Skip to main content

Generating Terrorism Event Databases: Results from the Global Terrorism Database, 1970 to 2008

  • Chapter
  • First Online:
Evidence-Based Counterterrorism Policy

Part of the book series: Springer Series on Evidence-Based Crime Policy ((SSEBCP,volume 3))

Abstract

In this paper, I provide an update on the Global Terrorism Database (GTD), an open source event database that now includes information on nearly 88,000 domestic and international terrorist attacks since 1970. I describe our original data collection efforts, some of the strategies we have employed to improve the quality and comprehensiveness of the data, and the strengths and weaknesses of open source data in general and the GTD in particular. I then provide descriptive statistics on the contents of the most recently available version of the GTD and offer observations about the future of event databases. While social and behavioral research on terrorism has expanded dramatically in recent years, theoretical perspectives that incorporate terrorism and the collection of valid data on terrorism have lagged behind other criminological specializations. Despite the enormous resources devoted to countering terrorism, we have surprisingly little empirical information about which strategies are most effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Most of the 1993 data in the GTD were lost by the original data collectors and we have never been able to recover them fully (LaFree & Dugan, 2007).

  2. 2.

    This was the original PGIS definition of terrorism applied from 1970 to 1997. When data collection was taken over by the START Consortium in 2005, we required that two of the following three criteria also had to be met for inclusion in the database: (1) the violent act was aimed at attaining a political, economic, religious, or social goal; (2) the violent act included evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) other than the immediate victims; and (3) the violent act was outside the precepts of International Humanitarian Law. These criteria were constructed to allow analysts and scholars flexibility in applying various definitions of terrorism to meet different operational needs. The data presented in this chapter include all cases that meet any two of these three criteria.

  3. 3.

    For this classification we treat the country or territory as the target. Thus, an attack on the U.S. embassy in Switzerland is treated here as a Swiss attack. Similarly, an attack on a Swiss ambassador living in the U.S. is counted here as a U.S. attack. Although the vast majority of cases in the GTD involve attacks where the location of the target and the nationality of the target are the same, there are some interesting variations across attacks depending on the geographical country attacked, the nationality of the perpetrators, and the nationality of the target. We are exploring these issues in much greater detail in ongoing research.

  4. 4.

    The GTD generally includes attacks against the police only if they were not acting in concert with and under the direct authority of a military unit. We also include attacks on the military, if they occur either in situations where the military personnel were not performing military duties (such as the 2005 attacks in Bali) or where they were not in an active military theater (such as the 2000 attack on the USS Cole).

References

  • Behlendorf, B., LaFree, G., & Legault, R. (2011). Predicting microcyles of violence: Evidence from terrorist attacks by the FMLN and ETA. University of Maryland: Unpublished manuscript.

    Google Scholar 

  • Chermak, S. M., Freilich, J. D., Parkin, W. S., & Lynch, J. P. (2011). Comparing data sources of American terrorism and extremist crime: Investigating selectivity bias. Michigan State University: Unpublished manuscript.

    Google Scholar 

  • Cutter, S. (2005). Geo-coded terrorism attacks in India. University of South Carolina: Unpublished manuscript.

    Google Scholar 

  • European Commission. (2008). Defining terrorism. Transnational terrorism, security and the rule of law. Retrieved October 10, 2008, from http://www.transnationalterrorism.eu.

  • Fahey, S., LaFree, G., Dugan, L., & Piquero, A. (2011). Situational determinants of terrorist and nonterrorist aerial hijackings. Justice Quarterly. DOI: 10.1080/07418825.2011.583265.

  • Hoffman, B. (2007). The new age of terrorism. RAND: National Security Research Division. Retrieved from http://www.rand.org/pubs/reprints/2006/RAND_RP1215.pdf.

  • Jenkins, B. M. (1975). International terrorism: A new model of conflict. In D. Carlton & C. Schaerf (Eds.), International terrorism and world security. London: Croom Helm.

    Google Scholar 

  • LaFree, G., & Dugan, L. (2009). Tracking global terrorism, 1970–2004. In D. Weisburd, T. Feucht, I. Hakimi, L. Mock, & S. Perry (Eds.), To protect and to serve: Police and policing in an age of terrorism (pp. 43–80). New York: Springer.

    Google Scholar 

  • LaFree, G., Dugan, L., Xie, M., & Singh P. (2011). Geospatial and temporal patterns of terrorist attacks by ETA, 1970 to 2007. Journal of Quantitative Criminology. DOI: 10.1007/s10940-011-9133-y.

  • Merari, A. (1991). Academic research and government policy on terrorism. Terrorism and Political Violence, 3, 88–102.

    Article  Google Scholar 

  • Pinkerton Global Intelligence Service. (1995). Annual report for 1993. Washington: Unpublished.

    Google Scholar 

  • Schmid, A., & Jongman, A. J. (1988). Political terrorism: A new guide to actors, authors, concepts, databases, theories and literature. Amsterdam: North-Holland.

    Google Scholar 

  • Sheehan, I. S. (2011). Assessing and comparing terrorism sources. In C. Lum & L. Kennedy (Eds.), Evidence-based counter terrorism. New York: Springer.

    Google Scholar 

  • Smelser, N. (2007). The faces of terrorism: Social and psychological dimensions. Princeton: Princeton University Press.

    Google Scholar 

  • Smith, B. L., Damphouse, K. R., Jackson, F., & Sellers, A. (2002). The prosecution and punishment of international terrorists in federal courts: 1980–1998. Criminology and Public Policy, 1, 311–338.

    Article  Google Scholar 

  • Van Brakle, M., & LaFree, G. (2007). Rational choice and terrorist target selection: Lessons from the South African experience. Paper presented at the annual meetings of the American Society of Criminology. Atlanta, Georgia.

    Google Scholar 

Download references

Acknowledgments

Prepared for Evidence-Based Counterterrorism, edited by Cynthia Lum and Les Kennedy. Support for this research was provided by the Department of Homeland Security through the National Consortium for the Study of Terrorism and Responses to Terrorism (START), grant number N00140510629. Any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the Department of Homeland Security. I want to thank Erin Miller and Sumit Kumar for database support and Cynthia Lum, Leslie Kennedy, and several anonymous reviewers for helpful editorial suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gary LaFree Ph.D .

Editor information

Editors and Affiliations

Appendix

Appendix

Countries Listed Within Each Region

Region

Countries/territories

East and Central Asia

China, Hong Kong, Japan, Kazakhstan, Kyrgyzstan, Macao, North Korea, South Korea, Taiwan, Tajikistan, Turkmenistan, and Uzbekistan

Eastern Europe

Albania, Armenia, Azerbaijan, Bosnia-Herzegovina, Bulgaria, Belarus, Croatia, Czechoslovakia, Czech Republic, Estonia, Georgia, Hungary, Latvia, Lithuania, Kashmir, Kosovo, Macedonia, Moldova, Montenegro, Poland, Romania, Russia, San Marino, Serbia, Serbia-Montenegro, Slovak Republic, Slovenia, Soviet Union, Ukraine, and Yugoslavia

Latin America

Antigua and Barbuda, Argentina, Bahamas, Barbados, Belize, Bermuda, Bolivia, Brazil, Cayman Islands, Chile, Colombia, Costa Rica, Cuba, Dominica, Dominican Republic, Ecuador, El Salvador, Falkland Islands, French Guiana, Grenada, Guadeloupe, Guatemala, Guyana, Haiti, Honduras, Jamaica, Martinique, Nicaragua, Panama, Paraguay, Peru, Puerto Rico, St. Kitts and Nevis, Suriname, Trinidad and Tobago, Uruguay, Venezuela, and the Virgin Islands (US)

Middle East and North Africa

Algeria, Bahrain, Cyprus, Egypt, Iran, Iraq, Israel, Jordan, Kuwait, Lebanon, Libya, Morocco, North Yemen, Oman, Qatar, Saudi Arabia, South Yemen, Syria, Tunisia, Turkey, United Arab Emirates, West Bank and Gaza Strip, Western Sahara, and Yemen

North America

Canada, Mexico, and the United States

South Asia

Afghanistan, Bangladesh, Bhutan, India, Maldives, Mauritius, Nepal, New Caledonia, Pakistan, Seychelles, Sri Lanka, Tonga, Vanuatu, Wallis and Futuna, and Western Samoa

Southeast Asia and Oceana

Australia, Brunei, Cambodia, Fiji, French Polynesia, Guam, Indonesia, Laos, Malaysia, Myanmar, New Caledonia, New Hebrides, New Zealand, Papua New Guinea, Philippines, Samoa (Western Samoa), Solomon Islands, Singapore, South Vietnam, Thailand, Timor-Leste, Vanuatu, Vietnam, and Wallis and Futuna

Sub-Saharan Africa

Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Central African Republic, Chad, Comoros, Congo (Brazzaville), Congo (Kinshasa), Djibouti, Equatorial Guinea, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-Bissau, Ivory Coast, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mozambique, Namibia, Niger, Nigeria, Rwanda, Senegal, Sierra Leone, Somalia, South Africa, Sudan, Swaziland, Tanzania, Togo, Uganda, Zaire, Zambia, and Zimbabwe

Western Europe

Andorra, Austria, Belgium, Corsica, Denmark, East Germany, Finland, France, Germany, Gibraltar, Great Britain, Greece, Iceland, Ireland, Italy, Luxembourg, Malta, Isle of Man, Netherlands, Northern Ireland, Norway, Portugal, Spain, Sweden, Switzerland, and West Germany

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

LaFree, G. (2012). Generating Terrorism Event Databases: Results from the Global Terrorism Database, 1970 to 2008. In: Lum, C., Kennedy, L. (eds) Evidence-Based Counterterrorism Policy. Springer Series on Evidence-Based Crime Policy, vol 3. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0953-3_3

Download citation

Publish with us

Policies and ethics