Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyPhysical Security

Mitigating domestic terrorism and insider threat risks

Understand the root causes of domestic extremism and the cultural landscape to prevent and mitigate insider threats.

By Dr. David Prina, Andrée Rose
Domestic-terrorism-freepik1170.jpg
May 20, 2022

In the past, extremist ideologies and movements have existed on the fringe of mainstream society. Today, domestic violent extremism has found a new home and greater acceptance as technology provides the means to connect disparate communities across the country. Domestic violent extremists seek to undermine our democratically elected government, threaten the peaceful democratic processes, and deny many Americans their civil rights and liberties. To appropriately respond to the threat of domestic extremism, it is critical first to understand the root causes and cultural landscape that have allowed extremist ideas and groups to gain a foothold in American society.
 

Domestic Extremism’s Cultural Metamorphosis 

The reach of extremist groups used to be isolated to geographic regions, and their recruitment was limited mainly to personal introductions and interpersonal relationships. However, since the 1980s, technological advances have allowed extremists to broadcast their messages to a broader audience. But it is not technology alone that has allowed extreme ideologies to creep closer to the mainstream. Extremist groups have cleverly adapted to the evolving internet environment in their messaging and tactics, leading to stronger recruitment efforts and more durable, connected networks of like-minded individuals. 

While technology is an easy scapegoat, it is important to note that extremism, particularly violent extremism, has a long history and is part of the culture writ large.  Some of the most enduring strains of modern extremism have their origins in anti-Semitic conspiracy theories of Medieval Europe. Extremism has always been inextricably linked with the political issues of the age. Extremists are social and political entrepreneurs. They find wedge issues, policies, or ideas that divide people. Then, they exploit the strong feelings generated by these issues to further their own agenda.

There are numerous examples of this approach. For example, ISIS exploited the grievances of Muslim communities in Western countries rooted in experiences of discrimination and exclusion to inspire young people to join their cause. Groups like Atomwaffen, also known as the National Socialist Order, is an international right-wing extremist and Neo-Nazi terrorist network that exploits fears over immigration to recruit young men to join their cause. Leveraging this hot political topic, the group seeks to expunge the United States of nonwhite peoples before all white people are “replaced.” Similarly, anti-semitic groups exploit fear and anger over jobs moving overseas to promote the idea that a global, Jewish-led cabal is trying to harm hard-working Americans.

Exploit to Propagate: The Modern Extremist Playbook

Extremism is difficult to discuss. Extremism is also difficult to define, and that is by design. Extremists hide in plain sight by cloaking themselves in seemingly noble principles of defending themselves against encroachment or oppression. Even the most blatant extremist rhetoric is designed to leave the reader unaware that they have just been exposed to an extreme position. Extremist articles or social media posts masquerade as hyperbolic parody or end with a simple “just kidding” or “lol” to keep the reader guessing.

Extremists also know that one of their biggest hurdles is proving their legitimacy. Therefore, they look for opportunities to validate their existence and beliefs. An increasingly common way to do this is for extremists to borrow the social and authoritative credibility of established political leaders or influencers. While they may not be able to fully recruit these individuals, having them repeat extremist talking points goes a long way and they know this.

Extremists are able to do so because they accurately understand the boundaries of free speech and exploit them. Stating your opinion, even if inaccurate or inflammatory, is protected speech. Threats of violence are not.

Knowing this, most extremists seeking to legitimize their beliefs do not make explicit calls for violence to avoid criminal or civil charges. For instance, white separatist groups claim they want their own autonomous whites-only homeland where they can live in peace. They intentionally leave unanswered the question of what will become of nonwhite people within the borders of this hypothetical state who do not want to leave. They hide the inherent violence of such a demand by simply not mentioning it so as to sound less extreme.

Extremist Recruitment Strategies that Create Insider Threat Risks

In a tactic that bears similarities to that of co-opting public person’s platforms, domestic violent extremism groups actively attempt to recruit military and U.S. government personnel. These groups also encourage their current members to join the military to acquire combat and tactical experience that they will later use against our nation instead of on its behalf.

This is where domestic extremism transforms from a broad social threat to an insider threat. The damage a radicalized individual within the military or government may compromise our ability to protect the nation and its interests. It is important that we ensure extremists do not use government resources to further their agendas.

Identifying Domestic Violent Extremists to Mitigate Insider Threat

The ability to identify potential indicators of domestic violent extremism group membership is one of the best tools we have to mitigate the risk to persons, property, and an organization’s reputation. While insider threat was once narrowly defined and less well-known, the shifting landscape as well as government policy mandating counter-insider threat programs has brought it to the forefront as essential to national security. Many organizations are doing interesting work in this area.

The National Insider Threat Task Force (NITTF) sponsored the Defense Personnel and Security Research Center (PERSEREC) and The Threat Lab to host a series of Domestic Extremism Workshops in 2021. This workshop’s objective was to prepare government security personnel to understand, identify, disrupt, and manage personnel who adhere to extremist ideologies. Through reviewing case studies and discussions with subject matter experts and deradicalized individuals, participants finished the workshop with a greater understanding of domestic extremism, both from a research and operational perspective.

PERSEREC is also in the final phase of developing Ideologies and Symbols Associated with Domestic Violent Extremism, a web-based training that focuses on recognizing symbols associated with domestic violent extremist ideologies. This course will be available to government employees later this year via the Joint Knowledge Online (JKO) platform.

Knowledge is Power: Resources for Combating Domestic Violent Extremism

Modern-day challenges continue to shape the violent extremism landscape. One of the only things we can be sure of is that extremists and their tactics will continue to evolve as will threats they pose. So must mitigation techniques and practices. New and seasoned security professionals alike should share different techniques and new indicators to analyze and identify potential domestic extremist threats.

Education and continued vigilance are the key to countering the threat of violent extremism.


To support this effort, The Threat Lab regularly publishes reports, job aids, toolkits, and more which can be accessed at https://opa.mil/research-analysis/personnel-security/insider-threat and https://www.cdse.edu/Training/Toolkits/Insider-Threat-Toolkit. You can also stay on top of new releases and get exclusive invitations to continuing education courses from The Threat Lab by signing up to join the distribution list by emailing DoDHRA.ThreatLab@mail.mil.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: antisemitic domestic terrorism extremism insider threats radicalism risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

David Prina, Ph.D., is an experienced behavioral research scientist at the Defense Personnel and Security Research Center (PERSEREC). PERSEREC is a Department of Defense entity dedicated to improving the effectiveness, efficiency, and fairness of DoD personnel suitability, security, and reliability systems. PERSEREC is part of the Defense Personnel Analytics Center, a center within the Defense Human Resources Activity (DHRA) under the Office of the Under Secretary of Defense for Personnel and Readiness. Learn more at https://www.dhra.mil/perserec/.

With over 20 years of experience in applied social and behavioral science, Andrée Rose currently serves as a project director at the DoD’s The Defense Personnel and Security Research Center (PERSEREC). She is also a member of The Threat Lab’s newly formed leadership team. Andrée conducts research in various areas related to insider threat, personnel security, military accessions, and suicide prevention. Evidence-based recommendations stemming from her research have shaped personnel security vetting policies and procedural requirements. These findings have also been translated into educational materials and coursework to train new and established security professionals alike.  

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • insider-threats-disinformation-fp1170.png

    Mis-, dis- and mal-information insider threats: Building cognitive immunity

    See More
  • Women at top of escalator

    The multi-faceted threat of domestic terrorism

    See More
  • police

    Rep. Schiff Introduces The Confronting the Threat of Domestic Terrorism Act

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • threat and detection.jpg

    Surveillance and Threat Detection

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing