rico
and Florida and others.
FEMA certainly is an agency that we owe a great debt of
gratitude to, but let me be very clear. I have been asked how
Houston is doing, how Texas is doing. We are a strong group of
people, but we are devastated. It is so difficult dealing with
FEMA and the repeated denials, people who have not heard from
FEMA. FEMA is good for the immediacy, but it is not good for
recovery, and you are listed as a recovery agency. We need help
down in Texas. We need more FEMA, DRCs. We need more people
dealing with the appeal process. It is absolutely absurd.
The second question is dealing with the appropriations. I
would ask that you would ask the President of the United States
to consider that $44 billion is shameful. The President came to
Texas and said that we would provide you with everything you
need. This is $44 billion for the U.S. Virgin Islands, Puerto
Rico, Texas, and everyone else.
So if you would answer that question after. Let me go to
Director Wray. I will put the questions on the record very
quickly.
The questions on the record are, Director Wray, as you well
know, there have been some anti-Muslim videos that have been
offered by the Commander-in-Chief. My question is, as the world
has condemned this, how difficult it makes the work of the FBI
that deals with domestic terrorism with these kinds of videos
being associated with the United States.
Second, I am interested in the commitment to not do reverse
targeting under 702. I know that it is an international issue,
but the FBI is involved in terrorism, in the fight against
terrorism, and may use the 702 law. I want to know your
position on reverse targeting of a U.S. citizen.
Finally, the black identity extremists. We have had some
conversations on that. I believe it is crucial that there be a
clarification so that individuals expressing themselves in the
First Amendment understand the parameters of the FBI.
Ms. Duke, if you would, please, Secretary Duke.
Ms. Duke. I will check into the specific inquiries. I will
work with Governor Abbott's office to make sure that we are
keeping in Texas. The $44 billion is the current supplemental.
We do expect that there will be needed additional
supplementals. But for now, we do have adequate resources to do
all the recovery efforts.
Ms. Jackson Lee. I vigorously disagree with you. We do not
have the adequate resources, and this is going to be on the
verge of a Government shutdown if Texas and all of the other
victims of these hurricanes do not have a compromise where we
can work together. I would encourage you to tell the President
that it is not enough. It simply is not.
May I also just leave with you Ms. Temitope N. Jimoh, J-i-
m-o-h, who is a United Airlines supervisor, who has not been
able to determine why she has been denied official background
checks. She has filed two appeals, so I would like to speak
with your leg affairs on that. Thank you.
Ms. Duke. Yes.
Ms. Jackson Lee. Director Wray, thank you.
Mr. Wray. Thank you, Congresswoman. If I can take your
questions in rapid-fire fashion here. The first one, I think we
try very hard at the FBI, and will continue to try very hard,
to earn the trust and confidence of every community we serve
and protect, including the Muslim-American community. We are
trying, as I mentioned in response to an earlier question, to
encourage people to come forward as potential sources and
witnesses, and we will continue to do that.
On the reverse targeting point, my position is there should
not be and we do not permit reverse targeting under section
702.
On the black identity extremist issue, I thought our
conversation yesterday was candid and constructive, at least I
hope you felt the same way. I can assure you and the rest of
the American people that we do not investigate people for
rhetoric, for ideology, for First Amendment expression, for
association. What we do is when people are engaged in--when
there is credible evidence of Federal crime involving the
credible threat of force or violence to further a political or
social goal, that is our focus. We have no interest
investigating any group for expressing strong views, no matter
who might consider them extremist, about any important social
issue, including racial injustice.
Ms. Jackson Lee. Did you answer that last question--I have
got 9 seconds--about 702?
Mr. Wray. Oh, I am sorry. On 702, I was just saying we do
not permit reverse targeting and would not.
Ms. Jackson Lee. Thank you so very much.
Chairman McCaul. The Chair recognizes the gentleman from
Florida, Mr. Rutherford.
Mr. Rutherford. Thank you, Mr. Chairman.
First, I want to thank the panel for your service to the
country and particularly your service here this morning in this
long testimony. You know, there is an old saying that everybody
uses, ``don't beat a dead horse,'' and of course, then we turn
right around and beat the dead horse.
So, Secretary Duke, I too am going to ask about the OMB's
recommendation of the $44 billion for storm recovery. Here is
the issue in Florida. We are a very large agricultural State.
Most people don't realize that. But we took a very hard hit,
about $1.5 billion, and almost $700 million of that was to our
citrus industry.
This is why a supplemental to follow is not adequate,
because these citrus farmers need the money now for the next
crop coming. If they don't have that--those assets right now,
then they are not going to be prepared for the next growing
season. I spoke with one citrus grower who lost 36,000 trees--
36,000 trees. That is going to take some time to replace, and
more delays is going to have a tremendous negative impact on
our recovery in Florida.
So I would like you to carry that back to the
administration and the OMB, and let them know the impact that
that is going to have on these growing seasons that don't wait
for the next supplemental. So thank you for that.
Now I would like to shift over to and follow up on cyber,
as many of my colleagues have. You know, not just asset
protection, but also the ideological fight that I think needs
to go on within the cyber war.
Director Wray, you mentioned the cyber squads that you have
now in all 56 regional offices. What I would like to know is
what are the difficulties--you know, one of the challenges, I
think, in the world of cyber is getting that great talent and
being able to pay for it and pull them away from, you know,
private industry. How--is there anything that we can do to help
you get the best of the best for your cyber war?
Mr. Wray. Well, I was--as you started to ask the question,
I was thinking, before you got to the talent, that was going to
be my answer as the principal challenge. There is just not
enough people who really have that sort of genius-level talent
for anybody, including the private sector. Of course, we can't
compete with the hefty paychecks that the private sector can
offer those same people. But I do believe that people--we can
compete with anybody on mission. I think we have found that the
bright, young talent that we are able to attract in this base
join us for the right reasons, which is our commitment to the
mission.
We clearly need more of them. We are trying to do more to
raise the level of what I will call sort-of cyber literacy
across our work force, because one of the things that we
struggle with right now is that our sort-of our cyber black
belts, if you can call them that, get diverted into having to
help out with other kinds of criminal investigation work that
has a cyber component. But if we could raise the basic level of
literacy across the organization, and I assume Secretary Duke
would say the same thing within hers, then we could really have
the most talented people focus on the really sophisticated,
cutting-edge stuff, and that is where I am hoping to take the
organization.
Mr. Rutherford. I am glad you referenced homeland security,
because I know the Secret Service, for example, had some great
success in going after transnational organizations with money
laundering and those kind of things. It is important to have
that cyber attack.
Director Rasmussen, how about you, is there anything--you
know, what can we do to help you all with this recruiting,
anything?
Mr. Rasmussen. Well, Director Wray made a very good point.
With the mission that we have before us, whether it is
counterterrorism we are dealing with, cyber crime, or cyber
threats to the United States, motivating young people to want
to do this for a living is not a challenge. When we put out
announcements for job openings, we get hundreds and hundreds of
very high-quality applicants from all over the country.
One of the challenges we are facing in the intelligence
community is getting them through the security clearance
process quickly enough so we don't make someone wait 18 months
to start embarking on their Federal career, and that is
something we are working on internally. But I would tell you,
the biggest thing that you could give us as all Federal
agencies is a predictable funding environment so that we didn't
have to wonder year-to-year, will I be able next year to have
an entry-level cadre of young people coming in or am I stuck
with this year's class and I have to hold onto them that much
longer? So year-to-year predictability is very, very important.
Mr. Rutherford. Yes. Let me ask one other thing in the
little bit of time I have left. The National Cyber Incident
Response Plan. As was mentioned earlier, DHS is responsible for
the asset response, but FBI and DOJ are responsible for the
threat response. What is the involvement of private industry in
that partnership in response? Do we need some further
clarification and definition of roles in the cyber war?
Mr. Wray. I would say that while there was a time when the
definition was murkier and there was more confusion about the
lanes in the road, that after PPD-41, the lanes in the road, I
think, are much more clearly defined. So I haven't seen as much
of that as an issue.
I think the private-sector engagement piece is something
that we in DHS work on together a lot more and more. We are
always trying to figure out ways to balance the desire to get
with the private sector faster, but at the same time, to make
sure we are both providing accurate information and that we are
not compromising an existing investigation. In many cases, the
information that we are getting, at least on the FBI side, is
either Classified or involves coordination with our foreign
partners, as I said earlier, and there may be restrictions on
our ability to share it.
So we are all learning collectively, the interagency
community and the private sector, about how to kind-of adapt to
this comparatively new threat still.
Mr. Rutherford. OK. Well, again, I thank all of you for
your time.
Mr. Chairman, I yield back.
Chairman McCaul. The gentleman yields.
The gentleman from Louisiana, Mr. Richmond, is recognized.
Mr. Richmond. Thank you, Mr. Chairman. Thank you, Ranking
Member, for having this meeting. Thank you, Director Wray, for
the meeting yesterday which was very thorough, and I hope we
continue to follow up.
Let me just ask you all, and maybe Director Rasmussen or
Director Wray would have more insight. I am concerned about the
new and reemerging slave trade in Libya, and the question is:
Have you all--do you all have any intelligence on it? Do you
have any reason to believe that it is not, in fact, happening?
Mr. Rasmussen. Obviously, the fact that there is as much
political chaos and a vacuum of authority in Libya opens the
door to all kinds of criminal and other illicit activity. Human
trafficking is obviously a component of that, as groups try to
move individuals up through Libya and potentially into Europe
and contribute to the migrant problem--migrant challenge in
Europe. We follow that pretty closely from a terrorism
perspective because those same networks can be used to move
extremists who want to do us harm or do harm to our allies and
friends also.
So we could arrange to share some more Classified
information with you or your staff in terms of what we know
about those challenges. Unfortunately, what we know and what we
can do about it are two separate things. We don't have a lot of
capability on the ground.
Mr. Richmond. I agree. But almost like in a medical
situation, you first have to diagnose that there is a problem
and acknowledge there is a problem. I think that there is more
that Congress can do. I just wanted to know from experts
whether it is something you all would say is fact, that it is
happening.
Mr. Rasmussen. It is certainly true.
Mr. Richmond. OK. Thank you for that.
Director Wray, and actually all of you all have employees
that have to fill out the SF-86 form. You talked about the
process of 18 months to actually get through the process. But
my question is, at what point--and maybe, Director Wray, as a
former agent, you can comment on this--at what point do
omissions become willful and deliberate omissions that rise to
violating, I think it is title 18, section 1001, which is
penalties for inaccurate or false statements on the security
clearance form?
Mr. Wray. Well, first, while I would love to claim to
having been a former agent, I can claim to be a former
prosecutor. So I wouldn't want any of my--many of the many
agents who work for me to view me as a poseur.
Mr. Richmond. Got it.
Mr. Wray. But I am very proud of my credentials now,
however.
Second, on the SF-86 point, you know, really it is going
depend on all the facts and circumstances of the particular
case. You know, willfulness requires a level of conscious
knowledge and intent, a knowing falsehood and a recognition
that the person is making a material omission or false
statement and recognizing that that is what they are doing when
they do it, I guess is the way I think of it. That is layman's
speak, and you as a former defense lawyer can appreciate some
of the nuances there.
Mr. Richmond. I guess, if we look at the administration and
take the most obvious example, which is Kushner's form that has
been amended, you know, over 100 times, and usually after it
comes to light that it was inaccurate, the question becomes
people who apply to your agencies who may leave off, you know,
high school eviction, you know, college eviction from an
apartment or something like that, who may get prosecuted for
it, at what point do we start to get to selective prosecution
if we don't set the example at the top level with willful
omissions that don't get corrected until after they are brought
to the public?
Mr. Wray. Well, certainly, I think it is important to
respond truthfully and completely on an SF-86, and I would
expect all my folks to do that. It is a bear of a form to fill
out, if you have ever seen one. The older you are and the more
time periods you have got to cover, it is a challenge. I am not
aware of a whole lot of prosecutions that have occurred of
people for their SF-86 responses, but certainly, I do think it
is important for everybody at any level to try to be as
truthful and complete and accurate as possible in filling out
the SF-86.
Mr. Richmond. With my last 15 seconds, let me just thank
you all for the job you do. We know how complicated it is from
how do we secure drones or unmanned aircraft now. Mr. Higgins
would relate, in my district, I probably have the largest
petrochemical footprint in the country. That is a concern of
how we protect it from flying objects that can be directed. So
no one professes that what you do is easy, but we thank you for
your service, because the safety of the homeland depends on it.
For those people who work for you all, please let them know
that this Congress--and I think I can speak for everybody--
surely appreciates their service and sacrifice for the country,
With that, Mr. Chairman, I yield back.
Chairman McCaul. The gentleman yields.
The gentleman from Texas, Mr. Ratcliffe, is recognized.
Mr. Ratcliffe. Thank you, Mr. Chairman.
Let me start off where my friend and colleague from
Louisiana left off, and that is thanking our entire panel
today.
Director Rasmussen, let me just tell you that I believe
that our Nation is safer and better because of your service,
and I will just tell you that you will be missed.
Secretary Duke, as the Chairman of the Cybersecurity and
Infrastructure Protection Subcommittee here, I have enjoyed
working with you, and I have appreciated your leadership on
what I believe is our greatest National security threat in the
long term: Cybersecurity. Having said that, while I look
forward to working with you, I have a limited time today. While
I believe that cybersecurity is our greatest National security
threat, I believe that our most urgent National security threat
right now relates to section 702 that has been mentioned a
number of times.
So let me turn to you, Director Wray. The reason I call 702
the most urgent National security matter is I think it has been
mentioned that it is about to expire. We have 9 legislative
days left here in this Congress before the section 702 of FISA
expires at the end of the year. Now, it has been mentioned that
702, broadly speaking, targets foreign intelligence from non-
U.S. persons reasonably believed to be outside of the United
States.
But quantifying exactly how important 702, I think, has
been left out of some of the discussion, I want to give you the
opportunity to expound on that or maybe refute it. Our
intelligence agencies estimate that 25 percent of our
actionable foreign intelligence comes directly from 702. Do you
believe that to be accurate?
Mr. Wray. I am not sure that I know what the percentage is,
but that doesn't surprise me, that estimate. I would have no
reason to question it. I will tell you that every person I talk
to who has actually seen the operation of section 702
internally, up close--and I have sat with agents at the
terminal watching how they use it so that I could be sure that
I was really understanding it--every single one of them is just
horrified at the thought that we would lose that valuable tool.
Mr. Ratcliffe. Well, let's assume our intelligence agencies
are correct and 25 percent is an accurate number, are you aware
of any legal authority that would provide us a greater
percentage of actionable foreign intelligence than section 702?
Mr. Wray. No.
Mr. Ratcliffe. OK. So we established that it is very, very
important to our National security. Now let's talk about how
effective 702 really is. I participated last week in a debate
at the Judiciary Committee as Congress moved forward and the
Judiciary Committee moved forward something called the USA
Liberty Act, which seeks to reauthorize but significantly
modify 702.
In the course of that discussion, I found some of the well-
intentioned criticism to be misguided and unfair, because some
folks are conflating section 215 in telephony metadata with
section 702. Would you agree with me that those comparisons are
misguided and unfair?
Mr. Wray. Yes, I would.
Mr. Ratcliffe. All right. So one of the, I think,
legitimate concerns and questions that has been raised about
section 702 relates to the issue of incidental collection of
information on Americans and even non-U.S. persons who are in
the United States. We know that that happens. But again, I
think what has been left out of much of the public debate, and
I want to give you the opportunity to weigh in and clarify, as
we Members of Congress and the public watches this debate move
forward, there is oversight of this incidental collection that
takes place. It takes place through an oversight board, a
nonpartisan board called the Privacy and Civil Liberties
Oversight Board, or PCLOB, correct?
Mr. Wray. Correct.
Mr. Ratcliffe. PCLOB has actually issued a very specific
report reviewing section 702 and the incidental collection that
has taken place, correct?
Mr. Wray. Correct.
Mr. Ratcliffe. All right. To your knowledge, does that
report from an independent oversight board, has it found--in
the 7 years that 702 has been in place, has it found any
intentional abuse of section 702?
Mr. Wray. Not to my knowledge, no.
Mr. Ratcliffe. Over 7 years, no intentional abuses of
section 702. I would think that that is essentially a record of
success for a Government authority that is unrivaled, certainly
in my experience. So I guess you agree with me that 702 is our
most important law enforcement and counterintelligence tool
with respect to foreign intelligence?
Mr. Wray. Yes.
Mr. Ratcliffe. It is our most effective?
Mr. Wray. Yes.
Mr. Ratcliffe. It is our least abused?
Mr. Wray. Yes.
Mr. Ratcliffe. Given that, if we not only failed to
reauthorize, but failed to reauthorize section 702 in as close
to its form as it possibly is right now, would we as Members of
Congress be jeopardizing National security for all 320 million
Americans, in your opinion, as America's top law enforcement
official?
Mr. Wray. That is definitely my view. I appreciate the
question, because I think, when I talk about the importance of
reauthorizing section 702, it is exactly as you say. It is the
importance of reauthorizing it in as close to the current form
as possible.
Mr. Ratcliffe. My time has expired. I thank you all.
Chairman McCaul. The gentleman yields.
Let me echo those sentiments. I believe reauthorization of
702 as close as possible to current law is vitally important to
the security of the United States.
With that, the Chair now recognizes Ms. Barragan.
Ms. Barragan. Thank you, Mr. Chairman.
Secretary Duke, thank you for being here today. I just was,
last week, visiting our troops overseas for Thanksgiving. I was
in Afghanistan. I am just amazed at how these young men and
women are on the front lines fighting terrorism, doing so with
the mission of protecting our homeland.
Earlier this year, I was disturbed to learn that if you are
not a citizen in this country and you pick up a weapon and you
go fight overseas and you die there, we will make you an
automatic citizen. But if you survive and you come back to this
country, you can still be deported. When I was out there, I was
talking to a few of our soldiers who were telling me about some
of their concerns and their problems with family members who
are going through proceedings.
Can you tell me if any veterans are being deported right
now under your watch?
Ms. Duke. I would have to get back for the record. I do
know that DOD, Department of Defense, is looking at
reinstituting the program of paths for citizenships for
soldiers. But in terms of recently returning veterans, I would
have to get back. They are not a priority, for sure.
Ms. Barragan. OK. Great. If you could do so in writing, I
would appreciate that.
You know, I have introduced a bill to address this so that
we can just make sure we are protecting those who are on the
front lines and are serving.
I wanted to ask you a little bit about Hurricane Harvey in
Texas. My understanding from reports that I had read is that
there was some confusion about in directives on whether
immigration checkpoints were going to remain or not. So I
wanted to ask if you were aware of the confusion that was
created from the directives?
Ms. Duke. We early on issued that there would be no active
immigration control, that other than criminal acts that needed
to be addressed, that we would not do proactive immigration
enforcement.
Ms. Barragan. OK. I am going to go ahead and enter into the
record an article covered by NPR and some other organizations
that kind-of highlighted the confusion that caused even the
Mayor, I think, of Houston to have to come out to go on record
to make a statement about this. I am hoping that this will be
something that won't become an issue as another, you know,
emergency disaster happens. Because we want to certainly make
sure that people feel safe and secure in following authorities
when they are being asked to leave. In that regard, I have
introduced a bill on that. Hopefully, my colleagues will take a
look at that.
Chairman McCaul. Without objection, so ordered.
[The information follows:]
Article Submitted For the Record by Honorable Nanette Diaz Barragan
Border Patrol Says Texas Checkpoints To Remain Open During Hurricane
Harvey
By Julian Aguilar, Texas Tribune, August 25, 2017.
https://www.texastribune.org/2017/08/24/border-patrol-texas-
checkpoints-remain-open-hurricane-harvey/
Customs and Border Patrol agents constantly patrol wide gravel roads
along the border fence. The traffic--which has increased as border
enforcement budgets have soared--is another threat to border wildlife,
according to scientists and conservationists.--Callie Richmond for The
Texas Tribune
The devastation was swift, and the recovery is far from over.
Editor's note.--This story has been updated with statements from
the U.S. Border Patrol, Immigration and Customs Enforcement and U.S.
Customs and Border Protection on Friday, Aug. 25.
As thousands of Texans prepare to evacuate their cities due to
Hurricane Harvey, the United States Border Patrol said it is not
planning to close its roadside immigration checkpoints north of the Rio
Grande Valley unless there is a danger to travelers or its agents.
``Border Patrol checkpoints will not be closed unless there is a
danger to the safety of the traveling public and our agents. Border
Patrol resources, including personnel and transportation, will be
deployed on an as-needed basis to augment the efforts and capabilities
of local-response authorities,'' the agency said in a statement.
``The Border Patrol is a law enforcement agency and we will not
abandon our law enforcement duties.''
When asked to elaborate on the statement, CBP public affairs
officer Roberto Rodriguez said officers would prioritize public safety
but keep intact the goals of the agency's mission.
``We're not going to impede anybody getting out of here, but at the
same time we're a law enforcement agency, so we still have to conduct
our duties,'' he said.
On Friday, the agency offered a little more insight into when
checkpoint closures could be expected.
``U.S. Border Patrol checkpoints in the path of Hurricane Harvey in
Texas will close as state highways close. These closures will occur in
a manner that ensures the safety of the traveling public and our
agents,'' the statement reads. But the agency also made clear that
checkpoints outside of Hurricane Harvey's path would remain open.
The American Civil Liberties Union of Texas quickly admonished the
agency for putting policy ahead of safety.
``Safety should be a priority regardless of immigration status,''
said ACLU policy strategist Astrid Dominguez. ``This is very concerning
for the community. It sends a wrong message.''
Also on Friday, Immigration and Customs Enforcement and Customs and
Border Protection said in a joint statement that ``non-criminal''
enforcement activities will not occur at assistance shelters or
evacuation sites. But they would remain vigilant ``against any effort
by criminals to exploit disruptions caused by the storm.''
On Thursday, Southeast Texas and the state's coastal bend regions
were expected to be the hardest hit by Hurricane Harvey. But the Rio
Grande Valley and its surrounding areas are also bracing for possible
severe flooding or worse if the path of the storm shifts.
As of Thursday afternoon, the National Weather Service said the
threat to life and property for Brownsville and the surrounding areas
was high and that ``Emergency plans should include a reasonable threat
for hurricane force wind of 74 to 110 mph of equivalent Category 1 to 2
intensity.'' But in an updated advisory on Friday, the weather service
downgraded that threat to moderate after winds began to recede in the
area.
The Border Patrol's statement on Thursday came the same day
Brownsville Mayor Tony Martinez issued a disaster declaration for the
city and activated its emergency operations center.
Dominguez said she was still hopeful that if the hurricane
intensified and a mass evacuation was ordered, the federal government
would ease up on enforcement.
That happened as recently as 2016, when ICE and U.S. Customs and
Border Protection temporarily suspended enforcement measures during
evacuations prompted by Hurricane Matthew.
``There will be no immigration enforcement initiatives associated
with evacuations or sheltering related to Matthew, including the use of
checkpoints for immigration enforcement purposes in impacted areas
during an evacuation,'' a 2016 statement read. ICE put out a similar
message ahead of Hurricane Isaac in 2012.
In its news release Thursday, the Border Patrol said it would work
to evacuate residents if called upon to do so.
``If there is a time when we have to unite with our emergency
preparedness partners to evacuate community members, we assure you that
we will act quickly ensuring that the safety of those requiring
evacuation remains paramount,'' the release states.
Ms. Barragan. Thank you.
I wanted to follow up on some of the questions about gun
violence and really their connection to terrorism. I think I
remember hearing former Homeland Security Secretary Jeh Johnson
once made a comment--and I am going to quote him--it said:
``meaningful, responsible gun control is now part and parcel of
homeland security, especially given the prospect of home-grown,
home-born violent extremism in this country.''
Do you agree with that assessment?
Ms. Duke. What we are seeing now is really an agnostic look
at tools. Guns are not necessarily the primary vehicle by which
terrorism is occurring.
Ms. Barragan. Well, would you say that the guns are part of
what terrorists are using, and that it certainly could be
perceived as access to guns could be part of the issue?
Ms. Duke. Guns, knives, vehicles are among the top, yes.
Ms. Barragan. Great. Thank you.
Director Wray, I wanted to ask you--you know, I have to
first agree with some of my colleagues who echoed, you know,
having more hearings on the threats presented by domestic
terrorism and home-grown terror. I also wrote a letter to the
Chairman asking that we do a hearing just on that. Instead, it
is harder to get to all these issues with the short amount of
time. But, Director Wray, terrorists are getting their hands on
and using high-assault weapons. It is a repeated occurrence,
costing American lives. We have seen it happen in San
Bernardino and Orlando at the Pulse nightclub. In particular,
there was an alarming statistic I saw that GAO reported that,
between February 2004 and December 2015, known or suspected
terrorists initiated background checks to purchase a weapon, I
think it was about 2,500 times. Ninety-one percent of the
transactions were allowed to proceed. Does this concern you?
Mr. Wray. Well, I am not familiar with the specific report
that you mention. I will say that, much as Secretary Duke has
said, we are really focused on the terrorists themselves,
whether they be domestic or international. They seem in many
ways hell-bent on committing attacks that kill as many people
as possible by whatever means they can get their hands on.
Ms. Barragan. So without looking at the report, would it be
concerning to you that people who are on the known or suspected
terrorist list are purchasing guns, and 91 percent of those
people are allowed to purchase guns? Is that concerning at all
to you?
Mr. Wray. Certainly. The way you describe it is very
concerning to me, yes.
Ms. Barragan. Thank you. I yield back.
Chairman McCaul. The gentlelady yields.
Mr. Garrett from Virginia is recognized.
Mr. Garrett. Thank you, Mr. Chairman.
I would commend the gentlelady on pointing out these
deported veterans issues. I was reading about that, and I saw
that one was deported after he was convicted of shooting into
an occupied vehicle in 2010. I am not sure who the President
was then, but it is nice to see the attention getting brought
on this subject matter now. So I would commend her for pointing
that out, and cite a Los Angeles Times story that points out
that each of the individuals in question deported between 2008
and 2016 had committed a crime, and there might be up to 350
such individuals.
But back to the testimony at hand, I am curious, I saw in
Ms. Duke's testimony that the Federal agencies had coordinated
prior to the events in Charlottesville. I think that is a good
thing, certainly more is needed. But when you have large
gatherings of people, say, for example, Saturday at 2 p.m. at
my high school, which is in Congressman Brat's district and not
my own, a State semi-championship football game will be held,
probably about 8,000 people will be in attendance. Is there any
Federal coordination for security for that sort of event?
Ms. Duke. Unless it is a declared a National security
event, our coordinations with the responsible local officials,
we call that a soft target, and we do quite a bit of training,
coordination, and assistance in advance to help them secure.
Mr. Garrett. Right. I apologize for the way this is going
because it is not intended to be a gotcha, and I am going that
way almost reflexively. Too much time as a courtroom lawyer.
But obviously, an event like that presents a soft target, as
you indicated, and a collaboration--or a gathering of people in
close proximity to one another. Yet technology recently has
demonstrated, via numerous videos on the internet, of the
ability to use drones as weapons, et cetera. There are numerous
Unclassified videos in sites ranging from The New York Times to
the Washington Post of 40-millimeter hand grenades being
dropped through the cupolas of M1 tanks, et cetera. We have all
seen them. Yet the anti-drone gun technology that currently
exists is limited in its capacity to be sold specifically and
exclusively to Federal law enforcement entities.
I would submit for any of you to comment on that the first
line of defense at that football game on Saturday will be local
law enforcement, with probably some augmentation by State law
enforcement, but that we do a historically wonderful job of
preparing for the last conflict to the last attack, and we
generally do a relatively poor job, which has been brought to
the forefront, post-9/11, of contemplating what that next
attack might be. For example, the weaponization of vehicles
that members of the panel have made reference to that we have
now seen all too many times, not only in Europe, but most
recently in the United States.
Can somebody tell me why the Virginia State Police or the
Henrico County Police department or the Albemarle County Police
Department can't purchase anti-drone technology when things
like UVA football games or the NASCAR race at Richmond motor
speedway occur under the protection of these entities? Can
somebody give me a good reason why local and State law
enforcement can't avail themselves of anti-drone technology? I
want you to say no, but if there is a good reason, I want to
hear it too.
Ms. Duke. No, there is no good reason. I think it goes, as
the Chairman said, to legacy of authorities and not having the
authorities because of the--it is conflated with the signal
waves of cellphones and how they are tracked. So it needs to be
addressed.
Mr. Garrett. Thank you very much. Again, I am on the same
team as all of you guys here, and I apologize again for my
tone. I am going to try to snap out of it.
Would it, in your estimation, be a good policy area to
consider to power down the ability to purchase anti-drone
technology to State and local authorities, given that they are
the first line of defense on so many soft-target events that
occur every single day in this country? Not to the civilian on
the street perhaps, but to law enforcement entities at the
State and local level.
Ms. Duke. I think also their ability to use them in
antiterrorism use, and the Federal Government as well. We are
limited just as State and local governments are.
Mr. Garrett. Absolutely. So what you are suggesting then is
that we should review en masse the employment doctrine as it
relates to these particular technological advances?
Ms. Duke. Yes.
Mr. Garrett. I would yield back early, Mr. Chairman, just
because I want to set a precedent today.
Chairman McCaul. Well, we certainly appreciate that, as do
the witnesses.
The Chair recognizes Mr. Payne.
Mr. Payne. Thank you, Mr. Chairman.
First, I would ask unanimous consent to submit a statement
from the Anti-Defamation League.
Chairman McCaul. Without objection, so ordered.
[The information follows:]
Statement Submitted For the Record by Honorable Donald M. Payne, Jr.
Statement of the Anti-Defamation League
November 30, 2017.
The Honorable Michael McCaul,
Chair, House Committee on Homeland Security, Washington, DC 20515.
The Honorable Bennie Thompson,
Ranking Member, House Committee on Homeland Security, Washington, DC
20515.
Dear Chairman McCaul and Ranking Member Thompson: As the House
Committee on Homeland Security holds hearings on ``World-Wide Threats:
Keeping America Secure in the New Age of Terror,'' we write to provide
the views of the Anti-Defamation League (ADL) and ask that this
statement be included as part of the official hearings record.
the anti-defamation league
Since 1913, the mission of the Anti-Defamation League has been to
``stop the defamation of the Jewish people and to secure justice and
fair treatment for all.'' For decades, the League has fought against
bigotry and anti-Semitism by exposing extremist groups who spread hate
and incite violence. The League is now the foremost non-governmental
authority on domestic terrorism, extremism, organized hate groups, and
hate crimes. Through our Center on Extremism, whose experts monitor a
variety of extremist and terrorist movements, ADL plays a leading role
in exposing extremist movements and activities, while helping
communities and Government agencies alike in combatting them. ADL's
team of experts--analysts, investigators, researchers, and linguists--
use cutting-edge technology to track and disrupt extremists and
terrorists world-wide. The League provides law enforcement officials
and the public with extensive resources, such as its analytic reports
on extremist trends and its Hate Symbols \1\ and Terror Symbols
databases.
---------------------------------------------------------------------------
\1\ https://www.adl.org/education/references/hate-symbols.
---------------------------------------------------------------------------
assisting law enforcement
ADL is the largest non-governmental provider in the United States
of training for law enforcement on hate crimes, extremism, and
terrorism, as well as on building trust between police and the people
and communities they serve. Each year, ADL experts deliver customized,
in-depth training on these subjects to more than 15,000 Federal, State,
and local law enforcement personnel at hundreds of agencies. ADL's dual
role as a preeminent civil rights organization, and as a strong and
trusted partner of law enforcement, gives us the credibility to offer a
continuum of service that influences the way law enforcement fights
hate and interacts with the communities they serve. ADL provides law
enforcement with information, expertise, and actionable intelligence to
prevent, disrupt, and respond to those extremists who cross the line
from espousing hateful ideologies to committing violent, criminal acts,
thus protecting the Jewish community and all Americans. ADL's Advanced
Training School, a highly acclaimed and sought after 3-day program on
domestic and international terror threats, has trained more than 1,100
senior law enforcement executives since it was launched in 2003.
identifying the threat
In the United States, adherents of a variety of extremist
movements--from white supremacists to black nationalists to Islamist
extremists--perceive Jews as their enemy and target the Jewish
community with propaganda, violence, or both. Extremists also target
other communities of minorities, as well as the democratic foundations
of Government that protect everybody's rights. Understanding the
diverse list of perpetrators that threaten the Jewish and other
minority communities is the first step to protecting them from violent
extremism.
the impact and disturbing prevalence of anti-semitism and hate violence
All Americans have a stake in effective response to violent
bigotry. These crimes demand priority attention because of their
special impact. Bias crimes are intended to intimidate the victim and
members of the victim's community, leaving them feeling fearful,
isolated, and vulnerable. Failure to address this unique type of crime
often causes an isolated incident to explode into wide-spread community
tension. The damage done by hate crimes, therefore, cannot be measured
solely in terms of physical injury or dollars and cents. By making
members of targeted communities fearful, angry, and suspicious of other
groups--and of the power structure that is supposed to protect them--
these incidents can damage the fabric of our society and fragment
communities.
Data must drive policy. The first step in addressing the problem of
anti-Semitism and hate violence is to know its nature and magnitude.
adl audit of anti-semitic incidents
Since 1979, the Anti-Defamation League has been compiling an annual
Audit of Anti-Semitic Incidents (``the Audit''). We track anti-Semitic
incidents not only because we are a Jewish community civil rights
organization, but because anti-Semitism, the longest and most
persistent form of prejudice, threatens security and democracy and is
an indicator of the health of a society as a whole.
The Audit includes both criminal and non-criminal acts of
harassment and intimidation, including distribution of hate propaganda,
threats, and slurs. Compiled using information provided by victims, law
enforcement, and community leaders, each recorded incident specifically
was evaluated by a member of ADL's professional staff who personally
verified the information. In short, our Audit provides an annual
snapshot of one specific aspect of the Nation-wide bias crime problem
and sheds light on broader trends. The Audit assists ADL in developing
and enhancing our education, training, and outreach programs to counter
and prevent the spread of anti-Semitism and other forms of hate and
bigotry.\2\
---------------------------------------------------------------------------
\2\ For example, after 3 years of tracking significant data
increases, ADL drafted the first model State hate crime penalty-
enhancement law and promoted its enactment across the country. Today,
the Federal Government and 45 States and the District of Columbia have
enacted hate crime laws, modeled on, or similar to, our original draft.
https://www.adl.org/sites/default/files/documents/assets/pdf/combating-
hate/ADL-updated-2016-Excel-State-Hate-Crime-Statutes.pdf.
---------------------------------------------------------------------------
Through the Audit, ADL has modeled the role that communities can
take in elevating the need for monitoring and reporting hate crime. We
strongly have promoted the notion that if the Jewish community wants
law enforcement officials to take anti-Semitic acts seriously, we must
do so--and report them to the police.
New Audit data released earlier this month shows that the number of
anti-Semitic incidents remains significantly higher in 2017 compared to
2016, with an increase of 67 percent over the first three quarters of
the year. In addition to the significant bump in the first quarter of
this year, we also saw a distinct increase after the ``Unite the
Right'' rally in Charlottesville, Virginia in August.
Specifically, our report \3\ documented that from January 1 to
September 30 there were 1,299 anti-Semitic incidents across the United
States, including physical assaults, vandalism, and attacks on Jewish
institutions. And the total already exceeds the 1,266 incidents
reported in all of last year.
---------------------------------------------------------------------------
\3\ https://www.adl.org/news/press-releases/adl-data-shows-anti-
semitic-incidents-continue-surge-in-2017-compared-to-2016.
---------------------------------------------------------------------------
Compared to 2016, each of the first three quarters of 2017 had a
higher number of incidents. These incidents peaked during the first
quarter of 2017, and the pace slowed somewhat in the second and third
quarters. Of all 1,299 anti-Semitic incidents so far in 2017, a
majority (667) occurred in the first quarter of the year. An additional
632 anti-Semitic incidents were reported in the second and third
quarters of the year, surpassing the 488 incidents reported during the
same period in 2016.
From January through September 30, there were:
703 incidents of harassment, including 162 bomb threats
against Jewish institutions in three dozen States;
584 incidents of vandalism, including 52 against Jewish
institutions; and
12 physical assaults.
These incidents \4\ took place across the country, but consistent
with prior reports, the States with the highest number of incidents
tend to be those with the largest Jewish populations. These include New
York State (267 incidents); California (197); Massachusetts (117);
Florida (69); and Pennsylvania (58).\5\
---------------------------------------------------------------------------
\4\ https://www.adl.org/news/domestic-anti-semitism-selected-
incidents-across-the-country-in-2017.
\5\ A State-by-State breakdown of the incidents in the Audit is
here: https://www.adl.org/news/adl-2017-audit-of-anti-semitic-
incidents-a-breakdown-of-the-numbers-state-by-state.
---------------------------------------------------------------------------
tracking and responding to hate crimes in the united states
The FBI has been tracking and documenting hate crimes reported from
Federal, State, and local law enforcement officials since 1991 under
the Hate Crime Statistics Act of 1990 (HCSA).\6\ Though clearly
incomplete (as discussed below), the Bureau's annual HCSA reports
provide the best single National snapshot of bias-motivated criminal
activity in the United States.\7\
---------------------------------------------------------------------------
\6\ 28 U.S.C. 534 (1990).
\7\ The Act has also proven to be a powerful mechanism to confront
violent bigotry, increasing public awareness of the problem and
sparking improvements in the local response of the criminal justice
system to hate violence--since in order to effectively report hate
crimes, police officials must be trained to identify and respond to
them.
---------------------------------------------------------------------------
In 2016, the most recent report available, the FBI documented 6,121
hate crimes reported by 15,254 law enforcement agencies across the
country--a 5 percent increase over 2015 figures (5,850), with nearly
one hate crime committed every 90 minutes of every day.\8\ Of the 6,121
total incidents, 2,922 were motivated by racial bias (47.7 percent),
1,076 by sexual orientation bias (17.6 percent), and 1,273 by religious
bias (20.8 percent).
---------------------------------------------------------------------------
\8\ http://ucr.fbi.gov/hate-crime/2016. The FBI's HCSA training
manual is now the single most important, most inclusive hate crime
training resource available for law enforcement officials. https://
ucr.fbi.gov/hate-crime-data-collection-guidelines-and-training-
manual.pdf.
---------------------------------------------------------------------------
Crimes directed against Jews increased 3 percent,\9\ and reported
crimes against Muslims increased 16.3 percent, from 257 in 2015 to 307
in 2016. The number of reported anti-Muslim hate crimes in 2016 was, in
fact, the second-most ever--second only to the series of backlash
crimes in 2001 after the 9/11 terrorist attacks.\10\
---------------------------------------------------------------------------
\9\ As has happened every year since 1990, a disturbingly high and
disproportionate percentage of the total number of reported religion-
based crimes (54 percent) were directed against Jews and Jewish
institutions. In fact, since 1990, anti-Jewish hate crimes have been
between 50 and 85 percent of the religious-based hate crimes--an
especially disturbing fact when you consider that Jews are less than 3
percent of Americans.
\10\ Primarily because of mistrust of police, crimes against Muslim
Americans are underreported. Muslim Advocates has earned a reputation
as an essential complement to FBI numbers, the most important non-
governmental source of information on anti-Muslim hate crimes and
vandalism directed against Mosques. The organization maps anti-Muslim
hate crimes and maintains a portal for individuals to report incidents
on-line. https://www.muslimadvocates.org/map-anti-muslim-hate-crimes.
---------------------------------------------------------------------------
In 2016, 15,254 law enforcement agencies participated in the HCSA
data collection effort--more than ever before. However, the FBI report
documented 92 cities over 100,000 in population that either
affirmatively reported zero (0) hate crimes--or did not participate in
the program at all.\11\ Accurate, reliable data is essential to build
community trust and shape law enforcement tactics and deterrent
policies.
---------------------------------------------------------------------------
\11\ https://www.adl.org/sites/default/files/documents/
FBI%20HCSA%202015%20Cities%20-
that%20DNR%20or%20Reported%20Zero%20ML.pdf.
---------------------------------------------------------------------------
extremists and hate groups emboldened
It is important to understand that the vast majority of anti-
Semitic incidents and other hate crimes are not carried out by
extremists or organized hate groups. But the extraordinarily polarizing
and divisive election campaign--which featured harshly anti-Muslim and
anti-immigrant rhetoric, as well as anti-Semitic dog whistles--
coarsened the public discourse and fostered an atmosphere in which
white supremacists and other anti-Semites and bigots felt emboldened
and believed that their views were becoming more broadly acceptable.
This trend has continued with the Trump administration's repeated
flirtation with these elements--retweeting their content and quoting
their heroes. And the President's repeated reluctance to address
extremism, hate, and anti-Semitism--or implied approval of the same--
has helped to mainstream these toxic ideas.
right-wing extremism
Over the past 10 years (2007-2016), domestic extremists of all
kinds have killed at least 372 people in the United States. Of those
deaths, approximately 74 percent were at the hands of right-wing
extremists such as white supremacists, sovereign citizens, and militia
adherents.\12\ Right-wing extremists have been responsible for plotting
at least 150 acts of terror in the United States over the past 25
years.\13\
---------------------------------------------------------------------------
\12\ https://www.adl.org/education/resources/reports/murder-and-
extremism-in-the-united-states-in-2016.
\13\ https://www.adl.org/news/press-releases/adl-report-exposes-
right-wing-terrorism-threat-in-the-us.
---------------------------------------------------------------------------
Right-wing extremists choose many targets for their anger, most
frequently Government, law enforcement, and racial and religious
targets. The most common religious targets are Jews and Muslims, while
the most common racial targets were African Americans, including multi-
racial targets.
The white supremacists who target minority communities for acts of
terror and violence include adherents of every major segment of their
movement, including neo-Nazis, racist skinheads, the religious sect
Christian Identity, and the Alt-Right. The militia movement has
especially embraced a particular type of bigotry: Anti-Muslim hatred.
This Islamophobia has taken numerous forms, from armed protests in
front of mosques to a major terrorist plot in October 2016 in Garden
City, Kansas, where three militia members were arrested in connection
with an alleged plot to blow up an apartment complex that primarily
housed Muslim Somali-American residents. We should be concerned that
the militia movement could produce similar terror attempts aimed at
Muslims in the future.\14\
---------------------------------------------------------------------------
\14\ https://www.adl.org/education/resources/reports/dark-constant-
rage-25-years-of-right-wing-terrorism-in-united-states.
---------------------------------------------------------------------------
The social networking revolution from 2006-2009 made it easier for
extremist ideas and tactics to spread very far, very quickly. This
facilitated the emergence of new extremist movements, such as the white
supremacist alt-right, to quickly gain followers, and helped
established movements, such as the sovereign citizen movement, to
rapidly resurge. Social networking has also provided opportunities for
extremists to meet each other and even to plot on-line. The October
2008 school attack plot in Tennessee and the Georgia militia plot of
February 2014 are two examples where extremists who connected on-line
later met in person to plot terrorist acts.\15\
---------------------------------------------------------------------------
\15\ https://www.adl.org/education/resources/reports/dark-constant-
rage-25-years-of-right-wing-terrorism-in-united-states.
---------------------------------------------------------------------------
white supremacists on campus: unprecedented recruitment efforts under
way
ADL has documented that white supremacists are engaged in
unprecedented outreach efforts on American college campuses--another
sign that these hate groups feel emboldened by the current political
climate.\16\ ADL's Center on Extremism has documented 309 incidents of
white supremacist flyers, posters, stickers, or banners on 201
different college campuses in 42 States since September 1, 2016. Of
those 309 incidents, 127 have occurred since the beginning of the fall
semester this year (September 1, 2017). This is a significant increase
compared to the same period in 2016 (from September 1, 2016, to
November 27, 2016, we counted 30 incidents). Furthermore, Richard
Spencer continues to make efforts to speak at public universities
around the country in an attempt to promote white nationalism to young
audiences.
---------------------------------------------------------------------------
\16\ https://www.adl.org/blog/white-supremacists-on-campus-
unprecedented-recruitment-efforts-underway.
---------------------------------------------------------------------------
White supremacists are mobilizing in hopes of translating their on-
line activism to ``real world'' action, and campuses--and young
people--are prime targets, in part because they are still figuring out
who they are, and what they believe. Extremists also undoubtedly see
value in recruiting a new generation that can carry the movement for
years to come.
Longtime white supremacist Jared Taylor recently wrote on his
website, American Renaissance, that colleges are of special interest
``because they are bastions of anti-white propaganda.'' Before he
imploded publicly in February, Islamophobic and misogynist gadfly Milo
Yiannopoulos told CNN, ``I am speaking on college campuses because
education . . . is really what matters. It's a crucible where these bad
ideas are formed. Bad ideas like . . . progressive social justice,
feminists, Black Lives Matter . . . ''.\17\
---------------------------------------------------------------------------
\17\ http://www.cnn.com/2017/02/02/us/milo-yiannopoulos-ivory-
tower/index.html.
---------------------------------------------------------------------------
Yiannopoulos' appearances (some of which were canceled) seem to
have had an energizing impact on other racists. Nathan Damigo, founder
of the white supremacist group Identity Evropa, has called Yiannopoulos
``an inspiration,'' and showed up at the (ultimately canceled)
Yiannopoulos speech at UC Davis, hoping to poach a few fans for his own
cause, which he outlined in a tweet: ``We will not rest until Alt-Right
ideas are represented on campuses nationwide.''
While the vast majority of white supremacist campus actions involve
hateful fliers (e.g., ``Imagine a Muslim-Free America,'') and stickers
(e.g., ``Make America White Again''), white supremacists have also sent
anti-Semitic faxes and, in the case of white supremacist Richard
Spencer, delivered speeches on campus. Many of these incidents are
linked to larger coordinated promotional efforts by white supremacist
groups, like Identity Evropa's ``Project Siege,'' which includes actual
campus recruitment visits, and American Vanguard's ``Northern
Propaganda Campaign.'' Not coincidentally, these two groups are
responsible for the majority of the white supremacist fliers and events
tracked over the last several months.
In January, American Renaissance launched a hate-filled campus
campaign, which for now seems to be limited to hanging ``pro-white''
propaganda posters. ``Racial activists,'' Jared Taylor wrote on the
American Renaissance website, should place the ``attractive posters''
in ``high-traffic areas'' around campus. Racist fliers and posters have
adorned parking garages, street signs, billboards, utility poles, and
corridors.
Andrew Auernheimer, a white supremacist hacker known as ``Weev,''
took targeting to the next technological level when he sent out anti-
Semitic and racist fliers via many thousands of campus printers across
the country. One flier, decorated with swastikas, read in part, ``I
unequivocally support the killing of children. I believe that our
enemies need such a level of atrocity inflicted upon them . . . So the
hordes of our enemies from the blacks to the Jews to the Federal agents
are deserving of fates of violence so extreme that there is no limit to
the acts by which can be done upon them in defense of the white race.''
The fliers referenced The Daily Stormer, Andrew Anglin's notoriously
hateful neo-Nazi website.
These days, white supremacists are taking more forceful steps to
establish a physical presence on campus. Identity Evropa was clear in
its goals--and used fittingly ``academic'' language--when describing
its ``Project Siege'' plans for the 2016-17 school year of talking to
actual students: ``Project Siege is the beginning of a long-term
cultural war of attrition against the academia's cultural Marxist
narrative that is maintained and propagated into society though the
indoctrination of the future managerial class. If we are to be
successful in combating the current paradigm,'' the on-line message
read. ``It is imperative that we create space for our ideas at
universities across the country. Speaking with students and helping
them unpack some of their assumptions while gaining name recognition
for our organizations are the ways in which we will create the
foundation for that space.''
White supremacist events on campus face particular scrutiny and, in
some cases, speakers are able to circumvent the school altogether,
avoiding heated debates over free speech rights. In December, when
Richard Spencer spoke on the Texas A&M campus, he wasn't there as a
guest of the University. Instead, he spoke to supporters and on-lookers
in a room rented for the occasion by local neo-Nazi Preston Wiginton.
the alt-right
The alt-right is the newest segment of the white supremacist
movement, a movement that already encompasses neo-Nazis, racist
skinheads, ``traditional'' white supremacists such as Ku Klux Klan
groups, Christian Identity adherents, and white supremacist prison
gangs. The alt-right emerged in the late 2000's from a variety of
sources, including the on-line subculture of message boards and image
boards like 4chan, 8chan, and Reddit, the on-line gaming subculture,
the so-called men's rights movement, and others. Richard Spencer
emerged as its most well-known American spokesperson.
The ideology of the alt-right, such as it is, is based on standard
white supremacist beliefs about the need to protect the white race from
a ``rising tide of color,'' combined with anti-Semitism, Islamophobia,
xenophobia, nationalism, misogyny, and anti-LGBTQ beliefs.
Demographically, the alt-right is quite young and largely male;
significantly, most adherents of the alt-right are new to white
supremacy and have not previously been part of other segments of the
movement.
For most of its brief history, the alt-right has largely existed
on-line, with few entities that could be considered alt-right
``groups,'' and few events related to the alt-right taking place in the
physical world. The 2016 Presidential election campaign, however,
changed the trajectory of the alt-right, luring it more into the real
world. Generally speaking, the alt-right strongly supported Donald
Trump's candidacy and became active in supporting Trump and attacking
his foes. After his victory, the alt-right--mistakenly thinking it had
played a significant role in Trump's election, but correctly realizing
it had grown considerably in 2016 thanks in large part to all the media
attention it garnered--became emboldened, with many alt-right activists
more eager to organize or attend events in the real world.
As the alt-right became more and more identified as part of the
white supremacist movement, those adherents who shared most or all of
its convictions--except overt white supremacy--sought to distance
themselves from the white supremacists. Some of them began to refer to
themselves as the ``New Right,'' but alt-right white supremacists
derisively referred to them as the ``alt-lite.'' A public feud
developed between the two factions in 2017.
One thing the factions could still agree on was hatred of the left.
Left and progressive groups and movements in the United States reacted
negatively to the election of Donald Trump, holding large protests
after the election, at the inauguration, and afterwards. In particular,
the antifa (short for anti-fascist), a collection of anarchist and far
left groups, networks and individuals, became active protesting at some
events involving hateful speakers such as Milo Yiannopoulos and Ann
Coulter.
As antifa targeted what they perceived as bigotry and hate speech,
the alt-right and alt-lite began showing up in public to confront them.
So too did another segment of the far right, the militia movement. Part
of the anti-Government extremist sphere of the American far right
rather than the white supremacist sphere, the militia movement has
historically concentrated its anger on the Federal Government, which it
views through a hostile, suspicious, and highly conspiratorial lens.
However, the election of Trump, a candidate supported by the militia
movement, caused the movement to look for new enemies other than the
Federal Government and it quickly found them in the antifa, whom they
described as ``domestic terrorists,'' and claimed were being trained in
Syrian terrorist training camps, and who were covertly led and funded
by liberal, Jewish philanthropist George Soros in an attempt to
undermine and overthrow the Trump administration.
Throughout 2017, then, adherents from these various far right
movements showed up at events, or arranged their own events, designed
to clash with protesters from the left, especially antifa. From Boston
to Berkeley, Portland to Houston, these confrontations took place, some
of them violent. Often the only meaningful result from these events was
to leave people wanting even more confrontation.
It is against this backdrop that the events at Charlottesville
played themselves out.
spotlight on charlottesville: what happened and why
In the broadest sense, what took place in Charlottesville was due
primarily to two factors: (1) The growth of the alt-right and its
transition from being largely an on-line phenomenon into one also
active in ``real world'' events and activities, and (2) the effects the
2016 Presidential election results have had on a number of ideological
movements in the United States.
On August 11-12, 2017, a large white supremacist event dubbed
``Unite the Right'' occurred in Charlottesville, Virginia, ostensibly
to protest the removal of a statue of Robert E. Lee in a local park. A
torch-lit parade the first evening of the event became violent, with
clashes between white supremacists/neo-Nazis and counter-protesters;
the violence continued and increased the next day, with the white
supremacists responsible for the bulk of it. The worst example of such
violence occurred when a white nationalist from Ohio drove his car into
a crowd of protesters, killing one woman and injuring many more.
The Unite the Right rally was actually the third white supremacist
event Charlottesville residents had had to endure this year. The first
event occurred on May 13, when around 100 white supremacists gathered
to protest the city council's decision to remove Confederate monuments
from local parks. In the afternoon, they arranged a ``flash mob'' march
to the Robert E. Lee monument, where speakers such as Richard Spencer
and Nathan Oamigo addressed the crowd of white supremacists. The crowd,
in turn, chanted slogans such as ``they will not replace us'' and
``Russia is our friend.'' That evening, the white supremacists returned
to the park, with Tiki torches, to hold a torchlight parade.
That torchlight parade got considerable attention from both
traditional and social media, causing organizers of the event to
consider it a major success and to seek more of the same.
On July 8, the Loyal White Knights of the Ku Klux Klan staged their
own rally in Charlottesville, with around 50 Klan members and
supporters attending. They were opposed by more than a thousand
counter-protesters, but law enforcement used physical barriers to
separate the sides and escorted the white supremacists in and out of
the park where they rallied. Several counter-protesters were arrested
prior to the event for trying to block entrance to the park, while more
were arrested after the event. Eventually police fired several tear gas
canisters into the crowd to force its dispersal. Overall, 22 people
were arrested at the event. Authorities were criticized after the event
by counter-protesters for what they termed an overreaction. These two
circumstances--counter-protesters trying to get at the Klan members and
criticism of the police response--may have had an effect on efforts to
control the Unite the Right rally the following month.
Indeed, well before the Klan event took place, organizers of the
May Charlottesville event and others had already begun to plan and
organize the United the Right rally, which they viewed as a larger and
grander sequel to their May event. They began their preparations months
in advance, reaching out for speakers, publicizing the event on social
media, and getting groups and individuals alike interested in
attending.
The Violence
Historically, white supremacists are often on the defense in
clashes at events involving white supremacists and counter-protesters,
in part because they are typically heavily outnumbered and in part
because antifa are often determined to physically confront the white
supremacists.
Unite the Right was different, however. In part, this was because
there were more than 10 times as many white supremacists at the event
than at a typical public white supremacist event, giving them numbers
they do not usually have. Indeed, ADL identified white supremacists
from at least 35 States at the Unite the Right rally. Another factor
was that throughout the spring and summer, far right groups at such
events had increasingly been adopting ``street fighting `` stances,
including manufacturing or purchasing a wide variety of offensive and
defensive gear to employ during street confrontations. In fact, a
significant number of white supremacists and supporters came to the
Unite the Right rally openly carrying firearms. The right-wing
extremists had been unusually aggressive at a number of events in 2017,
compared to past years.
The white supremacists were outnumbered by counter-protesters, but
the great bulk of the people opposing the white supremacists were
peaceful protesters, many from local church or community groups. There
were some antifa, as well as representatives of other confrontational
left-wing groups such as Redneck Revolt, but the ratio of forces was
quite different than at other events, including the previous Klan event
in Charlottesville.
The violence started on the evening of August 11, when the torch-
carrying marchers arrived at the University of Virginia's Rotunda
building, where they encountered and overpowered a small group of
counter-protesters at the Jefferson monument, some using their torches
as bats. The marchers dispersed after law enforcement finally stepped
in, and there are reports, particularly from leaders in the faith
community, of counterprotestors providing protection from white
supremacist violence when law enforcement was unavailable.
The next morning, Unite the Right rally goers began to show up at
Emancipation Park, in groups small and large, from a variety of
locations and staging areas (rather than, as at the previous event,
arriving at one staging area and being brought to the event area by law
enforcement). As counter-protesters were doing the same, numerous
encounters occurred between the white supremacists and counter-
protesters, some of which turned violent. Most of the violence seemed
to have been started by the white supremacists.
The most notorious occurred when James Alex Fields, Jr., of Maumee,
Ohio, allegedly drove his vehicle into a crowd of counter-protesters,
injuring large numbers of them and killing Heather Heyer. In another
incident captured on video, several white supremacists and hate group
members severely beat a Black counter-protestor, DeAndre Harris, in a
parking garage. Harris was later arrested based only on the word of one
of his assaulters, a hate group leader, that Harris actually attacked
him.
The Significance of Charlottesville
First and foremost, Charlottesville was a tragedy, involving an
assault on a community, the attempted intimidation of marginalized
people across the country, and the murder of Heather Heyer. Adding to
that is the tragic loss of Lieutenant H. Jay Cullen and Trooper-Pilot
Berke M.M. Bates, two Virginia State troopers who died in a helicopter
crash while on their way to monitor the event.
But the event also served--and needs still to serve--as an
important wake-up call, alerting people to the problems that radical
right-wing movements legitimately pose in the United States. The year
2017 is not yet over, but the country has already seen a variety of
murders, shootings, hate crimes, and violent plots and acts by white
supremacists, anti-Government extremists, and other right-wing
extremists.
The events in Charlottesville that weekend captured the attention
of and shocked most Americans, many of whom had no idea that right-wing
extremists had become so numerous or so bold. One of the most enduring
moments related to Charlottesville was President Trump's statement that
there were ``very fine people on both sides'' of the Unite the Right
rally, a statement that further emboldened the extremists and added
injury to those already under assault. Though violence stemming from
right-wing extremism actually occurs frequently in the United States,
such incidents are not always well-reported by the National media, and
people often have little understanding of its scope. Thus,
Charlottesville, and the concerning response to it from the White
House, came as a wake-up call for many.
The events in Charlottesville also had an outsize impact on the
Jewish community. For many younger Jews, hearing white supremacists
chanting ``Jews will not replace us'' may have been their first
encounter with public anti-Semitism.\18\ For Jewish adults and seniors,
watching Nazi salutes and hearing chants of ``sieg heil and ``blood and
soil'' (the latter is a translation of the Nazi slogan ``Blut und
Boden'') evoked memories or family recollections of the most
overwhelming trauma in modern Jewish history. The white supremacist
groups that participated in the Charlottesville rally have a well-
established record of anti-Semitism, and individual leaders of the
movements present at the rally, including former Klansman David Duke,
are prolific promoters of anti-Semitism in the United States.
---------------------------------------------------------------------------
\18\ https://www.adl.org/blog/anti-semitism-on-full-display-in-
charlottesville.
---------------------------------------------------------------------------
Anti-Semitic incidents spiked on the days of the Charlottesville
march and rally and immediately following. Of the 306 incidents
documented in our Audit that were reported in the third quarter, 221
took place on or after the August 11 rally.
While not ignoring other types of extremist threats to the peace
and tranquility of the United States, Charlottesville requires us to
ask what the country can do to better combat the threat of right-wing
extremist violence, as well as how to demonstrate conclusively that
such violence goes against what the American experiment stands for.\19\
---------------------------------------------------------------------------
\19\ The fact that Congress enacted a joint resolution addressing
the violence, with specific policy recommendations and objectives, also
distinguishes the impact of the violence in Charlottesville. https://
www.congress.gov/115/plaws/publ58/PLAW-115publ58.pdf.
---------------------------------------------------------------------------
left-wing and black nationalist violence
While in no way comparable to the nature and magnitude of the
threat posed by right-wing and white supremacist groups, we have taken
note of several recent incidents of violent activity by left-wing
groups and individuals with black nationalist beliefs.
On Wednesday, June 14, a Congressional baseball team in the midst
of a morning practice in Alexandria was attacked by a lone gunman. The
U.S. House Majority Whip, Rep. Steve Scalise (R-LA), was seriously
injured, and several others were also shot. In recent months, the ADL
has been warning law enforcement personnel about the possibility of an
increase in left-wing violence as a result of the growing anger
directed at President Trump, his administration, and political allies.
The shootings in Alexandria appear to be an example of this.\20\
---------------------------------------------------------------------------
\20\ https://news.vice.com/story/extremism-experts-are-starting-to-
worry-about-the-left.
---------------------------------------------------------------------------
Over the course of the past year, at least 2 individuals with Black
Nationalist beliefs have violence has taken a deadly toll, responsible
for the deaths of 8 police officers in Dallas and Baton Rouge in
2016.\21\ In July 2016, Micah Xavier Johnson, who had ties to black
nationalist groups such as the New Black Panther Party, killed 5 police
officers (and injured 9 others) in Dallas, Texas, in an ambush attack
aimed at police who were maintaining public order at a Black Lives
Matter protest. That same month, Gavin Eugene Long ambushed and shot 6
police officers, 3 of them fatally, in Baton Rouge. Long, like Johnson,
was an adherent of Black Nationalism and a military veteran, as well as
a member of the anti-Government sovereign citizen movement. Both
incidents appear to have been motivated by anger in response to police
shootings of African American men.\22\
---------------------------------------------------------------------------
\21\ https://www.adl.org/educational/resources/reports/murder-and-
extremism-in-the-united-states-in-2016.
\22\ https://www.adl.org/blog/fresno-shootings-latest-incident-in-
rise-of-black-nationalist-violence.
---------------------------------------------------------------------------
As described above, law enforcement officers across the United
States have recently faced the challenge of keeping the peace at a
number of far-right rallies and demonstrations. Their task, to secure
both safety and First Amendment rights, has been made more difficult
not only by the white supremacists and other bigots who have shown up
in Charlottesville,\23\ Berkeley, and Boston, but also by a relatively
small number of counter-protesters who engage in confrontational
tactics, including violence, in their opposition to the right-wing
extremists. For example, the August 27 anti-racist march in Berkeley,
attended by thousands of peaceful counter-protesters, turned chaotic
when a number of anarchists appeared and allegedly attacked several
right-wing or pro-Trump attendees.
---------------------------------------------------------------------------
\23\ https://www.adl.org/blog/violence-and-hate-unite-the-right.
---------------------------------------------------------------------------
extremism sparked by radical interpretations of islam
One of the most striking elements of today's domestic threat
picture is the role that a growing number of American citizens and
residents motivated by radical interpretations of Islam have played in
criminal plots to attack Americans in the United States and abroad.
Over the past 10 years, about 24 percent of victims killed by domestic
terrorists were at the hands of domestic Islamic extremists. Just last
month, 8 people were killed and almost a dozen others injured when a
29-year-old Sayfullo Habibullaevic Saipov ran people over with a truck
on a busy bicycle path near the World Trade Center in Manhattan.
Authorities found a note near the truck claiming the attack was made in
the name of the Islamic State (ISIS). ADL's report earlier this year,
titled ``A Changing Landscape of Threats,'' outlined changing tactics
of such extremists, including how more extremists are using non-
traditional weapons (knives, cars) in their attacks and how plots are
increasingly focused on public spaces rather than symbolic targets.\24\
---------------------------------------------------------------------------
\24\ https://www.adl.org/sites/default/files/documents/
CR_5062_Domestic%20Islamic- %20Extremism%20Report_vF1.pdf.
---------------------------------------------------------------------------
Indeed, four of the five deadliest ideologically-motivated attacks
in the United States have been inspired by Islamic extremist ideology,
including attacks in Fort Hood, TX, San Bernardino, CA, and Orlando,
FL, the worst mass shooting in American history, in which Omar Mateen
opened fire inside Pulse, a gay nightclub in Orlando, killing 49
people. During the shooting, Mateen, an American citizen born in New
York, declared his allegiance to ISIS. As demonstrated by this horrific
shooting, it is clear that there are deliberate attempts by
international terrorist groups that justify and sanction violence to
appeal to and engage sympathizers in the United States.
A disturbing number of cases also demonstrate the degree to which
hatred of Jews and Israel play a part in the radicalization process of
home-grown extremists. However, efforts to explore these legitimate
security concerns should not be overwhelmed by the kind of unfair
stereotyping and prejudice that has too-frequently accompanied recent
public debates.
terrorist exploitation of social media
As internet proficiency and the use of social media grow ever-more
universal, so too do the efforts of terrorist groups to exploit new
technology in order to make materials that justify and sanction
violence more accessible and impactful. Terrorist groups are not only
using various on-line and mobile platforms to spread their messages,
but also to actively recruit adherents who live in the communities they
seek to target.
While the fundamental ideological content of terrorist propaganda
has remained consistent for two decades--replete with militant
condemnations of perceived transgressions against Muslims world-wide,
and appeals for violence and anti-Semitism--terrorist groups are now
able to reach, recruit, and motivate extremists more quickly and
effectively than ever before by adapting their messages to new
technology.
In the past, plots were directed by foreign terrorist organizations
or their affiliates, and recruitment and planning generally required
some direct, face-to-face interaction with terrorist operatives.
Indoctrination came directly from extremist peers, teachers, or
clerics. Individuals would then advance through the radicalization
process through constant interaction with like-minded sympathizers or,
as the 2007 New York Police Department report on radicalization
described, with a ``spiritual sanctioner'' who gave credence to those
beliefs. Today, individuals can find analogous social networks,
inspiration, and encouragement on-line, often packaged neatly together
with bomb-making instructions. This enables adherents to self-
radicalize without face-to-face contact with an established terrorist
group or cell.
Individual extremists, or lone wolves, are also increasingly self-
radicalizing on-line with no physical interactions with established
terrorist groups or cells--a development that can make it more
difficult for law enforcement to detect plots in their earliest stages.
Terror groups are taking full advantage of this virtual audience, and
regularly publish detailed instructions for lone-wolf terror attacks
\25\ using knives, as well as cars, trains,\26\ and other modes of
transportation.
---------------------------------------------------------------------------
\25\ https://www.adl.org/blog/isis-supporters-distributes-series-
of-articles-encouraging-lone-wolf-attacks.
\26\ https://www.adl.org/blog/al-qaedas-latest-inspire-magazine-
details-train-derail/operations.
---------------------------------------------------------------------------
Approximately half of the 150 terrorist incidents described in a
2017 ADL report on 25 years of right-wing terrorism were perpetrated by
lone-wolf offenders.\27\ Today, thanks to the internet, it is easier
than ever for someone to become steeped in extremist ideologies, even
to the point of being willing to commit acts of great violence, without
ever being involved in an organized extremist group. The overwhelming
majority of American citizens and residents linked to terrorist
activity motivated by Islamic extremism in the past several years--
including at least 63 U.S. residents in 2015--actively used the
internet to access propaganda or otherwise facilitate their extremist
activity.
---------------------------------------------------------------------------
\27\ https://www.adl.org/education/resources/reports/dark-constant-
rage-25-years-of-right-wing-terrorism-in-united-states.
---------------------------------------------------------------------------
funding cve--and the need for a holistic approach
Because modern technology has provided new fuel for extremists,
including using ``cyberhate'' to attack marginalized groups on social
media and coordinate terror attacks more easily, ADL supports properly
crafted Countering Violent Extremism (``CVE'') programs. We believe an
``all hands on deck'' holistic approach is required to confront the
sophisticated recruitment efforts employed by domestic extremist groups
and by ISIS and other terror groups. Through the CVE program launched
under President Obama, the Department of Homeland Security had
administered Federal grants to nongovernmental organizations and
higher-education institutions to carry out programs that counter the
potential for violence from domestic terrorists and home-grown violent
extremists.
In May, the League expressed concerns about press reports that the
administration was proposing to cut funding for its CVE programs
entirely.\28\ And in June, ADL expressed concerns as DHS announced
their 2017 2-year CVE funding grantees.\29\ Funding for Life After
Hate, a successful and in-demand program to de-radicalize neo-Nazis,
white supremacists, and others, was not renewed. Politico reported
that, since Election Day, Life After Hate has seen a twenty-fold
increase in requests for help ``from people looking to disengage or
bystanders/family members looking for help from someone they
know.''\30\ At a time when right-wing extremist groups are experiencing
rising membership and expanding influence, we believe DHS must invest
in community-based organizations that work to counter these groups.
---------------------------------------------------------------------------
\28\ https://www.adl.org/news/press-releases/adl-concerned-over-
reports-of-trump-administration-proposing-to-cut-entire.
\29\ https://www.adl.org/news/press-releases/adl-welcomes-homeland-
security-grants-to-counter-terrorist-recruitment-and.
\30\ http://www.politico.com/tipsheets/playbook/2017/06/23/what-
mcconnell-is-thinking-winners-losers-in-gop-health-care-bill-obama-
speaks-dawsey-download-wapo-trump-talks-russia-every-morning-pelosis-
future-220996.
---------------------------------------------------------------------------
In addition, the 2017 list of CVE grantees \31\ indicates a shift
in funding focus away from community-based civil society organizations
and toward law enforcement agencies. Police play a critical role, but
we cannot enforce our way out of this problem. Community-based
organizations must help lead this work. These groups are much more
likely to have credibility and trust needed to reach the targets of
extremists, which include many disaffected or vulnerable youth. The
League called on DHS to clarify its funding criteria and demonstrate
that it is committed to funding the full range of programs--domestic
and international--designed to counter all forms of violent
extremism.\32\
---------------------------------------------------------------------------
\31\ https://www.dhs.gov/cvegrants.
\32\ https://www.adl.org/news/press-releases/adl-welcomes-homeland-
security-grants-to-counter-terrorist-recruitment-and.
---------------------------------------------------------------------------
Importantly, ADL has also strongly advised the administration
against focusing its CVE program solely on extremism motivated by
radical interpretation of Islam. We responded to press reports \33\
that the administration wanted to change the name of the Government
initiative from ``Countering Violent Extremism'' to ``Countering
Islamic Extremism'' or ``Countering Radical Islamic Extremism'' by
stating that such a change would be damaging to the American Muslim
community and dangerously narrow.\34\ Singling out Muslims and the
American Muslim community for special scrutiny or suspicion is
discriminatory, offensive, ineffective, and counterproductive. In fact,
one essential focus of our Nation's CVE programs should be to build
trust within Muslim communities to reduce radicalism, not to further
foster mistrust.
---------------------------------------------------------------------------
\33\ http://www.reuters.com/article/us-usa-trump-extremists-
program-exclusiv-idUSKBN15- G5VO.
\34\ https://www.adl.org/news/press-releases/adl-limiting-scope-of-
countering-violent-extremism-programs-places-nation-at.
---------------------------------------------------------------------------
This is especially true now, because over the past few months, ADL
and others have documented an objectionable, intensified level of anti-
Muslim bigotry in a variety of public forums. For example, according to
a recent Pew Research Center publication on Muslim Americans' place in
society,\35\ nearly half of Muslims (48 percent) say they have
experienced at least one form of discrimination over the past year. Of
those whose appearance is identifiably Muslim, nearly two-thirds (64
percent) say they have experienced at least one of the specific types
of discrimination asked about in the survey. Three-quarters (75
percent) of Muslim respondents say there is ``a lot'' of discrimination
against Muslims in the United States, with Muslim women more likely
than Muslim men to hold this view (83 percent versus 68 percent). These
findings reinforce an ADL survey on anti-Semitism and anti-Muslim
discrimination published this past year.\36\ Our survey revealed that
89 percent of Muslim Americans are concerned about violence directed at
them and Islamic institutions in the United States, and 64 percent said
that they do not believe the Government is doing enough to ensure their
safety. While most Muslims don't feel the need to hide their faith, 66
percent said they feel less safe in America since President Trump was
elected.
---------------------------------------------------------------------------
\35\ http://www.pewforum.org/2017/07/26/findings-from-pew-research-
centers-2017-survey-of-us-muslims/.
\36\ https://www.adl.org/news/press-releases/in-first-new-adl-poll-
finds-majority-of-americans-concerned-about-violence.
---------------------------------------------------------------------------
Limiting CVE programs to only focus on Islamic extremism would not
only isolate the Muslim American community, but would also exacerbate
the problem of how little prevention-based programming right-wing
extremists are receiving.\37\ At a time when our research indicates
that right-wing extremists are more visible and emboldened,\38\ the
Government should focus on all types of extremism, whether it comes
from terrorists motivated by extreme interpretations of Islam or white
supremacists.
---------------------------------------------------------------------------
\37\ http://time.com/4671901/donald-trump-extremism-terrorism-
muslims/.
\38\ https://www.adl.org/news/press-releases/adl-report-exposes-
right-wing-terrorism-threat-in-the-us.
---------------------------------------------------------------------------
relationship with the tech industry
Over the past decade, the League has worked closely with the
internet industry and they have been very responsive to information
regarding terrorist and extremist exploitation of their platforms. Our
relationship has led to increased successes in mitigating the
exploitation of platforms by groups such as ISIS. In addition, working
with industry officials, the League developed the ADL Cyber-Safety
Action Guide,\39\ a user-friendly on-line platform where consumers can
learn how and where to report bigoted, bullying, or hateful speech to
the major internet providers and social media platforms.
---------------------------------------------------------------------------
\39\ http://www.adl.org/press-center/press-releases/discrimination-
racism-bigotry/new-adl-platform-helps-consumers-take-action-against-
internet-hate-speech.html#.Vi58MX6rTct.
---------------------------------------------------------------------------
The League has also convened a Working Group on Cyberhate to
develop recommendations for the most effective responses to
manifestations of hate and bigotry on-line.\40\ The Working Group
includes representatives of the internet industry, civil society, the
legal community, and academia. The Working Group input and guidance has
been invaluable and is reflected in a set of Best Practices \41\ that
provides useful and important guideposts for all those willing to join
in the effort to address the challenge of cyber hate.
---------------------------------------------------------------------------
\40\ For a comprehensive review of the League's work addressing the
scourge of on-line anti-Semitism since pre-internet days--when dial-up
bulletin boards were a prominent communications tool--see Report of the
Anti-Defamation League on Confronting Cyberhate to the 5th Global Forum
for Combating Anti-Semitism, May, 2015, http://www.adl.org/assets/pdf/
combating-hate/ICCA-report-2015-With-hyperlinks-May-8-2015_final.pdf.
\41\ http://www.adl.org/combatinq-hate/cyber-safety/best-practices/
#.Vi58F36rTcs.
---------------------------------------------------------------------------
legislative and administrative policy recommendations
Bully Pulpit
The President, cabinet officials, and Members of Congress
must call out bigotry at every opportunity, especially when it
comes from our public officials. The right to free speech is a
core value, but the promotion of hate should be vehemently
rejected. Simply put, you cannot say it enough: America is no
place for hate.
The administration must send loud, clear, and consistent
messages that violent bigotry is unacceptable--and ensure that
the FBI and the Civil Rights Division will enforce relevant
Federal laws and vigorously investigate and prosecute hate
crimes.
Improved Coordination
The Department of Justice should host periodic interagency
meetings to promote cross-agency collaboration and to address
prevention of and response to extremism and hate violence. This
initiative should involve both lead enforcement agencies and
agencies working to expand anti-bias and hate crime prevention
training and outreach--including Department of Education,
Department of Homeland Security, the Federal Bureau of
Investigation (FBI), and the Department of Health and Human
Services (HHS).
Countering Violent Extremism
The administration and Congress should do all in their power
to promote trust and encourage stronger relationships to
counter attempts by both international terrorist organizations
and domestic hate groups to recruit disaffected or alienated
Americans. The administration should fully resource and staff
efforts at both security and non-security Executive branch
agencies to implement programs aimed at preventing and
intervening in the process of radicalization to violence. DHS
should clarify its funding criteria and demonstrate that it is
committed to funding the full range of programs--domestic and
international--designed to counter all forms of violent
extremism.\42\
---------------------------------------------------------------------------
\42\ https://www.adl.org/news/press-releases/adl-welcomes-homeland-
security-grants-to-counter-terrorist-recruitment-and.
---------------------------------------------------------------------------
Improved Federal Hate Crime Data Collection
DoJ should incentivize and encourage State and local law
enforcement agencies to more comprehensively collect and report
hate crimes data to the FBI, with special attention devoted to
large underreporting law enforcement agencies that either have
not participated in the FBI Hate Crime Statistics Act program
at all or have incorrectly reported zero hate crimes.
To create incentives for participation in the FBI's HCSA
program, certain Department of Justice funds should only be
made available to agencies that are demonstrating credible
participation in the HCSA program. Whether a specific State or
local law enforcement agency is participating in the HCSA
program should be included in the rating and scoring criteria
as applications for Justice Department funding are considered.
The administration, DHS, and DoJ should take steps to ensure
that it is efficient and safe for all crime victims to contact
the police. If marginalized or targeted community members--
including immigrants, people with disabilities, LGBT community
members, Muslims, Arabs, Middle Easterners, South Asians, and
people with limited language proficiency--cannot report, or do
not feel safe reporting crimes, law enforcement cannot
effectively address these crimes, thereby jeopardizing the
safety of all.
Congress should support Congressional legislation to improve
hate crime data collection and reporting, such as the NO HATE
ACT.\43\
---------------------------------------------------------------------------
\43\ H.R. 1566/S. 662 https://www.Congress.gov/115/bills/hr1566/
BILLS-115hr1566ih.pdf.
---------------------------------------------------------------------------
In conjunction with the Department of Homeland Security, the
Justice Department should comprehensively implement the
implicit bias training initiative announced in June for all
Federal law enforcement officials and Federal prosecutors.\44\
The training should include how to recognize, investigate, and
respond to hate crimes.
---------------------------------------------------------------------------
\44\ https://www.justice.gov/opa/pr/department-justice-announces-
new-department-wide-implicit-bias-training-personnel.
---------------------------------------------------------------------------
Improved Training on Campus
In recent months, ADL Regional Directors and our Campus and
Center on Extremism professionals have met with university
administrators to tailor best practices for addressing white
supremacist and other extremist rallies and outreach on campus.
Our outreach is intended to ensure that administrators,
faculty, staff, and students all understand that they have a
direct responsibility to respond to hate speech and extremism--
and that they have the resources, tools, and intervention
strategies to do so most effectively.
conclusion
Sixteen years after the September 11 terrorist attacks, we very
much hope that these hearings--and any that come after them--will
acknowledge and highlight the extraordinary, successful efforts of
Federal, State, and local law enforcement officials to prevent and
deter terrorism on our shores. But police and counterterrorism
officials do not work in a vacuum; they cannot do their job without
community relationships, cooperation, trust, and a shared sense of
responsibility for public safety. ADL will continue to advocate--in
Congress and in the courts--for law enforcement officials to have
investigative tools sufficient to deter and prevent terrorism, while
appropriately balancing National security and individual rights.
As the committee and Congress continue to examine the nature of the
current threat to our Nation, the Anti-Defamation League hopes to play
an on-going, helpful, and constructive role by offering its expertise
in documenting the domestic and international terror threats from
across the ideological spectrum, while urging Members of Congress and
other public officials to make every effort to explore this serious
issue without creating an atmosphere of blame and suspicion.
Sincerely,
Jonathan A. Greenblatt,
CEO.
Attachment.--Selected ADL Resources on Hate Groups, Terrorism and
Extremism *
---------------------------------------------------------------------------
* The attached documents have been retained in committee files.
Mr. Payne. Thank you, sir.
I would just like to thank all the witnesses for their
service to this Nation to this point. I am going to be very
brief, because in the interest of time, I know we have another
panel. But I just--and excuse me if this has already been
answered, but I came in late. This, what is it, the black--what
is this new term, black extremist radical--what is it?
Mr. Wray. I believe the term you are reaching for there is
there is a term, ``black identity extremists,'' which is an
intelligence product that was--that I spent, you know, about 2
hours, I guess, discussing yesterday with some of your
colleagues.
Mr. Payne. Right. Sorry I missed that. Could you give me a
brief definition or an example of who would fall in that
category?
Mr. Wray. So the intelligence product in question refers to
individuals who are committing violent criminal acts where the
motivation is retaliation or retribution for injustices
committed by law enforcement. So the focus is on law
enforcement as victims in those situations.
Mr. Payne. OK. And you see growing incidents in this
situation?
Mr. Wray. The piece in question, which was issued right
before I joined the FBI, was based on a snapshot in time over
the course primarily of 2016, and that was what the FBI was
seeing during that period.
Mr. Payne. OK. Thank you for that.
I would just like to ask the three, I am the Ranking Member
on Emergency Preparedness, Response, and Communications, and I
would like to just ask--I have done a lot of work around
interoperability, and I know you are each a different entity.
But how well--and your communication is probably pretty good on
your level, but through your different departments, how is the
communication between your different agencies?
Ms. Duke. I think our communication is much better than it
was when I was here before, and I think that is a lot to the
centers of bringing these centers together where people are co-
located. So it is not just the integration of systems. I think
in the public sector, the FirstNet public safety network is
going to be huge going forward. I do think we are working at
DHS more on declassifying products earlier, so through our
fusion centers and other tools, we can have better
collaboration between Federal and State and local law
enforcement. That is a major focus for us.
Mr. Wray. I would agree that the technological part of the
interoperability has improved significantly, although it can
always get better. For us, and particularly on the FBI side,
the Classified nature of so much of what we do does complicate
our ability to communicate, less so with either of the folks
here on the panel, but as Elaine says, with the State and local
law enforcement it can get complicated. Certainly with the
private sector, which as we discussed on the cyber side, that
presents some significant challenges.
Mr. Payne. OK. Yes, sir. Sir?
Mr. Rasmussen. The only thing I would add is that level of
integration that probably wasn't there among the Federal
agencies 10 or 12 or 15 years ago has in some ways been
addressed, because at this point, so many of our senior leaders
have served in each other's organizations over the last dozen
years. Several of my senior leaders are veterans of the
Department of Homeland Security. I have senior FBI personnel
inside my organization and have--my personnel have served
inside their organizations. That counts for a lot because it
makes that integration much easier.
Mr. Payne. OK. Thank you.
Mr. Chairman, I am going to yield back real quick.
Chairman McCaul. The gentleman yields.
The gentlelady from Arizona, Ms. McSally.
Ms. McSally. Thank you, Mr. Chairman. I thank you all for
your patience.
Director Rasmussen, thanks for your service. I too agree
that our country is safer because of your service.
Many vulnerabilities have been talked about today that
radical Islamists, terrorists, can use and have used in order
to hurt America, attack us and our citizens and our way of
life. You and all the people on your teams are out there every
single day on the front lines keeping us safe.
One of those vulnerabilities was just used 30 days ago,
when Sayfullo Saipov killed 8 people and injured dozens in New
York City on a bike path. He came from Uzbekistan and came
through the visa lottery program. For those who are not
familiar, this was created in 1995, specifically to help Irish
immigrants. Since 2007, it is estimated 29,000 people from
countries that sponsor terrorism--Syria, Sudan, Iran--have
actually used this program to come to America. No other country
that admits immigrants like we do--1 million a year, we are an
immigrant-friendly country--has their visas handed out by
chance. Not no other, but many others, like Canada, Australia,
Austria, the United Kingdom, they don't have program like this.
By chance and lottery, people can gain access to come into our
country.
So my question, Director Duke--sorry, Acting Secretary
Duke, is if he had come to the United States today, versus 10
years ago, what checks would he have encountered or how would
it be different from the process he went through 10 years ago?
Would the fact that he came from a country that has a history
of terrorism impacted that?
Ms. Duke. Yes, it would have. We also see that the
diversity program is ripe for fraud. Today, it would be better,
but we still agree with your sentiments on it isn't the best
use of our immigration system.
What would be different is we have biographics, we have the
ability to search social media, those type of things. But it is
still one that would introduce risk.
Ms. McSally. So I recently introduced legislation to
eliminate the lottery, convert a portion of them to merit-
based, which I believe is the right thing to do. President
Trump has called for the elimination of this program. Acting
Secretory Duke, do you agree with the elimination of this
program?
Ms. Duke. Yes, I support that.
Ms. McSally. Great. Thank you.
I do want to change gears on another topic that is deeply
troubling to me. I know we are in an Unclassified setting, but
this is the MAVNI program. This is a program where non-green
card holders, which traditionally we allow green card holders
to serve in the military, but non-green card holders, starting
in 2008, were allowed to start serving. It was supposed to be
in specific critical career fields, like language and other
things, to boost our National security. Unfortunately--I am on
the Armed Services Committee, and so we have gotten multiple
Classified briefings on this, and I know we can't speak in
great detail in this setting. But unfortunately, it looks like
the Army basically used this to meet its recruiting goals well
beyond the intent. Many of these individuals were not vetted
properly and many come from countries that are our adversaries
with very sophisticated foreign intelligence operations,
getting a fast track to citizenship in basic training before
any vetting went on. I am deeply concerned about the impacts.
Now, I am sure there are many good people that served our
country through this program, but the potential and the
vulnerabilities have caused the DOD to halt this program. I am
just--I am so concerned about the implications of those who
were already in it and the fact that they were not vetted, and
now they are U.S. citizens, so they clearly have Constitutional
rights. So I just would like to hear all of your thoughts on
were you aware of this program? What are we doing now to
mitigate any of these vulnerabilities and these threats for
those that have already been through it because of the
buffoonery of what happened that is potentially impacting our
National security?
Ms. Duke. I am aware of the program and that it is
suspended. DHS and I believe we have to vet every individual.
We believe in a legal immigration system, but have to balance
security and make sure we vet all persons coming into the
United States, permanently or temporarily.
Ms. McSally. Director Wray, in counterintelligence roles,
is there any part that you are playing right now even to try
and mitigate and address these potential threats?
Mr. Wray. Well, we try to investigate wherever we can. We
get intelligence about people of the sort you are describing
and trying to pursue those and share that information working
with our fellow colleagues in the interagency.
Ms. McSally. So I would like to maybe follow up in a
Classified setting with you as to whether there is any open
investigation specifically related to this issue.
I do want to ask, Mr. Chairman, to insert into the record,
we did write a letter together to USCIS and we have got the
response here. I would like to put that in the record.
Chairman McCaul. Without objection, so ordered.
[The information follows:]
Letter Submitted For the Record by Honorable Martha McSally
September 5, 2017.
Mr. James McCament,
Acting Director, U.S. Citizenship and Immigration Services, Department
of Homeland Security, Washington, DC 20008.
Dear Mr. McCament: We have concerns regarding the Military
Accessions Vital to National Interest (MAVNI) program, which began as a
Department of Defense (DOD) pilot program in 2009 to assist the U.S.
military in filling certain specialized job categories determined to be
vital to the national interest.\1\
---------------------------------------------------------------------------
\1\ U.S. Citizenship and Immigration Services. Policy Alert:
Department of Defense Military Accessions Vital to National Interest
Program. Found at https://www.uscis.gov/policymanual/Updates/20160803-
MAVNI.pdf. Last accessed on August 2, 2016.
---------------------------------------------------------------------------
The United States has a proud history of honoring foreign-born
individuals who serve in the military with expedited citizenship
benefits. According to the United States Citizenship and Immigration
Services (USCIS), between October 2001 and September 2015, the U.S. has
naturalized 109,321 members of the military.\2\ As you know, robust
vetting is essential for all immigration programs, especially those
involving the U.S. military where individuals may have access to
specialized training and classified information.
---------------------------------------------------------------------------
\2\ U.S. Citizenship and Immigration Services. Naturalization
Through Military Service: Fact Sheet. Found at https://www.uscis.gov/
news/fact-sheets/naturalization-through-military-service-fact-sheet.
Last accessed on August 3, 2017.
---------------------------------------------------------------------------
According to media reports, the Department of Defense has enlisted
over 10,000 non-U.S. citizens into the military since the MAVNI pilot
started,\3\ the vast majority in the U.S. Army. Several recent media
reports have raised concerns about security vetting for individuals in
this program. It is our understanding that DOD suspended the program in
September 2016 due to these security concerns.\4\ An excerpt from a
memo reported to be from DOD states, ``The previous execution of the
MAVNI Pilot Program presents a significantly elevated risk to the
Department from a CI/S and insider threat perspective, to include a
considerable burden on limited intelligence assets.''\5\ The memo
further states that DOD is in the process of developing a replacement
program.\6\
---------------------------------------------------------------------------
\3\ James Rosen, ``Pentagon investigators find `security risks' in
government's immigrant recruitment program, `infiltration' feared,''
Fox News, August 1, 2017, Found at http://www.foxnews.com/politics/
2017/08/01/pentagon-investigators-find-security-risks-in-governments-
immigrant-recruitment-program-infiltration-feared.html. Last accessed
on August 3, 2017.
\4\ Alex Horton, ``Foreign-born recruits, promised citizenship by
the Pentagon, flee the country to avoid deportation,'' The Washington
Post, July 17, 2017, Found at https://www.washingtonpost.com/news/
checkpoint/wp/2017/07/17/foreign-born-recruits-promised-citizenship-by-
the-pentagon-flee-the-country-to-avoid-deportation/
?tid=hybrid_collaborative_2_- na&utm_term=.34d67cd4cb4a. Last accessed
on August 2, 2017.
\5\ Agnes Constante, ``Immigrant Military Recruits Wait in Limbo As
Defense Program's Future Unclear,'' NBC News, July 31, 2017, Found at
http://www.nbcnews.com/news/asian-america/immigrant-military-recruits-
wait-limbo-defense-program-s-future-unclear-n787121?cid=sm_npd-
_nn_tw_ma. Last accessed on August 2, 2017.
\6\ Constante, supra note 5.
---------------------------------------------------------------------------
As the Government agency responsible for overseeing lawful
immigration to the United States, USCIS played a vital role in ensuring
that applicants in the MAVNI program were properly vetted prior to
receiving naturalization benefits. Please respond to the following
questions no later than October 5, 2017 (provide a classified annex if
required to fully answer):
1. How many applications has USCIS received under the MAVNI
program? Please provide a breakdown by country, year, and
military service.
2. How many individuals became U.S. citizens through the MAVNI
program? Please provide a breakdown by country, year, and
military service.
3. How many MAVNI applicants are currently in deferred military
entry status? Please provide a breakdown by country and
military service. What is the immigration status of these
individuals?
4. What is the average timeline from when a MAVNI applicant begins
basic training to becoming a U.S. citizen?
5. How many MAVNI applications are pending?
6. How many MAVNI applicants were denied citizenship and what were
the reasons for such denials?
7. What screening and vetting procedures does USCIS apply to MAVNI
applicants?
8. Please provide detailed information on the scope of the
screening USCIS conducted under this program, including whether
the screening is limited to the background of the applicant
since arriving in the U.S. or if it includes thorough review of
the applicant's background, affiliations, contacts, and
activities prior to arrival in the U.S.?
9. Are foreign contacts of MAVNI applicants self-reported only or
corroborated with other U.S. Government agency information?
10. Does USCIS conduct enhanced screening of MAVNI applicants from
countries known to be hostile to the U.S. or known to conduct
intelligence gathering activities on the U.S.? If yes, please
provide details.
11. Did USCIS conduct in-person interviews with MAVNI applicants?
12. Did USCIS utilize any deception detection technology as part of
the screening and vetting procedures?
13. The MAVNI program was intended to be limited to ``certain
health care professionals and foreign nationals fluent in
certain foreign languages.''\7\ However, it appears the Army
specifically may have used MAVNI in a much broader way to meet
recruiting goals in a wide array of careers. Does USCIS vetting
include a review of the specialized skill the applicant is
filling to ensure it is within the limits of the program?
---------------------------------------------------------------------------
\7\ U.S. Citizenship and Immigration Services. USCIS Policy Manual,
Volume 12--Citizenship & Naturalization, Part I--Military Members and
their Families. Found at https://www.uscis.gov/policymanual/Print/
PolicyManual-Volume12-PartI-Chapter3.html. Last accessed on August 3,
2017.
---------------------------------------------------------------------------
14. To what extent has USCIS reviewed the immigration benefits
awarded through the MAVNI program to determine if any
derogatory information, including false statements or national
security concerns, existed at the time of application and/or
award that would be grounds for denying naturalization
benefits? Have any benefits been revoked?
15. Is USCIS working with the DoD and other agencies to review
previous MAVNI applicants who are now U.S. citizens to ensure
that foreign intelligence agencies did not use MAVNI infiltrate
the U.S. military ranks as a way to access sensitive and
classified information? What are the legal considerations of
such a review due to constitutional rights of these now U.S.
citizens?
16. Were any MAVNI applications referred to the USCIS Fraud
Detection and National Security Directorate? If so, how many?
Please provide a breakdown by country, year, and military
service.
17. Please provide a copy of any agreements, communications,
letters, or memorandum of understanding between USCIS, or
another DHS entity, and DOD regarding the MAVNI program.
18. Are there other initiatives where other agencies or departments
are able to offer expedited immigration benefits? If so, please
list them and the corresponding statutory authority.
19. Is USCIS or another DHS element involved in DOD's development
of a replacement to the MAVNI pilot? If yes, what is the status
of these efforts?
20. Does the Department of Homeland Security employ any individuals
naturalized through the MAVNI program?
Thank you in advance for your cooperation.
Sincerely,
Michael T. McCaul,
Chair, Committee on Homeland Security.
Martha McSally,
Chairman, Subcommittee on Border and Maritime Security.
Ms. McSally. Director Rasmussen, any comments?
Mr. Rasmussen. The only thing I would add is I was not
aware of particular vulnerability. One thing that I think might
contribute to identifying potential sources of concern in this
population is, depending on their status, some individuals now
are subject to recurrent vetting, vetting that goes on long
after they have been through the initial admission process.
That changes, obviously, when they gain status as a citizen for
the reasons you suggest. But it could mean that some members of
this population are still subject to some vetting process.
Ms. McSally. Thanks. I am over my time, but I would like to
follow up in a Classified setting with all of you. Thank you.
Thank you, Mr. Chairman.
Chairman McCaul. Let me just say I echo the gentlelady from
Arizona's concerns. I am glad to hear this program is
suspended. I met with the director of USCIS yesterday and
encouraged him to get the Classified briefing on this program.
With that, the Chair recognizes the gentleman from
Wisconsin, Mr. Gallagher.
Mr. Gallagher. Thank you, Mr. Chairman. I thank all of you
for being here.
So we talked a lot about sort-of the evolving terrorist
threat abroad. It does seem that ISIS is steadily losing
territory in western Iraq and eastern Syria, which opens up an
opportunity for us to exploit a lot of valuable intelligence on
the battlefield in the form of biometrics, fingerprints,
documents, media devices. This is vital that we collect it and
then find a way to get that information to those outposts that
are vetting people who want to come into this country: Visa
applicants, refugees, asylees. Because in the past, we have had
examples where people have come into the country who are tied
to terrorist groups.
To what extent--I guess I would direct this to Acting
Secretary Duke--to what extent do you think this battlefield
information that is being captured by our military operators
and other intel folks in the field being incorporated into your
respective agency's operations and investigations?
Ms. Duke. I think this is one of the areas that has
improved most, to be honest with you. DHS is now an active
member of the National Security Council, as is Director
Rasmussen, and we get the same intelligence both before and
after an incident. I think that counterterrorism efforts
overseas lead by the Department of Defense are probably the
area I have seen the most progress in.
Mr. Rasmussen. What I would add to that is that the
battlefield intelligence of the sort that you are describing,
Mr. Gallagher, is most useful to us when it contains specific
identity intelligence, when we can learn names, dates of birth,
passport numbers, identity documented information, and so that
that can be used to feed our database of known and suspected
terrorists. That is the intelligence database that all of
Acting Secretary Duke's immigration programs is bouncing off of
as they are making decisions and vetting potential admissions
to the country. So the better, the richer, the deeper that
database, the more likely it is we are going to have the
information that will identify a potential bad actor.
It still is imperfect in that you can never have the
totality of the information that you would want, but there is
no question that what has happened in Iraq over the last
several months has given us a wealth of new information that is
helpful in this regard.
Mr. Wray. I would just add that--and I agree with the
sentiments that both of my co-panelists have expressed, but I
would also add that the FBI has people forward-deployed with
the military so that we are trying to collect biometric
information wherever we can, and that has turned out to be very
useful in some cases to identify people who are then returning
or going elsewhere who weren't on people's lists, whether in
the United States or in our foreign partners as well. I think
going forward that is going to be another place where we can be
more effective.
Mr. Rasmussen. Let me jump in on one other issue that has
come up quite a bit in the hearing today. Much of what we have
learned about terrorists potential use of UAVs or UAS devices
as an aviation threat has been learned from what we have seen
on the battlefield in Iraq. Rapid exploitation of that
material, rapid sharing here in the homeland so that local law
enforcement does know that there is a threat to a high school
football game of the sort that we were talking about, a lot of
that is derived directly from battlefield intelligence.
Mr. Gallagher. Well, it is heartening to hear that you all
three seem to think it is headed in the right direction, though
there is room for improvement. As a veteran of the NCTC ops
center, and many a nights have we spent from 5 p.m. to 5 a.m.
poring over those databases, so I am glad to hear your
sentiments on that.
Acting Secretary Duke, I thank you for highlighting in your
testimony the important work of the committee's Task Force on
Denying Terrorists Entry Into the United States. As Chairman of
that task force, I would also like to thank the Department for
your cooperation while we have been conducting the review. We
are looking forward to releasing the task force's final report
in the near future. I look forward to working with all of you
to implement its recommendations or shore up any areas that you
don't think we paid enough focus to.
Earlier, you discussed how some of our foreign partners
lacked the necessary capabilities to close gaps in their
security and stop terrorist travel. This actually matches one
of the key findings in our task force report, and some of the
recommendations will focus on DHS's cooperation with our
foreign partners.
Can you briefly describe some of the work DHS is currently
doing with our foreign partners to address any overseas
vulnerabilities that pose a threat to our homeland?
Ms. Duke. Well, one of main areas is using systems that
either we have and offered them to use that track people, that
track known terrorists. What Director Rasmussen talked about,
we have international partners feeding into that same known
terrorist database. We think that that info sharing is No. 1.
Additional documentation, having the right documentation with
the biometrics. Actually, the other part is not only inputting,
but using the databases to make their own determinations with
the borders so open, especially in Europe. Those are a few of
the areas.
Mr. Gallagher. I thank you.
I yield the balance of my time.
Chairman McCaul. The gentleman yields.
Before I close, I want to also share the concern, Secretary
Duke, that you raised in your prepared testimony about the
relationship potentially between transnational criminal
organization and potential terrorists that could bring
terrorists into the United States, but also weapons of mass
destruction that we saw highlighted in Dabiq magazine, where
they talk about the ease with which that could be accomplished.
I think that that certainly raises a warning sign and I think
demonstrates a need to get the borders secured.
I also want to thank Director Wray. I also share your
concern about 702. As for me, this Member, this Chairman, I
will be working closely with other like-minded Members to make
sure that happens.
Director Rasmussen, this will be your last testimony before
this committee. I just want to commend you on----
Mr. Rasmussen. This or any committee.
Chairman McCaul. Or any committee, hopefully. I just want
to thank you for your service. You will be missed, but I know
you will be close by.
I want to thank all three of you for your service and, most
importantly, the men and women who serve in your organizations.
With that, this--we are going to take a brief break and
then begin with our second panel.
[Recess.]
Chairman McCaul. The committee will come to order.
We have votes scheduled probably in about 5 to 10 minutes,
so I am going to try to get through this as quickly as I can,
and then we will come back after votes and start with our Q-
and-A series.
I am pleased to welcome our second panel of witnesses on
domestic terrorism. Our second panel includes Mr. David Rausch,
the chief of police for the city of Knoxville, Tennessee; Rabbi
Abraham Cooper, associate dean and director of the Global
Social Action Agenda at the Simon Wiesenthal Center; and Mr.
Richard Cohen, president of the Southern Poverty Law Center.
I want to thank all of you for being here today.
The Chair now recognizes Police Chief Rausch for his
testimony.
STATEMENT OF DAVID B. RAUSCH, CHIEF OF POLICE, CITY OF
KNOXVILLE, TENNESSEE
Chief Rausch. Good afternoon, Chairman McCaul. Thank you,
Ranking Member Thompson, and Members of the committee. Thank
you for the opportunity to speak with you today about world-
wide threats, specifically, domestic terrorism and the threat
posed by extremist groups.
My name is Chief David Rausch. I am currently the chief of
police in Knoxville, Tennessee. I am also a member of the
executive board of directors for the International Association
of Chiefs of Police, and currently the general chair for the
IACP Midsize Agencies Division, which represents agencies with
50 to 999 sworn officers.
The IACP is the world's largest association of law
enforcement leaders with more than 30,000 members in 150
different countries. I have been fortunate to have been trained
by the FBI in domestic and international terrorism, as well as
participated in training at the U.S. Army War College, in
addition to my over 28 years of experience in law enforcement.
Today's law enforcement officers face an incredible set of
challenges. One of the many myriad of challenges we confront is
how to best respond to planned rallies, spontaneous crowds, and
civil disturbances by extremist groups, while balancing First
Amendment rights. All too often, what may have been started as
a peaceful demonstration can spawn protests and counter-
protests that can lead to civil disorder.
Groups with varying social and political agendas that wish
to express their concerns over war, abortion, environmental
issues, policy decisions, and numerous other issues can and
have sparked violent and even deadly actions and reactions.
Most recently, we witnessed that in Charlottesville, Virginia.
A few short weeks after that incident, on August 26, we had
a protest over a monument in Knoxville, and we used what we
learned from Charlottesville, from Boston, and from Durham,
North Carolina, to ensure a safe, peaceful gathering. Each of
these cities were faced with the realities addressing Civil War
statutes or monuments and free speech by groups known for hate.
I will share what we learned from those events, and I will
discuss some of the challenges law enforcement faces when it
comes to policing extremist groups and where we could benefit
from assistance from the Federal Government.
Civil disturbances and demonstrations have changed over the
years, as have the tactics and techniques of extremist groups
that organize these protests and gatherings. Demonstrations in
public protest have taken on a more systemic organized nature
and have invoked tools that were not available in past decades.
Social media is now commonly used to rapidly mobilize and
manage participants prior to enduring demonstrations and civil
disturbances. Communities--while some of the issues there, of
course, are with the social media allowing the expression of
hate in forms that we have noticed recently.
Law enforcement needs the assistance and cooperation of
those who manage the social media mediums to monitor their
sites and not allow them to be used for this purpose. The
companies need protection from frivolous lawsuits that prevent
them from taking needed action to do this. We need the ability
to have those who are pushing a violent hate agenda to be held
accountable for violence that results from their efforts.
Additionally, continued resources through the Department of
Homeland Security and the Department of Justice in the form of
community policing grants, safe streets funding, and other
resources are vital for the continuation of being able to
address these efforts to prevent and intervene violent
extremists. It is vital that all levels of government and the
private sector work together to identify and address
individuals and organizations that are involved in violence and
hate. This information needs to be provided immediately in real
time to all who may be impacted, especially those who are
responsible for the safety of our communities.
There should be no barriers to the sharing of information.
Fusion centers have been effective at providing this
information, but they are only as good as the information that
they are provided or they learn through their efforts. The
ability to gather intelligence information must not be
hindered. We certainly understand the concerns of too much
Government intrusion, but we can't allow this distrust of
Government to allow those who seek to harm us to thrive. There
can be appropriate intelligence gathering that is properly
monitored to protect us all. We must ensure that we are
watching and not allow those tools that law enforcement use to
get taken away.
The ability of a local community to control events in their
jurisdiction is vital. The power to require notice of an event
to assess the level of concern for our communities is
paramount. Permitting is a process that allows this to be done
effectively. The process gives local government the opportunity
to appropriately protect all who wish to participate, or to
make a decision to decline a permit based on factual concerns
for the overall safety of a community.
A failure to obtain a permit should be reason to declare a
gathering illegal. Permitting allows for clearer communication
between the jurisdiction and the event organizers. Contact with
leaders of a demonstration is important to gather information
and establish ground rules for the event, in particular,
nonnegotiable matters, with the intention that a common
understanding be reached by both parties on the ground rules.
In our protest in Knoxville, it was advertised on social
media. A local white supremacist group announced that they
would be holding a support-the-monument rally at a Civil War
monument that had been vandalized after Charlottesville. We
were familiar with the group planning this, and they had
gatherings previously. Then three other groups began organizing
counter-protests against the white supremacist hate group. We
were familiar with some of these groups. The support for the
counter-protesters were substantially larger than the white
supremacist hate groups.
Our intelligence unit began monitoring all the known
problem groups in our area, and they were inciting each other
by posing as members of the opposite group and making
statements about the need for violence.
One of the counter-protest groups contacted us to request
approval to conduct a march, and that was denied because of the
recent events that we had seen in other locations. The support-
the-monument group never sought a permit. They advised they
were just going to meet at the monument, and then we decided to
take control of that.
To me, these groups who gather to spew hate and violence
now hide under the cloak of the First Amendment. We need to be
able to delineate between exercising freedom of speech and
violent behavior. Having the ability to put reasonable rules in
place and control these gatherings is important.
I know I have gone over my time there, Mr. Chair. I will
just tie it up just saying that we believe that there are a lot
of tools that could be made available to us. As, you know, I am
sure there will be some questions, I can get further into that.
[The prepared statement of Chief Rausch follows:]
Prepared Statement of David B. Rausch
November 30, 2017
Good afternoon Chairman McCaul, Ranking Member Thompson, and
Members of the committee.
Thank you for the opportunity to speak with you today about world-
wide threats--specifically domestic terrorism and the threat posed by
extremist groups.
My name is Chief David Rausch am currently the chief of police of
the Knoxville, Tennessee Police Department. I am also a member of the
executive board of directors for the International Association of
Chiefs of Police (IACP) and currently the general chair of the IACP
Midsize Agencies Division, which represents agencies with 50 to 999
sworn officers. The IACP is the world's largest association of law
enforcement leaders, with more than 30,000 members in 150 different
countries.
I have been fortunate to have been trained by the FBI in Domestic
and International Terrorism, as well as participate in training at the
U.S. Army War College in addition to my over 28 years of experience in
law enforcement.
Today's law enforcement officers face an incredible set of
challenges. One of the many myriad of challenges we confront is how to
best respond to planned rallies, spontaneous crowds, and civil
disturbances by extremist groups while balancing First Amendment
rights.
All too often, what may have been started as a peaceful
demonstration can spawn protests and counter protests that can lead to
civil disorder. Groups with varying social or political agendas that
wish to express their concerns over war, abortion, environmental
issues, policy decisions, and numerous other issues can and have
sparked violent--even deadly--actions and reactions. Most recently, we
witnessed this occur in Charlottesville, Virginia.
A few short weeks after that incident, on August 26 we had a
protest over a monument in Knoxville and we used what we learned from
Charlottesville, Boston, Durham, North Carolina to assure a safe
peaceful gathering. Each of these cities were faced with rallies
addressing civil war statues or monuments and ``free speech'' by groups
known for hate. I will share what we learned from those events and I
will discuss some of the challenges law enforcement faces when it comes
to policing extremist groups, and where we could benefit from
assistance from the Federal Government.
recruitment and organization
Civil disturbances and demonstrations have changed over the years,
as have the tactics and techniques of the extremist groups that
organize these protests and gatherings. Demonstrations and public
protests have taken on a more systemic, organized nature and have
invoked tools that were not available in past decades. Social media is
now commonly used to rapidly mobilize and manage participants prior to
and during demonstrations and civil disturbances.
Social media and the internet provide extremists with an
unprecedented ability to spread hate and recruit followers, similar to
what we have witnessed with terrorist organizations. Individual racists
and organized hate groups now have the power to reach a global audience
of millions and to communicate among like-minded individuals easily,
inexpensively, and anonymously. Equally troubling, internet users,
particularly young people, have never been more exposed and vulnerable
to the efforts of these extremists to influence, recruit, and
intimidate. Moreover, there is significant evidence that the internet
is playing an increasing role in facilitating self-radicalization.
Combating Violent Extremism is an effort led by the CVE Task Force
which is made up of the Department of Homeland Security in
collaboration with the Department of Justice, the Department of State,
Department of Defense, Department of Education, Department of Health
and Human Services, Department of Labor, as well as the Federal Bureau
of Investigation, U.S. Agency for International Development, and the
National Counterterrorism Center. Model efforts for how to engage
communities to prevent radicalization and recruitment are collected and
shared by this group. Partnering with State and local law enforcement
is a key to the effort, specifically those utilizing community policing
strategies. Successful prevention efforts have included a mix of
positive community engagement and early identification of potential
recruiters and recruits.
Communities rely on education through classrooms, faith
organizations, and the media. Educating parents and youth on the
efforts and dangers of these hate organizations and ideologies is a
core prevention effort. Expressing the dangers of these groups and
their bullying behaviors is key. There needs to be an understanding
that radicalization is not just about religion, it's about beliefs.
Relationships between the community and law enforcement must continue
to be built and managed. Currently, hate has the stage. It is getting
all the attention. It has a megaphone and is being allowed to spew in
many forms taking advantage of divisions that have been created. This
does not have to be the case. The vast majority of Americans believe
and know that we are all more alike than we are different and that we
accomplish things in this country working together.
Law enforcement needs the assistance and cooperation of those who
manage the social media mediums to monitor their sites and not allow
them to be used for this purpose. These companies need protection from
frivolous lawsuits that prevent them from taking needed action to do
this. We need the ability to have those who are pushing a violent hate
agenda to be held accountable for violence that results from their
efforts. Law enforcement also needs the assistance of those in our
community who learn of or know individuals who are engaged in these
violent hate agendas to report them to us, so that we can do our jobs
to protect our neighbors.
Additionally, continued resources through the Department of
Homeland Security and the Department of Justice in the form of
Community Policing Grants, Safe Streets funding, and other resources
are vital for the continuation of being able to address these efforts
to prevent and intervene violent extremists.
pre-event intelligence gathering and management
It is vital that all levels of Government and the private sector
work together to identify and address individuals and organizations
that are involved in violence and hate. This information needs to be
provided immediately in real time to all who may be impacted,
especially those who are responsible for the safety of our communities.
There should be no barriers to the sharing of this information. Fusion
Centers have been effective at providing this information, but they are
only as good as the information that they are provided or they learn
through their efforts.
The ability to gather intelligence information must not be
hindered. We certainly understand the concerns of too much Government
intrusion, but we can't allow this distrust of Government to allow
those who seek to harm us to thrive. There can be appropriate
intelligence gathering that is properly monitored to protect all of us.
We must assure that we are watching and not allow the tools that law
enforcement uses to be taken away.
The ability of a local community to control events in their
jurisdiction is vital. The power to require notice of an event to
assess the level of concern for a community is paramount. Permitting is
a process that allows this to be done effectively. The process gives
the local government that opportunity to appropriately protect all who
wish to participate or to make a decision to decline a permit based on
factual concerns for the overall safety of a community. A failure to
obtain a permit should be reason to declare a gathering illegal and
assure that everyone is made aware and given an opportunity to disperse
before any other course of action. Permitting allows for clear
communication between the jurisdiction and the event organizers.
Contact with leaders of a demonstration is important to gather
information and establish ground rules for the event. In particular,
non-negotiable matters, with the intention that a common understanding
be reached by both parties on the ground rules.
A new challenge to this process is that groups are organizing on
social media sites and have no real leaders and are just gathering to
express their concerns. Many having the same ideology of hate. These
should be addressed as an illegal gathering.
In our protest in Knoxville, it was advertised on social media. A
local white supremacists group announced that they would be holding a
``support the monument'' rally at a Civil War Memorial Monument that
was placed to remember 813 Confederate soldiers who were killed in the
Battle of Fort Sanders that has been vandalized after the
Charlottesville protest. We were familiar with the group planning this,
as they had conducted gatherings in the past. Then three groups began
organizing a counter protest against the white supremacist hate group.
We were familiar with some of these groups. The support for the counter
protestors was substantially larger than the white supremacist hate
group. We monitored the on-line activities of these groups, as well as
hate groups on both sides that were planning to attend. Our
Intelligence Unit began monitoring all of the known problem groups in
our area as well. They were inciting each other by posing as members of
the opposite group and making statements about the need for violence.
One of the counter protest groups contacted us to request approval
to conduct a march to the site on a State Route that is a main route
through the University of Tennessee. They advised that they would have
2,000 participants. Because of the concerns of what we had seen from
recent events in other jurisdictions and the fact that this is a major
route in our city, we denied the request and advised the organizer that
if they marched that they would have to do so on the sidewalks and
follow all laws. The ``support the monument'' group never sought a
permit. They advised that they were just going to gather around the
monument on the sidewalk. We decided that we would take control of the
area and set the rules to avoid any possible violence.
balancing freedom of speech with public safety
All persons in the United States have the right to march,
demonstrate, protest, or undertake similar activities protected under
the First Amendment to the United States Constitution. Freedom of
speech, association, assembly, and the right to petition the Government
are subject only to reasonable restrictions on the time, place, and
manner of their expression. The content of the speech or message does
not provide the basis for imposing limitations on these rights. Law
enforcement has the difficult task of maintaining the peace during
incidents, while also protecting the rights of assembly and free speech
guaranteed by the U.S. Constitution.
The challenging part for law enforcement is we must protect groups
that we may not agree with. We must protect groups that oppose us and
have ideas that are counter to ours. But, our oath requires us to
protect the rights of everyone.
Too many of these groups who gather to spew hate and violence now
hide under the cloak of the First Amendment. We need to be able to
delineate between exercising freedom of speech and violent behavior.
Having the ability to put reasonable rules in place to control these
gatherings is important. Not allowing individuals to bring items that
can be used as weapons, including sticks, bats, bottles of urine,
frozen water bottles, bricks, rocks, helmets, shields, face coverings
and masks, provides the ability to prevent violence from happening.
These are all tools of intimidation and attack. Protests are
emotionally charged events with people who are passionate about their
cause. They are events that extremists take advantage of to push their
violent agendas. Jurisdictions need the ability to control these events
and set reasonable rules to avoid dangerous conditions. Even in the
jurisdictions where firearms are allowed to be carried openly or with a
permit, the ability to ban them at these events is necessary. Again,
the emotional aspect of these gatherings calls for the ability to
regulate them to assure the safety of all involved, including law
enforcement.
After watching video from the protests in Charlottesville, Boston,
and Durham we decided that we would put reasonable rules in place for
the area of the protest. These included prohibiting all items that
could be used as weapons, no face coverings, and no masks. Because we
decided to control the area we were also able to prohibit firearms,
even by those who had carry permits, as a new State law set the rules
for this and we set up the area to meet the requirements. This set the
stage to prevent potentially violent situations from happening. We also
communicated this information in advance of the event to assure that
those who would gather knew the rules as well as those in the community
who lived and worked in the area knew what steps were being taken to
keep the area safe.
tools and procedures for success
Some of the key elements that proved successful for our event was
to take control of the area early to prevent either side from taking
control of the area before law enforcement. Because of the new threat
of vehicle-borne attacks we utilized heavy equipment trucks from our
Public Service Department to cut access to the area from all streets.
We set up physical barriers, ``cattle racks'', to separate the areas
where the two sides would be allowed and the center of the street to be
controlled by law enforcement. We set up the entrances on each side of
the area for a search of all who entered. We had law enforcement on the
outside of the controlled area watching over both sides as well as law
enforcement inside both areas. Riot Control teams in full gear were on
the inside between the two sides.
The planning and preparation consisted of utilizing all available
resources on the local, State, and Federal levels. Additional resources
were necessary and were obtained from several agencies including other
local and State law enforcement and emergency services. In our event we
utilized the city law department, communications department, service
department, fire department, emergency management, sheriff's office, a
nearby local police department, Tennessee Highway Patrol, Tennessee
Emergency Management Agency, Tennessee Bureau of Investigation, and
worked with the Federal Bureau of Investigation on intelligence
gathering.
Current laws mostly provide what is needed to conduct these events
and hold persons accountable. Laws addressing domestic terrorism and
hate crimes exist. Some thought should be put into making hate crimes
as an enhancement to the original crimes as there are challenges with
proving hate in some situations as the primary offense. Most
prosecutors will tell you that they will charge the primary crime of
assault, vandalism, etc. as they find it difficult to prove the
motivation for the crime at times. If they could get the verdict for
the crime and then use the motivation of hate to enhance the punishment
it may be more effective. Consideration should be made for passing laws
regulating protests and the costs associated with them. These events
are very expensive to communities. I realize that there are challenges
with determining who pays when most of these events are not organized
by a specific group or person. California recently passed a State law
to limit what can be carried during a protest and should be considered
as an example of what other States may want to accomplish.
legislative, policy, and action recommendations
Provide Federal Program and Funding Assistance
Training.--Law enforcement officers need training to
mitigate and to de-escalate these events.
Equipment.--Law enforcement needs funding for equipment to
help respond and manage these events. Equipment such as
protective gear, cameras, and radios not only help to keep
officers safe but also allow them the ability to keep the
public safe.
Specialized Units and Task Forces.--Funding to create
specialized units or to help agencies team up to develop multi-
agency task forces.
Fusion Centers and Information Sharing.--Fusion centers play
a unique role in protecting their communities, informing
decision making, and enhancing information-sharing activities
among law enforcement and homeland security partners. Federal
support is needed to fund these fusion centers.
Intelligence Gathering.--Those of us who are charged with
protecting the public aren't always able to access the evidence
needed to prosecute crimes and prevent acts of terror. Social
media is a particularly difficult challenge for law
enforcement. Law enforcement needs, wherever possible,
assistance from Congress in ensuring that social media
providers are both willing and able to share necessary
information that would help protect our communities and
citizens. Law enforcement simply needs to be able to lawfully
access information that has been duly authorized by a court in
the limited circumstances prescribed in specific court orders.
Speak Out Against Hate
The President, Members of Congress, State and local elected
officials all need to condemn acts of bigotry every chance they can. As
elected officials, you hold important roles, and the Nation and your
communities want to hear from you. Use your role to speak out against
the hateful incidents that are plaguing our communities and send a
message that these acts will not be tolerated. All of us, law
enforcement included, must work together to put an end to hate and
tensions are brewing.
conclusion
On behalf of the IACP, I conclude by thanking you again for the
opportunity to appear before you today. I would be happy to answer any
questions you may have.
Chairman McCaul. I appreciate it, Chief Rausch. Your full
statement will be included in the record.
The Chair now recognizes Rabbi Cooper.
STATEMENT OF RABBI ABRAHAM COOPER, ASSOCIATE DEAN, DIRECTOR,
GLOBAL SOCIAL ACTION AGENDA, SIMON WIESENTHAL CENTER
Rabbi Cooper. Thank you, Chairman. Thank you, Ranking
Member Thompson and the rest of the distinguished Members of
Congress.
I want to thank you for allowing us to be here on behalf of
our 400,000 constituents of the Simon Wiesenthal Center. We are
named first in honor and now in memory of Simon Wiesenthal, the
great Nazi hunter who lost 89 members of his family during
World War II. When he was liberated by U.S. troops at
Mauthausen, he was too weak to stand and embrace his
liberators. He dedicated the rest of his life seeking justice
and not vengeance. Brought 1,100 of the perpetrators before the
bar of justice and changed the way civilization looked at the
responsibilities of dealing with the crimes of genocide. He
warned, ``I know that the hate did not die with Hitler in the
Berlin bunker.'' Tragically, how right he proved to be.
Before I go on, I just think this is also an appropriate
moment to thank your father, Mr. Chairman, who I learned from
you flew 32 missions over Europe, participated in D-Day,
representing the greatest generation. It might be a little bit
late, but it is the appropriate time to say thank you.
The threats of extreme anti-Semitism in the United States
in our time trace back to the 1980's. The small but extremely
violent order assassinated Denver talk show host, Alan Berg, in
1984, and planned to foment a race war in our country. Neo-
Nazi, skinhead, and militia movements in the late 1980's and
1990's often combined white separatist doctrine with anti-
Jewish theory and practice.
It has already been 30 years, but anti-Jewish hate crimes
forced many Jewish institutions across our country to undertake
costly security measures to protect people at prayer and kids
at school. For a generation, Jews attending synagogue services
or dropping their children off at a school have accepted the
necessity of having guards, often armed, security cameras, and
other paraphernalia. Annual FBI stats prove that it is not
paranoia. Jews, unfortunately, every year are the No. 1 target
of religion-based hate crimes. I would add that African
Americans, unfortunately, every year are the No. 1 continuing
target of race-based hate crimes.
In 1999, Buford Furrow, trained in William Pierce and Tom
Metzger's doctrine of leaderless resistance, came down to Los
Angeles with the plan to attack our Museum of Tolerance. He
landed up using a softer target, which was a Jewish summer day
camp. Children as young as 6 years old were shot before he
murdered a Filipino-American U.S. Postal Service employee. Two
years later,
9/11 changed our world forever. It is one of the reasons we are
here today.
Against this backdrop, earlier this year, there were over
120 bomb threats made to--against Jewish community centers
across our country. These threats evoke painful memories of
earlier deadly attacks at JCCs, including Granada Hills,
California; Seattle, Washington; and Overland, Kansas.
Thousands of young families, including a young colleague of
mine at the Wiesenthal Center, were deeply traumatized as their
4- and 5-year-olds were suddenly and hurriedly evacuated from
their classrooms.
Despite strenuous efforts in Federal and local law
enforcement, for which we are incredibly grateful, it took
months to identify the main culprit of these threats of
domestic terrorism. The majority of those threats emanated not
from here, but from overseas, and traced back to one young
suspect in Israel.
But 2017 has witnessed more than bomb threats. It was a
year where the oldest hate manifested on too many of our
Nation's campuses, were delivered to our personal emails, and
spouted from pulpits of religious leaders.
The sources? Extremist elements of the new alt-right, self-
proclaimed white nationalists and outright Nazis, theologically
fueled and validated Islamist hate rhetoric, extreme anti-
Israel campaigns on campus that demonize the Jewish State and
her Zionist supporters.
What has changed? Well, we heard a phenomenal panel before
detail in--great professionals--the internet. The internet is
used to incubate and validate hate, to inspire and empower, and
even train lone-wolf attackers. It has created new global
relationships among extremists unimaginable 20 years ago. It
offers anonymity.
We saw that the new generation of young Nazis were able to
utilize Charlottesville in a way to capture National and global
attention by staging Nazi-like torch light parades and
uploading video in real-time via social media with little or no
consequences to the perpetrators.
I want to go directly to the fact that, a few weeks ago, we
participated in hearings at the House Judiciary Committee,
which was considering undertaking some steps to help Jewish
kids endangered on campus. Unfortunately, to this point, a bill
which passed 100 to nothing in the Senate, is still being held
up by Chairman Goodlatte. As a result, the U.S. Department of
Education has not adjudicated a single case involving anti-
Semitism in the United States against students on campus.
Then the Islamist rhetoric attacks, such as the one in
Davis, California, in which people have used religious pulpits
in order to call for genocide against the Jewish community. I
am a Rabbi, so I am very sensitive to the fact that we don't
want to curtail either the First Amendment or tell religious
leaders what they should do. But I am also a sports fan and I
believe in a level playing field.
The kind of rhetoric that has been used to attack our
community and Christians by certain Islamist personalities,
imams in our country, has simply not elicited the kind of
response that the Muslim leadership in this country should
show, especially since the American Muslims themselves have
suffered a spike in hate crimes targeting them in the last
year.
Finally, is there a role for DHS? I am aware that DHS's
role in combating domestic terrorism and anti-Semitism is
secondary to that of the DOJ and FBI. I am also aware that
DHS's role is not to dictate policies that would hold
extremists accountable for their acts.
Nonetheless, DHS was born in wake of the brutal lessons
wrought from the ashes and agony of 9/11. We learned as a
Nation that America had to move to correct serious flaws in our
fundamental approach to securing our Nation from ever-morphing
multiple threats. It is our view that local hate crime units,
State homeland security, and relevant Federal agencies must be
able to quickly update and expand their understandings of
extremist ideologies from the far right to the extreme left.
That would actually help them better understand the raw
intelligence that comes their way.
The Simon Wiesenthal Center is urging the committee, and
through you, Mr. Chairman and the Ranking Member, to consider
ways to enable the homeland security operation to be able to
intake from NGO's, human rights advocates, and other community-
based groups throughout the United States with the kind of
information which I think would better help the brilliant and
committed people we have heard who deal with materials we will
never see. But by virtue of the fact that the Wiesenthal Center
looks only at open-source material, sometimes we can provide a
little bit of perspective, since we are not doing industrial
phishing. We actually do it the old-fashioned way.
So it is our hope that together with all of the other
organizations and those who were not able to attend here today,
would be given an opportunity to have a platform where the
agencies that we heard from earlier today and the other
relevant groups, probably through fusion centers, would be able
to have access to the kinds of perspective information that we
would like to share with them. Thank you.
[The prepared statement of Rabbi Cooper follows:]
Prepared Statement of Rabbi Abraham Cooper
November 30, 2017
Thank you for the opportunity to represent the 400,000 constituent
families of the Simon Wiesenthal Center at today's House Homeland
Security Committee hearings. Now in our 40th year, our Center is named
in honor of and inspired by the legacy of Simon Wiesenthal, the late
Nazi hunter. He lost 89 members of his family during the Nazi
Holocaust. When U.S. forces entered Mauthausen Concentration Camp,
Simon weighed under 90 pounds and was too weak to even stand to embrace
the liberating American GIs.
He dedicated the rest of his life seeking justice, not vengeance
and succeeded in bringing Nazi War Criminals before the bar of justice,
helping to bring 1,100 to trial and ensuring a largely uncaring world
would not be allowed to forget the victims or the perpetrators of the
Nazi Genocide. And when he bestowed his good name on our institution he
warned, ``I know that hate did not die with Hitler in the Berlin
Bunker.''
How right he proved to be. The threats of extreme anti-Semitism in
the United States in our time trace back to the 1980's. The small but
extremely violent order assassinated Denver talk show host Allen Berg
in 1984, and planned to foment a race war in America. Assorted Neo-
Nazi, skinhead, and Militia movements of the late 1980's and 1990's
often combined white separatist doctrine with anti-Jewish theory and
practice.
Decades ago, anti-Jewish hate crimes forced many Jewish
institutions across the Nation to undertake costly security measures to
protect people at prayer and kids in school. For a generation, Jews
attending synagogue services or dropping their children off at a Jewish
School, have accepted the necessity of having guards--often armed--
security cameras and other paraphernalia. Annual FBI stats prove that
it's not paranoia--Jews every year are the No. 1 target of religion-
based hate crimes.
Indeed, in 1999, Buford O. Furrow, trained in William L. Pierce's
and Tom Metzger's doctrine of ``leaderless resistance'' to the ZOG or
so-called ``Zionist Organized Government, journeyed from the white
separatist Aryan Nations Compound in Idaho to Los Angeles. There, he
intended to assault the Simon Wiesenthal Center Museum of Tolerance, to
``send a message to the Jews,'' but settled for a softer target at a
Jewish Community Center day camp where he shot children as young as 6
before murdering a Filipino-American U.S. postal Service employee.
Two years later, 9/11 changed our world forever.
Against this background, earlier this year there were over 100 bomb
threats made against Jewish Community Centers, home to many pre-schools
and kindergartens. These threats evoked painful memories of earlier
deadly attacks at JCC's, including in Granada Hills, California (1999)
Seattle, Washington (2006), and Overland, Kansas (2014). Thousands of
families--including a young colleague of mine at the Simon Wiesenthal
Center were deeply traumatized as their 5-year-olds were suddenly and
hurriedly evacuated from their classrooms. Despite strenuous efforts of
Federal and local law enforcement--for which we are incredibly
grateful--it took months to identify the main culprit of these
``threats of domestic terrorism.'' The majority of the threats emanated
from overseas, eventually traced to one young suspect in Israel.
Coupled with attacks against Jewish cemeteries in Missouri,
Pennsylvania, and elsewhere, many of our communities further expanded
their security measures.
But 2017 witnessed more than bomb threats. It was a year where
history's oldest hate manifested on our too many of our Nation's
campuses, were delivered to our personal emails, and spouted from
pulpits of religious leaders.
The sources? Extremist elements of the new alt-right, self-
proclaimed white nationalists and outright Nazis; theologically-fueled
and validated Islamist hate rhetoric; extreme anti-Israel campaigns on
campuses that demonize the Jewish State and her Zionist supporters.
what has changed in 2017?
The internet--it's used to incubate and validate hate; to inspire,
empower, and even train lone-wolf attackers; it creates new global
relationships among extremists unimaginable 20 years ago. It offers
anonymity and encryption for evil-doers and largely renders the targets
of hate virtually helpless from a tsunami of personalized screeds and
threats.
Gone are the days when neo-Nazis were relegated to leafleting car
windshields. No need to hide mailing of hate propaganda in non-descript
brown paper. The new generation of extreme far-right racists are tech-
savvy. Perhaps inspired by the success of European xenophobes and
bigots, they have succeeded in penetrating the mainstream of culture,
adopting new vocabularies, and project a sleek and sophisticated on-
line presence. They market everything from T-shirts to hate music to
impressionable young people.
Recently they have dropped the still-taboo swastika for sunwheel or
runes--symbols deployed by racists across Europe. Other times their
sophisticated on-line skills are on horrific display when Jewish
reporters are pummeled with hundreds of personalized anti-Semitic
attacks delivered to the victim via email or Twitter for the ``crime''
of reporting the news or writing op-eds.
The new generation of Nazis also showed in Charlottesville that
they can capture National and global attention by staging Nazi-like
torchlight parades--and uploading video in real time, via social media,
with little or no consequence to the perpetrators.
*campuses have changed
In the past several years, Jewish students on a large number of
college campuses have been subjected to unprecedented levels of anti-
Jewish sentiment, leading many to feel uncomfortable participating in
Jewish campus life or other campus activities whose participants are
especially hostile to Jewish students.
Jewish students can't table for their organizations at student
events fairs without being physically surrounded and shouted down by
extremist anti-Semitic campus organizations.
They can't bring speakers to school like every other students group
and gender, racial, and ethnic group can, because the speakers will be
heckled into silence.
They're often reluctant to run for student government at some
schools because they've seen the numerous times in just the past few
years that Jewish students have been called out because they are Jews
and often excluded from student government expressly due to their
involvement in Jewish life on campus.
These incidents of hate and intimation are wide-spread and impact
on campuses with large and small Jewish constituencies. They impact on
Jewish support groups like Hillel and Jewish fraternity members of
AEPi.
These problems are too often compounded by University
administrators who have been tolerating a level of harassment and
intimidation of Jewish students that they would never dream of allowing
against other demographic groups, because they know there are no
consequences.
The failure of schools and the Federal Government to protect Jewish
students on campus from harassment has become a long-standing scandal
and one of the most pressing issues in the American Jewish community.
That is why the Simon Wiesenthal Center and every mainstream,
credible Jewish organization in the Nation came together last year to
demand equal protection under the law for Jewish students. And that is
why the U.S. Senate passed our bill unanimously, but unfortunately your
distinguished colleague, Congressman Goodlatte, Chair of the House
Judiciary Committee, has refused to allow the bill to be voted on.
In my home State of California: A rock hurled at a student wearing
a T-shirt saying ``Everybody loves a Jewish boy'' as he passed by an
anti-Israel display; a female Jewish student stalked by anti-Israel
activists and taunted with the words ``slut'' and ``whore,'' and other
Jewish students called ``dirty Jew,'' ``f***ing Jew'' and told to ``go
back to Russia'' and ``burn in Hell''; three Jewish female students
assaulted and injured when a mob of anti-Israel activists stormed
through a pro-Israel event.
These are just a few of the anti-Semitic incidents reported at the
University of California, but they are not unique to that school.
Jewish students on many campuses from coast to coast report severe,
persistent, and pervasive harms at the hands of anti-Israel activists.
The harassment includes physical and verbal assaults, destruction of
property, bullying and intimidation, denigration, discrimination, and
suppression of speech and often takes place regardless of the victim's
personal feelings on Israel. Jewish students report fearing displaying
their Jewish star necklaces, wearing their Jewish sorority or
fraternity letters and walking to Hillel for Sabbath dinner.
The problem had become so severe that at the University of
California, for example, in 2011, then President Mark Yudof,
commissioned a fact-finding team to interview Jewish students on seven
UC campuses in order to objectively assess the campus climate for them.
According to the team's report, Jewish students were indeed
``confronting significant and difficult climate issues as a result of
activities on campus which focused on Israel, its right to exist and
its treatment of Palestinians.'' The team found that on every UC campus
they visited Jewish students ``described an environment in which they
feel isolated and many times harassed and intimidated by students,
faculty, and outsiders.''
As the University of California Board of Regents explained in its
landmark Statement of Principles Against Intolerance, historic
manifestations of anti-Semitism have changed over time and ``expression
of anti-Semitism are more coded and difficult to identify. In
particular, opposition to Zionism often is expressed in ways that are
not simply statements of disagreement over politics and policy, but
also assertions of prejudice and intolerance toward Jewish people and
culture.''
Despite the undeniably hostile environment that many Jewish
students were experiencing at the University of California, complaints
filed under Title VI of the 1964 Civil Rights Act on behalf of Jewish
students on three UC campuses--Irvine, Santa Cruz, and Berkeley--were
unceremoniously dismissed on the same day in August 2013.
And UC's Jewish students are not alone. In the dozen years since
the Department of Education's Office for Civil Rights (OCR) committed
to investigating anti-Semitism under Title VI, OCR has not found a
single civil rights violation in any claim filed on behalf of Jewish
students on college or university campuses.
Bottom line--again, little or no consequences for anti-Semitism on
campus.
islamist attacks
Tragically, some of the most vile and threatening anti-Jewish
rhetoric in 2017 has been delivered from within the American Muslim
community, that itself has suffered an increase in hate crimes in 2016.
From campuses in Tennessee to pulpits in our Nation's most populist
State, California. Such ``sermons'' failed to elicit much protest from
within the Muslim community, nor to the best of our knowledge, have
generated any serious action by authorities--local, State, or Federal--
despite the explicit calls for violence and worse, made against Jews by
such individuals.
is there a role for dhs?
Mr. Chairman, I am aware that the DHS's role in combating domestic
terrorism and anti-Semitism is secondary to that of the DOJ and FBI.
I am also aware that DHS is not in a position to dictate policies
that would hold extremists accountable for their anti-Semitic acts.
Nonetheless, the DHS was born in wake of the brutal lessons wrought
from ashes and agony of 9/11. We learned as a Nation that America had
to move to correct serious flaws in our fundamental approach to
securing our Nation from ever-morphing, multiple threats.
The Simon Wiesenthal Center, through its Digital Terrorism and Hate
Project and Tools for Tolerance law enforcement training is keenly
aware of the continuing important contributions that fusion centers are
playing in ensuring that relevant intelligence and other information,
reaches in a timely fashion, the appropriate agency or agencies
dedicated to keeping the homeland and our citizens safe.
As we look at the growing threats from extremists across the full
spectrum of our society, it is clear that in a world increasingly
dominated by the internet and especially social media, National borders
mean less and less in the transmission of the viruses of hate and
terrorism.
It is our view that local hate crimes units, State homeland
security and relevant Federal agencies must be able to quickly update
expand their understanding of extremist ideologies--from the far right
to the extreme left. This includes identifying the new generation of
extremist leaders overseas and the increasing interaction between U.S.-
based extremists and like-minded individuals and groups beyond our
shores. Looking for who or what motivates or ``trains'' a U.S.-based
``lone wolf'' seeking to target fellow Americans, could often lead to
individuals or groups beyond our borders.
The DHS, through the already-established fusion centers could
provide effective platforms to educate all relevant agencies on the
changing nature of, and threats, from extremist groups.
Mr. Chairman we still await the appointment of a new State
Department Special Envoy on anti-Semitism. Assuming that U.S. Secretary
of State Tillerson finally appoints someone for that task and fully
funds that office, the State Department could produce valuable real-
time updates as well overviews of anti-Semitic activities around the
world that often inspire anti-Semitic activity in the United States.
The Simon Wiesenthal Center and other Jewish NGO's are willing and
able to offer real-time information and perspective, but we need a
serious address. It is our hope that this committee under your guidance
Mr. Chairman, could provide the leadership to make it happen.
additional selected articles on recent anti-semitic incidents on
major u.s. campuses
1. Rutgers (http://www.mycentraljersey.com/story/news/local/2017/
10/26/rutgers-michael-chikindas-anti-semitic/801989001/)
2. Cornell (http://cornellsun.com/2017/10/23/anti-semitic-posters-
appear-on-campus-advertising-apparently-fake-hate-group/)
3. Colorado State (https://collegian.com/2017/10/csu-jewish-
community-marches-against-anti-semitism-incidents-on-campus/)
4. UC Berkeley (http://www.dailycal.org/2017/10/25/editors-note-
regarding-editorial-cartoon-depicting-alan-dershowitz/)
5. University of Houston (https://www.algemeiner.com/2017/09/17/
antisemitic-fliers-found-at-university-of-houston-as-neo-nazis-
continue-college-recruitment-efforts/)
6. Others (http://www.thejewishstar.com/stories/fresh-wave-of-anti-
semitism-hits-campuses,14506)
7 https://www.washingtonpost.com/news/acts-of-faith/wp/2017/04/24/
the-hotbed-of-anti-semitism-isnt-a-foreign-country-but-u-s-
college-campuses-report-says/?utm_term=.68c222c7d8dc
Chairman McCaul. Thank you, Rabbi.
We have about 2 minutes on the clock to vote. So what I
would like to do is go vote. That is why I think the Ranking
Member and I are the only two left here. So we are going to go
vote. There are four votes.
We will come back and then we will hear from Mr. Cohen.
We will stand in recess.
[Recess.]
Chairman McCaul. The committee will come to order.
The Chair now recognizes Mr. Cohen for his testimony.
STATEMENT OF J. RICHARD COHEN, PRESIDENT, SOUTHERN POVERTY LAW
CENTER
Mr. Cohen. Thank you, Chairman McCaul. Thank you, Ranking
Member Thompson and Members of the committee. It is an honor to
be here today.
Charlottesville truly was a wake-up call for our country.
It was a reminder that the oldest form of terrorism our country
has ever known is still with us. It was proof that the white
supremacist movement has been energized by Mr. Trump's
campaign, proof that Mr. Trump's campaign has, ``unearthed some
demons,'' to use Congressman Sanford's words. The marchers'
chant in Charlottesville, ``You will not replace us,'' was an
expression of paranoia over cultural displacement. It reminds
us of what Dylann Roof said when he murdered 9 people in a
Charleston church: ``You are taking over our country.'' The
marchers' chant ``blood and soil.'' Their anti-Semitism reminds
us of one of the darkest chapters in modern history.
In my written testimony, I called the threat associated
with groups like ISIS the most acute ones we face. So I
certainly don't take issue with Director Wray calling it our
main terrorism threat. But I worry that calling the threat from
domestic extremist groups, like those in Charlottesville,
merely a steady one, as Director Wray has called it, may lead
us to underestimate the danger that the current white
supremacist movement poses, not just to our physical safety,
but to the very soul of our Nation. I worry that calling the
domestic extremist threat merely a steady one may lead us, once
again, not to give it the attention it deserves.
That is why I think the joint resolution that this Congress
passed unanimously in September and that the President signed
is so important. The resolution recognizes the growing threat
from racist anti-Semitic and xenophobic hate groups in our
country. It urges the President and his administration to use
all available resources to address that threat, and it calls on
the Attorney General to vigorously prosecute criminal acts from
the radical right and to improve the reporting of hate crimes.
That reporting, I would note, is woefully inadequate. The
FBI's recent report counted approximately 6,000 hate crimes in
2016. Yet the Bureau of Justice Statistics estimates that as
many as a quarter-million hate crimes may be occurring
annually. So clearly, we have a disconnect here.
As you know, the Charlottesville resolution urges various
things, but has no enforceable provisions. That is why it is so
critical that this committee hold oversight hearings in the
very near future to ensure that the President is living up to
the commitments he made when he signed the resolution. I would
also ask this committee to recommend legislation, similar to
that which Senator Durbin has proposed, that would
institutionalize the focus on terrorism from the radical right
within our Federal law enforcement agencies. That threat is the
oldest our country faces.
Charlottesville demonstrates that it is lethal, and it is
likely to be with us long after we hopefully have addressed the
threat of terror from groups like ISIS. It deserves the full
measure of our attention.
Senator Durbin's bill would do many other things, including
preserving funding for the State and Local Anti-Terrorism
program, SLATT, for short, a critical program that has been on
this chopping block.
As I mentioned in my written testimony, my colleagues and I
at the Southern Poverty Law Center are representing Susan Bro,
the mother of Heather Heyer, the young woman who was killed
when a white supremacist drove his car into a crowd of
protesters in Charlottesville. At the funeral of her daughter,
Susan said, ``They tried to kill my child to shut her up. But
guess what, you just magnified her. I would rather have my
child,'' she said, ``but by golly, if I have to give her up, we
are going to make it count.''
I will see Susan next week in Charlottesville, and I look
forward to telling her that this committee is committed to
doing everything in its power to curb the threat of radical
right terrorism in our country and to make Heather's death
count.
Thank you, Mr. Chairman.
[The prepared statement of Mr. Cohen follows:]
Prepared Statement of J. Richard Cohen
November 30, 2017
My name is Richard Cohen. I am an attorney and the president of the
Southern Poverty Law Center (SPLC), a civil rights organization founded
in 1971. For more than three decades, my colleagues and I have been
monitoring, issuing reports about, and training law enforcement
officials on far-right extremist activity in the United States. I have
litigated numerous cases against hate groups and their leaders and am
currently representing the mother of Heather Heyer, the young woman who
was killed in Charlottesville, Virginia, on August 12, 2017. I have
served on the Department of Homeland Security's Countering Violent
Extremism Working Group, am a past recipient of the FBI Director's
Community Leadership Award, and have testified before many
Congressional committees, including this one on July 15, 2015, on
issues relating to domestic terrorism. I am honored to appear before
you today.
My testimony will focus on the threat of domestic terrorism--more
specifically, the threat of terrorism from white supremacist groups and
their adherents. In doing so, I do not mean to minimize other threats
our country faces, including those associated with extremist forms of
Islam or those directed at law enforcement officers.
congress has recently recognized the growing white supremacist threat
and has called on the president to act
When I testified before this committee at its hearing on ``The Rise
of Radicalization: Is the Government Failing to Counter International
and Domestic Terrorism'' in July 2015, I emphasized two points: First,
that the threat of radical-right terrorism in our country is a serious
one; and second, that there had been a bipartisan failure to devote
sufficient resources to address that threat in the aftermath of the
tragic events of September 11, 2001. In the joint resolution passed
unanimously in September after the unprecedented events in
Charlottesville, Congress
acknowledged the ``growing prevalence'' of ``hate groups
that espouse racism, extremism, xenophobia, anti-Semitism, and
white supremacy'';
urged the President and his administration to ``use all
available resources'' to address the threats from such groups;
and
called on the attorney general and other Federal agencies to
vigorously prosecute criminal acts by white supremacists and to
improve the collection and reporting of hate crimes.\1\
---------------------------------------------------------------------------
\1\ S.J. Res 49, 115th Cong. (2017) (enacted).
---------------------------------------------------------------------------
On September 14, the President signed the joint resolution. Now,
the questions are what will the President and his administration do to
fulfill the commitments the President made by signing the resolution
and, just as importantly, what will Congress do to ensure that the
President and his administration live up to those commitments and have
the necessary resources to do so? Before turning to these questions,
however, it will be useful to describe the nature of the threat of
white supremacist violence that the country is facing and the
bipartisan failure in recent years to devote more attention to it.
the white supremacist movement, a domestic terror threat since
reconstruction, has been energized by president trump's campaign
rhetoric
Although the threat of terrorism from extremist forms of Islam may
be the most acute one the country currently faces, the threat from
white supremacists is undoubtedly the most persistent one in our
country's history. Indeed, since the founding of the Ku Klux Klan in
the immediate aftermath of the Civil War, our country has faced
terrorism--including thousands of lynchings--from those determined to
preserve white hegemony. Those who marched in Charlottesville this
summer chanting ``You will not replace us'' and ``Jews will not replace
us'' were motivated by the same goal. Even if some of the new energy in
the white supremacist movement were to dissipate in a few years, the
threat of white supremacist violence is likely to be with us for many
years to come.
Since the start of 2001, the death toll in our country from
terrorism associated with extremist forms of Islam has been far higher
than that from far-right extremism; however, the number of homicidal
incidents actually has been greater from the latter source. In a 2016
study, the National Consortium for the Study of Terrorism and Responses
to Terrorism (START) found that between 1990 and 2014, far-right
domestic extremists were responsible for four times as many
ideologically-based homicidal incidents as extremists associated with
al-Qaeda and related movements.\2\ During the 2005-2014 period, the
ratio was 3-to-1.
---------------------------------------------------------------------------
\2\ Twenty-Five Years of Ideological Homicide Victimization in the
United States of America, Report to the Office of University Programs,
Science and Technology Directorate, U.S. Department of Homeland
Security, March 2016, at http://www.start.umd.edu/pubs/
START_CSTAB_ECDB_25YearsofIdeologicalHomicideVictimizationUS_March2016.p
df.
---------------------------------------------------------------------------
This past February, START reported that, from 1990 to 2016, if the
two deadliest terrorist incidents--the Oklahoma City bombing and the 9/
11 attacks--are removed from the count, far-right extremists have
killed more than twice as many people in the United States as have
Islamist extremists (272 versus 130). Using the same criteria, START
found that far-right extremists killed 57 law enforcement officers
during the same approximate period, compared to 7 killed by Islamist
extremists.\3\ A General Accountability Office study released in April
reached similar conclusions.\4\
---------------------------------------------------------------------------
\3\ Parkin, William S., and Jeff Gruenewald, Brent Klein, Joshua D.
Freilich, Steven Chermak. 2017. ``Islamist and Far-Right Homicides:
Infographic,'' National Consortium for the Study of Terrorism and
Responses to Terrorism, at http://www.start.umd.edu/pubs/
START_ECDB_IslamistFarRightHomicidesUS_Infographic_Feb2017.pdf.
\4\ Countering Violent Extremism: Actions Needed to Define Strategy
and Assess Progress of Federal Efforts, Government Accountability
Office, April 2017, at http://www.gao.gov/assets/690/683984.pdf.
---------------------------------------------------------------------------
Since the turn of the century, we have documented an increase in
the number of hate groups--the majority of which have white supremacist
beliefs or leanings.\5\ In our view, the most important factor driving
the increase has been a backlash to our country's changing
demographics. For many on the radical right, President Obama--our
Nation's first president of color--represented the kind of ``change''
they feared.\6\ The day after President Obama was first elected, for
example, Stormfront--a popular neo-Nazi web forum whose members have
been responsible for many deadly attacks \7\--reported that it was
getting six times its normal traffic. ``There are a lot of angry white
people out there looking for answers,'' added the Stormfront publisher,
a former Klansman.\8\
---------------------------------------------------------------------------
\5\ The SPLC identified 917 hate groups in 2016, up from the 457
groups documented in 1999. Out of those in 2016, 471 groups subscribed
to white supremacist ideologies. Mark Potok, ``The Year in Hate and
Extremism,'' Intelligence Report, Spring 2017, at splcenter.org/
fighting-hate/intelligence-report/2017/year-hate-and-extremism;
``Active Hate Groups,'' Intelligence Report, Spring 2017, at
splcenter.org/fighting-hate/intelligence-report/2017/active-hate-
groups-2016.
\6\ In addition to the growth in hate groups, President Obama's
election coincided with the resurgence of a far-right anti-Government
movement that produced numerous acts and plots of domestic terrorism
targeting Federal officials and facilities in the 1990's. In 1996, we
counted 858 conspiracy-minded anti-Government groups; in 2008, 149. But
by 2012, we counted 1,360 such groups, an increase of more than 800
percent.
\7\ Heidi Beirich, White Homicide Worldwide, Southern Poverty Law
Center, March 2014, at https://www.splcenter.org/20140401/white-
homicide-worldwide.
\8\ Stormfront website, at https://www.stormfront.org/forum/
t521647/.
---------------------------------------------------------------------------
During the last 2 years--a period that coincided with the
Presidential campaign--we documented a surge in the number of hate
groups.\9\ The growth in the number of hardline anti-Muslim groups last
year was particularly dramatic, a near-tripling.\10\ At the same time,
hate crimes targeting Muslims have doubled over the last 2 years,
according to the FBI.\11\ As former President George W. Bush noted
during a speech last month, ``bigotry seems emboldened.''\12\
---------------------------------------------------------------------------
\9\ ``Hate Groups Increase for Second Consecutive Year as Trump
Electrifies Radical Right,'' Southern Poverty Law Center, Feb. 15,
2017, https://www.splcenter.org/news/2017/02/15/hate-groups-increase-
second-consecutive-year-trump-electrifies-radical-right.
\10\ Mark Potok, ``The Year in Hate and Extremism,'' Intelligence
Report, Southern Poverty Law Center, Feb. 15, 2017, at https://
www.splcenter.org/fighting-hate/intelligence-report/2017/year-hate-and-
extremism.
\11\ ``2015 Hate Crime Statistics,'' FBI, at https://ucr.fbi.gov/
hate-crime/2015/topic-pages/incidentsandoffenses_final.pdf; ``2016 Hate
Crime Statistics,'' FBI, at https://ucr.fbi.gov/hate-crime/2016/topic-
pages/incidentsandoffenses.
\12\ Rebecca Savransky, ``George W. Bush: `Bigotry seems emboldened
in U.S.','' The Hill, Oct. 19, 2017, at http://thehill.com/homenews/
news/356212-george-w-bush-bigotry-seems-emboldened-in-us.
---------------------------------------------------------------------------
Although the growth in hate groups began before President Obama
took office, his election did coincide with another phenomenon: The
dramatic resurgence of a far-right, anti-Government movement that has
been responsible for numerous terrorist attacks and plots. Many of the
beliefs prevalent in this movement are rooted in the racist, anti-
Semitic ideology that animated the Posse Comitatus (Latin for ``power
of the county'') in the 1970's. Oklahoma City bomber Timothy McVeigh,
for example, held both white supremacist and radical, anti-Government
beliefs. For a number of reasons, including law enforcement crackdowns,
the movement declined significantly after the 1995 Oklahoma City
bombing, only to re-emerge during the Obama administration. Although
the number of groups has once again fallen, the movement remains a
threat. On the same day that Heather Heyer was killed in
Charlottesville, the FBI arrested a man in Oklahoma City who was
attempting to detonate what he believed to be a 1,000-pound truck bomb
outside a bank building.\13\ The suspect reportedly was attempting to
replicate McVeigh's bombing of the Alfred P. Murrah Federal
Building.\14\
---------------------------------------------------------------------------
\13\ ``Man Arrested for Trying to Detonate What He Thought was a
Vehicle Bomb at Downtown Oklahoma City Bank,'' Department of Justice
press release, Aug. 14, 2017, at https://www.justice.gov/usao-wdok/pr/
man-arrested-trying-detonate-what-he-thought-was-vehicle-bomb-downtown-
oklahoma-city.
\14\ Manny Fernandez, ``Bombing Plot in Oklahoma City is Thwarted
with Arrest, F.B.I. Says,'' The New York Times, Aug. 14, 2017, at
https://www.nytimes.com/2017/08/14/us/oklahoma-van-bomb-domestic-
terrorism.html?_r=0.
---------------------------------------------------------------------------
President Trump's campaign energized the white supremacist
movement--``unearthed some demons,'' to borrow Representative Mark
Sanford's words.\15\ Although white supremacists typically eschew the
political process, seeing both parties as irredeemably corrupt, they
took the unusual step of rallying around Mr. Trump's candidacy and
celebrating his victory. On his radio show in February 2016, for
example, former Klan chief David Duke told his listeners that ``voting
against Donald Trump . . . is really treason to your heritage.''\16\ On
election night, he tweeted that ``our people played a HUGE role in
electing Trump!''\17\ During a gathering of white nationalists just
blocks from the White House shortly after the election, white
nationalist leader Richard Spencer--who later played a prominent role
in the Charlottesville demonstrations--prompted sieg heils from
audience members after quoting Nazi propaganda in German. He responded
by shouting, ``Hail Trump! Hail our people! Hail victory!''\18\
---------------------------------------------------------------------------
\15\ Karen Tumulty and Robert Costa, ``The GOP Inherits What Trump
has Wrought'', The Washington Post, May 26, 2017, https://
www.washingtonpost.com/politics/the-gop-inherits-what-trump-has-
wrought/2017/05/26/4e1943ea-4177-11e7-adba-394ee67a7582_story.-
html?utm_term=.bc5a926d86fa.
\16\ ``David Duke Says a Vote against Trump is Treason to White
Heritage,'' Hatewatch, Feb. 26, 2016, https://www.splcenter.org/
hatewatch/2016/02/26/david-duke-says-vote-against-trump-treason-white-
heritage.
\17\ David Duke (@DrDavidDuke), Twitter (Nov. 9, 2016, 2:14 AM),
https://twitter.com/drdavidduke/status/796249464826687488?lang=en.
\18\ Joseph Goldstein, ``Alt-Right Gathering Exults in Trump
Election with Nazi-Era Salute,'' The New York Times, Nov. 20, 2016,
https://www.nytimes.com/2016/11/21/us/alt-right-salutes-donald-
trump.html?_r=0.
---------------------------------------------------------------------------
In the 10 days following the election, we documented nearly 900
bias-related acts of harassment, intimidation, and violence.\19\ Many
of the perpetrators invoked the President-elect's name or his slogans.
Cf. supra note 15 (quoting Rep. Sanford) (``I've talked to a number of
people about it back home. They say, `Well, look, if the President can
say whatever, why can't I say whatever?' He's given them license.'').
During the Charlottesville demonstrations, David Duke stated, ``We are
determined to take our country back. We are going to fulfill the
promises of Donald Trump.''\20\
---------------------------------------------------------------------------
\19\ Ten Days After: Harassment and Intimidation in the Aftermath
of the Election, Southern Poverty Law Center, Nov. 29, 2016, https://
www.splcenter.org/20161129/ten-days-after-harassment-and-intimidation-
aftermath-election.
\20\ Libby Nelson, `` `Why we voted for Donald Trump': David Duke
explains the white supremacist Charlottesville protests,'' Vox, Aug.
12, 2017, https://www.vox.com/2017/8/12/16138358/charlottesville-
protests-david-duke-kkk.
---------------------------------------------------------------------------
The violence in Charlottesville was not, by any means, the only
example of deadly white supremacist violence this year.\21\ Over the
Memorial Day weekend, for example, a white supremacist stabbed two men
to death on a Portland, Oregon, train after the men attempted to help
two women who were the targets of the perpetrator's anti-Muslim
slurs.\22\ The previous weekend, a white University of Maryland
student--a member of a racist Facebook group called Alt-Reich Nation--
was arrested for stabbing to death a black ROTC student attending Bowie
State University.\23\ In March, a white man from Baltimore fatally
stabbed a black man with a sword in New York City after traveling there
specifically with the intention of killing a black man.\24\ In
February, a white man in Kansas went to a bar and shot two men from
India, one fatally, after reportedly telling them to ``get out of my
country.''\25\
---------------------------------------------------------------------------
\21\ For a synopsis of radical-right terrorist plots, conspiracies,
and racist rampages, see Terror from the Right, Southern Poverty Law
Center, at https://www.splcenter.org/20100126/terror-right.
\22\ Jim Ryan, ``2 killed in stabbing on MAX train in Northeast
Portland as man directs slurs at Muslim women, police say,'' The
Oregonian, May 27, 2017, at http://www.oregonlive.com/portland/
index.ssf/2017/05/police_responding_to_ne_portla.html.
\23\ Colin Campbell and Tim Prudente, ``Suspect in University of
Maryland fatal stabbing held without bail, students say school must
address racial tensions,'' The Baltimore Sun, May 22, 2017, at http://
www.baltimoresun.com/news/maryland/crime/bs-md-college-park-monday-
20170522-story.html.
\24\ Ashley Southall, ``Suspect in Manhattan Killing Hated Black
Men,'' The New York Times, March 22, 2017, at https://www.nytimes.com/
2017/03/22/nyregion/manhattan-nyc-james-harris-jackson-hate-crime.html.
\25\ Tony Rizzo, Toriana Porter, Laura Bauer, Matt Campbell, Ian
Cummings, and Judy L. Thomas, ``First-degree murder charge filed in
possible hate crime shooting at Olathe's Austins bar,'' The Kansas City
Star, Feb. 23, 2017, at http://www.kansascity.com/news/local/crime/
article134459444.html.
---------------------------------------------------------------------------
Looking ahead, we agree with the recent DHS/FBI assessment that the
country will continue to see lethal attacks from white
supremacists.\26\ Indeed, we think it's likely that the level of
violence may increase in the near term. There is currently an
extraordinarily high level of energy in the white supremacist movement.
If the political process does not yield the results that those in the
movement expect--and we fervently hope that it does not--some may leave
the movement. But others may resort to extra-legal means to pursue
their objectives or to vent their frustrations.
---------------------------------------------------------------------------
\26\ Joint Intelligence Bulletin: White Supremacist Extremism Poses
Persistent Threat of Lethal Violence, Federal Bureau of Investigation
and Department of Homeland Security, May 2017, at https://
www.documentcloud.org/documents/3924852-White-Supremacist-Extremism-
JIB.html.
---------------------------------------------------------------------------
In the long run, the underlying dynamics that have led to the
current state of the white supremacist movement are not likely to
change. As our country continues to grow more racially and ethnically
diverse, we are likely to see a backlash from those who wish to
preserve white hegemony. And, although we commonly refer to the white
supremacist movement as a domestic one, it is not confined to the
United States. The reality today is that the white supremacist movement
is roiling democracies across the Western world.\27\
---------------------------------------------------------------------------
\27\ Morris Dees and J. Richard Cohen, ``White Supremacists Without
Borders,'' The New York Times, June 22, 2015, at https://
www.nytimes.com/2015/06/22/opinion/white-supremacists-without-
borders.html.
---------------------------------------------------------------------------
there has been a bipartisan failure to devote sufficient resources to
the threat of domestic terrorism
After the deadly Oklahoma City bombing on April 19, 1995, then-
Attorney General Reno formed a special task force, the Domestic
Terrorism Executive Committee, to coordinate the country's response to
the threat of domestic terrorism. The task force was scheduled to hold
one of its monthly meetings on September 11, 2001, but did not do so
for obvious reasons. But the task force did not miss just one meeting.
As the country's focus shifted to the new threat, the task force did
not meet again for 13 years. Only after a white supremacist killed
three people in Overland Park, Kansas, in 2014 did the attorney general
reconvene it.
Like the Justice Department, DHS cut resources devoted to
countering the threat of domestic terrorism after 9/11. In April 2009,
the DHS released an Unclassified intelligence assessment to law
enforcement officials entitled Right-wing Extremism: Current Economic
and Political Climate Fueling Resurgence in Radicalization and
Recruitment.\28\ Yet, despite the report's accuracy, then-DHS Secretary
Janet Napolitano withdrew it following an outcry by those who claimed,
falsely, that the report tarred conservatives as potential domestic
terrorists. More significantly, the DHS unit responsible for the report
was allowed to wither. In the wake of the controversy over the report,
The Washington Post reported that DHS ``cut the number of personnel
studying domestic terrorism unrelated to Islam, canceled numerous State
and local law enforcement briefings, and held up dissemination of
nearly a dozen reports on extremist groups.''\29\
---------------------------------------------------------------------------
\28\ PDF on Southern Poverty Law Center website, at http://
www.splcenter.org/sites/default/files/downloads/resource/
DOJ_rwextremism2009.pdf.
\29\ ``Homeland Security Department Curtails Home-Grown Terror
Analysis,'' The Washington Post, June 7, 2011, at http://
www.washingtonpost.com/politics/homeland-security-department-curtails-
home-grown-terror-analysis/2011/06/02/AGQEaDLH_story.html.
---------------------------------------------------------------------------
In 2010, the year after the DHS Right-wing Extremism report was
withdrawn, I was asked to serve on Secretary Napolitano's Countering
Violent Extremism Working Group.\30\ At my request, one of my
colleagues, a Federally-certified law enforcement trainer, was invited
to serve as a subject-matter expert for the Advisory Council. Neither
of us had success in getting the group to focus on the threat of
terrorism from the radical right.
---------------------------------------------------------------------------
\30\ Countering Violent Extremism Working Group, Homeland Security
Advisory Committee, Spring 2010, at https://www.dhs.gov/xlibrary/
assets/hsac_cve_working_group_recommen- dations.pdf.
---------------------------------------------------------------------------
In February 2015, when President Obama addressed the White House
Summit on Countering Violent Extremism, the first terrorist incident he
mentioned was the Oklahoma City bombing. But the discussion at the
summit itself focused almost exclusively on the threat associated with
extremist forms of Islam. Similarly--just 2 weeks after the 2015
Charleston massacre--this committee released a Terror Threat Snapshot
that contained no mention of Charleston or the threat of terror from
the radical right.\31\
---------------------------------------------------------------------------
\31\ http://homeland.house.gov/sites/homeland.house.gov/files/
documents/July%20Terror%20- Threat%20Snapshot%20_0.pdf.
---------------------------------------------------------------------------
The Trump administration also appears to have minimized the threat
from the radical right at various times. A few days before the events
in Charlottesville in August, for example, Sebastian Gorka, then a top
terrorism adviser to President Trump, ridiculed the notion of lone-wolf
terrorists and suggested that white supremacists are not ``the
problem.''\32\ A month before Charlottesville, DHS canceled a number of
grants, including one to an organization called Life After Hate, whose
mission is to rehabilitate former neo-Nazis and other domestic
extremists.\33\
---------------------------------------------------------------------------
\32\ Judd Legum, ``White House adviser says people should stop
criticizing white supremacists so much,'' ThinkProgress, Aug. 10, 2017,
at https://thinkprogress.org/white-house-adviser-says-people-should-
stop-criticizing-white-supremacists-so-much-ddd587767d60/.
\33\ Jennifer Hansler, ``DHS shifts focus of funding to counter
violent extremism,'' CNN, July 4, 2017, at http://www.cnn.com/2017/07/
01/politics/cve-funding-changes/index.html; Jessica Schulberg,
``Controversial Trump Aide Katharine Gorka Helped End Funding for Group
That Fights White Supremacy,'' HuffPost, Aug. 15, 2017, at https://
www.huffingtonpost.com/entry/katharine-gorka-life-after-hate-us-
59921356e4b09096429943b6.
---------------------------------------------------------------------------
Another program being slashed--even as the FBI and DHS are warning
about further white supremacists violence--is the State and Local Anti-
Terrorism Training program. Bob Paudert, a former police chief in West
Memphis, Arkansas, whose son and another officer were killed by far-
right extremists during a routine traffic stop in 2010, called it ``one
of the best training programs in the country.''\34\
---------------------------------------------------------------------------
\34\ Judy L. Thomas, ``As domestic terrorism like Charlottesville
rises, Federal program to fight it shuts down,'' The Kansas City Star,
Aug. 20, 2017, at http://www.kansascity.com/news/politics-government/
article168110172.html.
---------------------------------------------------------------------------
We applaud Attorney General Sessions for speaking out forcefully
and promising vigorous prosecutions after Charlottesville. Well before
the passage of the post-Charlottesville joint resolution, he had formed
a task force to examine ways to improve hate crime reporting.\35\ (The
Bureau of Justice Statistics estimates that there are as many as
250,000 hate crimes in our country each year.\36\ Yet, in its 2016
report, the FBI counted just 6,121 hate crimes.\37\) We also appreciate
Kirstjen Nielsen's unequivocal condemnation of white supremacy, anti-
Semitism, and Islamophobia at the recent hearing on her nomination to
serve as the next DHS Secretary.
---------------------------------------------------------------------------
\35\ U.S. Department of Justice announcement, at https://
www.justice.gov/crt/hate-crimes-subcommittee.
\36\ Lynn Langton, ``Hate Crime Victimization, 2004-2015,'' Bureau
of Justice Statistics, Office of Justice Programs, U.S. Department of
Justice, June 29, 2017, at https://www.bjs.gov/
index.cfm?ty=pbdetail&iid=5967.
\37\ ``2016 Hate Crime Statistics,'' FBI, at https://ucr.fbi.gov/
hate-crime/2016/topic-pages/incidentsandoffenses.
---------------------------------------------------------------------------
the president and his administration must fulfill their commitments
under the charlottesville joint resolution; congress has
responsibilities as well
The Charlottesville joint resolution is important because it
recognizes that the threat of white supremacist terrorism is grave and
calls on the President to address it. Although the resolution was
passed unanimously and signed by the President, it is nevertheless a
``soft'' law, because it has no enforceable provisions. Thus, it is
incumbent on Congress to ensure that the President and his
administration live up to their commitments.
In March 2018--6 months after passage of the Charlottesville
resolution--this committee should exercise its oversight responsibility
by holding a hearing to ensure that the President and administration
are following through on their various commitments under the
resolution. We would urge particular attention to their commitment to
``use all resources available . . . to address the growing prevalence
of . . . hate groups in the United States.''\38\ One aspect of the
resolution, a directive to improve the collection and reporting of hate
crime data, could be the subject of an earlier hearing, given that Mr.
Sessions' hate crimes task force report is expected in January.\39\
---------------------------------------------------------------------------
\38\ See supra note 1.
\39\ ``Attorney General Jeff Sessions' Statement on the FBI's 2016
Hate Crimes Statistics,'' Department of Justice press release, Nov. 13,
2017, at https://www.justice.gov/opa/pr/attorney-general-jeff-sessions-
statement-fbis-2016-hate-crimes-statistics.
---------------------------------------------------------------------------
In addition to exercising its oversight responsibility, there are
many other ways in which Congress can and should address the threat of
domestic terrorism from the radical right. Given that the white
supremacist movement has represented a deadly threat for more than 150
years and the likelihood that it will continue to do so into the
foreseeable future, Congress should institutionalize the focus on the
threat of this form of terrorism within Federal law enforcement
agencies so it will always be given the attention it deserves. The
Domestic Terrorism Prevention Act, which has been introduced by Senator
Durbin, would provide a mechanism for accomplishing this by requiring
DHS, the Justice Department, and the FBI to establish offices to
analyze and monitor domestic extremist threats.
Among the Act's provisions is a requirement that the Justice
Department, the DHS and the FBI jointly provide an annual assessment of
the threat so that Congress can provide the oversight needed. The Act
also ensures the continued operation of the State and Local Anti-
Terrorism Training program, which provides critical training and
resources to assist local, State, and Tribal law enforcement agencies
in detecting and investigating domestic terrorism. These resources also
help law enforcement identify, investigate, and respond to hate crimes.
Mike Sena, president of the National Fusion Center Association, has
called the Trump administration's elimination of this program ``an
egregious error.''\40\
---------------------------------------------------------------------------
\40\ Judy L. Thomas, ``As domestic terrorism like Charlottesville
rises, Federal program to fight it shuts down,'' The Kansas City Star,
Aug. 20, 2017, at http://www.kansascity.com/news/politics-government/
article168110172.html.
---------------------------------------------------------------------------
In its Charlottesville joint resolution, Congress spoke out clearly
and unequivocally in condemning ``white nationalism, white supremacy,
and neo-Nazism as hateful expressions of intolerance that are
contradictory to the values that define the people of the United
States'' and called on the President to do so as well.\41\ It is
vitally important that Members of Congress and other political leaders
continue to speak out against racism and other forms of extremism that
lead to terrorism and hate crimes. The President, in particular, must
forcefully reject the white supremacist movement, as is his obligation
under the joint resolution. There is no room for confusion or
equivocation.
---------------------------------------------------------------------------
\41\ See supra note 1.
---------------------------------------------------------------------------
It is also critically important that our commitment to and
enforcement of our Nation's civil rights laws mirror our commitment to
fighting domestic terrorism. While we appreciate Mr. Sessions' focus on
hate crimes, we would note the anomalies evident in the
administration's actions. The administration commits to vigorous hate
crime enforcement, even as it cuts funding for civil rights
enforcement.\42\ Mr. Sessions promises a focus on hate crimes against
the transgender community, even as the Justice Department withdraws
protections for transgender children in public schools.\43\ Mr.
Sessions emphasizes the prosecution of those who burn mosques,\44\ yet
the administration vilifies Muslims through its attempts to bar them
from entering the country.
---------------------------------------------------------------------------
\42\ Juliet Eilperin, Emma Brown, and Darryl Fears, ``Trump
administration plans to minimize civil rights efforts in agencies,''
The Washington Post, May 29, 2017, at https://www.washingtonpost.com/
politics/trump-administration-plans-to-minimize-civil-rights-efforts-
in-agencies/2017/05/29/922fc1b2-39a7-11e7-a058-
ddbb23c75d82_story.html?utm_term=.5bad- 24f61736.
\43\ Ariane de Vogue, Mary Kay Mallonee, and Emanuella Grinberg,
``Trump administration withdraws Federal protections for transgender
students,'' CNN, Feb. 23, 2017, at http://www.cnn.com/2017/02/22/
politics/doj-withdraws-Federal-protections-on-transgender-bathrooms-in-
schools/index.html.
\44\ Beth Reinhard, ``Jeff Sessions Pledges Support for Hate-Crime
Laws,'' The Wall Street Journal, June 29, 2017, at https://www.wsj.com/
articles/jeff-sessions-pledges-support-of-hate-crime-laws-1498773053.
---------------------------------------------------------------------------
On April 23, 1990, when President George H.W. Bush signed the
Federal Hate Crimes Statistics Act, he linked the elimination of hate
crimes to the ``guarantee of civil rights for all Americans,'' saying
that the latter was ``one of the greatest obligations'' of his
administration and the Justice Department. Combating domestic terrorism
based on hate is just as important to the goal of protecting the civil
rights of all Americans. Violence perpetrated against vulnerable
populations based on factors such as race, ethnicity, religion, or
sexual orientation rips apart the very fabric of our country, dividing
us along our most fragile lines. As President Bush said that day,
``hate breeds violence, threatening the security of our entire
society.''
Today, the white supremacist movement is as energized and
emboldened as it has been in decades--and we are seeing increased
violence against vulnerable populations as a result. We must speak out
strongly, and we must act decisively.
There should be no question about where any of our elected leaders
stand.
Thank you.
Chairman McCaul. Thank you, Mr. Cohen. I think this is a
very important hearing. I think we have seen it before with Tim
McVeigh.
Rabbi, thank you for pointing out my father's sort-of, as I
view, his legacy of 32 bombing missions over the Nazis. For the
life of me, I don't understand this mindset of hatred and
revival of the Nazi spirit that I thought we crushed in World
War II.
I was recently in Auschwitz, 6 months ago, to see the pure
evil that was perpetrated by the Nazis that my father and his
generation fought to defeat. So when I see skinheads and neo-
Nazis and white supremacists assemble, not only am I sort of
just confounded as to how this could happen, but I just find it
completely immoral and unacceptable for this Nation.
My grandfather was also persecuted by the Klan because he
was Catholic. So hatred in all forms, whether it be radical
Islamist ideology or this type of hatred, cannot stand in this
country. We need to unite, I think, as a Nation. So I want to
thank all three of you for your testimony.
First, I want to ask Chief Rausch. I mean, you had what
could have been a similar Charlottesville on your hands. You
had 3,000 people show up to protest a Confederate monument in
Fort Sanders, Tennessee. Clearly, it is foreseeable that both
of these factions are going to come together. You are going to
have a lot of heat and emotion and the potential for great
violence. Yet over a period of a 2\1/2\-hour rally, we saw no
violence.
I think what you did is a model of leadership for how law
enforcement, perhaps working with State law enforcement, can
successfully prevent this kind of violence in the future. I
just wanted you to comment on what you did that may have been
different from Charlottesville that maybe law enforcement
officers across the country can learn when this situation
enters into their hometowns.
Chief Rausch. Thank you, Mr. Chairman. First and foremost,
I think we learned from watching what happened in other
locations, and so we literally took the game tape from
Charlottesville, from Boston, and from Durham, North Carolina,
and sat down and went through it and talked about those things
that were right and the things that were wrong. We then
strategized on how we address that with what we had coming at
us.
So some of the things we saw that were right: Boston, their
mayor and their chief did a great job of getting out in front
and putting out the rules of what they would allow. They made a
press release on Thursday before the Saturday rally and said
these are the things that will be allowed at this rally.
Now, in our assessment, they didn't go far enough. They had
some violence still at that--not as much, but they had some
violence at that rally. So we looked at all of that to
determine how we would do ours.
So first and foremost was getting the information out
through the media, to the public, and to these groups that were
converging of what would be allowed.
Second was taking complete control of the area that they
were going to be in. We took control of that early on. So one
of the things that we had heard from Charlottesville was, you
know, they had some challenge with the areas they were showing
up, that they didn't have control of. So we went in and took
complete control and we cordoned off the area. You know, the
vehicle threat was real, and so we took care of that by
utilizing our public service, putting dump trucks at every
vehicle access point to keep those types of vehicle-borne
attacks from being able to take place.
A lot of coordination and control. The coordination with
our State partners, with our local and Federal partners as
well, on looking at intelligence information of these groups,
what they were planning, what they were saying to each other
early on was important.
Some of the other things was putting the rules in place.
You know, we said there would be--you know, none of the things
that we saw that caused the problems. So no sticks, no rocks,
no bricks, no bottles, no firearms. All of that--no masks,
nothing to cover yourself to keep yourself, your identity from
being known. All of that was important that we put that in
place immediately so that people knew these are the rules.
We learned that a lot of the supremacists, the white
supremacists didn't show up because of the rules. They didn't
want to follow those rules so they didn't come, which was OK
for our community. So I think the success was a result of that,
and then a well-executed plan by our team. They did a great job
of making sure that we had everyone safe, and we kept control
of the area. It was just a well-executed plan.
Chairman McCaul. Well, let me commend you for that. I think
it is a textbook model of how to do it right. I hope other
police departments will learn from the good things that you
did. I mean, I think it is a great model.
Rabbi, I am a student of counterterrorism. I was a
counterterrorism Federal prosecutor. I remember Ramzi Yousef.
His first target was not the World Trade Center. It was 12
Jewish synagogues symbolizing the 12 tribes of Israel. Pretty
chilling. He did not--he decided to change that plan and go
after the greatest symbol of financial might in New York, and
that is the World Trade Center. When he almost successfully
brought the Twin Towers down, of course, he came--his uncle
Khalid Sheikh Mohammed came back and finished it.
Rabbi Cooper. Finished the job.
Chairman McCaul. Sadly. I know your community suffered
greatly, and this whole country did, and that is why this
committee was formed in the first place.
But the Jewish community centers have been under threats
constantly. I am proud to say that this committee, working with
the Ranking Member, doubled the authorization amount from
fiscal year 2017 for $50 million; a 100 percent increase over
the fiscal year 2017, also to what are called non-UASI
jurisdiction. So I hope that is a step in the right direction
for you. We, I think, made great progress on that.
But I would like for you to describe the threats that you
are seeing currently to the centers and synagogues in this
country right now.
Rabbi Cooper. Well, first of all, I think this is an
appropriate time for the community to say thank you. Obviously,
it is passed by law. There are appropriations. There are
hearings. But I think for the Jewish community, especially for
younger families who never experienced it before, it is
traumatic, it is long-lasting, like any hate crime. It has both
the personal and the communal impact. It may be difficult for
our non-Jewish neighbors to understand.
As I mentioned in my testimony, that it has been three
decades since Jewish kids would be dropped off at a school
where there wasn't an armed guard. On a regular Saturday
morning--I pray in a relatively modest-size synagogue on Pico
Boulevard in Los Angeles. We were actually targeted by a
radicalized Islamist terrorist from California prisons for an
attack that, thank God, was interdicted before it took place.
So, you know, the mindset for Jewish community leaders,
JCCs, schools, temples, and synagogues is to do your best with
perimeter defense and to always have in mind--I was listening
carefully about, you know, the Friday night football game, and
especially if it is going to be a playoff, and there is this
tremendous energy. Our security has to be in place 52 weeks a
year. That, in a society--here we are in the Capital of our
Nation that is based--one of our basic freedoms is freedom of
religion.
As I mentioned in my testimony, this is not paranoia. It is
just reality. I know there is a lot of give-and-take, important
discussions here about what is a greater threat, from ISIS or
is it from the Nazi-like types. Unfortunately, we have to
grapple with both of them. We rely very heavily on local law
enforcement, the anti-crime, the anti-hate, and terrorist
units.
I think maybe the most important point I would like to
sort-of bring back to the one committee that actually still has
it, we really need bipartisanship moving forward if we are
fighting hate in America to have some sort of, you know, what
is a greater threat and to whom? I think we need to quantify
what the threats are, but we have to move forward together as
Americans to confront the bigots, the racists, or the
terrorists. Otherwise, they win and we lose.
If you look at Charlottesville, the Nazis came that night
or whatever--you know, the groups came. They had a game plan.
They weren't worried about the law. They knew what they were
going to do on the internet. They even had a way to place
themselves, in their own minds, as victims that night. Did you
know that they complained that they were actually pushed by law
enforcement into the antifa and that is how the whole violence
began?
So when I look at that horrific piece of theater that was
so incredibly effective for them, that was the group that did
their own planning. They understand the rules of the game. They
knew what they wanted to violate. We live in a day in which,
because of the internet, everything local is global and
everything global is local.
As a result, whether it is something in the Middle East or
the horrific events that took place on the bicycle path in New
York, when those things take place, every single security
officer of every Jewish institution across the United States
has an immediate conversation with the Rabbi, with the
executive director. These are concerns that are not far removed
from us on a daily basis.
Chairman McCaul. Thank you, Rabbi.
The Chair recognizes the Ranking Member.
Mr. Thompson. Thank you very much, Mr. Chairman. Welcome to
our panel of witnesses for this hearing.
Mr. Cohen, can you give the Southern Poverty Law Center's
experience with domestic terrorist organizations here in the
United States, whether you see a proliferation of that ideology
or organization, and to what extent, what region of the country
is it peculiar to, if so?
Mr. Cohen. Thank you for the question. To answer the last
part first, there is no region of our country that is not
affected by hate groups. None. That is quite unfortunate. Over
the last 15, 20 years, we have seen an increase in the number
of hate groups driven, we think, primarily by the country's
changing demographics. There is a backlash to it. You saw it
during President Obama's administration where he represented
the kind of change that some people were scared of. It preceded
him, but was intensified during his period of time.
After 9/11, unfortunately, I think we saw in the country a
retreat from a focus on the threat of traditional forms of
domestic terrorism, partly for an understandable reason: The
horror and carnage of 9/11. But I think the pendulum had swung
too far. You know, hopefully, after Charlottesville, which I
think is a wake-up call, you know, the pendulum will begin to
swing back where we can take that form of threat more
seriously.
Mr. Thompson. Thank you very much.
The other two witnesses talked a little bit about social
media and how that has become the weapon of choice, if you
please, for a lot of these hate groups. Chief, can you give us
your experience about this or your organizational experience?
Chief Rausch. Absolutely. Social media has become the
platform. It has intensified the voice of hate. It has become
the location that has basically made hate a megaphone to the
rest of the world. It is a place where, as the earlier panel
had mentioned, it is where people are being radicalized. As the
video that you showed earlier shows, that is the type of
information that is being shared widely with individuals
throughout the country.
Before, you would have to be, as you mentioned, in an area
that may have a large group of these types of individuals. Now,
it is wide open. Our experience is that they are constantly
bombarding individuals with those types of videos and trying to
normalize that mindset and that behavior.
Mr. Thompson. Rabbi, what has been your experience?
Rabbi Cooper. Thank you, Congressman. I am here with my
colleague, Rick Eaton, who I consider one of the world's great
experts on this issue. We put on an annual report that gives a
snapshot. It is called Digital Terrorism and Hate. That is the
project. Included over the last few years have been report
cards, so we named names. For a number of years, Twitter would
get an across-the-board F for doing nothing. Facebook has
generally done a lot more than others, but they are grappling
with 1.5 billion separate pages.
We have always felt, and continue to be convinced, that an
important component of fighting this virus has to be Silicon
Valley, the individual companies. They cannot and should not
hide behind the First Amendment. They are in business. They are
doing very nicely, thank you. I think increasingly, they
recognize or have recognized some of their responsibilities,
but they can do, in their way, a whole lot more than the
combined membership of the U.S. House, Senate, and the
Executive branch. They are very powerful. They have
collectively created the most powerful marketing tool ever.
While after 9/11 we were extremely worried that our far
right here would be mimicking the Islamists, well, it turns out
that al-Qaeda and ISIS actually landed up mimicking our
extremists when it came to the lone wolf. That was a U.S. idea,
then was brought over to Yemen, and we know the results. But
the internet empowers and validates the individuals, the
conspiracies, et cetera.
It is not so much at this point passing new laws. We have
to really insist that our partners here, the collective genius
that is giving us all these bells and whistles and social media
and beyond, they have to be directly involved in degrading the
marketing capabilities of the bigots, both local, National, and
globally.
Mr. Thompson. Thank you.
Mr. Cohen, what has been your experience with those
individuals and organizations and their use of social media?
Mr. Cohen. Well, not surprisingly, you know, the hate
exists now on the net. In 2008, when President Obama was
elected, there were about 140,000 registered users on
Stormfront, one of the oldest neo-Nazi websites. Today, there
are over 330,000 registered users. It gives you some sense of
kind-of the growth of it.
I would echo what Rabbi Cooper said about kind-of the
digital platforms in the Silicon Valley. They are private
businesses. They can do what they want. But all of them say in
their terms of service that they are not going to allow hate.
Sometimes they say that as merely a public relations ploy?
Right. So we try to get them to live up to their terms of
service, sometimes by embarrassing them publicly. PayPal, for
example, was very slow to live up to its terms of service, but
after Charlottesville, when they got some bad press, they did.
So, you know, we think it is important to recognize that
hate is growing on the net. The anonymity, the ease of finding
hate on the net fuels it, the echo chamber, as Rabbi Cooper
said. I think it is critically important for groups like us,
not so much the Government, but groups like us, to hold those
companies to their terms of service.
Mr. Thompson. Thank you. I yield back.
Chairman McCaul. The Chair recognizes Mr. Perry.
Mr. Perry. Thanks, Mr. Chairman. Thanks, gentlemen, for
your attendance.
Mr. Cohen, I was looking at your organization's mission
statement. It says the SPLC is dedicated to fighting hate and
bigotry, among other things. I would say that probably every
Member of this body agrees with you on those principles.
Where we seem to disagree is that, I think for most of us,
certainly for myself, I don't quantify or qualify like some
hate and bigotry is OK if it is this organization, but it is
not OK if it is that organization. But it seems to me, in
looking at your information----
Let me ask you this: Why does it seem there are no left-
wing hate groups on your list? For example, on campus groups
like Students for Justice in Palestine that have advocated for
violence against Jews, why aren't they on your list?
Mr. Cohen. Well, I don't know about that particular group.
I couldn't answer that question. There are left-wing groups on
our list.
Mr. Perry. Who are they?
Mr. Cohen. Well, first, it depends, of course, on what you
mean by left-wing. But, you know, for example, the Nation of
Islam, the New Black Panther Party are on our list. We also
have certain anti-Semitic groups that identify with groups like
ISIS.
So I think that it is not the case that our group doesn't
include--our listing doesn't include any left-wing groups. We
try to call hate as we see it. We limit our list, not by left
versus right, but by groups that vilify others for issues or
for factors such as race, ethnicity, sexual orientation,
religion, or the like.
Mr. Perry. So your group--your list also includes as hate
groups mainstream, nonviolent public policy groups like the
Family Research Council, and the public interest law firms like
Alliance Defending Freedom, but it doesn't list antifa or other
anarchist groups that actually call for--literally call for
violence against individuals. Does that seem to comport?
To me, that reduces your credibility. Does it not to you?
Mr. Cohen. No. Let me speak to both of those issues, if I
could, sir. You know, we list the Family Research Council, not
because it opposes gay marriage, but because it relentlessly
vilifies the LGBT community and demonizes them with known lies
and propaganda. That is why we list them.
Mr. Perry. But you don't list antifa.
Mr. Cohen. I was going to finish.
Mr. Perry. OK.
Mr. Cohen. That is OK. Our listing of hate groups doesn't
necessarily mean that they engage in violence, although we
think that the anti-LGBT propaganda is one of the factors that
makes the LGBT community in our country the most likely to be
victimized by hate crimes.
If you are familiar with our work, we write about antifa
often. We condemn their tactics. I have said so publicly, and
we do so always. But antifa is not a group that vilifies people
on the basis of race, ethnicity, religion, or the like.
Mr. Perry. So you are OK with antifa, as long as they don't
say things that you don't agree with, but it is OK if they hit
people on the head with a bike lock or set things on fire or
riot and flout the law by wearing face masks, and incite
riotous--you are OK with that?
Mr. Cohen. Of course not. I said we condemn groups like
antifa. We write about them often.
Mr. Perry. But you don't list them.
Mr. Cohen. Could I finish?
Mr. Perry. Yes, sir.
Mr. Cohen. We don't list them as hate groups.
Mr. Perry. Are they on the hate map?
Mr. Cohen. No.
Mr. Perry. OK.
Mr. Cohen. Because they are not----
Mr. Perry. Let's move on here. Let's move on here.
Mr. Cohen. OK.
Mr. Perry. Google revealed in a blog post that it is using
machine language or learning regarding hate groups and events
and is partnering with the SPLC and others in that regard. How
does the SPLC work with Google or its subsidiaries to modify
search results of SPLC-designated people or groups?
Mr. Cohen. What we try to get Google to do is not
prioritize hate groups. I will give you an example. A few years
back, Google's algorithm was manipulated to have to rename the
White House with a racist name. It used to be the case that
when you would search for Holocaust or Jews, you would get a
rash of information of anti-Semitic information. We try to
bring these kinds of issues to their attention.
When Dylann Roof, for example, googled black-on-white
crime, he didn't get FBI statistics telling him the truth of
the matter. Instead, he got hate websites, such as that of the
Council of Conservative Citizens. So we are trying to say to
Google, your algorithm is flawed or easily manipulated to give
people incorrect----
Mr. Perry. But isn't that based on your opinion, sir?
Mr. Cohen. Well, I don't think there is any question but
what Mr. Roof ran across when he googled black-on-white crime.
Mr. Perry. What about when Mr. Corkins googled your website
and then went and shot up the Family Research Council,
including shooting an individual there, and then said that he
was inspired by your website?
Mr. Cohen. Look, we are no more responsible for what Mr.
Corkins did based on reading our website than Martin Scorsese
is for what John Hinckley did.
Mr. Perry. You are no more responsible, but yet Dylann Roof
read whatever he read, and that is held as responsible for what
he did.
I am not saying any of them are correct, but it seems like
a breathtaking double standard of which you are used as a
credible source for law enforcement and you are testifying in
front of Congress, when it appears, obviously, that it is only
your opinion that you base your hate groups and citations on.
Mr. Cohen. Well, it is our opinion. It is an opinion that I
think has a tremendous amount of credibility.
Mr. Perry. But no empirical evidence for data to back it
up.
Mr. Cohen. I think that is incorrect. I think if you look
at our hate group listing and look at the people who we list as
hatemongers, that you would agree with 99 percent of them.
Mr. Perry. Sir, my time has expired. I yield.
Chairman McCaul. The gentleman yields back.
Mr. Correa from California.
Mr. Correa. Thank you, Mr. Chairman and Ranking Member. I
want to thank the gentlemen for being here today on this
important issue of addressing terrorism, domestic terrorism,
white supremacist terrorism.
Earlier, the earlier panel spoke and made some points about
preparedness, what they were doing, what they were not doing. I
would like to ask you essentially the same kind of questions,
which is, from your perspective, is there something that the
Federal Government, the FBI, that Homeland Security can be
doing that we are not doing to address the issue of following
these hate groups and making sure that they are not successful
like they were in Oklahoma City?
Yes, I open it up for quick answers to that question from
the three of you.
Mr. Cohen. I think there are a number of things that the
Federal Government can and should do. One, I think
institutionalizing a focus on the oldest form of terrorism that
our country has seen. We don't want it to fall off, you know,
the radar of the Federal agencies.
Mr. Correa. Do you see it falling off the radar now?
Mr. Cohen. Well, I don't think there is any question but
that it has, after 9/11, to one degree or another under both
administrations. I think there has been a bipartisan failure to
devote the attention that it deserves.
You know, I mentioned Senator Durbin's bill. There are
other vehicles that could do that. One of the good features
about Senator Durbin's bill is not only that it was required
institutionalizing the focus on it, it also requires annual
reports on the threat of white supremacist violence.
I know Mr. Rogers, who is not here today, there was a bill
that went through this committee and was passed in the House
talking about having annual reports on hate, on issues of
terrorism. It should include a focus on domestic terrorism as
well.
Mr. Correa. I am glad to hear you say that, because Acting
Secretary Duke just mentioned the blurring of that line. I
think it is absolutely correct. You can't focus on one versus
the other. You know, every American life is sacred. Like all
life, we have got to make sure we go after every threat that
there is to our citizenry.
Rabbi.
Rabbi Cooper. Congressman, I would like to come back to a
point. I don't know about anyone else. I was very humbled and
impressed by the first panel and how they have stepped up, over
the course of the last 15 years, at a whole different level to
protect our citizens.
But they were very careful to emphasize, at every
opportunity, that they are not in the, ``ideology business.''
When you start getting that level where you have that kind of
power to find out what citizens are doing, it is a good idea to
have that kind of red line and firewall between that kind of
activity.
I think what this committee could look at, and certainly
the Wiesenthal Center, and I am sure everyone here, NAACP, all
of the NGO's, everyone involved with civil society, we stand
ready to try to fill in some of that on a volunteer basis if
there would be an appropriate, whether it is through the fusion
centers, the appropriate platform to actually inform the
various Federal, State, and local agencies about who is who in
hate. Who are the players overseas who are impacting on
individuals here, then go about threatening people in the local
community? There is a lot of information that is available----
Mr. Correa. See, that is a very interesting concept,
because that is essentially what we need to do with the
Googles, the Facebooks of the world, which is on a volunteer
basis. We can't legislate to keep up with technology, but if we
can figure out how to get these folks to step up and volunteer
and say, this does not smell correctly, something is afoot
here, maybe you can take part of that responsibility as well
and help us help the Federal Government keep our citizens safe.
Rabbi Cooper. Well, I can already report to you that some
of the most powerful companies in the Silicon Valley are always
happy to see me leaving their offices. So we are there. I do
think that there is an important role, a bridge role for this
committee to help, you know, create the appropriate input
platform and, you know, probably through the fusion center
concept, to make sure that if we actually come up with
important ideas, or if the NAACP has statistics that are not
necessarily available to a local anti-hate crimes agency, I
think it would help, you know, lift the efforts, make them more
focused, and hopefully help protect Americans from the hate
that we are now dealing with.
Mr. Correa. Mr. Rausch.
Chief Rausch. I would just add in terms of the cooperation
between the Federal, local, and State agencies, the JTTFs are
vital. They are working together to address those things that
you have concerns with. They are looking at the domestic
terrorist.
My office, I have two officers assigned to the JTTF that
specifically, that is what they do, is they look at our
domestic terrorists working with our Federal partners. So they
work very closely with them.
I also serve on the IACP's task force that is looking at
enhancing law enforcement's response to hate crimes. One of the
things that I suggested there is we look at tools that we need.
I have talked with several prosecutors and asked them about
what tools they could use to better our opportunity to go after
these who are committing these hate crimes. What they said was
they have a hard time proving ideology. Right? What is in the
mind. Hard time proving that part of the statute. So they will
charge them with the crime that they have committed, right,
which would be maybe an assault or a vandalism or something of
that nature. Then, you know, they said that they are easier
able to get that conviction.
So the hate part is a little challenging. So what I have
suggested is for your body to look at, similar to what we do
with gangs, and that is make it an enhancement. Right? We
charge the crime, but make hate an enhancing crime. So after
you have charged them with the A crime, then you come back and,
after you get that conviction, you come back and you enhance it
with the hate crime. I think that would be much more effective,
and you would see an increase in holding people accountable for
their ideologies.
Mr. Correa. Mr. Chair, I yield.
Chairman McCaul. The Chair recognizes Mr. Donovan.
Mr. Donovan. Thank you, Mr. Chairman.
Chief, I was the elected district attorney of Staten Island
and indicted the very first hate crime on Staten Island in its
history, and it resulted in my first death threat as well. So
that was my reward for it. But I am still here, so----
Chief, as you heard, I was asking the FBI director about
the whole idea of people disguising themselves with masks and
crossing State lines to cause mayhem, whatever, in places, and
how would codifying some of those prohibitions be helpful.
You were very successful, Chief, in the experience that you
just described to us in your opening remarks. Is there a
Federal codification of some of these things that you think--I
think the Chairman asked, Chief, could other law enforcement
agencies learn from your good experience. Do you think there
are codifications that may be helpful to you and others who are
trying to protect our Nation?
Chief Rausch. Yes, absolutely. I think looking at a couple
of areas, and I know they are controversial, but I think it is
important when you talk about these protests and where they
have gotten today. You know, obviously, we shouldn't restrict a
person's ability to express their opinion. I think, you know,
we have got to be careful with that fine line as we talk about
what is--what we do to limit a person's ability to express
themselves.
But I think we also have to look out for the greater good
and the safety of our communities. Covering your face for these
events, clearly, as we have seen, is for one purpose and one
purpose only, and that is to remain anonymous and have the
ability to do whatever you want to do and to try to get away
with it.
I was having a conversation as you all were on your voting,
and that is, you know, if you think about it back to when you
were a child and Halloween, masking up makes you anonymous.
That is why children don't worry about throwing eggs at the
neighbor's house or throwing toilet paper in the neighbor's
tree, is because they are anonymous. So masking up clearly
causes problems. I think, obviously, if there is something
codification-wise that the Congress could do, I think that
would be great.
The other area would be--I know this is controversial, and
I will say it--but it is firearms. I think during these
protests, the open carry of firearms, all it is, is adding
gasoline to the fire. You are talking about emotional
situations. People are emotional about their thoughts, and you
are going to add in a firearm into that emotional powder keg.
So I think as you talk about how we regulate and how we
ensure people have their First Amendment right to express
themselves, we need to look about how we can do that where they
can do it safely with proper regulation.
Mr. Cohen. Mr. Donovan, if I could.
Mr. Donovan. Yes, certainly, please, sir.
Mr. Cohen. You know, there were--we put out a video after
Charlottesville and made it available to police officers, we
will send out 50,000 free copies in January of it, about
mistakes that were made in Charlottesville. I think there were
mistakes that were made.
But as Chief Rausch says, they had a tremendous handicap,
and that was the Virginia open carry law that prohibited towns,
counties, and cities from having anything that would be
contrary to the open carry law.
The University of Virginia could do it because it is an arm
of the state. But the city of Charlottesville had its hands
tied when people walked into that city with hate in their
hearts and open guns. It is a real problem, and it is a problem
in more than 30 States.
I would add, not to contradict anything that the chief
said, but the history of mask laws in our country is
complicated. You know, there is this notion that I should
perhaps be able to protest anonymously in order to protect
myself from retaliation for expressing an unpopular view. I
can't tell you I know what the state of the law is today. It
may vary under the circumstances, but it is not an
uncomplicated point.
Mr. Donovan. Thank you.
Are there any other, Rabbi, situations that were described
earlier, the tragedies that we have experienced in our country,
maybe the more recent ones, do you see any other things,
mistakes that may have happened if we had something in place,
may have prevented some of the harm that was created?
Rabbi Cooper. I think the key, we heard from the first
panel, is intelligence, information, and access of that
information to the people, especially to local hate crimes
units. They have an incredible learning curve they have to
master as they are thrown in from other arenas in order to be
able to deal with the hate and hate groups in their
communities. So they could certainly use some more help, but I
just wanted to actually say something positive, if I may.
Mr. Donovan. Sure.
Rabbi Cooper. That is that the concept of hate crime is
always under assault. The concept is under assault. Saying,
well, someone is raped; they are raped. If they break a window,
so you pay. But I think whether you are talking to African
Americans or Jews or other minorities, when someone in your
community is attacked, and it may only, you know, bring about
the breaking of a $100 window, when that takes place during a
Friday night service or in a church or in a school, an entire
community is impacted.
Hate crimes has not been universally embraced as a society
idea or as a legal concept in other democracies, and is always
being sniped at here in the States by a variety of individuals.
So I think keeping focus on it, keeping the level playing
field, so whether it is from the left or the right, you have to
make sure it is not being used, you know, to bludgeon one
political point or another. I think it is an extremely
important and powerful tool that gives a sense of, not so much
redress, but when a community is hurting, they get the message
that the rest of the community is generally with them. That is
part of an important healing process and one of the ways of
keeping social peace.
Mr. Donovan. You are right about the attitude toward hate
crimes. As I said, I was in office for 3 weeks when we
indicted--and we indicted a Caucasian man for viciously
assaulting another Caucasian young man who happened to be in
the company of a black woman. Thank you.
Mr. Perry [presiding]. The Chair thanks the gentleman from
New York.
The Chair recognizes the gentleman from Rhode Island, Mr.
Langevin.
Mr. Langevin. Thank you, Mr. Chairman. I want to thank all
of our witnesses for being here today.
In follow-up on the firearm discussion just a moment ago
with respect to how weapons have complicated some of these
situations, each of you did highlight in your testimony the
threat of domestic extremists and terrorism. In recent domestic
terrorist attacks, such as the incidents in Las Vegas, Orlando,
and Sutherland Springs, firearms have been the weapon of
choice. So what steps should Congress take to ensure that
firearms don't end up in the hands of terrorists? Let's start
with Mr. Cohen.
Mr. Cohen. I would defer to the chief on this one, if I
could.
Chief Rausch. That is a great question. I am not sure there
is an easy answer to that. I think that--you know, clearly, I
think the challenge we have in background checks, as we have
seen, the system is flawed at best. So I think that is probably
our first step, is tightening up the background check process
to ensure that it is what it is supposed to be. When you can
identify somebody that is a member of an organization, if you
can identify that, that is another part of that challenge.
It is a difficult situation. I think we have to be careful.
I know that, you know, there is some legislation moving now
about reciprocity of moving guns across borders in terms of
hand gun reciprocity, hand gun carry. That is a challenge. You
know, not every State has the same level of restriction in
terms of who can carry a firearm. So that is concerning to
those of us in law enforcement.
So I would tell you that I would--I am not the perfect
expert on that, I don't think. I tell you, it is a challenging
topic, and I would tell you we have got to do better than what
we are doing now.
Mr. Langevin. I agree with you, and you are on the front
lines. I agree with your answers, and I appreciate your
perspective in the job you are doing to try to keep us all
safe.
Let me turn to Mr. Cohen. In the recent election, Russia
utilized social media to influence and interfere with our
democratic process, demonstrating how a properly orchestrated
on-line campaign can leverage a small investment into an
outsized effect. How have we seen domestic terrorist groups
utilize the same tools and methods to spread their message?
Mr. Cohen. Look, all of these groups that we talk about are
very, very active on social media because it is easy. Before
Charlottesville, the message went out to white supremacists
throughout the country to come and gather there. I think it was
obvious, prior to the event, that there were going to be
hundreds of white supremacists at that event.
So, you know, as the Rabbi said, any--a local thing can
quickly become National in scope or global in scope with a
click of a button. I don't think there is any easy answer to
deal with that.
Mr. Langevin. Thank you.
Rabbi Cooper. I would like to just add to that. We have
been talking to the companies about these issues for well over
a decade. Let's be honest, the ads, the digital ads, basically
an ATM machine, just for money making. When we brought--the
first case we brought to them was when a couple of ads for a
Hezbollah-sponsored game that kids could get ahold of, I think,
showed up on a Washington Post just as a bot. You know, just
showed up on various locations, undertakings from a known
terrorist group. So the particular company in mind did figure
out a way to remove it.
I hate to keep coming back to it, but if we are talking
about ads and the impact of ads, the bad players are looking at
each other out there and saying, well, look, this looks like an
easy mark. If we invest a certain amount of money, we are going
to be able to get our message into the mainstream directly to
the kind of audience we are looking for. Obviously, Hezbollah
is not a state player, and you get Russia much more
sophisticated with its own view. I think a great deal of this
responsibility comes right back at other companies. To a
certain extent, it also comes right back to the consumer.
I will just give you one other example to think about
because these are not easy issues. One of the companies around
a short-term project in which they sent emails to teenagers
saying that, we have reason to believe you may be a target of
on-line bullying. We hope if that is true, you are talking to
an adult, your parent, whatever. But if you need help, email us
and we will send you a list of resources that you can turn to.
Now, at first blush, that is a great idea. But you think
about it, you ask yourself one question, how does this company
know that this teenager has been bullied? Sort-of like the
unaddressed issue here is that the collect--these companies,
not because they forced anyone, because we gave the information
voluntarily, know a lot more about predictive behavior than
maybe some of our own Federal agencies. They don't like to talk
about it. It is not a Big Brother mentality, they are out to
make money, but the potential is always there. When you have a
bad player like Russia understanding that potential and
manipulating it, the next time it could be another victim, it
may be from another state player or a non-state player.
Mr. Langevin. Great insights. I appreciate you all for
being here today. Thank you for your testimony.
My time has expired, so I yield back the balance of my
time.
Mr. Perry. The Chair thanks the gentleman, Mr. Langevin.
The Chair now recognizes the gentleman from Louisiana, Mr.
Higgins.
Mr. Higgins. Thank you, Mr. Chairman.
Rabbi Cooper, I am going to speak on the connection between
domestic extremism and international terrorism, specifically
the BDS movement, the Boycott, Divestment, and Sanction
movements that attempt to shut down peaceful support of Israel
are connected--my studies show are connected with international
terrorism movements.
What connections have you seen, sir, can you refer to
between BDS groups and a global terrorist and anti-Israel
movement?
Rabbi Cooper. Well, you know, there is no question that
since BDS movements, Boycott, Divestment--in its current form.
Back in the late 20th Century, this kind of approach was used
to great effect to pressure the apartheid regime in South
Africa. I happened to be present as a delegate in 2001, just
before 9/11, at the U.N. conference against racism where the
mantle was transferred; not the halo, but the opposite. The new
devil was the state of Israel. That approach of demonizing a
democracy, our ally, has been part and parcel of antipeace
forces of Hezbollah, of Hamas, of Iran, and others.
Mr. Higgins. Did you see that connection between domestic
BDS movements and international terrorism?
Rabbi Cooper. Right. The connection may not always be
operational, but these are not movements that came, you know,
out of the thin air.
I will give one other example, if I may. There is a piece
of potential legislation before the House right now called the
Palestinian Children's Protection Act. That basically, if it
went into law, would say that the United States would reduce
aid to Israel if it caused any violence to any Palestinian
under the age of 18, even if they were involved in a terrorist
act.
Now, that did not come out of thin air either. There is
now, and you might say in honor of Israel's upcoming 70th
birthday or the 70th anniversary of Nakba, you have new themes
that are being brought forward in the international community
and right here in the halls of Congress. Again, they don't come
from thin air. It is part of an overall global campaign to
demonize the Jewish state. That is a part of the reality that
we are struggling against. Our own State Department has
recognized that some of these efforts do cross the line from
legitimate criticism of a state or of a group of people into
hate and anti-Semitism.
Mr. Higgins. Thank you for your very thorough answer.
In the interest of time, Mr. Cohen, I would like to--I have
further concerns, but the constraints of time will not allow me
to address them, so I am going to jump into money, sir.
The Southern Poverty Law Center is--the IRS recognizes SPLC
as a nonprofit, tax-exempt organization. Is that correct?
Mr. Cohen. It is.
Mr. Higgins. Since SPLC is not subject to taxation, why
would there be a need for the SPLC to have offshore accounts
reported up to $69 million in areas like the Cayman Islands? As
a tax-exempt nonprofit organization, the SPLC has no need for
lawful tax avoidance, so what would be the legitimate reason
that the SPLC would have millions and millions of dollars
deposited in offshore accounts?
Mr. Cohen. I appreciate the question. I think there has
been some confusion in the press about this. It is common for
nonprofit organizations, including universities, big
foundations, to have money in offshore accounts. It avoids two
things. First, it avoids a lot of certain kinds of filings, and
it avoids unrelated business income tax. If I could finish very
quickly.
Mr. Higgins. I appreciate your answer.
Will you state before this Congressional committee
definitively that all SPLC funds are received, held, and used
for lawful purposes under U.S. law?
Mr. Cohen. I will.
Mr. Higgins. Thank you. Does the SPLC receive foreign
money?
Mr. Cohen. Not that I know of. We may have had some donors
in foreign countries. I am sure we have some donors in England,
for example, but we don't receive any money from governments,
including the U.S. Government.
Mr. Higgins. Final question. Has the SPLC received money
from any individual, entity, or organization that the State
Department or Treasury Department has identified as connected
to organized crime or terrorism?
Mr. Cohen. Not that I know of, of course.
Mr. Higgins. Not that you know of. Would you be prepared to
present a full report regarding that?
Mr. Cohen. No. I don't think we are going to present a
listing of all of our donors to this committee or any other.
Mr. Higgins. I am specifically asking about donors that may
have been identified by the U.S. Government as terrorist
organizations or international crime----
Mr. Cohen. I am not sure--Mr. Higgins, if you have some
information that makes you think that, I would be happy to
check into it.
Mr. Higgins. That is what I am asking, sir.
Mr. Cohen. Well, if you have some information that tells
you that that is a possibility, I would want to look into it,
because we would not want to do that.
Mr. Higgins. Are you suggesting that I provide your
organization with your data on----
Mr. Cohen. No. No. What I was suggesting was that if you
think that we get money from, you know, criminal sources, I
have no knowledge of that. I would appreciate your letting me
know who you think it is who is giving us money who we
shouldn't.
Mr. Higgins. Mr. Chairman, in the interest of time, I would
like to submit in writing further questioning for the panel. I
yield back.
Mr. Perry. Without objection.
The Chair thanks the gentleman from Louisiana.
The Chair now recognizes the gentlelady from Texas, Ms.
Jackson Lee.
Ms. Jackson Lee. Thank you very much, Mr. Chair.
First, allow me to introduce into the record a letter from
53 members of the civil rights--the civil rights community--
coalition of 53 civil rights and civil liberties groups. I ask
unanimous consent to submit this statement in the record.
Hello?
OK. I need to get extra time because----
Mr. Perry. I am sorry. Without objection.*
---------------------------------------------------------------------------
* The information has been retained in committee files.
---------------------------------------------------------------------------
Ms. Jackson Lee. OK. So I need some extra time on that.
Thank you so very much.
Let me also express my disappointment that the NAACP was
not able to testify and that their invitation was issued less
than 24 hours prior to the hearing, and the late notice has
kept them from participating.
I want to acknowledge the new president of the NAACP, who
is a stellar leader on civil rights issues, Mr. Derrick
Johnson. His voice needs to be heard in this committee, and I
certainly hope that we will have the opportunity to hear from
him as soon as possible.
Let me go quickly to our very esteemed guests. Rabbi, first
of all, allow me to acknowledge Simon Wiesenthal and this
center and to put on the record that he lost 89 members of his
family. We have known of the center both in Texas but in the
Nation. I cannot thank you for the non-violent approach that
you have taken, and the peaceful approach you have taken but
the firm approach that you have taken against anti-Semitism,
which certainly is both related and it's a deafening sound in
this Nation.
So my question to you is, basically, in an area where I
have worked, and that is the attack on religious institutions
or religious-affiliated community centers. We have had
circumstances like that in Texas. My question to you is how can
Congress be stronger on protecting those religious affiliated
institutions who welcome all of us? There is not one of us that
has not been in a synagogue and have been welcomed, and I might
say and you know, in a mosque and have been welcomed, because I
know how your center works. How can we protect these
facilities?
Rabbi Cooper. You know, I think we are at an interesting
crossroad in America, because you can also add churches.
Ms. Jackson Lee. Absolutely. I have worked on those issues.
Rabbi Cooper. Houses of worship are, in America, by
definition, community centers, and that is one of the key
points that bigots, racists, and anti-Semites, and terrorists
understand. That makes--that automatically puts them on the
front line.
I have read with great sympathy the, you know, church
leaders who are trying to decide whether or not they have to
put perimeter security in their houses of worship. For us, it
hasn't been an option. I would imagine that for African
Americans, because of the reality of racist hate crimes in this
country, it is not really an option.
At the end of the day, as we hear it now more as ISIS is
being defeated on the battlefield, that the ultimate victory
will only be when we defeat the ideas that fuel and feed the
terrorists. The truth is that it is not so much on Congress, it
is on Americans to try to come together and figure out ways how
to drain the swamp of hatred, how to learn, you know, to act
together in concert, even though we may have different ways of
praying or different political views.
Ms. Jackson Lee. Thank you.
Rabbi Cooper. That is not something you can legislate; that
is on us.
Ms. Jackson Lee. I take you up on that. That is certainly
the reflection of the greatness of the center.
Let me pose my two questions. I ask the Chairman to indulge
me for the time that I might have lost. So I will pose the two
questions, first to the chief. Thank you so very much.
Chief, you may have known that we were in Judiciary with a
reciprocal concealed weapons bill. Thank you to the Major
Chiefs for their letter.
So I think the way I will pose the question on the issue of
guns is that the proliferation of such guns do make it a little
more dangerous. I take, for example, the individual that
attacked the church in Charleston, South Carolina. That is the
question I am going to ask you. I also made mention in
Judiciary of my concern for law enforcement officers.
The question I have for--Mr. Cohen, first of all, thank you
for your work. You were trying to explain that antifa, in your
view, does not spew anti-anybody. They come dressed as they do,
but they are dealing with the justice issues and trying to
protect. So my question to you is, what tone is set when the
leader of the free world offers or spews out words such as son
of a Bs or uses a video of alt-right and neo-Nazi so much that
the world condemns that utilization? What tone is set? How do
we thwart that as people, because I believe America is a great
Nation?
Chief, would you comment on the question I asked you? Then
if I could allow Mr. Cohen to answer his question.
Thank you so very much.
Chief Rausch. Yes, ma'am. Thank you. So in terms of guns, I
think, first and foremost, all law enforcement will tell you
responsible gun ownership is what we expect.
Ms. Jackson Lee. Absolutely.
Chief Rausch. Unfortunately, what we have seen in many
communities throughout the country, and we have seen it in our
State, and that is the relaxation of gun laws and allowing guns
everywhere at any time. You know, the Heller decision by the
Supreme Court said that there can be reasonable regulation.
Ms. Jackson Lee. Yes.
Chief Rausch. That is what we should have. We have seen an
increase, since the Castle doctrine was moved from the home to
the car in Tennessee, we have seen an increase in gun violence.
We have seen more guns stolen out of vehicles. Because, again,
responsible gun ownership also means keeping it safe from other
people. So we have seen an increase in guns being stolen. We
have seen an increase in shootings in our community ever since
that law was changed.
So I think we have got to be--we have got to be more
methodical in how we regulate our firearms, and that is a
challenge that I would put before you and Congress. I thank
you.
Ms. Jackson Lee. Thank you, Chief.
Mr. Cohen.
Mr. Cohen. Briefly, I would agree with Rabbi Cooper that it
is the responsibility of each and every person in our country
to drain the swamp of hate. But I would add that it would help
a lot if the person who has the biggest bully pulpit in our
country were to take the lead in consistently condemning hate
rather than energizing it.
Ms. Jackson Lee. I join you in that. I would like to make a
commitment that personally and I know many of my colleagues
will join you in standing up against hate. We thank you for the
testimony.
Mr. Chairman, I thank you for yielding to me. I yield back.
Mr. Perry. The Chair thanks the gentlelady.
The Chair now recognizes the gentleman from Virginia, Mr.
Garrett.
Mr. Garrett. Thank you, Mr. Chairman.
I want to hit on a few things, and I hate to be constrained
so by time, but each other Member has as well. First, I would
commend the chief on his suggestion as it relates to criminal
enhancements for certain things. I think we have a criminal
justice situation in this country that begs reform. We are
happy to be moving in a bipartisan manner toward that. We don't
necessarily need new crimes; we need to enforce the ones that
are on the books, but an enhancement makes real sense. It is
not giving you that burden at trial.
Second, the masked discussions, the guns discussions, et
cetera, I am loathed in this body to suggest a Federal
legislative answer to what should be doctrinally and
Federalism-wise a State-level or a local-level problem. Now, I
am sympathetic to the arguments made by the folks on the panel
that, indeed, localities and States should be empowered to make
these decisions for themselves, but I would hate, and I can
assure you I would not vote in favor of a Federal mask law. It
is draconian in its nature and perhaps in its application and I
don't even want to contemplate it.
Having said that, I have no problem with the locality
enforcing time, place, manner of restrictions on otherwise
protected rights.
Tertiarily, Rabbi Cooper, I would correct you in respect
where you say Hezbollah is not a state actor, but for the IRGC
in Iran there is no Hezbollah. Hezbollah came to be 3 years
after the Iranian revolution, and while they are not a direct
state actor----
Rabbi Cooper. They are an actor of a state.
Mr. Garrett. Yes, sir. Again, that is with all due respect
and no disrespect intended.
To Mr. Cohen, you gave a number of users of the website
Stormfront, which is a Nazi affiliate, a national socialist-
affiliated website, prior to and after the Obama
administration. Do you remember those numbers off the top of
your head?
Mr. Cohen. I do.
Mr. Garrett. What were they?
Mr. Cohen. In 2008, it was 140,000 registered users.
Mr. Garrett. Yes, sir.
Mr. Cohen. Today, over 330,000. That doesn't mean--there
are many millions of visitors----
Mr. Garrett. I have got so little time. I am not trying to
be rude. Right, you have got million of visitors, but you have
almost doubled your registration. We wouldn't prescribe that,
though, that is not a result of the Obama administration?
Mr. Cohen. Oh, no, no, no, no, no. As I said, it is the
continuing backlash to our country's changing demographics.
Mr. Garrett. Well, I think that is your opinion.
Mr. Cohen. That is correct.
Mr. Garrett. Again, with due respect. So are you familiar
what type of organization is the most prominent and preeminent
numerically on your hate watch list of 900 and some-odd groups?
Mr. Cohen. I think it would probably be the Daily Storm or
the Nation of Islam.
Mr. Garrett. No. I mean, by number, how many----
Mr. Cohen. That is what I was trying to answer.
Mr. Garrett. I am sorry. Go ahead, real quick.
Mr. Cohen. I was saying it would probably--the current
count would probably be the Daily Storm or the Nation of Islam.
Mr. Garrett. So by definition on your list, about 22
percent of the entire list are Black separatist groups?
Mr. Cohen. That is correct.
Mr. Garrett. Again, I don't--look, hate is hate is hate is
hate is hate.
Mr. Cohen. I agree.
Mr. Garrett. When we move to put in a law to make Barbara
Johns Day a holiday in Virginia, one of my colleagues said that
is Black history. I said, you can't have it, that is American
history. We need to know that.
Simon Wiesenthal, I think, was wise in his words to suggest
that, for our benefit, we should learn from the Jewish tragedy
because the next victims very well may not well be Jewish. So
that is the point that I make that there was been an uptick. In
fact, in 2000, the number of Black separatist groups was about
\1/12\ of your list. Is that about right?
Mr. Cohen. I don't remember the ratio.
Mr. Garrett. Well, off your website, it would indicate that
48 out of 610 extremist groups listed by Hate Watch in 2000
were Black separatists, and now it is almost 200 out of about
900.
Mr. Cohen. Right. We report those numbers----
Mr. Garrett. Again, this isn't President Obama's fault.
Mr. Cohen. Well, I mean----
Mr. Garrett. It is not, is it? I mean, I don't think it is.
Mr. Cohen. I wasn't claiming it was his fault. I was trying
to explain.
Mr. Garrett. Well, I guess what I am suggesting is that
there is no doubt, right, that there are real, live, living,
breathing Nazis. Tragically, we saw them in my Congressional
district. But to ascribe the presence of despicable,
reprehensible individuals who can't grasp the basic concept of
Dr. King's premise that we should judge individuals based on
the content of their character, not the color of their skin,
but to say, well, this is because of the rhetoric of one
individual, I think, oversimplifies the problem. Correct?
Mr. Cohen. Well, I am not sure I--I am not sure I was
guilty of what you are suggesting.
Mr. Garrett. I am not suggesting you were. If someone were
to say that the prevalence of these groups is because the
rhetoric of one individual, that would be oversimplifying the
problem. Would it not?
Mr. Cohen. Depending on the individual. I think----
Mr. Garrett. So here is my concern, because what your
organization has done and done well is attack evil in the form
of things like the Klan. However, would you be shocked if I
told you that from the public records, as it relates to the
leadership of your organization, the political giving is almost
exclusively and to the tune of almost 100 percent in one
direction? Would that surprise you?
Mr. Cohen. I don't think it is accurate.
Mr. Garrett. If I were to tell you that it were, would that
surprise you?
Mr. Cohen. It would. We have many Republican donors of----
Mr. Garrett. No, no, no, no, sir. I am talking about the
gifts from the people in your organization to political causes.
Mr. Cohen. Oh, I think that is absolutely true. I am sure
that is right.
Mr. Garrett. OK.
Mr. Cohen. There are not that many people in Southern
Poverty Law Center who make political contributions.
Mr. Garrett. But some do.
Mr. Cohen. Sure.
Mr. Garrett. It wouldn't surprise you to learn that they
were almost exclusively in one direction?
Mr. Cohen. It would not.
Mr. Garrett. OK. You have worked with other groups, for
example, Media Matters, the Center for New Community, and
ReThink Media, to come up with lists. Correct?
Mr. Cohen. We have.
Mr. Garrett. OK. Would it surprise you if I were to tell
you that, based on public records, the political giving of the
leadership of those organizations was also almost exclusively
in one direction?
Mr. Cohen. No, it would not.
Mr. Garrett. OK. Would you contest the assertion, and I
would categorize national----
Mr. Cohen. You haven't given up your days as a trial
lawyer, have you, Mr. Garrett? Go ahead.
Mr. Garrett. No, sir. But again, it is an interesting
paradigm I find myself in because I respect what you do.
Mr. Cohen. Thank you.
Mr. Garrett. I am concerned with how you are doing it. Here
is where I am going with this.
Mr. Cohen. Please.
Mr. Garrett. I think it is a fair historical fact to say
that the deadliest collective force in human history, probably
just after national socialism, would be communism, which
inarguably is a dogma of the left. I am not ascribing values to
anyone. I am suggesting, however, that it troubles those to see
an entity that has essentially been de facto made responsible
for determining what is and isn't hate that skews almost
exclusively, as do their collaborators, in a particular
direction.
So I guess I admonish you to listen to folks like Mr. Perry
who says--I don't even remember the name of the organization--
are you familiar with them and become familiar with them. Now--
--
Mr. Cohen. I am not sure who you are talking about, Mr.
Perry. I am sorry.
Oh, I am sorry, Congressman.
Mr. Garrett. It is OK. So let me finish.
Mr. Cohen. Please.
Mr. Garrett. Because I have just kind of poked at you----
Mr. Cohen. Just a little bit.
Mr. Garrett [continuing]. But it is not with malice.
You deserve credit at SPLC for being the first group to
point out, for example, that Jason Kessler, who was the
organizer of the Unite the Right rally, with which I would take
exception to the name, because, again, I am an individualist in
the Randian sense. I think the individual is the ultimate
minority, and everyone has the right to be left alone, so long
as they are not hurting someone else. But you were the first
people to point out that his previous affiliations have been
with the Occupy movement, and you deserve credit for that.
Right? So I hope and ask that you recognize that hatred in any
form is hatred, that violence in any form is violence, and that
victims in any form are victims.
Mr. Cohen. We always have.
Mr. Garrett. I encourage you to continue to, but the
perception by outside individuals, and I think based on life
experience, is that if all the leadership of an organization
skews in a particular political direction, there might be a
bias, which then gives rise to a lack of credibility for what
you do that should be important work. Do you understand why
that might be a concern?
Mr. Cohen. I understand why it is a concern to you.
Mr. Garrett. Well, do you understand why that might be a
concern to people?
Mr. Cohen. Well, look, look, you know, the liberal
tradition is an inclusive one. Hate is the opposite of that
liberal tradition of inclusivity. So it is not surprising to me
that people at the Southern Poverty Law Center, people at other
inclusive organizations, tend to give money to liberal
organizations. It seems obvious to me.
Mr. Garrett. Well, again, we could sit and discuss the
origins of classical liberalism versus modern liberalism all
day long, but my life philosophy is treat everyone as you would
want to be treated.
Mr. Cohen. Of course.
Mr. Garrett. And do no harm.
Mr. Cohen. Absolutely.
Mr. Garrett. And that the Jeffersonian concept of liberty
should be adhered to, which is so long as you are not hurting
someone else, who cares who you sleep with, who cares how you
worship, et cetera, et cetera. But it strikes me, as I look at
the groups that are chosen, Liberty Counsel, Family Research
Council----
Mr. Cohen. Yes, yes.
Mr. Garrett. When Flanagan walks in with Chick-fil-a
sandwiches to rub in the faces of his victims, that is not your
fault?
Mr. Cohen. That is absolutely true.
Mr. Garrett. But I mean, you know, I would hope that the
important work you do not be co-opted by an any ideological
drive that causes you to miss other threats.
Mr. Cohen. Well, I appreciate your concern about our work.
I am sure that if you knew as much as we did about the Family
Research Council, you too would keep them at arm's length.
Mr. Garrett. Well, I am way over time. I would love to have
the opportunity to sit and talk more. I thank all three of the
panelists.
Mr. Cohen. I look forward to seeing you in Charlottesville.
Mr. Garrett. Yes. And invite you guys to come by the office
any time. Give me a little bit of an advanced notice so I can
make sure I can be there.
But thank you, Mr. Chairman, for your indulgence.
Mr. Perry. The Chair thanks the gentleman. I thank the
witnesses for their testimony and the Members for their
questions.
The Members of the committee may have some additional
questions for the witnesses, and we will ask you to respond to
these or those questions in writing.
The Chair recognizes the Ranking Member.
Mr. Thompson. Thank you very much.
I would like to include in the record, and ask unanimous
consent to do so, a statement from the Council on American-
Islamic Relations.
Mr. Perry. Without objection.
[The information follows:]
Statement Submitted For the Record by Ranking Member
Bennie G. Thompson
Statement of the Council on American-Islamic Relations (CAIR)
November 30, 2017
Chairman McCaul and Ranking Member Thompson, thank you for the
opportunity to submit this testimony to the record of today's hearing
on keeping our Nation safe. While there are many substantive issues to
discuss, we will focus this brief testimony on Countering Violent
Extremism Programs.
We do this in response to growing Congressional calls to expand CVE
to include white supremacist groups. Such a move would only serve to
legitimate a program that actively surveils, profiles, censors, and
divides the American Muslim community.
In September, more than a dozen national Arab, Middle Eastern,
Muslim, and South Asian civil liberties and human rights organizations,
and more than 20 activists, academics, and community leaders joined in
signing a statement opposing the expansion of the Federal Government's
Countering Violent Extremism (CVE) program.\1\ In the same period, the
Brennan Center for Justice, along with more than 50 other human rights,
civil liberties, and community-based organizations sent a letter urging
leadership in the House of Representatives and the Senate to reject
proposals to expand existing CVE programs to focus on white supremacist
extremism.\2\
---------------------------------------------------------------------------
\1\ Council on American-Islamic Relations. ``Groups, activists say
expanding CVE to include white supremacists hurts Muslims, `` 9/07/
2017, available at: https://www.cair.com/press-center/press-releases/
14587-groups-activists-say-expanding-cve-to-include-white-supremacists-
hurts-muslim-communities.html.
\2\ Ibid. Original letter available at: https://
www.brennancenter.org/analysis/citing-civil-liberties-concerns-brennan-
center-and-over-50-groups-oppose-expanding-countering.
---------------------------------------------------------------------------
Years of research has failed to determine any set of
characteristics that identifies pre-terrorists.--While academic
interviews with people who have committed terrorist acts have resulted
in a set of characteristics that describe each individual person, they
have not produced a profile or any evidence-based set of predictive
characteristics.\3\
---------------------------------------------------------------------------
\3\ Additional examples: ``The profiles of individuals involved in
ISIS-related activities in the U.S. differ widely in race, age, social
class, education, and family background. Their motivations are equally
diverse and defy easy analysis.'' Lorenzo Vidino and Seamus Hughes.
ISIS in America: from retweets to Raqqa, George Washington University
Program on Extremism, December 2015, available at https://cchs.gwu.edu/
sites/cchs.gwu.edu/files/downloads/ISIS%20in%20America%20-
%20Full%20Report.pdf. Also, ``Tools that purport to have a psychology
evidence base are being developed and placed under statutory duty while
their `science' has not been subjected to proper scientific scrutiny or
public critique.'' Karen Armstrong et al. Anti-Radicalization Strategy
Lacks Evidence Based in Science, The Guardian, September 28, 2016,
available at: https://www.theguardian.com/politics/2016/sep/29/anti-
radicalisation-strategy-lacks-evidence-base-in-science. Also, the
recommendation that the UK government ``End the use of empirically
unsupported indicators of vulnerability to being drawn into
terrorism.'' Amrit Singh. Eroding Trust: The UK's Prevent Counter-
Extremism Strategy in Health and Education, Open Society Justice
Initiative, 2016, available at https://www.opensocietyfoundations.org/
sites/default/files/eroding-trust-20161017_0.pdf.
---------------------------------------------------------------------------
In its 2016 Strategic Implementation Plan for Empowering Local
Partners to Prevent Violent Extremism in the United States, the
Department of Homeland Security conceded, ``There is no single cause of
or pathway to violent extremism.''
The FBI's Strategic Plan to Curb Violent Extremism, obtained via a
Freedom of Information Act request by the Brennan Center for Justice,
concurs: ``There is neither one path or personality type, which is
prone to adopting extremist views of exhibiting violent tendencies, nor
is there a singular path or personality that leaves an individual
vulnerable to others who may seek to impress these views or tendencies
upon them. There are no individually unique behavioral changes for
those who mobilize to violent extremism.''
CVE program results are ``not easy to quantify'' and ``lack
meaningful metrics.''--A May 2014 National Counterterrorism Center
(NCTC) document notes that the impact of CVE programs is ``not easy to
quantify.'' After making this qualification, the document's authors
offer a scoring system for measuring an individual's susceptibility to
violent extremism. These include measures such as ``Parent-Child
Bonding, Empathic Connection,'' ``Presence of Emotional or Verbal
Conflict in Family'' and ``Talk of Harming Self or Others.'' These
measures likely encompass most American families at some point,
rendering them near useless for the stated goal.
Other measures in the NCTC document, such as ``Family Involvement
in Community Cultural and Religious Activities,'' are problematic as
the person filling out the form may subjectively perceive mosque
attendance itself as a risk factor.
In 2016, the National Security Critical Issues Task Force at
Georgetown University's Center for Security Studies concluded, ``the
lack of meaningful metrics to evaluate CVE initiatives complicates
evidence-based program design and funding.''\4\
---------------------------------------------------------------------------
\4\ Challgren et al. ``Countering Violent Extremism: applying the
public health model,'' October 2016, available at: http://
georgetownsecuritystudiesreview.org/wp-content/uploads/2016/10/NSCITF-
Report-on-Countering-Violent-Extremism.pdf.
---------------------------------------------------------------------------
Labeling routine community programming as CVE is problematic and
stigmatizing.--A Government program to combat terrorism disbursed
$300,000 in CVE funds to Minnesota community groups in March 2016. The
funded projects included ``youth sports activities,'' ``soccer and
Somali arts classes for male students,'' and efforts to ``engage
youth'' and ``address the stigma of mental illness.''\5\
---------------------------------------------------------------------------
\5\ Amy Forliti. ``6 Somali organizations receive grants to combat
terrorism,'' Associated Press, March 10, 2016, https://www.mprnews.org/
story/2016/03/10/six-somali-groups-grants-combat-terrorism.
---------------------------------------------------------------------------
These are important, yet wholly standard community development
programs for the empowerment of marginalized and disadvantaged people.
Such fundamental services should not be securitized and classified as
CVE. Doing so unfairly implies that the participants are an inherent
threat to National security.
Most simply stated, ``Why does `soccer and Somali arts classes for
male students' constitute a counter-terror program, but the same thing
for white youth is simply soccer and art classes?
While appealing in concept, once its problematic details emerge
community leaders frequently pull away from CVE.--In all three Obama
administration CVE pilot cities, local community leaders who support
efforts to secure our Nation and engaged in the U.S. attorney-led
meetings aimed at shaping local CVE frameworks distanced themselves
from the project as they formed a deeper understanding of its
problematic realities.
In Los Angeles, both the Islamic Shura Council of Southern
California, an umbrella organization of Mosques and Muslim
organizations serving the Muslims of Southern California, and the
Muslim Students Association of the West Coast (MSA West), with 27
Muslim Student Associations of West Coast universities as signatories,
voted to oppose the narrow scope of the Federal Government's CVE
program.
In Minnesota, almost 50 Muslim organizations signed on to a
statement urging law enforcement to ``consider our grave concerns about
the Government's proposed [CVE] pilot program in Minnesota and
discontinue this stigmatizing, divisive, and ineffective initiative.''
A ``top leader of Boston's Muslim community'' opted against the
local framework because it targeted only the American Muslim community
and was ``founded on the premise that your faith determines your
propensity toward violence.''
The United States Council of Muslim Organizations (USCMO), a
coalition of leading National and local Muslim organizations, gathered
some 50 U.S. Muslim leaders at a full day forum on CVE that included
presentations by both Government and civil liberties representatives.
Following a discussion of the information presented, the council issued
a statement that in part said, ``Given the low-level of confidence in
Government-led CVE, the USCMO believes it is best to identify and
support community-driven best practices.''
Opposition to the U.S. Government's CVE initiative does not mean
ignoring threats.--Opposition to violent extremism is consistent among
American Muslim leadership. Former FBI Director Comey, former U.S.
Attorney General Holder, former FBI director Mueller and former
National Counterterrorism Center Director Leiter have all acknowledged
this opposition.\6\
---------------------------------------------------------------------------
\6\ FBI Director Comey: ``They do not want people committing
violence, either in their community or in the name of their faith, and
so some of our most productive relationships are with people who see
things and tell us things who happen to be Muslim.'' Source: Huffington
Post, 6/16/2016. Former FBI Director Mueller: ``Many of our cases are a
result of the cooperation from the Muslim community in the United
States.'' Source: FBI Director Robert Mueller's 2008 testimony before
the House Judiciary Committee. Former Attorney General Holder: ``Muslim
cooperation `has been absolutely essential in identifying, and
preventing, terrorist threats.' '' Source: Attorney General Eric
Holder's December 10, 2010, speech to the Muslim Advocates' Annual
Dinner. Former National Counterterrorism Center Director Leiter: ``Many
of our tips to uncover active terrorist plots in the United States have
come from the Muslim community.'' Source: February 9, 2011 hearing
before the House Homeland Security Committee.
---------------------------------------------------------------------------
CAIR specifically is a natural enemy of violent extremists. Our
record of success discredits violent extremist arguments that
minorities cannot receive fair treatment in our Nation. Our statements
and actions opposing those groups and individuals who claim Islam
sanctions terrorism contributed to ISIS including CAIR's National
Executive Director among a short-list of Western Muslim leaders it
wants assassinated.
considerations for legislators
Follow investigative leads, do not police ideology.--Government and
other programs to counter violent extremism which incorporate steps for
``intervention'' can too easily slip into policing ideology. The
Establishment Clause prohibits any Governmental vilification or
endorsement of a particular religious ideology. The Government should
avoid involvement in questions as to which religious ideologies are
acceptable as this defies the First Amendment.
Empower law enforcement to investigate cases where there is
evidence of criminal wrongdoing.--Rather than sifting through an entire
minority population looking for pre-terrorists, law enforcement should
focus on investigating cases where there is evidence of wrongdoing.
Checklists of risk factors have no foundation in scientific research.
Expecting teachers, mental health professional and other social service
providers in identifying pre-terrorists is problematic. Trained FBI
agents missed the Boston Marathon bombers and the Orlando Pulse
shooter, even though they had investigated both. All this overbroad
action will do is produce a mass of false positives. Additionally,
placing social service provider into positions of being de facto law
enforcement undermines the common trust put in those positions.
Preserve free speech.--Free Speech, even when despicable, should be
permitted. In the absence of an implied or inferred threat, speech in
and of itself should not trigger a report to law enforcement. Community
leaders should prepare for difficult conversations in advance.
Isolating an at-risk individual, for instance by banning him or her
from a facility without any attempt at engaging him or her, may simply
drive the individual underground. Subjecting an individual's views to
debate can help them to become aware of alternative viewpoints, facts
that conflict with their ideas, or simply help avoid a situation where
going on the internet to share their views with like-minded individuals
is the only option. In certain communities fear of surveillance has
caused leaders to ban problematic individuals or topics rather than
engage them.
Expand government services, but delink this expansion from law
enforcement.--Governments at all levels can and should expand outreach
to all communities, but particularly those who are needy or
marginalized, and to provide a host of services include mental health
treatment, job training and placement, youth sports leagues and other.
However, this should be routine programming and not classified as
somehow a National security program. For additional safeguards, law
enforcement should not be part of these services. Law enforcement
efforts to partner with community groups are too often accompanied by
parallel intelligence collection or agent provocateur actions. As CVE
expert Humera Khan wrote in Foreign Affairs in February 2015, ``Many
police departments consider community policing as an avenue for finding
informants to help detect rather than prevent criminal activity.''
Revelations show that a Minnesota police department applied to the
Department of Justice for a grant to fund outreach programs that would
have an intelligence-gathering \7\ component. The police chief in
Montgomery County, Maryland is reported to view a controversial CVE
program in that locality as a ``conduit of information.''\8\
---------------------------------------------------------------------------
\7\ Cora Currier. ``Spies Among Us,'' The Intercept, 1/21/2015,
Available at: https://theintercept.com/2015/01/21/spies-among-us-
community-outreach-programs-muslims-blur-lines-outreach-intelligence/.
\8\ Hena Zuberi. ``Area Masajid Unknowingly Expose Youth to Federal
Intelligence Gathering Program,'' The Muslim Link, 8/25/2017, Available
at: http://www.muslimlinkpaper.com/community-news/4371-muslim-link-
exclusive-area-masajid-unknowingly-expose-youth-to-Federal-
intelligence-gathering-program.
---------------------------------------------------------------------------
Protect Good Samaritans.--The U.S. Congress should pass laws, or
the Department of Justice (DOJ) should issue guidelines, similar to
Good Samaritan laws to protect those who act in good faith to prevent
violent extremism by engaging with those considering it in order to
dissuade them. DOJ policies should make clear that those who intervene
to help others should not suffer for it by being subjected to
prosecution, watch-listing, or surveillance because of their
association with a potential violent extremist.
Ensure clear safeguards and protections to prevent abuse.--
Programming helping self-identified extremists, such as that which
helps white supremacists exist the movement may be helpful. Certainly,
in the next few years a number of convicted terrorists will be leaving
the prison system and may need counseling. In any CVE program, there
must be clear standards and safeguards to prevent abuses. These
standards should be reviewed by attorneys with expertise in privacy and
civil rights and made available to the public for review.
Mr. Perry. Pursuant to committee rule VII(D), the hearing
record will be held open for 10 days.
Without objection, the committee stands adjourned.
[Whereupon, at 3:40 p.m., the committee was adjourned.]
A P P E N D I X
----------
Questions From Chairman Michael T. McCaul for Elaine C. Duke
Question 1a. The Halloween attack in New York City was perpetrated
by Sayfullo Saipov, an Uzbek national who came to the United States
through the diversity lottery. As of the day of the attack, Saipov had
lived in the United States for 10 years as a legal permanent resident.
If Saipov had come to the United States today, what checks would he
have encountered and how is this different from the checks he
encountered 10 years ago?
Question 1b. Would the fact that he came from a country with a
history of terrorism have played a role?
Question 1c. How does DHS review legal permanent residents to
ensure that they do not become radicalized or determine whether they
have?
Answer. A decade ago, background checks often consisted of
adjudicating officers performing manual checks of databases using
primarily the applicant's full name. Other identifying information such
as date of birth, country of birth, and alien number (A number) were
used to link the applicant to the information found in particular
databases. While adjudicating officers checked databases containing law
enforcement information and databases containing intelligence community
(IC) information, coordination with law enforcement agents or members
of the IC only occurred when a concern was identified.
Today, checks are highly coordinated with the IC and law
enforcement agencies (LEAs). Improvements in Federal screening and
vetting protocols over the last decade have been implemented largely as
a result of advances in screening technologies and increased
interagency cooperation. The U.S. Government has the ability to use
multiple data points to perform recurrent vetting of immigration, IC,
and LEA databases rather than performing manual name checks at a single
point in time. At the same time, inspecting and adjudicating officers
use their expertise to review individual cases and identify concerns.
When a concern is identified at any step in the process, agencies
across the government, including immigration, IC and law enforcement
agencies, coordinate for the appropriate action including denial of
benefit or entry, prosecution, and/or deportation.
All applicants for diversity immigrant visas are subject to
recurrent vetting (i.e., daily, automated comparison of visa data
against updated IC, LEA, and immigration data) rather than checks
performed at a single moment in time. This recurrent vetting involves a
sophisticated comparison of multiple data identifiers drawn from the
visa application against IC and LEA databases in order to identify
terrorism concerns. If a concern is identified through this screening,
the adjudication of the diversity immigrant visa is stopped and the
case is submitted for an interagency review by the Department of State,
the Department of Homeland Security, the IC, and LEAs.
In addition to this recurrent vetting, the adjudicating officer
performs manual checks of the applicant's immigration and travel
history, including past visa applications. Adjudicating officers
receive significant training in country conditions, including knowledge
of historic, internal conflicts, and any identified concerns relating
to both terrorism and trans-national organized crime. Any identified
concern automatically stops the adjudication and issuance of the
benefit. The case is then sent to the interagency for review and
adjudication.
Coordination of biometric comparisons has also significantly
increased over the last decade. Applicants for diversity immigrant
visas between the ages of 14 and 79 must submit fingerprints and these
prints are compared against immigration, Department of Defense, law
enforcement, and IC databases.
Applicants from high-risk countries also receive more in-depth
vetting. Since
9/11, the U.S. Government has conducted additional specialized
screening of foreign nationals from countries determined to be high-
risk, including those that have been determined to be terrorist safe
havens. This allows DHS and interagency partners to focus resources
where they are needed most and to better detect individuals that may
pose a threat to public safety and National security.
DHS works with law enforcement and immigration agencies in its
effort to combat radicalization to violence of U.S. citizens, U.S.
Lawful Permanent Residents, and other non-citizens. This includes the
sharing of information relating to individuals who seek to radicalize
others, and criminal or terrorist activities undertaken or attempted as
a result of, or in furtherance of, radicalization to violence.
Moreover, DHS is enhancing its terrorism prevention efforts focused on
better countering terrorist recruitment in the United States through
improvements to threat awareness, counter-recruitment activities, early
warning, and intervention. If any FBI investigation involves non-
citizens, including legal permanent residents, the FBI will coordinate
with DHS Immigration and Customs Enforcement and U.S. Citizenship and
Immigration Services, as appropriate, especially in cases in which this
activity involves criminal or other activities that will render the
subject ineligible for immigration benefits and potential deportation.
Question 2a. In Europe, we see terrorist attacks taking place at an
alarming rate. In 2017, we have witnessed 9 vehicular attacks by ISIS.
What are we doing to make sure radicalized Europeans do not come to
the United States via the Visa Waiver Program?
Answer. The Department maintains close cooperation with European
allies to combat terrorism, including the threat posed by known and
suspected terrorists (KST). DHS cooperates with our international
counterparts in a range of ways to ensure Europeans radicalized to
violence are unable to travel to the United States via the Visa Waiver
Program (VWP).
Most European allies--including 23 of 28 European Union (EU) member
states and 7 non-EU countries--participate in the VWP. Since 1986, the
VWP has evolved from a travel facilitation program into a comprehensive
security partnership between the United States and VWP countries.
Program countries must meet stringent security requirements to ensure
their designation does not pose a risk to U.S. National security, law
enforcement, or immigration enforcement interests. These requirements
include, but are not limited to: Implementing a series of arrangements
to share terrorism information; cooperating on criminal threats;
improving identity management procedures; and reporting lost and stolen
travel document information. To ensure compliance with VWP
requirements, DHS conducts assessments of each VWP country at least
once every 2 years--and engages in continuous monitoring between formal
assessments--to evaluate participants' counterterrorism, law
enforcement, immigration enforcement, border management, and identity
document security capabilities.
The United States and all VWP countries have committed to share
information on KSTs through both formal bilateral arrangements (e.g.,
Homeland Security Presidential Directive-6 (HSPD-6)), though the amount
of sharing varies per country. Additionally, sharing occurs via
informal intelligence and law enforcement channels, as well as through
international organizations, such as International Criminal Police
Organization (ICPO-INTERPOL) and Europol. This sharing adds to the
derogatory information that the United States uses to perform screening
activities, which enables the United States to more effectively
identify KSTs and take appropriate action to safeguard the United
States.
On December 15, 2017, Secretary Nielsen announced additional
targeted enhancements that further strengthen the Program. These
enhancements will not only raise security standards, but also further
deepen existing security partnerships, therefore making it much
likelier for countries to detect terrorist travel and safeguard
themselves in the aviation security environment. These enhancements
include:
Requiring VWP countries to fully implement their existing
information-sharing arrangements by systematically screening
travelers crossing their respective borders against U.S.
counterterrorism information.
Improving the assessments DHS conducts on the effectiveness
of VWP countries' safeguards against insider threats in the
aviation security environment; and,
Requiring VWP countries having a higher rate of visitors
overstaying the terms of their admission into the United States
to initiate a public information campaign to educate their
nationals on the conditions for admission into the United
States.
In addition to the aforementioned new requirements, Secretary
Nielsen called on Congress to codify existing VWP requirements to
bolster efforts in the following areas:
Reporting of foreign terrorist fighters to multilateral
organizations, such as INTERPOL and EUROPOL;
Systematically collecting and analyzing passenger travel
data (Advance Passenger Information/Passenger Name Records);
and
Concluding arrangements to permit U.S. Federal Air Marshals
to operate on-board U.S. air carriers for last-point-of-
departure flights to the United States.
As in earlier rounds of enhancements, initial implementation will
focus on cooperative steps to support VWP countries meeting the new
requirements. This announcement starts an engagement process wherein
the U.S. Government will work with each VWP country on a bilateral
basis to inform them of the new requirements, assess their current
levels of compliance, and develop strategies geared to implement any
outstanding requirements. This approach has yielded substantial
economic and security benefits for the United States and its partner
countries.
Further, the U.S. Government conducts extensive vetting of all in-
bound travelers. All individuals seeking legitimate air or maritime
travel to the United States are known to the Department prior to their
departure because of Advance Passenger Information (API) reporting
requirements by all airlines and ships bound for the United States, and
in the case of non-immigrants, either the submission of an Electronic
System for Travel Authorization (ESTA) application for travel under the
VWP or a visa application. The Department vets this data to determine
whether the prospective traveler should receive additional screening or
be denied boarding. In all instances, U.S. Customs and Border
Protection (CBP) Officers retain final authority on granting admission
to individuals arriving at U.S. ports of entry.
In addition, individual European partner countries and the European
Union collectively have taken significant steps to improve
counterterrorism and border security capabilities across Europe over
the past 2 years, to include: Creating a new European Border and Coast
Guard Agency (effective October 2016); enhancing external border
controls to require systematic database checks of all persons crossing
Europe's external Schengen borders (effective April 2017); and passing
the E.U. Passenger Name Record (PNR) Directive in April 2016 (to be
implemented by May 2018). European partners also established the
European Counterterrorism Centre (ECTC) at Europol in January 2016; the
ECTC supports and facilitates E.U. member states in sharing terrorism-
related information. Additionally, the European Union is building its
own ESTA-like pre-travel screening system, known as the European Travel
Information and Authorization System (ETIAS), which will allow for
greater interoperability amongst its databases, and working to
implement an E.U.-wide biometric entry/exit system. The European Union
expects ETIAS to be operational by 2020.
The Department continuously looks for new ways to build on existing
partnerships with European allies to respond to current and emerging
threats. For example, the Department has offered its expertise and
technical assistance to assist European partners in developing air
passenger data collection and analysis capabilities, and has conducted
numerous workshops for sharing best practices and collaborating on
travel trends and passenger targeting. The Department is also working
with a number of European partners to leverage both existing and new
information-sharing agreements to cooperate directly on vetting
priority travelers against our respective immigration, law enforcement,
and National security data at a system-to-system level. In addition,
the Department is working with 9 European countries to establish
Preclearance facilities at last-point-of-departure airports. Countries
participating in a Preclearance arrangement adopt a close and
continuous partnership with the United States that allows the
Department to leverage its full authorities and capabilities at
overseas locations to screen travelers prior to their departure for the
United States.
Multilateral partnerships, such as INTERPOL and Europol, facilitate
U.S.-European cooperation. INTERPOL provides an efficient and
accessible way for U.S. and European partners to share information on
lost and stolen passports and report foreign terrorist fighters and
criminals--both requirements for participation in the VWP--thereby
enhancing participating countries' screening capabilities. Following
the terrorist attacks in Paris in 2015 and Brussels in 2016, DHS worked
closely with Europol to share terrorist-related information and provide
investigatory support. The Department has assigned officers to Europol,
and to its ECTC, to facilitate the exchange of information with
European counterparts and to enhance cooperation on investigations of
terrorist and criminal networks.
Question 2b. Are we doing enough to assist our European allies in
their own counter-terrorism efforts?
Answer. In coordination with the Department of State, the
Department of Homeland Security has been working closely with European
allies and partners to enhance their counterterrorism efforts and
advance the Department's priorities in Europe. The Department's actions
range from Departmental leadership engagement to operational
collaboration with European counterparts across a wide range of
homeland security areas. Over the past few years, DHS efforts with
European partners have focused on enhancing border management and
screening, increasing information sharing, identifying and disrupting
terrorist travel, strengthening aviation security, and ensuring
European and E.U. initiatives are compatible with DHS policies and
programs.
The Department's active and on-going leadership engagement, as well
as subject-matter expert-level efforts, have helped European partners
take significant steps in improving counterterrorism capabilities over
the past 2 years. Significant achievements include: Enhancing border
controls to require systematic database checks of all persons crossing
the European Union's external Schengen borders (effective April 2017);
passage of the E.U. Passenger Name Record (PNR) Directive in April 2016
(to be implemented by May 2018); creating a new European Border and
Coast Guard Agency (effective October 2016); developing an ``E.U.
ESTA'' (the European Travel Information and Authorization System--
ETIAS, with a January 2020 implementation date); and improving the
interoperability of European law enforcement and immigration databases.
The European Union also established the European Counter Terrorism
Centre (ECTC) at Europol in January 2016 to support and facilitate E.U.
members to share terrorism-related information. DHS components work
closely with Europol and the ECTC to share terrorist-related
information and provide investigatory support.
Currently, DHS has been emphasizing the importance of providing
actionable intelligence information to front-line law enforcement and
border officials. The Department is also emphasizing the importance of
deploying PNR collection and analysis capabilities, as expeditiously as
possible. DHS has years of experience collecting and analyzing Advanced
Passenger Information (API, which is an airline manifest) and PNR (the
airline's reservation data) data and is providing expertise, lessons
learned, best practices, and technical assistance as European partners
develop similar systems. Most recently, the Department has been
prioritizing aviation security to address current and evolving threats,
and has been working closely with European allies to strengthen
aviation security globally. DHS has also reached agreements with
European partners to deploy technology, such as the Secure Real-Time
Platform (SRTP), to assist allies in conducting biometric checks on
travelers and migrants to help them detect terrorists, criminals, and
other nefarious actors at their borders. The United States works
closely with partners to ensure all CT traveler security programs are
harmonized and socialized broadly so that all available capabilities
are leveraged in this most effective way possible.
Much of the Department's efforts with European partners is
facilitated by the long-standing operational relationships established
through DHS component personnel deployed overseas in Europe. However,
the progress achieved over the past several years, and continued
efforts to advance DHS security and counter-terrorism priorities in
Europe, require active and sustained engagement at the Departmental
level to coordinate Department-wide efforts and assist European
partners and governing institutions in a complex and challenging
political environment. The Department's efforts must include continued
engagement with individual European countries, the governing
institutions of the European Union, and numerous European regional
security organizations.
The State Department has also supported the exchange of best
practices on countering violent extremism (CVE) through two-way
exchanges and the Strong Cities Network (SCN), a global network of 120
subnational governments. Through workshops, an on-line hub, and an
annual global meeting, SCN has built the capacity of local-level
practitioners in communities in Europe with known cases of
radicalization to violence in the European Union and its member states,
non-E.U. European countries, and numerous European regional security
organizations.
Question 3a. DHS supports a number of grants through the Office for
Community Partnerships to assist with Countering Violent Extremism.
Describe what benchmarks are in place to determine the success of these
grants?
Answer. The CVE Grant Program (CVEGP) through the Office for
Community Partnerships (now the Office for Terrorism Prevention
Partnerships) funded innovative projects in five focus areas that set
the baseline for future evaluation of terrorism prevention projects.
Given the diversity of these projects and the organizations
implementing them, each individual project has tailored performance
metrics and benchmarks for success over time. Prior to receiving access
to their project funds, each recipient was required to develop a
Project Implementation and Evaluation Plan (PIEP), which included
deliverable time lines, output and outcome measures, and evaluation
methods.
Some projects have very specific deliverables, such as training
curricula for law enforcement or community members and models for how
to implement terrorism prevention activities into existing public
health infrastructure. Where applicable, DHS has sought to ensure that
each grantee's deliverables present a unified and non-duplicative
approach, consistent with DHS messaging and existing programs, and
ensure that materials are cost-effectively leveraged for use by all DHS
grantees. DHS will evaluate the quality of these products and analyze
the successes and challenges found in piloting them and will determine
what is needed to package the products and deliver them to similar
communities for replication outside of the grant program.
To date, DHS has completed the review of the proposed metrics and
PIEPs. DHS is now mapping the performance measures from the individual
projects to the overall goals of the CVEGP to assess the grant program
as a whole, combine measures from similar projects, and compare the
relative impacts of different projects.
Question 3b. What success have you observed with these programs in
mitigating the recruitment of individuals to Foreign Terrorist
Organizations?
Answer. As noted above, the period of performance for the grants
started on August 1, 2017 and will run through at least the end of July
2019. Grantees' first quarterly reports were due on October 30,
covering August and September. Much of the activity in the first 2
months of performance has been administrative startup work (including
the drafting and submission of PIEPs), training development, content
development, community outreach, and planning. At this time, all the
projects appear to be on a solid footing to begin to deliver their core
work in the next couple of quarters, and to begin reporting output and
outcome measures in the late spring/early summer 2018.
Questions From Honorable Scott Perry for Elaine C. Duke
Question 1a. Please describe the Department of Homeland Security's
current programs, if any, to educate/train its officers about the
domestic jihad threat. Which individuals and/or groups does DHS use for
such training?
Question 1b. If there is no such training currently, please tell us
when you expect to begin such training.
Answer. DHS undertakes a very wide range of activities designed to
increase awareness and understanding among front-line defenders--
including DHS personnel--regarding the terror threat. This includes
frequent intelligence reporting, analysis, and trends related to global
jihadist groups such as ISIS and al-Qaeda. Such information is
essential to helping law enforcement and homeland security
professionals identify suspicious activity, signs of violent
radicalization, pre-operational terrorist planning, and more. Such
information is also incorporated into exercises, training, and other
activities designed to make sure we are prioritizing the highest risks
to the homeland and are prepared to defend against emerging terrorist
tactics. DHS also delivers a range of terrorism-prevention briefings
Nation-wide that help increase threat awareness for those on the front
lines protecting our communities, and these briefings highlight the
threat from global jihadist groups, as well as other violent
organizations seeking the threaten the American people and our
homeland.
Although the Federal Law Enforcement Training Centers (FLETC) does
not provide training programs exclusively focused on terrorism
prevention issues, FLETC delivers a broad spectrum of counterterrorism
training that encompasses myriad topics. FLETC's terrorism curriculum
covers areas such as terrorism prevention, the National
counterterrorism strategy, funding and material support, internet
exploitation, modes/methods of attack (i.e. Improvised Explosive
Devices, Weapons of Mass Destruction), surveillance detection,
Suspicious Activity Reports (SAR), the attack planning cycle, and
aircraft countermeasures. This curriculum resides within FLETC's three
primary basic programs. During fiscal year 2017, law enforcement
personnel from the following DHS entities attended a basic training
program at FLETC that includes curriculum in counterterrorism: Office
of Chief Security Officer, Federal Emergency Management Agency (Office
of Security), Federal Protective Service, Office of the Inspector
General, U.S. Coast Guard, U.S. Customs and Border Protection, U.S.
Secret Service, and U.S. Immigration and Customs Enforcement. This
terrorism curriculum is also delivered via several advanced programs
such as the Commercial Vehicle Counterterrorism Training Program, Land
Transportation Antiterrorism Training Program, Critical Infrastructure
Security and Resilience Training Program, Physical Security Training
Program, and the Protective Service Operations Training Program.
Through the Office of Civil Rights and Civil Liberties (CRCL), DHS
has partnered with the State Department since 2011 on the City Pair
Program, which connects U.S. cities with international counterparts
through two-way exchanges. In the past year this program has included
Boston, Denver, Los Angeles, Phoenix, and other U.S. cities. In
January, the State Department organized a Strong Cities Network
workshop in Washington that connected more than 50 leaders from Canada,
Germany, Ireland, Italy, the United Kingdom, and the United States for
a workshop. Such engagements have led to increased connectivity between
local-level communities domestically and internationally.
Question 2. What steps has DHS taken under the Trump administration
to develop & implement a system of ``extreme vetting'' for those who
seek entry as immigrants, non-immigrants, or refugees into the United
States?
Question 3. Please explain what is the DHS process for implementing
``extreme vetting'': For example, is there a system to investigate or
at least query intending entrants for ideological affinity to some
other alien or hostile legal system opposed to the U.S. Constitution,
like Islamic Law, as there was in the time of the Cold War for
communist associations?
Question 4. Does DHS question whether an individual holds beliefs
that may be antithetical to the U.S. Constitutions and its ideals? What
questions are included in the extreme vetting process?
Question 5. If DHS does not yet have such a system, please advise
when you will be ready to implement one.
Answer. The administration has improved every stage of the
screening and vetting process for U.S.-bound individuals. We have
launched sweeping efforts to improve our ability to detect terrorists,
criminals, and other nefarious actors trying to enter the United
States. These enhancements span virtually every pathway an individual
could use to travel to the United States--whether as a tourist,
business visitor, immigrant, or refugee. Applications have become more
rigorous. Background checks are being intensified. Travel and arrival
screening are being tightened. In addition, all countries must now
comply with a historic, first-ever U.S. information-sharing baseline--
or face travel restrictions and other consequences.
The Department of Homeland Security (DHS), in coordination with its
U.S. Government (USG) partners, seeks to identify support for terrorism
or terrorist ideologies as part of its vetting programs. Applicants for
immigration and travel benefits--on the written application and during
the in-person interview process--must answer multiple questions
relating to terrorist activity; membership in groups hostile to the
United States; willingness to take action on behalf of the United
States (such as military service); criminal history; and other
questions in order to gauge potential National security and/or public
safety threat. Adjudicating officers also query immigration,
intelligence community (IC), and law enforcement databases that contain
data relating to criminal and terrorist activity. Further, DHS is
developing its capability to investigate social media postings and
other information relating to the applicant in order to examine this
information for evidence of a terrorism nexus. In each of these
activities, DHS operates within the strong framework of safeguards,
training, and policies needed to ensure respect for privacy, civil
rights, and civil liberties.
More broadly, DHS continues to advance its capabilities to ensure
that all visitors, immigrants, and cargo are thoroughly vetted before
admission to the United States or a potential benefit is granted.
Accelerating previously planned initiatives and responding to
directives called for by the President's Executive Order (EO) 13780,
``Protecting the Nation from Foreign Terrorist Entry into the United
States,'' the Department has embarked on a path that comprehensively
addresses all aspects of the vetting continuum in close cooperation
with partner departments and agencies.
Executive Order 13780, Section 2 established--for the first time--
direct requirements for all countries' cooperation to support USG visa
and immigration vetting and adjudication. Among other factors
considered, it during the review, the USG established unprecedented
criteria for the exchange of identity and risk information with foreign
partners to help confirm a traveler is who they say they are and
whether they pose a criminal or terrorist threat. DHS is working with
interagency stakeholders and foreign partners to address information-
sharing deficiencies identified through the Section 2 review. As a
follow-on to these activities, Presidential Proclamation 9645 calls for
persistent monitoring of countries' compliance with the requirements.
DHS led the development of uniform baseline standards for screening
and vetting called for by the President in EO 13780, Section 5 through
enhancements to processes involving applications, interviews, and
system checks for immigration applicants. As a result, DHS is working
to standardize, as appropriate, the information collected on
immigration and foreign traveler forms and/or information systems.
Under Section 6(a) of EO 13780, the USG has reviewed the U.S.
Refugee Admissions Program (USRAP) application and adjudicative
processes to determine what additional procedures should be used to
ensure that individuals seeking admission as refugees do not pose a
threat to the security and welfare of the United States. At the
conclusion of this review, the Secretaries of State and Homeland
Security and the Director of National Intelligence issued a Joint
Memorandum entitled ``Resuming the United States Refugee Admissions
Program with Enhanced Vetting Capabilities.'' The Addendum to the Joint
Memorandum provides a summary of additional security enhancements that
were adopted as a result of the 120-day review that are applicable to
refugee applicants seeking resettlement in the United States.
DHS will continue to regularly review its screening processes in
order to improve the screening and vetting of subjects attempting to
enter the country.
Question 6. The U.S. electric grid is dangerously unsecured against
the threat of a nuclear Electro-Magnetic Pulse (EMP) attack or the
similar effects that can be generated by the sun. Please explain what
steps you & DHS are taking to secure the U.S. electric grid on an
expedited basis.
Answer. DHS continues to carefully assess the risk of
electromagnetic incidents to the homeland, including those posed by a
potential Electromagnetic Pulse (EMP) attack or a Geomagnetic
Disturbance (GMD). Although the intelligence community currently
assesses the likelihood of a high-altitude EMP attack is low, the
consequences of a successful EMP attack or a major GMD could include
significant damage to portions of the Nation's electric grid and
communications infrastructure. Pursuant to law, and working closely
with our interagency partners such as the Department of Energy, DHS is
finalizing a strategy to protect the Nation's critical infrastructure
from EMP and GMD. The strategy will outline the Department's approach
to improve EMP and GMD risk awareness, promote preparedness actions to
reduce the impacts from EMP, and facilitate response and recovery
should an incident occur. Additionally, DHS, in collaboration with
other partners, is working to help critical infrastructure owners and
operators manage EMP and GMD risk within existing structures for all-
hazards and all-threats risk management.
Question 7. Understanding that there is a ``Red-Green Axis'' of
domestic enemies that includes the Muslim Brotherhood--arguably the
oldest and largest Sharia-supremacist organization in the world--as
well as the Black Lives Matter movement and myriad anarchist/communist
entities operating in a collaborative way in the United States, what
steps has DHS taken to confront that Axis? Does DHS have an organized
training program for its agencies & officers that familiarizes them
with the elements, ideology & operations of the Red-Green Axis? If so,
please describe that training program. If not, why not & when do you
expect to have such a program in place?
Answer. DHS prepared its officers and front-line defenders to be
aware of--and prepared to respond to--a wide range of threats to the
United States, including from terrorist organizations that may target
Americans. DHS looks to the actions and intentions of a range of actors
who pose, or may pose, a threat to the homeland, pursuant to the U.S.
Constitution and DHS's statutory authorities, and makes judgments based
on intelligence and law enforcement information. DHS assesses
operational and ideological connections between a variety of threat
actors, institutes policies, and carries out operations to address
threats or violations of law. In doing so, DHS respects the privacy,
civil rights, and civil liberties of all Americans. DHS terrorism
prevention activities are broad enough to address the spectrum of
terrorist activity in the United States, including through awareness
trainings and other programs.
Question 8. Please describe your understanding of Antifa, its
component elements, ideology, international connections, tactics & the
DHS operational plan to counter its activities & influence.
Answer. DHS regularly reports on threats to the homeland, including
both domestic violent extremists and terrorist groups. Specifically, on
August 9, 2017, prior to the events in Charlottesville, Virginia, the
DHS Office of Intelligence & Analysis disseminated to its Federal,
State, local, Tribal, and territorial customers a product referencing
``antifa,'' noting that: ``We assess that anarchist extremists' use of
violence as a means to oppose racism and white supremacist extremists'
preparations to counterattack anarchist extremists are the principal
drivers of violence at recent white supremacist rallies. Anarchist
extremists planned to violently oppose the rallies via social media and
flyer campaigns after they were announced by the white supremacist
organizers . . . We assess that a heavily promoted white supremacist
rally planned for 12 August 2017 in Charlottesville, Virginia, could be
among the most violent to date . . . Anarchist extremists and white
supremacist extremists on-line are calling on supporters to be prepared
for or to instigate violence at the 12 August rally. For instance, a
probable white supremacist posted on-line a ` . . . call to arms . . .
antifa must be destroyed,' according to DHS open-source reporting. We
judge `antifa' in this context to mean probable anarchist extremists,
who often identify as `antifa' or anti-fascists.'' The Office of
Terrorism Prevention Partnerships (OTPP) and other DHS operational
components will continue to work with our State and local partners to
enhance their operational capabilities to prevent those who seek to
radicalize or inspire violent extremism in our communities. While the
current review of terrorism prevention policy and programs is reshaping
the DHS operational plan, the plan will largely focus on programs that
cover at least one of four lines of effort: (1) Prioritizing education
and community awareness; (2) focusing on counter-recruitment; (3)
emphasizing the importance of early warning; and (4) looking at what
more can be done to intervene with individuals whom might commit acts
of violence.
Questions From Ranking Member Bennie G. Thompson for Elaine C. Duke
Question 1. DHS has stated that we are pushing our border security
strategies and pressing foreign partners to enhance their security. On
November 30, 2015, the Obama administration implemented several new
enhancements to the Visa Waiver Program that increased security and
improved the efficiency of traveler screening under this popular
program. On December 15, 2015, the House passed H.R. 158, the Visa
Waiver Program Improvement and Terrorist Travel Prevention Act, which
was signed into law on December 18, 2015. How are you building on such
efforts to work most effectively with our European counterparts to aid
them in identifying and disrupting future attacks?
Answer. The Department maintains close cooperation with European
allies to combat terrorism, including the threat posed by known and
suspected terrorists (KST). DHS cooperates with our international
counterparts in a range of ways to ensure Europeans radicalized to
violence are unable to travel to the United States via the Visa Waiver
Program (VWP).
Most European allies--including 23 of 28 European Union (EU) member
states and 7 non-E.U. countries--participate in the VWP. Since 1986,
the VWP has evolved from a travel facilitation program into a
comprehensive security partnership between the United States and VWP
countries. Program countries must meet stringent security requirements
to ensure their designation does not pose a risk to U.S. National
security, law enforcement, or immigration enforcement interests. These
requirements include, but are not limited to: Implementing a series of
arrangements to share terrorism information; cooperating on criminal
threats; improving identity management procedures; and reporting lost
and stolen travel document information. To ensure compliance with VWP
requirements, DHS conducts assessments of each VWP country at least
once every 2 years--and engages in continuous monitoring between formal
assessments--to evaluate participants' counterterrorism, law
enforcement, immigration enforcement, border management, and identity
document security capabilities.
The United States and all VWP countries commit to share information
on KSTs through both formal bilateral arrangements (e.g., Homeland
Security Presidential Directive-6 (HSPD-6)), though the amount of
sharing varies per country. Additionally, sharing occurs via informal
intelligence and law enforcement channels, as well as through
international organizations, such as International Criminal Police
Organization (ICPO-INTERPOL) and Europol. This sharing enriches U.S.
holdings, which enables the United States to more effectively identify
KSTs and take appropriate action to safeguard the United States.
Additionally, on December 15, 2017, Secretary Nielsen announced
additional targeted enhancements that further strengthen the Program.
These enhancements will not only raise security standards, but also
further deepen existing security partnerships, therefore making it much
likelier for countries to detect terrorist travel and safeguard
themselves in the aviation security environment. These enhancements
include:
Requiring VWP countries to fully implement their existing
information sharing arrangements by systematically screening
travelers crossing their respective borders against U.S.
counterterrorism information.
Improving the assessments DHS conducts on the effectiveness
of VWP countries' safeguards against insider threats in the
aviation security environment; and,
Requiring VWP countries having a higher rate of visitors
overstaying the terms of their admission into the United States
to initiate a public information campaign to educate their
nationals on the conditions for admission into the United
States.
In addition to the aforementioned new requirements, Secretary
Nielsen called on Congress to codify existing VWP requirements to
bolster efforts in the following areas:
Reporting of foreign terrorist fighters to multilateral
organizations, such as INTERPOL and EUROPOL;
Systematically collecting and analyzing passenger travel
data (Advance Passenger Information/Passenger Name Records);
and
Concluding arrangements to permit U.S. Federal Air Marshals
to operate on-board U.S. air carriers for last-point-of-
departure flights to the United States.
As in earlier rounds of enhancements, initial implementation will
focus on cooperative steps to support VWP countries meeting the new
requirements. This announcement starts an engagement process wherein
the U.S. Government will work with each VWP country on a bilateral
basis to inform them of the new requirements, assess their current
levels of compliance, and develop strategies geared to implement any
outstanding requirements. This approach has yielded substantial
economic and security benefits for the United States and its partner
countries.
Further, the U.S. Government conducts extensive vetting of all in-
bound travelers. All individuals seeking legitimate air or maritime
travel to the United States are known to the Department prior to their
departure because of Advance Passenger Information (API) reporting
requirements by all airlines and ships bound for the United States, and
in the case of non-immigrants, either the submission of an Electronic
System for Travel Authorization (ESTA) application for travel under the
VWP or a visa application. The Department vets this data to determine
whether the prospective traveler should receive additional screening or
be denied boarding. In all instances, U.S. Customs and Border
Protection (CBP) Officers retain final authority on granting admission
to individuals arriving at U.S. ports of entry.
In addition, individual European partner countries and the European
Union collectively have taken significant steps to improve
counterterrorism and border security capabilities across Europe over
the past 2 years, to include: Creating a new European Border and Coast
Guard Agency (effective October 2016); enhancing border controls to
require systematic database checks of all persons crossing Europe's
external Schengen borders (effective April 2017); and passing the E.U.
Passenger Name Record (PNR) Directive in April 2016 (to be implemented
by May 2018). European partners also established the European
Counterterrorism Centre (ECTC) at Europol in January 2016; the ECTC
supports and facilitates E.U. member states to share terrorism-related
information. Additionally, the European Union is building its own ESTA-
like pre-travel screening system, known as the European Travel
Information and Authorization System (ETIAS), allowing for greater
interoperability amongst its databases, and working to implement an
E.U.-wide biometric entry/exit system. The European Union anticipates
ETIAS being operational by 2020.
The Department continuously looks for new ways to build on existing
partnerships with European allies to respond to current and emerging
threats. For example, the Department has offered its expertise and
technical assistance to assist European partners in developing air
passenger data collection and analysis capabilities, and has conducted
numerous workshops for sharing best practices and collaborating on
travel trends and passenger targeting. The Department is also working
with a number of European partners to leverage both existing and new
information-sharing agreements to cooperate directly on vetting
priority travelers against our respective immigration, law enforcement,
and National security data at a system-to-system level. In addition,
the Department is working with 9 European countries to establish Pre-
clearance facilities at last-point-of-departure airports. Countries
participating in a Pre-clearance arrangement adopt a close and
continuous partnership with the United States that allows the
Department to leverage its full authorities and capabilities at
overseas locations to screen travelers prior to their departure for the
United States.
Multilateral partnerships, such as INTERPOL and Europol, facilitate
U.S.-European cooperation. INTERPOL provides an efficient and
accessible way for U.S. and European partners to share information on
lost and stolen passports and report foreign terrorist fighters and
criminals--both requirements for participation in the VWP--thereby
enhancing participating countries' screening capabilities. Following
the terrorist attacks in Paris in 2015 and Brussels in 2016, DHS worked
closely with Europol to share terrorist-related information and provide
investigatory support. The Department has assigned officers to Europol,
and to its ECTC, to facilitate the exchange of information with
European counterparts and to enhance cooperation on investigations of
terrorist and criminal networks.
Question 2a. In previous Congressional testimony, DHS officials
have described a shift in DHS countering violent extremism (CVE)
efforts, including changing the name of the Office for Community
Partnerships (OCP) to the Office of Terrorism Prevention Partnerships
(OTPP) and reporting to the Office of Partnership and Engagement (OPE),
rather than the Secretary. How will this shift and reconfiguration of
the program differ from the previous administration's CVE efforts?
Answer. The Office of Terrorism Prevention Partnerships (OTPP),
formerly named the Office for Community Partnerships (OCP), continues
to facilitate and support State, local, Tribal, territorial, and non-
Governmental, community-based efforts to implement prevention programs
within the United States that target radicalization and mobilization to
violence for all forms of terrorism. OTPP also provides greater clarity
about our mission of preventing terrorist recruitment and
radicalization to violence.
Since its establishment, and as appropriated by Congress, the
office had been funded through the Office of Partnership and Engagement
(OPE) for budget and administrative purposes, but previously reported
directly to the Secretary for policy and programmatic purposes during
its start-up phase. Now that the organization has matured, OTPP has
become a formal component of OPE, which will increase efficiency and
bolster resources and support for its role in the critical mission of
terrorism prevention. When OCP was established, it temporarily reported
to the Secretary on progress even though operational offices are not
typically part of the Office of the Secretary. This move completes the
expected transition, aligning with Congressional expectations.
OTPP is working with a broad range of stakeholders to implement,
mature, and strengthen its terrorism prevention programs and to improve
collaboration and coordination of Department activities. With this
institutionalized position, OTPP has greater resources and support to
strengthen the critical mission of terrorism prevention. OTPP's
alignment with OPE entities, including the Office of Intergovernmental
Affairs (IGA), the Private Sector Office (PSO), and the Office of State
and Local Law Enforcement (OSLLE), enhances engagement opportunities
with stakeholders across the country.
This renewed purpose emphasizes the mutual benefits of partnership
tools and objectives to advance DHS terrorism prevention programs. This
includes enhancing education and community awareness regarding the
threat, providing resources to support terrorism prevention
stakeholders where applicable, coordinating relevant DHS terrorism
prevention activities, actively countering terrorist radicalization and
recruitment, and promoting early warning so that our front-line
defenders can intervene to stop attacks and help prevent individuals
from going down the path to violence.
Question 2b. What factors drove your reexamination of CVE?
Answer. The persistent and evolving nature of the terror threat
demanded that we reexamine terrorism prevention programs and assess how
they could be strengthened. Groups like the Islamic State of Iraq and
Syria (ISIS) and al-Qaeda and its affiliates are focused on inspiring,
enabling, and directing attacks in our homeland, including by crowd-
sourcing attacks on social media and through the use of secure
communications to avoid detection. They are promoting do-it-yourself
tactics to more easily spread terror, such as the use of vehicle
ramming, guns, knives, and other methods. DHS has made it a top
priority to actively prevent terrorists from radicalizing and
recruiting individuals to violence within the homeland, and the
Department sought to ensure terrorism-prevention activities were
keeping up with the danger.
The following have been key principles guiding our reexamination:
Combating all forms of terror--in a threat- and risk-based,
intelligence-driven manner;
Prioritizing support to front-line defenders;
Measuring and evaluating effectiveness;
Complementing broader efforts to prevent other forms of
violence in our communities; and
Preserving civil rights and civil liberties.
Question 2c. What is the plan and time line for the CVE grant
program?
Answer. The plan and time line for the CVE grant program remain
unchanged. By way of review, former Secretary Kelly approved the CVEGP
awards in June 2017, making 26 grants totaling $10 million for 2 years
of programming to organizations that will work to improve the security
of our communities and prevent terrorism. Performance started on August
1, 2017 and will run through at least the end of July 2019. First
quarterly reports were due on October 30, covering August and
September. Much of the activity in the first 2 months of performance
has been administrative start-up work, training development, content
development, community outreach, and planning. At this time, all the
projects appear to be on a solid footing to deliver their core work in
the next few quarters, and to begin reporting output and outcome
measures in the late spring/early summer 2018.
Question 2d. Has DHS articulated an official strategy to replace
the previous administration's CVE strategy?
Question 2e. If not, does DHS intend to develop a new strategy?
Question 2f. If so, when will this strategy be delivered and
implemented?
Answer. DHS is conducting an in-depth review of its OTPP-run
terrorism prevention programs to ensure our efforts, and those of our
Federal, State, local, territorial, and private partners, are
integrated and coordinated to best address the threat. The resulting
posture will outline goals, objectives, and approaches for preventing
the radicalization and inspiration to violence from all forms of
violent extremism. Currently, DHS anticipates four primary lines of
effort: (1) Prioritizing threat awareness through education and
community engagement; (2) focusing on counter-recruitment; (3)
emphasizing the importance of early warning; and (4) focusing on
improving intervention and countering terrorist recidivism.
Pursuant to the most recent National Defense Authorization Act, the
administration is required to produce a National strategy on countering
violent extremism. DHS will participate in the development of this
strategy and develop clear guidance on how it is implementing the
administration's terrorism-prevention policies.
Question 2g. How will the new Office of Terrorism Prevention
Partnerships conduct its training for field representatives differently
than past DHS CVE efforts?
Answer. OTPP field representation and the development and
deployment of community awareness trainings have not been altered at
this time. OTPP continues to work with other DHS components and its
interagency partners to develop, update, and deploy Community Awareness
Briefings and other training packages when requested in the field.
However, we are actively examining ways to help States and localities
stand up terrorism prevention programs Nation-wide, as it is clear one
of the primary shortfalls of CVE policy previously was that such
efforts were too centrally managed and failed to keep pace with the
diffuse nature of the threat.
Question 3. In DHS testimony on November 30, 2017, we heard that
``One of the major things we've done very recently is open the Office
of Terrorism Prevention Partnerships, which is making sure every piece
of information we get, the State and local governments have, to be at
the point to notice and deal with any types of hate crimes and these
groups. And training and information sharing--is two of our major
efforts.'' Please explain in detail what this means and how this
process will be carried out.
Answer. As I noted before the committee, in addition to
counterterrorism, the Department is re-dedicating itself to terrorism
prevention. Americans do not want us to simply stop violent plots, they
want us to keep them from materializing in the first place. As part of
this effort, we have launched an end-to-end review of all DHS
``countering violent extremism,'' or CVE, programs, projects, and
activities. In the coming months we will work to continue to ensure our
approach to terrorism prevention is risk-based and intelligence-driven,
focused on effectiveness, and provides appropriate support to those on
the front lines who we rely on to spot signs of terrorist activity.
DHS efforts to combat terrorist recruitment and radicalization to
violence fall into four primary lanes.
First, we are prioritizing education and community awareness.
Before terrorists have a chance to reach into communities and inspire
potential recruits, we are making sure those communities are aware of
the threat. This includes extensive outreach to States and localities,
awareness briefings, intelligence products regarding threats and
trends, and training for front-line defenders and civic leaders.
Second, we are focused on counter-recruitment. We know that
terrorists will continue to seek new followers through persuasion and
propaganda, which is why we must support efforts to actively push back
against such solicitations. This includes continuing to encourage non-
governmental organizations to counter-message terrorist propaganda,
leveraging credible voices to dissuade potential recruits, working with
social media companies and supporting their efforts to make on-line
platforms more hostile to terrorists, and more.
Third, we are emphasizing the importance of early warning. Even
with strong community awareness and counter-recruitment, terrorist
groups will succeed in reaching at least some susceptible minds. That
is why we are working to detect individuals on the path to
radicalization to violence earlier. This includes building trust
between communities and law enforcement, expanding ``If You See
Something, Say SomethingTM''-style campaigns, and ensuring
there are appropriate and confidential means for the public to provide
tips regarding suspicious activity.
Finally, DHS and DOJ are looking at what more can be done to
intervene to prevent suspects from committing acts of violence and also
to counter terrorist recidivism. It is inevitable that some individuals
will be recruited, radicalized, and attempt to engage in terrorist
activity. So we want to make sure that the right stakeholders can
intervene before they do so--and that once they are caught they do not
return to violence. Our grant programs have focused on some of these
intervention efforts, and DHS is also working with interagency partners
on ways to better combat terrorist recidivism.
This summer the Department announced the award of $10 million in
grants to 26 organizations to advance terrorism prevention efforts.
These grants will help inform our efforts and illuminate what works--
and what doesn't work--in combating terrorist recruitment and
radicalization in our homeland. We look forward to sharing the results
with Congress.
I also want to note that although our terrorism prevention
activities will be risk-based, they will also be flexible enough to
address all forms of terrorism. Any ideologically-motivated violence
which is designed to coerce people or their governments should be
condemned, prevented, and countered. That is why our approach must be
agile so it can help mitigate everything from the global jihadist
threat to the scourge of violent racial supremacy. It must also engage
and not alienate communities targeted by these violent extremists. This
means working with people of all races, religions, and creeds as
partners in the fight against terrorism.
Question 4. Do you believe that HVEs present an emerging threat to
the homeland? How can we be more effective in preventing these attacks
and ``lone-wolf'' attacks?
Answer. The Homegrown Violent Extremist (HVE) threat remains a
primary focus of terrorism prevention efforts, and the work of the
Office of Terrorism Prevention Partnerships (OTPP) focuses on improving
efforts to bring an end to the radicalization and recruitment to
violence by individuals in the United States. To that end, OTPP
constantly re-assesses its programs against the latest information and
research on these topics. For example, recent DHS Science & Technology
Directorate-funded research has noted that law enforcement plays an
important role in early detection and disruption of plots in the United
States, and that early warning and awareness by friends and family is
also important. DHS is working to support these early warning systems,
particularly mechanisms that allow for bystanders to report early
concerns and bolster intervention efforts, through our current research
funding as well as through our grant programs such as the CVE grant
program. DHS also works closely with our partners at the FBI through
the Joint Terrorism Task Forces (JTTFs) that bring Federal, State, and
local agencies together on one team. The JTTFs allow members to
leverage one another's skills, authorities, and accesses to prevent and
disrupt terrorist attacks across the country. The JTTFs also build
relationships between the community and law enforcement on the front
line, which is particularly important to combatting terrorism.
Question 5a. The FBI and DHS produced an intelligence bulletin on
May 11, 2017, that purported to warn about the ``persistent threat of
lethal violence'' from white supremacist groups. The data reported in
the bulletin claimed there were 49 homicides in 26 attacks from 2000 to
2016, but these numbers are significantly lower than those reported by
academics who study this issue.
Please provide a full list of the 49 homicides in 26 attacks from
2000 to 2016.
Answer. DHS defers to the Department of Justice and the Federal
Bureau of Investigation as this is their data.
Question 5b. Do these discrepancies affect local law enforcement
efforts to police such groups?
Answer. This is a local law enforcement question. DHS defers to
local law enforcement agencies as to how they deploy investigative and
financial resources to combat domestic terrorism.
Question 6a. Between 1977 and 2016, there have been hundreds of
crimes committed against reproductive health care facilities and
abortion providers, including at least 11 murders, 26 attempted
murders, 42 bombings, 186 arsons, 98 attempted bombings or arsons, and
411 clinic invasions. Please provide any data that your agency has used
to track crimes targeting reproductive health care facilities and
abortion providers.
Does violence aimed at reproductive health care clinics, doctors,
patients, and staff fall under the Federal statutory definition of
``domestic terrorism''?
If not, when would anti-abortion violence rise to the level of
``domestic terrorism''?
Answer. DHS does not track crimes related to reproductive health
care facilities or abortion providers. The FBI is the lead agency for
the investigation of both criminal and terrorism acts and is better
positioned to respond to this question.
We would defer to DOJ for this response.
See answer above.
Question 6b. Are the Department of Homeland Security, the FBI, and
the National Counterterrorism Center currently committing funding and
staff to investigate violence against reproductive health care clinics,
doctors, patients, and staff in order to identify whether any patterns
and practices emerge?
If yes, please explain what level of personnel and budget is being
provided.
If not, why not?
Answer. We would defer to the FBI and NCTC for further response.
The Attorney General, generally acting through the FBI, has lead
responsibility for criminal investigations of terrorist acts or threats
where such acts are within the Federal criminal jurisdiction of the
United States.
Questions From Honorable Val Demings for Elaine C. Duke
Question 1. Most of the administration's CVE efforts to date have
been focused on Muslim communities. However, recent reports, arrests,
and convictions indicate that new recruits to ISIS do not have a
particular ethnic background and are not always familiar with Islam.
Moreover, as we have seen in the recent tragic events in
Charlottesville and Las Vegas, not all ``extremists'' are adherents of
Islam. How are the CVE programs being tailored to target a wider
audience to reach would-be perpetrators of extremist attacks?
Answer. As underscored in my testimony, the Department's terrorism
prevention efforts address all forms of terrorism. DHS constantly
updates our organizational and operational response to the threat from
radicalization and recruitment to violence in the United States, and so
acts to ensure its terrorism prevention programs focus on the threat,
not a particular geographic, religious, or other community.
Question 2a. The agencies engaged in CVE programs have both law
enforcement and intelligence-gathering responsibilities. However, the
purpose of CVE programs is to foster substantive relationships with the
community and to reach vulnerable populations prior to radicalization.
Are there are other Federal agencies that are better equipped to carry
out that mission?
Answer. OTPP specifically does not have a law enforcement or
intelligence gathering mission. DHS community partnership terrorism
prevention efforts do not include gathering intelligence for the
purpose of potential criminal prosecution. OTPP works closely with a
number of non-security Federal agencies that may have equities and
interest in supporting terrorism prevention efforts through the
office's leadership of the interagency CVE Task Force. These include,
but are not limited to, the Department of Health and Human Services,
Department of Education, and the U.S. Digital Service. To make their
contributions effective, OTPP believes that continued and regular
coordination through the CVE Task Force is required to build an
effective interagency response to the threat. However, it is also
important to note that State and local law enforcement agencies must
remain a part of this effort, especially given their community policing
and engagement activities that support numerous forms of violence
prevention without gathering intelligence for criminal justice or other
purposes.
Question 2b. How do you disengage your law enforcement and
intelligence-gathering mission when participating in CVE activities?
Answer. The DHS terrorism prevention programs that are operated by
OTPP do not have a law enforcement or intelligence-gathering mission,
as OTPP terrorism prevention efforts do not include gathering
intelligence for the purpose of potential criminal prosecution.
Question 2c. What safeguards are in place to protect the civil
liberties of the communities that your agencies are engaging?
Answer. OTPP works closely with our DHS Office of Civil Rights and
Civil Liberties to ensure that we protect the civil liberties of the
communities with whom we are engaging.
Questions From Honorable Scott Perry for Christopher A. Wray
Question 1a. How many supervisory agents or analysts are in the
entire FBI?
Question 1b. Do you think that number is adequate?
Answer. Response was not received at the time of publication.
Question 2a. What is the ratio of supervisory positions in the
field versus at headquarters?
Question 2b. Do you think that ratio is adequate?
Answer. Response was not received at the time of publication.
Question 3. How many levels of command are between desk analysts
and the director, to get the director to sign off on substantial
techniques?
Answer. Response was not received at the time of publication.
Question 4. How many levels of command are between the line level
and director?
Answer. Response was not received at the time of publication.
Question 5a. How many assistant directors are in the FBI?
Question 5b. How have the numbers of assistant directors grown from
2 to 16 since about 2001?
Question 5c. Do you believe that this growth is justified?
Question 5d. What do you plan to do about it?
Answer. Response was not received at the time of publication.
Question 6a. Where did the FBI get the personnel to staff these
assistant directorates at headquarters?
Question 6b. Did the personnel come from supervisory agents and
analysts in the field?
Question 6c. Do you consider it effective to take an agent who
worked 3-6 years on a case in the field, and remove that agent from the
field to spend the rest of his or her career as a bureaucrat?
Answer. Response was not received at the time of publication.
Question 7. Why did highly-trained field agents with specific
skills seek transfers to cities where their skills were not needed?
Answer. Response was not received at the time of publication.
Question 8. Why has the FBI leadership reassigned end-of-career
bureaucrat supervisory agents, who have spent years out of the field,
and sent them back to run field investigations?
Answer. Response was not received at the time of publication.
Question 9. The Secret Service has thwarted 100 percent of
terrorist attacks and assassination attempts on those under its
protection since 1981. How many terrorist attacks has the FBI thwarted
since that time?
Answer. Response was not received at the time of publication.
Question 10a. How many ``lone wolf'' terrorists were known to the
FBI before they murdered and maimed innocent Americans?
Why is this number so high?
Answer. Response was not received at the time of publication.
Question 10b. If you have so many agents and analysts, why does the
FBI let so many extremists remain under observation so that they are
free to kill?
Answer. Response was not received at the time of publication.
Question 11. How many successful terrorist attacks did the FBI know
about before they occurred?
Answer. Response was not received at the time of publication.
Question 12. If the FBI used Secret Service methods against its
targets, would the FBI have had greater success?
Answer. Response was not received at the time of publication.
Question 13. It appears that the FBI, for the past decade or more,
has taken a political or policy decision not to move against
individuals who espouse violent jihad in this country, and has chosen
to wait until after not-yet-violent jihadists go violent before the FBI
takes action. Why is this so?
Answer. Response was not received at the time of publication.
Question 14a. Are you satisfied that FBI training is free from bias
that would blind agents and analysts to certain ideological threats?
Question 14b. Will you commit to a full-ranging review of FBI
training curriculum concerning domestic terrorist threats, including
jihadists?
Answer. Response was not received at the time of publication.
Question 15a. Does the FBI have a doctrine and mechanism for
considering foreign non-governmental organizations that function like
intelligence services, to be essentially a non-governmental foreign
intelligence service?
Question 15b. How can Congress help you improve these capabilities?
Answer. Response was not received at the time of publication.
Question 16a. How many terrorists in the United States have had
connections with, indoctrination or training from, or other ties with
the Muslim Brotherhood or its operatives and fronts?
Question 16b. Do you think the Muslim Brotherhood should be
designated as a terrorist organization? Why or why not?
Answer. Response was not received at the time of publication.
Question 17a. What is the formal or informal name of the FBI
grouping that had been assigned to monitor the Muslim Brotherhood in
the United States?
When was that grouping created?
Answer. Response was not received at the time of publication.
Question 17b. How many agents and analysts were assigned to that
grouping at its peak?
Answer. Response was not received at the time of publication.
Question 17c. How many agents and analysts are assigned to monitor
the Muslim Brotherhood and its fronts and affiliates now?
Answer. Response was not received at the time of publication.
Question 17d. Who in the FBI made the decision to slash monitoring
of the Muslim Brotherhood and its fronts and affiliates?
The committee is told that Deputy Director McCabe made the
decision. Why is he still there?
Was the decision fact-driven or need-driven, or was it politically
or ideologically driven?
When was that decision made?
Answer. Response was not received at the time of publication.
Question 18. Does the FBI use membership in the Muslim Brotherhood
or its fronts or controlled organizations as criteria when evaluating
the recruitment of FBI agents, analysts, contractors, and personnel?
Answer. Response was not received at the time of publication.
Question 19a. When did the FBI admit known Muslim Brotherhood
operatives and assets to train agents and analysts?
What has been the FBI's screening procedures against Muslim
Brotherhood operatives and assets seeking to influence the FBI through
training and other programs?
Answer. Response was not received at the time of publication.
Question 19b. What are the FBI's successes over the past 10 years
in preventing Muslim Brotherhood operatives and agents from penetrating
the Federal Government?
Answer. Response was not received at the time of publication.
Question 19c. How many Muslim Brotherhood loyalists are employed as
FBI agents, analysts, and staff?
Answer. Response was not received at the time of publication.
Question 20. Does the FBI consider Russia to be an ally against
Islamic-inspired terrorism?
How has the FBI relied on the Russian security and intelligence
services for information on terrorists who threaten the United States?
Answer. Response was not received at the time of publication.
Question 21a. I think all of us want to salute the FBI for its
brilliant Operation Ghost Stories, which tracked a Russian SVR
``illegals'' penetration network for about a decade, ending in 2010.
How does the FBI describe the difference between counterespionage
and counterintelligence?
Answer. Response was not received at the time of publication.
Question 21b. What is the percentage of FBI resources devoted to
counterespionage, as opposed to counterintelligence?
Answer. Response was not received at the time of publication.
Question 22. How many Chinese influence operations--not espionage
operations--has the FBI uncovered or disrupted over the past 10 years?
Answer. Response was not received at the time of publication.
Question 23. What is the FBI's assessment of the resources that the
Russian and Chinese intelligence services are using to conduct covert
influence operations aimed at the American public and leadership?
Answer. Response was not received at the time of publication.
Question 24a. Did the FBI exhaust all reasonable means to complete
a full damage assessment of the Robert Hanssen penetration?
A witness has come forward to state that he attempted on multiple
occasions to alert the Hanssen Damage Assessment Team of compromises to
FBI methods against Chinese intelligence operations, and that the FBI
was not interested. Would you comment?
Answer. Response was not received at the time of publication.
Question 24b. Witnesses say that FBI Director Mueller wanted the
Hanssen Damage Assessment Team to wrap up quickly and shut down because
it was uncovering so much information damaging to the FBI. Would you
comment?
Answer. Response was not received at the time of publication.
Question 24c. How confident is the FBI that the Russians have made
no further Hanssen-style penetrations of the FBI or other Federal
agencies?
Answer. Response was not received at the time of publication.
Question 24d. How does the FBI arrive at such a level of
confidence?
Answer. Response was not received at the time of publication.
Question 25a. Are you satisfied with the quality and thoroughness
of background investigations for Government contractors to receive
security clearances?
Answer. Response was not received at the time of publication.
Question 25b. How can these background investigations be improved?
Answer. Response was not received at the time of publication.
Question 26a. What criminal and National security investigations
did the FBI conduct in to Chinese hacking of the Office of Personnel
Management's database, that included all Classified information on
individuals who had applied for or received clearances?
Is/are those investigations still under way?
Answer. Response was not received at the time of publication.
Question 26b. Why were no criminal charges recommended for the
Justice Department to pursue?
Answer. Response was not received at the time of publication.
Question 27a. How is the FBI's foreign defector program working?
Does the FBI have sufficient human and material resources to attract
foreign defectors, debrief them, and help them start new lives without
threat of revenge or assassination?
Why did the FBI not seek to induce any of the 10 SVR agents
(illegals) arrested in 2010 under Operation Ghost Stories to defect?
Answer. Response was not received at the time of publication.
Question 27b. Why did the FBI go along with the near-immediate
repatriation of the 10 SVR illegals to Russia after they were arrested,
and not push for a better trade with Moscow, or other concessions?
Answer. Response was not received at the time of publication.
Question 27c. Since the United States has been squeezing members of
Putin's inner circle, what is the FBI's strategy to induce more
defections from the Russian services and political leadership?
Answer. Response was not received at the time of publication.
Question 27d. Why did Russian defector Mikhail Lesin, a longtime
Putin insider, begin talks with the FBI to defect in about 2015?
Answer. Response was not received at the time of publication.
Question 27e. Was Lesin under FBI supervision in October-November
2015?
Answer. Response was not received at the time of publication.
Question 27f. Lesin died a violent death at the Dupont Circle Hotel
in November, 2015. The Russian government seemed undisturbed by the
death and immediately dismissed Lesin's death as due to natural causes.
A lengthy medical examination ruled in 2016 that he died of multiple
blunt-force trauma to the head, neck, torso, and extremities. The cause
of death was later said to have been due to natural causes.
How does the FBI account for this discrepancy?
Why did the FBI fail to protect Lesin as he negotiated his
defection?
Do you think that the Russian government may have Lesin
assassinated?
Answer. Response was not received at the time of publication.
Question 28. We understand that the upper management of the FBI,
until your appointment as director, was the cause of unusual morale
problems in field offices across the country. What do you intend to do
to improve FBI morale?
Answer. Response was not received at the time of publication.
Question 29. From a National security perspective, do you think
it's an urgent priority for the FBI to consolidate to a new
headquarters?
Answer. Response was not received at the time of publication.
Question 30. The GSA and FBI have been working for years on the FBI
headquarters consolidation project, and in July announced that they
would cancel procurement due to lack of sufficient funding. Does the
FBI have a planned viable site for the new headquarters?
Answer. Response was not received at the time of publication.
Question 31. How can the FBI combine headquarters consolidation
with managerial and training reforms to improve the Bureau's
capabilities against hostile foreign intelligence, subversion, and
terrorism, and other threats to homeland security?
Answer. Response was not received at the time of publication.
Question 32. What steps has the FBI taken to reverse the Obama
administration's purge of training courses & information about Islam,
jihad, shariah & the Muslim Brotherhood?
Answer. Response was not received at the time of publication.
Question 33. What training programs has the FBI instituted on these
topics since the beginning of the Trump administration?
Answer. Response was not received at the time of publication.
Question 34. Who specifically by name & affiliation are the
contract training instructors the FBI uses to provide instruction to
its agents about the domestic threat from the Islamic Movement?
Answer. Response was not received at the time of publication.
Question 35. Please describe in at least general terms what
programs the FBI currently implements to monitor potentially seditious
activity inside U.S. mosques & Islamic Centers known to be affiliated
w/the Muslim Brotherhood. Does the FBI currently have a law enforcement
objective and program to investigate material support to terrorism as
enabled by the financial institution of zakat, which we know under
Islamic Law to be a funding mechanism for jihad terror?
Answer. Response was not received at the time of publication.
Question 36. Antifa operates across the United States in ways that
involve at least potentially criminal interstate activities, such as
inciting a riot & conspiracy to incite a riot. What is the FBI doing to
counter Antifa, including to investigate & shut down its funding
sources?
Answer. Response was not received at the time of publication.
Question 37. Understanding that there is a ``Red-Green Axis'' of
domestic enemies that include the Muslim Brotherhood, the Black Lives
Matter movement & myriad anarchist/communist entities operating in a
collaborative way in the United States, what steps has the FBI taken to
confront that Axis?
Answer. Response was not received at the time of publication.
Question 38. Please describe your understanding of Antifa, its
component elements, ideology, international connections, tactics & the
FBI's operational plan to counter its activities & influence.
Answer. Response was not received at the time of publication.
Question 39. Does the FBI have an organized training program for
its agencies & officers that familiarizes them with the elements,
ideology & operations of the Red-Green Axis?
Answer. Response was not received at the time of publication.
Question 40. If so, please describe that training program. If not,
why not & when do you expect to have such a program in place?
Answer. Response was not received at the time of publication.
Questions From Ranking Member Bennie G. Thompson for
Christopher A. Wray
Question 1a. The FBI has previously opened investigations into
leaders of the Black Lives Matter Movement. Could you explain whether
Black Lives Matter members fall under the umbrella of Black Identity
Extremists?
Question 1b. Does the FBI consider the Black Lives Matter movement
a violent extremist movement?
Answer. Response was not received at the time of publication.
Question 2a. Is it a priority for you to ensure that intelligence
products are free from racial, cultural, and religious biases?
Question 2b. Will the Bureau conduct a comprehensive racial,
cultural, and religious review of all intelligence products and
materials within the next year?
Answer. Response was not received at the time of publication.
Question 3. Are far right-wing groups responsible for the most
domestic terrorist acts and attempted domestic terrorist acts in the
United States? Please explain.
Answer. Response was not received at the time of publication.
Question 4. Please provide a full breakdown of the number of open
domestic terrorism assessments, preliminary investigations, and full
investigations. For comparison, provide the same information for
international terrorism assessments, preliminary investigations, and
full investigations.
Answer. Response was not received at the time of publication.
Question 5a. Being that there is no criminal statute of ``domestic
terrorism,'' how does the FBI track charges stemming from domestic
terrorism investigations?
Question 5b. For instance, is there data that tracks how many cases
investigated as domestic terrorism result in murder charges, or
racketeering charges, etc.?
Answer. Response was not received at the time of publication.
Question 6a. It is often said that the United States cannot rely on
investigations and arrests to thwart terrorism in the homeland.
What is the FBI doing to terms of CVE programing and operations?
Question 6b. Please confirm, FBI has dismantled and ended all
operations related to Shared Responsibility Committees program.
Answer. Response was not received at the time of publication.
Question 7a. In June 2014, the DOJ, under former Attorney General
Holder, announced the reestablishment of its Domestic Terrorism
Executive Committee, which had been defunct for several years. The
committee includes DOJ leadership and is co-chaired by a member of the
U.S. Attorney community, the DOJ National Security Division, and the
FBI. It is designed to promote information sharing and collaboration in
Federal efforts to fight domestic terrorism. Additionally, in April,
Attorney General Sessions established a Hate Crimes Subcommittee as
part of DOJ's Task Force on Crime Reduction and Public Safety.
Please provide an update on the work of this group.
Question 7b. What specifically is the FBI's role?
Answer. Response was not received at the time of publication.
Question 8a. Do you believe that HVEs present an emerging threat to
the homeland?
Question 8b. How can we be more effective in preventing these
attacks and ``lone wolf'' attacks''?
Answer. Response was not received at the time of publication.
Question 9a. The FBI and DHS produced an intelligence bulletin on
May 11, 2017, that purported to warn about the ``persistent threat of
lethal violence'' from white supremacist groups. The data reported in
the bulletin claimed there were 49 homicides in 26 attacks from 2000 to
2016, but these numbers are significantly lower than those reported by
academics who study this issue.
Please provide a full list of the 49 homicides in 26 attacks from
2000 to 2016.
Question 9b. How do you account for these discrepancies?
Question 9c. Do these discrepancies affect local law enforcement
efforts to police such groups?
Answer. Response was not received at the time of publication.
Question 10a. Between 1977 and 2016, there have been hundreds of
crimes committed against reproductive health care facilities and
abortion providers, including at least 11 murders, 26 attempted
murders, 42 bombings, 186 arsons, 98 attempted bombings or arsons, and
411 clinic invasions. Please provide any data that your agency has used
to track crimes targeting reproductive health care facilities and
abortion providers.
Does violence aimed at reproductive health care clinics, doctors,
patients, and staff fall under the Federal statutory definition of
``domestic terrorism''?
If not, when would anti-abortion violence rise to the level of
``domestic terrorism''?
Question 10b. Are the Department of Homeland Security, the FBI, and
the National Counterterrorism Center currently committing funding and
staff to investigate violence against reproductive health care clinics,
doctors, patients, and staff in order to identify whether any patterns
and practices emerge?
If yes, please explain what level of personnel and budget is
being provided.
If not, why not?
Answer. Response was not received at the time of publication.
Questions From Honorable Val Butler Demings for Christopher A. Wray
Question 1. Most of the administration's CVE efforts to date have
been focused on Muslim communities. However, recent reports, arrests,
and convictions indicate that new recruits to ISIS do not have a
particular ethnic background and are not always familiar with Islam.
Moreover, as we have seen in the recent tragic events in
Charlottesville and Las Vegas, not all ``extremists'' are adherents of
Islam. How are the CVE programs being tailored to target a wider
audience to reach would-be perpetrators of extremist attacks?
Answer. Response was not received at the time of publication.
Question 2a. The agencies engaged in CVE programs have both law
enforcement and intelligence-gathering responsibilities. However, the
purpose of CVE programs is to foster substantive relationships with the
community and to reach vulnerable populations prior to radicalization.
Are there are other Federal agencies that are better equipped to
carry out that mission?
Answer. Response was not received at the time of publication.
Question 2b. How do you disengage your law enforcement and
intelligence-gathering mission when participating in CVE activities?
Answer. Response was not received at the time of publication.
Question 2c. What safeguards are in place to protect the civil
liberties of the communities that your agencies are engaging?
Answer. Response was not received at the time of publication.
Questions From Honorable Scott Perry for Nicholas J. Rasmussen
Question 1. What do you consider to be the most critical threat to
U.S. National security today?
Answer. Within the counterterrorism mission space, the National
Counterterrorism Center believes that the most immediate terrorist
threat to the homeland is the threat of violence carried out by Home-
grown Violent Extremists (HVEs)--a threat we expect will persist
through the next year.
Question 2. Given that terrorism is merely a tactic--and thus, we
are not fighting terrorism--whom would you say are the most dangerous
enemies we face today & why?
Answer. We believe that HVEs pose the most immediate terrorism-
related threat in the homeland. The individualized nature of the
radicalization and mobilization to violence process makes it difficult
to identify in advance and disrupt individuals seeking to commit acts
of terrorism. Over the next year, we expect that most HVEs will
continue to focus on soft targets, while still considering traditional
targets, such as military personnel, law enforcement, and other symbols
of the U.S. Government. Additionally, networks aligned with the
predominant global Sunni and Shia terrorist groups--ISIS, al-Qaeda, and
Lebanese Hizballah--remain potent transnational threats to U.S. global
interests. In particular, ISIS's intent to target aviation poses a
continuing threat to the United States and other partners world-wide.
Question 3a. Would you agree that the United States faces a
domestic insurgency from the forces of Islamic jihad?
If so, what do you think are the most urgent steps the United
States must take to protect ourselves from that threat?
Question 3b. If not, why not & what would you say is the most
critical domestic security threat we face at this time?
Answer. NCTC believes that the United States is not facing a
domestic insurgency from Islamic terrorist elements. We believe that
the perpetrators of acts of terrorism in the homeland, who in some
cases have been inspired by Sunni violent extremist ideologies, have
generally not been directed by Foreign Terrorism Organizations. HVEs in
the United States are not typically networked and are geographically
dispersed with no major population densities; a central command
authority does not direct and/or coordinate operations; and as a group,
they do not present a threat to the functioning of government, either
State or local.
Question 4. Islamic jihad terror spans the globe & crosses national
borders at will, both in the movement of people & by way of the
internet. What are the steps you believe most critical for the NCTC to
implement in order to stay ahead of the global Islamic Movement & its
myriad domestic U.S. operatives?
Answer. We believe it is critical for NCTC and our Intelligence
Community (IC) counterparts to strengthen our biometric collection,
sharing, and screening capabilities, and to constantly look for ways to
adapt and enhance our processes as new technologies and sources of
information become available. In addition, as terrorists look to move
out of conflict zones and seek refuge in other countries, we need to
expand our information-sharing relationships with foreign partner
intelligence, law enforcement, and border security services as they
pertain to known or suspected terrorists, and when necessary, offer or
provide guidance on implementing advanced screening technologies to
ensure we are identifying these individuals well in advance of any
attempts to travel to the homeland.
As terrorist groups increasingly take to the internet to expand
their global support base, it will be critical for our IC, State,
local, and private-sector partners to take action in addressing
terrorists' exploitation of U.S. technologies. During the past year, we
have expanded our capacity to better understand how terrorists are
operating on-line and continue to share those insights within the IC
and with technology-sector companies to better inform their independent
efforts to take action against violent extremist propaganda. We are
also providing intelligence support to partners in the Department of
Defense (DOD), Federal Bureau of Investigation (FBI), the Global
Engagement Center and elsewhere who are working to apply these insights
to support military operations, counter-messaging campaigns, and law
enforcement disruptions.
Question 5. Please describe your understanding of Antna's
international networks & how NCTC acts to counter them.
Answer. We defer to FBI and Department of Homeland Security (DHS)
for a response to this question, as they are the primary organizations
in the U.S. Government responsible for domestic terrorism. In general,
NCTC ensures that agencies, as appropriate, have access to and receive
all-source intelligence support needed to accomplish their assigned
activities, including to execute their counterterrorism plans or
perform independent, alternative analysis.
Questions From Ranking Member Bennie G. Thompson for Nicholas J.
Rasmussen
Question 1a. Do you believe that HVEs present an emerging threat to
the homeland?
Answer. The first recognized HVE attack was conducted in July 2002,
and since that time, there have been at least 25 more attacks. We saw
an increase in the number of attacks with the announcement of ISIS'
caliphate in 2014. We continue to face a persistent threat from HVEs,
as individuals heed calls for attacks from ISIS, al-Qaeda, and these
groups' branches and on-line supporters. NCTC believes that HVEs are
motivated by a combination of factors, including terrorist propaganda,
extremist ideology, grievances against the U.S. Government's actions,
and personal factors such as unmet psychological needs that can cause
an individual to seek such things as adventure or a sense of purpose.
HVEs are often self-initiating, making their plotting hard to detect if
they minimize statements of support for extremist groups and refrain
from reaching out to like-minded individuals for support or capability
building. HVEs most often operate alone or with one close associate or
family member and tend to gravitate toward soft targets and simple
tactics that do not require advanced skills or outside training.
Question 1b. How can we be more effective in preventing these
attacks and ``lone-wolf'' attacks?
Answer. Developing and resourcing a spectrum of locally-tailored
prevention and intervention programs that increase public awareness of
terrorist recruitment, build trust between communities and law
enforcement, and leverage a multi-disciplinary approach will be key to
enhancing our ability to prevent lone-actor attacks. Departments and
agencies currently lack sufficient funding to develop and sustain
prevention programming and initiatives, which constitute about 0.01
percent of the overall annual U.S. CT budget.
Prevention programs are most effective when they include and
support educators, mental health professionals, local
government officials, religious leaders, social service
providers, and others who are involved in public safety.
Prevention programs that proactively address root causes of
mobilization generally lead to more durable, long-term
solutions.
To support appropriate agencies in fulfillment of their
responsibilities to disseminate terrorism information, NCTC
offers several programs to increase awareness of radicalization
and recruitment and to empower State and local partners to
develop locally-tailored CT programs. These specific tools
include the Community Awareness Brief (CAB) and the Terrorism
Prevention Planning Workshop. NCTC and FBI case study research
has found that in 75 percent of HVE cases at least one person--
usually a peer or family member--became aware of a subject's
violent extremist views or activities, but more than half did
not report their concerns to law enforcement. Academic research
suggests these individuals do not report their concerns to
Countering Violent Extremist service providers or law
enforcement primarily because they do not want to get their
friend, family member, or themselves in trouble; however, we
believe opportunities exist to increase reporting by improving
public understanding of the factors that contribute to
radicalization and mobilization to violence, as well as
enabling multiple options to report concerning behavior.
Question 2a. The FBI and DHS produced an intelligence bulletin on
May 11, 2017 that purported to warn about the ``persistent threat of
lethal violence'' from white supremacist groups. The data reported in
the bulletin claimed that there were 49 homicides in 26 attacks from
2000 to 2016, but these numbers are significantly lower than those
reported by academics who study this issue.
Please provide a full list of the 49 homicides in 26 attacks from
2000 to 2016.
Question 2b. How do you account for these discrepancies?
Question 2c. Do these discrepancies affect local law enforcement
efforts to police such groups?
Answer. NCTC defers to FBI and DHS to address this question, as
they are the primary organizations in the U.S. Government responsible
for domestic terrorism.
Question 3a. Between 1977 and 2016, there have been hundreds of
crimes committed against reproductive health care facilities and
abortion providers, including at least 11 murders, 26 attempted
murders, 42 bombings, 86 arsons, 98 attempted bombings or arsons, and
411 clinic invasions. Please provide any data that your agency has used
to track crimes targeting reproductive health care facilities and
abortion providers.
Does violence aimed at reproductive health care clinics, doctors,
patients, and staff fall under the Federal statutory definition of
``domestic terrorism''?
If not, when would anti-abortion violence rise to the level of
``domestic terrorism''?
Question 3b. Are the Department of Homeland Security, the FBI, and
the National Counterterrorism Center currently committing funding and
staff to investigate violence against reproductive health care clinics,
doctors, patients, and staff in order to identify whether any patterns
and practices emerge?
If yes, please explain what level of personnel and budget is being
provided.
If not, why not?
Answer. NCTC defers to FBI and DHS to address this question, as
they are the primary organizations in the U.S. Government responsible
for domestic terrorism.
Questions From Honorable Val Butler Demings for Nicholas J. Rasmussen
Question 1. Most of the administration's CVE efforts to date have
been focused on Muslim communities. However, recent reports, arrests,
and convictions indicate that new recruits to ISIS do not have a
particular ethnic background and are not always familiar with Islam.
Moreover, as we have seen in the recent tragic events in
Charlottesville and Las Vegas, not all ``extremists'' are adherents of
Islam. How are the CVE programs being tailored to target a wider
audience to reach would-be perpetrators of extremist attacks?
Answer. In response to growing demand from Federal, State, local,
and community partners for tools and programs that reflect a
comprehensive view of the domestic terrorist threat picture, NCTC and
its other interagency partners worked with the interagency CVE Task
Force in early 2017 to update all of our programs--including the
Community Awareness Brief (CAB), the CAB Training Program, and
Terrorism Prevention Planning Workshop--to ensure that they are
responsive to the full spectrum of violent ideologies in the United
States, from ISIS-inspired ideologies, to violent anarchist ideologies,
to violent white supremacist ideologies. In support of DRS, Department
of Justice (DOJ), and FBI, NCTC has integrated information on the full
spectrum of violent extremist ideologies into our preventing terrorism
workshops, which are presented to a wide variety of audiences and not
just to any particular faith group.
Question 2a. The agencies engaged in CVE programs have both law
enforcement and intelligence-gathering responsibilities. However, the
purpose of CVE programs is to foster substantive relationships with the
community and to reach vulnerable populations prior to radicalization.
Are there other Federal agencies that are better equipped to carry
out that mission?
Answer. In light of the dynamic threat posed by all forms of
violent extremists targeting Americans, the whole-of-Government, not
just security agencies, must respond with innovative approaches to
prevent radicalization to violence in the United States. No one agency
has all of the authorities or resources to tackle this on its own.
The interagency CVE Task Force was established in January
2016 to serve as a coordinating body to manage and synchronize
the integration of whole-of-Government efforts to empower local
partners to prevent violent extremism.
The CVE Task Force was established to include full-time
staff from NCTC, FBI, DHS, and DOI, as well as participation
from non-security agencies including HHS, Education, State, and
United States Agency for International Development (USAID.) As
of fiscal year 2018, the CVE Task Force continued to seek the
interagency staffing support and resources to execute its
mission. The current levels of staffing have severely inhibited
the Task Force's ability to operate, set policy objectives and
coordinate whole-of-Government CVE issues.
NCTC has supported the interagency--including DOJ, FBI, DHS, and
the interagency CVE Task Force--to convene and facilitate Prevention
initiatives, training, and tools to raise awareness and counter
terrorist recruitment efforts.
Question 2b. How do you disengage your law enforcement and
intelligence-gathering mission when participating in CVE activities?
Answer. NCTC, for its part, does not have a law enforcement
mission. Additionally, the 2016 Strategic Implementation Plan for the
National CVE Strategy clearly outlined a separation between community
engagement and intelligence collection.
Question 2c. What safeguards are in place to protect the civil
liberties of the communities that your agencies are engaging?
Answer. NCTC has instituted multiple safeguards to protect the
civil liberties of members of the communities we engage. First, NCTC's
staff involved in CVE activities do not have an intelligence collection
function, therefore none of our staff would be engaging for that
purpose. Second, only our staff who work on policy and/or strategy, and
not intelligence analysis, conduct terrorism prevention briefings with
communities. Third, all of the material we present is cleared by our
civil rights office prior to distribution. Last, all of our training
material has been vetted by the interagency to ensure it adheres to
interagency civil rights and civil liberties standards.
Questions From Honorable Scott Perry for Richard Cohen
Question 1. How does the SPLC work with a major internet search
engine like Google to adjust its algorithms to produce search results
that either highlight SPLC-designated hate groups, or push those
results further down the search chain?
Answer. Response was not received at the time of publication.
Question 2. How does the SPLC work with Google or its subsidiaries,
including YouTube, to modify search results of SPLC-designated people
or groups?
Answer. Response was not received at the time of publication.
Question 3. How does the SPLC work with Facebook, Twitter, and
other social media to block, suspend, or ban individuals or groups the
SPLC designates as ``haters?''
Answer. Response was not received at the time of publication.
Question 4. How does the SPLC work with internet companies like
YouTube and Facebook to single out people and groups it designates as
undesirable, and deprive them of revenues from advertisements,
subscriptions, or payments?
Answer. Response was not received at the time of publication.
Question 5. How does the SPLC work with credit card, money
transfer, and banking services to deprive its designated
``undesirables'' from legitimate and lawful financial transactions and
revenue receipts?
Answer. Response was not received at the time of publication.
Question 6. Does the SPLC condemn attempts to pressure or persuade
Visa, MasterCard, American Express, Discover, PayPal, Square, J.P.
Morgan Chase, and other financial services companies to deprive
innocent people and organizations, who are engaged in lawful activity,
of lawful income?
Answer. Response was not received at the time of publication.
Question 7. Since news organizations, research groups, and until
recently, Federal agencies have used SPLC data to determine whether an
organization is considered a hate group or an extremist group, what are
your scientific methodologies and criteria for designating an
organization as a ``hate group''?
Answer. Response was not received at the time of publication.
Question 8. What are your scientific methodologies and criteria for
designating an individual or organization as an ``extremist''?
Answer. Response was not received at the time of publication.
Question 9. Is intent to overthrow the Constitution of the United
States a major factor in the SPLC's designation of a person or
organization as ``extremist''?
Answer. Response was not received at the time of publication.
Question 10. What are the SPLC criteria for designating non-violent
and peaceful groups like the Family Research Council as extremist, yet
not designating violent groups like Antifa as extremist?
Answer. Response was not received at the time of publication.
Question 11. Below are some individuals and organizations that the
SPLC has listed as ``extremists'' or ``hate groups'' in your Field
Guide to Anti-Muslim Extremists. and will ask you to describe the
methodologies the SPLC has used to make those designations:
Ayaan Hirsi Ali, a Somali refugee and victim of female
genital mutilation. Why does SPLC classify her as an extremist?
Steve Emerson, whom the SPLC denigrates as a ``self-
described'' terrorism expert, when in fact he is a widely-
regarded terrorism expert. None of the information the SPLC
provides in its profile shows that Emerson is either ``anti-
Muslim'' or an ``extremist.'' What is SPLC's basis for
designating Emerson in those terms?
Robert Muise, a free-speech attorney with the non-profit
American Freedom Law Center. He has litigated to oppose
unconstitutional Sharia law in the United States, and defended
controversial figures on First Amendment grounds. Why does the
SPLC consider him an ``anti-Muslim extremist''?
Family Research Council, an organization dedicated to
protecting traditional American values. What scientific
methodology did the SPLC use to designate the FRC as an
extremist or hate group?
Answer. Response was not received at the time of publication.
Question 12. Why have you included in your hate groups list
mainstream, non-violent public policy groups like the Family Research
Council and public interest law firms like Alliance Defending Freedom,
but not Antifa or Black Lives Matter, which actually call for violence
against individuals?
Answer. Response was not received at the time of publication.
Question 13. While I think many Americans would agree that some of
the groups on your list, like the KKK, are objectionable, would you
agree--yes or no--that you list some groups as haters or extremists
simply because you find objectionable the fact that they are pro-
Israel, pro-Christian, or pro-police?
Answer. Response was not received at the time of publication.
Question 14. Do you stand by former SPLC employee Mark Potok's
statement that a purpose of the SPLC Hate Group list is to ``destroy''
the groups included on it?
Answer. Response was not received at the time of publication.
Question 15. I want to calibrate your methodology by asking you to
respond ``yes'' or ``no'' on whether the SPLC considers the following
organizations to be hate groups or extremist groups:
Antifa
Workers World Party
Revolutionary Communist Party
Muslim Brotherhood
ISIS/Islamic State/Daesh
American Family Association
Family Research Council
Federation for American Immigration Reform
Traditional Values Coalition
Answer. Response was not received at the time of publication.
Question 16. Are you aware that Floyd Lee Corkins, who was
convicted of domestic terrorism in Federal court, used your hate map
for his list of targets when he entered Family Research Council with
the intention of killing as many of the people there as possible, and
actually shot Leo Johnson, the building manager of Family Research
Council?
Answer. Response was not received at the time of publication.
Question 17. In 2012, Mr. Corkins, the domestic terrorist who shot
the building manager of the Family Research Council, and who intended
to murder as many Family Research Council staff as he could, said that
the SPLC website inspired him to target the organization.
Did the SPLC ever condemn the terrorist attack on the Family
Research Council?
Did the SPLC ever contact the Family Research Council to
express its concern?
Did the SPLC use the shooting as an opportunity to further
attack FRC and make them even more a target for violence?
Answer. Response was not received at the time of publication.
Question 18. In 2017, an armed violent extremist attempted to
assassinate several Members of the U.S. Congress and Senate, severely
wounding our colleague, Congressman Steve Scalise. The would-be
assassin had ``liked'' the SPLC on social media, leading to concerns
that the SPLC could have inspired him to try to murder Federal
lawmakers, as the Family Research Council shooter had been inspired.
What has SPLC done to ensure that its material does not radicalize
people to become violent?
Answer. Response was not received at the time of publication.
Question 19. How many of the groups you designate as ``hate''
groups actually have fewer ties to domestic terrorist attacks then the
SPLC itself?
Answer. Response was not received at the time of publication.
Question 20. The SPLC has done considerable reporting on the
extremist ``Unite the Right'' rally in Charlottesville last month that
resulted in a clash between white supremacists and Antifa, the homicide
of a protester, and the accidental deaths of two police officers. SPLC
has a biography of Unite the Right organizer Jason Kessler, who SPLC
terms as ``a relative newcomer to the white nationalist scene.'' SPLC
goes back at least 12 years in Kessler's biography and draws from
police reports. Then it says, ``Regardless of Kessler's past politics,
the rightward shift in his views was first put on display in November
2016 . . . ''. That was only 10 months ago.
Why did the SPLC not describe Kessler's ``past politics''
before November 2016?
Is it because Kessler had, at least to that point, been a
prominent leftist activist involved in ``progressive''
politics, including voting for Barack Obama?
Doesn't this selective reporting obscure the possibility
that Kessler was more likely to have been a provocateur than a
recent convert to ``white supremacist'' views he had until
recently found anathema?
Answer. Response was not received at the time of publication.
Question 21. What is SPLC's approach to Islamist and left-wing
extremists who pose a danger to the public and the Nation?
Answer. Response was not received at the time of publication.
Question 22. It is important to note for the record that the SPLC
has identified the Nation of Islam as one of several ``incubators of
radical fanaticism.'' Therefore, I am asking questions about the Muslim
Brotherhood and whether it is also an incubator of radical fanaticism.
A search of the SPLC's website does not find the SPLC to
have identified the Muslim Brotherhood, or any of its fronts or
controlled organizations, to be extremist groups or hate
groups. Is this correct?
Given that the Muslim Brotherhood's stated objective is a
global caliphate, a dictatorship under the totalitarian Islamic
law known as Sharia. Such a dictatorship would exterminate or
repress all religious and political minorities, including other
Muslims. Why does SPLC not consider this extremist?
Establishment of a global caliphate requires the overthrow
of the Constitution of the United States. Since the Muslim
Brotherhood's end-state therefore requires the overthrow of the
Constitution of the United States, does the SPLC not consider
the Muslim Brotherhood to be an extremist organization that is
dangerous to our country?
Answer. Response was not received at the time of publication.
Question 23. On October 19 of this year, the Southern Poverty Law
Center sent out a fundraising email, signed by Richard Cohen, that
stated ``We've always believed it's important to take on groups like
the FRC that have a foothold in the mainstream. In many ways, they're
more dangerous to our country than hatemongers who wear robes and
hoods.''
Please explain Cohen's statement that mainstream
conservative organizations are more dangerous than the KKK (ie,
``hatemongers who wear robes and hoods''), specifically the
Family Research Council. Please cite the prevailing legal
authority the SPLC uses to define ``dangerous'' in this
statement.
Please list which organizations the SPLC includes as
``groups like the FRC that have a foothold in the mainstream''
and explain, for each one, why it is more dangerous than the
KKK (i.e., ``hatemongers who wear robes and hoods'').
Answer. Response was not received at the time of publication.
Question 24. The SPLC has published numerous statements claiming
that Donald Trump's campaign and election ``energized'' and
``coincided'' with a statistical increase in hate crimes and ``hate
groups''. Here are two examples:
Richard Cohen published an editorial on November 13, 2017 on the
FBI's hate crime report, in which he stated [emphasis added]: ``The
significant increase over the last 2 years coincides with Donald
Trump's racist, xenophobic campaign and its immediate aftermath. We
reported a surge in hate crimes and other bias-related incidents--many
of them carried out in Trump's name--in the days after the election.
The new FBI report confirms our findings, showing a 25 percent rise
during the final 3 months of 2016.'' https://www.splcenter.org/news/
2017/11/13/hate-crimes-rise-second-straight-year-anti-muslim-violence-
soars-amid-president-trumps
Similarly, in Richard Cohen's testimony before the committee
November 30, 2017 he stated, ``the white supremacist movement has been
energized by Mr. Trump's campaign, proof that Mr. Trump's campaign has
`unearthed some demons,' to use Congressman Sanford's words.'' https://
www.splcenter.org/sites/default/files/cohen.homeland_security-final.pdf
However, on November 27, 2017--3 days before Mr. Cohen's
testimony--The Washington Post carried an article on statistical trends
in reported hate crimes. The article stated:
``Those increases [i.e. increases in reported hate crimes] occurred
alongside an increase in the number of hate groups nationally, as
tracked by the Southern Poverty Law Center. In 2014, the SPLC tracked
784 hate groups. In 2016, the number rose to 917, up nearly 17 percent.
While the SPLC argues that the increase is a function of right-wing
groups being `energized' by Donald Trump's Presidential campaign, we
hasten to note that there is no strong correlation between the
frequency of victimization and politics. Many States in the Northeast
showed higher rates of hate crimes in 2016. Nor was there a pattern in
the increase from 2014 to 2016 by State.'' https://
www.washingtonpost.com/news/politics/wp/2017/11/27/why-treating-white-
nationalists-as-normal-americans-is-unacceptable/?utm_term=.8d1af-
4209d52.
Why did Richard Cohen testify that there was a correlation
between Donald Trump's campaign and increases in hate crimes 3
days after The Washington Post demonstrated that this SPLC
assertion is a false correlation?
Will SPLC publish a retraction of their earlier claims about
President Trump and hate crimes, including that made in the
November 30 testimony before this committee, given The
Washington Post's findings that refute the SPLC's claims?
Answer. Response was not received at the time of publication.
Question 25. The annual SPLC hate map identifies towns across
America as locations ``for hate groups.'' Local law enforcement
agencies in many towns have expended significant resources to follow up
on SPLC accusations that a ``hate group'' is in their communities.
According to media reports, these agencies have found no evidence or
only sparse or discredited evidence. Local newspapers have also
documented a history of the SPLC's refusal to respond expeditiously to
local law enforcement requests for evidence of SPLC's claims.
Here are examples of five American towns that have refuted the
SPLC's claims:
In 2015, the Altamont, NY police, along with the FBI, the
New York State Police, the Albany County Sheriff's Office, and
the Guilderland Police Department, spent significant time
trying to verify the SPLC's claim that a KKK group was in
Altamont. They could find no evidence of the claim. According
to The Altamont Enterprise, the police chief ``expressed
frustration that he, along with members of other local law
enforcement agencies, had not had calls returned from the
Southern Poverty Law Center.'' The SPLC eventually did talk to
the Altamont Enterprise and claimed that the SPLC's source was
an anonymous ``law enforcement source,'' who, the SPLC stated,
refused to talk to either the newspaper or local law
enforcement. According to the Altamont Enterprise, all law
enforcement agencies that the newspaper contacted said they
were not the anonymous source. The mayor stated, ``The last
thing I want to see happen is that the village's reputation as
a wonderful, safe, and welcoming community is destroyed in the
process of seeking to assess the validity of these claims.''
April 2015: ``Is the KKK in Altamont?'' https://
altamontenterprise.com/04022015/kkk-altamont
In August 2017, two small towns in Michigan--Trenton and
Wyandotte--disputed being called hate centers by the SPLC. The
SPLC claimed a KKK group was in Trenton, and a Neo-Nazi group
was in Wyandotte. In Trenton, a single individual, known to the
police, had twice distributed fliers. As the Trenton police
chief said, ``An individual in an apartment with a copy machine
does not accurately represent the title'' of a ``hate group,''
and called the SPLC's claim irresponsible. The Wyandotte police
chief was puzzled why they were even on the list and was
unaware of any Neo-Nazi groups or incidents. Both towns are
still on the SPLC hate map.
August 18: ``Downriver police reject notion that their
cities have ties to hate groups'' http://www.thenewsherald.com/
news/downriver-police-reject-notion-that-their-cities-have-
ties-to/article_ba5c4802-5879-5a7d-aede-70e69b227bb6.- html.
Also in August 2017, the police chief in Gurnee, Illinois--
which the SPLC had identified as hosting a KKK group--
repudiated the SPLC's claim, after expending significant local
police resources, as well as consulting the Illinois State
Police State-wide Terrorism and Intelligence Center. Gurnee
police contacted the SPLC but didn't hear back until a week
later. The SPLC stated that an individual had registered at a
KKK site and used Gurnee as his address. Gurnee police said an
investigation into the name concluded there is no record of
anyone by that name having been a Gurnee resident. Nonetheless,
the SPLC refused to remove Gurnee as the site of a KKK ``hate
group,'' stating that they only review and revise the map once
a year, and that Gurnee's listing will be reviewed again in
January 2018. The SPLC did not return calls to The Chicago
Tribune reporter covering the Gurnee case. Gurnee is still on
the SPLC Hate Map.
August 31: ``Lester: Gurnee says no evidence of reported
Klan activity'' http://www.dailyherald.com/news/20170831/
lester-gurnee-says-no-evidence-of-reported-klan-activity.
September 8: ``Maybe next year: Gurnee continues battle to
remove its name from hate-group map'' http://
www.chicagotribune.com/suburbs/lake-county-news-sun/news/ct-
lns-gurnee-hate-map-st-0909-20170908-story.html.
But only 1 week earlier in August 2017, for a different
town, the SPLC applied a completely opposite policy on
revisions to the Hate Map. The SPLC's assertion to the Gurnee
law enforcement agency--that they'd have to wait until 2018 to
get off the Hate Map--was 100 percent contradicted by an action
the SPLC had taken just 1 week before in Clear Creek, Iowa. In
that case, which received wide-spread publicity and public
pressure (unlike Gurnee and the other towns), the SPLC removed
Clear Creek from the Hate Map after police and elected
officials repudiated the SPLC's claims that Clear Creek was
hosting a Neo Nazi group. The SPLC's ``evidence'' was a mention
in an on-line forum of a meeting of a Nazi book club at the
Amana Colonies. Clear Creek is now removed from the SPLC Hate
Map.
August 21: ``Amana leaders seek explanation for being called
home of hate group'' http://www.press-citizen.com/story/news/
local/amana-clear-creek/2017/08/21/amana-leaders-seek-
explanation-being-called-home-hate-group/586229001/.
August 22: ``Group stands behind claims of Iowa neo-Nazi
group'' http://www.press-citizen.com/story/news/local/amana-
clear-creek/2017/08/22/splc-stands-behind-claims-amana-neo-
nazi-group/591491001/.
August 28: ``SPLC removes Amana from hate group map'' http:/
/www.press-citizen.com/story/news/local/amana-clear-creek/2017/
08/28/splc-removes-amana-hate-group-map/610471001/.
Given this documented history of discredited SPLC claims and
the SPLC's lack of cooperation with local law enforcement, it
appears that the SPLC's annual listing of ``hate groups''
potentially wastes law enforcement resources and risks
negligently damaging the reputation and local economies of
American communities.
Given these risks, will the SPLC improve its policies on the
quality, verification, and transparency of evidence for the 2018 Hate
Map, to prevent similar failures in the future?
Answer. Response was not received at the time of publication.
Question 26. Will the SPLC commit that the 2018 Hate Map will show
the evidence for each ``hate group'' and ``hate incident'' claim, with
on-line links or uploaded documents that are available for immediate
public review?
Answer. Response was not received at the time of publication.
Question 27. Will the SPLC commit that the 2018 Hate Map will
provide an accountable and transparent process for local media, law
enforcement, and elected leaders to request that their towns be removed
from the SPLC Hate Map within a week of the request--as the SPLC did
for Clear Creek--if the SPLC's ``evidence'' is demonstrated either to
be non-existent or misleading, or if local law enforcement repudiates
the SPLC claim that a local group is in fact a so-called ``Hate
Group''?
Answer. Response was not received at the time of publication.
Question 28. Since 2009, SPLC ``hate incident'' and ``hate group''
data has been incorporated in the Extremist Crime Data Base at the
Consortium for the Study of Terrorism and Responses to Terrorism
(START), which is primarily funded by the Department of Homeland
Security. Between 2010 and 2017, over 35 academic papers were published
using the Extremist Crime Data Base, for which SPLC had provided
various types of data on ``hate incidents'' and ``hate groups.'' At
least three of these published academic papers focused primarily on the
SPLC ``hate group'' lists.
In the years since SPLC provided the data now incorporated in the
Extremist Crime Data Base, START staff presented numerous briefings on
the Extremist Crime Data Base findings, based in part on this SPLC
data, to the CIA, FBI, Secret Service, Transportation Safety
Administration, the director of national intelligence, and the House
Committee on Homeland Security. These briefings potentially affected
policy decisions.
However, for decades, mainstream media, academic experts, and local
law enforcement in towns across America have raised serious questions
about the accuracy and evidence associated with SPLC ``hate group'' and
``hate incident'' data. To list representative examples from just 3
months ago, the police chiefs and elected officials in Trenton, MI,
Wyandotte, MI, Gurnee, IL, and Clear Creek, IA have all repudiated the
SPLC's claims about ``hate incidents'' and ``hate groups'' in their
towns.
Therefore, the use of discredited SPLC ``hate incident'' and ``hate
group'' data in a Government-funded intelligence resource should be of
grave concern to policy makers. The potential discrediting of a key
Government database by introducing inadequately validated and verified
data imposes real risks on our ability to make accurate threat
assessments for homeland security.
In spite of years of concerns expressed about SPLC's data
integrity, on September 16, 2016 Richard Cohen presented testimony
based on the Extremist Crime Data Base to the Subcommittees on National
Security and Government Operations, of the House Committee on Oversight
and Government Reform. In his written testimony for the November 30,
2017 House Homeland Security Committee, Cohen again cited studies based
on the START Extremist Crime Data Base research. In neither of these
testimonies did he disclose that the database has incorporated SPLC
data, nor that the SPLC's data may have substantial errors.
Given that local law enforcement is repudiating SPLC ``hate
incident'' and ``hate group'' data, will SPLC notify the START
Consortium about the risks SPLC data has introduced to the integrity of
the Extremist Crime Data Base?
Answer. Response was not received at the time of publication.
Question 29. Will SPLC notify DHS and the other agencies and
Congressional committees who were briefed, and who may have made policy
decisions based on discredited data?
Answer. Response was not received at the time of publication.
Question 30. Will SPLC provide to this committee the evidence for
every ``hate incident'' and ``hate group'' that SPLC has provided to
the START group, for an independent risk assessment as to the integrity
of the data that has been used since at least 2009 in intelligence
assessments for homeland security?
Answer. Response was not received at the time of publication.
Questions From Honorable Clay Higgins for Richard Cohen
Question 1a. News organizations, research groups, and law
enforcement organizations have used Southern Poverty Law Center (SPLC)
data to determine whether an organization is considered a hate group or
an extremist group. I am concerned about the apparent absence of
scientific methodologies and criteria for designating an organization
as a hate group.
What are your scientific methodologies and criteria for designating
an individual or organization as an ``extremist''?
Answer. Response was not received at the time of publication.
Question 1b. Please explain how your methodology provided as an
answer to question 1a was applied in your determination to classify,
Ayaan Hirsi Ali, a Somali refugee and victim of female genital
mutilation as an extremist.
Answer. Response was not received at the time of publication.
Question 2a. Please provide the committee with a cross-referenced
accounting of your donor list with the following groups identified on
U.S. Department of State's Foreign Terrorist Organization (FTO)
list,\1\ for any group appearing on both your donor list and the
official FTO listing.
---------------------------------------------------------------------------
\1\ https://www.state.gov/j/ct/rls/other/des/123085.htm.
---------------------------------------------------------------------------
For your convenience the FTO list is as follows: Abu Sayyaf Group
(ASG); Aum Shinrikyo (AUM); Basque Fatherland and Liberty (ETA); Gama'a
al-Islamiyya (Islamic Group) (IG); HAMAS; Harakat ul-Mujahidin (HUM);
Hizballah; Kahane Chai (Kach); Kurdistan Workers Party (PKK) (Kongra-
Gel); Liberation Tigers of Tamil Eelam (LTTE); National Liberation Army
(ELN); Palestine Liberation Front (PLF); Palestinian Islamic Jihad
(PIJ); Popular Front for the Liberation of Palestine (PFLF); PFLP-
General Command (PFLP-GC); Revolutionary Armed Forces of Colombia
(FARC); Revolutionary People's Liberation Party/Front (DHKP/C); Shining
Path (SL); al-Qaeda (AQ); Islamic Movement of Uzbekistan (IMU); Real
Irish Republican Army (RIRA); Jaish-e-Mohammed (JEM); Lashkar-e Tayyiba
(LeT); Al-Aqsa Martyrs Brigade (AAMB); Asbat al-Ansar (AAA); al-Qaeda
in the Islamic Maghreb (AQIM); Communist Party of the Philippines/New
People's Army (CPP/NPA); Jemaah Islamiya (JI); Lashkar i Jhangvi (LJ);
Ansar al-Islam (AAI); Continuity Irish Republican Army (CIRA); Islamic
State of Iraq and the Levant (formerly al-Qaeda in Iraq); Islamic Jihad
Union (IJU); Harakat ul-Jihad-i-Islami/Bangladesh (HUJI-B); al-Shabaab;
Revolutionary Struggle (RS); Kata'ib Hizballah (KH); al-Qaeda in the
Arabian Peninsula (AQAP); Harakat ul-Jihad-i-Islami (HUJI); Tehrik-e
Taliban Pakistan (TTP); Jundallah; Army of Islam (AOI); Indian
Mujahedeen (IM); Jemaah Anshorut Tauhid (JAT); Abdallah Azzam Brigades
(AAB); Haqqani Network (HQN); Ansar al-Dine (AAD); Boko Haram; Ansaru;
al-Mulathamun Battalion; Ansar al-Shari'a in Benghazi; Ansar al-Shari'a
in Darnah; Ansar al-Shari'a in Tunisia; ISIL Sinai Province (formally
Ansar Bayt al-Maqdis); al-Nusrah Front; Mujahidin Shura Council in the
Environs of Jerusalem (MSC); Jaysh Rijal al-Tariq al Naqshabandi
(JRTN); ISIL-Khorasan (ISIL-K); Islamic State of Iraq and the Levant's
Branch in Libya (ISIL-Libya); al-Qaeda in the Indian Subcontinent;
Hizbul Mujahideen (HM).
Question 2b. Please also include any donations by senior members or
people in leadership positions of groups or organizations listed in 2a.
Answer. Response was not received at the time of publication.
Question 3a. During the hearing, you stated that the SPLC does in
fact utilize offshore accounts for many millions of dollars of funds
and that your organization does this to avoid having to comply with
``certain kinds of filings'' and ``unrelated business income tax.''
Please provide the committee with a detailed list of the ``filing''
requirements SPLC is avoiding through its utilization of offshore
accounts.
Answer. Response was not received at the time of publication.
Question 3b. Please provide the committee with a detailed list of
the ``unrelated business income'' taxes that SPLC is avoiding through
its utilization of offshore accounts.
Answer. Response was not received at the time of publication.
[all]