Experts urge assault against terrorists' Web efforts

Internet experts Tuesday told a House panel that the United States needs to immediately improve its efforts to understand and respond to the online activities of terrorists who want to harm the country.

Witnesses before the House Homeland Security Intelligence, Information Sharing and Terrorism Risk Assessment Subcommittee questioned the robustness of military and intelligence community efforts to understand how terrorist entities, particularly the al Qaeda network, are using online tools to spread their messages.

In prepared testimony for the mid-afternoon hearing, Georgetown University professor Bruce Hoffman said the ability of the United States to counter ideological enemies like al Qaeda will depend on understanding the resonance of their messages and recruiting strategies, both of which involve the Internet.

He argued that so far, the United States has monumentally failed to understand al Qaeda. "Until we recognize the importance of this vital prerequisite," Hoffman said, "America will remain perennially on the defensive."

Rita Katz, director of the Search For International Terrorist Entities Institute, told lawmakers that the "jihadist movement" will continue to grow if the Internet remains a "safe haven" for terrorists. She said the challenge will not just be to monitor the online activities of terrorist suspects, but also to identify and exploit the online weaknesses of terrorist groups and mine for information that can help to defuse offline terrorist efforts.

"For as long as jihadists on the Internet can engage in terrorist activities unfettered and unmonitored," Katz said, "the U.S. will not be able to cause significant, lasting damage to the global jihadist movement."

Mark Weitzman, director of the Simon Wiesenthal Center's task force against hate and terrorism, said officials need the political will to act against the use of online tools to spread terrorist ideologies. He said it is particularly important that the government recruit researchers with the technical and linguistic skills to comprehend what they find online.

"In many ways, we have ceded the Internet to our enemies, and the result has been extremely harmful," Weitzman said. "However, even in a globalized world, there is no reason to believe that this condition is permanent."

WiredSafety.org founder and Executive Director Parry Aftab, meanwhile, warned the committee that blocking or limiting access to certain types of online technologies within the United States would not make the Internet a safer place for those who use it.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.