Terrorism and Targeted Violence (T2V) in the United States

Project Details

Abstract:

The terrorism and targeted violence (T2V) in the United States database is a project housed at the University of Maryland that seeks to provide policymakers, practitioners, and researchers with comprehensive data on violent events occurring in the United States and its territories that are designed to have a significant impact on public safety and/or the security of critical infrastructure and community services. The database includes successful, failed, and foiled events that meet the following inclusion criteria:

  • An act that is dangerous to, or potentially dangerous to, human life or the security of critical infrastructure or key resources;
  • Is a violation of the criminal laws of the United States or of any subdivision of the United States;
  • Is intended to intimidate, coerce, or otherwise impact a broader population beyond the target(s) of the immediate act or to generate publicity for the perpetrator and/or their grievances;
  • And occurs within the territorial jurisdiction of the United States.

The T2V data include terrorism events, premeditated hate crimes, targeted violence occurring in school and workplace settings, public mass violence motivated by personal grievances, and other forms of violence that impact public safety and that of critical infrastructure. Mass violent events are defined as attacks that are designed to result in, or resulted in, the death or injury of four or more victims. The T2V data do not include events linked to gang activity, organized crime, interpersonal or intimate partner violence, crimes with a purely financial motive, or hate crimes that were spontaneous or otherwise unplanned by the perpetrator prior to the event. For foiled plots to be included in the data, there must be evidence that the perpetrator(s) had identified a potential target or targets for the attack and engaged in at least one mobilization activity in preparation for committing the crime. This could include acquiring a weapon or the components necessary to assemble a weapon, surveilling a target, raising funds for the attack, recruiting others to participate in the attack, or writing a manifesto or preparing other legacy tokens to be released prior to, or discovered after, an attack. Threats that do not involve at least one mobilization indicator or are described as “hoaxes” or “not credible” are not included in T2V even if they resulted in criminal charges. All data for T2V are compiled using public sources, including high quality news accounts and public court records. The data discussed in this brief are preliminary and subject to change.

 

ACCESS THE T2V DATA PORTAL