Global Terrorism Database II, 1998-2004 (ICPSR 22600)

Version Date: Sep 17, 2013 View help for published

Principal Investigator(s): View help for Principal Investigator(s)
Gary LaFree, University of Maryland; Laura Dugan, University of Maryland

https://doi.org/10.3886/ICPSR22600.v1

Version V1

This version of the data collection is no longer distributed by ICPSR.

Additional information may be available in Collection Notes.

The GTD2 database is not intended to be merged with the Global Terrorism Database (GTD1) [GLOBAL TERRORISM DATABASE, 1970-1997, (ICPSR 4586)] or Global Terrorism Database 1.1 (GTD1.1) [GLOBAL TERRORISM DATABASE 1.1, 1970-1997, (ICPSR 22541)]. The data being distributed in this data collection were collected using different methods and often different data definitions to the GTD1 and GTD1.1. Accordingly, the GTD1 and GTD1.1 should not be used for direct comparison with the GTD2.

The database does not examine state terrorism.

The National Institute of Justice, the National Science Foundation, and the Department of Homeland Security provided funding for the archiving of this data collection.

Users can also access a nondownloadable version of this database from the Global Terrorism Database Web site maintained by the National Consortium for the Study of Terrorism and Responses to Terrorism (START).

Slide tabs to view more

The Global Terrorism Database II (GTD2) project was undertaken to address the fact that there is little robust empirical analysis of terrorism. Due to this lack of available empirical data regarding terrorism, the researchers sought to code and verify a previously unavailable dataset composed of terrorist events recorded for the entire world from 1998 through 2004. The goal of the GTD2 was to create a comprehensive and sound data set on global terrorism that can be used to derive methodologically robust insights into the phenomenon of terrorism and how to counter it. Information in the GTD2 was drawn entirely from publicly available, open-source materials. The criteria for incident inclusion and the coding scheme used in GTD2 were developed by a Database Development Committee, which consisted of recognized experts in terrorism and data collection. In order to be considered a "terrorist incident" the event had to have been committed by nonstate actors, had to have been violent, and intentional. In addition the act must have met two of the following three criteria: (1) The act must have been aimed at attaining a political, economic, religious, or social goal. In terms of economic goals, the exclusive pursuit of profit did not satisfy this criterion. (2) There must have been evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) than the immediate victims. (3) The action must have been outside the context of legitimate warfare activities, i.e. the act must have been outside the parameters permitted by international humanitarian law (particularly the admonition against deliberately targeting civilians or noncombatants). To produce the GTD2 an administrative staff managed both paid and volunteer researchers who monitored a variety of open sources, identified potential cases for inclusion in the database and then coded these cases. Data in this collection contain 7,154 events. The main variable categories presented in these data include: Identification Numbers, Incident Date, Incident Location, Incident Information, Attack Information, Target Information, Perpetrator Information, Perpetrator Statistics, Perpetrator Claim of Responsibility, Weapon Information, Casualty Information, Consequences, Hostage/Kidnapping Additional Information, and Source Information.

LaFree, Gary, and Dugan, Laura. Global Terrorism Database II, 1998-2004. Inter-university Consortium for Political and Social Research [distributor], 2013-09-17. https://doi.org/10.3886/ICPSR22600.v1

Export Citation:

  • RIS (generic format for RefWorks, EndNote, etc.)
  • EndNote
United States Department of Homeland Security. Directorate of Science and Technology. Human Factors Behavioral Sciences Division (HSHQDC-05-X-00482), United States Department of Justice. Office of Justice Programs. National Institute of Justice
Papua New Guinea   Cambodia   Paraguay   Kazakhstan   Syria   Latin America   Solomon Islands   Bahamas   Mali   Marshall Islands   Panama   Laos   Argentina   Seychelles   Zambia   Belize   Guinea-Bissau   Namibia   Finland   Yemen   Eritrea   China (Peoples Republic)   Madagascar   Ivory Coast   Libya   Western Samoa   Sweden   Malawi   Andorra   Liechtenstein   Poland   Jordan   Bulgaria   Tunisia   United Arab Emirates   Tuvalu   Kenya   French Polynesia   Lebanon   Djibouti   Brunei   Cuba   Azerbaijan   Czech Republic   Mauritania   Saint Lucia   Israel   San Marino   Australia   Soviet Union   Tajikistan   Myanmar   Cameroon   Cyprus   Malaysia   Timor   North America   Iceland   Global   Sub-Saharan Africa   Oman   Armenia   Gabon   Yugoslavia   Luxembourg   Brazil   Algeria   Slovenia   Antigua and Barbuda   Colombia   Ecuador   Moldova   Vanuatu   Italy   Honduras   Micronesia (Federated States)   Nauru   Haiti   Afghanistan   Burundi   Singapore   American Samoa   Russia   Netherlands   Kyrgyzstan   Bhutan   Romania   Togo   Philippines   Uzbekistan   Asia   Democratic Republic of Congo   Zimbabwe   Indonesia   Dominica   Benin   Angola   Sudan   Portugal   North Korea   Grenada   Greece   Latvia   Mongolia   Morocco   Iran   Bosnia-Hercegovina   Guatemala   Guyana   Iraq   Chile   Nepal   Georgia (Republic)   Ukraine   Tanzania   Ghana   Northern Ireland   India   Canada   Maldives   Turkey   Belgium   Taiwan   South Africa   Trinidad and Tobago   Central African Republic   Jamaica   Peru   Turkmenistan   Germany   Fiji   United States   Guinea   Somalia   Chad   Sao Tome and Principe   Thailand   Equatorial Guinea   Kiribati   Costa Rica   Middle East   Vietnam   Kuwait   Nigeria   Croatia   Sri Lanka   Uruguay   Cook Islands   United Kingdom   Switzerland   Spain   Palestine   Liberia   Venezuela   Burkina Faso   Swaziland   Estonia   South Korea   Austria   Mozambique   El Salvador   Monaco   Lesotho   Tonga   Hungary   Japan   Europe   Belarus   Mauritius   Albania   New Zealand   Senegal   Macedonia   Ethiopia   Egypt   Sierra Leone   North Africa   Bolivia   Saudi Arabia   Pakistan   Gambia   Ireland   Qatar   Serbia and Montenegro   Slovakia   France   Lithuania   Saint Kitts-Nevis   Niger   Rwanda   Bangladesh   Nicaragua   Barbados   Norway   Botswana   Dominican Republic   Denmark   Mexico   Uganda   Suriname

city

To protect respondent privacy, certain identifying information is restricted from general dissemination. Specifically the content of some character variables are restricted at this time. Users interested in obtaining these data must complete a Restricted Data Use Agreement form and specify the reasons for the request. A copy of the Restricted Data Use Agreement form can be requested by calling 800-999-0960. Researchers can also download this form as a Portable Document Format (PDF) file from the download page associated with this dataset. Completed forms should be returned to: Director, National Archive of Criminal Justice Data, Inter-university Consortium for Political and Social Research, Institute for Social Research, P.O. Box 1248, University of Michigan, Ann Arbor, MI 48106-1248, or by fax: 734-647-8200.

Inter-university Consortium for Political and Social Research
Hide

1998-01-01 -- 2004-12-31
2006-04 -- 2007-06
  1. The GTD2 database is not intended to be merged with the Global Terrorism Database (GTD1) [GLOBAL TERRORISM DATABASE, 1970-1997, (ICPSR 4586)] or Global Terrorism Database 1.1 (GTD1.1) [GLOBAL TERRORISM DATABASE 1.1, 1970-1997, (ICPSR 22541)]. The data being distributed in this data collection were collected using different methods and often different data definitions to the GTD1 and GTD1.1. Accordingly, the GTD1 and GTD1.1 should not be used for direct comparison with the GTD2.

  2. The database does not examine state terrorism.

  3. The National Institute of Justice, the National Science Foundation, and the Department of Homeland Security provided funding for the archiving of this data collection.

  4. Users can also access a nondownloadable version of this database from the Global Terrorism Database Web site maintained by the National Consortium for the Study of Terrorism and Responses to Terrorism (START).
Hide

The Global Terrorism Database II (GTD2) project was undertaken to address the fact that there is little robust empirical analysis of terrorism. The two primary reasons for this problem included insufficient temporal and spatial coverage of available data, and a lack of public availability of terrorism data. Due to this lack of available empirical data regarding terrorism, the researchers sought to code and verify a previously unavailable dataset composed of terrorist events recorded for the entire world from 1998 through 2004. The goal of the GTD2 was to create a comprehensive and sound data set on global terrorism that can be used to derive methodologically robust insights into the phenomenon of terrorism and how to counter it.

Information in the Global Terrorism Database II (GTD2) was drawn entirely from publicly available, open-source materials. These included electronic news archives, existing data sets, secondary source materials such as books and journals, and legal documents. GTD2 employed a novel approach -- that of not choosing any particular definition of terrorism, but rather allowing users of the database, within limits, to filter out the data that do not accord with their own definitions of terrorism. This was accomplished by collecting data that covers a range of definitions and coding these data so as to allow users to work with only those cases that meet their own definition of terrorism. This way, scholars and analysts can feel comfortable using data that meet their own conception of what terrorism is. This scheme might sometimes yield seemingly incongruous findings from the same dataset, as used by different researchers. However, so long as each researcher is explicit about how he or she has filtered the database and makes an attempt to justify this choice, individual results should still be capable of duplication. Perhaps more importantly, for the first time it will be possible to analyze which research findings about terrorism change if the definition changes, and which are robust to varying definitions, thus helping to resolve some of the larger theoretical issues surrounding the terrorism phenomenon. All information contained in the GTD2 merely reflects what is reported in those sources. While the database developers attempted to the best of their ability to corroborate each piece of information among multiple independent open sources, they made no further claims as to the veracity of this information. All source materials used to generate the information for an individual incident were preserved electronically in the form of Reference Source Documents (RSTs). Unfortunately, for copyright reasons, these RSTs cannot be made available online.

The criteria for incident inclusion and the coding scheme used in GTD2 were developed by a Database Development Committee, which consisted of recognized experts in terrorism and data collection. In order to be considered a "terrorist incident" the event had to have been committed by nonstate actors, had to have been violent, and intentional. In addition the act must have met two of the following three criteria: (1) The act must have been aimed at attaining a political, economic, religious, or social goal. In terms of economic goals, the exclusive pursuit of profit did not satisfy this criterion. (2) There must have been evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) than the immediate victims. (3) The action must have been outside the context of legitimate warfare activities, i.e. the act must have been outside the parameters permitted by international humanitarian law (particularly the admonition against deliberately targeting civilians or noncombatants).

To produce the GTD2 an administrative staff managed both paid and volunteer researchers who monitored a variety of open sources, identified potential cases for inclusion in the database and then coded these cases. Data in this collection contain 7,154 events. All researchers working on the database underwent intensive training in various aspects of the database creation process and their output was monitored for quality control. In addition, the database made use of anumber of custom-built software tools to facilitate the training, monitoring and case-writing process. Draft cases were subjected to a stringent review process, consisting of several tiers of cross-checking and data integrity validation through an incident administration interface. Lastly, the data were processed to the online interface, designed by Monterey Bay Technologies, and used to generate input for various statistical tools.

This data collection was designed to document every known terrorist event that occurred in the world from 1998 through 2004. In order to be considered a "terrorist incident" the event had to have been committed by nonstate actors, had to have been violent, and intentional. In addition the act must have met two of the following three criteria: (1) The act must have been aimed at attaining a political, economic, religious, or social goal. In terms of economic goals, the exclusive pursuit of profit did not satisfy this criterion. (2) There must have been evidence of an intention to coerce, intimidate, or convey some other message to a larger audience (or audiences) than the immediate victims. (3) The action must have been outside the context of legitimate warfare activities, i.e. the act must have been outside the parameters permitted by international humanitarian law (particularly the admonition against deliberately targeting civilians or noncombatants).

All known terrorist events that occurred in the world from 1998 through 2004.

terrorist incident

Information in the database was drawn entirely from publicly available, open-source materials. These included electronic news archives, existing data sets, secondary source materials such as books and journals, and legal documents. All information contained in the GTD2 merely reflects what is reported in those sources.

The main variable categories presented in these data include: Identification Numbers, Incident Date, Incident Location, Incident Information, Attack Information, Target Information, Perpetrator Information, Perpetrator Statistics, Perpetrator Claim of Responsibility, Weapon Information, Casualty Information, Consequences, Hostage/Kidnapping Additional Information, and Source Information. Sub-variables under Identification Number include: Coder and Event ID. Sub-variables under Incident Date include: Year, Month, Day, Approximate Date, Extended Incident, and Date of Extended Incident Resolution. Sub-variables under Incident Location include: Country, Region, Province/Administrative Region/U.S. State, City, Vicinity, Location Description. Sub-variables under Incident Information include: Incident Summary, Criteria (Criterion 1: Political, Economic, Religious, or Social Goal, Criterion 2: Intention to Coerce, Intimidate or Publicize to Larger Audience(s), Criterion 3: Outside International Humanitarian Law), Doubt Terrorism Proper, Alternative Designation, Part of Multiple Incident, and Situation of Multi-Party Conflict. Sub-variables under Attack Information include: Successful Attack, Suicide Attack, Attack Type, Attack Type -- Alternative Categorization, Additional Attack Type, Second Attack Type, Second Attack Type -- Alternative Categorization, Third Attack Type, and Third Attack Type -- Alternative Categorization. Sub-variables for Target Information include: Target Type, Target Entity, Name of Entity, Specific Target, Nationality of Target, Additional Targets, Second Target Type, Second Target Entity, Second Name of Entity, Second Specific Target, Nationality of Second Target, Third Target Type, Third Target Entity, Third Name of Entity, Third Specific Target, and Nationality of Third Target. Sub-variables for Perpetrator Information include: Perpetrator Group Name, Perpetrator Individual Name(s), Perpetrator Group Type, Perpetrator Group Sub-Type, Group's Ideological Influences, Additional Perpetrator Group, Second Perpetrator Group Name, Second Perpetrator Group Type, Second Perpetrator Group Sub-Type, Second Group's Ideological Influences, Third Perpetrator Group Name, Third Perpetrator Group Type, Third Perpetrator Group Sub-Type, Third Group's Ideological Influences, Specific Motive, and Perpetrator Group(s) Suspected/Unconfirmed. Sub-variables for Perpetrator Statistics include: Number of Perpetrators, Number of Male Perpetrators, Number of Female Perpetrators, and Number of Perpetrators Captured. Sub-variables for Perpetrator Claim of Responsibility include: Claim of Responsibility, Mode for Claim of Responsibility, Claim Confirmed, Additional Claim of Responsibility, Second Group's Claim of Responsibility, Second Group's Mode for Claim of Responsibility, Second Group's Claim Confirmed, Third Group's Claim of Responsibility, Third Group's Mode for Claim of Responsibility, Third Group's Claim Confirmed, and Competing Claims of Responsibility. Sub-variables for Weapon Information include: Weapon Type, Weapon Sub-Type, Additional Weapons, Second Weapon Type, Second Weapon Sub-Type, Third Weapon Type, Third Weapon Sub-Type, and Weapon Details. Sub-variables for Casualty Information include: Total Number of Fatalities, Number of U.S. Fatalities, Number of Perpetrator Fatalities, Total Number of Injured, Number of U.S. Injured, and Number of Perpetrators Injured. Sub-variables for Consequences include: Psychosocial Consequences, Property Damage, Extent of Property Damage, Value of Property Damage, and Property Damage Comments. Sub-variables for Hostage/Kidnapping Additional Information include: Hostages/Kidnapped, Total Number of Kidnap Victims/Hostages, Number of U.S. Kidnap Victims/U.S. Hostages, Hours of Kidnapping/Hostage Incident, Days of Kidnapping/Hostage Incident, Country the Kidnapper/Hijackers Diverted To, Country of Kidnapping/Hijack Resolution, Ransom Demand, Total Ransom Amount Demanded, Ransom Amount Demanded from U.S. Sources, Total Ransom Amount Paid, Ransom Amount Paid by U.S. Sources, Ransom Notes, Kidnapping/Hostage Outcome, and Number Released/Escaped/Rescued. Sub-variables for Source Information include: Name of Source, Source Publication Date, Full Source Citation, Name of Second Source, Second Source Publication Date, Full Second Source Citation, Name of Third Source, Third Source Publication Date, Full Third Source Citation, and Prevailing Source.

Not applicable.

none

Hide

2008-06-16

2018-02-15 The citation of this study may have changed due to the new version control system that has been implemented. The previous citation was:
  • LaFree, Gary, and Laura Dugan. Global Terrorism Database II, 1998-2004. ICPSR22600-v1. Ann Arbor, MI: Inter-university Consortium for Political and Social Research [distributor], 2008-10-23. http://doi.org/10.3886/ICPSR22600.v1

2008-10-23 The variables GEO_CODES and GEO_CODES0, representing the latitude and longitude of the incident, were removed because quality control checks conducted following the release of the data indicated that they do not meet the standard for completion and validity in the Global Terrorism Database. Collection and verification of these variables is ongoing.

2008-07-24 Minor edits were made to the metadata record.

2008-06-16 ICPSR data undergo a confidentiality review and are altered when necessary to limit the risk of disclosure. ICPSR also routinely creates ready-to-go data files along with setups in the major statistical software formats as well as standard codebooks to accompany the data. In addition to these procedures, ICPSR performed the following processing steps for this data collection:

  • Performed consistency checks.
  • Standardized missing values.
  • Performed recodes and/or calculated derived variables.
  • Checked for undocumented or out-of-range codes.
Hide