Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCybersecurity Education & TrainingSecurity Leadership and ManagementSecurity Education & TrainingPhysical Security

Education & Training

The multi-faceted threat of domestic terrorism

Domestic terrorism poses a number of risks — both physical and cyber.

By Taelor Sutherland
Women at top of escalator

Marilyn Nieves / E+ via Getty Images

August 8, 2024

Geopolitical threats have been a top security concern for years. Issues such as climate change increase the likelihood of severe weather, while the impact of international conflicts can be felt all over the world.

Closer to home, U.S. organizations also have to manage the risk of domestic terrorism. While far from a new issue, domestic terrorism has been a growing concern in the United States for the past few years. The current definition of domestic terrorism includes criminal acts dangerous to human life occurring in the U.S. that appear intended to coerce a civilian population or influence or affect the conduct of government.

The first National Strategy for Countering Domestic Terrorism was implemented in 2021. The initial 2021 analysis identifies two of the primary threats: racial and ethnic-based attacks, and anti-government-based attacks. The U.S. Government Accountability Office (GAO) found that from fiscal years 2013 through 2021, the Federal Bureau of Investigations’ (FBI) number of open domestic terrorism-related cases grew by 357% from 1,981 to 9,049.

In recent years, domestic terrorists have been lone actors or small groups of informally aligned individuals who mobilize to violence with little or no clear organizational structure or direction. The plan focuses on information sharing and prevention, with a goal of shutting down the various pathways that lead up to an attack. The strategy’s first priority is analysis and information sharing. This included research into past attacks and building proper communication networks between government organizations. In recent years, GAO has put out a report on the current domestic terrorism trends, including recommendations for the FBI and the Department of Homeland Security (DHS). According to GAO, the FBI tracks “investigations” and “disruptions”, while the DHS tracks “attacks” and “plots”.

Due to the rise in attacks, GAO provided a list of recommendations for both organizations. These recommendations included improving communication channels, both between the organizations and with the country as a whole.

Security leaders should pay close attention to these updates. This information is not only critical to government organizations, but any business that operates in a public space. Leaders should familiarize themselves with risk factors and work to develop a solid security plan. This can include strengthening access control and training employees in emergency response.

It’s important to consider cyber threats alongside any physical ones. Large-scale cyberattacks such as the one against MGM Resorts, have proven their ability to be disruptive. These kinds of attacks pose a different kind of risk, as they can be launched from anywhere in the country. Some threat actors take credit for their work, but some attacks can go unclaimed. Cyberattacks pose the risk of shutting down critical systems, such as hospitals, or revealing sensitive information to the public. It’s important for organizations to build out a cybersecurity strategy to protect themselves, especially if they handle any information a cybercriminal may want.

Important data to protect could include:

  • Medical information
  • Banking information
  • Social Security Numbers
  • Home addresses

Recently, unexpected targets have fell victim to cyberattacks. Ticketmaster recently suffered a ransomware attack that threatened to leak consumer payment information, as users often saved their card information to their account for a quick ticket-buying process. If any personal information is saved within a company’s system, there needs to be a plan to protect it.

Domestic terrorism is unfortunately a rising theat. As government agencies work to prevent future attacks, businesses need to work to keep themselves and their data safe.

KEYWORDS: cyber attack cyber terrorism domestic terrorism physical attack terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Monitoring cyberattacks

    Cyberattacks cited as top organizational threat

    See More
  • Payment credentials

    Credential Harvesting Becomes Top Retail Data Threat

    See More
  • Robot voting with flag background

    How AI poses a threat to election security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing