Topic: Security
📊 Facts Database / Topics / Security

Security

86 Facts
155 Related Entities
U.S. military planners have assessed that China could be capable of invading Taiwan by 2027.
January 01, 2027 high temporal
Projection reported as an assessment by U.S. military planners about China's potential military capability regarding Taiwan.
Militant Islamist groups such as Boko Haram have carried out violence in Nigeria that has killed both Christians and Muslims.
November 23, 2025 high conflict
Violent extremist activity in Nigeria has affected multiple religious communities.
Armed bandits in Nigeria carry out kidnappings for ransom, and schools are frequent targets of those abductions.
November 23, 2025 high security
Criminal kidnapping for ransom has been used in Nigeria as a profit-motivated tactic, including targeting educational institutions.
The Rapid Support Forces (RSF) is a paramilitary force in Sudan that has been engaged in fighting against the Sudanese army.
November 19, 2025 high definition
Identifies the RSF and its role in the Sudanese conflict.
Some cities in Ecuador have homicide rates among the world's highest.
November 17, 2025 high descriptive
Reported patterns of violent crime in Ecuadorian urban areas.
International drug trafficking cartels collaborate with local criminal gangs in Ecuador and exert influence across key port cities and extensive areas of the Pacific coast.
November 17, 2025 high descriptive
Organized-crime influence on coastal and port areas in Ecuador.
Operation Southern Spear is a U.S. military mission led by U.S. Southern Command and Joint Task Force Southern Spear, operating under U.S. 4th Fleet and the Navy, that targets narco-terrorist networks across Latin America.
November 15, 2025 high temporal
Named U.S. operation and responsible commands for counter-narco-terror efforts in the Western Hemisphere.
The Group of Seven (G7) is a forum composed of seven industrialized democracies that meet to coordinate on international economic, political, and security issues.
November 12, 2025 high temporal
Describes the nature and purpose of the G7 as an institution.
Missile and drone attacks on civilian power grids can cause rolling blackouts and disrupt electricity, heating, and water supplies.
November 12, 2025 high temporal
Describes a durable effect of kinetic attacks on critical civilian infrastructure.
Governments use targeted sanctions against individuals and entities involved in the development and deployment of military drone programs as a policy tool to impose consequences on those enabling a state's military capabilities.
November 12, 2025 high temporal
Describes a common sanctions practice aimed at constraining military technology programs.
Since Russia's full-scale invasion of Ukraine in 2022, Russia has frequently conducted drone and missile strikes on Ukrainian territory that have caused civilian casualties and damage to infrastructure.
November 08, 2025 high temporal
Describes an ongoing pattern of attacks and their effects during the 2022–2025 phase of the war.
U.S. federal funds are used to finance local public services and priorities such as education, transportation, and national security activities including counter-terrorism.
November 07, 2025 high functional
Common functions supported by federal funding at local and national levels.
In 2025, North Korea accelerated its pace of weapons testing, including tests described as purported hypersonic missile launches and cruise missile launches.
November 07, 2025 high temporal
Describes a trend in North Korea's weapons testing activity reported in 2025.
Since 2019, Kim Jong Un has accelerated the expansion of North Korea's nuclear weapons and missile programs.
November 07, 2025 high temporal
Describes the trajectory of North Korea's weapons development program following the breakdown of earlier diplomacy.
North Korea possesses nuclear-capable missiles of various ranges that are capable of targeting U.S. allies in Asia and the U.S. mainland.
November 07, 2025 high temporal
Characterizes the composition and reach of North Korea's missile arsenal as reported in 2025.
The 'C5+1' is a diplomatic grouping that involves the United States and the five Central Asian countries (Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, Uzbekistan) and focuses on regional security issues.
November 06, 2025 high organizational
Format for U.S.-Central Asia multilateral engagement on regional issues.
Despite joint security cooperation among Mali, Burkina Faso, and Niger, attacks by armed groups in the region have increased in intensity.
November 05, 2025 medium temporal
Observed escalation of armed-group activity despite trilateral security efforts.
The United States extends nuclear deterrence to South Korea as part of the countries' security alliance.
November 04, 2025 high policy
Alliance security posture between the United States and the Republic of Korea
As of 2025, the United States and South Korea maintain close military coordination aimed primarily at deterring North Korean aggression.
November 04, 2025 high temporal
Bilateral security posture and alliance focus between the United States and South Korea.
Fraudsters can gain access to another person's bank account by persuading the account holder to reset online banking credentials (for example via a phone call to the bank) and then using those credentials to withdraw funds.
November 03, 2025 high security
Describes a common social-engineering method used to commit financial theft.
The International Stabilization Force (ISF) concept envisions combining a newly established Palestinian police force trained and vetted by the United States, Egypt, and Jordan with troop contributions from Arab and Muslim countries.
October 30, 2025 high policy
Describes the intended composition of a proposed international security force for Gaza.
A stated operational focus for the International Stabilization Force (ISF) is securing Gaza's borders with Israel and Egypt and preventing arms smuggling.
October 30, 2025 high operational
Describes the security objectives attributed to the proposed force.
The government of the People's Republic of China considers Taiwan a breakaway province and maintains that Taiwan may be retaken by force if necessary.
October 30, 2025 high temporal
China's stated position on Taiwan's sovereignty and the potential use of force.
The Federal Protective Service is the federal agency responsible for providing security for federal buildings in the United States.
October 29, 2025 high institutional
Identifies the agency that manages security of federal facilities.
Nuclear-powered submarines are weapons systems that can pose significant regional security threats when operated by adversary states.
October 29, 2025 medium general
Describes the general strategic and security implications of states operating nuclear-powered submarines.
The United States conducts maritime operations in the Caribbean aimed at interdicting drug trafficking and targeting suspected drug-smuggling vessels.
October 27, 2025 high contextual
Maritime interdiction is a recurring component of counternarcotics efforts in the region.
Multinational stabilization and peacekeeping operations typically require clearly defined elements for participating countries, including mandate scope, command and control arrangements, rules of engagement, and the legal authority under which forces operate.
October 24, 2025 high temporal
Clarity on mandate, command, and rules of engagement is necessary for operational coherence and for states to understand their obligations and limitations.
NATO's stated rules of engagement for aircraft entering NATO airspace are to intercept and guide aircraft out of NATO airspace if they do not pose a threat, and to use force against aircraft if they pose a threat.
October 23, 2025 high temporal
Describes NATO's air-defense posture and rules of engagement as presented by the NATO Secretary‑General.
The President's Emergency Operations Center is a bunker located under the White House East Wing.
October 22, 2025 high structural
Designation and location of the continuity-of-government bunker beneath the East Wing
In 2025 the U.S. Capitol Police anticipated processing roughly 14,000 threat assessment cases for the year, representing a dramatic increase from case workloads in previous years.
October 21, 2025 high temporal
This figure describes annual threat-assessment caseload handled by the U.S. Capitol Police in 2025.
In U.S. Department of Defense terminology, 'low-intensity conflict' denotes combat that falls short of a conventional war between two countries and typically involves operations such as counterinsurgency or counterterrorism intended to achieve political objectives.
October 18, 2025 high definition
Definition of a military category used to classify types of conflict.
Third-party customer support providers can have access to user-submitted customer support data that may include usernames, real names, email addresses, limited billing details (such as payment type and the last four digits of credit cards), IP addresses, messages exchanged with customer service agents, and government ID images provided for age verification.
October 17, 2025 high technical
Typical types of user data accessible to third-party customer support vendors
President Donald Trump's Middle East peace plan proposes that Gaza be transformed into a de-radicalized, terror-free zone that does not pose a threat to neighboring countries.
October 13, 2025 high policy
Describes an objective included in a proposed plan for addressing the Gaza conflict.
The U.S. Department of Justice deploys federal election monitors to observe polling sites to assess transparency, ballot security, and compliance with federal law.
October 11, 2025 high operational
Describes the purpose and focus areas for federal election monitoring by the DOJ at polling locations.
The United States national security classification system includes levels referred to as 'Secret' and 'Top Secret'.
October 10, 2025 high temporal
Commonly used classification level terminology in U.S. government reporting
The U.S. Department of Homeland Security coordinates the security effort at the Super Bowl.
October 10, 2025 high descriptive
Agency responsibility for major-event security coordination in the United States.
The Cybersecurity and Infrastructure Security Agency (CISA) is an agency within the U.S. Department of Homeland Security (DHS) that aims to reduce threats to U.S. cyber and physical infrastructure.
October 10, 2025 high temporal
Describes CISA's mission and organizational placement within DHS.
The planned next phases of the ceasefire that began on 2025-10-10 included provisions addressing the disarmament of Hamas, deployment of an international security force in Gaza, and decisions about who would govern the territory.
October 10, 2025 high agreement
Key substantive issues slated for later stages of the ceasefire implementation.
Shin Bet is Israel's domestic security agency analogous to the U.S. FBI; Aman is Israel's Military Intelligence Directorate and is the country's largest intelligence agency; and Mossad is Israel's foreign intelligence agency responsible for operations abroad.
October 07, 2025 high organizational
Overview of the primary Israeli intelligence agencies and their functional roles.
Israeli strikes against identified terrorist threats are typically executed by the Israeli Air Force and emphasize precision targeting.
October 07, 2025 high operational
Typical method and characteristic of how identified threats are struck in Israeli military practice.
The Federal Aviation Administration can issue flight restrictions over locations for security reasons.
October 07, 2025 high regulatory
FAA authority to restrict airspace for safety and security considerations.
Federalized National Guard personnel may be assigned to protect federal property and federal personnel, including federal law enforcement agents.
October 06, 2025 high operational
Common operational roles for National Guard forces while under federal control.
Possession or supply of long-range cruise missiles can enable a state to strike deep inside another country's territory, including major cities, which can alter military deterrence and diplomatic bargaining dynamics.
October 06, 2025 medium strategic
General strategic implication of deploying long-range strike capabilities.
A 2025 United Nations report stated that drone operations from March 1 to September 20, 2025 killed 527 suspected gang members and 20 civilians, including 11 children, and injured another 28 civilians including nine children.
September 20, 2025 high temporal
Casualty figures attributed to drone operations reported by the United Nations.
The United Nations recorded 2,123 victims of violence across Haiti from June 1 to August 31, 2025.
August 31, 2025 high temporal
Mid-2025 violence victim count reported by the United Nations.
The United Nations reported that from January to June 2025 more than 3,100 people were killed across Haiti and an additional 1,100 people were reported injured.
June 30, 2025 high temporal
First-half 2025 mortality and injury figures across Haiti as reported by the United Nations.
Hamas and other militant groups in the Gaza Strip have used underground tunnel networks and vertical shafts to move militants and to conduct attacks against Israeli forces.
January 19, 2025 high temporal
Describes a recurring tactic attributed to militant groups operating in Gaza.
Destroyed militant tunnel networks can be reconstructed and reused by the same organizations to resume attacks or movement of fighters.
January 19, 2025 medium temporal
General observation about the durability and rebuildability of underground militant infrastructure.
After South Korea's 2016 decision to host the U.S. Terminal High Altitude Area Defense (THAAD) missile defense system, China implemented retaliatory measures targeting South Korean tourism, retail, and entertainment industries.
January 01, 2016 high historical
Policy response by China to South Korea's acceptance of a U.S. missile defense deployment.
Colorado's mail-in voting system enacted in 2013 includes paper-ballot safeguards and security auditing procedures intended to ensure election integrity.
January 01, 2013 high temporal
Characteristics and security features attributed to Colorado's mail-in voting system.
In the early 2010s, Ecuador was considered one of the most peaceful countries in South America.
January 01, 2010 high temporal
Describes Ecuador's relative peace in the early 2010s before later increases in violence.
The United States has provided security assistance to Nigeria since at least 2009, including arms sales, training, and equipment reported to total billions of dollars.
January 01, 2009 high historical
Long-term U.S. security cooperation with Nigeria involving arms sales, training, and equipment.
Decommissioning referred to arrangements to disarm paramilitary groups during the Northern Ireland peace process anchored by the 1998 Good Friday Agreement, implemented during Tony Blair's tenure as United Kingdom prime minister (1997–2007).
April 10, 1998 high temporal
The term 'decommissioning' denotes a formal disarmament process used in the Northern Ireland peace process and is cited as a precedent for similar post-conflict disarmament arrangements.
After the 1972 Munich Olympics massacre, Israeli security doctrine adopted the practice of locating and killing individuals involved in planning and executing terrorist attacks for the purposes of preempting further attacks, deterring future attacks, and exacting retribution.
September 05, 1972 high temporal
Historical basis for Israel's targeted-killing doctrine as described by former Israeli intelligence officials.
Hamas is designated as a terrorist organization by the United States, Israel, and many other countries.
high status
Designation of Hamas as a terrorist organization by multiple states is a durable status used in diplomatic and legal contexts.
Hamas maintains an underground tunnel network in the Gaza Strip that is used for movement, shelter, and storage.
high general
Describes durable insurgent infrastructure used in Gaza
Election officials commonly assert that electronic voting systems are secure and that switching to paper-ballot-only, same-day in-person voting is likely to lengthen result tabulation times without improving security.
high descriptive
General stance attributed to election administrators regarding trade-offs between electronic systems and paper-only voting methods.
A 'drone wall' is a multinational, networked defense concept that deploys arrays of detection and countermeasure technologies along a frontier to provide early warning and coordinated response to drone incursions.
high concept
Collaborative, border-focused approach under consideration among allied countries.
The Qassam Brigades is the armed wing of Hamas.
high contextual
Organizational relationship within Palestinian militant groups
Hezbollah has maintained a presence in Latin America for approximately 50 years.
high temporal
Duration of Hezbollah's presence in the Latin American region as characterized by officials and lawmakers.
U.S. counterterrorism officials and lawmakers characterize Venezuela as a key facilitator and safe haven for Hezbollah activity in Latin America, alleging state-enabled access to drug trafficking routes, passport/identity-forging schemes, money laundering, and shelter for operatives.
medium contextual
Summary of claims by U.S. officials and lawmakers about the role played by Venezuelan state actors in enabling illicit networks linked to Hezbollah.
The Trump administration designated several South and Central American drug cartels and gangs as foreign terrorist organizations, and those designations did not amount to congressional authorization to use military force against them.
medium policy
Distinction between executive branch terrorist designations and Congress's exclusive power to authorize the use of military force.
Deploying military forces to a geographic area is used to bolster capacity to detect, monitor, and disrupt illicit actors and activities such as narcotics trafficking and transnational criminal organizations (TCOs).
high operational
Describes a general purpose of force presence in countering illicit transnational activity.
Tren de Aragua (TdA) is referred to in reporting as a Designated Terrorist Organization (DTO).
medium classification
Indicates how the group Tren de Aragua is characterized in media and reporting.
The government of Trinidad and Tobago characterizes visits by U.S. naval vessels as aiming to bolster the fight against transnational crime and to build resilience through joint training, humanitarian activities, and cooperation.
high cooperation
Official rationale for hosting foreign naval visits and joint military exercises as tools for capacity-building and countering transnational crime.
North Korea has developed closer political and military ties with Russia and China, including reportedly providing personnel to Russia for its war in Ukraine, raising concerns about possible transfers of advanced technologies such as satellite systems.
high geopolitical
Description of evolving Moscow–Pyongyang and Beijing–Pyongyang relationships and related security concerns.
Attacking a country's energy infrastructure is a tactic that can be used to erode civilian morale and to disrupt industrial and war-related production, including weapons manufacturing.
high contextual
Explains strategic effects of strikes on energy systems in conflict settings.
National leaders and governments may seek additional air defense systems and tougher international sanctions as policy responses to recurrent aerial and missile attacks on critical energy infrastructure.
high contextual
Describes commonly proposed defensive and diplomatic measures to protect infrastructure.
The U.S. Department of Homeland Security asserts oversight responsibilities for security and accountability within bonded facilities to protect U.S. commerce and public safety.
high policy
Summarizes DHS's stated organizational objectives regarding bonded facilities.
The U.S. Department of Defense (Pentagon) has implemented a policy that ties media credentials and access to Pentagon workspaces to agreement with specific press restrictions, including provisions that journalists could be deemed security risks and have Pentagon press badges revoked for soliciting information not released by the department, even if that information is unclassified.
high policy
Describes the content and effect of a Pentagon press-access policy requiring media to accept restrictions to retain credentials and workspace access.
The Central Intelligence Agency (CIA) conducts counter-terrorism activities.
high organizational-function
Describes a core operational activity of the U.S. foreign intelligence agency.
Museum storage facilities commonly employ surveillance cameras and video monitoring systems to record activity and detect unauthorized access to collection areas.
high general
Security and monitoring practices used to protect stored collections.
Passports function as identity documents that officials commonly check against the bearer’s appearance.
high descriptive
General role of passports in identity verification.
Hayat Tahrir al-Sham is an al-Qaeda-affiliated armed group operating in Syria.
high contextual
Hayat Tahrir al-Sham is widely described as an al-Qaeda affiliate active in the Syrian conflict.
The United Nations Security Council maintains a UN terrorism blacklist and can vote to add or remove individuals from that blacklist.
high temporal
Describes the Security Council's authority over a UN-level terrorism listing process.
The United States government uses a Specially Designated Global Terrorist (SDGT) designation to label individuals and can remove individuals from that designation.
high temporal
Describes a U.S. government sanctions/terrorism-designation mechanism and the ability to delist individuals.
Black bloc is a protest tactic characterized by participants wearing dark clothing and head and face coverings to conceal their identities.
high definition
Describes a common crowd tactic used to obscure individual identities during demonstrations.
The United States is the primary supplier of weapons to Taiwan.
high defense
Describes the principal external military supplier relationship for Taiwan.
A multinational stabilization force can be tasked to secure territory, oversee demilitarization, protect civilians, dismantle terrorist infrastructure, decommission weapons, and maintain public safety during and after a conflict.
high procedural
Typical mandate elements assigned to multinational stabilization or peacekeeping forces in post-conflict settings.
Mandates for international stabilization or peacekeeping forces frequently include tasks such as overseeing borders, providing security, and supporting demilitarization of a territory.
high operational
Summarizes typical operational responsibilities assigned to international stabilization forces.
Federal buildings employ security screening that prohibits visitors from bringing prohibited weapons, such as full-sized metal baseball bats, into the facility.
high security
Security screening practices at federal facilities.
Thailand and Cambodia have long-standing territorial disputes along their shared border that have produced periodic armed clashes and efforts to negotiate ceasefires.
high geopolitical
Protracted territorial claims between neighboring states can lead to recurring low- to mid-intensity border conflicts.
Gangs of bandits in Nigeria commonly target schools, travelers, and remote villages in kidnappings carried out for ransom.
high contextual
Describes recurring criminal modus operandi observed in parts of Nigeria.
Nigeria's central region has experienced persistent violence driven by clashes between local herders and farmers over limited access to land and water.
high contextual
Longstanding resource-based conflicts in central Nigeria involving competition for land and water.
Clashes between herders and farmers in some parts of Nigeria have taken on a religious dimension, contributing to militias that align broadly with primarily Muslim herders or farmers from Christian communities.
medium contextual
Resource conflicts in Nigeria have, in places, overlapped with religious identity and militia formation.
Nigeria's northern region frequently experiences attacks by Boko Haram, an armed group that is affiliated with the Islamic State.
high contextual
Boko Haram is an Islamist extremist group active in Nigeria's north and linked to the Islamic State network.