Abstract
Terrorism event databases provide systematized descriptive information about terrorist attacks from unclassified sources making the attack the unit of analysis. These databases generally follow the classic journalistic format of providing information on who is responsible for an attack, what happened, where it happened, when it happened and to the extent that it is known, how it happened. There have been a dozen or more major systematic efforts to build terrorism event databases over the past four decades. Because terrorism is a type of behavior that is difficult to study by police reports or victim or offender surveys, event databases have come to fill an important role. At the present moment, the longest running, most comprehensive of these data bases is the Global Terrorism Database (GTD) maintained by the START Consortium at the University of Maryland. Because most terrorists seek publicity, event databases that rely on print and electronic media are likely more useful for studying terrorism than most other types of crime. Nevertheless, event data have important weaknesses, most notably media inaccuracies; conflicting information or false, multiple or no claims of responsibility; and government censorship and disinformation. We use the GTD to describe the characteristics of world-wide terrorism from 1970 to 2010. We conclude with some observations about the future of terrorism event data bases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Although RAND did include some cases that were arguably domestic, such as cases in Israel and the Palestine territories.
- 2.
These data were downloaded on November 12, 2011.
- 3.
For this classification we treat the country or territory as the target. Thus, an attack on the U.S. embassy in Switzerland is treated here as a Swiss attack. Similarly, an attack on a Swiss ambassador living in the U.S. is counted here as a U.S. attack. Although the vast majority of cases in the GTD involve attacks where the location of the target and the nationality of the target are the same, there are some interesting variations across attacks depending on the geographical country attacked, the nationality of the perpetrators, and the nationality of the target. We are exploring these issues in greater detail in ongoing research.
References
LaFree G, Dugan L (2007) Introducing the global terrorism database. Terrorism and Political Violence 19: 181–204
Merari A (1991) Academic research and government policy on terrorism. Terrorism and Political Violence 3:88–102
Horgan J (2008) From profiles to pathways and roots to routes: perspectives from psychology on radicalization into terrorism. The ANNALS of the American Academy of Political and Social Science 618:80–94
Smith BL, Damphousse KR, Jackson F, Sellers A (2002) The prosecution and punishment of international terrorists in federal courts: 1980–1998. Criminology and Public Policy 1: 311–338
LaFree G (2010) The global terrorism database: accomplishments and challenges. Perspectives on Terrorism 4:24–46
LaFree G (2012) Generating terrorism event databases: results from the global terrorism database, 1970 to 2008. In: Lum C, Kennedy L (eds) Evidence-based counter terrorism. Springer, New York, pp. 41–64
Mickolus EF (2002) How do we know we’re winning the war against terrorism? Issues in measurement. Studies in Conflict and Terrorism 25:151–160
Mickolus EF, Sandler T, Murdock JM, Flemming P (2010) International terrorism: attributes of terrorist events (ITERATE). Vinyard Software, Dunn Loring
Wigle J (2010) Introducing the Worldwide Incidents Tracking System (WITS). Perspectives on Terrorism 4:3–23
Schmid A, Jongman AJ (1988) Political terrorism: a new guide to actors, authors, concepts, databases, theories and literature. Amsterdam: North-Holland
Fishman M (1980) Manufacturing the news. University of TX Press, Austin
Jenkins BM (1975) International terrorism: a new model of conflict. In: Carlton D, Schaerf C (eds) International terrorism and world security. Croom Helm, London
LaFree G (1999) A summary and review of cross-national comparative studies of homicide. In: Smith MD, Zahn MA (eds) Homicide: a sourcebook of social research. Sage, Thousand Oaks
Gove WR, Hughes M, Geerken M (1985) An affirmative answer with minor qualifications. Criminology 23:451–501
O’Brien R (1985) Crime and victimization. Sage, Beverly Hills
Pinkerton Global Assessment Services (1995) Annual risk assessment 1994. Pinkerton’s Inc., Washington, DC
Jenkins BM (2006) The New Age of Terrorism. In DG Kamien (ed), Homeland Security Handbook. Mcgraw-Hill, New York
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix A Countries Listed Under Each Region According to GTD
Appendix A Countries Listed Under Each Region According to GTD
Region | Countries/Territories |
---|---|
Australasia and Oceana | Australia, Fiji, French Polynesia, New Caledonia, New Hebrides, New Zealand, Papua New Guinea, Samoa (Western Samoa), Solomon Islands, Vanuatu, and Wallis and Futuna, Tonga, and Vanuatu |
Central America and Caribbean | Antigua and Barbuda, Bahamas, Barbados, Belize, Bermuda, Cayman Islands, Costa Rica, Cuba, Dominica, Dominican Republic, El Salvador, Grenada, Guadeloupe, Guatemala, Haiti, Honduras, Jamaica, Martinique, Nicaragua, Panama, Puerto Rico, St. Kitts and Nevis, Trinidad and Tobago, and the Virgin Islands (U.S.) |
Central Asia | Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan |
East Asia | China, Hong Kong, Japan, Macau, North Korea, South Korea, and Taiwan |
Eastern Europe | Albania, Bosnia-Herzegovina, Bulgaria, Croatia, Czechoslovakia, Czech Republic, Hungary, Kosovo, Macedonia, Moldova, Montenegro, Poland, Romania, Serbia, Serbia-Montenegro, Slovak Republic, Slovenia, and Yugoslavia |
Middle East and North Africa | Algeria, Bahrain, Cyprus, Egypt, Iran, Iraq, Israel, Jordan, Kuwait, Lebanon, Libya, Morocco, North Yemen, Oman, Qatar, Saudi Arabia, South Yemen, Syria, Tunisia, Turkey, United Arab Emirates, West Bank and Gaza Strip, Western Sahara, and Yemen |
North America | Canada, Mexico, and the United States |
Russia and the Newly Independent States (NIS) | Armenia, Azerbaijan, Belarus, Estonia, Georgia, Latvia, Lithuania, Russia, Soviet Union, and Ukraine |
South Asia | Afghanistan, Bangladesh, Bhutan, India, Kashmir, Maldives, Mauritius, Nepal, Pakistan, Seychelles, and Sri Lanka |
Southeast Asia | Brunei, Cambodia, Guam, Indonesia, Laos, Malaysia, Myanmar, Philippines, Singapore, South Vietnam, Thailand, Timor-Leste, and Vietnam |
South America | Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Falkland Islands, French Guiana, Guyana, Paraguay, Peru, Suriname, Uruguay, and Venezuela |
Sub-Saharan Africa | Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Central African Republic, Chad, Comoros, Congo (Brazzaville), Congo (Kinshasa), Djibouti, Equatorial Guinea, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-Bissau, Ivory Coast, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mozambique, Namibia, Niger, Nigeria, Rwanda, Senegal, Sierra Leone, Somalia, South Africa, Sudan, Swaziland, Tanzania, Togo, Uganda, Zaire, Zambia, and Zimbabwe |
Western Europe | Andorra, Austria, Belgium, Corsica, Denmark, East Germany, Finland, France, Germany, Gibraltar, Great Britain, Greece, Iceland, Ireland, Italy, Luxembourg, Malta, Isle of Man, Netherlands, Northern Ireland, Norway, Portugal, San Marino, Spain, Sweden, Switzerland, Vatican City, and West Germany |
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
LaFree, G., Dugan, L. (2013). The Global Terrorism Database, 1970–2010. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-5311-6_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-5310-9
Online ISBN: 978-1-4614-5311-6
eBook Packages: Computer ScienceComputer Science (R0)