NATIONAL STRATEGY for COUNTERTERRORISM of the United States of America OCTOBER 2018 THE WHITE HOUSE WASHINGTON, DC My fellow Americans: I made a solemn promise to the American people to spare no effort to preserve the safe ty and se curity of the Unite d State s. This National Strate gy for Counte rte rrorism helps keep that promise. We must defeat the terrorists who threaten America’s safety, prevent future attacks, and protect our national interests. This requires a new approach to combatting and preventing terrorism. In fulfilling my promise to renew America’s strength and security, I have revitalized our military, and we are now, through action and leadership, prevailing against the terrorists aiming to harm us and our interests. We are using all available tools at our disposal to combat terrorist groups, starve them of support, and prevent them from recruiting ne w followe rs. We are also disrupting te rrorist thre ats within our own borde rs, from individuals mobilized to violence by a range of domestic and foreign terrorist ideologies and who threaten our safety. This has not be e n e asy. My Administration inhe rite d a world in which the te rrorist threat had become more complex and widespread than ever before. We, the people of the United States, face global terrorist networks and their affiliates. We face terrorist organizations backed by state sponsors. And we face homegrown threats inspired by terrorist propaganda. The National Strategy for Counterterrorism recognizes the full range of terrorist threats that the United States confronts within and beyond our borders, and emphasizes the use of all elements of national power to combat terrorism and terrorist ideologies. It enhances our emphasis on targeting terrorist networks that threaten the United States and our allies and on disrupting and denying their ability to mobilize, finance, travel, communicate, and inspire new followers. We will deny terrorists the freedom to travel and communicate across inte rnational borde rs, and we will take action to limit the ir ability to recruit and radicalize online. We will combat the violent, extreme, and twisted ideologies that purport to justify the murder of innocent victims. We will also ensure that America’s critical infrastructure is protected, in order to deter and prevent attacks, and is resilient so that we can quickly recover should it come under attack. This National Strategy for Counterterrorism sets forth a new approach. We will protect our homeland, our interests overseas, and our allies and partners. We will defeat radical Isla mist terrorists such as ISIS and al-Qa'ida, expand our agile counterterrorism toolkit to prevent future terrorist threats, deter emerging threats, roll back Iran's global terrorist network, and ensure our country's continued safety. Now, and in the future, we will secure our Nation and prevail against terrorism. Sincerely, President Donald J. Trump The White House October 2018 e xeCutive Summary We Remain a Nation at War Today's terrorist landscape is more fluid and complex than ever. For this reason, counterterrorism remains a top priority for this Administration. Our principal terrorist enemies are radical Islamist terrorist groups that seek to conduct attacks globally, violate our borders, and radicalize and recruit potential extremists within the United States and abroad. We continue to face threats from Iran, the most prominent state sponsor of terrorism, through its global network of operatives and its ongoing support to an array of terrorist groups. Terrorists motivated by other forms of extremism also use violence to threaten the homeland and challenge United States interests. These terrorist threats are different in many ways, but they all seek to use violence to undermine the United States and disrupt the American way of life. pressure on terrorist organizations to prevent them from reemerging. Since September 11, 2001, we have learned that winning the war on terrorism requires our country to aggressively pursue terrorists. We have also learned, however, that we must do more than merely kill or capture terrorists. We must dismantle terrorists' networks and sever the sources of strength and support that sustain them, that allow them to regenerate, and that permit them to adapt. To secure a lasting victory, we must also maintain sufficient This Administration has already taken significant steps to address the terrorist threat. Under the leadership of President Donald J. Trump, the United States has accelerated efforts to defeat those terrorists who pose a threat to the United States. For instance, working with coalition partners, we have • This strategy uses all available instruments of United States power to counter terrorism. We will defeat our enemies with the full force of America’s strengths. • This strategy will protect the United States against all terrorists that threaten our country. We will not focus on a single organization but will counter all terrorists with the ability and the intent to harm the United States, our citizens, and our interests abroad. • This strategy places America First and emphasizes protection of the homeland—building strong borders, strengthening security at all ports of entry into the United States, protecting its critical infrastructure, and facilitating preparedness. • This strategy recognizes, however, that America First does not mean America alone. We will broaden our range of partners to combat radical Islamist terrorism, Iran-sponsored terrorism, and other forms of violent extremism; encourage capable partners to play a larger role in counterterrorism efforts; and assist other partners so that they can eventually address terrorist threats independently. i NATIONAL STRATEGY FOR COUNTERTERRORISM liberated nearly all of the territory once controlled by the self-declared Islamic State of Iraq and al-Sham (ISIS) in Iraq and Syria. While we have made much progress, additional challenges remain. We must continually work to stay ahead of an adaptive enemy. This means that we must undertake additional efforts to prevent terrorists from acquiring or using weapons of mass destruction (WMD) and other advanced attack capabilities. We must prevent terrorists from exploiting new technologies in today’s dynamic information environment, and we must counter terrorists’ ability to recruit and radicalize online and through other means. This means collaborating so that foreign governments take the lead wherever possible, and working with others so that they can assume responsibility in the fight against terrorists. Domestically, we must empower our frontline defenders—our state and local law enforcement professionals—as well as many other government, civil society, and private sector partners to prevent and counter terrorism in the United States. Building on the National Security Strategy and the Administration's progress to date, the National Strategy for Counterterrorism outlines how the United States will combat terrorism at home and abroad and keep America safe.  Acting in accordance with this strategy, we will defeat our enemies, just as we have defeated the purveyors of oppression, fascism, and totalitarianism in previous wars. We will always remember September 11, 2001, and the sacrifices made by so many brave patriots in defense of our country against the evil scourge of terrorism. With that same spirit of service and self-sacrifice, we will safeguard the homeland, protect our way of life, and eliminate our enemy’s ability to threaten our country. We are a nation at war—and it is a war that the United States will win. Likewise, experience has taught us that preparedness and prevention must be integral parts of our counterterrorism strategy. We must protect the homeland against the terrorist threat by building strong borders, securing United States infrastructure, and enhancing the preparedness of the American people. Experience has also highlighted the importance of strong partnerships in sustaining our counterterrorism efforts. Whenever possible, the United States must develop more efficient approaches to achieve our security objectives, relying on our allies to degrade and maintain persistent pressure against terrorists. ii Table of Contents Introduction....................................................................................1 National Strategy for Counterterrorism at a Glance................................. 5 The Terrorist Adversary..................................................................... 7 Prioritization and Resourcing............................................................. 11 Pursue Terrorist Threats to Their Source.............................................. 13 Isolate Terrorists from Financial, Material, and Logistical Sources of Support........................................................................... 15 Modernize and Integrate a Broader Set of United States Tools and Authorities to Counter Terrorism and Protect the Homeland...................... 17 Protect United States Infrastructure and Counter Terrorist Radicalization Recruitment................................... 21 and Enhance Preparedness................. 19 Strengthen the Counterterrorism Abilities of International Partners.................... 23 Conclusion....................................................................................25 iii Introduction The Path to Victory The United States occupies a special role among nations as a vanguard of freedom, democracy, and constitutional governance. These luminous ideals must be assiduously defended in a world of increasing challenges and dangers from the forces that threaten America’s people, our vital interests, and the security and prosperity of our allies and partners. Terrorists seek to undermine American ideals and the United States Government by using violence and propaganda to advance their depraved goals. After seventeen years of armed conflict and significant costs in American blood and treasure, our efforts to prevent and counter terrorism have met with mixed success. While we have succeeded in disrupting large-scale attacks in the homeland since 2001, we have not sufficiently mitigated the overall threat that terrorists pose. stated,  “America is committed to adjusting our strategies to meet evolving threats and new facts. We will discard those strategies that have not worked—and will apply new approaches informed by experience and judgment.” We must confront  terrorists with the combined power of America’s strengths—our strong military, our law enforcement and intelligence communities, our civilian government institutions, our vibrant private sector, our civil society, our international partnerships, and the firm resolve of the American people. Harnessing our full potential, the spirit of innovation that has been key to our national greatness, and our tradition of working together toward our common goals, we will prevail and prevent terrorism from disrupting the American way of life. Today’s terrorist threats have changed, and terrorist groups are now more geographically dispersed and their tactics more diversified. To address this evolving terrorist threat across the globe and within the homeland, our approach to counterterrorism must evolve. As President Donald J. Trump has Through the National Strategy for Counterterrorism, we will achieve the following end states to safeguard our homeland, way of life, and shared interests: • The terrorist threat to the United States is eliminated; • Our borders and all ports of entry into the United States are secure against terrorist threats; • Terrorism, radical Islamist ideologies, and other violent extremist ideologies do not undermine the American way of life; and • Foreign partners address terrorist threats so that these threats do not jeopardize the collective interests of the United States and our partners. 1 NATIONAL STRATEGY FOR COUNTERTERRORISM To achieve these aims, this strategy adopts an America First approach to counterterrorism—one that is guided by United States interests; shaped by realistic assessments of both our challenges and our capabilities; and attuned to the important roles of our allies and partners, both foreign and domestic, in our shared counterterrorism efforts. strategic communications. These tools are an integral part of our counterterrorism activities, and we will continue to incorporate them when appropriate to maximize their effects. In addition, this strategy prioritizes a broader range of non-military capabilities, such as our ability to prevent and intervene in terrorist recruitment, minimize the appeal of terrorist propaganda online, and build societal resilience to terrorism. This includes leveraging the skills and resources of civil society and non-traditional partners to diminish terrorists’ efforts to radicalize and recruit people in the United States. This strategy differs from previous strategies in that it adopts a more agile and expansive approach that addresses the full spectrum of terrorist threats to the United States, including our enemies overseas and the people they seek to influence and mobilize to violence in the United States. We will also confront the threat of terrorists in the United States who seek to further their To defeat radical Islamist terrorism, we must also political or social aims through speak out forcefully against a unlawful acts of violence without hateful ideology that provides foreign direction or inspiration. In this the breeding ground for violence “But above all, we must pursuit, we will continue to protect and terrorism. We will expose the be united in pursuing American freedoms, and we will be destructive, totalitarian nature the one goal that unwavering in our commitment to of the ideology that fuels violent defeat all those who turn to violence radical Islamist movements, such transcends every other in an attempt to destroy, disrupt, or as ISIS and al-Qa'ida. We will reveal consideration. That impair our society. the way violent radical Islamist goal is to meet history’s terrorists have killed, exploited, Importantly, this America First and betrayed Muslim communities, great test—to conquer approach will harness the full span including women and children. extremism and vanquish of United States power and use Through our efforts, we will thwart the forces of terrorism.” every available tool to combat terrorists' ability to exploit the terrorism at home, abroad, and in Internet for directing, enabling, or PRESIDENT DONALD J. TRUMP cyberspace. This includes military inspiring attacks. and intelligence op er at ions overseas, law enforcement actions We will not do this alone. This at home and abroad, diplomatic engagement, and strategy recognizes that effective counterterrorism the use of financial tools. We will modernize and requires a wide range of public and private sector integrate existing counterterrorism tools so we can par tners as well as foreign par tnerships. A s secure our borders through, among other things, President Trump stated, “We must seek partners, more rigorous scrutiny of entry applications. We not perfection—and to make allies of all who share will also deploy new technologies precisely where our goals.” Accordingly, from civil society and state, they are needed and protect critical infrastructure local, tribal, and territorial governments to private in the United States from terrorist attacks. Finally, sector partners and foreign allies, the full range of our we will incorporate two of the most potent tools in partnerships must be enhanced to effectively prevent the information environment: cyber operations and and counter terrorist activity, particularly as tactics 2 INTRODUCTION Through this new approach, the United States will integrate our instruments of national power to achieve our end states through the following strategic objectives: The capacity of terrorists to conduct attacks in the homeland and against vital United States interests overseas is sharply diminished; The sources of strength and support upon which terrorists rely are severed; Terrorists’ ability to radicalize, recruit, and mobilize to violence in the homeland is diminished; Americans are prepared and protected from terrorist attacks in the homeland, including through more exacting border security and law enforcement actions; Terrorists are unable to acquire or use WMDs, including chemical, biological, radiological, and nuclear weapons, and other advanced weaponry; and Public sector partners, private sector partners, and foreign partners take a greater role in preventing and countering terrorism. and actors can change quickly. We will expect more of our partners in this fight, but they will never doubt our resolute commitment to defending our shared interests. (informed by research, intelligence, and analysis) to ensure that we are making measurable progress toward our strategic objectives. By rigorously monitoring our progress and measuring the impact of our activities, we can make informed adjustments when needed to advance our counterterrorism efforts. All the while, we will be pragmatic in our approach and mindful of the need to use our resources carefully. This strategy, therefore, prioritizes United States counterterrorism efforts against those terrorists with the ability and intent to harm the United States and our vital national interests and limits United States efforts overseas to those that directly bolster our national security. Likewise, to maximize the effectiveness of our actions, we will continue to integrate United States Government counterterrorism efforts. Finally, we will continually review the efficacy of our approach through independent assessments Guided by this strategy, rooted in American principles, and harnessing our inherent strengths as a nation, we will eliminate terrorists’ ability to threaten America, our interests, and our engagement in the world. The United States—forever the sentinel of democracy and freedom—will prevail over terrorism and preserve the American way of life. Through our triumph, we will demonstrate that American strength remains a lasting force for good in the world. 3 NATIONAL STRATEGY FOR COUNTERTERRORISM National Strategy for Counterterrorism at a Glance The strategic objectives are critical to reaching the desired end states, and the lines of effort are the means for achieving them. STRATEGIC OBJECTIVES The capacity of terrorists to conduct attacks in the homeland and against vital United States interests overseas is sharply diminished Americans are prepared and protected from terrorist attacks in the homeland, including through more exacting border security and law enforcement actions The sources of strength and support upon which terrorists rely are severed Terrorists are unable to acquire or use Weapons of Mass Destruction (WMD), including chemical, biological, radiological, and nuclear weapons, and other advanced weaponry Terrorists’ ability to radicalize, recruit, and mobilize to violence in the homeland is diminished Public sector partners, private sector partners, and foreign partners take a greater role in preventing and countering terrorism END STATES The terrorist threat to the United States is eliminated Our borders and all ports of entry into the United States are secure against terrorist threats Terrorism, radical Islamist ideologies, and other violent extremist ideologies do not undermine the American way of life Foreign partners address terrorist threats so that these threats do not jeopardize the collective interests of the United States and our partners. LINES OF EFFORT Pursue terrorist threats to their source Isolate terrorists from financial, material, and logistical sources of support Modernize and integrate a broader set of United States tools and authorities to counter terrorism and protect the homeland Protect United States infrastructure and enhance preparedness Counter terrorist radicalization and recruitment Strengthen the counterterrorism abilities of international partners 5 The Terrorist A dversary The United States and our allies face an increasingly complex terrorist landscape, populated by a diverse array of actors employing new technologies and tactics to advance their agendas. The terrorist threat to the United States is growing more dynamic and diffuse as an increasing number of groups, networks, and individuals exploit global trends, including the emergence of more secure modes of communications, the expansion of social and mass media, and persistent instability across several regions. Radical Islamist terrorists remain the primary transdevices to defeat aviation security measures, and national terrorist threat to the United States and using high-quality media products to recruit extremit s vital national interest s. ists in the West. Future radical Prominent terrorist organiIslamist terrorists and other terzations, particularly ISIS and rorists will continually adapt “ISIS is on a campaign al- Qa'ida, have repeate dly these and other tactics to their of genocide, committing demonstrated the intent and circumstances and the technocapability to attack the homelogical advances of the age. It is, atrocities across the world. land and United States intertherefore, critical that the United Radical Islamic terrorists ests and continue to plot new States counterterrorism posare determined to strike our attacks and inspire susceptible ture be agile enough to adapt as people to commit acts of viowell. homeland, as they did on lence inside the United States.1 9/11, as they did from Boston These groups stoke and exploit Radical Islamist terrorists have to Orlando to San Bernardino weak governance, conflict, instaa violent extremist ideolog y bility, and longstanding politithat ser ves to create a comand all across Europe.” cal and religious grievances to mon identity and sense of purPRESIDENT pursue their goal of eliminating pose for those susceptible to its DONALD J. TRUMP Western influence in majority core message. This vile ideolMuslim countries and remaking ogy is used to indoctrinate new Islamic society. recruits to accept terrorist groups' goals and directives without question, and also allows these groups Radical Islamist terrorist groups have developed to maintain cohesion, ensure conformity, and jusand used methods that have challenged United tify the use of violence to meet the ideology's goals. States counterterrorism efforts, including estabIt avails terrorists of a worldview that helps unify lishing state-like governing institutions within their their efforts by fomenting conflict and attempts to safe havens, deploying sophisticated explosive legitimize terrorism by elevating the social status of The intelligence and law enforcement communities refer to an individual in the United States radicalized and mobilized to violence by radical Islamist terrorist ideologies as a homegrown violent extremist (HVE). 1 7 NATIONAL STRATEGY FOR COUNTERTERRORISM group members and absolving individuals from culpability for their participation in violence. Because of this, we must ensure that our efforts will undermine the appeal of this ideology of hate. Its resilience, power, and appeal make it a grave danger to not just our own nation’s security but also that of our allies across the globe. Without the appeal of this ideology, radical Islamist terrorism has no foundation. new routes. Europe's struggle to screen the people crossing its borders highlights the importance of ensuring strong United States borders so that terrorists cannot enter the United States. In addition, the savagery of ISIS has caused a massive movement of millions of innocent refugees. Our battlefield successes, meanwhile, have given way to the flight of thousands of terrorists seeking to evade justice. As defeated fighters and their families disperse, the United States and our partners must remain vigilant to ensure that terrorists cannot evade our security measures to threaten our people and way of life. ISIS remains the foremost radical Islamist terrorist group and the primar y transnational terrorist threat to the United States, despite ongoing United States and coalition civilian and military efforts that have diminished the group's footprint in Iraq and Syria, killed thousands of its members, and curtailed its global expansion. ISIS retains the financial and material resources and expertise to launch external attacks—including against United States interests—and its senior leaders continue to call for attacks against the United States. The group's global reach remains robust, with eight official branches and more than two dozen networks regularly conducting terrorist and insurgent operations across Africa, Asia, Europe, and the Middle East. Despite many setbacks, ISIS maintains a sophisticated and durable media and online presence that allows it to encourage and enable sympathizers worldwide to conduct dozens of attacks within target countries, including the United States. The increase in attacks by persons mobilized to violence in the United States underscores the ability of ISIS to inspire terrorist attacks. Meanwhile, al-Qa'ida's global network remains resilient and poses an enduring threat to the homeland and United States interests around the world. Consistent United States-led counterterrorism pressure has removed many of its senior leaders and reduced the group’s ability to operate in South Asia, but its affiliates continue to plan and carry out terrorist attacks against the United States and our allies, as well as raise funds from individual supporters through the international financial system. Affiliate resources are primarily focused on local and regional conflicts, but key operatives and elements within the network continue to seek out new opportunities to strike the homeland and United States interests and to inspire attacks inside the United States. Veteran al-Qa‘ida leaders are working to consolidate and expand the group’s presence in several regions, including in Syria, from which it aspires to launch new attacks against the United States and our allies. ISIS has been innovative and determined in its pursuit of attacks in the West. The group has exploited weaknesses in European border security to great effect by capitalizing on the migrant crisis to seed attack operatives into the region. For instance, two of the perpetrators of the 2015 ISIS attacks in Paris, France, infiltrated the country by posing as migrants. Further, ISIS is continuing its efforts to circumvent European efforts to shore up border security by identifying Both ISIS and al-Qa'ida have inspired people susceptible to their malign influence to conduct terrorist attacks inside the United States. This will probably remain the most frequent form of radical Islamist terrorism in the United States for the next several years. Such attacks, motivated by a wide range of factors, will continue to be conducted primarily through the use of simple 8 THE TERRORIST ADVERSARY tactics against predominantly soft targets. ISIS is likely to remain the main inspiration for such attacks, particularly if the group can retain its prominence and use social and mainstream media coverage to promote its violent message. Through the Islamic Revolutionary Guard CorpsQods Force (IRGC-QF), Iran's primary terrorist support arm, the Government of Iran provides financial and material support, training, and guidance to Hizballah and other Shia militant groups operating in Bahrain, Iraq, Syria, and Yemen. It also supports HAMAS and other Palestinian terrorist groups. With operatives deployed around the world, the IRGC-QF has the capability to target United States interests and possibly the homeland. In addition to ISIS and al-Qa'ida, dozens of other radical Islamist terrorist groups are working to advance more locally focused insurgent or terrorist campaigns, while still posing a threat to United States persons and interests overseas. These groups, including Boko Haram, Tehrik-e Taliban Pakistan, and Lashkar-e There is also a broad range of revolutionary, nationTayyiba, employ a range of political and terrorist tacalist, and separatist movements overseas whose use tics to undermine local governments and conduct of violence and intent to destabilize societies often attacks. These organizations puts American lives at risk. For will probably prioritize regional example, the Nordic Resistance Movement is a prominent transgoals over attacks against the “Iran and its proxies national, self-described nationhomeland or United States have bombed American alist-socialist organization with interests because of resource embassies and military anti-Western views that has conconstraints or political conducted violent attacks against siderations. However, many of installations, murdered Muslims, left-wing groups, and these groups are hostile to the hundreds of American others. The group has demonUnited States, maintain netservice members, and strated against United States works of sympathizers around the world, and retain ties to ISIS Government actions it perceives kidnapped, imprisoned, or al-Qa'ida, underscoring their are supportive of Israel and has and tortured American the potential to extend its tarpotential threat to United States citizens.” geting to United States interinterests. ests. Similarly, the neo-Nazi PRESIDENT National Action Group, a terrorIran remains the most promDONALD J. TRUMP ist organization that was banned inent state sponsor of terrorby the United Kingdom in 2016 ism, supporting militant and terrorist groups across the Middle East and cultifor its promotion of violence against politicians and vating a network of operatives that pose a threat in minorities, operates mainly in the United Kingdom the United States and globally. These groups, most but has engaged with like-minded groups in the notably Lebanese Hizballah (Hizballah), use terrorUnited States, Estonia, France, Germany, Latvia, and ism and other asymmetric means in partnership Poland—expanding the potential influence of its viowith Iran to expand their influence in Iraq, Lebanon, lent ideology. Likewise, Babbar Khalsa International the Palestinian territories, Syria, and Yemen and seeks, through violent means, to establish its own to destabilize their rivals. Hizballah fields powerindependent state in India and is responsible for sigful military and intelligence elements, possesses nificant terrorist attacks in India and elsewhere that have claimed the lives of innocent civilians. Such large stocks of sophisticated arms, and maintains groups may avoid or deprioritize targeting United extensive networks of operatives and sympathizStates interests for now to avoid detracting from ers overseas, including individuals in the homeland. 9 NATIONAL STRATEGY FOR COUNTERTERRORISM their core goals but frequently conduct assassinations and bombings against major economic, political, and social targets, heightening the risk to United States personnel and interests overseas. extremist groups attempt to advance their agendas through acts of force or violence. Notably, domestic terrorism in the United States is on the rise, with an increasing number of fatalities and violent nonlethal acts committed by domestic terrorists against people and property in the United States. The economic harm caused by domestic terrorists has also increased sharply as domestic terrorists have continued to destroy property, disrupt business, and perpetrate financial crimes that are designed to damage certain sectors of the United States economy. Lastly, the United States has long faced a persistent security threat from domestic terrorists who are not motivated by a radical Islamist ideology but are instead motivated by other forms of violent extremism, such as racially motivated extremism, animal rights extremism, environmental extremism, sovereign citizen extremism, and militia extremism. Such 10 P rioritization and R esourcing As President Trump has noted, “America is a sovereign nation and our first priority is always the safety and security of our citizens.” The United States must, therefore, relentlessly focus on countering terrorism that jeopardizes American citizens and interests. We will not dilute our counterterrorism efforts by attempting to be everywhere all the time, trying to eradicate all threats. We can and will, however, optimize and focus our resources to effectively prevent and counter those terrorists who pose a direct threat to the United States homeland and vital national interests. To combat what has become a more complex and In addition, counterterrorism efforts must be properly geographically dispersed terrorist threat, the United balanced across all instruments of national power and States will prioritize integrated actions and resources include the efforts of traditional and non-traditional against those terrorists that have both the intent and partners. While the United States must retain the abilcapability to attack the United ity to strike at terrorism around the States and our interests abroad. globe, non-military tools—such “When it comes to As noted, radical Islamist terroras law enforcement, intelligence, ists present the most dangerdiplomacy, financial measures, terrorism, we will do ous transnational terrorist threat stabilization, development, prewhatever is necessary to the United States and our vital vention, and inter vention and to protect our nation.” national interests as defined in the reintegration programs—are also National Security Strategy.  At the required to prevent and counter PRESIDENT same time, the United States also DONALD J. TRUMP terrorism. We must, therefore, faces threats from Iran-backed increase our focus on developing terrorist groups and other transdomestic and foreign partners’ national terrorist organizations. In the homeland, we non-military counterterrorism capabilities so they will continue to confront the rising threat of attacks can act independently against terrorists. committed by persons inspired and mobilized to violence by both radical Islamist ideologies and domesFinally, as we embark on this new approach, we must tic terrorist ideologies. rigorously monitor and assess our effectiveness and adjust operations accordingly.  Annual independent Terrorists and the threats they pose, however, are not strategic assessments informed by research, intelmonolithic. The dangers posed by different terrorists ligence, and analysis will ensure that we are making vary by group and by region. The National Strategy measurable progress toward our strategic objectives. for Counterterrorism, therefore, will guide the tools These assessments will identify the impediments to and approaches used for counterterrorism efforts our effectiveness and recommend adjustments to and will generally defer to regional, functional, and the strategy to outpace dynamic adversaries. They group-specific strategies to prioritize terrorist groups will also ensure that our progress is sustainable as we based upon the threat they pose to our homeland continue to address the full range of contemporary and vital national interests. national security challenges. 11 P ursue Terrorist Threats to Their S ource Terrorists are difficult to disrupt because they are highly adaptive and use any means to achieve their ends. Within the United States, they exploit our open and free society to target civilians. They take advantage of technology, such as the Internet and encrypted communications, to promote their malicious goals and spread their violent ideologies. Overseas, they thrive in countries with weak governments and where disenfranchised populations are vulnerable to terrorists' destructive and misinformed narratives, and they are adaptive in the face of pressure from countries with strong governments. Some are sheltered and supported by foreign governments or even do their bidding. In the past, when the United States and our partners have disrupted terrorist plots, some terrorists remained in hiding, only to reemerge when pressure subsided. Therefore, the United States must do more than disrupt individual plots—we must pursue the entirety of the network involved in terrorist plotting to prevent the remaining terrorists from reviving their operations. activity and maintain pressure on key terrorists and terrorist organizations. Priority Actions TARGET KEY TERRORISTS AND TERRORIST GROUPS: Using both military and non-military capabilities, we will target the terrorists and terrorist groups who pose the greatest threat to American citizens and interests. This will include terrorist leaders, operational planners, and individuals deploying their expertise in areas such as WMD, explosives, cyber operations, and propaganda. We will apply persistent pressure through sustained United States and partner intelligence, law enforcement, economic and financial measures, and military action to disrupt, degrade, and prevent the reconstitution of terrorist networks. At home, law enforcement at all levels of government will continue to pursue known or suspected terrorists, integrating all sources of information available. Overseas, we will disrupt terrorist networks that pose a credible threat to United States interests by conducting military, intelligence, and law enforcement operations and employing financial measures against discrete targets—working by, with, and through partners where possible. We will also enhance intelligence-sharing arrangements, increasing the timeliness and quality of exchange to identify the entire network involved in terrorist ENHANCE REACH INTO DENIED AREAS OVERSEAS:  Where we cannot establish a physical presence to protect 13 NATIONAL STRATEGY FOR COUNTERTERRORISM FURTHER INTEGRATE FEDERAL, STATE, A ND LOCAL our interests directly, we will develop innovative means and work with partners to expand our capability to identify and mitigate emerging threats before they can strike the United States and our national interests. CO U N T E R T E R R O R I S M I N FO R M AT I O N -S H A R I N G : We will improve the ability to share timely and sensitive information on threats and the individuals p er p et r at ing t hem, whet her mot i vate d by domestic or foreign terrorist ideologies, across all levels of government. We will continue to ensure that law enforcement agencies across all levels of government have the information that they need to identify and act swiftly against terrorist activity. EFFECTIVELY USE L AW OF ARMED CONFLICT (LOAC) DETENTION AS A COUNTERTERRORISM TOOL: The deten- tion of enemies under the LOAC permits the United States to humanely remove dangerous terrorists from the battlefield and enhances our ability to collect intelligence from captured terrorists. This capability, in certain circumstances, also permits detention of terrorists pending their transfer to the United States for criminal prosecution. We will, therefore, retain LOAC detention as a counterterrorism tool, preserve our ability to detain terrorists at the detention facilities at United States Naval Station Guantanamo Bay, Cuba, and explore ways to better integrate and maximize the utility of this capability where lawful and appropriate. A MPLIF Y THE IMPAC T OF COUNTERTERRORISM OPERATIONS WITH STRATEGIC COMMUNICATIONS:  We will integrate our strategic communications capabilit y across our ef for ts to send a clear message: those who threaten the United States will pay a serious price, and America stands in solidarity with the populations upon which terrorists prey. This message will aim to discredit terrorist narratives, dissuade potential terrorist supporters, and demonstrate that the effects of our counterterrorism operations are not limited solely to direct action. 14 Isolate Terrorists from Financial, M aterial, and L ogistical Sources of Support The technological advances of the past century have created an interconnected world in which it is easier than ever to quickly move people, funding, material, and information across the globe. The backbone of this interconnected system is information technology—largely created and facilitated by the United States Government and private industry—that is increasingly enabling faster transactions of all kinds across the world. Terrorists use these same publicly available technologies to command and control their organizations and to plot attacks, travel, and abuse the global financial system to raise funds and procure weapons, materiel, and basic necessities. Terrorists cannot sustain their Priority Actions operations without these “As we deny terrorist ENHANCE DETECTION AND resources. The United States DISRUPTION OF TERRORIST organizations control of and our par tner s abroad TR AVEL: We will continue to and in the private sec tor territory and populations, we collec t and share relevant mus t , t herefore, pre vent must also strip them of their information on terrorist travel terrorists from using them and identities, with a focus on access to funds. We must cut while safeguarding these providing information that the resources for legitimate use. off the financial channels that public and private sector can To accomplish this, we will let ISIS sell oil, let extremists use to identify and disrupt the increase information-sharing movement of terrorists. We will pay their fighters, and help with the private sector and will also continue to work closely tear down existing barriers to terrorists smuggle their with our partners to enhance information-sharing. Around reinforcements.” travel securit y and border the globe, we will promote protection to prevent terrorists P R E S I D E N T ef fe c t ive enforcement of DONALD J. TRUMP fleeing conflict zones from legislation and policies infiltrating civilian populations. a im e d at p r ote c t in g t h e By sharing identity information commerce, transportation, and exploiting publicly available information, such and communication industries. We will also identify as social media, we will identify these terrorists policies that must change as terrorists adapt. 15 NATIONAL STRATEGY FOR COUNTERTERRORISM PREVENT DEVELOPMENT AND ACQUISITION OF ATTACK and enable law enforcement action against them in their home countries. In these efforts, we will take appropriate steps to protect privacy, civil rights, and civil liberties. CAPABILITIES: We will prevent terrorists from develop- ing or acquiring knowledge and material that enables the development of WMD and other advanced weapons, including the capability to perform large-scale cyber attacks. We will work with partner nations, international organizations, and commercial entities to improve their capacity to secure dangerous materials and ensure that terrorists cannot exploit the scientific and academic communities to acquire new capabilities. COUNTER EXISTING AND EMERGING TERRORIST FUNDING METHODS: We will collaborate across the public and private sectors to enhance information-sharing regarding terrorists’ financial data, transactions, and activities. We will use this information and our economic authorities, including financial sanctions and other financial measures, as well as law enforcement action, to deny terrorists the ability to raise funds, including by disrupting terrorist financing and dismantling terrorist support networks, to prevent terrorists from abusing the United States and global financial systems, and to dissuade people from providing funds or materiel to terrorists. We will also share this information and collaborate with foreign partners to support their own targeted actions against terrorist financing networks and promote the effective implementation of international standards to counter terrorist financing worldwide. EXPOSE AND COUNTER STATE SUPPORT TO TERRORISM: While some countries, such as Iran, continue to use terrorism as an overt tool of their foreign policy, most countries that provide support for terrorists do so clandestinely, exploiting legitimate commercial networks to conceal their support activity. The United States will continue to acquire evidence of these states’ deceptive practices and work with allies and partners to identify and punish states that support terrorism. 16 Modernize and Integrate a Broader Set of United States Tools and Authorities to Counter Terrorism and P rotect the Homeland Terrorists are typically clandestine actors, banding in small groups or acting alone and hiding in plain sight. We must stay ahead of terrorist attacks by advancing our detection capabilities and capacity to share early indicators with those who can piece together plot information and take action. We will, therefore, move toward seamless integration fighters from traveling to the United States. We will and analysis of all information available to the United also share technology that allows partners to screen States and our partners and cargo and baggage for threats, develop technology to enable including WMD materials and lawful and appropriate responses precursors. At our borders, we “While we will always that rapidly identify and stop terwill modernize our screening welcome new citizens who rorist threats. As we continue to and identity intelligence capaprotect information appropriately, bilities to track terrorist travshare our values and love our we will deny terrorists the abilelers and prevent the entry of people, our borders will always ity to take advantage of our open those who support terrorist idebe closed to terrorism and society, and we will stop them ologies and violence. before they can attack. extremism of any kind.” Priority Actions PRESIDENT DONALD J. TRUMP DEPLOY THE INTEGR ATED FEDER A L COUNTERTERRORISM COMMUNITY AT LOCAL LEVELS: We will continue to appropriately staff and support joint terrorism task forces and interagency fusion centers with leaders and team members detailed from a variety of departments and agencies. This will ensure that the federal government is able to deploy our full range of exper tise and authorities where it will most effectively support state and local law enforcement partners. SECURE OUR BORDERS FROM TERRORIST THREATS: We will integrate capabilities and authorities from across the United States Government and coordinate with our partners abroad to prevent terrorists from entering the homeland. Our efforts will begin overseas, where we will ensure that our partners share and use information, such as watchlists, biometric information, and travel data, to prevent terrorists and fleeing foreign 17 NATIONAL STRATEGY FOR COUNTERTERRORISM ADOPT TECHNOLOGIES TO PROCESS DATA: We will har- INVESTIGATE AND INTEGRATE THREAT INFORMATION ness technologies that allow our counterterrorism efforts to keep pace with a dynamic environment and build holistic identities of terrorists. The technologies we develop will be usable and accessible across the agencies of the United States Government to ensure sharing and integration. We will also seek to enhance our ability to access terrorist communications, including by using technical tools and by law enforcement working with private industry to confront challenges posed by technological barriers. RELATING TO DOMESTIC TERRORISTS AND THEIR OVERSEAS COUNTERPARTS: Where lawful and appropriate, departments and agencies will investigate ties between domestic terrorists not motivated by radical Islamist ideologies and their overseas counterpar ts to more fully understand them. This investigation will include identifying indicators of mobilization to violence. Where applicable, we will better integrate domestic terrorism information into our analysis of homeland threats and continue information-sharing among our federal, state, local, and tribal law enforcement partners. BUILD A HOLISTIC PICTURE OF TERRORISTS’ IDENTITIES: We will enhance the collection, discovery, and exploitation of identity information supporting the counterterrorism mission, particularly biometric data. We will also identify and use other categories of identity information, including publicly available information, financial intelligence, and captured enemy material. We will improve the interoperability among United States Government systems to enable more efficient sharing of this information, bolstering our analysis and screening capabilities. UPDATE COUNTERTERRORISM POLICIES: We will fully empower the national security and law enforcement communities to pursue terrorist threats to their source and prevent terrorist attacks while respecting Americans’ rights. We will focus on policies that have not kept up with the evolving threat picture and technology environment. For example, we will allow agencies to more easily share identity intelligence about terrorists and use publicly available information to preempt emerging threats. 18 P rotect United States Infrastructure and Enhance P reparedness The critical infrastructure of the United States—much of which is privately owned— provides the essential goods and services that drive American prosperity. Coordinated efforts are, therefore, necessary to strengthen and maintain secure and resilient critical infrastructure and to prepare Americans to respond appropriately should an attack occur. By integrating and improving preparedness across all levels of government as well as the private and public sectors, we will stop terrorists from undermining our security and prosperity. Critical infrastructure has long been subject to physPriority Actions ical threats and is now increasingly exposed to the risk of attacks in cyberspace. Our infrastructure is ENHANCE DEFENSIVE MEASURES FOR INFRASTRUCTURE also interconnected, meaning AND SOFT TARGETS: As terrorists that damage or disruption of seek new ways to attack our one infrastructure element can infrastructure and soft targets— “As we rebuild America’s cause cascading effects impactboth at home and abroad—we strength and confidence at ing other forms of infrastructure. will improve and innovate our home, we are also We will stop terrorists’ attempts layered defenses. We will ensure to break through our defenses redundancy of our systems, restoring our strength and by building strong partnerships including systems in cyberspace, standing abroad.” and by implementing innovaan d de ve lop m ea sure s for PRESIDENT tive methods for protecting our rapid recovery for systems if an DONALD J. TRUMP infrastructure from attack and attack should occur, facilitating disruption. their quick return to normal operations. In addition, working with a range of stakeholders, including those from the private sector and civil BROADEN AWARENESS OF THE TERRORIST THREAT TO society, we will enhance preparedness and increase UNITED STATES CRITICAL INFRASTRUCTURE:  We will public awareness about national effor ts and ensure that key private sector and foreign partners successes in confronting terrorism to increase public are informed of the potential terrorist threat to their trust and confidence in America’s strength. facilities. We will incorporate state and local law 19 NATIONAL STRATEGY FOR COUNTERTERRORISM enforcement and emergency services personnel as well as critical infrastructure participants into national exercises featuring realistic terrorism scenarios. notification systems. Recognizing that past terrorist attacks often targeted the private sector and civilians, we will welcome their partnership in sharing best practices in stopping and recovering from terrorist attacks and related incidents. ENHANCE PREPAREDNESS AND PROMOTE READINESS: Partnering with an expanded network of organizations, individuals, and all levels of government, we will ensure that our society is prepared to withstand and quickly recover from a terrorist attack, including the possibility of a WMD attack. We will do this by conducting public information campaigns, training emergency response personnel, and ensuring the viability of our emergency DEVELOP A PUBLIC COMMUNICATIONS STRATEGY: Through a coordinated counterterrorism communications plan, we will educate the public on how to prepare for, respond during, and quickly recover after an attack. We will also train federal, state, and local interlocutors on interactions with the public that foster a culture of preparedness and resilience. 20 C ounter Terrorist R adicalization R ecruitment and Over the past seventeen years, we have built a robust counterterrorism architecture to stop attacks and eliminate terrorists, but we have not developed a prevention architecture to thwart terrorist radicalization and recruitment. Unless we counter terrorist radicalization and recruitment, we will be fighting a never-ending battle against terrorism in the homeland, overseas, and online. Our strategy, therefore, will champion and institutionalize prevention and create a global prevention architecture with the help of civil society, private partners, and the technology industry. Priority Actions ologies contain elements that have enduring appeal among their audiences. To undercut terrorist recruiting, we will demonstrate that their claims are false and do not offer effective solutions. We will exploit doubts among potential recruits to reduce terrorists' ability to incite violence and recruit. We will also communicate alternatives and promote off ramps from violence to prevent individuals from becoming more committed to these ideologies and their violent means. Throughout this cycle of recruitment and mobilization, we will take advantage of our operational, diplomatic, and development successes to demonstrate the futility of terrorist violence. INSTITUTIONALIZE A PREVENTION ARCHITECTURE TO THWART TERRORISM: We will support local solutions and empower stakeholders, providing them with the knowledge and resources they need to address terrorist threats. Early warning systems, including bystander reporting, will be a critical component of this architecture. We will also work closely with foreign partners, the technology sector, religious leaders, local stakeholders, and international fora to identify and share best practices. We will also seek to promote voices of pluralism and tolerance. Through these efforts, we will prevent radicalization and mobilization to violence across all violent extremist ideologies. INCREASE CIVIL SOCIET Y’S ROLE IN TERRORISM PREVENTION: Through engagement, public communications, and diplomacy, we will strengthen and connect our partners in civil society who are eager to expand their limited terrorism prevention efforts. We will raise awareness of radicalization and recruitment dynamics, highlight successful prevention and intervention approaches domestically and overseas, and empower local partners through We will undermine the ability of terrorist ideologies, particularly radical Islamist terrorist ideologies, to create a common identity and sense of purpose among potential recruits. We must combat the resilience of terrorist narratives by acknowledging that their ideCOMBAT VIOLENT EXTREMIST IDEOLOGIES: 21 NATIONAL STRATEGY FOR COUNTERTERRORISM outreach, training, and international exchanges. We will also promote grassroots efforts to identify and address radicalization to insulate civilian populations from terrorist influence. to violence.  In concert with our partners, we will expand relationships with technology sector entities to empower them to combat violent extremism online and terrorists' abuse of their platforms. We will continue to expose and counter the flood of terrorist ideology online. S U P P O R T I N T E R V E N T I O N , R E I N T E G R AT I O N , A N D We will identif y signs of violent radicalization and mobilization to focus real-world and online intervention efforts to prevent terrorist attacks. We will work to limit prison radicalization by training prison staff and supporting rehabilitation. We will also work with foreign partners to address the challenge of reintegrating returning foreign terrorist fighters, their families, and children into their communities. COUNTER- RECIDI V ISM EFFORTS: COUNTER R A DIC A LIZ ATI ON THROUG H S TR ATEG IC C O M M U N I C AT I O N S : Within the United States Government, we will create a common operating picture of terrorists' propaganda activities to detect and combat terrorists' narratives and better understand the audiences that they try to influence. With coalition members and our partners in civil society and international media, we will explain our counterterrorism efforts, highlight examples of non-violent means to address grievances, amplify success stories of development and recovery, and promote positive narratives. COMBAT TERRORISTS' INFLUENCE ONLINE: We will combat terrorist use of cyberspace as a global stage to showcase their violent ideologies, to fundraise, and to radicalize, recruit, and mobilize individuals 22 Strengthen the Counterterrorism A bilities of International Partners While the United States will continue to lead and provide support to partners in the fight against terrorism, our country need not sustain the primary responsibility for counterterrorism activities around the world. To address this issue, we will work to increase our partners' awareness of terrorist threats and strengthen their capacity and willingness to address them. Priority Actions Central to this approach is the adoption of proactive diplomatic engagement, development assistance, and security assistance to help our partners act independently and, ultimately, invest more of their own capital in bolstering counterterrorism efforts. ESTABLISH A BROADER RANGE OF COUNTERTERRORISM Our increasingly interconnected world demands that we prioritize the partnerships that will lead to both actions and enduring efforts “We must seek partners, that diminish terrorism. The United We will call on our capable and not perfection—and States will, therefore, partner with well-resourced partners to increase to make allies of all governments and organizations, their support to countries lacking including allied nations, the techresources and capabilities. Some who share our goals.” nology sector, financial institutions, partners have better access, experPRESIDENT and civil society. We will use diplotise, resources, and relationships DONALD J. TRUMP matic engagement with partner in particular geographic and thegovernments and further mobimatic areas, and we will encourlize existing coalitions and multilateral and interage them to employ and refine such tools to more national fora to increase the will of capable parteffectively internationalize counterterrorism efforts ners to act against threats while encouraging the while reducing reliance on United States assisimplementation of international counterterrorism tance. We will also continue to work with our less standards and the coordination of international resourced, non-traditional, or novel partners who burden-sharing efforts. may make unique contributions to help advance our shared counterterrorism efforts. Over time, this SUPPORT COUNTERTERRORISM CAPABILITIES OF KEY will result in a more balanced, equitable, and effecFOREIGN PARTNERS: We will continue to augment tive global approach to counterterrorism. the capabilities of key foreign partners to conduct critical counterterrorism activities. We will help PARTNERSHIPS: 23 NATIONAL STRATEGY FOR COUNTERTERRORISM to professionalize the military, law enforcement, judicial, intelligence, and security services, as well as financial authorities, of key partners so that they are able to conduct counterterorrism operations effectively and justly. We will also work to ensure that partners meet their responsibilities in holding their citizens accountable for any acts of terrorism committed abroad. In addition, we will enhance the capabilities of key foreign partners to investigate and prosecute terrorism across borders through law enforcement cooperation, mutual legal assistance, and extradition. about new threats, including terrorists' initial research into new attack capabilities. Building on solid partnerships and processes for sharing information, we will continue to improve the capacity for information-sharing and work with partners to allow them to more effectively act on shared information. SUPPORT LOCALLY-DRIVEN TERRORISM PREVENTION: We will work with local stakeholders and civil society to mitigate the grievances that terrorists exploit. Internationally, where United States interests are at stake, we will seek and encourage locally driven solutions that target specific causes of terrorist radicalization and mobilization to violence. We will work with partners to encourage positive narratives that promote tolerance and security. To stay ahead of emerging terrorist trends and methods, we will prioritize the sharing of information, such as biometric and geolocational data and information EXPAND PARTNER INFORMATION-SHARING: 24 Conclusion Projecting American Strength This National Strategy for Counterterrorism marks a shift in America's approach to countering and preventing terrorism. We will lead with our principles and a cleareyed understanding of a constantly changing operating environment. While this strategy was necessarily formulated against a backdrop of the threats we face today, it provides flexible guidance to enable an effective approach against an agile and adaptive terrorist threat. This new approach to counterterrorism does not rest seek to use our openness, tolerance, and freedoms on the idealistic hope of an easy and unthreatening against us. They will fail. world. Terrorism will persist as a tactic of those who view our democWe will relentlessly pursue those “Our friends will never racy as a threat to their tyrannical terrorists that seek to harm our aspirations, but the United States country and remain vigilant and question our support, and will remain secure through our vigorous in our prevention of our enemies will never strength, innovation, and indepenattacks. We will not yield to adverdoubt our determination.” dence of action. We will stay ahead saries who attack us with bombs, of our terrorist adversaries by ensurbullets, or propaganda. We will PRESIDENT ing that we have the infrastructure, rise to every challenge, face the DONALD J. TRUMP tools, authorities, practices, people, enemy on every front, and ensure and the political will to apply the full a future of peace, security, and range of our strengths against their vulnerabilities. As prosperity for our country and the world. We will profascists and communists did before them, terrorists tect the American dream. 25