International Terrorism: Attributes of Terrorist Events

The International Terrorism: Attributes of Terrorist Events project, commonly known as ITERATE, records data regarding transnational terrorist groups and their activities. It is one of the most comprehensive databases of its type; most academic research in the field stems from either ITERATE or the Global Terrorism Database.[1] Published by Vinyard Software, it is available as a qualitative textual chronology from 1960–present and a quantitative numerically coded database from 1968–present.[1][2]

Data edit

The quantitative data set contains one main file and three complementary files. The main file ("Common File") is the most extensive, recording 42 different variables such as location, type of attack, perpetrator(s), and casualties. The "Fate File" records 14 variables relating to the fate of the terrorist group(s) involved where at least one failed to escape. The "Hostage File" records 41 variables specific to events involving hostage-taking. The "Skyjack File" records 27 variables specific to instances of skyjacking. The files are designed to be used together with almost all incidents recorded in the Common File and supplementary variables recorded where appropriate.[1][2][3][4]

The qualitative file provides a textual account of each incident. All files in both qualitative and quantitative data sets utilize the same incident codes for cross-referencing.[2][4]

Each data set is updated daily.[2][4]

ITERATE predominately utilises open-source data collection such as academic research and media articles.[2][5] It also uses intelligence from government agencies as well as interviews with academics, government officials, and victims [4]

History edit

ITERATE was originally created by CIA analyst Dr Edward Mickolus who co-founded Vinyard Software, ITERATE's publisher, with Dr Calvin Andrus.[6][7]

Strengths and Limitations edit

Definition of terrorism edit

The definition of terrorism used by ITERATE differs to that used by other databases. This is not unique to ITERATE as all 5 of the most prominent terrorism databases utilize their own definition.[8] ITERATE defines terrorism as:

"...the use, or threat of use, of anxiety-inducing, extra-normal violence for political purposes by any individual or group, whether acting for or in opposition to established governmental authority, when such action is intended to influence the attitudes and behavior of a target group wider than the immediate victims and when, through the nationality or foreign ties of its perpetrators, its location, the nature of its institutional or human victims, or the mechanics of its resolution, its ramifications transcend national boundaries."[3]

ITERATE does not record instances of domestic terrorism, focusing exclusively on international/transnational terrorism, thus excluding the majority of terrorist incidents.[1][6] It differentiates between these as follows.

"International terrorism is such action when carried out by individuals or groups controlled by a sovereign state, whereas transnational terrorism is carried out by basically autonomous non-state actors, whether or not they enjoy some degree of support from sympathetic states."[3]

That said, the same definition of terrorism has been use throughout the ITERATE project avoiding inconsistencies in data recording, unlike several other databases.[8]

Open-source data collection edit

The use of open-source data collection methods has both pros and cons:[5]

  • Unlike criminals, terrorists rely on publicity for success meaning that terror events are highly likely to be recorded in the media.
  • Low profile or unsuccessful terror attacks are less likely to be reported by media, creating a bias towards more newsworthy attacks.
  • The data may have a Western bias due to under-reporting of attacks in foreign regions as a result of language barriers and lack of press freedom in certain countries.

Data on Terrorist Subjects (DOTS) Database edit

The Data on Terrorist Subjects (DOTS) Database was later introduced to supplement ITERATE. It contains biographical information on every terrorist and person of interest included in ITERATE.[2]

Further reading edit

A list of publications that have utilized ITERATE can be found here.

  1. ^ a b c d LaFree, Gary (2019-03-14). Chenoweth, Erica; English, Richard; Gofas, Andreas; Kalyvas, Stathis N (eds.). "The Evolution of Terrorism Event Databases". The Oxford Handbook of Terrorism. pp. 49–68. doi:10.1093/oxfordhb/9780198732914.013.3. ISBN 978-0-19-873291-4. Retrieved 2021-09-14.
  2. ^ a b c d e f Flemming, Peter A.; Mickolus, Edward; Sandler, Todd (2010). "Research Note: Using the ITERATE and DOTS Databases". Journal of Strategic Security. 1 (1): 57–76. doi:10.5038/1944-0472.1.1.6. S2CID 143171849.
  3. ^ a b c Edward F. Mickolus; Todd Sandler; Jean M. Murdock; and Peter A. Flemming (March 2021), ITERATE Data Codebook (PDF), retrieved 2021-09-14{{citation}}: CS1 maint: multiple names: authors list (link)
  4. ^ a b c d "Databases on Terrorism". The Routledge Handbook of Terrorism Research. Routledge. 2011-02-25. pp. 312–358. doi:10.4324/9780203828731-17. ISBN 978-0-203-82873-1.
  5. ^ a b Dugan, Laura; Distler, Michael (2016), "Measuring Terrorism", The Handbook of the Criminology of Terrorism, John Wiley & Sons, Ltd, pp. 187–205, doi:10.1002/9781118923986.ch12, ISBN 978-1-118-92398-6, retrieved 2021-09-14
  6. ^ a b Fowler, William Warner (March 1981), Terrorism Data Bases: A Comparison of Missions, Methods, and Systems (PDF), RAND Corporation
  7. ^ "About Vinyard Software". www.vinyardsoftware.com. Retrieved 2021-09-15.
  8. ^ a b Sheehan, I. S. (2012). Assessing and comparing data sources for terrorism research. In Evidence-based counterterrorism policy (pp. 13-40). Springer, New York, NY. Available at https://www.researchgate.net/profile/Ivan-Sheehan/publication/226098567_Assessing_and_Comparing_Data_Sources_for_Terrorism_Research/links/5494def60cf20f487d2c48be/Assessing-and-Comparing-Data-Sources-for-Terrorism-Research.pdf