Research: Hostage-Taking Incident At Discovery Communications Meets Criteria Of Terrorist Act

A new report by terrorism researchers at the University of Maryland concludes that the deadly hostage-taking incident at the Discovery Communications headquarters in suburban Washington, D.C. meets the criteria of a terrorist act -- a rare one for media organizations and the nation's capital region. Hostage-taking, though, is a familiar pattern in capital-region terror, the researchers add.

The report from the University of Maryland's START Center -- the federally funded National Consortium for the Study of Terrorism and Responses to Terrorism -- also finds that there has never been any environmentally inspired suicide eco-terrorism in the United States, and probably the world, but draws no conclusions about whether that's what occurred in this case.

START maintains the world's most comprehensive unclassified database of terrorism incidents, and is designed to make it useful to scientists and policy-makers seeking to understand the behavior of terrorists and terror organizations. The report is based on an analysis of this data.

"The use of violence by radical environmentalists is extremely rare, and usually the target is property not people," said Gary LaFree, who directs the University of Maryland START Consortium and its Global Terrorism Database. "We'll count this incident as terrorism -- the perpetrator has a history of politically inspired activism and his tactics were violent."

START researchers analyzed the following information in the Global Terrorism Database, which includes more than 85,000 incidents worldwide since 1970.
 
The full report is available online at http://www.start.umd.edu/start/announcements/Background_Report_Discovery_building.pdf.

Featured

  • President Biden Issues Executive Order to Bolster U.S Port Cybersecurity

    On Wednesday, President Biden issued an Executive Order to bolster the security of the nation’s ports, alongside a series of additional actions that will strengthen maritime cybersecurity and more Read Now

  • Report: 15 Percent of All Emails Sent in 2023 Were Malicious

    VIPRE Security Group recently released its report titled “Email Security in 2024: An Expert Look at Email-Based Threats”. The 2024 predictions for email security in this report are based on an analysis of over 7 billion emails processed by VIPRE worldwide during 2023. This equates to almost one email for everyone on the planet. Of those, roughly 1 billion (or 15%) were malicious. Read Now

  • ASIS Announces ANSI-Approved Cannabis Security Standard

    ASIS International, a leading authority in security standards and guidelines, proudly announces the release of a pioneering American National Standards Institute (ANSI)-approved standard dedicated to cannabis security. This best-in-class standard, meticulously developed by industry experts, sets a new benchmark by providing comprehensive requirements and guidance for the design, implementation, monitoring, evaluation, and maintenance of a cannabis security program. Read Now

  • ISC West Announces Keynote Lineup

    ISC West, in collaboration with premier sponsor the Security Industry Association (SIA), announced this year’s dynamic trio of speakers that will headline the Keynote Series at ISC West 2024. Read Now

    • Industry Events

Featured Cybersecurity

Whitepapers

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3