National Archive of Criminal Justice Data

This dataset is maintained and distributed by the National Archive of Criminal Justice Data (NACJD), the criminal justice archive within ICPSR. NACJD is primarily sponsored by three agencies within the U.S. Department of Justice: the Bureau of Justice Statistics, the National Institute of Justice, and the Office of Juvenile Justice and Delinquency Prevention.

Global Terrorism Database, 1970-1997 (ICPSR 4586) RSS

Principal Investigator(s):

Summary:

This dataset is composed of terrorist events recorded for the entire world from 1970 and 1997. The data were originally collected by the Pinkerton Global Intelligence Service (PGIS). Throughout the data collection period PGIS employed a broad definition of terrorism: the threatened or actual use of illegal force and violence to attain a political, economic, religious, or social goal through fear, coercion, or intimidation. The data include "terrorist groups" identified as specific named groups as well as generic groupings like "rebels" or "student protestors." The researchers arranged with PGIS to move 58 boxes of original hard copies of the PGIS terrorism database to a secure location at the University of Maryland. A Web-based data entry system was developed to match the design of the generic incident card used by PGIS in their coding. In addition, automatic entry fields were created in the Web-based interface to be automatically applied under specific circumstances. Once data entry began, the researchers initiated the ongoing process of data verification. Over the life of the grant until the creation of the database thus far, the project had reached a verification rate of nearly 50 percent. Data in this collection contain 59,503 events (with a weighted count of 66,614). Variables provide group name, type of terrorist incident, incident date, region, country, state in the United States (if applicable), city, and location in which the attack occurred, the nature of the target, the identity, corporation, and nationality of the target (up to four targets), type of weapons used (up to four weapon types), whether the incident was considered a success, the amount of damage, and more narrowly, the amount of United States damage. Further variables classify the number of terrorists involved (total, male, female), type of vehicle involved, total number killed (persons, United States nationals, terrorists), and total number wounded (persons, United States nationals, terrorists). Further variables provide information about kidnappings (total, United States nationals), total number of days and hours held, and amount of ransom demanded and amount paid (overall, United States nationals). Variables also record information about hostages (total, United States nationals), about robberies (total property, United States property), and about hijackings (origin, where diverted, status of victims, and number of victims released). Finally, several administrative variables provide the data source, legibility of the data card, and if the incident was verified by a third party.

Access Notes

  • This data collection has been deaccessioned; it is no longer distributed by ICPSR. Additional information may be available in Data Collection Notes.

    Data verification of the database is an ongoing project. The unweighted and weighted counts in this data collection do not match the counts in the final report. The report includes a small number of cases for 1993, which are not included in this data collection. Users are encouraged to refer to the final report for more information about the data tables.
    Users can also access a non-downloadable version of this database from the Global Terrorism Database Web site maintained by the National Consortium for the Study of Terrorism and Responses to Terrorism (START)

Study Description

Citation

LaFree, Gary, and Laura Dugan. Global Terrorism Database, 1970-1997. ICPSR04586-v1. Ann Arbor, MI: Inter-university Consortium for Political and Social Research [distributor], 2007-04-04. http://doi.org/10.3886/ICPSR04586.v1

Persistent URL:

Export Citation:

  • RIS (generic format for RefWorks, EndNote, etc.)
  • EndNote XML (EndNote X4.0.1 or higher)

Funding

This study was funded by:

  • United States Department of Justice. Office of Justice Programs. National Institute of Justice (2002-DT-CX-0001)

Scope of Study

Subject Terms:   assassinations, bombings, hijacking, hostage negotiations, hostages, terrorism, terrorist attacks, terrorist kidnappings, terrorists

Smallest Geographic Unit:   city

Geographic Coverage:   Asia, Europe, Latin America, Middle East, North Africa, North America, Subsaharan Africa

Time Period:  

  • 1970-01--1997-12

Date of Collection:  

  • 2002--2006

Unit of Observation:   incident

Universe:   All known terrorist events that occurred in the world from 1970 to 1997

Data Types:   census/enumeration data

Data Collection Notes:

Data verification of the database is an ongoing project. The unweighted and weighted counts in this data collection do not match the counts in the final report. The report includes a small number of cases for 1993, which are not included in this data collection. Users are encouraged to refer to the final report for more information about the data tables.

Users can also access a non-downloadable version of this database from the Global Terrorism Database Web site maintained by the National Consortium for the Study of Terrorism and Responses to Terrorism (START)

Methodology

Study Purpose:   Due to a lack of available empirical data regarding terrorism, the researchers sought to code and verify a previously unavailable dataset composed of terrorist events recorded for the entire world from 1970 to 1997. This database was originally collected by the Pinkerton Corporation's Global Intelligence Service (PGIS). Throughout the data collection period PGIS data collection employed a broad definition of terrorism: the threatened or actual use of illegal force and violence to attain a political, economic, religious, or social goal through fear, coercion, or intimidation. The data include "terrorist groups" identified as specific named groups as well as generic groupings like "rebels" or "student protesters." The PGIS database was designed to document every known terrorist event, domestic and international, across countries and time and allows examination of the total number of different types of terrorist events by specific date and geographical region. The data collection and analysis is two-pronged. First, the researchers sought to reliably enter the PGIS data. Second, the researchers continue to assess the validity of the PGIS data and how valid they are as a measure of terrorism by comparing it to other sources, by internally checking records, and by continually examining the database.

Study Design:   The researchers arranged with PGIS to move 58 boxes of original hard copies of the PGIS terrorism database to a secure location at the University of Maryland. Once the data were transferred the researchers designed a system for accurately encoding the data. A large computer lab with personal computers for data entry was not a viable option so a Web-based data entry system was developed by computer experts at the University of Maryland to allow a very large number of students to work on the database, using their own equipment, on a flexible schedule. To reduce data entry errors, the data entry interface was designed to match the design of the generic incident card used by PGIS in their coding. This method had the advantage of giving the researchers a good deal of control over the data entry process and a computerized record of the time expended by all of the data coders. Therefore the researchers could easily verify individual coding records for accuracy. Second, once the database codebook and data entry interface was developed, pre-testing of both the codebook and the interface was conducted to look for data entry problems. Pre-testing identified an array of problems with both the data entry codebook and the Web-based system that was employed to record data. Most of these problems involved clarification of the data entry codebook language, such that data entry rules became increasingly detailed and specific. For example, the researchers created rules for using the value "unknown." In the case of fields indicating the number of persons killed and injured in an event, data entry rules stated that "unknown" was to be chosen only if the field stated "unknown" on the data card. If the field was blank on the data card, it was assumed that the number killed or injured was zero. In addition, automatic entry fields were created in the Web-based interface to be automatically applied under specific circumstances. For instance, if the event type was entered as a bombing, and the bombing was entered as successful, then the field indicating that damages were incurred was automatically activated by the interface (i.e. the damages checkbox was checked). If an event was entered as a successful kidnapping, then the checkbox indicating that persons were kidnapped in the course of the event was automatically checked. These revisions and additions to the codebook and interface were all made in the interest of increasing data entry reliability while decreasing data entry error. Third, once the researchers were confident in the quality of the data entry procedures, they developed and implemented data entry training procedures. An extensive training manual was added to the data entry codebook for this purpose and a full-day training session for an original group of approximately 70 undergraduate coders was conducted. Over time, training sessions were added as new students joined the project. Finally, once data entry began, the researchers faced the ongoing process of data verification. The original plan was to verify a randomly selected 10 percent of the total cases in the sample. Over the life of the grant until the creation of the database thus far, the project had reached a verification rate of nearly 50 percent. Project members continue to work to consolidate the group list by combining cases where one group uses multiple names or various alternative name spellings. Data in this collection contain 59,503 events (with a weighted count of 66,614).

Sample:   This data collection was designed to document every known terrorist event across countries and time. The PGIS data include political as well as religious, economic, and social acts of terrorism. Because the PGIS data were collected by a private business rather than a government entity, the data collectors were under no pressure to exclude some terrorist acts because of political considerations. The database also includes instances of both domestic and international terrorism starting from 1970. The PGIS data collection efforts applied a similar data collection strategy for a 28-year period. PGIS trained their employees to identify and code terrorism incidents from a variety of sources, including wire services (especially Reuters and the Foreign Broadcast Information Service), United States State Department reports, other United States and foreign government reports, United States and foreign newspapers, information provided by PGIS offices around the world, occasional inputs from such special interests as organized political opposition groups, and data furnished by PGIS clients and other individuals in both official and private capacities. Based on coding rules originally developed in 1970, the persons responsible for collecting the PGIS database sought to exclude criminal acts that appeared to be devoid of any political or ideological motivation as well as acts arising from open combat between opposing armed forces, both regular and irregular. The data coders also excluded actions taken by governments in the legitimate exercise of their authority, even when such actions were denounced by domestic and/or foreign critics as acts of "state terrorism." However, they included violent acts that were not officially sanctioned by the government, even in cases where many observers believed that the government was openly tolerating the violent actions. The database includes potential media bias and misinformation, lacks information beyond incident-specific details alone, and is missing data for the year 1993 (lost by PGIS in an office move).

Weight:   Data include a weight variable (NUMMULT) that identifies the number of incidents the case represents.

Mode of Data Collection:   record abstracts

Data Source:

The data source for this project was the hard copy data cards compiled by the Pinkerton Global Intelligence Service (PGIS).

Description of Variables:   The PGIS database provides group name, type of terrorist incident (assassination, bombing, facility attack, hijacking, kidnapping, maiming, assault, mass disruption, or arson), incident date, region, country, state in the United States (if applicable), city, and location in which the attack occurred, the nature of the target, the identity, corporation, and nationality of the target (up to four targets), type of weapons used (up to four weapon types), whether the incident was considered a success, the amount of damage, and more narrowly, the amount of United States damage. Further variables classify the total number of terrorists involved as well as the number of male and the number of female terrorists involved, type of vehicle involved, total number of persons killed, and more narrowly, the number of United States nationals killed, total number of terrorists killed, total number of persons wounded, and more narrowly, the total number of United States nationals wounded, and the total number of terrorists wounded. Further variables provide information about kidnappings, including total number of persons kidnapped, and more narrowly, the number of United States nationals kidnapped, total number of days and hours held, amount of ransom demanded and amount paid, and the amount of United States ransom demanded and paid. Variables also record if hostages were taken, total number taken, total number of United States hostages taken, if something was stolen, amount stolen in the robbery, the amount of United States property stolen, the origin of a hijacked flight, where the hijacked flight was diverted, and whether the victims were released, escaped, rescued, killed, still captive, or other, and the number of victims released. Finally, several administrative variables provide the data source, legibility of the data card, and if the incident was verified by a third party.

Response Rates:   not applicable

Presence of Common Scales:   none

Version(s)

Original ICPSR Release:  

Version History:

  • 2007-04-04 Minor editorial changes were made to the metadata record.

Found a problem? Use our Report Problem form to let us know.