PERSPECTIVES ON TERRORISM Volume 15, Issue 2
Research Notes
40 Terrorism Databases and Data Sets: A New Inventory
by Neil G. Bowie
Abstract
This Research Note is a follow up from three previously published Research Notes by the author in this journal
titled: ‘Terrorism Events Data: An Inventory of Databases and Data Sets, 1968-2017’[URL: http://www.ter-
rorismanalysts.com/pt/index.php/pot/article/view/622/1226 ], ‘30 Terrorism Databases and Data Sets: a New
Inventory’[URL: http://universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2018/
issue-5/bowie.pdf ] and ‘A New Inventory of 30 Terrorism Databases and Data Sets’ [URL: https://www.universi-
teitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2020/issue-1/bowie.pdf].
Together, the previous inventories covered 120 databases and data sets. This Research Note describes 40 more
databases and data sets in the same three categories:
i. Academic, Think Tank and Independent Databases (n =32)
ii. Commercial Databases (n =2) and
iii. Governmental Databases (n =6).
Most of these data refer to terrorism, yet a few are broader, covering other forms of political violence as well as
armed conflicts.
Keywords: armed conflict, chronologies, counter-terrorism, databases, datasets, political violence, terrorism
Introduction
This new inventory of forty terrorism databases and datasets adds to an eclectic range of topics connected
with the study of terrorism. Since the early and on-going recording of terrorism incidents, actors and attack
types in the late 1960’s, the diversity of the units of analysis in terrorism databases and datasets has grown
enormously.
These databases reflect some of the complexity and ramifications that acts of terrorism visit upon individuals,
society, the state and international communities. Funding criteria may, in part, reflect the type of terror-
ism databases and datasets that are developed. However, recent funding challenges by the highly respected
START Global Terrorism Database (GTD) illustrate that even the most established databases are not immune
from funding worries or even political oversight.[1]
While there is a paucity of databases on state terrorism and domestic terrorism, the subject coverage and
breadth of diversity in quantitative terrorism databases and datasets is growing. The relational linkage of
terrorism data, source material and sophisticated mapping visualisation provide researchers with a rich
synthesised body of work (e.g., items 14, 15, 25). Niche databases and datasets covering Water (e.g., item 31),
Prisons and Terrorism (e.g., item 18), Lone-Actor Terrorism (e.g., item 6) and Journalists (e.g., item 5) are a
reflection of how incidents of terrorism impact upon society. Even insurance policies covering incidents of
terrorism would have been a rarity pre 9/11; acts of terrorism are now factored in as a mainstream insurance
risk, requiring resultant data (e.g., item 34).
This inventory is by no means a definitive list of data sets and databases on terrorism. Additional terrorism da-
tabases and data sets will be listed in a future Research Note in this journal by the same compiler. While many
of the data sets and databases are accessible, some require registration, access permission or, given the sensitive
ISSN 2334-3745 147 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
nature of the data, are not directly accessible to the general public or academic researchers.
N.B.: All website hyper-links have been validated as of 11th of April 2021.
(i) Academic, Think Tank and Independent Databases
1. ACLED Dashboard
Host Institution: The Armed Conflict Location & Event Data Project (ACLED). Executive Director: Profes-
sor Clionadh Raleigh, University of Sussex, United Kingdom.
Scope: Political violence and protest worldwide.
Access: Free.
Website: https://acleddata.com/dashboard/#/dashboard
E-Mail: admin@acleddata.com
Summary: The ACLED Dashboard interactively maps acts of political violence against civilians, riots, pro-
tests, explosions, and abductions among other variables, worldwide. In addition to graphs and quantitative
data, the dashboard provides country layers of intensity and can drill down to specific incidents using ad-
vanced software features.
2. ACLED-Religion
Host Institution: The Armed Conflict Location & Event Data Project (ACLED). Executive Director: Profes-
sor Clionadh Raleigh, University of Sussex, United Kingdom.
Scope: Religious repression and disorder in the Middle East and North Africa.
Access: Free.
Website: https://acleddata.com/acled-religion
E-Mail: admin@acleddata.com
Summary: The ACLED-Religion datasets collect real-time data on both religious repression and disorder. It
is a pilot project, focussed on the Middle East and North Africa. The dataset covers Bahrain, Egypt, Iran, Iraq,
Israel, Palestine and Yemen. Data within ACLED-Religion can be compared to the ACLED datasets, using
consistent methodological coding. New event variables, including religion-related violence and harassment,
enhance existing data and information on religious dynamics and actors. The project commenced coverage
at the end of January 2021. Updated weekly, it is also provides an ACLED-Religion dashboard: https://acled-
data.com/acled-religion-dashboard/ For further information see: https://acleddata.com/acleddatanew/
wp-content/content/uploads/2021/03/ACLED-Religion_Announcement_March2021.pdf
3. ADL H.E.A.T. Map (Hate, Extremism, Antisemitism, Terrorism)
Host Institution: Anti-Defamation League (ADL), New York (NY), United States.
Scope: Hate, extremist and antisemitic incidents in the United States.
Access: Free.
Website: https://www.adl.org/education-and-resources/resource-knowledge-base/adl-heat-map
E-Mail: https://www.adl.org/contact
Summary: The ADL H.E.A.T. Map visualises interactively hate, extremist and antisemitic incidents both
ISSN 2334-3745 148 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
at state and national level within the United States. The dataset maps terrorist plots and attacks, extremist
murders, white supremacist and antisemitic incidents, among others. Classification on the type of incident,
ideology and narrative is also provided. Spatial mapping data points allow users to drill down in geographic
areas with heightened activity. Data used to populate the ADL H.E.A.T. maps is sourced from a mixture of
police reports, victims reports and extremism-related/focused sources.
4. Basel AML Index – Ranking money laundering and terrorist risks around the world
Host Institution: [Publication] Basel Institute on Governance, Basel, Switzerland.
Scope: Risk of money laundering and terrorist finance.
Access: Public Edition (Free), Expert Edition and Expert Edition Plus (Payment required).
Website: https://baselgovernance.org/basel-aml-index
E-Mail: info@baselgovernance.org
Summary: The Basel AML Index, established in 2012, is an annual publication of the Basel Institute on
Governance. It assesses the risk of Money Laundering and Terrorism Financing (ML/TF) globally. The index
and data are generated from 16 separate sources, including The World Bank, the Financial Action Task Force
(FATF) and the World Economic Forum. The Basel AML Index: 9th Public Edition (2020) is available from
their website. The institute also provides an Interactive Map of the Basel AML Index based on high to low risk
of ML/TF. The index can be filtered based on geographic regions and income criteria. Datasets can be down-
loaded in .XLS and .CSV format.
5. Committee to Protect Journalists [Database]
Host Institution: Committee to Protect Journalists, New York, NY, United States.
Scope: Journalists killed between 1992-2021.
Access: Free.
Website: https://cpj.org
E-Mail: info@cpj.org
Summary: The Committee to Protect Journalists (CPJ) is an independent non-profit organisation based
in the United States. The CPJ maintains a database of attacks on the press. This includes: journalists killed,
imprisoned and missing. The database lists suspected sources of fire in the killing of journalists, including
terrorist groups, insurgents, paramilitary groups and military groups among other entities. In addition, the
CPJ database provides information and data on journalists arrested, charged, and convicted on terrorism
related allegations.
6. Countering Lone-Actor Terrorism: Database
Host Institution: International Centre for Counter-Terrorism (ICCT), The Hague, The Netherlands.[2]
Scope: Instances of lone-actor terrorism across 30 European countries.
Access: Contact ICCT.
Website: https://icct.nl/project/lone-actor-terrorism-database/
E-Mail: https://icct.nl/contact/
Summary: The Countering Lone-Actor Terrorism: Database (CLAT) recorded incidents of lone-actor ter-
rorism in thirty European countries (EU, Norway and Switzerland). The temporal period for the database
ISSN 2334-3745 149 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
is January 2000 - 31st December 2014. The incidents include lone-actor plots and actual attacks. The CLAT
database has 120 lone actor entries. It is not exhaustive in recording every lone actor plot during the period
2000-2014. The Lone-Actor Terrorism Final Report, provides a detailed and comprehensive background to the
CLAT Database and research project.
7. Database of Legislation on the Definition of Terrorism
Host Institution: Center for Strategic & International Studies (CSIS), Washington D.C. United States.
Scope: Counterterrorism legislation, criminal codes, NGO laws, relevant domestic legislation.
Access: Free.
Website: https://www.csis.org/programs/international-consortium-closing-civic-space-icon/aligning-securi-
ty-and-civic-space-0
E-Mail: aschwartz@csis.org
Summary: The Database of Legislation on the Definition of Terrorism has been developed by an interna-
tional consortium of scholars (iCon) under the auspices of the Human Rights Initiative (HRI) at the CSIS,
Washington D.C. The database records countries’ legislation defining terrorism. Consequential penalties for
committing or supporting acts of terrorism are also recorded. Further variables and information in the data-
base include counterterrorism legislation, combatting financing of terrorism legislation, non-governmental
(NGO) legislation, anti-money legislation and criminal codes. In addition, the database holds domestic legis-
lation that potentially impacts how each country defines an act of terrorism and consequential punishment.
A Matrix of the database is freely accessible via the CSIS website.
8. GLOBSEC Database
Host Institution: GLOBSEC, Bratislava, Slovak Republic.
Scope: European jihadist incidents 2015.
Access: Request required.
Website: https://www.globsec.org/events/what-makes-a-crime-terror-nexus-evidence-from-11-eu-countries/
E-Mail: info@globsec.org
Summary: GLOBSEC, a Central European think-tank, based in Bratislava, has developed a terrorism data-
base logging 326 individuals connected to European jihadist events in 2015. This was a collaborative data-
base project involving 11 European Union countries. The database recorded individuals who were arrested
for terrorism events, fugitives from criminal justice or those perpetrators who died while conducting acts of
terrorism in 2015. GLOBSEC has also published data from the database in a series of quarterly reports. See:
‘From Criminals to Terrorists and Back?’.
9. HLS PILAC Database of States’ Statements (August 2011 – November 2016) concerning Use of Force
in relation to Syria. Shorthand title: Database on States’ Statements concerning Syria (DSSS).
Host Institution: Harvard Law School Program on International Law and Armed Conflict (HLS PILAC),
Harvard University, Massachusetts (MT), United States.
Scope: States’ statements concerning use of force in relation to Syria (2011-2016).
Access: Free.
Website: https://pilac.law.harvard.edu/dsss#database-of-states-statements
E-Mail: pilac@law.harvard.edu
ISSN 2334-3745 150 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
Summary: The DSSS database contains statements made by states or on behalf of states, as well as state
officials, in relation to the use of force in Syria. Although primarily designed for legal practitioners, the
DSSS database contains a large array of statements referring to terrorism and Syria. The primary focus of the
database’s statements relates to legal parameters in relation to the use of force in Syria. It is freely available in
.XLSX, Google spreadsheet and .PDF format.
10. Internal Violence Index (IVI)
Host Institution: FERDI – Foundation Pour Les Études et Recherches Sur le Dévelopment International,
Clermont-Ferrand, France.
Scope: Internal armed conflict, criminality, terrorism and political violence.
Access: Free.
Website: https://ferdi.fr/en/indicators/internal-violence-index-ivi
E-Mail: contact@ferdi.fr
Summary: The Internal Violence Index (IVI) is a composite dataset focussed around 4 clusters: internal
armed conflict, criminality, terrorism and political violence. Covering the period 2008-2012, the IVI dataset
compares violence of 130 developing countries at the country level. The terrorism cluster records terrorist in-
cidents, deaths from terrorism and injuries due to terrorism. Data is exclusively quantitative and does not use
subjective indicators of fragility. The Internal Violence Index (IVI) is sourced from a range of well-established
open-source databases and is free to download.
11. Introducing a Dataset of Multi-Scale Geographies of ISIS Ideology from ISIS Sources
Host Institution: [Academic Publication] Christopher Fuhriman, Richard M. Medina & Simon Brewer
(2020). Introducing a Dataset of Multi-Scale Geographies of ISIS Ideology from ISIS Sources, Terrorism and
Political Violence, Taylor and Frances Online. Published (Online) 18 May 2020.
Scope: Multi-Scale Geographies of ISIS Ideology derived from ISIS Sources.
Access: Subscription Required.
Website: https://www.tandfonline.com/doi/full/10.1080/09546553.2020.1742707
E-Mail: christopher.fuhriman@westpoint.edu
Summary: The Dataset of Multi-Scale Geographies of ISIS Ideology from ISIS Sources is generated from
‘computer-aided content analysis, manual content analysis, and cartographic visualization applied to ISIS’s
Dabiq magazine’.[3] The dataset analyses the geographical perspectives of ISIS terrorists and insurgents gath-
ered from online textual media.
12. Introducing Transnational Terrorist Hostage Event (TTHE) Data Set, 1978-2018
Host Institution: [Academic Publication] Journal of Conflict Resolution, Vol 65, Issue 2-3, 2021.
Scope: Transnational Terrorist Hostage Events (1978-2018).
Access: Institutional Access/Subscription.
Website: https://journals.sagepub.com/doi/10.1177/0022002720957714
E-Mail: N/A
Summary: The Transnational Terrorist Hostage Event (TTHE) Data Set codifies four types of hostage inci-
dents: barricade missions, kidnappings, skyjackings and non-aerial hijackings. The dataset contains 1,974
ISSN 2334-3745 151 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
incidents covering the temporal period 1978-2018. Source data for the TTHE Data Set is linked to the Inter-
national Terrorism: Attributes of Terrorist Events (ITERATE) datasets.
13. Islamist Terror Attacks in the World 1979-2019
Host Institution: Foundation pour L’innovation politique (Fondapol), Paris, France.
Scope: Islamist terror attacks worldwide, 1979-2019.
Access: Free.
Website: https://www.fondapol.org/en/study/islamist-terrorist-attacks-in-the-world-1979-2019/
E-Mail: https://www.fondapol.org/en/contact
Summary: The Islamist Terror Attacks in the World 1979-2019 dataset attempts to quantify Islamist terror-
ism, identify the forms it takes, classifies the acts and provides quantifiable data on the number of victims
over a temporal period of 40 years. The principal source data for the dataset is derived from START’s Global
Terrorism Database (GTD), in addition to other sources. The complete dataset is available in .XLS format.
14. Lebanese Hezbollah Select Worldwide Activities Interactive Map and Timeline
Host Institution: The Washington Institute for Near East Policy, Washington D.C., United States.
Scope: Hezbollah’s worldwide activities, 1982 – Present.
Access: Free.
Website: https://www.washingtoninstitute.org/policy-analysis/lebanese-hezbollah-select-worldwide-activi-
ties-interactive-map-and-timeline
E-Mail: press@washingtoninstitute.org
Summary: The Lebanese Hezbollah Interactive Map and Timeline is a highly interactive multimedia tool,
providing an extensive database of primary and secondary source material on the Lebanese Hezbollah’s activ-
ities globally. The timeline dates back to 1982. The interactive map links to videos, photographs, government
reports, congressional reports, court documents and research reports. The database uses both open-source
materials and declassified government reports. Using multimedia, the Interactive Map and Timeline is able
to provide visual relational linkage between Hezbollah activities and associated other individuals/groups and
related events and documentation.
15. The Mapping Militants Project (MMP)
Host Institution: Center for International Security and Cooperation (CISAC), Freeman Spogli Institute for
International Studies, Stanford University, California (CA), United States.
Scope: Patterns in the evolution of militant organizations.
Access: Free.
Website: https://cisac.fsi.stanford.edu/mappingmilitants
E-Mail: mappingmilitants@lists.stanford.edu
Summary: The Mapping Militants Project (MMP) provides interactive “maps” which trace the evolution of
violent extremist groups over time. In particular, the MMP visualises changing relationships temporally. This
in turn is linked to a database of militant group profiles including a narrative summary, organizational struc-
ture, strategy and interactions. Data from the Mapping Militants Project (MMP) is available to download via
the project’s website.
ISSN 2334-3745 152 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
16. NTI Nuclear Security Index
Host Institution: [Publication] Nuclear Threat Initiative (NTI), Washington D.C., United States / Economist
Intelligence Unit (EIU).
Scope: Monitors countries nuclear security progress.
Access: Free.
Website: https://www.ntiindex.org/wp-content/uploads/2020/09/2020_NTI-Index_Report_Final.pdf
E-Mail: contact@nti.org
Summary: The NTI Nuclear Security Index monitors and provides commentary on 176 countries and their
level of progress (and gaps) on nuclear security. The index is sourced from publicly available information. It
includes two theft rankings on secure material and global nuclear security efforts as well as a sabotage rank-
ing on protection of nuclear facilities. Radiological tables and data are also presented. References to terror-
ism and nuclear terrorism are made throughout the NTI index in addition to theft, smuggling and sabotage.
The NTI website also provides interactive Maps and data tables. Datasets from the NTI Nuclear Security Index
are free to download via their website.
17. OSCE/ODIHR Hate Crime Reports
Host Institution: OSCE Office for Democratic Institutions and Human Rights (ODIHR), Warsaw, Poland.
Scope: Hate crime reports covering fifty-seven countries.
Access: Free.
Website: https://hatecrime.osce.org/austria?year=2019
E-Mail: tndinfo@odihr.pl
Summary: The OSCE/ODIHR Hate Crime Reports is an interactive site covering hate crime incidents in
fifty-seven countries. The criteria for inclusion in the reports is that an act must be deemed to be a criminal
offence in law and that acts are motivated by bias. Acts classified as bias against Christians, bias against Mus-
lims and Racism and xenophobia are among several variables. The Hate Crime Reports provides statistical
data, interactive graphics and downloadable data on incidents. Accompanying narrative also provides infor-
mation on hate crime and linkage to domestic police and Federal/State counter-terrorism agencies respective
policies and procedures.
18. Prisons and Terrorism: Extremist Offender Management in 10 European Countries
Host Institution: [Publication] Rajan Basra and Peter R. Neumann, International Centre for the Study of
Radicalisation (ICSR), King’s College London, London, United Kingdom (2020).
Scope: Management of extremist prisoner offenders.
Access: Free.
Website: ICSR-Report-Prisons-and-Terrorism-Extremist-Offender-Management-in-10-European-Coun-
tries_V2.pdf
E-Mail: mail@icsr.info
Summary: The Prisons and Terrorism: Extremist Offender Management in 10 European Countries study
produced by the ICSR, Kings College London, outlines the policies and practices of each country in relation
to extremist offender management. This study contains a series of statistics as well as data analysis, including
number of prisoners in custody for terrorism-related offences and prisoners monitored for radicalisation. In
ISSN 2334-3745 153 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
addition, a chronological ‘List of Prison-related Terrorist Attacks and Plots, 2015-20’ is provided. The study
analyses how prison environments can both radicalise extremist offenders, while also offering the opportuni-
ty to reform radicalised prisoners.
19. QAnon Offenders in the United States
Host Institution: [Publication] Jensen, Michael and Sheehan Kane. 2021. “QAnon Offenders in the United
States”, National Consortium for the Study of Terrorism and Responses to Terrorism (START), University of
Maryland (MD), United States.
Scope: QAnon offenders in the United States.
Access: Free.
Website: https://www.start.umd.edu/pubs/START_PIRUS_QAnon_Feb2021_0.pdf
E-Mail: infostart@start.umd.edu
Summary: The QAnon Offenders in the United States research brief provides data on the characteristics and
offences committed by QAnon members. Data is compiled from auxiliary data from START’s Profiles of
Radicalization in the United States (PIRUS) project. The data deals with individuals who have radicalized in
the United States. Characteristic variables include among others: age, marital status, employment status and
whether or not individuals have a military or law enforcement background. The data also codes character-
istics of the crime, for example terrorist threats/acts, kidnapping (conspiracy) and weapons possession and
murder.
20. Radiological and Nuclear Non-State Adversaries Database (RANNSAD)
Host Institution: START National Consortium for the Study of Terrorism and Responses to Terrorism, Uni-
versity of Maryland, Maryland (MD), United States.
Scope: Profiles of all former non-state users and attempted users of radiological and nuclear weapons.
Access: Free.
Website: https://www.start.umd.edu/data-tools/radiological-and-nuclear-non-state-adversaries-data-
base-rannsad
E-Mail: infostart@umd.edu
Summary: The RANNSAD database codes data on Radiological and Nuclear Adversary Profiles including
information on events ‘perpetrated by a specific actor/organization’. Established in 2011, the RANNSAD
dataset variables include event type, agent type, perpetrator type, ideology type, individual demographics as
well as perpetrator success level. The RANNSAD database was developed to answer the research question:
“Who are the most likely radiological or nuclear non-state threat actors?”. Both the RANNSAD database and
codebook are freely accessible to download.[4]
21. Reputation of Terror Groups Dataset: Measuring Popularity of Terror Groups
Host Institution: [Academic Publication] Tokdemir, Efe, and Seden Akcinaroglu. 2016. “Reputation of Ter-
ror Groups Dataset: Measuring Popularity of Terror Groups” Journal of Peace Research, Vol. 53(2) 268-277.
Scope: Different strategies by terror groups measuring the groups popularity or public support.
Access: Institutional Access/Subscription.
Website: https://journals.sagepub.com/doi/suppl/10.1177/0022343315626506
E-Mail: N/A
ISSN 2334-3745 154 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
Summary: The Reputation of Terror Groups (RTG) dataset codes quantitatively terror group strategies which
can be measured in relation to terror groups popularity or public support. From this data, the concept of
reputation in relation to terror groups is assessed. The RTG records 443 terror groups over a temporal period
of 31 years.
22. Since 9/11 - Timeline
Host Institution: Since 9/11 (Educational Charity) in association with University College London (UCL)
Institute of Education. London, United Kingdom.
Scope: Timeline of key terrorism events focussed on 9/11.
Access: Free.
Website: https://since911.com/explore-911/timeline
E-Mail: info@since911.com
Summary: The ‘Since 9/11’ interactive Timeline has been developed as an educational tool to inform young
people of the events of 9/11. The timeline focuses predominantly on the events leading to the attacks of 11
September 2001 in New York, Washington DC and Shanksville, Penn., with a series of chronological interac-
tive events that offer narrative, pictorial and multimedia film.
23. Suicide Attacks Database (2020)
Host Institution: Institute for National Security Studies (INSS), Tel Aviv University, Israel.
Scope: Suicide attacks worldwide during 2020.
Access: Free.
Website: https://www.inss.org.il/publication/suicide-attacks-2020
E-Mail: info@inss.org.il
Summary: The Suicide Attacks Database, compiled by the Institute for National Security Studies, Tel Aviv
University, Israel, covers the year 2020. It records incidents in Asia, the Middle East and Afghanistan, among
other regions. Two independent sources are used to validate data. Key variables include: attack style, attack
complexity, destination and organization responsible. The database is freely available to download in an .XLS
format.
24. Terrorism Content Analytics Platform (TCAP) Database
Host Institution: Database developed by Tech Against Terrorism and supported by Public Safety Canada.[5]
Scope: Verified terrorist online content.
Access: Registration required. This site is restricted to ‘Tech companies, academic researchers and civil soci-
ety representatives who have legitimate justification for accessing terrorist content’.[6]
Website: https://www.terrorismanalytics.org/
E-Mail: https://www.terrorismanalytics.org/contact
Summary: The Terrorist Content Analytics Platform (TCAP) is an automated database tool that detects and
analyses verified terrorist content found on smaller internet platforms. Data is collected in real-time. The re-
sultant dataset allows informed judgements to be made by content moderators running smaller internet plat-
forms, including messaging platforms, terrorist channels and mobile apps. In addition, the datasets generated
can be used for academic research and analysis. The TCAP database can also be used for automated terrorist
content analysis including symbolism, detecting narratives and metadata.
ISSN 2334-3745 155 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
25. Terrorists and Extremists Database (TED)
Host Institution: Counter Extremism Project, New York, London and Berlin (Online Project).
Scope: Global database of extremists and terrorist leaders and operatives.
Access: Free.
Website: https://www.counterextremism.com/extremists
E-Mail: https://www.counterextremism.com/contact-us
Summary: The Terrorists and Extremists Database (TED) is an interactive database on terrorist leaders,
operatives and extremists. The database generates Featured Reports on individuals. These Featured Reports
provides a narrative overview of the individual terrorist, extremist or operative as well as biographical infor-
mation and known aliases. Linked to each record is an interactive History Timeline, which in turn hyperlinks
media reports, Government documents and UN publications. The website has extensive downloadable Threat
Reports on terrorist groups.
26. The Terrorism and Foreign Fighters Database
Host Institution: Balkan Investigative Reporting Network (BIRN), Sarajevo, Bosnia and Herzegovina.
Scope: All convictions for domestic terrorism in the Balkan’s as well as judicial verdicts in the case of foreign
fighters who went to Syria and the Ukraine.
Access: Free.
Website: https://terorizam.detektor.ba
E-Mail: urednik@birn.eu.com
Summary: The Terrorism and Foreign Fighters Database is an interactive resource centre developed by the
Balkan Investigative Reporting Network (BIRN). The database records all convictions for domestic terrorism
in the Balkans. Its coverage includes domestic terrorism convictions in Albania, Bosnia and Herzegovina,
Montenegro, North Macedonia and Serbia. In addition, the database contains judicial verdicts of individuals
fighting in conflicts in Syria and Ukraine (2010-2020). Variables include location of trial, total number of
cases, location of crime and total figures per country in sentencing years. Individual case narratives and trial
video is provided.
27. Terrorist and Insurgent Organization Social Services (TIOS) Dataset
Host Institution: One Earth Future, Broomfield, Colorado (CO), United States.
Scope: Tracks non-state services by sector undertaken by terrorists, rebels and insurgents.
Access: Free.
Website: https://oefresearch.org/datasets/tios
E-Mail: lheger@oneearthfuture.org or danielle.jung@emory.edu
Summary: The Terrorist and Insurgent Organization Social Services (TIOS) Dataset provides key indicators
of goods and social service provided by terrorists, rebels and insurgents in fragile and failed states. The public
good variables within the dataset include welfare, education, health security, natural disaster response and re-
ligious services, among others. Covering more than 400 hundred organisations, the TIOS dataset is available
in .CSV and .DTA download format.
ISSN 2334-3745 156 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
28. Terrorist and Organized Criminal Search Data Base (TOC)
Host Institution: Faculty of Security Studies and Faculty of Mathematics, University of Belgrade, Republic of
Serbia.
Scope: Terrorist incidents and organised criminal activity.
Access: Free – Requires Registration.
Website: http://www.tocsearch.com/
E-Mail: http://www.tocsearch.com/index.php?action=contact
Summary: The TOC-search database provides data and information on terrorist incidents, terrorist groups,
members and group leaders. It also contains information on organised crime. The TOC-search project was
established in 2007. The database has a two-tier accessibility level. The ‘blue key’ is for students and research-
ers while the ‘red key’ is for institutional and government agencies’ access.
29. Typology of Terror
Host Institution: Lowy Institute, Sydney, NSW, Australia.
Scope: Characteristics of Australian’s contribution to global jihad in Islamic State era.
Access: Free.
Website: https://interactives.lowyinstitute.org/features/typology-of-terror/
E-Mail: reception@lowyinstitute.org
Summary: The Typology of Terror is an interactive live database of the characteristics of Australian citizens’
and Australian residents’ contribution to global jihad since the beginning of the Syrian civil war and the start
of the Islamic State era. The database is sourced from media reports, official court documents, interviews
with journalists, interviews with Australian government law enforcement officials, as well as social media
profiles. The Typology of Terror gathers data on convicted terrorist offenders, those charged with terrorism
offences or known to have joined radical Islamist terrorist organisations. It also provides a high level of visual
interactive data with accompanying quantitative data.
30. United States Counterterrorism Operations 2018-2020 [Map]
Host Institution: Costs of War Project, Watson Institute for International and Public Affairs, Brown Univer-
sity, Providence (RI), United States.
Scope: United States Government conducted counterterrorism operations 2018–2020.
Access: Free.
Website: https://watson.brown.edu/costsofwar/papers/2021/USCounterterrorismOperations
E-Mail: costsofwar@brown.edu
Summary: The United States Counterterrorism Operations 2018-2020 map indicates 85 countries where the
U.S. Government specifically carried out counterterrorism operations between 2018 and 2020. The projects
authors identify ‘operations the U.S. explicitly justifies using the language of counterterrorism’. The U.S. coun-
terterrorism activities are classified into 4 key areas: 1. Training and / or assistance, 2. U.S. Military Exercises,
3. Combat 4. Air and Drone Strikes.
31. Water Conflict Chronology - Map
ISSN 2334-3745 157 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
Host Institution: Pacific Institute, Oakland, CA, United States.
Scope: Chronology of conflict with incidents linked to water.
Access: Free.
Website: http://www.worldwater.org/conflict/map/
E-Mail: info@pacinst.org
Summary: The Water Conflict Chronology is an interactive global map indicating incidents of conflict with
specific involvement of water. While covering a broad array of conflict terms, users are able to refine the
interactive chronology map to filter specific incidents relating to acts of terrorism that has some fight for
access to water element involved. The chronology with more than 900 incidents/events has been developed
to provide insight into the relationship between water systems, water resources and conflict. Each incident is
linked to source data displayed on the map.
32. The Western Jihadism Project [Database]
Host Institution: Project Lead: Dr. Jytte Klausen, Brandeis University, Waltham, Massachusetts (MT), United
States.
Scope: Western nationals linked to terrorist plots related to Al Qaeda.
Access: Upon request.
Website: https://www.brandeis.edu/klausen-jihadism/index.html
E-Mail: klausen@brandeis.edu
Summary: Established in 2006 and formally launched in 2009, the Western Jihadism Project is a database ar-
chive of the evolution and growth of ‘Jihadism within Western Europe, North America and Australia’. Dating
back to the early 1990’s, this open-source database records terrorist plots carried out by Western nationals
and Al Qaeda-inspired terrorist offenders.
(ii) Commercial Databases
33. Statista – Data on Terrorism and Political Violence
Host Institution: Statista, Hamburg, Germany.
Scope: Broad range of terrorism and political violence data.
Access: Basic Account (Free), Single/Project/Corporate/Enterprise Accounts (Subscription Required).
Website: https://www.statista.com/
E-Mail: support@statista.com
Summary: Statista - founded in Germany (2007), with worldwide offices, provides commercially available
datasets on a wide range of topics, including terrorism and political violence. Their database provides tiered
levels of access. This includes free basic data and graphs on terrorism and political violence, to subscrip-
tion-based services, allowing users to drill down on terrorism and political violence statistics. Topics covered
include terrorism in the Nordics, country specific terrorism indexes with commentary, country dossiers, and
economic costs of terrorism. Bespoke research projects can be developed. Depending on subscription level,
statistical datasets are downloadable in MS Excel, MS PowerPoint and various graphical formats.
ISSN 2334-3745 158 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
34. Terrorism Pool Index: Review of terrorism insurance programs in selected countries 2018/19
Host Institution: [Publication] Willis Towers Watson, New York (NY), United States.
Scope: Index of terrorism insurance programs 2018/19.
Access: Free (2018/19 Edition). 2020 Edition requires registration.
Website: https://www.willistowerswatson.com/en-GB/Insights/2019/10/the-terrorism-pool-index-2019
E-Mail: https://www.willistowerswatson.com/en-US/Contact-Us
Summary: Covering 24 countries, The Terrorism Pool Index (2018/19) contains statistical data and accom-
panying narrative of key terrorism insurance pools, financial funds and compensation schemes. The first
section covering 14 countries includes definitions of terrorism for each country (this has consequences for
insurance pay-outs). In addition, scope of coverage, data on insurance indemnity and summary of exclusions
are given, e.g., for nuclear, chemical, biological and radiological attacks. Where available, the index publishes
financial data on maximum scheme paid loses and reinsurance rates resulting from terrorist incidents.
(iii) Governmental Databases
35. Annex of Statistical Information – Country Reports on Terrorism 2019
Host Institution: Bureau of Counterterrorism, United States Department of State, Washington D.C. United
States.
Scope: Statistical information on terrorism incidents worldwide 2019.
Access: Free.
Website: https://www.state.gov/wp-content/uploads/2020/06/Annex-of-Statistical-Information.pdf
E-Mail: https://register.state.gov/contactus/contactusform
Summary: The Annex of Statistical Information provides statistical data and analysis for the U.S. Department
of States annual Country Reports on Terrorism. Under the United States Code (Title 22, Section 2656f) the
U.S. Department of State is required by law to present annually to Congress both the Country Reports on Ter-
rorism and The Annex of Statistical Information. The annex details: number of individuals killed by acts of ter-
rorism, injured and kidnapped by terrorist groups pertaining to the previous calendar year. The data includes
United States citizens, dual nationals and non-US citizens. Data for The Annex of Statistical Information is
prepared for the State Department’s Bureau of Counterterrorism by Development Services Group (DSG),
Inc., Global Terrorism Trends and Analysis Center (GTTAC), Bethesda, MD, United States. DSG subcon-
tracted the data collection and analysis effort to the Terrorism, Transnational Crime and Corruption Center,
operated by the Schar School of Policy and Government at George Mason University (GMU).
36. Foreign Terrorist Organisations (FTO’s) List
Host Institution: Bureau of Counterterrorism, United States Department of State, Washington D.C. United
States.
Scope: Designated foreign terrorist organisations by the United States Government (USG).
Access: Free.
Website: https://www.state.gov/foreign-terrorist-organizations/
E-Mail: https://register.state.gov/contactus/contactusform
Summary: The Foreign Terrorist Organizations (FTO) List catalogues foreign organisations designated by
ISSN 2334-3745 159 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
the United States’ Secretary of State, under section 219 of the Immigration and Nationality Act (INA). The
list contains the year the group was designated and the organization’s name. In addition, the list also contains
‘Delisted Foreign Terrorist Organizations’ by the U.S. Department of State. This details the ‘Date Removed’,
‘Name’ and the ‘Date originally Designated’.
37. National Counter-Improvised Explosive Device (IED) Capabilities Analysis Database (NCCAD)
Host Institution: Office for Bombing Prevention (OBP) Cyber & Infrastructure Security Agency, Arlington,
Virginia (VA), United States.
Scope: Analyses the capabilities of United States counter-IED missions.
Access: Restricted.
Website: https://www.cisa.gov/nccad
E-Mail: nccad@cisa.dhs.gov
Summary: National Counter-Improvised Explosive Device (IED) Capabilities Analysis Database (NCCAD)
analyses types of IED incident, geographic area and incident-specific resources to provide response capabil-
ities nationally and sub-nationally, in countering IEDs. The database is used for planning and crisis decision
making as a result of IED threats or incidents. For further information see: https://www.cisa.gov/sites/default/
files/publications/NCCAD%20Fact%20Sheet.pdf
38. Northern Ireland Terrorism Legislation: Annual Statistics 2019/20
Host Institution: [Publication] Security and Protection Group, Northern Ireland Office, Belfast, United
Kingdom.
Scope: Northern Ireland terrorism legislation.
Access: Free.
Website: https://www.gov.uk/government/statistics/northern-ireland-terrorism-legislation-annual-statis-
tics-201920--2
E-Mail: https://www.nidirect.gov.uk/contacts/contacts-az/northern-ireland-office-nio
Summary: The Northern Ireland Terrorism Legislation: Annual Statistics 2019/20 is produced by the North-
ern Ireland Office. The report produces statistical datasets and commentary in relation to powers contained
within four key pieces of legislation. These powers relate to the Terrorism Act (2000), the Terrorism (North-
ern Ireland) Act 2006, the Counter-Terrorism Act (2008) and the Justice and Security (Northern Ireland) Act
2007. Key data includes terrorism statistics on stop and search, arrests, detentions, convictions and compen-
sation, among other data.
39. Security Situation Statistics (Northern Ireland)
Host Institution: The Police Service of Northern Ireland (PSNI), Belfast, United Kingdom.
Scope: Trends in statistics on the security situation in Northern Ireland.
Access: Free.
Website: https://www.psni.police.uk/inside-psni/Statistics/security-situation-statistics/
E-Mail: zCSUwebstats@psni.pnn.police.uk
Summary: Dating back to the late 1960’s, the Police Service of Northern Ireland (PSNI) have collated data
on the security situation in Northern Ireland. Key statistical data include: security related deaths, casualties
ISSN 2334-3745 160 April 2021
PERSPECTIVES ON TERRORISM Volume 15, Issue 2
from the security situation, bombing incidents, shooting incidents, paramilitary style shooting casualties and
paramilitary style assaults. Other variables in the datasets include finds of ammunition or explosives, incen-
diaries and persons that have been arrested under the Terrorism Act (Section 41) and subsequently charged.
Statistical validation is provided by the PSNI Statistics Branch. The PSNI produce a monthly Police Recorded
Security Situation Statistics bulletin as well as an Accompanying excel spreadsheet (.XLXS).
40. Terrorism in Africa – A Quantitative Analysis
Host Institution: [Publication] Adriana Lins De Albuquerque, Totalförsvarets forskningsinstitut - Swedish
Defence Research Agency, Stockholm, Sweden. (2017).
Scope: Quantitative analysis of terrorism in Africa 1997-2015.
Access: Free.
Website: https://www.foi.se/rapportsammanfattning?reportNo=FOI-R--4398--SE
E-Mail: N/A
Summary: This quantitative analysis of terrorism in Africa, by the Swedish Defence Research Agency (FOI),
provides data on terrorism over an eighteen year period (1997-2015). The study uses data from the Glob-
al Terrorism Database (GTD), BAAD datasets and the United Nations, among other datasets. It assesses
whether terrorism is on the rise in Africa, and which terrorist groups are responsible for this rise. The study
also explores whether there are Islamist links to these attacks and what association al-Qaeda and Daesh (IS/
ISIL) have in relation to terrorist attacks in Africa.
About the Compiler: Neil G. Bowie is an independent scholar, specialising in the analysis of terrorism and
counterterrorism. He holds a Ph.D. from the Centre for the Study of Terrorism and Political Violence (CSTPV)
at the University of St. Andrews, Scotland. Neil Bowie also holds degrees from the universities of Aberdeen,
Strathclyde and from Edinburgh’s Napier University. He can be reached at: neil.bowie1@btinternet.com
Notes
[1] See: ‘START resumes Global Terrorism Database collection; 1970 - 2019 data file now available to researchers’. START GTD
website [Accessed 11/04/21]
[2] Project partners include: Royal United Services Institute (RUSI), Chatham House, Institute for Strategic Dialogue, The Polish
Institute of International Affairs, Nationaal Coo The Nationaal Coördinator Terrorismebestrijding en Veiligheid (NCTV) and
Association of Chief Police Officers.
[3] See: https://www.tandfonline.com/doi/full/10.1080/09546553.2020.1742707
[4] See: Gary Ackerman; Charles Blair; Maranda Sorrells, 2011, “Radiological and Nuclear Non-State Adversaries Database
(RANNSAD)”, https://doi.org/10.7910/DVN/SCGOJE, Harvard Dataverse, V1, UNF:5:1S4k29WvGinRZA8JYm9zfg==
[fileUNF]
[5] See: Tech Against Terrorism and Public Safety Canada
[6] See: https://www.terrorismanalytics.org/faq
ISSN 2334-3745 161 April 2021