Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
A First Look at Domestic and International Global Terrorism Events, 1970–1997 Laura Dugan, Gary LaFree, and Heather Fogg Department of Criminology and the National Center for the Study of Terrorism and the Response to Terrorism, University of Maryland, 2220 LeFrak Hall, College Park, MD 20742 {ldugan, glafree, hfogg}@crim.umd.edu Abstract. While the study of terrorism has expanded dramatically since the 1970s, most analyses are limited to qualitative case studies or quantitative analyses of international incidents only—which comprise a very small proportion of all terrorist events. Until now, empirical data on both domestic and international terrorist events have not existed. We have compiled information from more than 69,000 terrorism global incidents from 1970 to 1997. Most of these data were originally collected from a private intelligence service agency using open-source data. Since we completed coding the original data in 2005, we have been continually updating and validating the data and we now call the Global Terrorism Database (GTD). We begin this paper by describing the data collection efforts and the strengths and weaknesses of relying on open-source data. We then summarize completed research projects and end by listing on-going efforts to better understand the dynamics of worldwide terrorism events. 1 Introduction Although the research literature on terrorism has expanded dramatically since the 1970s, the number of studies based on systematic empirical analysis is surprisingly limited. One of the main reasons for this lack of cutting-edge empirical analysis on terrorism is the low quality of available statistical data. To remedy this, we coded and verified a previously unavailable data set composed of 67,165 terrorist events recorded for the entire world from 1970 to 1997. This unique database was originally collected by the Pinkerton Global Intelligence Service (PGIS). Because the PGIS database was designed to document every known terrorist event across countries over time, we can examine the total number of different types of terrorist events by specific date and geographical region. To the best of our knowledge this is the most comprehensive open source data set on terrorism that has ever been available to researchers. PGIS trained their employees to identify and code terrorism incidents from a variety of sources, including wire services (especially Reuters and the Foreign Broadcast Information Service), U.S. State Department reports, other U.S. and foreign government reports, U.S. and foreign newspapers, information provided by PGIS offices around the world, occasional inputs from such special interests as organized political opposition groups, and data furnished by PGIS clients and other individuals in both official and private capacities. S. Mehrotra et al. (Eds.): ISI 2006, LNCS 3975, pp. 407 – 419, 2006. © Springer-Verlag Berlin Heidelberg 2006 408 L. Dugan, G. LaFree, and H. Fogg While this is the only database of this sort, it has both strengths and weaknesses which are reviewed below. Strengths include its broad definition of terrorism and its longitudinal structure. Weaknesses of the database include potential media bias and misinformation, lack of information beyond incident specific details alone, and missing data from lost cards (data for the year 1993 were lost by PGIS in an office move). Finally, as we discovered cases that were missing from PGIS, we added them to the data and changed the name from PGIS to the Global Terrorism Database (GTD). 2 Building a Global Terrorism Database Although the research literature on terrorism has expanded dramatically since the 1970s (for reviews, see [1], [13], [16], [18]), the number of studies based on systematic empirical analysis is surprisingly limited. In their encyclopedic review of political terrorism, Schmid and Jongman [19:177] identify more than 6,000 published works but point out that much of the research is “impressionistic, superficial (and offers) … far-reaching generalizations on the basis of episodal evidence.” One of the main reasons for this lack of cutting-edge empirical analysis on terrorism is the low quality of available statistical data. While several organizations now maintain databases on terrorist incidents,1 these data sources face at least three serious limitations. First, most of the existing data sources use extremely narrow definitions of terrorism. For example, although the U.S. State Department [21:3] provides what is probably the most widely-cited data set on terrorism currently available, the State Department definition of terrorism is limited to “politically motivated violence” and thus excludes terrorist acts that are instead motivated by religious, economic, or social goals. Second, because much of the data on terrorism is collected by government entities, definitions and counting rules are inevitably influenced by political considerations. Thus, the U.S. State Department did not count as terrorism actions taken by the Contras in Nicaragua. By contrast, after the 1972 Munich Olympics massacre in which eleven Israeli athletes were killed, representatives from a group of Arab, African and Asian nations successfully derailed United Nations action by arguing that “people who struggle to liberate themselves from foreign oppression and exploitation have the right to use all methods at their disposal, including force” [8:31]. And finally and most importantly, even though instances of domestic terrorism2 greatly outnumber instances of international terrorism, domestic terrorism is excluded from all existing publicly available databases. In short, maintaining an artificial separation between domestic and international terrorist events impedes full understanding of terrorism and ultimately weakens counterterrorism efforts. 1 2 These include the U.S. State Department [23], the Jaffee Center for Strategic Studies in Tel Aviv [6], the RAND Corporation [9], the ITERATE database[13], [14], and the Monterey Institute of International Studies [20]. We use the term “domestic terrorism” throughout to signify terrorism where the perpetrator and target were nationals from the same country and the attack was perpetrated within the boundaries of their country. A First Look at Domestic and International Global Terrorism Events, 1970–1997 409 3 The Original PGIS Database To address this lack of empirical data, we coded and verified a previously unavailable data set composed of 67,165 terrorist events recorded for the entire world from 1970 to 1997. This unique database was originally collected by the Pinkerton Global Intelligence Service (PGIS). The collectors of the PGIS database aimed to record every major known terrorist event across nations and over time. This format allows us to examine the total number of different types of terrorist events by date and by geographical region. The database contains nine unique event types; seven of which were defined a priori by PGIS, including bombing, assassination, facility attack, hijacking, kidnapping, assault, and maiming. PGIS later added two categories, arson and mass disruption, to fit unique cases they found during data collection. To the best of our knowledge this is the most comprehensive open source data set on terrorism events that has ever been available to researchers. There are at least four main reasons for this. First, unlike most other databases on terrorism, the PGIS data include political, as well as religious, economic, and social acts of terrorism. Second, because the PGIS data were collected by a private business rather than a government entity, the data collectors were under no pressure to exclude some terrorist acts because of political considerations. Third, unlike any other publicly available database the PGIS data includes both instances of domestic and international terrorism starting from 1970. And finally, the PGIS data collection efforts are remarkable in that they were able to develop and apply a similar data collection strategy for a 28-year period. 4 Evaluating the PGIS Data Although every effort was made, from data entry eligibility requirements and applicant screening to extensive data verification and cleaning, to ensure that our coding of the PGIS data was as complete and accurate as possible, nevertheless, the resulting database has both strengths and weakness—many of which were beyond our control. Strengths of the database include its broad definition of terrorism and its longitudinal structure. Weaknesses of the database include potential media bias and misinformation, lack of information beyond incident specific details alone, and missing data from a set of cards that were lost during an office move of PGIS. We review some of these strengths and weaknesses in the next section of this report. 4.1 Database Strengths In reviewing our work on these data since 2002, we believe that the database has four major strengths. First, the PGIS data are unique in that they included domestic as well as international terrorist events from the beginning of data collection. This is the major reason why the PGIS data set is so much larger than any other currently available open source databases. In a review, Alex Schmid [18] identified 9 major databases that count terrorist events, and reports that each of these databases contains less than 15 percent of the number of incidents included in the PGIS data. Second, PGIS had an unusually sustained and cohesive data collection effort. Thus, the PGIS 410 L. Dugan, G. LaFree, and H. Fogg data collection efforts were supervised by only two main managers over the 27 years spanned by the data collection effort. We believe that this contributes to the reliability of the PGIS data. Third, we feel that there are advantages in the fact that the PGIS data were collected not be a government entity but by a private business enterprise. This meant that PGIS was under few political pressures in terms of how it classified the data being collected. And finally, the definition of terrorism employed by the original PGIS data collectors was exceptionally broad. Definitions of terrorism are a complex issue for researchers in this area. A major reason that we were drawn to the PGIS data is that the definition of terrorism it employed throughout the data collection period is especially inclusive, “…the threatened or actual use of illegal force and violence to attain a political, economic, religious or social goal through fear, coercion or intimidation.” Where the U.S. State Department defines terrorism as “…premeditated, politically motivated violence perpetrated against noncombatants targeted by subnational groups or clandestine agents, usually intended to influence an audience.” Unlike the State Department, whose mandate is to focus on international terrorism (i.e., that involving the interests and/or nationals of more than one country), the PGIS data are not limited to international incidents. To underscore the importance of this difference consider that two of the most noteworthy terrorist events of the 1990s—the March 1995 nerve gas attack on the Tokyo subway system and the April 1995 bombing of the federal office building in Oklahoma City, both lack any known foreign involvement and hence were purely acts of domestic terrorism. Based on coding rules originally developed in 1970, the persons responsible for collecting the PGIS database sought to exclude criminal acts that appeared to be devoid of any political or ideological motivation and also acts arising from open combat between opposing armed forces, both regular and irregular. The data coders also excluded actions taken by governments in the legitimate exercise of their authority, even when such actions were denounced by domestic and/or foreign critics as acts of “state terrorism.” However, they included violent acts that were not officially sanctioned by government, even in cases where many observers believed that the government was openly tolerating the violent actions. In sum, we regard the fact that these data were collected by a private corporation for a business purpose as an important advantage over other data sets currently available. Because the goal of the data collection was to provide risk assessment to corporate customers, the database was designed to err on the side of inclusiveness. While there is at present no universally accepted definition of terrorism, the definition used to generate the PGIS data is among the most comprehensive that we have been able to identify. 4.2 Weaknesses of Open Source Terrorism Databases But while the PGIS data has some important strengths, we also recognize that it also has important weaknesses that need to be understood when drawing conclusions from the data. Three types of weaknesses are especially important. First, all the major open source terrorism databases (ITERATE, MIPT-RAND and PGIS) rely on data culled from news sources, thus they are likely biased toward the most newsworthy forms of terrorism [6]. Although the PGIS database includes events that were prevented by A First Look at Domestic and International Global Terrorism Events, 1970–1997 411 authorities, it is certain that some potential terrorist attacks never came to the attention of the media and are thus excluded. A related issue is that the PGIS database includes incidents covered by the media where the perpetrator remains unidentified. Without information concerning the perpetrator it may be difficult to accurately classify the incident as terrorism, since the definition relies on the motive of the attacker. Finally, various media accounts of similar terrorist incidents may contain conflicting information. Without measures of reliability in news reporting, it is difficult for researchers to discern which source supplies the most accurate account. The second issue is that the dataset lacks information on other important issues associated with each terrorism incident. Open source databases, including the one created by PGIS also lack information on the “psychological characteristics, recruitment, and careers of members of terrorist movements” [9:28]. There are also no “broadly-based data sets with coded information on the outcome of terrorist campaigns or on government responses to episodes of domestic terrorism” [9:28]. Of course, the lack of data on terrorist groups is mainly explained by their clandestine nature. The media also tends to focus on terrorism employed by non-governmental insurgents rather than state terrorism. Overall, the reason for the large quantity of information on the characteristics of sub-state terrorism incidents is because this information is more readily available from media sources. Thus, it is important to recognize that the data captured in open source terrorism databases are limited and are appropriate for only certain types of studies. Finally, for unknown reasons, most of the original data for the year 1993 were lost prior to our acquiring the dataset. We are currently working to replace that missing data. Also, during the process of verifying the PGIS data with other sources, we found that PGIS were unsystematically missing some cases. When the source of missing information was deemed reliable, we added the incident to PGIS and documented the original source. Because this changes the database, and because Pinkerton’s corporate offices are no longer affiliated with the data, we changed the name from PGIS to the Global Terrorism Database (GTD). 5 A First Look at International and Domestic Global Terrorism, 1970 – 1997 Now we present an overview of international and domestic terrorism worldwide. Between 1970 and 1997 (excluding 1993), the GTD records 69,088 terrorism incidents3. Figure 1 contrasts the pattern of terrorism according to GTD with that of RAND, which only includes international incidents. Most striking is the vast difference in magnitude between the two data bases. If we were to exclusively focus on international terrorism, we would miss information on more than 61,000 incidents. In fact, as we shall see later, many groups began by attacking targets within their own country before expanding to international terrorism. 3 This figure is based on the available GTD as of February 17, 2006. Since the database is continuously evolving, the numbers may change over time as new sources are integrated into the existing database. 412 L. Dugan, G. LaFree, and H. Fogg Terrorism Frequencies by Source 6000 5000 RAND GTD 4000 3000 2000 1000 0 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1994 1995 1996 1997 Fig. 1. Terrorism Trends over Time According to RAND and GTD Looking exclusively at the pattern of terrorism from the GTD, we see that terrorism had increased rather steadily to a peak in 1992 with 5,324 events worldwide. Up through 1976 attacks by terrorist attacks were relatively infrequent, with fewer than 1,000 incidents each year. In 1977, incidents rose from 885 to 1,306. From 1978 to 1979 we see evidence that events nearly doubled rising to 2,745 from 1,526. The number of terrorist events continues a broad increase until 1992, with smaller peaks in 1984, at almost 3,500 incidents, and 1989, with about 4,300 events. After the global peak in 1992, the number of terrorist incidents declines to approximately 3,500 incidents at the end of the data collection period in 1997. To better understand the distribution of terrorism events and lethality, we calculated the distribution of incidents and fatalities according to their region. 4 Figure 2 shows that more terrorism and terrorism-related fatalities occur in Latin America than in any other region. In fact, Latin America is attacked nearly twice as often as any other region of the world more than seven times as often as Sub-Sahara Africa and nearly forty times that of North America.5 Europe and Asia are nearly tied at second, each accounting for about 20 percent of the world’s total terrorism events (21.03 and 18.14 percent, respectively). The Mid-East/North Africa region follows with less than 15 percent (13.14) of the incidents, and Sub-Saharan Africa and North America account for the fewest terrorism events (5.79 and 1.68 percent, respectively). 4 5 The composition of countries within each region was determined by PGIS. Mexico is counted as Latin America instead of North America. A First Look at Domestic and International Global Terrorism Events, 1970–1997 413 Incidents and Fatalties by Region 0.45 0.4 Incidents Fatalities 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0 Nort h America Lat in America Europe Mid- East / Nort h Af rica Sub-Sahara Af rica/ NAF Asia Fig. 2. Incidents and Fatalities by Region Figure 2 also shows that the distribution of fatalities by region differs from that of the incidents. While Latin America remains the leader in fatalities as well as in the proportion of attacks, Asia has the second highest percentage of fatalities by region, accounting for nearly 25 percent of all terrorism-related fatalities (24.56). Figure 2 also reveals that while Europe is second in the proportion of attacks, it suffers relatively few fatalities as a result of these incidents, averaging only 0.53 deaths per incident (See Table 1). This rate is especially low compared to that for Sub-Saharan Africa which averages 5 deaths for every terrorism attack. Thus, while the SubSaharan African region accounts for a relatively small proportion of total terrorist attacks during this period, when there were attacks in this region, they tended to be deadlier. The reasons for these differences remain to be explained, although part of the explanation may simply be ready and proximate access to medical care across regions. Table 1. The Average Number of Fatalties per Terrorism Attack Region Fatalities per Attack North America 0.55 Latin America 2.06 Europe 0.53 Mid-East, North Africa 2.00 Sub-Saharan Africa 5.00 Asia 2.70 414 L. Dugan, G. LaFree, and H. Fogg We turn now to the distribution of terrorism activity for each region over time. Figure 3 disaggregates the trend line of Figure 1 to show which regions are driving each portion of the trend from 1970 through 1997. If we were to examine this graph from 1970 until 1978, the story would be that terrorism is largely a European problem, with evidence of it becoming a growing issue in Latin America. After 1978, Europe peaks at over 1,000 incident in 1979 and then drops to an average of 550 incidents a year. Latin America, on the other hand continues rise after 1978 and peaks in 1984 with over 2,100 incidents. After 1984, Latin America continues to average about 1,400 a year with large fluctuations. Most interesting is the fairly steep drop that bottoms out in 1995 at 515 incidents. The steady increase in the overall world-wide terrorism rates are driven by the relatively recent increase in the frequency of attacks in Asia and Sub-Saharan Africa. Figure 3 also shows that compared to other regions, North America has experienced a relatively small proportion of terrorist attacks during this period. Te rroris m Fre que ncie s by Source 6000 5000 RAND GTD 4000 3000 2000 1000 0 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1994 1995 1996 1997 Fig. 3. Terrorism Activity over Time by Region Not only does the GTD provide information about the frequency of attacks, but it allows us to examine the distribution of terrorist tactics. In an analysis not shown, we examine the types of terrorist tactics by region. While the five most common tactics (i.e., assassinations, bombing, facility attacks, hijacking and kidnapping) were relatively common in all six regions, there were substantial differences in the distribution of terrorist tactics. Theses patterns may be partly due to risk management strategies. Since the GTD documents each incident we can aggregate to any level. We demonstrate the value of examining sub-national patterns in the next two figures. In figures 4 and 5, we disaggregate the trend by the most active groups. We also include the trend line for incidents where the perpetrating group is unrecorded. This comparison in Figure 4 A First Look at Domestic and International Global Terrorism Events, 1970–1997 415 Total Attacks in Northern Ireland 350 300 Frequency 250 200 150 100 50 0 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1994 1995 1996 1997 Attacks by Top Groups In Northern Ireland 200 180 IRA UFF 160 UVF unknown 140 Frequency 120 100 80 60 40 20 0 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1994 1995 1996 1997 Fig. 4. Terrorist Attacks over Time in Northern Ireland for Select Groups demonstrates that the pattern of terrorism in Northern Ireland is largely driven by the activities of the Irish Republican Army (IRA). Peak years for the IRA were 1972, 1979, 1983, 1988, and 1991, which form the peaks for terrorism in Northern Ireland overall. The two second most active groups, the Ulster Freedom Fighters (UFF) and the Ulster Volunteer Force (UVF) have demonstratively lower rates of attack (totals equal 203 and 251, respectively compared to 2,299 for the IRA). Figure 5 presents the trends for four groups in the United States as well as that for events where no group claims responsibility. Aside from events perpetrated by an unknown group, most of the U.S. terrorism trends appear to be accounted for by the 416 L. Dugan, G. LaFree, and H. Fogg anti-abortion activists, the Armed Forces of Puerto Rican National Liberation (FALN), the New World Liberation Front (NWLF), and the Jewish Defense League (JDL). Attacks by FALN, NWLF, and JDL were most common between 1970 and 1980. Since then, most activity seems to be driven by the anti-abortion movement. Total Attacks in the United States 140 120 Frequency 100 80 60 40 20 0 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1994 1995 1996 1997 Attacks by Top Groups in the United States 50 45 anti-abortion activists FALN 40 NWLF 35 JDL unknown Frequency 30 25 20 15 10 5 0 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1994 1995 1996 1997 Fig. 5. Terrorist Attacks over Time in the United States for Select Groups 6 Summary of Current and Future Projects USing GTD Several projects have been conducted using portions of the GTD. these below. We summarize A First Look at Domestic and International Global Terrorism Events, 1970–1997 417 6.1 Testing a Rational Choice Model of Airline Hijackings Our study of global aerial hijackings was recently published in Criminology [4]. Although we mostly use data from the Federal Aviation Administration (FAA), this paper demonstrates the strength of using incident based terrorism, like that in the GTD for assessing policy effects. Our results support the contagion view that hijacking rates significantly increase after a series of hijackings closely-clustered in time—but only when these attempts were successful. Finally, we found that the policy interventions examined here significantly decreased the likelihood of nonterrorist but not terrorist hijackings. For this paper we developed a database that combines information from the GTD, the FAA, and RAND-MPIT. Based on these sources, we were able to develop a database of 1,101 attempted aerial hijackings that occurred around the world from 1931 to 2003. The GTD data were especially critical for allowing us to classify whether specific aerial hijackings were conducted by terrorist organizations. 6.2 Is Counter Terrorism Counterproductive? Northern Ireland 1969–1992 This second project is still underway, and uses a similar methodology to the above hijacking paper. In this case, however, we use data exclusively from the GTD.6 In it, we examine 3,328 terrorist attacks perpetrated by Northern Irish groups between 1969 and 1992, classifying them as either nationalist or loyalist. We develop two theoretical perspectives that predict opposing impact of counter terrorist actions on future terrorist strikes. The dominant rational choice perspective suggests that government intervention will decrease terrorist strikes by increasing the costs of future strikes. By contrast, a legitimacy perspective suggests that counter terrorist retaliation may actually increase future terrorist strikes by undermining the legitimacy of governmental regimes. We identify six major British counter terrorist interventions for the years spanned by the data. Since loyalists generally support the British government, we expect the nationalists to be more sensitive to the British interventions. We use Cox proportional hazard models to estimate the impact of these interventions on the likelihood of future terrorist attacks. In five of the six cases examined, we find the strongest support for legitimacy arguments: government intervention resulted in increased activity for Nationalist organizations. Overall, the results support the conclusion that counter terrorism, especially when it involves the military, may actually increase the risk of additional terrorist strikes. We discuss the implications for future research and policy. 6.3 The Impact of Terrorism on Italian Employment and Business Activity In this research we use the GTD to assess the economic consequences of terrorism on changes in the number of firms and employment in Italian providences from 1985 to 1997. We use panel data methods and find that in the year following a terrorism attack, the number of firms in the providences is significantly reduced. Similarly, 6 Recall that we supplemented the original PGIS data to create the new GTD. The Northern Ireland data from GTD include sources other than PGIS, such as the Conflict Archive on the Internet (CAIN, http://cain.ulst.ac.uk/). 418 L. Dugan, G. LaFree, and H. Fogg employment also drops in the year following a terrorist attack. This decrease is mostly attributed to reductions in growth rates of births and expanding firms, significantly reducing the number of firms the following year. 7 Conclusion We have introduced the newly developed Global Terrorism Database that was predominantly compiled from a private source and is the only terrorism database that includes both international and domestic incidents over an extended period of time. We presented a brief description of global terrorism and then described three analyses that relied heavily on the GTD data. Yet, this only begins to describe the analytical potential of the GTD. We have well over a dozen projects with new ideas exponentially forming. For example, we are currently geocoding the data to use geographic mapping techniques to display spatial and temporal patterns of terrorist activity. Our major goal here is to create regional and world-wide maps depicting numbers and rates of terrorist events around the world. Yet, we also are actively assessing the geographic distributions of localized activity. One current project focuses on terrorism attacks in Spain to identify hot spots, temporal changes in the spatial distribution of incidents, and tests models of diffusion. We have also merged the GTD data with other sources to estimate the effects of political, economic, and social indicators on terrorism outcomes. Because the data are longitudinal we can also examine how terrorism contributes to political, economic, and social changes for a country or region. And finally, additional future projects can further explore the likely non-linear patterns of terrorist events by considering concepts explaining the acceleration or deceleration of activity. For instance, Schelling [17] shows “white flight” behaves as a tipping point phenomena such that when a given neighborhood reaches a particular concentration of African Americans, white flight increases inevitability and precipitously. Applied here, tipping points could be described as that critical point in a region when periodic terrorist activity accelerates to high frequencies of heavily concentrated violence. Other concepts worth exploring are threshold models [7], [22], contagion effects [3], [11], epidemic theories [3], diffusion models [2], and bandwagon effects [7] (for review, see [10]). References 1. Babkina, A.M. (1998). Terrorism: An Annotated Bibliography. Commack, NY: Nova Science Publishers. 2. Burt, R. S. (1987). “Social Contagion and Innovation: Cohesion Versus Structural Equivalence” American Journal of Sociology 92:1287-1335. 3. Crane, J. (1991). “The Epidemic Theory of Ghettos and Neighborhood Effects on Dropping Out and Teenage Childbearing” American Journal of Sociology 96:1126-1159. 4. Dugan, L., LaFree, G. Piquero, A.: Testing a Rational Choice Model of Airline Hijackings. Criminology (2005) 43:1031-1066 5. Fairchild, E. and H.R. Dammer (2001). Comparative Criminal Justice Systems. Belmont, CA: Wadsworth /Thomson Learning. A First Look at Domestic and International Global Terrorism Events, 1970–1997 419 6. Fowler, W. W. (1981). Terrorism Databases: A Comparison of Missions, Methods and Systems. RAND publication, Santa Monica CA. 7. Granovetter, M. (1978). “Threshold Models of Collective Behavior” American Journal of Sociology 9:166-179. 8. Hoffman, B. (1998). Inside Terrorism. New York, NY: Columbia University Press. 9. Jongman, A.J. (1993). “Trends in International and Domestic Terrorism in Western Europe, 1968-88,” Pp. 26-76 In Western Responses to Terrorism, edited by A. P. Schmid and R.D. Crelinsten. London: Frank Cass. 10. LaFree, G. (1999). “Declining Violent Crime Rates in the 1990s: Predicting Crime Booms and Busts.” Annual Review of Sociology 25:145-68. 11. Loftin, C. (1986). “Assaultive Violence as a Contagious Social Process” Bulletin of the New York Academy of Medicine 62:550-555. 12. Mickolus, E. F. (1991). Terrorism, 1988-1991: A Chronology of Events and a Selectively Annotated Bibliography. Boulder, CO: Westview Press. 13. Mickolus, E. F. (1982). International Terrorism: Attributes of Terrorist Events, 1968-1977. (ITERATE 2). Ann Arbor, MI: Inter-University Consortium for Political and Social Research. 14. Mickolus, E.F., T. Sandler, J.M. Murdock, and P. Fleming (1993). International Terrorism: Attributes of Terrorist Events 1988-91 (ITERATE 4). Dunn Loring, VA: Vineyard Software. 15. Mickolus, E.F. and S.L. Simmons (1997). Terrorism, 1992-1995: A Chronology of Events and a Selectively Annotated Bibliography. Westport, CT: Greenwood Press. 16. Prunkun, H. W. (1995). Shadow of Death: An Analytical Bibliography on Political Violence, terrorism, and Low-Intensity Conflict. Lanham, MD: Scarecrow Press. 17. Schelling, T.C. (1971). “Dynamic Models of Segregation” Journal of Mathematical Sociology 1:143-186. 18. Schmid, A.P. (1992). “Terrorism and Democracy.” Terrorism and Political Violence 4:1425. 19. Schmid, A.P. and A.J. Jongman (1988). Political Terrorism: A New Guide to Actors, Authors, Concepts, Databases, Theories and Literature. Amsterdam: North-Holland Publishing Company. 20. Tucker, J.B. (1999). “Historical Trends Related to Bioterrorism: An Empirical Analysis.” Emerging Infectious Disease 5:498-504. 21. United States Department of State (2001). “Introduction: Patterns of Global Terrorism, 2000.” http://www.state.gov/s/ct/rls/pgtr. 22. Wallace, R. (1991). “Social Distintegration and the Spread of AIDS: Threshold for Propagation along ‘Sociogeographic’ Networks” Social Science & Medicine 33:115-1162.