Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyPhysical Security

Mitigating domestic terrorism and insider threat risks

Understand the root causes of domestic extremism and the cultural landscape to prevent and mitigate insider threats.

By Dr. David Prina, Andrée Rose
Domestic-terrorism-freepik1170.jpg
May 20, 2022

In the past, extremist ideologies and movements have existed on the fringe of mainstream society. Today, domestic violent extremism has found a new home and greater acceptance as technology provides the means to connect disparate communities across the country. Domestic violent extremists seek to undermine our democratically elected government, threaten the peaceful democratic processes, and deny many Americans their civil rights and liberties. To appropriately respond to the threat of domestic extremism, it is critical first to understand the root causes and cultural landscape that have allowed extremist ideas and groups to gain a foothold in American society.
 

Domestic Extremism’s Cultural Metamorphosis 

The reach of extremist groups used to be isolated to geographic regions, and their recruitment was limited mainly to personal introductions and interpersonal relationships. However, since the 1980s, technological advances have allowed extremists to broadcast their messages to a broader audience. But it is not technology alone that has allowed extreme ideologies to creep closer to the mainstream. Extremist groups have cleverly adapted to the evolving internet environment in their messaging and tactics, leading to stronger recruitment efforts and more durable, connected networks of like-minded individuals. 

While technology is an easy scapegoat, it is important to note that extremism, particularly violent extremism, has a long history and is part of the culture writ large.  Some of the most enduring strains of modern extremism have their origins in anti-Semitic conspiracy theories of Medieval Europe. Extremism has always been inextricably linked with the political issues of the age. Extremists are social and political entrepreneurs. They find wedge issues, policies, or ideas that divide people. Then, they exploit the strong feelings generated by these issues to further their own agenda.

There are numerous examples of this approach. For example, ISIS exploited the grievances of Muslim communities in Western countries rooted in experiences of discrimination and exclusion to inspire young people to join their cause. Groups like Atomwaffen, also known as the National Socialist Order, is an international right-wing extremist and Neo-Nazi terrorist network that exploits fears over immigration to recruit young men to join their cause. Leveraging this hot political topic, the group seeks to expunge the United States of nonwhite peoples before all white people are “replaced.” Similarly, anti-semitic groups exploit fear and anger over jobs moving overseas to promote the idea that a global, Jewish-led cabal is trying to harm hard-working Americans.

Exploit to Propagate: The Modern Extremist Playbook

Extremism is difficult to discuss. Extremism is also difficult to define, and that is by design. Extremists hide in plain sight by cloaking themselves in seemingly noble principles of defending themselves against encroachment or oppression. Even the most blatant extremist rhetoric is designed to leave the reader unaware that they have just been exposed to an extreme position. Extremist articles or social media posts masquerade as hyperbolic parody or end with a simple “just kidding” or “lol” to keep the reader guessing.

Extremists also know that one of their biggest hurdles is proving their legitimacy. Therefore, they look for opportunities to validate their existence and beliefs. An increasingly common way to do this is for extremists to borrow the social and authoritative credibility of established political leaders or influencers. While they may not be able to fully recruit these individuals, having them repeat extremist talking points goes a long way and they know this.

Extremists are able to do so because they accurately understand the boundaries of free speech and exploit them. Stating your opinion, even if inaccurate or inflammatory, is protected speech. Threats of violence are not.

Knowing this, most extremists seeking to legitimize their beliefs do not make explicit calls for violence to avoid criminal or civil charges. For instance, white separatist groups claim they want their own autonomous whites-only homeland where they can live in peace. They intentionally leave unanswered the question of what will become of nonwhite people within the borders of this hypothetical state who do not want to leave. They hide the inherent violence of such a demand by simply not mentioning it so as to sound less extreme.

Extremist Recruitment Strategies that Create Insider Threat Risks

In a tactic that bears similarities to that of co-opting public person’s platforms, domestic violent extremism groups actively attempt to recruit military and U.S. government personnel. These groups also encourage their current members to join the military to acquire combat and tactical experience that they will later use against our nation instead of on its behalf.

This is where domestic extremism transforms from a broad social threat to an insider threat. The damage a radicalized individual within the military or government may compromise our ability to protect the nation and its interests. It is important that we ensure extremists do not use government resources to further their agendas.

Identifying Domestic Violent Extremists to Mitigate Insider Threat

The ability to identify potential indicators of domestic violent extremism group membership is one of the best tools we have to mitigate the risk to persons, property, and an organization’s reputation. While insider threat was once narrowly defined and less well-known, the shifting landscape as well as government policy mandating counter-insider threat programs has brought it to the forefront as essential to national security. Many organizations are doing interesting work in this area.

The National Insider Threat Task Force (NITTF) sponsored the Defense Personnel and Security Research Center (PERSEREC) and The Threat Lab to host a series of Domestic Extremism Workshops in 2021. This workshop’s objective was to prepare government security personnel to understand, identify, disrupt, and manage personnel who adhere to extremist ideologies. Through reviewing case studies and discussions with subject matter experts and deradicalized individuals, participants finished the workshop with a greater understanding of domestic extremism, both from a research and operational perspective.

PERSEREC is also in the final phase of developing Ideologies and Symbols Associated with Domestic Violent Extremism, a web-based training that focuses on recognizing symbols associated with domestic violent extremist ideologies. This course will be available to government employees later this year via the Joint Knowledge Online (JKO) platform.

Knowledge is Power: Resources for Combating Domestic Violent Extremism

Modern-day challenges continue to shape the violent extremism landscape. One of the only things we can be sure of is that extremists and their tactics will continue to evolve as will threats they pose. So must mitigation techniques and practices. New and seasoned security professionals alike should share different techniques and new indicators to analyze and identify potential domestic extremist threats.

Education and continued vigilance are the key to countering the threat of violent extremism.


To support this effort, The Threat Lab regularly publishes reports, job aids, toolkits, and more which can be accessed at https://opa.mil/research-analysis/personnel-security/insider-threat and https://www.cdse.edu/Training/Toolkits/Insider-Threat-Toolkit. You can also stay on top of new releases and get exclusive invitations to continuing education courses from The Threat Lab by signing up to join the distribution list by emailing DoDHRA.ThreatLab@mail.mil.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: antisemitic domestic terrorism extremism insider threats radicalism risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Prina, Ph.D., is an experienced behavioral research scientist at the Defense Personnel and Security Research Center (PERSEREC). PERSEREC is a Department of Defense entity dedicated to improving the effectiveness, efficiency, and fairness of DoD personnel suitability, security, and reliability systems. PERSEREC is part of the Defense Personnel Analytics Center, a center within the Defense Human Resources Activity (DHRA) under the Office of the Under Secretary of Defense for Personnel and Readiness. Learn more at https://www.dhra.mil/perserec/.

With over 20 years of experience in applied social and behavioral science, Andrée Rose currently serves as a project director at the DoD’s The Defense Personnel and Security Research Center (PERSEREC). She is also a member of The Threat Lab’s newly formed leadership team. Andrée conducts research in various areas related to insider threat, personnel security, military accessions, and suicide prevention. Evidence-based recommendations stemming from her research have shaped personnel security vetting policies and procedural requirements. These findings have also been translated into educational materials and coursework to train new and established security professionals alike.  

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • insider-threats-disinformation-fp1170.png

    Mis-, dis- and mal-information insider threats: Building cognitive immunity

    See More
  • Women at top of escalator

    The multi-faceted threat of domestic terrorism

    See More
  • police

    Rep. Schiff Introduces The Confronting the Threat of Domestic Terrorism Act

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing