Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity Education & TrainingSecurity Leadership and ManagementSecurity Education & TrainingPhysical Security

Education & Training

The multi-faceted threat of domestic terrorism

Domestic terrorism poses a number of risks — both physical and cyber.

By Taelor Sutherland
Women at top of escalator

Marilyn Nieves / E+ via Getty Images

August 8, 2024

Geopolitical threats have been a top security concern for years. Issues such as climate change increase the likelihood of severe weather, while the impact of international conflicts can be felt all over the world.

Closer to home, U.S. organizations also have to manage the risk of domestic terrorism. While far from a new issue, domestic terrorism has been a growing concern in the United States for the past few years. The current definition of domestic terrorism includes criminal acts dangerous to human life occurring in the U.S. that appear intended to coerce a civilian population or influence or affect the conduct of government.

The first National Strategy for Countering Domestic Terrorism was implemented in 2021. The initial 2021 analysis identifies two of the primary threats: racial and ethnic-based attacks, and anti-government-based attacks. The U.S. Government Accountability Office (GAO) found that from fiscal years 2013 through 2021, the Federal Bureau of Investigations’ (FBI) number of open domestic terrorism-related cases grew by 357% from 1,981 to 9,049.

In recent years, domestic terrorists have been lone actors or small groups of informally aligned individuals who mobilize to violence with little or no clear organizational structure or direction. The plan focuses on information sharing and prevention, with a goal of shutting down the various pathways that lead up to an attack. The strategy’s first priority is analysis and information sharing. This included research into past attacks and building proper communication networks between government organizations. In recent years, GAO has put out a report on the current domestic terrorism trends, including recommendations for the FBI and the Department of Homeland Security (DHS). According to GAO, the FBI tracks “investigations” and “disruptions”, while the DHS tracks “attacks” and “plots”.

Due to the rise in attacks, GAO provided a list of recommendations for both organizations. These recommendations included improving communication channels, both between the organizations and with the country as a whole.

Security leaders should pay close attention to these updates. This information is not only critical to government organizations, but any business that operates in a public space. Leaders should familiarize themselves with risk factors and work to develop a solid security plan. This can include strengthening access control and training employees in emergency response.

It’s important to consider cyber threats alongside any physical ones. Large-scale cyberattacks such as the one against MGM Resorts, have proven their ability to be disruptive. These kinds of attacks pose a different kind of risk, as they can be launched from anywhere in the country. Some threat actors take credit for their work, but some attacks can go unclaimed. Cyberattacks pose the risk of shutting down critical systems, such as hospitals, or revealing sensitive information to the public. It’s important for organizations to build out a cybersecurity strategy to protect themselves, especially if they handle any information a cybercriminal may want.

Important data to protect could include:

  • Medical information
  • Banking information
  • Social Security Numbers
  • Home addresses

Recently, unexpected targets have fell victim to cyberattacks. Ticketmaster recently suffered a ransomware attack that threatened to leak consumer payment information, as users often saved their card information to their account for a quick ticket-buying process. If any personal information is saved within a company’s system, there needs to be a plan to protect it.

Domestic terrorism is unfortunately a rising theat. As government agencies work to prevent future attacks, businesses need to work to keep themselves and their data safe.

KEYWORDS: cyber attack cyber terrorism domestic terrorism physical attack terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Programmers looking at code

    60% of Security Leaders Say Threat Actors Are Evolving Too Quickly

    See More
  • police

    Rep. Schiff Introduces The Confronting the Threat of Domestic Terrorism Act

    See More
  • Sad Day with 15th Anniversary of Oklahoma City Bombing – Domestic Terrorism More a Threat

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing