FBI: The FBI’s Number one priority is protecting the U.S. from terrorist attack and categorizes issues as international or domestic.
International terrorism: Violent, criminal acts committed by individuals and/or groups who are inspired by, or associated with, designated foreign terrorist organizations or nations (state-sponsored).
International Terrorism: Joint address by MI5 and FBI Director’s warn of the growing threat posed by the Chinese Communist Party (CCP) to UK and US interests. The CCP is covertly applying pressure across the globe. Rather than lone actors, a coordinated campaign on a grand scale. Rather than proceeding at a lightning pace, the CCP has a strategic contest across decades. Rather than the actions of volatile individuals, there is planned, professional activity.
This plan may include planting agents (one ) – (two) within government organizations, compromising public and private citizens with payoffs and other unmentionable activities, and theft of intellectual property etc.
Domestic terrorism: Violent, criminal acts committed by individuals and/or groups to further ideological goals stemming from domestic influences, such as those of a political, religious, social, racial, or environmental nature.
Domestic Terrorist Attacks: Related incidents in the United States since the 1800’s. In addition to the terrorist attacks listed, it can also be searched as follows:
- List of worst terrorist acts
- Incidents of mass casualty terrorism
- Terrorist and criminal attacks targeting children
Lone Offender Terrorism: The FBI’s National Center for the Analysis of Violent Crime and Behavioral Analysis Unit (BAU) describes the results of investigative research and media accounts since 1972. Data indicate that most likely offenders are between the ages of 18-44.
The Internet and social media: International and domestic violent extremists have developed an extensive presence on the Internet through messaging platforms and online images, videos, and publications. These facilitate the groups’ ability to radicalize and recruit individuals who are receptive to extremist messaging.
Social media has also allowed both international and domestic terrorists to gain unprecedented, virtual access to people living in the United States in an effort to enable homeland attacks.
The Islamic State of Iraq and ash-Sham (ISIS), in particular, encourages sympathizers to carry out simple attacks wherever they are located—or to travel to ISIS-held territory in Iraq and Syria and join its ranks as foreign fighters. This message has resonated with supporters in the United States and abroad.
CIA: The world’s premier foreign intelligence agency, focusing on international terrorism. The CIA collects and analyzes foreign intelligence and conducts covert actions. U.S. policymakers, including the President of the United States, make policy decisions informed by the information provided by the CIA.
Separation of terrorism into international or domestic is a significant issue. At first reading it may seem that there is an ideological difference. However, it is most likely that this separation in designations is a result of the resources assigned to each agency.
NSA: The National Security Agency leverages advantages in technology and cybersecurity to strengthen the nations defense and secure national security systems. The NSA Cybersecurity Collaboration Center prevents and eradicates threats to U.S. national security systems with a focus on the Defense Industrial Base and the improvement of our weapons’ security and partners with allies, private industry, academics, and researchers to strengthen awareness and collaboration to advance the state of cybersecurity.
Interactive Constitution: Far-out at this point in time. However, the question occasionally arises in comments. The question is, “are any of the U.S. trading partners considered enemies of the U.S.?” If they commit terrorist activities or war against the U.S., “are investors supporting terrorist organizations or governments guilty of treason?” If so, does the Treason Clause of the Constitution apply to investors, and is the slope slippery enough to get there if they take treason actions or make war against the U.S.? This is one for the legal experts to ruminate over!
9-11 Commission Report: The table lists the content by chapter and provides download links and HTML links for viewing online. The first three chapters are linked below. Interested researchers can view or print online.
Chapter 1: “We Have Some Planes” is the background setting for the attack on World Trade Center Complex in New York City. The report is a significant read.
Chapter 2: “The Foundation of the New Terrorism” continues and provides the background setting for international terrorism.
Chapter 3: “Counterterrorism Evolves” may be of significant interest as it identifies a progressive listing of attacks prior to and including the 911. Chapter 3 narrative indicates indecision and disagreement over which agency is responsible for what, and within each agency which office is responsible. This disagreement seems to have been resolved.
National Library of Medicine: Who is to blame for COVID-19? Well, blame is unknown, however the global effects are somewhat known. Occurrences of pathogens appear to be in the future.
The Last- And Only Foreign Scientist in the Wuhan Lab Speaks Out. It appears an insider agrees with the indefinite results of pursuit for answers. Whatever the cause, it is international terrorism. World Health Organization data on COVID-19.
List of wars: 2003-present: Reflects the definition of war in the foundation post on WWIII. Terrorism is frequently reported during indicated events. International and domestic terrorism activities continue by the aggressor to intimidate the opponent and gain access without the need to finance a war between nations, or within nations. However, war and terrorism appear to be the current approach. The table includes links to the history of individual wars.
TraCCC: Transnational Crime and Corruption Center is the first center in the United States devoted to understanding the links among terrorism, transnational crime and corruption, and to teaching, researching, training and helping to formulate policy on these critical issues. TraCCC is a research center within the Schar School of Policy and Government at George Mason University.
NSI: The National Security Institute at George Mason University’s Antonin Scalia Law School
START: Study of Terrorism and Responses to Terrorism website. A Department of Homeland Security Emeritus Center of Excellence led by the University of Maryland.
Norwich University Online: State-of-the-art offerings with a 200-year history of academic excellence and innovation. The nation’s first private college to offer civil engineering instruction to being one of the first institutions to receive designation as an NSA Center of Excellence in Information Security Education,
DEGREE CHOICES: Counterterrorism degrees, programs, and careers.
Posts represent opinions of the editor based solely on available public information.
- Posts are designed to be quick reads and represent the initial cuts on subjects.
- Textual material consists of modified entries from the linked-to resources.
- Postings are an index of detailed information accessed by selecting included links.
- Organizations linked-to maintain ownership and are responsible for accuracy.
- Posts are based on Horizon / Environmental Scanning futurist research methods.
End of Posting