Legis Daily

Countering Online Radicalization and Terrorism Act

USA119th CongressHR-1212| House 
| Updated: 2/11/2025
August Pfluger

August Pfluger

Republican Representative

Texas

Cosponsors (6)
Zachary Nunn (Republican)Eugene Simon Vindman (Democratic)Jimmy Panetta (Democratic)Morgan Luttrell (Republican)Gabe Evans (Republican)Randy K. Sr. Weber (Republican)

Homeland Security Committee, Counterterrorism and Intelligence Subcommittee

  • Introduced
  • In Committee
  • On Floor
  • Passed Chamber
  • Enacted
The Countering Online Radicalization and Terrorism Act mandates the Secretary of Homeland Security to conduct annual assessments of terrorism threats to the United States. These assessments specifically target threats posed by terrorist organizations utilizing foreign cloud-based mobile or desktop messaging applications , which Congress recognizes as a significant national security challenge that is not yet well understood. The Department of Homeland Security, in consultation with the Office of the Director of National Intelligence, is tasked with recognizing, assessing, and addressing this threat to reduce risks to the American people. Beginning 180 days after enactment and annually for five years, these assessments must be submitted to appropriate congressional committees. The content of these assessments will include an analysis of how terrorist organizations use these applications for radicalization and recruitment , information on how online payment features provide monetary support to these groups, and recommendations for appropriate countermeasures. Each assessment must be coordinated with the Department of Homeland Security's Privacy Office and Office for Civil Rights and Civil Liberties to ensure compliance with applicable law and protection of individual rights. The assessments will be submitted in an unclassified form, with a classified annex for intelligence sources and methods, and the unclassified portion will be publicly posted. Furthermore, the Secretary of Homeland Security is required to review and incorporate relevant information from State and local fusion centers into these assessments and disseminate such information back to the centers. The bill broadly defines "foreign cloud-based mobile or desktop messaging applications" to include those connected to foreign adversaries or terrorist organizations, specifically listing examples such as ByteDance-owned applications, Tamtam, Telegram, WeChat, and Weibo, among others.
View Full Text

Suggested Questions

Get AI-generated questions to help you understand this bill better

Timeline
Feb 11, 2025
Introduced in House
Feb 11, 2025
Referred to the Subcommittee on Counterterrorism and Intelligence.
Feb 11, 2025
Referred to the House Committee on Homeland Security.
  • February 11, 2025
    Introduced in House


  • February 11, 2025
    Referred to the Subcommittee on Counterterrorism and Intelligence.


  • February 11, 2025
    Referred to the House Committee on Homeland Security.

Armed Forces and National Security

Computers and information technologyCongressional oversightInternet, web applications, social mediaTelephone and wireless communicationTerrorism

Countering Online Radicalization and Terrorism Act

USA119th CongressHR-1212| House 
| Updated: 2/11/2025
The Countering Online Radicalization and Terrorism Act mandates the Secretary of Homeland Security to conduct annual assessments of terrorism threats to the United States. These assessments specifically target threats posed by terrorist organizations utilizing foreign cloud-based mobile or desktop messaging applications , which Congress recognizes as a significant national security challenge that is not yet well understood. The Department of Homeland Security, in consultation with the Office of the Director of National Intelligence, is tasked with recognizing, assessing, and addressing this threat to reduce risks to the American people. Beginning 180 days after enactment and annually for five years, these assessments must be submitted to appropriate congressional committees. The content of these assessments will include an analysis of how terrorist organizations use these applications for radicalization and recruitment , information on how online payment features provide monetary support to these groups, and recommendations for appropriate countermeasures. Each assessment must be coordinated with the Department of Homeland Security's Privacy Office and Office for Civil Rights and Civil Liberties to ensure compliance with applicable law and protection of individual rights. The assessments will be submitted in an unclassified form, with a classified annex for intelligence sources and methods, and the unclassified portion will be publicly posted. Furthermore, the Secretary of Homeland Security is required to review and incorporate relevant information from State and local fusion centers into these assessments and disseminate such information back to the centers. The bill broadly defines "foreign cloud-based mobile or desktop messaging applications" to include those connected to foreign adversaries or terrorist organizations, specifically listing examples such as ByteDance-owned applications, Tamtam, Telegram, WeChat, and Weibo, among others.
View Full Text

Suggested Questions

Get AI-generated questions to help you understand this bill better

Timeline
Feb 11, 2025
Introduced in House
Feb 11, 2025
Referred to the Subcommittee on Counterterrorism and Intelligence.
Feb 11, 2025
Referred to the House Committee on Homeland Security.
  • February 11, 2025
    Introduced in House


  • February 11, 2025
    Referred to the Subcommittee on Counterterrorism and Intelligence.


  • February 11, 2025
    Referred to the House Committee on Homeland Security.
August Pfluger

August Pfluger

Republican Representative

Texas

Cosponsors (6)
Zachary Nunn (Republican)Eugene Simon Vindman (Democratic)Jimmy Panetta (Democratic)Morgan Luttrell (Republican)Gabe Evans (Republican)Randy K. Sr. Weber (Republican)

Homeland Security Committee, Counterterrorism and Intelligence Subcommittee

Armed Forces and National Security

  • Introduced
  • In Committee
  • On Floor
  • Passed Chamber
  • Enacted
Computers and information technologyCongressional oversightInternet, web applications, social mediaTelephone and wireless communicationTerrorism