The Open Access Publisher and Free Library
04-terrorism.jpg

TERRORISM

TERRORISM-DOMESTIC-INTERNATIONAL-RADICALIZATION-WAR

Posts tagged homeland security
Homeland Threat Assessment 2025

By: Office of Intelligence and Analysis

The Homeland faces a complex set of threats to our public safety, border security, critical infrastructure, and economy from violent extremists, transnational criminal organizations (TCOs), adversarial nation-states, and malicious cyber actors. These threats, while varied in scope and intended purpose, at times compound one another in unexpected ways, harming our communities and generating costly disruptions to the US economy. Meanwhile, technological advances, climate change, and natural disasters have the potential to exacerbate many of the aforementioned threats.

PUBLIC SAFETY AND SECURITY: Over the next year, the terrorism threat environment in the Homeland will remain high. We are particularly concerned about a confluence of factors this year, including violent extremist responses to domestic sociopolitical developments—especially the 2024 election cycle—and international events that domestic and foreign violent extremists likely will use to justify or encourage attacks in the Homeland. Lone offenders and small groups continue to pose the greatest threat of carrying out attacks with little to no warning. Meanwhile, foreign terrorist organizations (FTOs) and their supporters will maintain their enduring intent to conduct or inspire attacks in the Homeland.

In addition, the production, trafficking, and sale of illegal drugs by transnational and domestic criminal actors will continue to pose the most lethal threat to communities in the United States. Fentanyl and other synthetic opioids remain the most lethal of drugs trafficked into the country, but small increases in overdoses linked to cocaine and methamphetamine highlight the danger from other drug types.

We expect the Homeland also will face threats to public safety from state actors using subversive tactics in an effort to influence and divide the American public and undermine confidence in our institutions. Many of these actors—in particular, the People’s Republic of China (PRC)—also target v U.S. Department of Homeland Security ethnic and religious minorities, political dissidents, and journalists in the United States to silence and harass critical voices, violating our sovereignty and the rule of law.

The 2024 election cycle will be an attractive target for many adversaries. Some domestic violent extremists (DVEs) likely view a wide range of targets indirectly and directly associated with elections as viable targets for violence with the intent of instilling fear among voters, candidates, and election workers, as well as disrupting election processes leading up to and after the November election. Nation-state-aligned foreign malign influence actors almost certainly will continue to target democratic processes with the aims of affecting US voter preferences, exacerbating social tensions, and undermining confidence in our democratic institutions and the integrity of the electoral process.

BORDER AND IMMIGRATION SECURITY: Migrant encounters at our border have declined over the last year, but migrants are still arriving in high numbers, complicating border and immigration security. As overall encounters have declined, so too have encounters with individuals in the Terrorist Screening Data Set, also known as the “terrorism watchlist,” which includes individuals associated with information indicating they may be directly engaged in or supporting terrorist activities as well as known associates of watchlisted individuals, such as family members. For several years prior to this year's decline, terrorism watchlist encounters had increased, a trend consistent with the overall increase in migrant encounters at the southwest border.

CRITICAL INFRASTRUCTURE SECURITY: Domestic and foreign adversaries almost certainly will continue to threaten the integrity of our critical infrastructure with disruptive and destructive cyber and physical attacks, in part, because they perceive targeting these sectors will have cascading impacts on US industries and our standard of living. The PRC, Russia, and Iran will remain the most pressing foreign threats to our critical infrastructure. Most concerningly, we expect the PRC to continue its efforts to pre-position on US networks for potential cyber attacks in the event of a conflict with the United States. Nation-states, criminal hacktivists, and financially motivated criminals will likely hone their techniques to disrupt US services or to conduct espionage focused on gaining access to US networks, including critical infrastructure entities. We assess that domestic and foreign violent extremists will continue to call for physical attacks on critical infrastructure in furtherance of their ideological goals and, at times, in response to international conflicts and crises.

ECONOMIC SECURITY: Multifaceted and diverse economic threats—primarily from the PRC—will likely continue to harm US producers and consumers and degrade the competitiveness and future health of US companies and industries. The PRC likely will remain our greatest economic security threat because of its aggressive use of anticompetitive, coercive policies and theft of US intellectual property, technology, and trade secrets. Lastly, we expect our supply chains will remain vulnerable to foreign manipulation abroad, which could harm global productivity and consumer demand.

U.S. Department of Homeland Security, 2024

Domestic Terrorists' Contact with System Stakeholders Before Attacks

MCBRIDE, MEGAN K.; JENKINS, MONIQUE

From the document: "Within the public violence literature--that is, the literature on domestic terrorism, mass shootings, school shootings, and hate crimes, among others--leakage has been identified as a core warning behavior. Leakage occurs when a would be assailant communicates an intention to harm a target before committing an attack. This communication can vary in timing, level of detail, form, intentionality, and audience. Through such a communication, an individual might directly verbalize an intent to commit an act, make more subtle threats and innuendos, or share a plan via social media. Researchers have found relatively high levels of leakage associated with acts of public violence, including adolescent-perpetrated mass murders, mass shootings, political and public figure assassinations, and domestic terrorism. For this reason, leakage--which often occurs in interactions online or with loved ones--can be an important warning sign. But leakage to family, friends, or acquaintances is not the only way to detect when an individual is intending to commit an act of public violence, and over the last decade, researchers have started to examine preattack contact with system stakeholders, such as law enforcement, mental health, and education professionals. [...] We sought to advance understanding of what percentage of the violent extremist population could be 'catchable' in the sense that an individual had been in previous contact with a system stakeholder (e.g., law enforcement, mental health provider) or had been reported to a system stakeholder (e.g., by a friend or loved one to whom they had intentionally or unintentionally leaked information). To explore this issue, we leveraged a new dataset: the Domestic Terrorism Offender Level Database (DTOLD). The database includes detailed information on the 320 non-Islamist individuals who carried out terrorist attacks in the United States between January 1, 2001, and December 31, 2020. Specifically, we sought to understand what percentage of this population was known to system stakeholders at some point before they perpetrated their attacks." Further information for this document can be found here: www.cna.org/reports/2024/08/domestic-terrorists-contact-with-system-stakeholders-before-attacks

CNA CORPORATION. 2024. 4p.

America's Strategic Posture: The Final Report of the Congressional Commission on the Strategic Posture of the United States [October 2023]

Institute For Defense Analyses.

From the document: "The United States faces a strategic challenge requiring urgent action. Given current threat trajectories, our nation will soon encounter a fundamentally different global setting than it has ever experienced: we will face a world where two nations possess nuclear arsenals on par with our own. In addition, the risk of conflict with these two nuclear peers is increasing. It is an existential challenge for which the United States is ill-prepared, unless its leaders make decisions now to adjust the U.S. strategic posture. The Congressional Commission on the Strategic Posture of the United States was established by the Fiscal Year (FY) 2022 National Defense Authorization Act (NDAA), and concludes that America's defense strategy and strategic posture must change in order to properly defend its vital interests and improve strategic stability with China and Russia. Decisions need to be made now in order for the nation to be prepared to address the threats from these two nuclear-armed adversaries arising during the 2027-2035 timeframe. Moreover, these threats are such that the United States and its Allies and partners must be ready to deter and defeat both adversaries simultaneously. We arrive at these conclusions following a comprehensive year-long review of the threats America faces and its strategy and planned capabilities to address those threats."

Congressional Commission On The Strategic Posture Of The United States . 2023. 160p.

Military and Security Developments Involving the People's Republic of China 2023

United States. Department Of Defense. Office Of The Secretary Of Defense;

From the document: "The DoD annual report on Military and Security Developments Involving the People's Republic of China [PRC] charts the current course of the PRC's national, economic, and military strategy, and offers insight on the People's Liberation Army's (PLA) strategy, current capabilities and activities, as well as its future modernization goals. In 2022, the PRC turned to the PLA as an increasingly capable instrument of statecraft. Throughout the year, the PLA adopted more coercive actions in the Indo-Pacific region, while accelerating its development of capabilities and concepts to strengthen the PRC's ability to 'fight and win wars' against a 'strong enemy,' counter an intervention by a third party in a conflict along the PRC's periphery, and to project power globally. At the same time, the PRC largely denied, cancelled, and ignored recurring bilateral defense engagements, as well as DoD requests for military-to-military communication at multiple levels. This report illustrates the importance of meeting the pacing challenge presented by the PRC's increasingly capable military. [...] 'This report covers security and military developments involving the PRC until the end of 2022.'"

United States. Department Of Defense . 2023. 212p.

National Cybersecurity Strategy Implementation Plan

By United States. White House Office

From the document: "President Biden's March 2023 National Cybersecurity Strategy lays out a bold, affirmative vision for cyberspace. It outlines a path for achieving two significant shifts: the need for more capable actors in cyberspace to bear more of the responsibility for cybersecurity and the need to increase incentives to make investments in long term-resilience. Achieving the President's cybersecurity vision requires coordinated action across the United States Government and American society. The National Cybersecurity Strategy Implementation Plan is a roadmap for this effort. While it does not intend to capture all cybersecurity activities being carried out by agencies, it describes more than 65 high-impact initiatives requiring executive visibility and interagency coordination that the Federal government will carry out to achieve the Strategy's objectives. Each initiative is assigned to a responsible agency and is associated with a timeline for completion. Some of these initiatives are already underway and will be completed by the end of Fiscal Year 2023. The Office of the National Cyber Director will work with the Office of Management and Budget to ensure funding proposals in the President's Budget Request are aligned with activities in the Implementation Plan. This is the first iteration of the Implementation Plan, which is a living document that will be updated annually. Initiatives will be added as the evolving cyber landscape demands and removed after completion."

United States. White House Office . 2023. 67p.

Gaming the System: How Extremists Exploit Gaming Sites and What Can Be Done to Counter Them

By Olaizola Rosenblat, Mariana; Barrett, Paul (Paul M.)

From the document: "This report draws on existing literature; fresh interviews with gamers, gaming company executives, and experts; and findings from a multinational survey of gamers conducted in January 2023. [...] A growing body of evidence shows that bad actors exploit basic features of video games and adjacent platforms to channel hate-based rhetoric, network with potential sympathizers, and mobilize for action--sometimes with deadly consequences. The relative ease with which extremists have been able to manipulate gaming spaces points to the need for urgent action by industry actors to avoid further harm. Although some gaming companies have made recent investments in content moderation technologies and systems, most companies are still far behind in terms of adequately governing and mitigating abuse of their platforms. This call to address extremist exploitation became more urgent in April 2023 in the wake of media reports that the large gaming-adjacent platform, Discord, had been used by a young U.S. air national guardsman for the reckless and allegedly illegal sharing of top-secret military documents, which then were spread to other online sites. [...] Yet another reason to pay attention to the ways gaming spaces have been misused is that the technologies that help make video games so appealing are poised to become far more common. [...] Heeding the popularity of gaming, these companies are pouring billions of dollars into the creation of a fully immersive 3-D [three-dimensional] Internet. Addressing the extremist exploitation of gaming spaces today will better prepare the industry to usher in new technologies while preventing harm to individuals and societies."

New York University. Stern Center for Business and Human Rights. 2023. 40p.

Promising Approaches for Implementing Extreme Risk Laws: A Guide for Practitioners and Policymakers

By Parsons, Chelsea; Bengali, Ruhi; Zale, Courtney; Geller, Lisa; Cantrell, Spencer

From the document: "Extreme Risk Protection Order (ERPO) laws create an opportunity to intervene and prevent firearm violence when there are warning signs that an individual poses a risk of harm to self or others. While ERPO laws are relatively new, a growing body of research demonstrates the potential for these laws to prevent firearm violence, particularly firearm suicide, and multiple victim/mass shootings. Interest in ERPO laws has increased in recent years, with 16 states having enacted these laws between 2018 and 2023. Implementation varies widely across and within states. As a result of strong ERPO implementation efforts in some jurisdictions, more information is now available for state and local leaders about how to implement and adapt ERPO laws for their own communities. In addition, the Bipartisan Safer Communities Act of 2022 included $750 million in new federal grant funding for states, some of which is designated to support ERPO implementation. To meet this moment, the Everytown for Gun Safety Support Fund and the Johns Hopkins Center for Gun Violence Solutions have partnered to compile this guide of the best available practices and promising approaches to effective implementation of extreme risk laws. These recommendations are informed by conversations with individuals who are pioneering ERPO implementation, in addition to the best practices shared at a December 2022 convening of ERPO leaders from around the country."

Johns Hopkins Center for Gun Violence Solutions. Everytown for Gun Safety. 2023. 52p.

Policy Playbook: Building a Systems-Oriented Approach to Technology and National Security Policy

Corrigan, Jack; Flagg, Melissa; Murdick, Dewey

From the document: "This brief aims to provide a framework for a more systems-oriented technology and national security strategy. We begin by identifying and discussing the tensions between three strategic technology and national security goals: '1. Driving technological innovation. 2. Impeding adversaries' progress. 3. Promoting safe, values-driven deployment.' We go on to provide a brief overview of 15 levers of power through which policymakers can pursue these goals. These proposed levers fall into two categories: 'direct levers of power' (there are nine), which are focused on discrete functions and issue sets; and 'enabling levers of power' (there are six), which are more general-purpose and can be used to enhance the effect of the direct levers. These proposed categories are based on our own analysis, and while the list is non-exhaustive, it provides a useful framework for characterizing government actions and aligning them to particular goals of technology policy. [...] This adaptable framework, suitable for any country or international body, emphasizes the importance of creative problem-solving and having a comprehensive understanding of the policy landscape to achieve strategic goals. This framework is intended for decision-makers and stakeholders in the realms of technology, national security, and economic policy."

Georgetown University. Walsh School of Foreign Service. Center for Security and Emerging Technology. 2023. 33p.

Audit of the Department of Justice's Strategy to Address the Domestic Violent Extremism Threat

United States. Department Of Justice. Office Of The Inspector General

From the document: "The objectives of this audit were to: (1) evaluate the Department of Justice's (DOJ or Department) efforts to develop a comprehensive strategy to address domestic violent extremism (DVE) in the United States, and (2) determine if the Department is effectively coordinating among Department stakeholders on the implementation of its strategy. Our audit scope covered the period of fiscal year (FY) 2017 to FY 2022. [...] DOJ has identified DVE, which it refers to interchangeably as domestic terrorism, as one of the most significant threats facing the country. DOJ has characterized its efforts to counter DVE as a whole-of-Department commitment that requires sustained attention and resources. Nonetheless, DOJ has not formalized a DVE strategy. DOJ has focused attention on investigating, prosecuting, and preventing acts of DVE, but it also has experienced challenges in ensuring that its various efforts are cohesive and used in a strategic way to better identify lessons learned and spread awareness of available resources. Moreover, although DOJ has issued some internal guidance relating to DVE investigations, additional clearer guidance across all law enforcement and litigating components could assist in promoting greater consistency about what qualifies as a DVE case and better coordination in the handling of cases with a DVE nexus. DOJ should also consider formalizing mechanisms to routinely evaluate the efficacy and impact of its DVE efforts and to maintain the continuous protection of civil liberties. Finally, DOJ should improve its coordination on data-driven efforts to consistently track DVE-related cases across the Department. [...] Our report contains seven recommendations to assist the Department in its efforts to have a cohesive and sustained approach to addressing the DVE threat."

United States. Department Of Justice. Office Of The Inspector General . 2023. 43p.

Attack on America's Future: Cyber-Enabled Economic Warfare

By Ravich, Samantha Fay; Fixler, Annie

From the Introduction: "In 2018, the Foundation for Defense of Democracies (FDD) published a series of monographs analyzing cyber-enabled economic warfare (CEEW) as practiced by Russia, China, North Korea, and Iran. The four studies brought together for the first time an assessment of each adversary's CEEW attacks on America's economic infrastructure. At the time, the term CEEW was only beginning to seep into the consciousness of the U.S. national security community. The White House had used the term in its 2017 National Security Strategy, noting how adversaries are using technology to 'weaken our businesses and our economy.'1 But the connection between such malicious activities and the overall strategies of America's four principal adversaries remained unclear. The risks associated with CEEW are now clearer, thanks less to the rigorous analysis of adversarial intentions than to the increased scale, scope, and frequency of attacks across the American economic landscape. Still, the federal government has a blind spot that leaves the United States vulnerable to a catastrophic strategic surprise -- one that could simultaneously destabilize the U.S. electrical grid, water supply, banking system, transportation sector, or other critical infrastructure necessary for survival. That blind spot is intelligence that anticipates the adversary's strategy. For too long, the United States has tried to patch its way to safety with the enemy inside its networks."

Foundation For Defense Of Democracies 2022. 68p.

The Escalating Terrorism Problem in the United States

By Seth G. Jones, Catrina Doxsee, and Nicholas Harrington

The United States faces a growing terrorism problem that will likely worsen over the next year. Based on a CSIS data set of terrorist incidents, the most significant threat likely comes from white supremacists, though anarchists and religious extremists inspired by the Islamic State and al-Qaeda could present a potential threat as well. Over the rest of 2020, the terrorist threat in the United States will likely rise based on several factors, including the November 2020 presidential election.

Washington, DC: Center for Strategic and International Studies (CSIS), 2020. 10p.

Radicalism and Terrorism in the 21st Century: Implications for Security

By Anna Sroka, Fanny Castro-Rial Garrone, Kumbrián Torres , and Darío Rubén.

This book addresses the issues of radicalism and terrorism, which are of exceptional importance and relevance in contemporary society. Each of the two phenomena are analyzed from a multidisciplinary perspective. The book contains articles which explore legal, political, psychological, economic and social aspects of radicalism and terrorism. A portion of the contributions are of a theoretical nature, they constitute an attempt at constructing analytical frameworks for studies on the two phenomena. There are also studies of particular cases, such as radicalism in Poland and in Spain, as well as within the European Union as a whole. This collective work is a response to the need for analyses of two issues which are increasingly responsible for determining the level of security which characterizes the contemporary world.

Frankfurt am Main: Peter Lang Edition, 2016. 324p.