Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity Education & TrainingSecurity Leadership and ManagementSecurity Education & TrainingPhysical Security

Education & Training

The multi-faceted threat of domestic terrorism

Domestic terrorism poses a number of risks — both physical and cyber.

By Taelor Sutherland
Women at top of escalator

Marilyn Nieves / E+ via Getty Images

August 8, 2024

Geopolitical threats have been a top security concern for years. Issues such as climate change increase the likelihood of severe weather, while the impact of international conflicts can be felt all over the world.

Closer to home, U.S. organizations also have to manage the risk of domestic terrorism. While far from a new issue, domestic terrorism has been a growing concern in the United States for the past few years. The current definition of domestic terrorism includes criminal acts dangerous to human life occurring in the U.S. that appear intended to coerce a civilian population or influence or affect the conduct of government.

The first National Strategy for Countering Domestic Terrorism was implemented in 2021. The initial 2021 analysis identifies two of the primary threats: racial and ethnic-based attacks, and anti-government-based attacks. The U.S. Government Accountability Office (GAO) found that from fiscal years 2013 through 2021, the Federal Bureau of Investigations’ (FBI) number of open domestic terrorism-related cases grew by 357% from 1,981 to 9,049.

In recent years, domestic terrorists have been lone actors or small groups of informally aligned individuals who mobilize to violence with little or no clear organizational structure or direction. The plan focuses on information sharing and prevention, with a goal of shutting down the various pathways that lead up to an attack. The strategy’s first priority is analysis and information sharing. This included research into past attacks and building proper communication networks between government organizations. In recent years, GAO has put out a report on the current domestic terrorism trends, including recommendations for the FBI and the Department of Homeland Security (DHS). According to GAO, the FBI tracks “investigations” and “disruptions”, while the DHS tracks “attacks” and “plots”.

Due to the rise in attacks, GAO provided a list of recommendations for both organizations. These recommendations included improving communication channels, both between the organizations and with the country as a whole.

Security leaders should pay close attention to these updates. This information is not only critical to government organizations, but any business that operates in a public space. Leaders should familiarize themselves with risk factors and work to develop a solid security plan. This can include strengthening access control and training employees in emergency response.

It’s important to consider cyber threats alongside any physical ones. Large-scale cyberattacks such as the one against MGM Resorts, have proven their ability to be disruptive. These kinds of attacks pose a different kind of risk, as they can be launched from anywhere in the country. Some threat actors take credit for their work, but some attacks can go unclaimed. Cyberattacks pose the risk of shutting down critical systems, such as hospitals, or revealing sensitive information to the public. It’s important for organizations to build out a cybersecurity strategy to protect themselves, especially if they handle any information a cybercriminal may want.

Important data to protect could include:

  • Medical information
  • Banking information
  • Social Security Numbers
  • Home addresses

Recently, unexpected targets have fell victim to cyberattacks. Ticketmaster recently suffered a ransomware attack that threatened to leak consumer payment information, as users often saved their card information to their account for a quick ticket-buying process. If any personal information is saved within a company’s system, there needs to be a plan to protect it.

Domestic terrorism is unfortunately a rising theat. As government agencies work to prevent future attacks, businesses need to work to keep themselves and their data safe.

KEYWORDS: cyber attack cyber terrorism domestic terrorism physical attack terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • police

    Rep. Schiff Introduces The Confronting the Threat of Domestic Terrorism Act

    See More
  • Programmers looking at code

    60% of Security Leaders Say Threat Actors Are Evolving Too Quickly

    See More
  • Above view of warehouse worker

    Threat Actors Target the Entire Retail Supply Chain

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • May 21, 2026

    From Referral to Response: Managing Domestic Violence Threats in the Workplace

    Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing