Skip to main content

The Global Terrorism Database, 1970–2010

  • Chapter
  • First Online:
Handbook of Computational Approaches to Counterterrorism

Abstract

Terrorism event databases provide systematized descriptive information about terrorist attacks from unclassified sources making the attack the unit of analysis. These databases generally follow the classic journalistic format of providing information on who is responsible for an attack, what happened, where it happened, when it happened and to the extent that it is known, how it happened. There have been a dozen or more major systematic efforts to build terrorism event databases over the past four decades. Because terrorism is a type of behavior that is difficult to study by police reports or victim or offender surveys, event databases have come to fill an important role. At the present moment, the longest running, most comprehensive of these data bases is the Global Terrorism Database (GTD) maintained by the START Consortium at the University of Maryland. Because most terrorists seek publicity, event databases that rely on print and electronic media are likely more useful for studying terrorism than most other types of crime. Nevertheless, event data have important weaknesses, most notably media inaccuracies; conflicting information or false, multiple or no claims of responsibility; and government censorship and disinformation. We use the GTD to describe the characteristics of world-wide terrorism from 1970 to 2010. We conclude with some observations about the future of terrorism event data bases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Although RAND did include some cases that were arguably domestic, such as cases in Israel and the Palestine territories.

  2. 2.

    These data were downloaded on November 12, 2011.

  3. 3.

    For this classification we treat the country or territory as the target. Thus, an attack on the U.S. embassy in Switzerland is treated here as a Swiss attack. Similarly, an attack on a Swiss ambassador living in the U.S. is counted here as a U.S. attack. Although the vast majority of cases in the GTD involve attacks where the location of the target and the nationality of the target are the same, there are some interesting variations across attacks depending on the geographical country attacked, the nationality of the perpetrators, and the nationality of the target. We are exploring these issues in greater detail in ongoing research.

References

  1. LaFree G, Dugan L (2007) Introducing the global terrorism database. Terrorism and Political Violence 19: 181–204

    Article  Google Scholar 

  2. Merari A (1991) Academic research and government policy on terrorism. Terrorism and Political Violence 3:88–102

    Article  Google Scholar 

  3. Horgan J (2008) From profiles to pathways and roots to routes: perspectives from psychology on radicalization into terrorism. The ANNALS of the American Academy of Political and Social Science 618:80–94

    Article  Google Scholar 

  4. Smith BL, Damphousse KR, Jackson F, Sellers A (2002) The prosecution and punishment of international terrorists in federal courts: 1980–1998. Criminology and Public Policy 1: 311–338

    Article  Google Scholar 

  5. LaFree G (2010) The global terrorism database: accomplishments and challenges. Perspectives on Terrorism 4:24–46

    Google Scholar 

  6. LaFree G (2012) Generating terrorism event databases: results from the global terrorism database, 1970 to 2008. In: Lum C, Kennedy L (eds) Evidence-based counter terrorism. Springer, New York, pp. 41–64

    Google Scholar 

  7. Mickolus EF (2002) How do we know we’re winning the war against terrorism? Issues in measurement. Studies in Conflict and Terrorism 25:151–160

    Article  Google Scholar 

  8. Mickolus EF, Sandler T, Murdock JM, Flemming P (2010) International terrorism: attributes of terrorist events (ITERATE). Vinyard Software, Dunn Loring

    Google Scholar 

  9. Wigle J (2010) Introducing the Worldwide Incidents Tracking System (WITS). Perspectives on Terrorism 4:3–23

    Google Scholar 

  10. Schmid A, Jongman AJ (1988) Political terrorism: a new guide to actors, authors, concepts, databases, theories and literature. Amsterdam: North-Holland

    Google Scholar 

  11. Fishman M (1980) Manufacturing the news. University of TX Press, Austin

    Google Scholar 

  12. Jenkins BM (1975) International terrorism: a new model of conflict. In: Carlton D, Schaerf C (eds) International terrorism and world security. Croom Helm, London

    Google Scholar 

  13. LaFree G (1999) A summary and review of cross-national comparative studies of homicide. In: Smith MD, Zahn MA (eds) Homicide: a sourcebook of social research. Sage, Thousand Oaks

    Google Scholar 

  14. Gove WR, Hughes M, Geerken M (1985) An affirmative answer with minor qualifications. Criminology 23:451–501

    Article  Google Scholar 

  15. O’Brien R (1985) Crime and victimization. Sage, Beverly Hills

    Google Scholar 

  16. Pinkerton Global Assessment Services (1995) Annual risk assessment 1994. Pinkerton’s Inc., Washington, DC

    Google Scholar 

  17. Jenkins BM (2006) The New Age of Terrorism. In DG Kamien (ed), Homeland Security Handbook. Mcgraw-Hill, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gary LaFree .

Editor information

Editors and Affiliations

Appendix A Countries Listed Under Each Region According to GTD

Appendix A Countries Listed Under Each Region According to GTD

Region

Countries/Territories

Australasia and Oceana

Australia, Fiji, French Polynesia, New Caledonia, New Hebrides, New Zealand, Papua New Guinea, Samoa (Western Samoa), Solomon Islands, Vanuatu, and Wallis and Futuna, Tonga, and Vanuatu

Central America and Caribbean

Antigua and Barbuda, Bahamas, Barbados, Belize, Bermuda, Cayman Islands, Costa Rica, Cuba, Dominica, Dominican Republic, El Salvador, Grenada, Guadeloupe, Guatemala, Haiti, Honduras, Jamaica, Martinique, Nicaragua, Panama, Puerto Rico, St. Kitts and Nevis, Trinidad and Tobago, and the Virgin Islands (U.S.)

Central Asia

Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan

East Asia

China, Hong Kong, Japan, Macau, North Korea, South Korea, and Taiwan

Eastern Europe

Albania, Bosnia-Herzegovina, Bulgaria, Croatia, Czechoslovakia, Czech Republic, Hungary, Kosovo, Macedonia, Moldova, Montenegro, Poland, Romania, Serbia, Serbia-Montenegro, Slovak Republic, Slovenia, and Yugoslavia

Middle East and North Africa

Algeria, Bahrain, Cyprus, Egypt, Iran, Iraq, Israel, Jordan, Kuwait, Lebanon, Libya, Morocco, North Yemen, Oman, Qatar, Saudi Arabia, South Yemen, Syria, Tunisia, Turkey, United Arab Emirates, West Bank and Gaza Strip, Western Sahara, and Yemen

North America

Canada, Mexico, and the United States

Russia and the Newly Independent States (NIS)

Armenia, Azerbaijan, Belarus, Estonia, Georgia, Latvia, Lithuania, Russia, Soviet Union, and Ukraine

South Asia

Afghanistan, Bangladesh, Bhutan, India, Kashmir, Maldives, Mauritius, Nepal, Pakistan, Seychelles, and Sri Lanka

Southeast Asia

Brunei, Cambodia, Guam, Indonesia, Laos, Malaysia, Myanmar, Philippines, Singapore, South Vietnam, Thailand, Timor-Leste, and Vietnam

South America

Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Falkland Islands, French Guiana, Guyana, Paraguay, Peru, Suriname, Uruguay, and Venezuela

Sub-Saharan Africa

Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Central African Republic, Chad, Comoros, Congo (Brazzaville), Congo (Kinshasa), Djibouti, Equatorial Guinea, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-Bissau, Ivory Coast, Kenya, Lesotho, Liberia, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mozambique, Namibia, Niger, Nigeria, Rwanda, Senegal, Sierra Leone, Somalia, South Africa, Sudan, Swaziland, Tanzania, Togo, Uganda, Zaire, Zambia, and Zimbabwe

Western Europe

Andorra, Austria, Belgium, Corsica, Denmark, East Germany, Finland, France, Germany, Gibraltar, Great Britain, Greece, Iceland, Ireland, Italy, Luxembourg, Malta, Isle of Man, Netherlands, Northern Ireland, Norway, Portugal, San Marino, Spain, Sweden, Switzerland, Vatican City, and West Germany

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

LaFree, G., Dugan, L. (2013). The Global Terrorism Database, 1970–2010. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5311-6_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5310-9

  • Online ISBN: 978-1-4614-5311-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics