{ "id": "R41674", "type": "CRS Report", "typeId": "REPORTS", "number": "R41674", "active": false, "source": "EveryCRSReport.com", "versions": [ { "source": "EveryCRSReport.com", "id": 382366, "date": "2011-03-08", "retrieved": "2016-04-07T01:02:49.093481", "title": "Terrorist Use of the Internet: Information Operations in Cyberspace", "summary": "The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future.\nThere are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions.\nSome may interpret the law to prevent federal agencies from conducting \u201cpropaganda\u201d activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value.\nKey issues for Congress:\nAlthough the Comprehensive National Cybersecurity Initiative addresses a federal cybersecurity strategy and departmental roles and responsibilities, overclassification, competing equities, and poor information sharing between agencies hinder implementation of a national cybersecurity strategy. (See \u201cFederal Government Efforts to Address Cyberterrorism.\u201d)\nFederal agencies have interpreted the United States Information and Educational Exchange Act of 1948 (22 U.S.C. \u00a7 1461), also known as the Smith-Mundt Act, as creating a \u201cfirewall\u201d between foreign and domestic audiences, limiting U.S. government counterpropaganda activities on the Internet. (See \u201cInstitutional Constraints.\u201d)\nSome agencies favor monitoring and surveillance of potentially harmful websites, while others would shut them down entirely. (See \u201cIntelligence Gain/Loss Calculus.\u201d)\nDifferent agency approaches to combating terrorists\u2019 use of the Internet and different definitions and strategies for activities such as information operations (IO) and strategic communications (SC) create an oversight challenge for Congress. (See \u201cCounterpropaganda: Strategic Communications, Public Diplomacy, and Information Operations.\u201d)\nCybersecurity proposals from the 111th Congress such as S. 3480, which contained controversial provisions labeled by the media as the Internet \u201cKill Switch,\u201d are likely to be reintroduced in some form in the 112th Congress. (See \u201cCongressional Activity.\u201d) With growing interest in strategic communications and public diplomacy, there may also be an effort to revise the Smith-Mundt Act.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R41674", "sha1": "4d71df7a6322bd80ff0a45e240dd91f9e7df86da", "filename": "files/20110308_R41674_4d71df7a6322bd80ff0a45e240dd91f9e7df86da.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R41674", "sha1": "63459e12e66ae6ae3a8555d869c9196204ac2612", "filename": "files/20110308_R41674_63459e12e66ae6ae3a8555d869c9196204ac2612.pdf", "images": null } ], "topics": [] } ], "topics": [ "Intelligence and National Security" ] }