Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyPhysical Security

Education & Training

Risk mitigation for domestic terrorism and radicalization

By Maggie Shein
Risk mitigation
April 11, 2022

The past several years have been marred with hate crimes or violence spawned by different ideologies, beliefs and expressions of freedom. The array of beliefs that exist across the U.S. and the rest of the world are what make individual nations and their people diverse, unique and extraordinary. At the same time, however, those different ideologies and beliefs can sometimes lead to violence or threats to public safety and national security.

According to the Center for Strategic and International Studies (CSIS), a surge in domestic terrorism and radicalization has occurred since the mid-90s. The CSIS says that the number of domestic terrorism incidents peaked at its highest so far in 2020. Since 2015, right-wing extremists have been involved in 267 plots or attacks and 91 fatalities, the data shows. Attacks and plots ascribed to far-left views accounted for 66 incidents leading to 19 deaths. More than a quarter of right-wing incidents and just under half of the deaths in those incidents were caused by people who showed support for white supremacy or claimed to belong to groups espousing that ideology, the analysis shows.

Victims of such incidents come from diverse backgrounds, including Black people, Jews, immigrants, LGBTQ individuals, Asians and other people of color. Dozens of religious institutions — including mosques, synagogues and Black churches — as well as abortion clinics and government buildings, have been threatened, burned, bombed and hit with gunfire over the past six years, according to the data.

Further CSIS data showed that 73 far-right incidents made up an all-time annual high in 2020. Left-wing attacks reached 25 in 2020. Those incidents included attempts by extremists to derail trains to hinder oil pipeline construction and multiple incidents in which police and their facilities were targeted with guns, firebombs or graffiti.

For private and public organizations, the threat of domestic terrorism or radicalization is real, and the consequences could end in reputational damage, property damage or death. To prepare for and mitigate such risks, security leaders can evaluate hiring practices, firing practices, reporting practices and other processes and procedures within their organization. Teams should be educated on risk factors and behaviors associated with domestic terrorism, workplace violence and other insider threats.

In the U.S., the Department of Justice’s National Institute of Justice (NIJ) is tasked with researching and analyzing data in regards to domestic threats and terrorism, and there are a few common risk factors linked to social radicalization that enterprise security leaders and organizations can incorporate into their greater insider risk mitigation efforts.

Domestic terrorism risk factors, according to the NIJ, include:

  • Criminal history
  • Mental health issues
  • Unemployment
  • Being single
  • Social isolation
  • Military experience

While none of these risk factors alone would be enough to label someone a domestic terrorist, the general risk factors are important to monitor, according to government experts.

And, while risk factors are certainly important for any insider risk program to keep track of in regards to potential radicalization or domestic terrorism, another critical consideration for enterprise security professionals is reporting and response procedures. NIJ researchers have found that peers are likely to notice early signs of radicalization, yet reporting remains low.

Enterprises can champion a security culture, encouraging peers and employees to “see something, say something” by creating an open-door policy with security teams and the greater organization. Proliferating a culture of awareness and inclusion beyond just tasking employees with security responsibilities can go a long way in encouraging employees to have an open dialogue and report potential warning signs to security teams.  

In addition, security leaders say that just as with larger insider risk threat mitigation programs, having clear processes and procedures for handling reporting, communication after reporting, and conducting follow-through on reports is equally important to risk mitigation, as well as ensuring that other employees feel safe, secure and heard.

KEYWORDS: corporate security domestic terrorism extremism pubic safety radicalism risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Mayo Clinic’s Global Security team

    Mayo Clinic’s Global Security team works together to mitigate risk

    See More
  • future workplace

    The case for security intelligence

    See More
  • Cheatle

    Women in Security 2022: Kimberly Cheatle, PepsiCo

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    ON DEMAND: In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. We'll explore how forward-thinking organizations are elevating risk mitigation from a necessary cost to a source of strategic value. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing