Codify — Article

Countering White Supremacist Extremism Act: DHS threat assessment

Directs DHS to develop a threat assessment on foreign violent white supremacist organizations and share findings with law enforcement and online platforms.

The Brief

This Act directs the Under Secretary for Intelligence and Analysis at the Department of Homeland Security to develop a terrorism threat assessment focused on threats from foreign violent white supremacist extremist organizations and to disseminate a supporting reference aid. The assessment is to be produced in coordination with appropriate federal partners and shared with State, local, and Tribal law enforcement through fusion centers, as well as with online platforms upon request, while protecting classified and confidential information.

The bill anchors the effort in existing U.S. Strategy for Countering White Identity Terrorism and requires coordination with the Office of Civil Rights and Civil Liberties and other federal agencies to ensure civil rights considerations are integrated.

At a Glance

What It Does

The Under Secretary for Intelligence and Analysis must develop a terrorism threat assessment and reference aid focused on foreign violent white supremacist organizations, in coordination with federal partners. Distribution is limited by protections for classified information and extended to state/local/tribal law enforcement and, upon platform request, to online platforms in consultation with CRCL.

Who It Affects

State, local, and Tribal law enforcement officials; fusion centers; online platforms; the Office of Civil Rights and Civil Liberties; and other federal agencies involved in counter-extremism efforts.

Why It Matters

It creates a formal mechanism to monitor foreign white supremacist threats, centralizes relevant intelligence for enforcement and platform moderation, and embeds civil rights safeguards in the dissemination and use of threat information.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill would assign DHS’s intelligence arm a specific, formal task: build a threat assessment about foreign white supremacist groups that pose a risk to the United States. It requires collaboration with other federal entities and draws on existing policy work, including the DoS strategy for countering white identity extremism, to shape what goes into the assessment.

The output would be a reference aid that helpfully translates the risk into practical information for law enforcement and, when platforms request it, for the tech platforms that host potentially extremist content. A key design point is to protect sensitive information and to avoid exposing individuals or organizations engaged in lawful political discourse.

The Five Things You Need to Know

1

The bill directs the Under Secretary for Intelligence and Analysis at DHS to produce a terrorism threat assessment focused on foreign violent white supremacist organizations.

2

The threat assessment and a reference aid must be shared with state, local, and Tribal law enforcement, including fusion centers, while protecting classified and confidential information.

3

The development relies on elements of the DoS Strategy for Countering White Identity Terrorism and requires coordination with the Office of Civil Rights and Civil Liberties and other federal agencies.

4

The assessment must include an overview of symbols, flags, and other references used by adherents of foreign violent white supremacist organizations.

5

The distribution to online platforms is allowed upon request and must be done in consultation with CRCL, while ensuring that no names or identifying information of individuals or organizations engaged in lawful political discourse is included.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

This section provides the formal citation of the act as the Countering White Supremacist Extremism Act. It does not create substantive programmatic requirements by itself but serves as the authorization reference for the ensuing provisions.

Section 2(a)

Threat assessment development

The Under Secretary for Intelligence and Analysis must, in coordination with appropriate federal partners, develop a terrorism threat assessment and reference aid focused on threats from foreign violent white supremacist extremist organizations. This work must protect classified and confidential information while enabling sharing with state, local, and Tribal law enforcement through existing fusion-center channels.

Section 2(b)

Foundations and coordination

The threat assessment must be based on elements of the Department of State Strategy for Countering White Identity Terrorism and be developed in coordination with the Office of Civil Rights and Civil Liberties and other relevant federal agencies. The department may incorporate existing products from these entities where appropriate.

4 more sections
Section 2(c)

Overview of symbols

The assessment must include an overview of symbols, flags, or other references used by adherents of foreign violent white supremacist extremist organizations to help identify and categorize signals aligned with these groups.

Section 2(d)

Distribution and platform engagement

Consistent with protecting classified information, the Under Secretary shall share the threat assessment with state, local, and Tribal law enforcement and with online platforms upon request. Platform coordination occurs in consultation with the Office for Civil Rights and Civil Liberties to address terms-of-service concerns.

Section 2(e)

Definitions

Defines “foreign violent white supremacist extremist organization” as a non-U.S. group seeking to promote white supremacy through force or violence, and defines “online platform” as internet-based services that host and disseminate content.

Section 2(f)

Limitation

The threat assessment and reference aid must not contain the name or other identifiable information of any individual or organization engaged in lawful political discourse in the United States.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Government across all five countries.

Explore Government in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • State, local, and Tribal law enforcement agencies gain a standardized threat framework and direct access to actionable intelligence for investigations and prevention.
  • Fusion centers gain a formal information-sharing channel to disseminate threat insights to regional partners.
  • Online platforms receive guidance and a mechanism to identify content linked to foreign violent white supremacist groups, aiding enforcement of platform policies.
  • The Office of Civil Rights and Civil Liberties is involved to ensure civil rights protections are embedded in the process.
  • DHS and other federal agencies achieve better coordination and a unified approach to monitoring and countering transnational extremist threats.

Who Bears the Cost

  • Online platforms may incur moderation, monitoring, and compliance costs to respond to requests and implement platform safeguards.
  • State, local, and Tribal law enforcement may face resource and training burdens to integrate the assessment into ongoing operations.
  • Fusion centers could face increased data handling and interagency coordination requirements.
  • The DHS and partner agencies may incur staffing and budget needs to develop, maintain, and update the threat assessment over time.
  • Civil liberties advocates may raise concerns about privacy and potential scope creep in data-sharing activities, even with safeguards.

Key Issues

The Core Tension

Balancing effective counter-extremism monitoring and platform engagement with robust protections for civil liberties and privacy, without creating incentives for overreach or misclassification of lawful political activity.

The bill’s mechanism to share threat information with platforms raises questions about how data is curated and used in practice, and how civil liberties protections are enforced in daily platform moderation. While the text requires shielding names and identifying information, ambiguity remains about the boundaries of information sharing, the handling of sensitive data, and the potential for misinterpretation or overreach in enforcement actions by private platforms or law enforcement agencies.

Implementation will hinge on clear data governance, governance around cross-jurisdictional sharing, and ongoing oversight to prevent unintended consequences for political speech and civil rights.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.