{ "id": "R44921", "type": "CRS Report", "typeId": "REPORTS", "number": "R44921", "active": true, "source": "EveryCRSReport.com", "versions": [ { "source": "EveryCRSReport.com", "id": 463450, "date": "2017-08-21", "retrieved": "2017-08-22T13:20:27.805880", "title": "Domestic Terrorism: An Overview", "summary": "The emphasis of counterterrorism policy in the United States since Al Qaeda\u2019s attacks of September 11, 2001 (9/11) has been on jihadist terrorism. However, in the last decade, domestic terrorists\u2014people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements\u2014have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under federal terrorism statutes, which does not imply that domestic terrorists are taken any less seriously than other terrorists. \nThe Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) do not officially designate domestic terrorist organizations, but they have openly delineated domestic terrorist \u201cthreats.\u201d These include individuals who commit crimes in the name of ideologies supporting animal rights, environmental rights, anarchism, white supremacy, anti-government ideals, black separatism, and beliefs about abortion. \nThe boundary between constitutionally protected legitimate protest and domestic terrorist activity has received public attention. This boundary is highlighted by a number of criminal cases involving supporters of animal rights\u2014one area in which specific legislation related to domestic terrorism has been crafted. The Animal Enterprise Terrorism Act (P.L. 109-374) expands the federal government\u2019s legal authority to combat animal rights extremists who engage in criminal activity. Signed into law in November 2006, it amended the Animal Enterprise Protection Act of 1992 (P.L. 102-346). \nThis report is intended as a primer on the issue, and four discussion topics in it may help explain domestic terrorism\u2019s relevance for policymakers: \nLevel of Activity. Domestic terrorists have been responsible for orchestrating numerous incidents since 9/11. \nUse of Nontraditional Tactics. A large number of domestic terrorists do not necessarily use tactics such as suicide bombings or airplane hijackings. They have been known to engage in activities such as vandalism, trespassing, and tax fraud, for example.\nExploitation of the Internet. Domestic terrorists\u2014much like their jihadist analogues\u2014are often Internet and social-media savvy and use such platforms to share ideas and as resources for their operations. \nDecentralized Nature of the Threat. Many domestic terrorists rely on the concept of leaderless resistance. This involves two levels of activity. On an operational level, militant, underground, ideologically motivated cells or individuals engage in illegal activity without any participation in or direction from an organization that maintains traditional leadership positions and membership rosters. On another level, the above-ground public face (the \u201cpolitical wing\u201d) of a domestic terrorist movement may focus on propaganda and the dissemination of ideology\u2014engaging in protected speech.", "type": "CRS Report", "typeId": "REPORTS", "active": true, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/R44921", "sha1": "34a3643d526f8dd1e3e7bcd2c8a69ecb2fe6bdda", "filename": "files/20170821_R44921_34a3643d526f8dd1e3e7bcd2c8a69ecb2fe6bdda.html", "images": { "/products/Getimages/?directory=R/html/R44921_files&id=/0.png": "files/20170821_R44921_images_81e7848cfe3d2e42f163b4eda728800634f5363d.png" } }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/R44921", "sha1": "18e1f27e42f2435da92028def68305bdedb8053d", "filename": "files/20170821_R44921_18e1f27e42f2435da92028def68305bdedb8053d.pdf", "images": {} } ], "topics": [] } ], "topics": [ "Constitutional Questions", "Crime Policy", "Foreign Affairs", "Intelligence and National Security", "Science and Technology Policy" ] }