15 Years of Terror Map |
|
|
terrorism-and-armed-nonstate-actors |
Map of terrorist incidents with more than 20 fatalities from 2000 to 2015.
|
40 maps that explain the world |
|
|
international-relations-resources |
Maps can be a remarkably powerful tool for understanding the world and how it works, but they show only what you ask them to. So when we saw a post sweeping the Web titled “40 maps they didn’t teach you in school,” one of which happens to be a WorldViews
|
A Persistent Threat The Evolution of al Qa'ida and Other Salafi Jihadists |
Seth Jones |
|
jihadi-resources |
This report examines the status and evolution of al Qa'ida and other Salafi-jihadist groups, a subject of intense debate in the West. Based on an analysis of thousands of primary source documents, the report concludes that there has been an increase in the number of Salafi-jihadist groups, fighters, and attacks over the past several years. The author uses this analysis to build a framework for addressing the varying levels of threat in different countries, from engagement in high-threat, low government capacity countries; to forward partnering in medium-threat, limited government capacity environments; to offshore balancing in countries with low levels of threat and sufficient government capacity to counter Salafi-jihadist groups.
|
A Tipsheet to Avoid Drones (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi-resources |
What can you do to avoid drones in a landscape like the desert of northern Mali? Camouflage your cars, for one, as Tip No. 3 advises in an al-Qaida tipsheet describing how to avoid being spotted from the air. The document was found in the Ministry of Finance’s Audit Building. It was first published in Arabic on an extremist forum in 2011, and has never appeared in English before.
|
A War of One's Own: Understanding the Gender Gap in Support for War |
Deborah Jordan Brooks, Benjamin A. Valentino |
|
security-resources |
The gender gap in support for war represents the largest and most consistent policy gender gap in public opinion polling. We know little about the causes of this gap, however, because scholars have not effectively isolated how or why the gender gap changes in response to the characteristics of different wars. We conducted two controlled experiments on demographically representative samples of U.S. adults to see if systematically varying the stakes of war (economic/strategic vs. humanitarian) or multilateral support for the action (U.N. approval vs. U.N. rejection) affects the size of the gender gap. We propose an interactive theoretical perspective that explicitly links these characteristics with key individual-level characteristics that might be driving the gender gap. Our findings indicate that the gender gap is strongly dependent on the specific context of the war. In fact, we find that the gender gap reverses when the war has U.N. approval or if the stakes of the war are humanitarian.
|
ABC News National Poll in Iraq |
|
|
polls |
The national poll was conducted by ABC News, the BBC, ARD German TV and the Japanese broadcaster NHK in 2008. Link to the ABC News article.
|
ABC News National Public Opinion Poll in Afghanistan |
|
|
polls |
A national public opinion poll in Afghanistan by ABC News, the BBC and ARD German TV from 2009. Link to ABC news article.
|
ADL Global 100: An Index of Anti-Semitism |
|
United States |
social-factors |
Anti-Defamation League (ADL) presents interactive survey results of anti-Semitic attitudes held by individuals around the world.
|
ADL HEAT Map (Hate, Extremism, Antisemitism, Terror) |
|
United States |
american-politics-resources |
ADL H.E.A.T. Map is the first-of-its-kind interactive and customizable map detailing specific incidents of hate, extremism, antisemitism and terrorism by state and nationwide. This interactive map lets you read details on specific incidents, better understand tactics extremists use, compare activity by type and/or state and access and download raw data.
|
Al Qaeda and ISIS: Existential Threats to the U.S. and Europe |
|
|
jihadi-resources |
Part 1 of 3 installments of ISW and CTP's report for the U.S. grand strategy in destroying ISIS and al-Qaeda
|
Al Risalah Magazine #1 |
Jabhat al-Nusra |
|
jihadi-resources |
English-language Jabhat al-Nusra, Al-Risalah (the message in Arabic). Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Al Risalah Magazine #2 |
Jabhat al-Nusra |
|
jihadi-resources |
English-language Jabhat al-Nusra, Al-Risalah (the message in Arabic). Released by jihadology.net, students and researchers must register an account with the site to access the pdf. (ARABIC)
|
Al Risalah Magazine #3 |
Jabhat al-Nusra |
|
jihadi-resources |
bhat al-Nusra newspaper, Al-Risalah (the message in Arabic). Released by jihadology.net, students and researchers must register an account with the site to access the pdf. (ARABIC)
|
Al Risalah Magazine #4 |
Jabhat al-Nusra |
|
jihadi-resources |
Jabhat al-Nusra's newspaper, Al-Risalah (the message in Arabic). Released by jihadology.net, students and researchers must register an account with the site to access the pdf. (ARABIC)
|
Al-Haqiqa #5 |
Aaron Y Zelin |
|
jihadi-resources |
This is the 5th edition of al-Haqiqa translated and published on jihadology.net published in October 2018. Al-Haqiqa is a compilation of various authors all originating from the Sham. The magazine is in support of al-qaeda in Syria and most of the authors are members of Hayat Tahrir al-Sham or Jabhat al Nusra. Students and researchers must register an account with jihadology.net using their academic emails to access the pdf.
|
al-Haqiqah #1 |
|
|
jihadi-resources |
This is the 1st edition of al-Haqiqah translated and published on jihadology.net in March of 2017. Al-Haqiqah is a compilation of various authors all originating from the Sham. The magazine is in support of al-qaeda in Syria and most of the authors are members of Hayat Tahrir al-Sham or Jabhat al Nusra. Students or researchers must make an account on the jihadology.net website with your academic email to access the pdf.
|
al-Haqiqah #2 |
|
|
jihadi-resources |
This is the 2nd edition of al-Haqiqah translated and published on jihadology.net in June of 2017. Al-Haqiqah is a compilation of various authors all originating from the Sham. The magazine is in support of al-qaeda in Syria and most of the authors are members of Hayat Tahrir al-Sham or Jabhat al Nusra. Students and researchers must register an account with the site in order to access this content.
|
al-Haqiqah #3 |
|
|
jihadi-resources |
This is the 3rd edition of al-Haqiqah translated and published on jihadology.net in February 2018. Al-Haqiqah is a compilation of various authors all originating from the Sham. The magazine is in support of al-qaeda in Syria and most of the authors are members of Hayat Tahrir al-Sham or Jabhat al Nusra. Students and researchers must register an account with the site in order to access this content.
|
al-Haqiqah #4 |
|
|
jihadi-resources |
This is the 4th edition of al-Haqiqah translated and published on jihadology.net published in June 2018. Al-Haqiqah is a compilation of various authors all originating from the Sham. The magazine is in support of al-qaeda in Syria and most of the authors are members of Hayat Tahrir al-Sham or Jabhat al Nusra. Students and researchers must register an account with jihadology.net using their academic emails to access the pdf.
|
Al-Islam |
|
|
middle-eastern-politics-resources |
Al-Islam is source that provides information about Islam.
|
Al-Jazeera |
|
|
middle-eastern-politics-resources |
Commentary from a group of experts. Last post was 3/11/2011.
|
Al-Qai'da From Within (Part 3) |
Khalid al-Hamad |
|
jihadi-resources |
Abu-Jandal (Nasir al-Bahri), Bin Laden's personal guard interviewed on Al-Qai'da. Includes Parts 7 through Part 10.
|
Al-Zarqawi...The Second Generation of Al-Qai'da (Parts 1-3) |
Fu'ad Husayn |
|
jihadi-resources |
Includes testimonies by people who knew and accompanied Al-Zarqawi at various stages of his life.
|
Al-Zarqawi...The Second Generation of Al-Qai'da (Parts 10-15) |
Fu'ad Husayn |
|
jihadi-resources |
Includes testimonies by people who knew and accompanied Al-Zarqawi at various stages of his life.
|
Al-Zarqawi...The Second Generation of Al-Qai'da (Parts 4-7, 9) |
Fu'ad Husayn |
|
jihadi-resources |
Includes testimonies by people who knew and accompanied Al-Zarqawi at various stages of his life.
|
Almost Nuclear: Introducing the Nuclear Latency dataset |
Matthew Fuhrmann and Benjamin Tkach |
|
security-resources |
The capacity to build nuclear weapons—known as "nuclear latency"—is widely believed to be important in world politics. Yet scholarly research on this topic remains limited. This paper introduces a new dataset on nuclear latency from 1939 to 2012. It discusses coding procedures, describes global trends, and compares the dataset with earlier efforts to measure nuclear latency. We show that nuclear latency is far more common than nuclear proliferation: 31 countries developed the capacity to build nuclear bombs from 1939 to 2012, and only 10 of those states went on to acquire atomic arsenals. This paper provides one empirical application of the dataset, showing how the study of nuclear latency can contribute to our understanding of international conflict. We provide preliminary evidence that nuclear latency reduces the likelihood of being targeted in militarized disputes. Having the capacity to build nuclear weapons, therefore, may provide deterrence benefits that we usually associate with possessing a nuclear arsenal.
|
American Economic Power Hasn't Declined—It Globalized! Summoning the Data and Taking Globalization Seriously |
Sean Starrs |
|
american-foreign-policy |
This paper argues that a fundamental failing in the debate on the decline of American economic power is not taking globalization seriously. With the rise of transnational corporations (TNCs), transnational modular production networks, and the globalization of corporate ownership, we can no longer give the same relevance to national accounts such as balance of trade and GDP in the twenty-first century as we did in the mid-twentieth. Rather, we must summon data on the TNCs themselves to encompass their transnational operations. This will reveal, for example, that despite the declining global share of United States GDP from 40% in 1960 to below a quarter from 2008 onward, American corporations continue to dominate sector after sector. In fact, in certain advanced sectors such as aerospace and software—even in financial services—American dominance has increased since 2008. There are no serious contenders, including China. By looking at the wrong data, many have failed to see that American economic power has not declined—it has globalized.
|
American Economic Power Hasn't Declined—It Globalized! Summoning the Data and Taking Globalization Seriously |
Sean Starrs |
|
political-economy-resources |
This paper argues that a fundamental failing in the debate on the decline of American economic power is not taking globalization seriously. With the rise of transnational corporations (TNCs), transnational modular production networks, and the globalization of corporate ownership, we can no longer give the same relevance to national accounts such as balance of trade and GDP in the twenty-first century as we did in the mid-twentieth. Rather, we must summon data on the TNCs themselves to encompass their transnational operations. This will reveal, for example, that despite the declining global share of United States GDP from 40% in 1960 to below a quarter from 2008 onward, American corporations continue to dominate sector after sector. In fact, in certain advanced sectors such as aerospace and software—even in financial services—American dominance has increased since 2008. There are no serious contenders, including China. By looking at the wrong data, many have failed to see that American economic power has not declined—it has globalized.
|
American Politics: Foreign Affairs and Defense |
|
|
american-foreign-policy |
Provides illustrated concepts, facts, figures, cartoons, image features and video features.
|
American Security Project |
|
United States |
think-tanks |
U.S. think tank focused on national security policy.
|
American Terrorism Study, 1980-2002 |
|
|
terrorism-and-armed-nonstate-actors |
Data collections relate specifically to acts of American terrorism from ICPSR. Note: Access for Haverford users but requires setting up an individual account.
|
American Terrorism Study, 1980-2002 |
|
|
american-foreign-policy |
Data collections relate specifically to acts of American terrorism from ICPSR. Note: Access for Haverford users but requires setting up an individual account.
|
Amnesty International Annual Report 2012 |
|
|
human-rights-resources |
Reports on the status of human rights throughout the world. Report available on the Middle East and North Africa, including Algeria, Bahrain, Egypt, Iran, Iraq, Israel and the Occupied Palestinian Territories, Jordan, Kuwait, Lebanon, Libya, Morocco, etc
|
Amnesty International Annual Reports |
|
|
human-rights-resources |
Human rights reports available in numerous languages. Simply use search bar to find the report you are looking for.
|
Angus Reid Institute Public Interest Research: Terrorism |
|
|
terrorism-and-armed-nonstate-actors |
Concise articles describing the latest polling results and news related to terrorism from throughout the world. Use the site's "Global Opinion Monitor" for alternative polled topics.
|
Angus Reid Institute Public Interest Research: Terrorism |
|
|
polls |
Concise articles describing the latest polling results and news related to terrorism from throughout the world. Use the site's "Global Opinion Monitor" for alternative polled topics.
|
Anwar Sadat Chair: Public Opinion Polls and Reports |
|
|
polls |
Public opinion polls and reports surveying American, Israeli, Arab, and others' attitudes on current events in the Middle East from 2010 to now.
|
Arab Barometer Country Reports |
|
|
middle-eastern-politics-resources |
|
Arab Center Washington DC |
|
|
middle-eastern-politics-resources |
Arab Center Washington DC (ACW) highlights US policies and interests in the Middle East. Its publications analyze the Arab world and address fundamental aspects of US-Arab relations through timely and objective academic research, policy analysis, and educational exchange. The Public Opinion section, in particular, measures outlook of the Arab public on matters such as democracy, world elections, and more.
|
Arab Spring Interactive Timeline |
|
|
middle-eastern-politics-resources |
The Guardian's interactive timeline of the Arab Spring that controls for country of event, type of event, and date. Ranges from December 2010- December 2011.
|
Arab World News Sources |
University of Michigan |
|
middle-eastern-politics-resources |
|
Archigos: A Database of Political Leaders |
Kristian Skrede Gledtisch |
|
governance-resources |
The Archigos data provide a list of leaders for all independent states in the world.
|
Are Coethnics More Effective Counterinsurgents? Evidence from the Second Chechen War |
Jason Lyall |
|
intrastate-conflict |
Abstract: "Does ethnicity matter for explaining violence during civil wars? I exploit variation in the identity of soldiers who conducted so-called “sweep” operations (zachistki) in Chechnya (2000–5) as
an empirical strategy for testing the link between ethnicity and violence. Evidence suggests that
the intensity and timing of insurgent attacks are conditional on who “swept” a particular village. For
example, attacks decreased by about 40% after pro-Russian Chechen sweeps relative to similar Russian only operations. These changes are difficult to reconcile with notions of Chechen solidarity or different tactical choices. Instead, evidence, albeit tentative, points toward the existence of a wartime “coethnicity
advantage.” Chechen soldiers, enmeshed in dense intraethnic networks, are better positioned to identify
insurgents within the population and to issue credible threats against civilians for noncooperation. A
second mechanism—–prior experience as an insurgent—–may also be at work. These findings suggest new avenues of research investigating the conditional effects of violence in civil wars.
|
Armed Conflict Location and Event Data (ACLED) |
ACLED |
United States |
intrastate-conflict |
ACLED (Armed Conflict Location and Events Dataset) is designed for disaggregated conflict analysis and crisis mapping. This dataset codes the location of all reported conflict events in 50 countries in the developing world.
|
Asharq al-Awsat Newspaper |
|
|
jihadi-resources |
A critical view of the War on Terror by a former counter-terrorism analyst, Leah Farrall.
|
Asia Maritime Transparency Initiative (AMTI) |
|
United States |
security-resources |
Research institute studying maritime issues in Asia, primarily through satellite imagery. Part of Center for Strategic and International Studies (CSIS).
|
ASN Aviation Safety Database |
|
|
security-resources |
The ASN Safety Database, updated every week, contains descriptions of over 12,200 airliner, military transport category aircraft and corporate jet aircraft safety occurrences since 1943.
|
Association for Diplomatic Studies and Training Oral History Collection |
|
United States |
american-foreign-policy |
Collection of interviews conducted with former United States diplomats, organized by topic and country.
|
Association of Religious Data Archives (ARDA): Cross-National Data 2005 |
|
|
social-factors |
Data sources: 2003 US State Dept.’s International Religious Freedom Reports and other cross-national measures of interest to researchers on religion, economics, and politics, including adherent information from the World Christian Database, scales from Fr
|
Association of Religious Data Archives (ARDA): International Religious Freedom Data |
|
|
social-factors |
Indices: Government Regulation of Religion index (GRI), Social Regulation of Religion index (SRI), Government Favoritism of Religion index (GFI). Data collected 2006.
|
Atlantic Council |
|
United States |
think-tanks |
U.S. think tank focused on national security policy related to Europe.
|
Bangladesh Centre for Terrorism Research (BCTR) |
|
Bangladesh |
terrorism-and-armed-nonstate-actors |
Bangladesh Institute of Peace and Security Studies (BIPSS) is a non-party, non-profit organization and independent think tank devoted to the study of peace and security issues related to South and Southeast Asia and beyond. The leading strategic thinkers, academicians, formers members of Civil Services, Foreign Services, Armed Forces and media persons are associated with the Institute in its endeavour to devise a comprehensive framework for peace and security studies.
|
Basel AML Index |
|
Switzerland |
governance-resources |
The Basel AML Index is an independent country ranking and risk assessment tool for money laundering and terrorist financing (ML/TF). Produced by the Basel Institute on Governance since 2012, it provides holistic money laundering and terrorist financing (ML/TF) risk scores based on data from 17 publicly available sources such as the Financial Action Task Force (FATF), Transparency International, the World Bank and the World Economic Forum.
|
BBC Country Profiles |
|
|
international-relations-resources |
|
Bellingcat |
|
Netherlands |
security-resources |
Leading Open-Source Intelligence research organization, known for work on MH17 shootdown, Navalny poisoning, and Syria chemical attacks.
|
Bercovitch Data Centre for Conflict, Mediation, & Peace Building |
University of Canterbury |
New Zealand |
interstate-conflict |
The ICM dataset includes quantitative data on international conflicts and conflict management from 1945 through to 2003. This database is best used in conjunction with Jacob Bercovitch and Judith Fretter, Regional Guide to International Conflict and Management from 1945 to 2003 (Washington, DC: Congressional Quarterly, 2004).
|
Berkeley Center for Right-Wing Studies |
Institute for the Study of Societal Issues, University of California, Berkeley |
United States |
terrorism-and-armed-nonstate-actors |
The mission of the Institute for the Study of Societal Issues (ISSI) is to:
Foster innovative, community-engaged qualitative and quantitative interdisciplinary research on the issues central to social stratification and inequality. Our primary focus is on institutional patterns that impact marginalized communities - in the United States and around the world – as well as social and political movements that disrupt such patterns.
ISSI realizes this mission by supporting research centers within its institutional structure, encouraging projects and initiatives and securing extramural funding to support these initiatives; supporting a wide range of faculty research; building interdisciplinary networks between faculty and graduate student researchers; providing research training to faculty, students, and professionals in qualitative methodology; providing training, mentoring and professional development to graduate students; disseminating research publications; facilitating graduate student and faculty working groups; and convening colloquia and conferences.
|
Bin Ladin's Bookshelf |
Office of the Director of National Intelligence (ODNI) |
|
jihadi-resources |
In May 2015, March 2016, and January 2017 the ODNI released the second, third, and fourth sets of numerous documents recovered during the raid of the compound hiding bin Ladin.
|
Boko Haram Recent Attacks |
|
|
jihadi-resources |
Background information on Boko Haram as of 2014.
|
BP Statistical Review of World Energy |
BP |
|
climate-resources |
A review of the use carbon emissions, oil, natural gas, coal, renewable energies, etc. per year.
|
Brookings Institution |
|
United States |
think-tanks |
U.S. nonprofit public policy organization. Based in Washington, DC.
|
Bruegel |
|
Belgium |
think-tanks |
Belgian think tank focused on international macroeconomic policy.
|
Building a Global Terrorism Database |
|
|
terrorism-and-armed-nonstate-actors |
This book provides datasets on terrorist attacks in its appendices.
|
Bullets for Ballots: Electoral Participation Provisions and Enduring Peace after Civil Conflic |
Aila Matanock |
|
democracy-resources |
Fighting soon recurs following some peace agreements, but not others. Which settlements are associated with more enduring peace? Almost half of all peace agreements include “electoral participation provisions” that enable former rebel groups to participate alongside the government as political parties in post-conflict elections. These provisions establish coordinating cycles to coincide with electoral processes that pave the way for external engagement, especially as democracy-promotion programs spread, potentially incentivizing compliance by both sides with the deal and increasing stability. Specifically, intergovernmental organizations and foreign donors became able, and available, to easily intervene to detect and sanction ex-combatants’ noncompliance with such settlements. New cross-national data on peace agreements suggest that that conflict after peace settlements recurs less often when electoral participation provisions are included than when they are not. It also suggests that the pacifying relationship holds when combatants’ expect international engagement. In contrast to prominent prior literature, which suggests that post-conflict elections complicate and even destabilize deals, these findings imply that provisions for particular types of electoral contests may help stabilize settlements and produce more enduring peace
|
Bureau of Arms Control, Verification and Compliance (AVC) List of Treaties and Agreements |
|
|
international-relations-resources |
The Bureau of Arms Control, Verification and Compliance (AVC) is a bureau within the U.S. State Department. The AVC focuses on arms control, verification and compliance with international arms control, nonproliferation, and disarmament agreements or commi
|
Bureau of International Security and Nonproliferation (ISN) List of Treaties and Agreements |
|
|
international-relations-resources |
The Bureau of International Security and Nonproliferation provides a full-text list of agreements related to their mission. The ISN is a bureau within the U.S. State Department. 2009-17
|
Bureau of International Security and Nonproliferation (ISN) List of Treaties and Agreements |
|
|
security-resources |
The Bureau of International Security and Nonproliferation provides a full-text list of agreements related to their mission. The ISN is a bureau within the U.S. State Department. 2009-17
|
Carnegie Endowment for International Peace |
|
United States |
think-tanks |
U.S. think tank focused on international relations, democratic governance, and technology.
|
Catastrophic Terrorism: Elements of a National Policy |
Ashton B. Carter, John M. Deutch and Philip D. Zelikow |
|
terrorism-and-armed-nonstate-actors |
This report is a product of the Catastrophic Terrorism Study Group, a nine-month long collaboration of faculty from Harvard University, the Massachusetts Institute of Technology.
|
Center for International Maritime Security (CIMSEC) |
|
United States |
security-resources |
A non-profit organization focusing on maritime security and strategy.
|
Center for Naval Analyses |
|
United States |
security-resources |
U.S. Federally Funded Research and Development Center (FFRDC) focusing on naval affairs/
|
Center for Risk and Economic Analysis of Terrorism Events (CREATE) |
University of Southern California |
|
political-economy-resources |
Established in 2004, CREATE is an interdisciplinary national research center based at the University of Southern California, funded by the U.S. Department of Homeland Security.
|
Center for Security Studies (CSS): Resources |
|
|
security-resources |
Previously called the International Relations and Security Network (ISN). A comprehensive database of global research organizations in international relations and security policy with descriptions and links.
|
Center for Strategic and Budgetary Assessments (CSBA) |
|
United States |
think-tanks |
he Center for Strategic and Budgetary Assessments (CSBA) is the world’s premier center for understanding future international competition and conflict.
Our mission is to develop innovative, resource-informed defense concepts, promote public debate, and spur action to advance U.S. and allied interests.
Our vision is to set the terms of debate for the future of national defense and drive change in concept development, force structure, and resources to prepare the US and its allies to compete and win in an era characterized by great power competition and conflict.
CSBA is proud to share its values ensures the team achieves its mission and lives its vision: Independence. Objectivity. Integrity. Innovation. Expertise. Quality.
|
Center for Strategic and International Studies (CSIS) |
|
United States |
think-tanks |
A research organization analyzing political strategies regarding cybersecurity, defense, economics, human rights, energy & sustainability, global health, and international development.
|
Center for Terrorism and Security Studies at UMass Lowell |
|
|
security-resources |
A Google Custom Search Engine for students and researchers of terrorism studies.
|
Center on Terrorism and Counterterrorism at the Foreign Policy Research Institute |
|
|
terrorism-and-armed-nonstate-actors |
The focus of the Center’s research is on terrorists, their strategies and tactics, and their objectives, resources, and capabilities for creating MUD (multilateral unconstrained disruption).
|
Center on Terrorism and Irregular Warfare |
|
|
terrorism-and-armed-nonstate-actors |
In studying terrorism and irregular warfare, the Center focuses the research capabilities of its staff and the Naval Postgraduate School on an area of critical importance to the national security of the United States.
|
Centre for Analysis of the Radical Right (CARR) |
CARR |
United Kingdom |
terrorism-and-armed-nonstate-actors |
The Centre for Analysis of the Radical Right (CARR) is a UK-based research centre and pedagogical outreach initiative focused on the study and countering of radical right extremism and intersecting phenomena (e.g. populism, gender, antisemitism, and Islamophobia) that aims to support a variety of mainstream groups, from government agencies to grass-roots charities, through podcasts, commentary, research reports, presentations, media interviews and commissioned work.
CARR provides scholarly, research and policy advice on local, national and transnational issues relating to right-wing extremism. CARR is the first port of call for scholarly reports, presentations and peer-reviewed research. Our work is especially relevant to formally constituted groups and bodies at the coalface of addressing right-wing extremism, including media and government stakeholders, educators, the security services and the general public.
|
Centre for European Reform (CER) |
|
United Kingdom |
think-tanks |
British think tank focused on integration and foreign policy related to the European Union.
|
Centre for the Study of Violence and Reconciliation |
|
South Africa |
intrastate-conflict |
The Centre for the Study of Violence and Reconciliation (CSVR) is an independent, non-governmental, organisation established in South Africa in 1989. We are a multi-disciplinary institute that seeks to understand and prevent violence, heal its effects and build sustainable peace at community, national and regional levels. We do this through collaborating with, and learning from, the lived and diverse experiences of communities affected by violence and conflict. Through our research, intervention and advocacy we seek to enhance state accountability, promote gender equality, and build social cohesion, integration and active citizenship. While primarily based in South Africa, we work across the African continent through collaborations with community, civil society, state and international partners.
|
Charity and Security Network Resource Library |
|
|
security-resources |
The Charity and Security Network was "launched in November 2008 by charities, grantmakers, faith-based and advocacy groups to eliminate unnecessary and counterproductive barriers to legitimate charitable work found in current counterterrorism measures."
|
Charting the data for US airstrikes in Yemen, 2002 – 2016 |
|
Yemen, Republic of |
jihadi-resources |
The Long War Journal's data by Bill Roggio and Bob Barry provides 3 charts with data from 2002 and 2009-2016: 1) the number of US airstrikes inside Yemen 2) civilian casualties vs. al-Qaeda in the Arabian Peninsula casualties; 3) the distribution of strikes over time by provinces.
|
Chatham House |
|
United Kingdom |
think-tanks |
British think tank focused on international relations and human rights.
|
Chicago Project on Security and Terrorism |
|
|
security-resources |
The Chicago Project on Security and Terrorism, directed by Robert A. Pape of the University of Chicago, supports broad-based, original research on terrorism and international security.
|
China Aerospace Studies Institute |
|
United States |
security-resources |
A research institute focusing on Chinese military air and spacepower. Studies "everything that flies" in China. Associated with Air University.
|
China Maritime Studies Institute |
|
United States |
security-resources |
Research center focusing on Chinese seapower. Part of U.S. Naval War College.
|
CIA FOIA Reading Room |
|
United States |
american-foreign-policy |
Electronic reading room of CIA documents obtained through the Freedom of Information Act.
|
CIA World Factbook |
|
|
international-relations-resources |
Provides up-to-date U.S. government profiles of virtually all countries and territories.
|
CIRI Human Rights Data Project |
|
|
human-rights-resources |
The CIRI dataset "contains standards-based quantitative information on government respect for 15 internationally recognized human rights for 195 countries, annually from 1981-2009."
|
Citizens' Nuclear Information Center |
|
Japan |
security-resources |
Information and data on Japan's nuclear program.
|
Climate Change and Insecurity: Mapping Vulnerability in Africa |
Joshua W. Busby, Todd G. Smith, Kaiba L. White and Shawn M. Strange |
|
climate-resources |
Given its dependence on rainfed agriculture and its low adaptive capacity, Africa is thought to be among the most vulnerable continents to climate change. That vulnerability, however, is not uniformly distributed. Indicators of vulnerability within Africa include the historic incidence of climate-related hazards, population density, household and community resilience, and governance and political violence. Among the places in Africa most vulnerable to the security consequences of climate change are parts of the Democratic Republic of the Congo, Guinea, Sierra Leone, Somalia, and South Sudan.
|
Climate Wars? Assessing the Claim that Drought Breeds Conflict |
Theisen, Ole Magnus; Helge Holtermann & Halvard Buhaug |
|
climate-resources |
Dominant climate models suggest that large parts of Africa will experience greater climatic variability and increasing rates of drought in coming decades. This could have severe societal consequences, because the economies and food supplies of most African countries depend on rain-fed agriculture. According to leading environmental security scholars, policymakers, and nongovernmental organizations, an increase in scarcity-driven armed conflicts should also be expected. A conditional theory of environmental conflict predicts that drought increases the risk of civil war primarily when it strikes vulnerable and politically marginalized populations in agrarian societies. However, an empirical evaluation of this general proposition through a unique gridded dataset of postcolonial Africa, which combines high-resolution meteorological data with georeferenced data on civil war onset and the local ethnopolitical context, shows little evidence of a drought-conflict connection. Instead, the local risk of civil war can be explained by sociopolitical and geographic factors: a politically marginalized population, high infant mortality, proximity to international borders, and high local population density.
|
CNS Global Incidents and Trafficking Database Archived Reports and Graphics |
Nuclear Threat Initiative (NTI), The James Martin Center for Nonproliferation Studies (CNS) |
United States |
security-resources |
The CNS Global Incidents and Trafficking Database is the only publicly available database of its kind and is produced by CNS for the Nuclear Threat Initiative. Previous annual reports include key findings and policy recommendations, while this year’s database features an interactive visual tour of the data.
|
Columbia University World Trade Center Archive Project |
|
|
jihadi-resources |
The resources represent a growing collection of responses to the World Trade Center attack, including archived webcasts of talks featuring Columbia's foremost experts. In addition, special collections of resources on terrorism and the September 11.
|
Combating Jihadism: American Hegemony and Interstate Cooperation in the War on Terrorism |
Barak Mendelsohn |
|
jihadi-resources |
Mendelsohn argues that state cooperation generated by a hegemonic state is necessary in order to fight jihad effectively. He grounds his argument in shared norms and rules.
|
Combating Terrorism Center at West Point |
|
|
terrorism-and-armed-nonstate-actors |
The CTC is an independent, privately funded, research and educational institution situated at West Point that informs and shapes counterterrorism policy and strategy.
|
Committee Parallelism and Bicameral Agenda Coordination |
Roger Larocca |
|
american-politics-resources |
We examine why a significant proportion of the policy issues passed in either the U.S. House or Senate often fail to pass in the other chamber. We hypothesize that much of this failure of the House and Senate to coordinate their agendas occurs because committee jurisdictions are not parallel across
chambers. To compare House and Senate agendas, we develop a comprehensive issue-level data set covering all bills introduced in the 103rd Congress. We estimate a multinomial logic model that reveals that the degree of jurisdictional parallelism across chambers is indeed one of the most important determinants of whether issues that pass in one chamber also pass in the other chamber.
|
Committee to Protect Journalists (CPJ) |
|
United States |
security-resources |
Database exploring all attacks on members of independent journalism organizations since 1992.
|
Comparing Negative and Positive Campaign Messages Evidence From Two Field Experiments |
Kevin Arceneaux and David W. Nickerson |
|
american-politics-resources |
"Considerable research indicates that personal contact from political campaigns can mobilize people to vote, but little attention has been given to whether the tone of the message matters. Studies of message tone have mostly been confined to mass media campaigns and ignored the growing role grassroots techniques play in contemporary political campaigns. Two randomized field experiments were conducted to determine the importance of message tone in grassroots contact. We find evidence that personally delivered messages can be effective at influencing voting preferences, but neither experiment uncovered a systematic difference between the effects of negative and positive messages on voter turnout or political attitudes."
|
Competing Visions for Syria and Iraq: The Myth of an anti-ISIS Grand Coalition |
|
|
jihadi-resources |
Part 2 of 3 installments of ISW and CTP's report for the U.S. grand strategy in destroying ISIS and al-Qaeda
|
Compilation of Osama Bin Laden Statements |
Osama Bin Laden |
|
jihadi-resources |
A compilation of Osama Bin Laden statments from 1994 to January 2004 published by FBIS.
|
Concepts of Hizb ut-Tahrir |
Hizb ut-Tahrir |
|
middle-eastern-politics-resources |
Translated from the Arabic edition "Mafahim Hizb ut-Tahrir" from the Sunni political party.
|
Conflict Site Dataset |
|
|
interstate-conflict |
The Conflict Site Dataset is an extention to the UCDP/PRIO Armed Conflicts Dataset that provides coordinates for the conflict zones and lists of countries in which the conflicts were located.
|
Congressional Research Service Reports (CRS) and Issue Briefs |
|
|
american-politics-resources |
Read the U.S. Department of State's CRS and issue briefs organized by date, region, and topic, including topics of terrorism and counterterrorism.
|
Correlates of War Project: Colonial/Dependency Contiguity |
|
|
international-relations-resources |
Version 3.1 of the Correlates of War Colonial/Dependency Contiguity data identifies all contiguity relationships between states in the international system from 1816 through 2016 through their colonies or dependencies. That is, if two dependencies of two states are contiguous, or if one state is contiguous to a dependency of another, the data set reports a contiguity relationship between the two main states (with appropriate codes identifying the relevant dependent entity/entities).
|
Correlates of War Project: Defense Cooperation Agreement Dataset |
Brandon Kinne |
|
security-resources |
The Defense Cooperation Agreement Dataset (DCAD) is a comprehensive, human-coded dataset on bilateral defense cooperation agreements (DCAs), covering all independent countries in the international system from 1980 through 2010.
|
Correlates of War Project: Direct Contiguity |
Paul Hensel |
|
international-relations-resources |
The Direct Contiguity data set registers the land and sea borders of all states since the Congress of Vienna, and covers 1816-2016. Version 3.2 of the COW Direct Contiguity data identifies all direct contiguity relationships between states in the international system from 1816 through 2016. The classification system for contiguous dyads is comprised of five categories, one for land contiguity and four for water contiguity.
|
Correlates of War Project: Formal Alliances |
Douglas Gibler |
|
international-relations-resources |
This data set records all formal alliances among states between 1816 and 2012, including mutual defense pacts, non-aggression treaties, and ententes. The Correlates of War Formal Alliance data set seeks to identify each formal alliance between at least two states that fall into the classes of defense pact, neutrality or non-aggression treaty, or entente agreement.
|
Correlates of War Project: Intergovernmental Organizations |
Timothy Nordstrom, Jon Pevehouse, Megan Shannon |
|
international-relations-resources |
The IGO data sets contain information about intergovernmental organizations (international organizations that have at least 3 nation-states as their members) from 1815-2014. The IGO data are collected at 5-year intervals from 1815-1965, and annually thereafter.
|
Correlates of War Project: Militarized Interstate Disputes |
Glenn Palmer, Vito D'Orazio, Michael R. Kenwick, and Roseanne W. McManu |
|
interstate-conflict |
Version 4 of the Militarized Interstate Dispute (MID) data collection compiled by the Correlates of War Project provides information about conflicts in which one or more states threaten, display, or use force against one or more other states between 1816 and 2010. By definition, “Militarized interstate disputes are united historical cases of conflict in which the threat, display or use of military force short of war by one member state is explicitly directed towards the government, official representatives, official forces, property, or territory of another state. Disputes are composed of incidents that range in intensity from threats to use force to actual combat short of war” (Jones et al. 1996: 163).
|
Correlates of War Project: National Material Capabilities |
J. Michael Greig, Andrew Enterline |
|
security-resources |
The National Material Capabilities data set contains annual values for total population, urban population, iron and steel production, energy consumption, military personnel, and military expenditure of all state members, currently from 1816-2012. The widely-used Composite Index of National Capability (CINC) index is based on these six variables and included in the data set.
|
Correlates of War Project: State System Membership Data |
Volker Krause, Phil Schafer, Karen Ruth Adams |
|
international-relations-resources |
This data set contains the list of states in the international system as updated and distributed by the Correlates of War Project. These data sets identify states, their standard Correlates of War "country code" or state number (used throughout the Correlates of War project data sets), state abbreviations, and dates of membership as states and major powers in the international system. Version 2016 extends the temporal domain of the collection through December 2016. The Correlates of War project includes a state in the international system from 1816-2016 for the following criteria. Prior to 1920, the entity must have had a population greater than 500,000 and have had diplomatic missions at or above the rank of charge d’affaires with Britain and France. After 1920, the entity must be a member of the League of Nations or the United Nations, or have a population greater than 500,000 and receive diplomatic missions from two major powers.
|
Correlates of War Project: Territorial Change |
Steven V. Miller |
|
international-relations-resources |
This data set records all peaceful and violent changes of territory from 1816-2018. The territorial change dataset is the result of the effort to identify and code all territorial changes involving at least one nation-state (as defined by the Correlates of War project) for the period 1816-2018. The data are restricted to territorial changes that involve at least one recognized (by COW) nation-state. Both the nation states and the non-nation states involved in territorial changes are regarded as political entities. This dataset contains information on the entities involved, the gaining side, the losing side, the territory exchanged, as well as the type and date of the exchange.
|
Correlates of War Project: Trade |
Katherine Barbieri and Omar Keshk |
|
political-economy-resources |
The trade dataset is the result of the effort to code trade flows between states (as defined by the Correlates of War project) for the period 1870-2014. The data include information on both bilateral trade flows and total national imports and exports. The dyadic trade dataset describes import and export data in current U.S. dollars for pairs of sovereign states.
|
Correlates of War Project: World Religion Data |
Zeev Maoz and Errol A. Henderson |
|
social-factors |
The World Religion Project (WRP) aims to provide detailed information about religious adherence worldwide from 1945 to 2010. It contains data about the number of adherents by religion in each of the states in the international system. These numbers are given for every half-decade period (1945, 1950,..., 2010). The data record percentages of the state's population that practice a given religion. Some of the religions (as detailed in the Codebook) are divided into religious families.
|
Corruption Perceptions Index |
|
|
governance-resources |
Transparency International's CPI ranks almost 200 countries by their perceived levels of corruption, as determined by expert assessments and opinion surveys.
|
Council on Foreign Relations (CFR) |
|
United States |
think-tanks |
U.S. think tank focused on American foreign policy. Based in Washington, D.C.
|
Council on Foreign Relations: Backgrounders |
|
|
international-relations-resources |
Background information on a variety of relevant topics and global issues.
|
Council on Foreign Relations: Nigeria Security Tracker |
|
Nigeria |
security-resources |
|
Council on Foreign Relations: The Sunni-Shia Divide |
|
|
middle-eastern-politics-resources |
This interactive, multi-media data set discusses the Sunni-Shia divide. It covers numerous aspects including,"origins of the schism, modern tensions," faith practices, "sectarian militants," and more.
|
Council on Foreign Relations’ Infoguide: The Taliban |
|
Afghanistan, Islamic Republic of |
jihadi-resources |
|
Council on Foreign Relations’ Infoguide: The Taliban |
|
Pakistan, Islamic Republic of |
jihadi-resources |
|
Counter Extremism Project News & Media |
|
|
terrorism-and-armed-nonstate-actors |
The Council on Foreign Relations (CFR) is an independent, nonpartisan membership organization, think tank, and publisher. Provides the latest updates and analyses of world events.
|
Countering Lone Actor Terrorism Database (CLAT) |
International Centre for Counter-Terrorism (ICCT) |
Netherlands |
terrorism-and-armed-nonstate-actors |
Through the construction and analysis of a database of 120 perpetrators from across Europe, the Countering Lone Actor Terrorism (CLAT) project seeks to improve understanding of lone actor terrorists, their behaviour, and their activities in the period leading up to their intended attack, therefore assisting European governments and frontline workers to counter the threat.
|
Counterterrorism |
|
|
terrorism-and-armed-nonstate-actors |
Search of counterterrorism at the Cato Institute
|
Country Reports: Extremism and Counter-Extremism |
|
|
terrorism-and-armed-nonstate-actors |
Counter Extremism Project’s Areas of Operation map includes comprehensive reports detailing the history of extremist movements, major terror attacks, and counter-extremism measures country by country.
|
Coups d'Etat, 1946-2018 |
Center for Systemic Peace (CSP), Integrated Network for Societal Conflict Research (INSCR) |
Austria |
international-relations-resources |
Center for Systemic Peace, Coups d'Etat, 1946-2021, event list includes successful, attempted, plotted, and alleged coup events reported in Keesings Record of World Events (Keesings Online) and other sources; successful coups are cross-referenced to the Polity IV data series to distinguish "adverse regime changes" from "autocratic coups"; also listed in the codebook are cases of leadership change that are not considered coups: assassinations, ousters by foreign forces, victory by rebel forces, forced resignations of executives, and presidential coups. (Excel coup list and Excel time-series; PDF codebook).
|
CPOST Dataset on Suicide Attacks |
Robert A Papem Alejandro Albanez Rivas, Alexandria Chinchilla |
United States |
terrorism-and-armed-nonstate-actors |
The University of Chicago Project on Security and Threats presents the updated and expanded Database on Suicide Attacks (DSAT), which now links to Uppsala Conflict Data Program data on armed conflicts and includes a new dataset measuring the alliance and rivalry relationships among militant groups with connections to suicide attack groups. We assess global trends in suicide attacks over four decades, and demonstrate the value of the expanded DSAT with special attention to the growing diffusion of suicide attacks in armed conflicts and the large role of networks established by Al-Qaeda and the Islamic State through 2019 in this diffusion. Overall, the expanded DSAT demonstrates the advantages of integration across datasets of political violence for expanding research on important outcomes, generating new knowledge about the spread of particularly deadly forms of political violence, and raising important new questions about the efficacy of current policies to curb their spread.
|
CRED International Emergency Disasters Database |
|
|
international-relations-resources |
The Centre for Research on the Epidemiology of Disaster (CRED) provides data on natural and technological disasters worldwide with fatalities and number affected. Requirement for inclusion: at least 10 fatalities, 100 affected persons, declaration of a st
|
Culture clash or democratic peace? Results of a survey experiment on the effect of religious culture and regime type on foreign policy opinion formation |
Bethany Lacina and Charlotte Lee |
|
polls |
Results of a survey experiment on the effect of religious culture and regime type on foreign policy opinion formation.
|
Cyber Operations Tracker |
Council on Foreign Relations (CFR) |
United States |
security-resources |
Hosted by the Council on Foreign Relations (CFR) Digital and Cyberspace Policy Program, the database provides a list of public state-sponsored incidents since 2005. Thirty-four countries are suspected of sponsoring cyber operations. China, Russia, Iran, and North Korea sponsored 77 percent of all suspected operations. In 2019, there were a total of seventy-six operations, most being acts of espionage. The page provides search functions for incidents by year, state sponsor, victim, victim category, and victim government response.
|
Cybersecurity and Technology at the Center for Strategic and International Studies (CSIS) |
|
|
security-resources |
CSIS analyzes "how technological change can transform the way countries interrelate."
|
Dabiq Magazine #1 |
ISIS |
|
jihadi-resources |
First issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #10 |
ISIS |
|
jihadi-resources |
Tenth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. July 2015. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #11 |
ISIS |
|
jihadi-resources |
Eleventh issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. September 2015. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #12 |
ISIS |
|
jihadi-resources |
Twelfth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. November 2015. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #13 |
ISIS |
|
jihadi-resources |
Thirteenth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. January 2016. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #14 |
ISIS |
|
jihadi-resources |
Fourteenth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. April 2016. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #15 |
ISIS |
|
jihadi-resources |
Fifteenth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. July 2016. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #2 |
ISIS |
|
jihadi-resources |
Second issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #3 |
ISIS |
|
jihadi-resources |
Third issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #4 |
ISIS |
|
jihadi-resources |
Fourth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #5 |
ISIS |
|
jihadi-resources |
Fifth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. Published in 2015. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #6 |
ISIS |
|
jihadi-resources |
Sixth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. Spring 2015. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #7 |
ISIS |
|
jihadi-resources |
Seventh issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. Summer 2015. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #8 |
ISIS |
|
jihadi-resources |
Eighth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. March 2015. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dabiq Magazine #9 |
ISIS |
|
jihadi-resources |
Ninth issue in English of al-Hayat Media Center's ISIS magazine, Dabiq. May 2015. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Dangerous Companions: Cooperation Between States and Nonstate Armed Groups (NAGs) |
Belgin San-Akca |
|
terrorism-and-armed-nonstate-actors |
The Dangerous Companions Project is an attempt to operationalize international support of Non-State Armed Groups (NAGs) that are engaged in violent conflict against one or more governments within or outside the state(s) they live. Provision of support to armed groups takes many forms, such as funds, safe havens, sanctuary, arms, logistics, and transportation of such resources as well as diplomatic support from states, diaspora groups, non-governmental organizations (NGO), inter-governmental organizations (IGO), non-state armed groups, and foreign political parties.
|
Data Appendix for Securing the Peace: The Durable Settlement of Civil Wars |
Monica Duffy Toft |
|
intrastate-conflict |
Data Appendix for Toft's book, Securing the Peace: The Durable Settlements of Civil Wars. Examining the outcomes of all civil war terminations since 1940, Monica Toft develops a general theory of postwar stability, showing how third-party guarantees may not be the best option. She demonstrates that thorough security-sector reform plays a critical role in establishing peace over the long term.
|
Database of Legislation on the Definition of Terrorism (CSIS) |
Center for Strategic and International Studies (CSIS) |
United States |
human-rights-resources |
This database includes counterterrorism legislation, anti-money laundering and combating financing of terrorism legislation, criminal codes, NGO laws, and any other relevant domestic legislation in place that has a bearing on the way that the country defines terrorism and punishes those responsible for terrorist acts. In particular, CSIS is interested in capturing how counterterrorism laws infringe on or protect fundamental human rights, including freedom of assembly, association, and/or expression. This information will be used to develop recommendations to safeguard the legitimate space for peaceful civil society actors, while addressing the real threat of terrorism.
|
Database on States' Statements Concerning Syria (DSSS) |
Harvard Law School Program on International Law and Armed Conflict (HLS PILAC) |
United States |
international-relations-resources |
The Harvard Law School Program on International Law and Armed Conflict (HLS PILAC) set out to collect states’ statements made from August 2011 through November 2016 concerning use of force in relation to Syria. A primary aim of the database is to provide a comparatively broad set of reliable resources regarding states’ perspectives, with a focus on legal parameters. A premise underlying the database is that through careful documentation of diverse approaches, we can better understand those perspectives.
|
Defence of Muslim Lands |
Abdullah Azzam |
|
jihadi-resources |
Discusses the legal ruings of jihad, different types of jihad and condition in which jihad becomes an obligation for Muslims.
|
Defenders Disrupting Adversaries: Framework, Dataset, and Case Studies of Disruptive Counter-Cyber Operations |
Jason Healey, Neil Jenkins, J.D. Work |
Estonia |
security-resources |
Over the past two decades, there have been numerous defensive operations to disrupt malicious cyber activity by hacktivists, criminals, and nation-state actors. Disruption operations seek to affect the adversary’s decision-making processes and impose additional costs. Such operations include a wide range of actions, from releasing indicators of compromise and naming-and-shaming, to botnet and infrastructure takedowns, to indictments and sanctions, and may be conducted outside of the defender’s own network with the intent to interrupt adversary cyber offense and espionage. The United States Department of Defense recently released a new strategy that calls for “persistent engagement” with malicious cyber actors, suggesting many more disruption operations to come.
In this paper, we describe a framework for categorizing disruption operations and their effects – along with detailed descriptions for several of these case studies coded to the framework – so that researchers and practitioners can measure their impact using a common terminology. We also provide a unique dataset of over 100 cases of defensive operational disruption over the last 30 years, from 1987 through 2019.
|
Defense and Security |
|
|
security-resources |
The Carnegie Endowment for International Peace "assess the global war on terror, focusing in particular on promising counter-radicalization programs that aim to rehabilitate former radicals and, ultimately, prevent radicalization."
|
Democracy Barometer |
|
|
democracy-resources |
The project has developed an instrument to assess the quality of democracy in 30 established democracies and to measure the fine differences that exist between them. It allows for benchmarking between established democracies and, as democracy is seen as
|
Democracy Index (The Economist) |
|
|
democracy-resources |
Economist Intelligence Unit's Democracy Index for 2008 only. Scores given for five categories of democratic performance: electoral process and pluralism, functioning of government, political participation, political culture, and civil liberties.
|
Department of Defense Budget Requests |
U.S. Department of Defense, Under Secretary of Defense (Comptroller) |
United States |
american-foreign-policy |
The President's Budget request for the Department of Defense sustains the President's commitment to invest in America's security and prepare for the threats and challenges of a new age by funding a high state of military readiness and ground force strength; strengthening combat capabilities of America's Armed Forces; developing the capabilities to deter and defeat future threats to the Nation's security; and improving the quality of life for service members and their families.
Contains budget requests for the Department of Defense from Fiscal Year 1998 to present.
|
Digital Impact and Governance Initiative by the New America Think Tank |
|
|
governance-resources |
"We work to renovate democratic institutions by developing world-class, open source digital infrastructure to power the public sector. Digital governance platforms have proven their ability to address a range of global challenges with astonishing results, often delivering unprecedented improvements in accountability, efficiency, transparency, and trust. DIGI is building on early adoption of digital governance platforms in countries including Estonia and India, and our team’s successful engagements in the Republic of Georgia and other jurisdictions. Our goal is to develop, deploy and scale open source platforms that address core government functions ranging from benefits and revenue management to citizen participation. These solutions function as “institutions-in-a-box.” They can be deployed individually or as a package. Together, they form the core of an integrated, customizable government operating system that will help power effective institutions worldwide."
|
Digital National Security Archive |
|
|
security-resources |
Contains declassified government documents covering U.S. policy toward critical world events – including their military, intelligence, diplomatic and human rights dimensions – from 1945 to the present
|
Disciplinary Letter (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi-resources |
As employees go, Moktar Belmoktar would surely be described as “difficult to manage.” He didn’t return phone calls. He failed to turn in expense reports. And time and again, he refused to follow instructions from his higher-ups. In this letter from the Shura Council of al-Qaida in the Islamic Maghreb, the terror group lays out years of complaints against Belmoktar, the terrorist who carried out a catastrophic attack on the Ain Amenas gas plant in Algeria in January, killing at least 39 foreigners. The 10-page letter dated Oct. 3, 2012 was never made public until now. It was found in its entirety in Timbuktu’s Tax Building, where al-Qaida in the Islamic Maghreb commander Abou Zeid was frequently spotted.
|
Drone Strikes Data: Charting the data for US airstrikes in Pakistan & Yemen, 2002-2016 |
|
|
american-foreign-policy |
The Long War Journal provides charts with data on casualties, targets, and locations of US airstrikes in Pakistan and Yemen. Regularly updated.
|
Drone Strikes Data: Charting the data for US airstrikes in Pakistan & Yemen, 2002-2016 |
|
|
interstate-conflict |
The Long War Journal provides charts with data on casualties, targets, and locations of US airstrikes in Pakistan and Yemen. Regularly updated.
|
Drone Warfare Dataset |
The Bureau of Investigative Journalism |
|
security-resources |
Tracking US drone strikes and other covert actions in Pakistan, Afghanistan, Yemen and Somalia. The Bureau of Investigative Journalism's comprehensive reporting on civilian deaths helped lead to greater official transparency on targeted killing, and we will continue to provide the data needed to hold the White House to account.
|
Dying to Win: The Strategic Logic of Suicide Terrorism |
Robert A. Pape |
|
terrorism-and-armed-nonstate-actors |
Pape provides a groundbreaking demographic profile of modern suicide terrorist attackers and examines the early practitioners of this guerrilla tactic. Link to TRIPOD, for Tri-Co students.
|
Ecological Threat Register |
Institute for Economics and Peace |
|
climate-resources |
This is the inaugural edition of the Ecological Threat Register (ETR), which covers 157 independent states and territories. The ETR is unique in that it combines measures of resilience with the most comprehensive ecological data available to shed light on the countries least likely to cope with extreme ecological shocks, now and into the future.
|
Education, Poverty, and Terrorism: Is There a Causal Connection? |
Alan B. Krueger and Jitka Maleckova |
|
terrorism-and-armed-nonstate-actors |
An article examining the connection beween education, poverty and terrorism.
|
Education, Poverty, and Terrorism: Is There a Causal Connection? |
Alan B. Krueger and Jitka Maleckova |
|
social-factors |
An article examining the connection beween education, poverty and terrorism.
|
Electoral Knowledge Network: Ace Project, Comparative Statistics |
|
|
democracy-resources |
Classifies countries based on their electoral methods, over 180 countries includes. Provides the latest information.
|
Emerging Actor Tracker |
ACLED |
United States |
intrastate-conflict |
The Emerging Actor Tracker monitors the presence of emerging violent non-state actors within countries over the past month, highlighting the name of each group. To be flagged by the tool, a country must have seen an above-average number of non-state actors engaged in violence over the past month as well as at least one emerging actor. An ‘emerging actor’ is a non-state actor that has engaged in violence in the most recent month, yet has not been active within the country over the past year, or ever before. This allows the tool to capture latent groups, as well as new groups. An actor is classified as having engaged in violence if it was involved in battle events, explosion/remote violence events, violence against civilians events, or riot events, as well as the excessive force against protesters sub-event type of the protest event type. Because the tool seeks to highlight emergent threats, civilians (including cases in which members of armed groups are targeted when unarmed/vulnerable) are not considered emerging actors.
|
Episodes of Regime Transformation (ERT) Dataset |
Amanda B. Edgell, Seraphine F. Maerz, Laura Maxwell, University of Gothenburg |
Sweden |
democracy-resources |
The ERT dataset identifies episodes of democratization (liberalizing autocracy, democratic deepening) and autocratization (democratic regression, autocratic regression) in the most recent V-Dem dataset.
|
Ethnic Armed Conflict Dataset |
|
|
intrastate-conflict |
This dataset "is based on the armed conflict dataset established by Uppsala/PRIO and additionally codes whether conflicts were ethnic and/or secessionist."
|
Ethnic Power Relations Dataset |
|
|
social-factors |
This dataset "identifies all politically relevant ethnic groups and their access to state power in every country of the world from 1946 to 2010."
|
Ethnofederalism: The Worst Form of Institutional Arrangement…? |
Liam Anderson |
|
political-economy-resources |
Within this universe of cases, moreover, ethnofederalism has demonstrably outperformed institutional alternatives, and where ethnofederal systems have failed, they have failed where no institutional alternatives could plausibly have succeeded. The increasing enthusiasm among policymakers and practitioners for prescribing federal solutions to ethnic problems is both understandable and defensible in light of these findings.
|
EU Disinfo Lab Publications |
EU DisinfoLab |
European Union |
security-resources |
EU DisinfoLab is an independent non-profit organization focused on tackling sophisticated disinformation campaigns targeting the EU, its member states, core institutions, and core values.
|
European Centre for International Political Economy (ECIPE) |
|
Belgium |
think-tanks |
Belgian think tank focused on international macroeconomic policy related to the European Union.
|
European Council on Foreign Relations (ECFR) |
|
United Kingdom, Germany, France, Italy, Bulgaria, Spain, Poland |
think-tanks |
Pan-European think tank focused on foreign policy.
|
European Policy Center (EPC) |
|
Belgium |
think-tanks |
Belgian think tank focused on foreign policy related to the European Union.
|
Evaluating the Quality of Changes in Voter Registration Databases |
Seo-young Silvia Kim, Spencer Schneider, R. Michael Alvare |
|
american-politics-resources |
The administration of elections depends crucially upon the quality and integrity of voter registration databases. In addition, political scientists are increasingly using these databases in their research. However, these databases are dynamic and may be subject to external manipulation and unintentional errors. In this article, using data from Orange County, California, we develop two methods for evaluating the quality of voter registration data as it changes over time: (a) generating audit data by repeated record linkage across periodic snapshots of a given database and monitoring it for sudden anomalous changes and (b) identifying duplicates via an efficient, automated duplicate detection, and tracking new duplicates and deduplication efforts over time. We show that the generated data can serve not only to evaluate voter file quality and election integrity but also as a novel source of data on election administration practices.
|
Explosive Violence Monitoring Project |
Action on Armed Violence (AOAV) |
United Kingdom |
security-resources |
The Explosive Violence Monitoring Project database provides researchers with data on explosive device incidents, including terrorism and other forms of conflict and low-intensity conflict. The project is hosted by Action on Armed Violence (AOAV), an independently funded research organisation. The database search criteria permit differentiation between deaths and injuries as well as civilian and armed actors. Perpetrators within the database include state and non-state actors. Explosive violence perpetrators within the database include for example, terrorist groups, militia, criminal gangs, internal security forces and specific countries.
|
ExTrac Sample Reports |
ExTrac.Io |
United Kingdom |
terrorism-and-armed-nonstate-actors |
"We offer bespoke situational reporting and briefings on VEOs’ kinetic and communications activities. This will be unique, data-led and tailored to the client’s geographical, organizational and thematic focus. Reports for clients are compiled by our team of research professionals. These experts specialize in terrorism, insurgency and extremist communications and draw on far-reaching experience supporting CT and CVE programs with cutting-edge analysis. A selection of reports produced by this team and harnessing the power of ExTrac can be viewed below."
|
Extremist Jihadi Groups Database |
|
|
jihadi-resources |
This site, published and maintained by the SITE Intelligence Group, is a database of the main Jihadi/extremist groups across the world. Each subsection of the website details, in chronological order, the relevant news, statements, and important information for each group.
|
Face to Face With Political Islam |
François Burgat |
|
middle-eastern-politics-resources |
Burgat argues that Islam's restoration of its pre-colonization culture is not inherently at odds with democracy, tolerance, or progress. Link to Tripod for Tri-Co students.
|
Fatwa of Somali Scholars (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi-resources |
When fighters from al-Qaida’s branch in East Africa, al-Shabab, attacked an upscale mall in Nairobi on Sept. 21, 2013, they used a set of questions to weed out Muslims from non-Muslims. Those who answered the questions correctly were allowed to live. The evolution of Shabab – from a terror group that previously killed Muslims indiscriminately to one that is trying to give the appearance of sparing Muslims – can be traced through three documents found in Timbuktu, all recovered inside the Ministry of Finance’s Audit Control Building.
|
FBI Record - the Vault |
|
United States |
terrorism-and-armed-nonstate-actors |
FBI FOIA library - 6,700+ declassified and digitized FBI documents.
|
Federation of American Scientists (FAS) |
|
United States |
think-tanks |
U.S. think tank focused on national security policy and nuclear proliferation.
|
Final Statement of the Conference of Islamic State Scholars (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi-resources |
When fighters from al-Qaida’s branch in East Africa, al-Shabab, attacked an upscale mall in Nairobi on Sept. 21, 2013, they used a set of questions to weed out Muslims from non-Muslims. Those who answered the questions correctly were allowed to live. The evolution of Shabab – from a terror group that previously killed Muslims indiscriminately to one that is trying to give the appearance of sparing Muslims – can be traced through three documents found in Timbuktu, all recovered inside the Ministry of Finance’s Audit Control Building.
|
Fiscal Federalism at Work? Central Responses to Internal Migration in India |
Rikhil R. Bhavnani and Bethany Lacina |
India |
political-economy-resources |
Replication data for a forthcoming article in World Development. Abstract: Internal migration is thought to have substantial benefits for migrants and for the development of migrant-sending and migrant-receiving areas. In order to facilitate such migration, central governments may need to use fiscal transfers to ensure services to migrants, address infrastructure shortfalls, and ameliorate labor market displacement of natives. In fact, an extensive, mostly normative ``fiscal federalism'' literature has argued that central governments ought to use transfers to reduce interjurisdictional externalities such as those due to population displacements. We extend this literature empirically by examining the degree to which exogenous, long-term migration prompts the redirection of central fiscal resources in India. (2016)
|
Food and Agriculture Organization of the United Nations Statistics |
|
|
human-development-resources |
Statistics available for food deprivation and child malnutrition, food consumption and diet diversification, economic growth, poverty and employment, education and gender equality, health and sanitation, agricultural development, water, natural resources
|
Foreign Fighter Observation Set |
Thomas Hegghamer |
|
jihadi-resources |
See Hegghamer's dataset from The Rise of Muslim Foreign Fighters Islam and the Globalization of Jihad, December 2010. https://muse-jhu-edu.ezproxy.haverford.edu/article/407198
|
Foreign Policy Magazine Terrorism Index |
|
|
american-foreign-policy |
A survey of 100 American foreign policy experts on questions of current U.S. policy. Note: Not updated since 2006. Subscription required.
|
Foreign Policy's AfPak Channel |
|
|
middle-eastern-politics-resources |
Gregory Johnsen (Near Eastern Studies Department, Princeton) writes this blog.
|
Fragile States Index |
|
|
international-relations-resources |
The Fund for Peace (FFP) assigns scores for 12 political, economic, and social indicators then combines them for overall determination of failing state status. Rankings and final scores provided. Country profiles are included. Once known as the Failed States Index, the FFP renamed the index in 2014 to "Fragile States Index" to better label the actual circumstances of the states listed.
|
Fraser Institute: Economic Freedom of the World |
|
|
political-economy-resources |
Measures government size and regulation, legal protection, currency, and freedom of international trade. Full datasets available. Regional reports available for the Arab world.
|
Freedom House: Freedom in the World |
|
|
human-rights-resources |
Rates countries Free, Partially Free, or Not Free, and provides sub-scores in political rights and civil liberties. Data from 1998 to now.
|
Freedom House: Freedom of the Press |
|
|
human-rights-resources |
The Freedom of the Press index an annual survey of media independence in 195 countries and territories. Experts determine ratings in conferring with professional contacts, press freedom organizations worldwide. Data from 2002 to now.
|
Freedom of Information Act Electronic Reading Room (CIA) |
|
|
american-politics-resources |
The CIA's FOIA ERR houses many declassified government documents.
|
From legal doctrine to social transformation? Comparing U.S. voting rights, equal employment opportunity, and fair housing legislation |
Nicholas Pedriana |
|
american-politics-resources |
This article is a historical-comparative study of three major civil rights statutes (voting rights, equal employment, and fair housing) and is motivated by one fundamental question: why are some civil rights laws more successful than others? Consensus exists among civil rights scholars that voting rights was far and away the most successful of the three; that fair housing was a general failure; and that equal employment opportunity was moderately successful. Our study seeks to explain this specific hierarchy of civil rights outcomes across these three cases. As is the case with all historical-comparative research, qualitative data and qualitative analysis are essential because each case is constructed and compared holistically with respect to historical events and outcomes, the actors involved and the choices they made (and why they made them), and the consequences of those actions for civil rights policy success.
|
Gallup: Muslim World |
|
|
polls |
Selected poll and search results regarding public attitudes in the Muslim world.
|
Gallup: Terrorism in the United States |
|
|
polls |
Selected poll results regarding American public’s attitude toward terrorism.
|
Gallup's Terrorism Polls |
Gallup Media |
|
polls |
In-depth polls on public opinion of terrorism.
|
Gallup's Terrorism Polls |
Gallup Media |
|
terrorism-and-armed-nonstate-actors |
In-depth polls on public opinion of terrorism.
|
GCC Security and Terrorism Issues Research Program |
|
|
jihadi-resources |
GCC Security and Terrorism is a research program of the Gulf Research Center. Data includes articles, books, book reviews, facts and figures, newsletters, periodicals, research papers, etc.
|
Gender and Participation in Community Based Development: Evidence from the Decentralized Climate Funds Program in Senegal |
Hannah Patnaik |
|
climate-resources |
The ‘Decentralizing Climate Funds’ (DCF) project, implemented in Kaffrine, Senegal and Mopti, Mali, is a project that aims to support locally led climate change adaptation. The underlying belief of the projects approach is that involving communities in project selection and implementation creates a greater impact and will enhance individual, household, and community resilience to climate change, relative to a top-down decision-making approach. DCF’s approach rests on the assumption that bringing decision-making to the local level will increase the voice and inclusion of the poor and marginalized within communities by giving them a greater say in decisions that affect their lives, ensuring that development initiatives are correctly targeted to the needs of all beneficiaries. This study seeks to evaluate the ability of the DCF project to encourage the voice, participation, and inclusion of marginalized communities by focusing on participatory development. In particular, given Senegal’s patriarchal context, the study aims to answer whether the DCF approach allowed women to increase their participation and voice their needs.
|
George W. Bush Library Global War on Terror Topic Guide |
|
United States |
american-foreign-policy |
Collection of Bush Administration documents on the Global War on Terror obtained through FOIA requests.
|
Georgetown University Library: Government, Law, Politics, & International Affairs |
|
|
international-relations-resources |
A research portal and guide for issues regarding government, law, politics, international affairs, Islam, and more.
|
Global Center on Cooperative Security |
|
|
security-resources |
The Global Center works to achieve lasting security by advancing inclusive, human rights–based policies, partnerships, and practices to address the root causes of violent extremism. It focuses on four mutually reinforcing objectives:
• Supporting communities in addressing the drivers of conflict and violent extremism.
• Advancing human rights and the rule of law to prevent and respond to violent extremism.
• Combating illicit finance that enables criminal and violent extremist organizations.
• Promoting multilateral cooperation and rights-based standards in counterterrorism.
|
Global Conflict Tracker |
|
|
interstate-conflict |
The Council on Foreign Relations tracks global conflicts, their statuses, and their impacts on US interests.
|
Global Corruption Barometer |
|
|
governance-resources |
Transparency International's "Global Corruption Barometer is a survey that assesses general public attitudes toward, and experience of, corruption in dozens of countries around the world."
|
Global Corruption Barometer |
|
|
polls |
Transparency International's "Global Corruption Barometer is a survey that assesses general public attitudes toward, and experience of, corruption in dozens of countries around the world."
|
Global Countering Violent Extremism (CVE) Data Set |
Caitlin Ambrozik |
United States |
terrorism-and-armed-nonstate-actors |
The Global Countering Violent Extremism (CVE) Data set records CVE efforts and practices over a period of seven years (2010–2017), in 84 countries. Data to construct the data set is sourced from the U.S. State Department Country Reports on Terrorism. The Global CVE Data set uses eight indictors, including CVE National Strategy, CVE Programming and Government Participation, among others. An interactive CVE story map permits users to access city-level CVE program information.
|
Global Governance Monitor |
|
|
governance-resources |
The Council on Foreign Relations tracks global cooperation and recommends policy options regarding armed conflict, crime, nuclear proliferation, global finance, oceans, climate change, public health, terrorism, human rights, & the internet.
|
Global Integrity Index |
|
|
governance-resources |
The Global Integrity Report is a tool for understanding governance and anti-corruption mechanisms at the national level. Latest results from 2013.
|
Global Internal Displacement Database (GIDD) |
Internal Displacement Monitoring Center (IDMC) |
|
human-rights-resources |
The database aims to provide comprehensive information on internal displacement worldwide. It covers all countries and territories for which IDMC has obtained data on situations of internal displacement, and provides data on situations of:
Internal displacement associated with conflict and generalized violence (2003-2020);
Displacement associated with sudden-onset natural hazard-related disasters (2008-2020); and
Modelled disaster-related displacement risk metrics for more than 200 countries and territories.
|
Global Policy Forum |
|
|
international-relations-resources |
Global Policy Forum is an independent policy watchdog that monitors the work of the United Nations and scrutinizes global policymaking. We promote accountability and citizen participation in decisions on peace and security, social justice and international law. GPF gathers information and circulates it through a comprehensive website, as well as through reports and newsletters. We play an active role in NGO networks and other advocacy arenas. GPF analyzes deep and persistent structures of power and dissects rapidly-emerging issues and crises. GPF's work challenges mainstream thinking and questions conventional wisdom. We seek egalitarian, cooperative, peaceful and sustainable solutions to the world's great problems.
|
Global Political Islam |
Peter Mandaville |
|
middle-eastern-politics-resources |
Mandaville discusses the history of Islam and politics, the formation of Islamism as political strategy and Muslim transnationalism. Link to TRIPOD, for Tri-Co students.
|
Global State of Democracy (GSoD) Indices |
International Institute for Democracy and Electoral Assistance (IDEA) |
|
democracy-resources |
The Global State of Democracy Indices (GSoD Indices) measure democratic trends at the country, regional and global levels across a broad range of different attributes of democracy in the period 1975–2020. They do not provide a single index of democracy.
They produce data for 166 countries across the globe. The GSoD Indices are based on 116 individual indicators devised by various scholars and organizations using different types of sources: expert surveys, standards-based coding by research groups and analysts, observational data and composite measures. The Varieties of Democracy project is the largest contributor of indicators to the Global State of Democracies Indices.
The GSoD indices consist of attribute and subattribute scores per country per year for the period 1975–2020. All scoring runs from 0 to 1, with 0 representing the lowest achievement in the whole sample and 1 the highest.
|
Global Terrorism Database (GTD) |
|
|
terrorism-and-armed-nonstate-actors |
The National Consortium for the Study of Terrorism and Responses to Terrorism (START) at the University of Maryland is funded by the U.S. Department of Homeland Security. GTD is an open-source database including information on over 125,000 cases.
|
Global Terrorism Index |
The Institute for Economics and Peace |
|
terrorism-and-armed-nonstate-actors |
By The Institute for Economics and Peace, tracking terrorism around the world.
|
Graceful Decline? The Surprising Success of Great Power Retrenchment |
Paul K. MacDonald and Joseph M. Parent |
|
international-relations-resources |
Data from Graceful Decline? The Surprising Success of Great Power Retrenchment by Paul K. MacDonald and Joseph M. Parent in International Security Spring 2011.
|
Gridded Population of the World |
Socioeconomic Data and Applications Center, Columbia University |
|
human-development-resources |
Socioeconomic Data and Applications Center (sedac)'s Gridded Population of the World data set.
|
Guantánamo Docket |
|
|
american-foreign-policy |
Database of documents and analysis about prisoners detained at Guantánamo as enemy combatants. Documents include both reports and hearings released by government agencies as well as classified documents given to WikiLeaks.
|
GW Extremism Tracker |
Programe on Extremism, The George Washington University |
United States |
terrorism-and-armed-nonstate actors |
Hosted by The George Washington (GW) University, the tracker provides monthly updates detail terrorism-related activities and court proceedings in the United States.
|
Harmony Program Documents |
Harmony Program at Combatting Terrorism Center at West Point (CTC) |
|
jihadi-resources |
Links to Harmony Program documents, primary source documents, and analysis regarding al-Qaeda, related movements, and additional security threats.
|
Heritage Foundation: 2012 Index of Economic Freedom |
|
|
political-economy-resources |
10 indicators of trade freedom, business freedom, investment freedom, and property rights.
|
High Casualty Terrorist Bombings, 1989-2021 (HCTB) |
Center for Systemic Peace (CSP), Integrated Network for Societal Conflict Research (INSCR) |
Austria |
terrorism-and-armed-nonstate-actors |
September 11, 1989-September 10, 2021, case list of bomb attacks on non-combatant (civilian and political) targets by non-state actors resulting in 15 or more deaths (1409 cases)
|
Hinrich Foundation |
|
United States |
think-tanks |
U.S. think tank focused on international trade policy.
|
Historical Conflict Event Dataset (1468 BCE – 2003 CE) |
Charles Miller, K. Shuvo Bakar |
|
international-relations-resources |
Quantitative datasets of international conflict skew temporally to modern times and geographically and culturally to the West. Yet post–1815 conflicts featuring Western actors are only a small part of the history of warfare. Many scholars have bemoaned the potential selection bias which this introduces to studies of the causes and effects of military conflict, but as yet quantitative datasets which remedy both these temporal and geographic shortcomings have been lacking. Some datasets have expanded the scope of existing offerings temporally and others spatially, while others have attempted to expand both but with an important lack of detail in terms of location, participants, timing and outcomes. This dataset sets out to remedy the deficit. Using military history’s most extensive encyclopedia of conflict events, we have created a dataset of conflict events spanning the globe and a timescale from 1468BC to the invasion of Iraq in 2003, complete with precise geographic coordinates, year, participants and outcome. We demonstrate the promise of this data-set by using it to assess the frequently asserted relationship between conflict history and economic development, combined with Nordhaus’ GECON sub–national wealth data and historical data on population density from the Netherlands Environmental Agency.
|
Historical Data of the United States |
|
United States |
american-politics-resources |
Historical Data of the United States by Cambridge University Press. This thoroughly revised five-volume reference work, available both in print and electronic editions, reflects thirty years of new data and scholarship. Topics ranging from migration and health to crime and the Confederate States of America are each placed in historical context by a recognized expert in the field. The fully searchable and downloadable electronic edition (a single one-time purchase!) will permit users to graph individual tables and create customized tables and spreadsheets reflecting their own particular areas of interest.
|
Homegrown Extremism, 2001-2015 |
|
|
jihadi-resources |
Just how real is the “homegrown” Islamist terrorist threat? The New America Foundation and Syracuse University’s Maxwell School of Public Policy have examined the post-9/11 cases of Americans or U.S. residents convicted or charged of some form of jihadist
|
Hostile Neighbors: China vs. Japan |
Bruce Stokes |
China, Japan |
interstate-conflict |
Polling on how Chinese citizens and Japanese citizens view each other.
|
How governments shape the risk of civil violence: India’s federal reorganization, 1950–56 |
Bethany Lacina |
India |
governance-resources |
Governments are absent from empirical studies of civil violence, except as static sources of grievance. The influence that government policy accommodations and threats of repression have on internal violence is difficult to verify without a means to identify potential militancy that did not happen. I use a within-country research design to address this problem. During India’s reorganization as a linguistic federation, every language group could have sought a state. I show that representation in the ruling party conditioned the likelihood of a violent statehood movement. Pro-statehood groups that were politically advantaged over the interests opposed to them were peacefully accommodated. Statehood movements similar in political importance to their opponents used violence. Very politically-disadvantaged groups refrained from mobilization, anticipating repression. These results call into question the search for a monotonic relationship between grievances and violence and the omission of domestic politics from prominent theories of civil conflict.
|
How governments shape the risk of civil violence: India’s federal reorganization, 1950–56 |
Bethany Lacina |
India |
intrastate-conflict |
Governments are absent from empirical studies of civil violence, except as static sources of grievance. The influence that government policy accommodations and threats of repression have on internal violence is difficult to verify without a means to identify potential militancy that did not happen. I use a within-country research design to address this problem. During India’s reorganization as a linguistic federation, every language group could have sought a state. I show that representation in the ruling party conditioned the likelihood of a violent statehood movement. Pro-statehood groups that were politically advantaged over the interests opposed to them were peacefully accommodated. Statehood movements similar in political importance to their opponents used violence. Very politically-disadvantaged groups refrained from mobilization, anticipating repression. These results call into question the search for a monotonic relationship between grievances and violence and the omission of domestic politics from prominent theories of civil conflict.
|
How Terrorist Groups End: Lessons for Encountering al Qa'ida |
Seth G. Jones and Martin C. Libicki |
|
terrorism-and-armed-nonstate-actors |
A major study of the success and failure of terrorist groups over time. Includes a large table of all organizations in the dataset, giving organization name, operating years, peak size..."
|
How to Win Friends and Govern People (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi-resources |
Upon learning that al-Qaida in the Islamic Maghreb had succeeded in seizing Mali’s northern half in the spring of 2012, Al-Qaida’s No. 2 based in Yemen penned two letters offering advice to his fellow jihadists from his own experience trying to govern a slice of southern Yemen. Nasser al-Wahishi, who previously served as Osama bin Laden’s personal secretary, urges his colleagues in Mali to focus on day-to-day amenities, like providing electricity and running water to the areas under their control, in an effort to win local support. The letters are dated May 21 and Aug. 6, 2012. They were found in the Ministry of Finance’s Tax Building in Timbuktu, alongside a 17-page case study on how to apply Shariah in Yemen’s Abyan and Shabwa provinces, written by al-Qaida in the Arabian Peninsula.
|
Hudson Institute: Center on Islam, Democracy and the Future of the Muslim World |
|
|
middle-eastern-politics-resources |
The Hudson Institute, a think tank which focuses on foreign policy and national security, sponsors this Center.
|
Human Rights Data Analysis Group |
|
|
human-rights-resources |
Benetech Human Rights Data Analysis Group (HRDAG) designs and builds information management solutions and conducts statistical analysis on behalf of human rights projects.
|
Human Rights Watch World Report |
|
|
human-rights-resources |
Provides a concise report on the status of human rights in each country, listing each major country-specific problem and giving an assessment.
|
ILO Labor Statistics |
|
|
political-economy-resources |
Data and metadata for over 200 countries or territories from LABORSTA
|
IMF DataMapper |
IMF |
|
political-economy-resources |
This version of the IMF DataMapper publishes a wide selection of the key economic indicators from 11 Datasets.
|
IMF World Economic Outlook Database |
|
|
political-economy-resources |
Macroeconomic data on national accounts, inflation, unemployment rates, balance of payments, fiscal indicators, trade, and commodity prices. Data, reports, and interactive map available. Provides the latest information.
|
IMoLIN Case Law Database |
International Money Laundering Information Network (IMoLIN), United Nations Office on Drugs and Crime |
Austria |
governance-resources |
The IMoLIN Case Law Database has been developed by the International Money Laundering Information Network. The IMoLIN Case Law Database contains some case law entries directly related to money laundering and terrorist financing.
|
Important Facts and Figures on AQIM |
|
Algeria |
jihadi-resources |
This is an extensive summary of AQIM's history, leadership, ideology, tactics, attacks, and geopolitical influences. Published by Stanford University, this source is a reliable and was last updated in July of 2016.
|
Important Facts and Figures on IS |
|
|
jihadi-resources |
This is an extensive summary of the Islamic State's history, leadership, ideology, tactics, attacks, and geopolitical influences. Published by Stanford University, this source is a reliable and was last updated in October of 2017.
|
Index Islamicus |
|
|
middle-eastern-politics-resources |
Offers citations to literature on Islam, the Middle East and Muslim areas of Asia and Africa, and Muslim minorities elsewhere. Includes citations to journal articles, conference proceedings, books, and book reviews from 1906 to present.
|
India Data Sheets |
South Asia Terrorism Porta |
India |
terrorism-and-armed-nonstate-actors |
Data about violence in India.
|
Information International |
|
|
middle-eastern-politics-resources |
Information International is a leading Beirut-based research consultancy firm. Provides reports with percentage results for a variety of surveys conducted in the Arab world. Most polls conducted in Lebanon and others in Saudi Arabia and Palestinian Territ
|
Information Technology and Innovation Foundation (ITIF) |
|
United States |
think-tanks |
U.S. think tank focused on technology, national security, and macroeconomic policy.
|
Inspire Magazine #1 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
First issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Summer 2010. Released by jihadology.net; students and researchers must make an account with the site in order to access the pdf.
|
Inspire Magazine #10 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Tenth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Spring 2013. Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #11 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Eleventh issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Spring 2013. Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #12 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Twelfth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Spring 2014. Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #13 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Thirteenth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Winter 2014, Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #14 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Fourteenth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Summer 2015, Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #15 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Fifteenth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Spring 2016, Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #16 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Sixteenth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Autumn 2016 , Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #17 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Seventeenth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in July 2017. Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #2 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Second issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Fall 2010. Released by jihadology.net. Students and researchers must make an account with jihadology.net to access the pdf.
|
Inspire Magazine #3 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Third issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in November 2010. Released by jihadology.net. Students and researchers must register an account with the site to access the pdf.
|
Inspire Magazine #4 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Fourth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Winter 2010. Released by jihadology.net. Students and researchers must register an account with jihadology.net to access the pdf.
|
Inspire Magazine #5 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Fifth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Spring 2011. Released by jihadology.net. Students and researchers must make an account with jihadology.net to access the pdf.
|
Inspire Magazine #6 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Sixth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Summer 2011. Released by jihadology.net. Only available in Arabic.
|
Inspire Magazine #7 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Seventh issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Fall 2011. Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Inspire Magazine #8 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Eighth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Fall 2011. Released by jihadology.net, students and researchers must make an account with the site in order to access the pdf.
|
Inspire Magazine #9 |
Al-Qaeda in the Arabian Peninsula |
|
jihadi-resources |
Ninth issue of al-Malahem Media's Al-Qaeda in the Arabian Peninsula magazine, Inspire. Published in Winter 2012. Released by jihadology.net, students and researchers must make an account with the site to access the pdf.
|
Institute for National Security and Counterterrorism (INSCT) |
Syracuse University |
|
terrorism-and-armed-nonstate-actors |
The Institute for National Security and Counterterrorism (INSCT) at Syracuse University provides cutting-edge interdisciplinary research, graduate-level education, and public service on law and policy challenges related to national and international security.
|
Institute for National Security and Counterterrorism (INSCT) |
Syracuse University |
|
security-resources |
The Institute for National Security and Counterterrorism (INSCT) at Syracuse University provides cutting-edge interdisciplinary research, graduate-level education, and public service on law and policy challenges related to national and international security.
|
Institute for National Security and Counterterrorism (INSCT) |
Syracuse University |
|
american-foreign-policy |
The Institute for National Security and Counterterrorism (INSCT) at Syracuse University provides cutting-edge interdisciplinary research, graduate-level education, and public service on law and policy challenges related to national and international security.
|
Institute for National Security Studies (INSS) |
|
Israel |
security-resources |
INSS is an independent academic institute that studies key issues relating to Israel's national security and Middle East affairs.
|
Institute for National Security Studies (INSS) |
|
Israel |
think-tanks |
INSS is an independent academic institute that studies key issues relating to Israel's national security and Middle East affairs.
|
Institute for the Study of War (ISW) |
|
United States |
think-tanks |
U.S. think tank providing research, maps, and data on Iraq, Syria, ISIS, Afghanistan, Ukraine, and topics of Middle East security.
|
Institute of International Education Open Door’s Data |
|
|
social-factors |
Open Doors is sponsored by the U.S. Department of State with funding provided by the U.S. Government and supported in its implementation by IIE.
|
IntelCenter Database |
|
|
terrorism-and-armed-nonstate-actors |
The ICD is the most comprehensive open source counterterrorism database available today with more than 62 million data points on terrorist activity. The ICD contains 17 different database components covering raw terrorist materials such as video and audio releases, photos, graphics, magazines, books, training manuals and cyber tools as well as link analysis charts, dynamic maps, hostage data, terrorist messages, incident reports, terrorist logos, identity data, terrorist social media accounts, emails and phone numbers and more going back to the early 1990s.
|
Inter-American Committee Against Terrorism (CICTE) |
|
|
terrorism-and-armed-nonstate-actors |
The main purpose of the Inter-American Committee against Terrorism (CICTE) is to promote and develop cooperation among Member States to prevent, combat and eliminate terrorism.
|
Inter-University Consortium for Political and Social Research (ICPSR) |
|
|
polls |
Compilation of polling information. Searchable repository of datasets for use with statistical software (e.g. Stata and SPSS). Includes variety of social science studies and surveys, including but not limited to public opinion research. Note: Access for H
|
Internal Violence Index (IVI) |
Fondation Pour Les Études et Recherches Sur le Dévelopment International (FERDI) |
France |
intrastate-conflict |
The IVI is a composite indicator composed of 4 clusters - internal armed conflict, criminality, terrorism, and political violence. It is based on quantitative variables only, in contrast to the existing subjective indicators of fragility. Primary data for the 9 variables come from different open source databases (UCDP/PRIO, IDMC, UNODC, GTD, CNTS). Most of the variables relate to the period 2008-2012.
|
International Association for Counterterrorism and Security Professionals (IACSP) |
|
|
security-resources |
The International Association For Counterterrorism & Security Professionals (IACSP) was founded in 1992 to meet security challenges facing the world as it enters an era of globalization into the 21st century. IACSP believes that all elements of the world’s societies must become better educated about the threats of terrorism as a first step toward developing innovative and effective countermeasures to combat these ongoing threats. The IACSP is founded on the principle that a better informed society will result in a freer one.
|
International Center for Terrorism Studies (ICTS) |
Potomac Institute |
|
terrorism-and-armed-nonstate-actors |
The Potomac Institute for Policy Studies established the ICTS in 1998 to "address the extensive issues surrounding the ever increasing anxiety of modern-day terrorism."
|
International Center for the Study of Terrorism (ICST) |
Penn State University |
|
terrorism-and-armed-nonstate-actors |
This blog is dedicated to promoting discussion and debate around terrorism and political violence. The blog’s primary goals are to increase accessibility to academic research conducted at the International Center for the Study of Terrorism and Penn State, and to open meaningful channels of conversation between experts both within and outside the university setting on a variety of terrorism and security related issues. The blog’s content is drawn primarily from ICST Center Fellows and researchers, although occasional Guest Bloggers will be invited to contribute. All posts express the viewpoint of the individual authors, not ICST or Penn State University.
|
International Energy Statistics |
U.S. Department of Energy |
|
climate-resources |
U.S. Department of Energy, U.S. Energy Information Administration, “International Energy Statistics."
|
International Institute for Counter-Terrorism |
|
Israel |
terrorism-and-armed-nonstate-actors |
The ICT is an independent think tank providing expertise in terrorism, counter-terrorism, homeland security, threat vulnerability and risk assessment, intelligence analysis and national security and defense policy.
|
International Institute for Counter-Terrorism (Israel) |
|
Israel |
think-tanks |
The ICT is an independent think tank providing expertise in terrorism, counter-terrorism, homeland security, threat vulnerability and risk assessment, intelligence analysis and national security and defense policy.
|
International Institute for Strategic Studies (IISS) |
|
United Kingdom |
think-tanks |
British think tank focused on international relations.
|
International Republican Institute Public Opinion Polls |
|
|
polls |
The IRI provides public opinion polls from the Middle East and North Africa. Latest survey results from 2015.
|
International Terrorism: Attributes of Terrorist Events (ITERATE) |
|
|
terrorism-and-armed-nonstate-actors |
ICPSR is one of the most comprehensive databases available. Data on global terrorist acts includes the following fields: type of attack, location of the beginning and end of the incident, terrorist group involved, casualties, fatalities; information about
|
International Voter Turnout |
|
|
democracy-resources |
Voter turnout figures for national presidential and parliamentary elections. Includes only elections held in independent states with universal franchise and some degree of competitiveness. Indicators: registered voters, voting age population, spoilt ballo
|
Introducing a Dataset of Multi-Scale Geographies of ISIS Ideology from ISIS Sources |
Christopher Fuhriman, Richard M. Medina, Simon Brewer |
United States |
jihadi-resources |
This research proposes a methodology for extracting and analyzing geographical perspectives of terrorists and insurgents from online textual media. The information age has afforded organizations platforms that can be used to control their own media messages. Given that power, terrorist groups are able to create customized messages and define themselves in their own eyes on an international scale, often generating widespread sympathies and increased popularity. Within their online messaging, important information is provided that can potentially unveil geopolitical strategies. A mixed-method approach comprised of computer-aided content analysis, manual content analysis, and cartographic visualization is applied to ISIS’s Dabiq magazine as a case study to demonstrate the utility of this methodology. This research highlights the importance of considering the territoriality of terror groups and movements in geohistorical and present-day contexts.
|
Introducing Transnational Terrorist Hostage Event (TTHE) Data Set, 1978-2018 |
Wukki Kim, Justin George, Todd Sandler |
United States |
terrorism-and-armed-nonstate-actors |
This paper introduces transnational terrorist hostage event (TTHE) data set from 1978 to 2018. TTHE includes up to 50 variables for each of its 1,974 incidents, based on information in media sources. Four types of hostage incidents—kidnappings, barricade missions, skyjackings, and non-aerial hijackings—are recorded for a global sample. Select key variables include the number of hostages, targets of abductors’ demands, terrorist behavior in negotiations, amount of money ransom demands, other kinds of demands, duration of incident, and the outcome of negotiations. Our hostage data set also indicates location start and end, attack force size, victim numbers, casualties, weapons used, and logistical outcome. TTHE is tied to the International Terrorism: Attributes of Terrorist Events (ITERATE). We display interesting features of hostage incidents over time and an application of TTHE to identify the determinants of logistical and negotiation successes for hostage missions.
|
Iraq Body Count Dataset |
|
Iraq |
interstate-conflict |
Iraq Body Count (IBC) records the violent deaths that have resulted from the 2003 military intervention in Iraq. Its detailed public database includes civilian deaths caused by US-led coalition and Iraqi government forces and paramilitary or criminal attacks by others.
|
Is Chinese Nationalism Rising? Evidence from Beijing |
Alastair Iain Johnston |
China |
governance-resources |
“Rising nationalism” has been a major meme in commentary on the development of China’s material power since the early 1990s. Analysts often claim that rising nationalism, especially among China’s youth, is an important force compelling the Chinese leadership to take a tougher stand on a range of foreign policy issues, particularly maritime disputes in East Asia. The rising nationalism meme is one element in the “newly assertive China” narrative that generalizes from China’s coercive diplomacy in these disputes to claim that a dissatisfied China is challenging a U.S.-dominated liberal international order writ large. But is this meme accurate? Generally, research on Chinese nationalism has lacked a baseline against which to measure changing levels of nationalism across time. The data from the Beijing Area Study survey of Beijing residents from 1998 to 2015 suggest that the rising popular nationalism meme is empirically inaccurate. This finding implies that there are other factors that may be more important in explaining China’s coercive diplomacy on maritime issues, such as elite opinion, the personal preferences of top leaders, security dilemma dynamics, organizational interests, or some combination thereof.
|
Islamic Parties |
|
|
middle-eastern-politics-resources |
Compilation of "Islamic parties participating in parliamentary elections since 1970." Created by Charles Kurzman, professor of sociology at UNC Chapel Hill.
|
Islamist Terrorist Attacks in the World, 1979-2019 |
Fondation Pour L'Innovation Politique |
France |
jihadi-resources |
We believe that the mass of information gathered sheds new light on the phenomenon of Islamist violence. It makes it possible to better describe it, to better understand it, to document its severity. Thus, by way of illustration, we can establish that between 1979 and 2019, at least 33,769 Islamist terrorist attacks took place worldwide. They caused the deaths of at least 167,096 people. We can also say that Islamist terrorist attacks account for 18.8% of all attacks worldwide, but that they are responsible for 39.1% of the lives lost due to terrorism; or that, during the years studied, there has been an intensification of this violence and that the deadliest period is the most recent: from 2013 onwards, in our opinion, Islam has become the main cause (63.4%) of deaths due to terrorism in the world. We identify and quantify operating methods and targets. The vision of the phenomenon improves, the image becomes clearer. In this way, we show that the majority of the victims of Islamist terrorism are Muslims (91.2%).
|
Israeli Public Opinion |
|
|
polls |
An Israeli public opinion database by the Institute for National Security Studies (Tel Aviv).
|
ISW Resources on Jabhat al-Nusra: Al-Qaeda's Syria Affiliate |
|
|
jihadi-resources |
ISW's Jabhat al-Nusra reports on its goals, power relations, relations with ISIS, the US, the civil war, and local dynamics in Syria.
|
Jabhat al-Nusra and ISIS: Sources of Strength |
|
|
jihadi-resources |
Part 3 of 3 installments of ISW and CTP's report for the U.S. grand strategy in destroying ISIS and al-Qaeda
|
Jamestown Foundation |
|
|
american-politics-resources |
The Jamestown Foundation’s mission is to inform and educate policy makers and the broader policy community about events and trends in those societies which are strategically or tactically important to the United States. http://www.jamestown.org/programs/gta/
|
Jane's Terrorism and Insurgency Centre |
|
|
terrorism-and-armed-nonstate-actors |
Jane’s Terrorism and Insurgency Centre delivers a comprehensive view of global terrorist and insurgent events, groups, trends and developments, with up-to-date news and expert analysis, as well as powerful visualization tools to aid research & analysis.
|
Jeanette and Eli Reinhard Program on Counterterrorism and Intelligence |
|
|
terrorism-and-armed-nonstate-actors |
The Washington Institute's Jeanette and Eli Reinhard Program on Counterterrorism and Intelligence serves as Washington's premier center for the study of international terrorism. The Washington Institute has long focused on terrorism as a critical factor shaping and affecting U.S. Middle East policy. But since the program's founding under director Matthew Levitt in the wake of the September 11 attacks, it has become a leading center for the analysis of terrorist groups, state sponsors, logistical and financial support networks, and counterterrorism policy.
|
Jihad, War, Terrorism, and Peace in Islam |
Alan Godlas |
|
jihadi-resources |
Megasite page intended for student use. Includes numerous links to studies, speeches, translations, and multimedia sources.
|
Jihad: The Trail of Political Islam |
Gilles Kepel |
|
jihadi-resources |
The study, which is based on documents, interviews, and archival material is divided into two parts. Kepel follows the history and geography of this political-religious phenomenon. Link in Tripod.
|
Jihadi Casualty Database |
International Centre for the Study of Radicalisation (ICSR) |
United Kingdom |
jihadi-resources |
An interactive tool to help explore and find senior jihadi leaders killed between 1992-2022, including 660 total persons among 10 roles (senior official, military commander, ideologue, external operations planner, amir, senior leader, facilitator, media official, religious leader, family) among 20 nationalities. Includes location and cause of death.
|
Jihadology |
Aaron Y Zelin |
|
jihadi-resources |
A source of Jihadi primary source material, analysis of the middle east, and translation
|
John Jay College's Center on Terrorism |
|
|
terrorism-and-armed-nonstate-actors |
The Center on Terrorism at John Jay College was founded in the wake of those attacks and remains the only university-based entity devoted to terrorism research and education in the New York City area. Center researchers have published a range of books, article, chapters and reports covering different aspects of terrorism and counter-terrorism, from an interdisciplinary and policy-relevant perspective. The Center hosts the Friday Seminar Series which brings to the John Jay campus leading researchers and practitioners active in the field. The series is linked to John Jay’s Advanced Certificate in Terrorism Studies which offers a distinctive graduate-level program of study for those seeking to enhance their credentials and better understand terrorism and counter-terrorism.
|
Join the Caravan |
Abdullah Azzam |
|
middle-eastern-politics-resources |
Written in the late 1980's, the piece urges Muslims to establish a base for Islam in Afghanistan by expelling the Russians.
|
Kalamullah |
various |
|
middle-eastern-politics-resources |
Database of Islamic Audios, Lectures, Talks, Khutbahs, Videos, Nasheeds, Articles, Books etc.
|
Lawfare Blog |
|
United States |
security-resources |
Founded by law scholars and former U.S. officials, Lawfare Blog focuses on national security issues.
|
Lebanese Hezbollah Select Worldwide Activities Interactive Map and Timeline |
Matthew Levitt, Washington Institute for Near East Policy |
United States |
middle-eastern-politics-resources |
The Lebanese Hezbollah Select Worldwide Activity Interactive Map aims to fill a knowledge gap. A multimedia tool, the map is searchable by numerous modes, and includes photographs, videos, event summaries, linkages among entries, and primary-source documents. This project—easily the most ambitious and comprehensive of its kind—illuminates the full range of Hezbollah’s activities, from travel routes and aliases to larger themes related to the organization’s founding, development, and relationship with key state sponsors.
|
Letter from al-Zawahiri to Zarqawi |
Ayman al-Zawahiri |
|
jihadi-resources |
Zawahiri's letter to Zarqawi from July 9, 2005.
|
Mackenzie Institute |
|
Canada |
think-tanks |
The Mackenzie Institute, an independent think tank, brings a strategic and pragmatic approach to security matters that affect both domestic and global audiences. The Mackenzie Institute brings together external independent thinking for policymakers, governments, private sector entities, and educational institutions. We propose an open forum for global conversations on the threats and security vulnerabilities we face in order to best advise these various entities.
|
Major Episodes of Political Violence, 1946-2018 |
Center for Systemic Peace (CSP), Integrated Network for Societal Conflict Research (INSCR) |
Austria |
security-resources |
Annual Set lists annual, cross-national, time-series data on interstate, societal, and communal warfare magnitude scores (independence, interstate, ethnic, and civil; violence and warfare) for all countries; Full Set (1946-2012) includes both country data and scores for neighboring countries and regional context for all independent countries (does not include independence wars).
|
Manual for a Feared Weapon (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi-resources |
When Libyan leader Moamar Ghadafi was forced from power in 2011, many worried that his stockpile of dangerous weapons could fall into the hands of terrorists. Of particular concern was Gadhafi’s extensive collection of the feared SA-7 surface-to-air missiles, capable of taking down a commercial airliner. In Timbuktu, a 26-page manual explaining how to use the SA-7a and SA-7b strongly suggests that al-Qaida in the Islamic Maghreb not only possessed the dangerous weapon but was actively training its recruits on how to use them. The manual was found in the Ministry of Finance’s Budget Building. While the instructions are lifted from an online al-Qaida encyclopedia, the manual’s cover page identifies it as belonging to al-Qaida in the Islamic Maghreb, indicating that the local cell was trying to brand it as its own.
|
Mapping Coercive Institutions: The State Security Forces dataset, 1960–2010 |
Erica De Bruin |
|
security-resources |
This article presents the State Security Forces (SSF) dataset, which includes 375 security forces in 110 countries, 1960–2010. It tracks how each force is commanded, staffed, equipped, and deployed, as well as the number of security forces and potential counterweights in each state’s security sector as a whole. After illustrating how the SSF dataset differs from related ones and presenting descriptive trends, the article shows how it can be used to deepen our understanding of coup-proofing and strategic substitution, and identifies additional research uses of the database.
|
Mapping Criminal Organizations in Mexico |
Mexico Violence Resource Project, University of California, San Diego |
United States |
terrorism-and-armed-nonstate-actors |
Mapping Criminal Organizations in Mexico is an original effort to generate comprehensive information about the geography of criminal operations in Mexico. The project combines qualitative and automated methods, drawing from multiple sources, to produce systematic data on the presence, structure, evolution, and relationships of criminal groups in Mexico. The project is led and advised by an international team of researchers from multiple institutions.
This site currently contains maps and other visuals based on our hand-coded dataset of criminal group presence at the state and month level, covering 2007–2015. Future updates will include continuously updated maps and data from our other projects, including municipal-level presence and criminal group profiles, factions, and relationships.
|
Mapping Militants Project (MMP) |
Stanford Center for International Security and Cooperation (CISAC) |
|
terrorism-and-armed-nonstate-actors |
The Mapping Militants Project identifies patterns in the evolution of militant organizations in specified conflict theatres and provides representations of changing relationships among groups. Relationships are traced in interactive timeline-diagrams or “maps,” which provide visual representations of how inter-group relationships such as rivalries and alliances change over time. The maps are linked to group profiles, which compile open-source news and data on militant organizations to provide a comprehensive, fully cited report on each group.
|
Marc Lynch's Website |
|
|
middle-eastern-politics-resources |
An Arabic international newspaper headquartered in London. Note: Known for its support of the Saudi government.
|
Mass Shootings in America Dataset |
Everytown Research and Policy |
United States |
american-politics-resources |
Between 2009 and 2020, 1,363 people in the United States were killed and 947 more were wounded in 240 mass shootings, an average of 20 shootings each year. Among the casualties were at least 362 children and teens killed as well as 21 law enforcement officers killed and 35 wounded. Everytown Research and Policy provides a dataset for such mass shootings, filtered by those permitted to have possession of a firearm, use of a high capacity/magazine firearm, intimate partner or family victims, and perpetrators who displayed warning signs prior to the event. Finally, the dataset may be filtered by state.
|
Meir Amit Intelligence and Terrorism Information Center |
|
|
terrorism-and-armed-nonstate-actors |
Meir Amit Intelligence and Terrorism Information Center. The Intelligence and Terrorism Information Center opened in 2001. It is part of the Israel Intelligence Heritage & Commemoration Center (IICC) which focuses on issues concerning intelligence and terrorism.
|
Memberships in Conventional Intergovernmental Organizations (CIO), 1952-1997 |
Center for Systemic Peace (CSP), Integrated Network for Societal Conflict Research (INSCR) |
Austria |
international-relations-resources |
Center for System Peace, Memberships in Conventional Intergovernmental Organiza-tions (CIO), country data coded every fifth year, 1952-1997, denotes individual country membership in a) federations of intergovernment organizations (1); b) universal membership organ-izations (39); c) inter-continental membership organizations (52); and d) regionally-defined membership organizations (288) (SPSS and Excel data; PDF codebook)
|
MEMRI: The Middle East Media Research Institute |
|
|
middle-eastern-politics-resources |
Exploring the Middle East and South Asia through their media, MEMRI bridges the language gap between the West and the Middle East and South Asia, providing timely translations of Arabic, Farsi, Urdu-Pashtu, Dari, Turkish, and Russian media, as well as original analysis of political, ideological, intellectual, social, cultural, and religious trends. Founded in February 1998 to inform the debate over U.S. policy in the Middle East, MEMRI is an independent, nonpartisan, nonprofit, 501(c)3 organization. MEMRI's main office is located in Washington, DC, with branch offices in various world capitals. MEMRI research is translated into English, French, Polish, Japanese, Russian, Spanish and Hebrew.
|
Middle East Institute |
|
United States |
think-tanks |
U.S. think tank focused on Middle East foreign policy.
|
Middle East Institute |
|
United States |
middle-eastern-politics-resources |
U.S. think tank focused on foreign policy related to the Middle East.
|
Middle East Military Balance |
Jaffee Center for Strategic Studies, Tel Aviv University |
|
security-resources |
Data files on 21 countries surveyed. Includes "information about the following topics: major arms sales and procurement; arms production; non-conventional capabilities; space assets; order of battle; and major weapon systems for the ground forces."
|
Middle East Political Events Data, 1979-1995 |
|
|
middle-eastern-politics-resources |
Machine-coded dataset created by parsing the leads from Reuters articles. Data presented as source (subject), target (object), and action (verb). Covers the Levant area (Egypt, Israel, Jordan, Syria, Iraq, Kuwait, Lebanon, and Palestine) and the United St
|
Middle East Research and Information Project |
|
|
middle-eastern-politics-resources |
Offers pervious issues of Middle East Research. Note: Requires subscription but is available for Haverford students.
|
MideastWire.com |
|
|
middle-eastern-politics-resources |
Aymenn Jawad Al-Tamimi is a student at Brasenose College, Oxford University, and a Shillman-Ginsburg Fellow at the Middle East Forum.
|
Militarized Compellent Threats, 1918-2001 |
Todd S. Sechser |
|
interstate-conflict |
The study of military coercion is a central topic in international relations, and in recent years research on coercive threats has yielded a long list of important theoretical innovations. In 1960, Thomas Schelling drew a distinction between threats meant to deter and those designed to compel, but empirical research about coercion has paid much more attention to deterrence than compellence. This is problematic because deterrence and compellence are thought to operate according to different dynamics. This article introduces the Militarized Compellent Threats dataset, which is designed specifically to help test hypotheses about the use and effectiveness of compellent threats in international politics. I describe the rationale behind the dataset, present coding procedures and basic descriptive statistics, and offer comparisons to several related datasets.
|
Millennium Challenge Corporation: Natural Resources Management Indicator |
|
|
human-development-resources |
Indicators of eco-region protection, access to improved sanitation and water, and child mortality. Rankings, dataset, methodology, and reports available. 2010 data available.
|
Minorities at Risk Data |
University of Maryland's Center for International Development and Conflict Management (CIDCM) |
|
social-factors |
MAR tracks 284 politically-active ethnic groups throughout the world from 1945 to the present -- identifying where they are, what they do, and what happens to them. MAR focuses specifically on ethnopolitical groups, non-state communal groups that have "political significance" in the contemporary world because of their status and political actions. Political significance is determined by the following two criteria: The group collectively suffers, or benefits from, systematic discriminatory treatment vis-a-vis other groups in a society AND The group is the basis for political mobilization and collective action in defense or promotion of its self-defined interests
|
Muslim “Homegrown” Terrorism in the United States How Serious Is the Threat? |
Risa A. Brooks |
|
jihadi-resources |
Since the September 11 attacks, analysts and public officials have expressed growing concern about the potential of Muslim citizens and residents of the United States to plot attacks within the country’s borders—a phenomenon sometimes referred to as “homegrown” terrorism. To assess this apparent threat, it is necessary to examine what is known about the willingness and capacity of Muslim Americans to execute deadly attacks in the United States. On both analytical and empirical grounds, there is not a significant basis for anticipating that Muslim Americans are increasingly motivated or capable of successfully engaging in lethal terrorist attacks in the United States. (SEE TABLE 2 for DATA)
|
Muslim Public Opinion on U.S. Policy, Attacks on Civilians, and al Qaeda |
Steven Kull, Stephen Weber, National Consortium for the Study of Terrorism and Responses to Terrorism (START) |
United States |
polls |
Since the United States was attacked on September 11, 2001, there have been many studies of Islamic groups, such al Qaeda, which oppose the United States and use violence against civilians. However there has been relatively little research into how these groups are viewed by the larger Muslim society from which they arise. The attitudes of this larger society are important for a variety of reasons. At the broadest level, they tell us whether these groups are considered legitimate in terms of their goals as well as their methods. They also tell us how much support such groups are likely to get from the larger society, both directly and indirectly. To understand the public’s feelings about these groups, it is also critical to understand the prevailing narratives in the societies they come from. Since September 11, 2001, the United States has undertaken a “war on terrorism,” introducing large numbers of troops into Islamic countries, particularly Afghanistan and Iraq. How do people in the Islamic world understand the purpose of these US efforts? Are their interpretations consonant with the i nterpretations offered by al Qaeda and related groups? Do Muslims perceive that US forces are a stabilizing force or a threatening one? Al Qaeda and other groups have not emerged simply in reaction to US policies. They have a broad ideological agenda that includes transforming Islamic countries. How much do these goals resonate with the larger society? Do they favor living in an Islamic state? Do they seek the kind of isolation from Western influences that al Qaeda calls for? The use of violence against civilians for political purposes has figured prominently in debates about al Qaeda and related groups. Do Muslims believe that it is consistent with Islam? Do they think the current situation warrants such acts? To answer these and other questions WorldPublicOpinion.org conducted an in-depth study of public opinion in Egypt, Morocco, Pakistan, and Indonesia. The research was primarily supported by the START Consortium at the University of Maryland. Other scholars of the START Consortium participated in the development of the questionnaire. (2011)
|
National Pride in the Developed World: Survey Data from 24 Nations |
M. D. R. Evans, Jonathan Kelley |
|
polls |
Data on National Pride in 2002; interesting to compare with current statistics in 2020.
|
National Security Archive |
|
United States |
american-foreign-policy |
World's largest non-governmental archive of US government declassified documents. Project of George Washington University.
|
Nativism and Economic Integration Across the Developing World |
|
India |
political-economy-resources |
Since the 1970s, the majority of less-developed countries have adopted policies that aim to limit internal migration. This Element marshals evidence from around the world to explore the colliding trends of internal migration and nativism. Subnational migration is associated with a boom in nativist politics. Pro-native public policy and anti-migrant riots are both more likely when internal migration surges. Political decentralization strengthens subnational politicians' incentives and ability to define and cater to nativists.
|
Non-State Actors in Civil Wars: A New Dataset (NSA) |
David Cunningham, Kristian Skrede Gleditsch & Idean Salehyan |
|
terrorism-and-armed-nonstate-actors |
This paper introduces the Non-State Actors in Armed Conflict Dataset (NSA), which contains detailed information on the state–rebel group dyads included in the Uppsala Conflict Data Project Dyadic Dataset. Existing quantitative studies generally focus on characteristics of countries and conflicts to examine the duration, severity, outcome and recurrence of civil wars, in ways that often ignore the actors in civil wars. The NSA data provides additional information on the organizations involved in conflict dynamics. We describe the structure of the NSA data and the variables included, provide descriptive statistics of the indicators, and discuss areas for future research on non-state actors to enhance our understanding of conflict processes.
|
Nuclear Facilities Attack Database (NuFAD) |
Gary Ackerman, James Halverson, National Consortium for the Study of Terrorism and Responses to Terrorism (START) |
United States |
security-resources |
The Nuclear Facilities Attack Database (NuFAD) is a global database recording assaults, sabotages and unarmed breaches of nuclear facilities. The database emerged when several START researchers sought to explore the potential terrorist threat to nuclear facilities and discovered that there was a general lack of systematic open source data on the topic. What followed was a comprehensive attempt to identify the most relevant data from among the numerous historical anecdotes, unsubstantiated reports and vague references to attacks. The resulting Nuclear Facility Attack Database (NuFAD) contains 80 cases identified from open sources.
|
Occupational Wages Around the World (OWW) Database |
|
|
political-economy-resources |
Database contains occupational wage data for 161 occupations in over 150 countries from 1983 to 2008. Derived from ILO data.
|
Office of Foreign Assets Control: Sanctions List Search |
U.S. Department of the Treasury, Office of Foreign Assets Control (OFAC) |
United States |
american-foreign-policy |
This Sanctions List Search application ("Sanctions List Search") is designed to facilitate the use of the Specially Designated Nationals and Blocked Persons list ("SDN List") and other sanctions lists administered by OFAC, including the Foreign Sanctions Evaders List, the Sectoral Sanctions Identifications List, the List of Foreign Financial Institutions Subject to Correspondent Account or Payable-Through Account Sanctions, the Non-SDN Palestinian Legislative Council List, the Non-SDN Menu-Based Sanctions List, and the Non-SDN Communist Chinese Military Companies List.
|
Onset and Duration of Intrastate Conflict |
|
|
intrastate-conflict |
The web page offers three datasets on intrastate conflict: A country-year file and a calendar-time file prepared for onset analysis and a calendar-time file suitable for duration analysis.
|
OPEC Annual Statistical Bulletin |
Organization of Petroleum Exporting Countries (OPEC) |
|
climate-resources |
OPEC's annual statistical bulletin. The Annual Statistical Bulletin offers detailed and comprehensive time-series data on the global petroleum and natural gas industry.
|
Opinion Research Business |
|
|
polls |
Provides market and opinion research from over 80 countries.
|
OSCE ODIHR Hate Crime Reporting |
Organization for Security and Cooperation in Europe (OSCE), Office for Democratic Institutions and Human Rights (ODIHR) |
Poland |
human-rights-resources |
42 OSCE participating States have submitted hate crime information to ODIHR for 2020. Of these, 37 provided statistics, while 23 provided statistics disaggregated by bias motivation. The official figures are complemented by reports on hate incidents from 137 civil society groups, covering 46 participating States. These contributions amount to 7,203 hate incidents, including 3,173 disaggregated statistical incidents and 4,030 descriptive incidents. This information includes incidents provided by the Holy See, UNHCR and OSCE missions.
|
Our Somali Brothers (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi-resources |
When fighters from al-Qaida’s branch in East Africa, al-Shabab, attacked an upscale mall in Nairobi on Sept. 21, 2013, they used a set of questions to weed out Muslims from non-Muslims. Those who answered the questions correctly were allowed to live. The evolution of Shabab – from a terror group that previously killed Muslims indiscriminately to one that is trying to give the appearance of sparing Muslims – can be traced through three documents found in Timbuktu, all recovered inside the Ministry of Finance’s Audit Control Building.
|
Peace Accords Matrix (PAM) |
John Darby, University of Notre Dame Kroc Institute for International Peace Studies |
United States |
governance-resources |
The PAM database is a unique source of qualitative and quantitative longitudinal data on the implementation of 34 Comprehensive Peace Agreements (CPAs) negotiated between 1989 and 2012. Drawing on this world class, peer-reviewed database, PAM researchers have developed a quantitative methodology to track the progress of peace accord implementation. The PAM database serves as a valuable tool for analysis, which the Kroc Institute uses to support the negotiation and implementation of peace accords, including the implementation of the Colombian peace accord.
|
Pedagogical Materials on International Politics and Cold War History |
Marc Trachtenberg |
|
international-relations-resources |
This data collection - The Trachtenberg Papers - broadly concerns Cold War policy from the end of WWII to 1964. The data was accumulated in order to write several books and articles relating to Cold War relations during this pivotal period, most notably A Constructed Peace: The Making of the European Settlement, 1945-1963 (Princeton: Princeton University Press, February 1999).
This particular data project contains pedagogical materials born out of the data collection and analysis process. It contains a collection of course materials spanning international politics from the 19th Century to the post 9/11 world and guidance for researchers interested in historical work on the Cold War period. This includes a guide on how to define a project, identifying the scholarly literature, working with primary sources, and how to begin writing, as well as separate materials on declassification analysis. Deposited data and materials were previously shared on Marc Trachtenberg's UCLA website, which is also available on the Internet Archive.
|
Perry-Castañeda Map Collection: Ethnographic Maps |
|
|
social-factors |
Provides maps of the ethnographic and religious breakdown of populations by country.
|
Perspectives on Trade and Poverty Reduction: Key Findings Report 2007 |
|
|
human-development-resources |
A project of GMF’s Economic Policy program, is a survey of transatlantic public opinion on international trade, economic development, and poverty reduction. Conducted in France, Germany, Italy, Poland, Slovakia, the United Kingdom, and the United States
|
Peterson Institute for International Economics (PIIE) |
|
United States |
think-tanks |
U.S. think tank focused on international macroeconomic, financial, and trade policy. Based in Washington, D.C.
|
Pew Forum on Religion and Public Life |
|
|
social-factors |
Data set from U.S. survey of American Muslims and more.
|
Pew Forum on Religion and Public Life |
|
|
polls |
Data set from U.S. survey of American Muslims and more.
|
Pew Global Attitudes Project |
|
|
polls |
Data sets from international polls 2001-2014.
|
Pew Research Center: The People and the Press Project |
|
|
polls |
Covers diverse survey topics and provides good access to datasets and questionnaires. Datasets from Pew polls taken in the United States, mostly political, some religion- or social-based poll results.Includes the following polls: The People, The Press & P
|
PITF State Failure Problem Set, 1955-2018 |
Center for Systemic Peace (CSP), Integrated Network for Societal Conflict Research (INSCR) |
Austria |
international-relations-resources |
Political Instability Task Force (PITF), State Failure Problem Set, annual data on cases of ethnic war, revolutionary war, adverse regime change, and genocide/politicide (also, consolidated cases of political instability), includes annual indicators of numbers of rebels, area affected, and numbers of deaths (Excel data; PDF table and codebook)
|
Political Handbook of the World |
CQ Press |
United States |
governance-resources |
Provides descriptions of significant political parties in every country.
|
Political Terror Scale Annual Report |
|
|
terrorism-and-armed-nonstate-actors |
Gives a single score (1-5) rating a country’s political terror or freedom. Uses Amnesty International and the U.S. State Dept. as sources.
|
Polity IV Project: Political Regime Characteristics and Transitions, 1800-2013 |
Monty G. Marshall and Ted Robert Gurr |
|
governance-resources |
Annual Polity scores have been plotted for each of the 167 countries currently covered by the Polity IV data series for the period 1946-2013 (trend graphs are also included with the Polity IV 2010 Country Reports). This version of the Polity Country Trend graphs display periods of "factionalism" and important Polity change events, including autocratic backsliding, executive auto-coup or autogolpe, revolution, collapse of central authority (state failure), and successful military coups. Click on the country of interest in the "Regimes by Type 2013" map directly below (or table following) to view that country's contemporary regime trend (click here for a explanatory guide to the Polity Country Trend graphs).
|
Poll Worker Decision Making at the American Ballot Box |
Mara Suttmann-Lea |
|
american-politics-resources |
"Street-level bureaucrats set the terms for policy implementation and often operate under limited oversight. In American elections, poll workers are the street-level bureaucrats tasked with implementing a jurisdiction’s laws for verifying voter eligibility. Using in-depth interviews with 24 poll workers from the city of Chicago, this article assesses how poll workers make decisions about voter eligibility under Illinois’ signature-matching law. Respondents discussed a range of considerations used when they examine voter eligibility. The evidence I present suggests they rely on personal perspectives and experiences in their evaluations. Respondents also offered a range of responses for how they would proceed in the instance of a mismatching signature—including requesting voters provide identification even though it is not a requirement in Illinois unless a voter is challenged. Broadly, these results illustrate how poll workers’ subjective interpretations of election law shape their decisions and can lead to idiosyncratic applications of election law."
|
Polling Matters by Gallup |
Gallup Media |
|
polls |
"Polling Matters" section of Gallup Media's website. Features polls on U.S. politics, business, social issues and more.
|
Polling Report: Terrorism |
|
|
terrorism-and-armed-nonstate-actors |
Provides only basic results for domestic polls on terrorism.
|
Polling Report: Terrorism |
|
|
polls |
Provides only basic results for domestic polls on terrorism.
|
Polling the Nations |
|
|
polls |
A multi-topic source with more than 14,000 surveys conducted by over 1,000 polling organizations in the United States and 100 other countries. Offers good topic/category search.
|
Populations at Risk |
The Global Centre for the Responsibility to Protect, CUNY |
United States |
human-rights-resources |
The Global Centre for the Responsibility to Protect applies an atrocity prevention lens to situations where populations are experiencing, or are at risk of, genocide, war crimes, crimes against humanity or ethnic cleansing. For each population at risk we provide a background on the situation, an analysis of the factors putting populations at risk of mass atrocities, a timeline of the international response and a set of recommended actions to protect populations and prevent further crimes.
|
Presidential Directives and Executive Orders. |
|
|
american-politics-resources |
Federation of American Science Intelligence Resource Program's dataset of Presidential Directives and
Executive Orders.
|
Prisons and Terrorism: Extremist Offender Management in 10 European Countries |
Rajan Basra, Peter R. Neumann, International Centre for the Study of Radicalism (ICSR) |
United Kingdom |
terrorism-and-armed-nonstate-actors |
This report offers a wide‐ranging analysis of the role prisons can play in radicalizing people – and in reforming them. Building on a 2010 study that used the same methodology, it examines the policies and approaches of ten European countries, identifying trade‐offs and dilemmas but also principles and best practices that can help governments and policymakers spot new ideas and avoid costly and counterproductive mistakes.
|
Pro-Government Militias Database |
|
|
security-resources |
Whether in the Balkans, Afghanistan or the Arab Spring, pro-government militias have an important impact on conflict, on civilian well being and on the prospects for peace. The pro-government militia (PGM) project aims to increase our understanding of th Political http://www.sowi.uni-mannheim.de/militias/ Other Reports/General Data
Pro-Government Militias Database Whether in the Balkans, Afghanistan or the Arab Spring, pro-government militias have an important impact on conflict, on civilian well being and on the prospects for peace. The pro-government militia (PGM) project aims to increase our understanding of th
|
Problem-Solving Courts, Street Level Bureaucrats, and Clients as Policy Agents in a Prostitution Diversion Program |
Corey Shdaimah |
|
american-politics-resources |
Over 3,200 problem-solving courts exist, with even more being planned, yet we know very little about how they work or about the extension of the drug court model to other types of offenses. Even less is known about the perspective of participants. This study examined prostitution models newly implemented in Baltimore City and Philadelphia, which, at the time, were two of the few existing examples of these programs that have been implemented with this population. It also included participant perspectives on what motivates them to participate in the program and how they negotiate with court professionals to meet their needs. This research study was designed to contribute to the broader policy debate regarding the risks and benefits of alternative criminal justice models, including under what circumstances and with which populations they are most likely to be effective, beneficial or harmful.
|
Profiles of Individual Radicalization in the United States (PIRUS) |
Gary LaFree, Michael Jensen, Sheehan Kane, National Consortium for the Study of Terrorism and Responses to Terrorism (START) |
United States |
terrorism-and-armed-nonstate-actors |
The Profiles of Individual Radicalization in the United States (PIRUS) dataset contains deidentified individual-level information on the backgrounds, attributes, and radicalization processes of over 2,200 violent and non-violent extremists who adhere to far right, far left, Islamist, or single issue ideologies in the United States covering 1948-2018. Coded using entirely public sources of information, the PIRUS dataset is among the first efforts to understand domestic radicalization from an empirical and scientifically rigorous perspective. Users can now explore the rich PIRUS data using the Keshif data visualization tool, a user-friendly platform that allows for intuitive and insightful analysis of the data in real-time.
|
Profiles of Perpetrators of Terrorism in the United States (PPT-US) |
Erin E. Miller, Kathleen Smarick, National Consortium for the Study of Terrorism and Responses to Terrorism |
United States |
terrorism-and-armed-nonstate-actors |
PPT-US includes detailed information on organizations known to have engaged in terrorist activity against targets on the U.S. homeland between 1970 and 2016. Data included for each organization includes information on its terrorist attacks, its history and base of operations, its ideology and goals, its engagement in political and criminal activities (other than terrorism), its alliances, its network and structure, and its financial resources. PPT-US includes information on the source used to code each variable in the data set, and also includes a confidence indicator for each variable (high v. medium v. low), which reflects the reliability of the source upon which coding was based. PPT-US will be updated on a regular basis, as new information on terrorist attacks in the United States becomes available.
|
Project Fikra |
|
|
middle-eastern-politics-resources |
The Washington Institute's Project Fikra is a multiyear program of research, publication, and network-building designed to generate policy ideas for promoting positive change and countering the spread of extremism in the Middle East.
|
Public Opinion Poll Question Database |
|
|
polls |
Database from the Odum Institute at the University of North Carolina. Useful for U.S. domestic polls on standard political and social questions. "Particular strengths include Harris Poll questions, 1958-present, questions from National Network of State Po
|
Pundicity: Informed Opinion & Review |
Aymenn Jawad Al-Tamimi |
|
middle-eastern-politics-resources |
Aymenn Jawad Al-Tamimi's blog on Middle Eastern Politics.
|
Quality of Government (QoG) Dataset |
Aksel Sundström, University of Gothenburg |
Sweden |
governance-resources |
The compilation datasets are drawn from more than one hundred different sources that deal with topics related to the concepts of Quality of Government. The flagship is our award winning QoG Standard Dataset. To make it easier to navigate we also offer the QoG Basic Dataset which contains the most frequently used variables of the Standard Dataset. You will also find the QoG OECD, which is a regionally specified dataset covering OECD member states. Finally, the EU Regional Data consists of approximately 450 variables from Eurostat and other sources, covering three levels of European regions - country, major socio-economic regions and basic regions for the application of regional policies.
|
Radiological and Nuclear Non-State Adversaries Database (RANNSAD) |
Maranda Sorrell, National Consortium for the Study of Terrorism and Responses to Terrorism (START) |
United States |
terrorism-and-armed-nonstate-actors |
The Radiological and Nuclear Non-State Adversaries Database (RANNSAD) is the first phase in a larger research effort entitled Anatomizing Radiological and Nuclear Non-State Adversaries. The purpose of RANNSAD is the development of profiles of all former non-state users and attempted users of radiological and nuclear weapons and the database seeks to answer the research question "Who are the most likely radiological or nuclear non-state threat actors?" The database provides Radiological and Nuclear Adversary Profiles as well as information perpetrated by a specific actor/organization. Analysis of the dataset has allowed researchers to perform quantitative analysis and generate models of event type, agent type, perpetrator type, ideology type, individual demographics, and perpetrator success level.
|
RAND Corporation Terrorism and Homeland Security |
|
|
terrorism-and-armed-nonstate-actors |
RAND disseminates all its unclassified research online or in printed documents.
|
RAND Corporation Terrorism and Homeland Security |
|
United States |
think-tanks |
RAND disseminates all its unclassified research online or in printed documents.
|
Rebel Diplomacy in Civil War |
Reyko Huang |
|
intrastate-conflict |
A systematic documentation of rebel diplomacy in post–1950 civil wars using new quantitative and qualitative data shows that rebel diplomacy is commonplace and that many groups demonstrate as much concern for overseas political campaigns as they do for domestic and local mobilization. Diplomacy, furthermore, is not a weapon of the militarily weak, but a tactical choice for rebel groups seeking political capital within an international system that places formidable barriers to entry on nonstate entities. An original analysis of the diplomacy of the National Union for the Total Independence of Angola in the Angolan civil war using archival sources further demonstrates why rebels may become active diplomats in one phase of a conflict but eschew diplomacy in another. More broadly, the international relations of rebel groups promise to be an important new research agenda in understanding violent politics.
|
Receipts (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi-resources |
Over 100 receipts retrieved from a building believed to have been used by al-Qaida in the Islamic Maghrebʼs local accountant shows an organization intent on documenting even the most minor expense. Fighters kept track of purchases as small as a single lightbulb, a kilogram of tomatoes, the cake they ate, and the soda they drank. Advances to individual fighters are recorded, and signed by each receiver. They type up expense reports for trips. The receipts reveal the corporate-like structure that Osama bin Laden, who was himself a businessman in Saudi Arabia, before he embarked on jihad.
|
Replication data for: The Waning of War is Real |
Lacina, Bethany; Gleditsch, Nils Petter |
|
interstate-conflict |
Replication data for The Waning of War is Real. A number of recent studies argue that there is decline in armed conflict within and between nations. Gohdes and Price run against the grain in arguing that there is no evidence for a decrease in battle deaths in armed conflicts after World War II and that the trend reported in our earlier articles is spurious. However, they do not plausibly justify this thesis. We reexamine the argument for a decline, exploring nonlinearities in the data and potential biases due to measurement error. We find that very strong assumptions must hold in order for measurement errors to explain the trend in battle deaths.
|
Reporters Without Borders: Press Freedom Index |
|
|
human-rights-resources |
Rates press freedom based on surveys of activists, scholars, and journalists worldwide. Rankings, methodology, and questionnaire available. Data from 2002 to 2010.
|
Reputation of Terror Group Dataset: Measuring Popularity of Terrorist Groups (RTG) |
Efe Tokdemir, Seden Akcinaroglu |
United States |
terrorism-and-armed-nonstate-actors |
Violence against civilians is not the only tool among the arsenal of terrorists; it is only one of many. Up until now, there did not exist any quantitative data on the different strategies adopted by terror groups that measured the group popularity or its public support. The Reputation of Terror Groups dataset (RTG) addresses this void. To understand which terror groups build different types of reputation, to analyze the consequences of reputation building and how reputation changes with and influences conflict dynamics, we need to be able to measure the loaded concept reputation. RTG is the first systematic measure for the reputation of terror groups across countries or time. The dataset includes 443 terror groups operating across 31 years, which makes a total of 2,641 observations. The large sample size of the RTG dataset allows comparisons of popularity among groups. Additionally, the dataset adopts a multivariable approach by examining multiple aspects of both positive and negative reputation building. Another novelty of the dataset is its measure of reputation with regard to each target, mainly its constituency and target audience. The RTG data can help us come up with new and novel ways of understanding terrorist groups, and contribute to bridging the gap between micro- and mezzo-level studies in the literature by showing how terrorist groups adopt different strategies in their constituency and target audience to pursue their goals. In this article, we give an overview assessment of the RTG dataset.
|
Resources: Datasets on Jihadism |
|
|
jihadi-resources |
A "list of sources for quantitative information on Jihadist terrorism." Sources are divided according to whether they focus on individuals or incidents related to jihad. Many data sets contained within reports, while some directly link to data.
|
Resurgence Magazine #1 |
Al-Qaeda in the Indian Subcontinent |
|
jihadi-resources |
First issue of As-Sahab Media Subcontinent's magazine, Resurgence. Published in Fall 2014. Students and researchers must make an account with jihadology.net to access the pdf.
|
Resurgence Magazine #2 |
Al-Qaeda in the Indian Subcontinent |
|
jihadi-resources |
Second issue of As-Sahab Media Subcontinent's magazine, Resurgence. Published in Summer 2015. Students and researchers must register an account with jihadology.net to access the pdf.
|
Revisiting Reputation: How Past Actions Matter in International Politics |
Alex Weisiger and Keren Yarhi-Milo |
|
international-relations-resources |
Policy-makers and political scientists have long believed that states must make policy with an eye to maintaining a good reputation, especially a good reputation for resolve. Recent work, however, has argued that reputations for resolve do not form, and hence that past actions do not influence observers’ behavior in subsequent interactions. This conclusion is theoretically problematic and unsupported by the evidence offered by reputation critics. In particular, juxtaposing reputation for resolve to power and interests is misleading when past actions influence observers’ beliefs about interests, while the common approach of looking at crisis decision making misses the impact of reputation on general deterrence. We thus derive hypotheses about conflict onset from both the arguments of reputation critics and the logic of more standard reputation arguments, which we put to statistical test. We find that past action is closely connected to subsequent dispute initiation and that the effects of reputation generalize beyond the immediate circumstances of the past dispute. Although reputation is not all-important, leaders are well advised to consider the reputational implications of policy decisions in international conflict.
|
Rival Claims: Ethnic Competition and Territorial Autonomy under Indian Federalism |
Bethany Lacina |
India |
political-economy-resources |
Replication data for Lacina, Bethany. 2017. "Rival Claims: Ethnic Competition and Territorial Autonomy under Indian Federalism." University of Michigan Press.
|
Roper Center Public Opinion Archives |
|
|
polls |
Oldest and largest archive of public opinion data in the world. Subscribers only. Full datasets available by subscription. Database search and study documentation available free.
|
Roper iPoll |
Cornell University |
|
polls |
As a Roper Center member, Haverford College has access to the world’s largest public opinion database, Roper iPoll. To support online teaching and research, we have developed a streamlined user experience, easier and more comprehensive searching, a citation generator, and a more extensive database. You can see a full list of updates here. You can access nearly 800,000 survey questions and over 23,000 datasets from more than 100 different countries. Topics include the role of government, race relations, health, education, and much more.
|
Royal United Services Institute (RUSI) |
|
United Kingdom |
security-resources |
Leading British security think tank, primarily focused on European security studies. Membership required to access some research.
|
Rumiyah Magazine #1 |
ISIS |
|
jihadi-resources |
First issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in September 2016. Released by jihadology.net.
|
Rumiyah Magazine #10 |
ISIS |
|
jihadi-resources |
Tenth issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in June 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #11 |
ISIS |
|
jihadi-resources |
Eleventh issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in July 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #12 |
ISIS |
|
jihadi-resources |
Twelfth issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in August 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #13 |
ISIS |
|
jihadi-resources |
Thirteenth issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in September 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #2 |
ISIS |
|
jihadi-resources |
Second issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in October 2016. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #3 |
ISIS |
|
jihadi-resources |
Third issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in November 2016. Released by jihadology.net.
|
Rumiyah Magazine #4 |
ISIS |
|
jihadi-resources |
Fourth issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in December 2016. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #5 |
ISIS |
|
jihadi-resources |
Fifth issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in January 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #6 |
ISIS |
|
jihadi-resources |
Sixth issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in February 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #7 |
ISIS |
|
jihadi-resources |
Seventh issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in March 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #8 |
ISIS |
|
jihadi-resources |
Eighth issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in April 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Rumiyah Magazine #9 |
ISIS |
|
jihadi-resources |
Ninth issue of al-Hayat Media Center's English-language ISIS magazine, Rumiyah, (aka Rome). Published in May 2017. Released by jihadology.net, students and researchers must register an account with the site to access the pdf.
|
Running on Faith |
|
|
social-factors |
Data for Jo-Eystein Lindberg's study on effect of religious cleavages on the intensity and duration of internal conflicts.
|
Sahara Playbook (Timbuktu Letters) |
Nathan Griffiths (Associated Press) |
Mali |
jihadi resources |
In a confidential letter to his troops in Mali, the head of al-Qaida’s North African branch, Abdelmalek Droukdel, lays out a point-by-point strategy for taking over the country’s north. His advice is not what you might expect: He chastises his fighters for having been too brutal in the application of Shariah Law, saying that they erred when they destroyed Timbuktu’s ancient mausoleums and flogged women for not covering up. He advises them to be gentle with the population, and he compares their jihad in Mali to a newborn learning to walk. “We must ease its burden, take it by the hand, help it and support it until it stands.” The Associated Press found three out of six chapters on the floor of the Ministry of Finance’s Audit Control building in Timbuktu.
|
Senate Cloture Records 1917-present |
Gregory Koger |
|
american-politics-resources |
Senate cloture motions records 1917-present
|
SESRIC Basic Social and Economic Indicators |
|
|
political-economy-resources |
The Statistical, Economic and Social Research and Training Centre for Islamic Countries (SESRIC) offers a database with data on 237 socio-economic variables under 17 categories for 57 Islamic countries.
|
Significant Cyber Incidents |
Center for Strategic and International Studies (CSIS) |
United States |
security-resources |
Hosted by the Center for Strategic and International Studies (CSIS), the timeline records significant cyber incidents since 2006. The focus of the timeline is cyber attacks on government agencies, defense and high tech companies, or economic crimes with losses of more than a million dollars.
|
Silah Report |
|
|
jihadi-resources |
Silah Report is an open-source Twitter account analyzing small arms used in the Middle East, particularly Syria.
|
SIPRI Arms Transfers Database |
Stockholm International Peace Research Institute (SIPRI) |
Sweden |
security-resources |
The SIPRI Arms Transfers Database contains information on all transfers of major conventional weapons from 1950 to the most recent full calendar year. It is a unique resource for researchers, policy-makers and analysts, the media and civil society interested in monitoring and measuring the international flow of major conventional arms.
|
SIPRI Military Expenditure Database |
Stockholm International Peace Research Institute (SIPRI) |
Sweden |
security-resources |
The SIPRI Military Expenditure Database contains consistent time series on the military spending of countries for the period 1949–2019. The database is updated annually, which may include updates to data for any of the years included in the database. Military expenditure in local currency at current prices is presented according to both the financial year of each country and according to calendar year, calculated on the assumption that, where financial years do not correspond to calendar years, spending is distributed evenly through the year. Figures in constant (2018) and current US $, as a share of GDP and per capita are presented according to calendar year. Figures as a share of government expenditure are presented according to financial year.
|
SIPRI Multilateral Peace Operations Database |
Stockholm International Peace Research Institute (SIPRI) |
Sweden |
international-relations-resources |
The SIPRI database on multilateral peace operations provides comprehensive, reliable and authoritative data on all multilateral peace operations (both UN and non-UN) conducted around the world. The purpose of the database is to present an annual snapshot of multilateral peace operation deployments. SIPRI is currently expanding its multilateral peace operations database and, among other things, moving from annual to monthly snapshots. See graphs on this link.
|
Social Violence in Nigeria |
SAIS Africa |
Nigeria |
social-factors |
The Nigeria Social Violence Project is a collaborative effort in the African Studies Program at Johns Hopkins SAIS to track and analyze social violence in Nigeria from 1998 to the present.
|
Sources of Blame Attribution: Citizen Attitudes Towards Public Officials after 9/11 |
Neil Malhotra, Alexander Kuo, National Consortium for the Study of Terrorism and Responses to Terrorism (START) |
United States |
polls |
When government fails, whom do citizens blame? The purpose of this study is to explore citizen attitudes regarding blame of intelligence officials for making America vulnerable to the attacks on 9/11. The study used a short Internet-based survey experiment to test whether party cues affect people’s attitudes about the responsibility of three government officials in making America vulnerable to the 9/11 attacks: CIA Director George Tenet, FBI Director Louis Freeh, and Federal Reserve Chairman Alan Greenspan. The survey was conducted by Knowledge Networks (KN) over the Internet in February 2007, using a nationally representative sample of 1015 American adults. KN recruits panel members over the telephone via random digit dialing (RDD) and provides them with WebTV equipment in exchange for their participation in weekly surveys, which they complete online.
|
South Asian Terrorism Portal (SATP) |
|
South Asia |
terrorism-and-armed-nonstate-actors |
SATP is the largest website on terrorism and low intensity warfare in South Asia, and creates the database and analytic context for research and analysis of all extremist movements in the region. SATP has been set up to counter the progressive distortions regarding, and the international community’s neglect of, the wide range of terrorist movements within South Asia, and particularly in India. SATP establishes a comprehensive, searchable and continuously updated database on all available information relating to terrorism, low intensity warfare and ethnic/communal/sectarian strife in South Asia.
|
Subnational Threat & Surge Trackers |
ACLED |
United States |
intrastate-conflict |
Use the Subnational Threat & Surge Trackers to pinpoint local-level spikes in violence. The interactive dashboards track all first-order administrative divisions (e.g. states, provinces, governorates, etc.) that register a significant increase in political violence. The Subnational Surge Tracker flags cases in which a first-order administrative division has seen an increase of 100% or more in violent events during the most recent week of data relative to the average number of events per week over the past month. These surges capture immediate spikes, some of which may be early warning signs for further increases in violence. The Subnational Threat Tracker flags when the weekly average of violent events in a first-order administrative division has increased by 100% or more during the most recent month of data relative to the weekly average for the past year, capturing rising longer-term threats. Clicking on each first-order administrative division zooms in on a country-level map that displays the hotspot. Violence rates are calculated using the number of battle events, explosion/remote violence events, violence against civilians events, and riot events, as well as the excessive force against protesters sub-event type of the protest event type, excluding peaceful protest events and protest with intervention events.
|
Suicide Attack Database |
|
|
terrorism-and-armed-nonstate-actors |
CPOST's database on all suicide attacks from 1982-2015 with information about attack locations, targets, weapons, and demographic/general characteristics of suicide attackers.
|
Sutton Index of Deaths |
|
Ireland |
terrorism-and-armed-nonstate-actors |
The site "contains information on the deaths that have resulted from the conflict in Ireland between 14 July 1969 and 31 December 2001. The information has been provided by Malcolm Sutton and is an updated and revised version of the material that was firs
|
Taiwan’s Election and Democratization Study |
|
Taiwan |
democracy-resources |
Taiwan’s Election and Democratization Study (abbreviated as TEDS) is a continual large-scale survey research project supported and funded by the Department of Humanities and Social Science(hereafter, DHSS) of the Ministry of Science and Technology. Its chief purpose is to integrate several election-oriented face-to-face surveys in Taiwan in order to utilize scarce resources more efficiently and to further elevate the level of survey research.
|
Teaching Resource for High School and College Classrooms Using the SSRC's "After September 11" Essay Collection |
|
|
american-politics-resources |
The Social Science Research Council provides teachers with guides and ideas for lessons about September 11th and its aftermath.
|
Terror Free Tomorrow Public Opinion Surveys |
|
|
polls |
Variety of surveys of Muslim countries with access to full reports. Research focus is understanding support for terrorism.
|
Terrorism and Crime Studies |
|
|
terrorism-and-armed-nonstate-actors |
The Federal Research Division provides reports on terrorism and crime studies.
|
Terrorism and Foreign Fighters Database |
Balkan Investigative Reporting Network (BIRN) |
Bosnia and Herzegovina |
terrorism-and-armed-nonstate-actors |
The Terrorism and Foreign Fighters Database, developed by the Balkan Investigative Reporting Network, contains information about all convictions for domestic terrorism in Albania, Bosnia and Herzegovina, Montenegro, North Macedonia and Serbia, as well as verdicts from trials of people accused of going to fight in the conflicts in Syria and Ukraine, from 2010 until the end of 2020.
|
Terrorism and National Security |
James Madison University |
|
terrorism-and-armed-nonstate-actors |
The Nelson Institute supports a range of activities and offers unique opportunities for service learning, civic engagement, policy oriented research, symposiums and lectures, and other events designed to foster engagement and discussion by faculty, students, and members of the community.
|
Terrorism and Preparedness Survey Archive |
|
|
terrorism-and-armed-nonstate-actors |
Archives national and international survey data and related research materials about terrorism, homeland security, and preparedness.
|
Terrorism Guide Website by the US National Counterterrorism Center (NCTC) |
|
|
terrorism-and-armed-nonstate-actors |
Focusing on international terrorism, this site "contains many features" "pertaining to international terrorism: terrorist groups, wanted terrorists, technical pages on various threat-related topics, and a historic timeline..."
|
Terrorism in Africa: A Quantitative Analysis |
Adriana Lins De Albuquerque, Swedish Defence Research Agency |
Sweden |
terrorism-and-armed-nonstate-actors |
In the last two years, reports of Africa becoming the new frontier for terrorism in general, and Islamic terrorism in particular, has become more frequent. This report seeks to analyse to what extent such concerns are warranted. Terrorist attacks have become more common on the continent, particularly in the last two years for which we have data, 2014 and 2015. It is also clear that certain parts of the continent and particular countries are more frequent locations of terrorist attacks than others, suggesting that this is more of a local rather than continental problem. Actors known to have an Islamist affiliation committed a minority of the total number of terrorist attacks in Africa from 1997-2010. But the number of attacks perpetrated by this category of actors has been steadily increasing during the 2011-2015 period. Organizations known to be associated with al-Qaeda and Daesh have been perpetrating increasingly more attacks starting in 2003. Indeed, roughly 90 per cent of attacks attributed organizations known to have an Islamist affiliation also had a known affiliation with Daesh and al-Qaeda. Yet, the majority of attacks perpetrated by al-Qaeda- and Daesh-associated organizations were committed by no more than a handful of individual organizations. These include Boko Haram, al-Shabaab, Tripoli Province of the Islamic State and the Sinai Province of the Islamic State. An important findings of this this study, therefore, is that terrorism in Africa is a problem associated with the activity of a select number of specific organisations and the armed conflicts they are involved in.
|
Terrorist and Insurgent Organization Social Services (TIOS) Dataset |
Lindsay L. Heger, Danielle F. Jung |
|
terrorism-and-armed-nonstate-actors |
The Terrorist and Insurgent Organization Social Services (TIOS) Dataset provides key indicators of goods and social service provided by terrorists, rebels and insurgents in fragile and failed states. The public good variables within the dataset include welfare, education, health security, natural disaster response and re- ligious services, among others. Covering more than 400 hundred organisations, the TIOS dataset is available in .CSV and .DTA download format.
|
Terrorist and Organized Criminal Search Data Base (TOC) |
University of Belgrade |
Hungary |
terrorism-and-armed-nonstate-actors |
The TOC-search (Terrorist and Organized Criminal Search Data Base) is a dynamic data base which offers comprehensive information on global terrorist network and helps researchers, analysts, students and others working to prevent terrorism. It is result of a common project realized by the Faculty of Security Studies and Faculty of Mathematics in Belgrade which had started in December 2007.
The TOC-s data base is designed as online search engine that provides in-depth search and analysis on various terrorist-related categories: terrorist incidents, groups, organizations, members, leaders and supporting individuals and organizations. It also provides extensive information on links and relations between the mentioned terrorist-related categories and enables the corresponding search and predictions as well. One of the key advantages of the TOC-s is fact that its basic data source is verified information provided by PTSS reports of the George C Marshall European Center for Security Studies. In this way, we provide constant and automatic refreshment of the base with up-to-date information.
|
Terrorists and Extremists Database (TED) |
Counter Extremism Project |
United States, United Kingdom, Germany |
terrorism-and-armed-nonstate-actors |
The Terrorists and Extremists Database (TED) is an interactive database on terrorist leaders, operatives and extremists. The database generates Featured Reports on individuals. These Featured Reports provides a narrative overview of the individual terrorist, extremist or operative as well as biographical infor- mation and known aliases. Linked to each record is an interactive History Timeline, which in turn hyperlinks media reports, Government documents and UN publications. The website has extensive downloadable Threat Reports on terrorist groups.
|
The Afghanistan Project at the Institute for the Study of War |
|
Afghanistan, Islamic Republic of |
security-resources |
The project documents "the pattern of enemy activity in Afghanistan and Pakistan; military operations by Coalition and Afghan forces; the implications of the drawdown of Surge forces; and the political, economic, and demographic dynamics underlying the conflict".
|
The al-Qaeda Franchise:The Expansion of al-Qaeda and its Consequences |
Barak Mendelsohn |
|
jihadi-resources |
Authors argues the reasons al-Qaeda utilized a branching-out strategy and examines numerous case studies. Link in Tripod for Tri-Co.
|
The Alliance Treaty Obligations and Provisions (ATOP) Dataset |
Brett Ashley Leeds |
|
international-relations-resources |
The Alliance Treaty Obligations and Provisions (ATOP) project provides data regarding the content of military alliance agreements signed by all countries of the world between 1815 and 2016.
|
The American Society of International Law (ASIL) |
|
|
international-relations-resources |
Provides links to further sources of international treaty information. Includes a section on finding non-US treaties.
|
The Armed Conflict Location & Event Data Project |
Clionadh Raleigh and Roudabeh Kishi |
|
intrastate-conflict |
The Armed Conflict Location & Event Data Project (ACLED) is a disaggregated data collection, analysis, and crisis mapping project. ACLED collects the dates, actors, locations, fatalities, and types of all reported political violence and protest events across Africa, East Asia, South Asia, Southeast Asia, the Middle East, Central Asia and the Caucasus, Latin America and the Caribbean, and Southeastern and Eastern Europe and the Balkans. The ACLED team conducts analysis to describe, explore, and test conflict scenarios, and makes both data and analysis open for free use by the public.
|
The Art of Searching: How to Find Terrorism Literature in the Digital Age |
|
|
terrorism-and-armed-nonstate-actors |
This guide provides an overview on information retrieval techniques for locating high-quality literature on terrorism and counter-terrorism. Starting from general considerations on conducting a literature search – taking into account the specifics of terr
|
The Battle Deaths Dataset |
Lacina, Bethany & Nils Petter Gleditsch |
|
interstate-conflict |
This dataset includes statistics for all battle deaths (soldiers and civilians killed in combat) in state-based armed conflicts.
|
The Big, Allied and Dangerous (BAAD) Data |
National Consortium for the Study of Terrorism and Responses to Terrorism |
|
terrorism-and-armed-nonstate-actors |
The Big, Allied and Dangerous (BAAD) online platform features updated, vetted and sourced narratives, and relationship information and social network data on 50 of the most notorious terrorist organizations in the world since 1998, with additional network information on more than 100 organizations. Funded through the Department of Homeland Security’s Science and Technology Directorate’s Office of University Programs, the underlying BAAD database was created and is maintained by the Project on Violent Conflict at the University at Albany’s Rockefeller College of Public Affairs and Policy.
|
The Center for Advanced Defense Studies - C4ADS |
|
United States |
security-resources |
A research center focusing on Open-Source analysis of nontraditional defense issues, such as corruption, environmental crimes, emerging technology etc.
|
The Chicago Council on Global Affairs: Public Opinion Surveys |
|
|
polls |
The Chicago Council supports regular public opinion studies focusing on global affairs and international relations. Most polling is done in the U.S., but represents Americans’ views on global issues. The Council has recently increased its support for poll
|
The CNS North Korea Missile Test Database |
The James Martin Center for Nonproliferation Studies (CNS) |
North Korea |
security-resources |
The James Martin Center for Nonproliferation Studies (CNS) North Korea Missile Test Database is the first database to record flight tests of all missiles launched by North Korea capable of delivering a payload of at least 500 kilograms (1102.31 pounds) a distance of at least 300 kilometers (186.4 miles). The database captures advancements in North Korea's missile program by documenting all such tests since the first one occurred in April 1984, and will be routinely updated as events warrant.
|
The Dataset of Countries at Risk of Electoral Violence |
David Muchlinski |
|
democracy-resources |
Electoral violence is increasingly affecting elections around the world, yet researchers have been limited by a paucity of granular data on this phenomenon. This paper introduces and describes a new dataset of electoral violence—the Dataset of Countries at Risk of Electoral Violence (CREV)—that provides measures of 10 different types of electoral violence across 642 elections held around the globe between 1995 and 2013. The paper provides a detailed account of how and why the dataset was constructed, together with a replication of previous research on electoral violence. We introduce this dataset by demonstrating that the CREV, while measuring the same underlying phenomena as other datasets on electoral violence, provides researchers with the ability to draw more nuanced conclusions about the causes and consequences of violence that occurs in connection with the electoral process. We also present and analyze descriptive data from the CREV dataset.
|
The Dyadic Militarized Interstate Disputes (MIDs) Dataset Version 3.0: Logic, Characteristics, and Comparisons to Alternative Datasets |
Zeev Maoz, Paul L. Johnson, Jasper Kaplan, Fiona Ogunkoya, Aaron P. Shreve |
|
interstate-conflict |
We introduce the new, substantially updated, and revised version of the Dyadic Militarized Interstate Disputes (MIDs) dataset. We discuss the underlying logic of constructing dyadic MIDs and demonstrate that these operations generate significant differences between the actual occurrence and properties of MID dyads and those extracted from machine-generated programs such as EUGene, or from the MID participant dataset. We provide some descriptive measures of dyadic MIDs over the period of 1816 to 2010 and compare some of the key dyadic results on the correlates of MIDs using different datasets. We discuss the theoretical and empirical implications of our results.
|
The Foreign Fighter Project |
David Malet |
|
terrorism-and-armed-nonstate-actors |
David Malet, The Foreign Fighter Project, 2007 (updated to 2015). From Malet's Foreign Fighters: Transnational Identity in Civil Conflicts.
|
The GDELT Project |
GDELT |
|
governance-resources |
Supported by Google Jigsaw, the GDELT Project monitors the world's broadcast, print, and web news from nearly every corner of every country in over 100 languages and identifies the people, locations, organizations, themes, sources, emotions, counts, quotes, images and events driving our global society every second of every day, creating a free open platform for computing on the entire world.
|
The Global Extremist Registry |
|
|
terrorism-and-armed-nonstate-actors |
The Counter Extremism Project maintains a database of the leadership and financiers of extremist groups around the globe and country extremism and counter-extremism reports and much more.
|
The Global Peace Index |
|
|
international-relations-resources |
The GPI, produced by the Institute for Economics and Peace, is the world’s leading measure of global peacefulness. It gauges ongoing domestic and international conflict, safety and security in society, and militarization in 153 countries by taking into account other reports/general data. Consolidates international relations and security policy facts into a searchable database.
|
The Heritage Foundation: Global U.S. Troop Deployment Database, 1950-2005 |
|
|
american-foreign-policy |
Time series data on US troop deployments by year and country.
|
The Illusion of Democratic Credibility |
Alexander B. Downs and Todd S. Sechser |
|
democracy-resources |
This article revisits the quantitative evidence for this proposition, which we call the "democratic credibility hypothesis," and finds that it is surprisingly weak. Close examination of the datasets most commonly used to test this hypothesis reveals that they contain few successful democratic threats, or indeed threats of any kind. Moreover, these datasets' outcome variables do not properly measure the effectiveness of threats, and therefore yield misleading results. The article then reassesses the democratic credibility hypothesis using the Militarized Compellent Threats dataset, a new dataset designed specifically to test hypotheses about the effectiveness of coercive threats. The analysis indicates that threats from democracies are no more successful than threats from other states.
|
The Institute of Peace and Conflict Studies (IPCS) |
|
Southeast Asia |
security-resources |
The Institute of Peace and Conflict Studies (IPCS) was founded in 1996 as an independent think-tank by former Indian Administrative Service (IAS) officer PR Chari and Major General (Retd) Dipankar Banerjee to develop an alternative framework for peace and security in South Asia and the extended neighbourhood. It aims to bring policy-relevant research into scholarly and public debate through an emphasis on events, capacity building of the next generation of thought leaders, and media and online outreach. Its research and policy recommendations do not subscribe to any particular political view or interest.
|
The International Centre for the Study of Radicalization (ICSR) |
|
|
terrorism-and-armed-nonstate-actors |
Working across a number of different academic disciplines and in several languages, ICSR conducts thematic research on some of the world’s most pressing issues. Our researchers are often among the first to discover new trends, identify emerging patterns, and have harnessed the capacity of ‘big data’ to bring an empirical understanding to the study of international security and terrorism issues.
|
The International Crisis Behavior (ICB) Dataset |
Patrick James and Kyle Beardsley |
|
international-relations-resources |
The aim of the ICB Project is to shed light on a pervasive phenomenon of world politics. There are four specific objectives: the accumulation and dissemination of knowledge about interstate crises and protracted conflicts; the generation and testing of hypotheses about the effects of crisis-induced stress on coping and choice by decision makers; the discovery of patterns in key crisis dimensions – onset, actor behavior and crisis management, superpower activity, involvement by international organizations, and outcome; and application of the lessons of history to the advancement of international peace and world order.
|
The ISIS Files |
George Washington University |
|
jihadi-resources |
Access a wide array of documents that provide invaluable evidence on the activities and atrocities carried out by the Islamic State.
|
The Islamic State |
Hizb ut-Tahrir |
|
jihadi-resources |
Translated from the Arabic edition from the Sunni political party.
|
The Long War Journal |
|
|
jihadi-resources |
Provides concise, translated,daily briefs covering some of the key political, cultural, economic and opinion pieces appearing via the print, radio and television media of the 22 Arab countries, Iran and the Arab Diaspora.
|
The Metrics That Matter for Election 2020 |
Gallup Media |
|
polls |
Use Gallup's interactive polling to explore more than 70 years of trends for key indicators related to the 2020 election, and see how current attitudes on each compare to past elections. These indicators include presidential job approval, Americans' satisfaction with the direction of the country, Gallup's U.S. Economic Confidence Index, mentions of economic issues as the most important problem facing the country, party identification and the amount of thought Americans are giving to the election. These trends will be updated on a regular basis throughout the 2020 campaign.
|
The Metrics That Matter for Election 2020 |
Gallup Media |
|
american-politics-resources |
Use Gallup's interactive polling to explore more than 70 years of trends for key indicators related to the 2020 election, and see how current attitudes on each compare to past elections. These indicators include presidential job approval, Americans' satisfaction with the direction of the country, Gallup's U.S. Economic Confidence Index, mentions of economic issues as the most important problem facing the country, party identification and the amount of thought Americans are giving to the election. These trends will be updated on a regular basis throughout the 2020 campaign.
|
The Metrics That Matter for Election 2020 |
Gallup Media |
|
democracy-resources |
Use Gallup's interactive polling to explore more than 70 years of trends for key indicators related to the 2020 election, and see how current attitudes on each compare to past elections. These indicators include presidential job approval, Americans' satisfaction with the direction of the country, Gallup's U.S. Economic Confidence Index, mentions of economic issues as the most important problem facing the country, party identification and the amount of thought Americans are giving to the election. These trends will be updated on a regular basis throughout the 2020 campaign.
|
The MID4 dataset, 2002–2010: Procedures, coding rules and description |
Glenn Palmer |
|
interstate-conflict |
Understanding the causes of interstate conflict continues to be a primary goal of the field of international relations. To that end, scholars continue to rely on large datasets of conflict in the international system. This paper introduces the latest iteration in the most widely used dataset on interstate conflicts, the Militarized Interstate Dispute (MID) 4 data. In this paper we first outline the updated data-collection process for the MID4 data. Second, we present some minor changes and clarifications to the coding rules for the MID4 datasets, as well as pointing out how the MID coding procedures affect several notable "close call" cases. Third, we introduce updates to the existing MID datasets for the years 2002–2010 and provide descriptive statistics that allow comparisons of the newer MID data to prior versions. We also offer some best practices and point out several ways in which the new MID data can contribute to research in international conflict.
|
The Middle East Media Research Institute: North Africa |
|
Algeria, People's Democratic Republic of |
middle-eastern-politics-resources |
|
The Military Balance |
|
|
security-resources |
The Military Balance is the International Institute for Strategic Studies’ annual assessment of the military capabilities and defence economics of 170 countries world-wide. Note: Online version for subscribers only.
|
The New Era of Counterforce: Technological Change and the Future of Nuclear Deterrence |
Keir Lieber and Daryl Press |
|
security-resources |
Nuclear deterrence rests on the survivability of nuclear arsenals. For much of the nuclear age, "counterforce" disarming attacks—those aimed at eliminating an opponent's nuclear forces—were nearly impossible because of the ability of potential victims to hide and protect their weapons. Technological developments, however, are eroding this foundation of nuclear deterrence. Advances rooted in the computer revolution have made nuclear forces around the world considerably more vulnerable. Specifically, two key approaches that countries have relied on to ensure arsenal survivability since the dawn of the nuclear age—hardening and concealment—have been undercut by leaps in weapons accuracy and a revolution in remote sensing. Various methods, evidence, and models demonstrate the emergence of new possibilities for counterforce disarming strikes. In short, the task of securing nuclear arsenals against attack is far more difficult than it was in the past. The new era of counterforce challenges the basis for confidence in contemporary deterrence stability, raises critical issues for national and international security policy, and sheds light on one of the enduring theoretical puzzles of the nuclear era: why international security competition has endured in the shadow of the nuclear revolution.
|
The non-democratic roots of mass education: Evidence from 200 years |
Agustina Paglayan |
|
social-factors |
This project assesses the impact of democratization on primary school enrollment rates using quantitative data from 1820 to 2010 to estimate difference-in-differences and interrupted time series models of the impact of democratization. It finds that, on average, there is little evidence to support the claim that democratization led to the expansion of primary schooling. The study then unpacks this average result to explain what lies behind the null effect. It finds that democracy can lead to the expansion of primary schooling, but the key condition under which it does—when a majority of the population lacked access to primary schooling before democratization—rarely holds. Indeed, the study documents that, among countries that experienced democratization, the average primary school enrollment rate was already 70% before transitioning to democracy. Although the project does not seek to provide a conclusive answer to why there was so much provision of primary education under non-democracies, the section titled “Primary School Systems Under Non-Democracies” explores several possible answers to help readers entertain the possibility that the provision of primary education may have been high under non-democracies—because this is a counterintuitive finding given the previous literature in political science and economics. With that modest goal in mind, this section surveys existing research in history, sociology, political science, and economics to parse out four common arguments for the provision of primary schooling under non-democratic regimes; provides exploratory quantitative tests for these arguments; and, using online annotations, provides qualitative evidence that illustrates these arguments.
|
The NTI Nuclear Security Index |
NTI Nuclear Security Index |
|
security-resources |
Explore the results for all three rankings of the NTI Nuclear Security Index, as well as the new Radioactive Source Security Assessment. You can view results by Overall, Category, or Indicator Score. Toggle between the map and the table to explore the results in different ways. Select a country to explore that country's results in more detail. All scores are normalized on a 0 to 100 scale, where 100 means the strongest nuclear security conditions. The Protect Facilities ranking was first launched in 2016 and does not have scores for 2014/2012. Countries in the Radioactive Source Security Assessment do not receive scores or ranks.
|
The Operation Of 11 Rabi Al-Awwal: The East Riyadh Operation and Our War With the United States and Its Agents |
Abu Raudha |
|
jihadi-resources |
This book is regarding the May 12 Riyadh Operation. It exposes and refutes propaganda and lies spead by Taghuti state of Saudi Arabia. Link to PDF file.
|
The Political Terror Scale |
Peter Haschke, Mark Gibney, Peter Haschke |
|
terrorism-and-armed-nonstate-actors |
The Political Terror Scale (PTS) project was started by Michael Stohl and several graduate students at Purdue University in the early 1980s, essentially as a way of empirically testing whether U.S. foreign aid was being sent to countries that violated international human rights standards, thereby being in violation of federal law. The five level coding scheme employed by the PTS was taken directly from the 1980 Freedom House Yearbook and it has been used ever since.
|
The Political Terror Scale (PTS) |
Michael Stol, Mark Gibney, Purdue University |
United States |
terrorism-and-armed-nonstate-actors |
The PTS measures levels of political violence and terror that a country experiences in a particular year based on a 5-level “terror scale” originally developed by Freedom House. The data used in compiling this index comes from three different sources: the yearly country reports of Amnesty International, the U.S. State Department Country Reports on Human Rights Practices, and Human Rights Watch’s World Reports.
|
The Power of Nations Measuring What Matters |
Michael Beckley |
|
international-relations-resources |
Power is the most important variable in world politics, but scholars and policy analysts systematically mismeasure it. Most studies evaluate countries’ power using broad indicators of economic and military resources, such as gross domestic product and military spending, that tally their wealth and military assets without deducting the costs they pay to police, protect, and serve their people. As a result, standard indicators exaggerate the wealth and military power of poor, populous countries, such as China and India. A sounder approach accounts for these costs by measuring power in net rather than gross terms. This approach predicts war and dispute outcomes involving great powers over the past 200 years more accurately than those that use gross indicators of power. In addition, it improves the in-sample goodness-of-fit in the majority of studies published in leading journals over the past five years. Applying this improved framework to the current balance of power suggests that the United States’ economic and military lead over other countries is much larger than typically assumed, and that the trends are mostly in America’s favor.
|
The Psychology of Threat in Intergroup Conflict: Emotions, Rationality, and Opportunity in the Rwandan Genocide |
Omar Shahabudin McDoom |
Rwanda |
intrastate-conflict |
How do security threats mobilize social groups against each other? The strength of such threats lies in the power of group emotions, notably the primary emotion of fear. Fear works by activating psychological processes at the group level that polarize attitudes between different groups. An analysis of survey data, radio broadcasts, and interviews from Rwanda's civil war and genocide of 1990-94 reveals four psychosocial mechanisms at work in group polarization: boundary activation, outgroup derogation, outgroup homogenization, and ingroup cohesion. Additionally, scholarly debates on the role of emotions, material opportunities, and rationality in ethnic conflicts represent a false theoretical choice. Both emotions and material opportunities matter, and rationality and emotion are not incompatible. Two simple refinements to extant theoretical and empirical approaches are needed. First, scholars ought to distinguish between attitudes and violence in ethnic conflicts; emotions matter for the polarization of attitudes, but material and structural opportunities mediate their expression as violence. Second, scholars should pay greater attention to the extensive research in social psychology that shows that both emotion and reason interact in individual judgment and decisionmaking. (SEE TABLE 1)
|
The Rebel Human Rights Violations Dataset |
James Walsh |
United States |
human-rights-resources |
The Rebel Human Rights Violations Dataset measures violations of human rights by rebel groups engaged in civil wars between 1990 and 2020.
|
The Rise and Fall of the Great Powers in the Twenty-first Century China’s Rise and the Fate of America’s Global Position |
Stephen G. Brooks and William C. Wohlforth |
China |
international-relations-resources |
A new framework that avoids unipolarity’s conceptual pitfalls and provides a systematic approach to measuring how the distribution of capabilities is changing in twenty-first-century global politics demonstrates that the United States will long remain the only state with the capability to be a superpower. In addition, China is in a class by itself, one that the unipolarity concept cannot explain. To assess the speed with which China’s rise might transform this into something other than a one-superpower system, analogies from past power transitions are misleading. Unlike past rising powers, China is at a much lower technological level than the leading state, and the gap separating Chinese and U.S. military capabilities is much larger than it was in the past. In addition, the very nature of power has changed: the greatly enhanced difficulty of converting economic capacity into military capacity makes the transition from a great power to a superpower much harder now than it was in the past. Still, China’s rise is real and change is afoot.
|
The Security Bazaar: Business Interests and Islamist Power in Civil War Somalia - Data |
Aisha Ahmad |
Somalia |
intrastate-conflict |
Civil war can be modeled as a market for security, wherein protection must be purchased from multiple substate rackets. Using this market model, a close investigation of the Somali case reveals why and under what conditions the interests of the profit-driven business class align with those of ideologically motivated Islamist groups. Security costs are of critical importance to businesses in a civil war, and Islamists are uniquely competitive in lowering these costs. The business-Islamist alliance is therefore driven by rational, economic considerations, which can contribute to the rise of Islamist power.
|
The Social Conflict Analysis Database (SCAD) |
Salehyan, Idean, Cullen S. Hendrix, Jesse Hamner, Christina Case, Christopher Linebarger, Emily Stull, and Jennifer Williams |
|
social-factors |
The Social Conflict Analysis Database (SCAD) includes protests, riots, strikes, inter-communal conflict, government violence against civilians, and other forms of social conflict not systematically tracked in other conflict datasets. SCAD currently includes information social conflicts from 1990-2017, covering all of Africa and now also Mexico, Central America, and the Caribbean.
|
The Story of the Afghan-Arabs Part Five |
Unknown |
|
jihadi-resources |
From the newspaper Al-Sharq al-Awsat (June 2005). The writer reveals a number of secrets and explains many ambiguities in the activities of the Taliban and Al-Qaeda.
|
The Story of the Afghan-Arabs Part Four |
Unknown |
|
jihadi-resources |
From the newspaper Al-Sharq al-Awsat (June 2005). The writer reveals a number of secrets and explains many ambiguities in the activities of the Taliban and Al-Qaeda.
|
The Story of the Afghan-Arabs Part One |
Unknown |
|
jihadi-resources |
From the newspaper Al-Sharq al-Awsat (June 2005). The writer reveals a number of secrets and explains many ambiguities in the activities of the Taliban and Al-Qaeda.
|
The Story of the Afghan-Arabs Part Six |
Unknown |
|
jihadi-resources |
From the newspaper Al-Sharq al-Awsat (2005). The writer reveals a number of secrets and explains many ambiguities in the activities of the Taliban and Al-Qaeda.
|
The Story of the Afghan-Arabs Part Three |
Unknown |
|
jihadi-resources |
From the newspaper Al-Sharq al-Awsat (June 2005). The writer reveals a number of secrets and explains many ambiguities in the activities of the Taliban and Al-Qaeda.
|
The Story of the Afghan-Arabs Part Two |
Unknown |
|
jihadi-resources |
From the newspaper Al-Sharq al-Awsat (June 2005). The writer reveals a number of secrets and explains many ambiguities in the activities of the Taliban and Al-Qaeda.
|
The Structure of Success: How the Internal Distribution of Power Drives Armed Group Behavior and National Movement Effectiveness |
Peter Krause |
|
terrorism-and-armed-nonstate-actors |
Analysis of seventeen campaigns involving sixteen groups within the Palestinian and Algerian national movements reveals that the power distribution theory explains greater variation in the effectiveness of national movements than previous scholarship. See Tables 1 and 2 for data.
|
The World Bank Governance and Anti-Corruption Data |
|
|
governance-resources |
Data sets from the World Bank Governance group.
|
The World Handbook of Political Indicators IV |
J. Craig Jenkins, Charles Taylor, Marianne Abbott, Thomas V. Maher, Lindsey Peterson |
United States |
governance-resources |
The World Handbook of Political Indicators IV provides a set of country-level measures of contentious politics events in the tradition of the World Handbook of Social and Political Indicators (Taylor and Jodice 1983)and similar event data systems. By “contentious politics,” we mean attempts to bring about or resist political change using actions that step outside the bounds of routine politics and entail uncertainty and negative sanction. In most cases, these events center upon domestic politics and issues; but with the globalization of politics, a growing share of interactions involve international and transnational actors, issues, and targets. World Handbook IV data cover 231 countries and territories using 40 event forms to identify 263,912 events. These data comprise two files: a) a daily file; and b) an annual file. In the daily file, we provide detailed event output (date, location, actor, event form, and target), and the annual file, we provide country-year level counts for individual event forms and conceptually related groupings of event forms (i.e., civil protest, state sanction, state relaxation, and civil and state violence). In addition to the data and the codebook, this website provides documentation on how the events were coded, examples of lead lines for each event form, published and working papers, and the answers to frequently asked questions.
|
The World Justice Project (WJP) Rule of Law Index |
World Justice Project (WJP) |
|
governance-resources |
The World Justice Project (WJP) Rule of Law Index is a quantitative assessment tool designed by the World Justice Project to offer a detailed and comprehensive picture of the extent to which countries adhere to the rule of law in practice.
Factors of the WJP Rule of Law Index include:
Constraints on Government Powers
Absence of Corruption
Open Government
Fundamental Rights
Order and Security
Regulatory Enforcement
Civil Justice
Criminal Justice
(Data is collected for a ninth factor measuring Informal Justice, but it is not used in aggregated scores and rankings. This is due to the complexities of these systems and the difficulties in measuring their fairness and effectiveness in a matter that is both systematic and comparable across countries.)
|
Their Words: The Directory of Armed Non-State Actor Humanitarian Commitments |
|
Switzerland |
terrorism-and-armed-nonstate-actors |
Collected by Geneva Call, an NGO which encourages armed nonstate actors to respect international humanitarian law.
|
Total Economy Database |
The Conference Board |
|
political-economy-resources |
The Total Economy Database™, (TED) is a comprehensive database with annual data covering GDP, population, employment, hours, labor quality, capital services, labor productivity, and Total Factor Productivity for 130 countries in the world. Chinese data is presented in two series, 'China (Alternative)' and 'China (Official)'. The latter is based on official data, while 'China (Alternative)' is from Wu (2014), revised and updated in 2020. TED was developed by the Groningen Growth and Development Centre (University of Groningen, The Netherlands) in the early 1990s, and starting in the late 1990s, it was produced in partnership with The Conference Board. As of 2007, the database was transferred from the University of Groningen to The Conference Board, which has maintained and extended the database since then. In January 2010, the database was extended with a module on sources of growth, including labor quantity and quality, capital services (non-ICT and ICT), and total factor productivity.
|
Transatlantic Trends: Immigration and Leaders |
|
|
polls |
The German Marshall Fund of the United States has a foreign policy poll that shows how leaders' opinions differ from public opinion and a survey of public opinion in North America and Europe on the state of transatlantic relations. Updated to reflect 2020-2022.
|
Treaties in Force (U.S. State Department) |
|
|
american-foreign-policy |
Divided into a bilateral list and a multilateral list, briefly describes all treaties to which the U.S. is a party.
|
Trends in U.S. Military Spending |
Dinah Walker |
United States |
american-politics-resources |
Article by Council on Foreign Relations about U.S. Military Spending through 2014.
|
Triangle Center on Terrorism and Homeland Security (TCTHS) |
|
|
terrorism-and-armed-nonstate-actors |
The Triangle Center on Terrorism and Homeland Security (TCTHS) is a collaborative effort between Duke University, the University of North Carolina at Chapel Hill and RTI International to enhance the understanding of terrorism and the means to combat it. The Terrorism Research Center was created in 2003 to facilitate research on terrorism, extremist violence, and the effectiveness of intervention strategies.
|
U.S. Allies of Convenience, 1945–Present |
Evan N. Resnick |
United States |
american-foreign-policy |
Ending Table of U.S. Allies of Convenience from Strange Bedfellows: U.S Bargaining Behavior with Allies of Convenience by Evan N. Resnick (2010).
|
U.S. Department of State FOIA Website |
|
United States |
american-foreign-policy |
FOIA reading room of declassified State Department records.
|
U.S. Government Data |
|
United States |
american-politics-resources |
The home of the U.S. Government’s open data.
|
U.S. Government Designated Foreign Terrorist Organizations |
|
|
terrorism-and-armed-nonstate-actors |
A list and description of U.S. Government designated foreign terrorist organizations from the State Department.
|
U.S. Naval Institute Proceedings Magazine |
|
United States |
security-resources |
Non-profit forum for discussions of American naval affairs. Membership required for most articles.
|
U.S. Overseas Loans and Grants (USAID) |
USAID |
United States |
american-politics-resources |
The U.S. Agency for International Development (USAID) prepares this report as requested by the Congressional Committees primarily concerned with foreign aid, i.e., the House Committee on Foreign Affairs, the Senate Foreign Relations Committee, the House Committee on Appropriations and the Senate Appropriations Committee. The legislative authority for the report is the Foreign Assistance Act of 1961 (P.L. 87-195), Section 634, as amended.
|
U.S. Security Aid Pivot Table |
Security Assistant Monitor |
|
american-foreign-policy |
A chart of U.S. Security Aid in dollars ($) to nations around the world.
|
U.S. Security Aid Pivot Table |
Security Assistant Monitor |
United States |
security-resources |
A chart of U.S. Security Aid in dollars ($) to nations around the world.
|
U.S. State Department's Country Reports on Terrorism |
|
|
terrorism-and-armed-nonstate-actors |
U.S. law requires the Secretary of State to provide Congress, by April 30 of each year, a full and complete report on terrorism with regard to those countries and groups meeting criteria set forth in the legislation. Data in chronolgical format.
|
UCS Satellite Database |
Union of Concerned Scientists (UCS) |
|
security-resources |
Assembled by experts at the Union of Concerned Scientists (UCS), the Satellite Database is a listing of the more than 2000 operational satellites currently in orbit around Earth. In-depth details on the 2,666 satellites currently orbiting Earth, including their country of origin, purpose, and other operational details. Updated Apr 1, 2020
|
UN Counter-Terrorism Committee |
|
|
terrorism-and-armed-nonstate-actors |
The official website of the UN’s Counter-Terrorism Committee. Hosts documents, resolutions, history, and other information, as well as links to other UN organizations involved in counter-terrorism.
|
UN Human Rights Resources |
|
|
human-rights-resources |
Portal for human rights documents and organizations within the UN system.
|
UN Population Division |
|
|
human-development-resources |
Various population data available, mostly in charts and reports. Provides the latest data available.
|
UN Statistics Division: Social Indicators |
|
|
human-development-resources |
Note: As of 6/15 the page is undergoing revision, but remains accessible.
|
UNDP Human Development Country Report |
|
|
human-development-resources |
|
UNESCO Data Center |
|
|
human-development-resources |
The Data Center contains over 1,000 types of indicators and raw data on education, literacy, science and technology, culture and communication.
|
UNESCO Institute for Statistics: Regional and Country Profiles |
|
|
human-development-resources |
|
UNHCR Refugee Population: Figures at a Glance |
|
|
human-rights-resources |
Refugee population statistical database from the UN High Commissioner on Refugees. Provides the latest data available.
|
UNICEF Statistics |
|
|
human-development-resources |
Reports by country include basic indicators: nutrition, health, HIV/AIDS, education, demographics, economics, women, child protection, rate of progress. Provides the latest data available.
|
United Nations News Service |
|
|
human-development-resources |
https://news.un.org/en/news/topic/health
https://news.un.org/en/news/topic/women
|
United Nations Report on Military Expenditures (MilEx) |
United Nations Department for Disarmament Affairs |
|
security-resources |
The original goal of MilEx—to facilitate reduction of military expenditures—gradually gave way to another important goal: to increase transparency and build confidence among States. If States submit reports every year, MilEx will provide insight on military spending patterns and contribute to increased international trust and security. Self-reporting of military expenditures to the United Nations.
|
United Nations Treaty Collection |
|
|
international-relations-resources |
Includes databases of treaties and international agreements registered or filed and recorded with and published by the Secretariat since 1946.
|
United Nations University (UNU)-WIDER: World Income Inequality Database |
|
|
political-economy-resources |
The UNU-WIDER World Income Inequality Database (WIID) collects and stores information on income inequality for developed, developing, and transition countries.
|
United States Department of Agriculture Economic Research Service |
United States Department of Agriculture (USDA) |
|
climate-resources |
|
United States Institute of Peace |
|
United States |
think-tanks |
The United States Institute of Peace is an independent, nonpartisan, national institution established and funded by Congress. The site includes publications for practitioners, policymakers, and academia (over 400 to date).
|
United They Fall: Why the International Community Should Not Promote Military Integration after Civil War |
Ronald R. Krebs and Roy Licklider |
|
international-relations-resources |
Data set for Krebs, Ronald R., and Roy Licklider, "United They Fall: Why the International Community Should Not Promote Military Integration after Civil War," International Security, Vol. 40, No. 3 (Winter 2015/16), pp. 93–138. These files include the article's supplementary appendix, with supporting data and replication files. (2015-12-08)
|
Uppsala Conflict Data Program |
|
|
interstate-conflict |
Provides up-to-date statistics on armed conflict around the world. Includes a database, datasets, and reports.
|
US-Russia Initiative to Prevent Nuclear Terrorism |
|
|
security-resources |
The US-Russia Initiaitve to Prevent Nuclear Terrorism is a project of the Belfer Center for Science and International Affairs at the Harvard University Kennedy School of Government. "The US-Russia Initiative to Prevent Nuclear Terrorism seeks to increase
|
Varieties of Democracy (V-Dem) Dataset |
University of Gothenburg |
Sweden |
democracy-resources |
The Varieties of Democracy (V-Dem) Research Project takes a comprehensive approach to understanding democratization. This approach encompasses multiple core principles: electoral, liberal, majoritarian, consensual, participatory, deliberative, and egalitarian. Each Principle is represented by a separate index, and each is regarded as a separate outcome in the proposed study. In this manner we reconceptualize democracy from a single outcome to a set of outcomes.
In addition, we break down each core principle into its constituent components, each to be measured separately. Components include features such as free and fair elections, civil liberties, judicial independence, executive constraints, gender equality, media freedom, and civil society. Finally, each component is disaggregated into specific indicators.
This fundamentally different approach to democratization is made possible by the V-Dem Database, which measures 450+ indicators annually from 1789 to the present for all countries of the world.
|
Voice of the People, 2007 |
|
|
polls |
Poll of social and political issues, including democracy, electoral freedom, attitudes toward society, personal political leaning, environment, global influence of major powers, and demographic information. Results from 60 countries
|
Volatility & Risk Predictability Index |
ACLED |
United States |
intrastate-conflict |
The Volatility & Risk Predictability Index supports early warning and risk management by providing practical information for monitoring conflict environments. The index tracks positive deviations (increases) from baseline violence levels to assess the frequency and intensity of conflict surges. Rather than predict conflict rates far into the future with limited applicability, the index evaluates the stability and frequency of the patterns of high and low violence rates in specific areas. The watchlist notes which first-order administrative divisions (e.g. states, provinces, governorates, etc.) are at ‘extreme risk’ of violence. These regions are of greatest concern. Violence rates are calculated using the number of battle events, explosion/remote violence events, violence against civilians events, and riot events, as well as the excessive force against protesters sub-event type of the protest event type, excluding peaceful protest events and protest with intervention events.
|
Voter Education Survey: Pakistan National and Provincial Elections 2007/2008 |
|
|
democracy-resources |
A survey conducted by the Asia Foundation in Pakistan. This is the latest version released.
|
Voter Sex, Party, and Gender-Salient Issues: Attitudes about Sexual Harassment and Brett Kavanaugh in the 2018 Elections |
Michael A Hansen and Kathleen Dolan |
|
american-politics-resources |
Since the election of President Trump and the dawning of the #MeToo movement, gender-salient issues have had a primary place in recent American politics. This was particularly evident in 2018 in the wake of Supreme Court Justice Brett Kavanaugh’s confirmation hearings amid accusations that he has sexually assaulted a classmate. Previous research suggests that women should be more concerned about issues like sexual harassment and mobilized to participate in elections in which these issues are prominent. Yet, American politics has become more polarized in the last 25 years, requiring us to re-examine the impact of gender-salient issues on women’s electoral behavior. Employing data from a 2018 ANES pilot study, we examine the relative impact of gender and party on attitudes toward sexual harassment, Brett Kavanaugh, and participation in the 2018 elections. We find that, while gender plays some role in 2018, partisanship is still the dominant influence in these elections.
|
War and Peace Index |
|
|
polls |
The War and Peace Index is an ongoing public-opinion survey project aimed at systematically tracking the prevailing trends in Israeli public opinion on the regional conflict and its effects on Israeli society. Includes poll results from 1994 to 2007.
|
Washington Institute for Near East Policy |
|
United States |
think-tanks |
U.S. think tank focused on American engagement in the Middle East, committed to strengthening alliances, nurturing friendships, and promoting security, peace, prosperity, and democracy for the people of the region.
|
Water Conflict Chronology |
Pacific Institute |
United States |
climate-resources |
In an ongoing effort to understand the connections between water resources, water systems, and international security and conflict, the Pacific Institute initiated a project in the late 1980s to track and categorize events related to water and conflict, which has been continuously updated since. The database, most recently updated in March 2022, presents the information as a chronology and map.
|
Water-Related Intrastate Conflict and Cooperation (WARICC): A New Event Dataset |
Thomas Bernauer, Tobias Böhmelt, Halvard Buhaug, Nils Petter Gleditsch, Theresa Tribaldos, Eivind Berg Weibust, Gerdis Wischnath |
|
climate-resources |
Water scarcity is widely regarded as a key factor linking climate variability and change with conflict. However, existing research on the water-conflict nexus is hampered by poor data that inhibits drawing firm conclusions on the role of water in shaping societal stability and security. This article reports on the construction of a new dataset on subnational and georeferenced events over domestic water-related cooperation and conflict for 35 countries in the Mediterranean, the Middle East, and the Sahel for 1997–2009.
|
What the Iran-Iraq War tells us about the future of the Iran nuclear deal |
Ariane M. Tabatabai, Annie Tracy Samuel |
|
interstate-conflict |
The data collected for this article came overwhelmingly from Persian-language primary and secondary sources. It also relied extensively on interviews with key Iranian decision-makers and the nuclear negotiating team and was supplemented by English-language sources and scholarship on a variety of issues. When generating the data, we placed great emphasis on the use of Persian-language sources, as the vast majority of scholarship and analysis on Iran’s nuclear program and national security policies relies almost exclusively on English-language secondary sources and press reports. One of the article’s primary goals was to demonstrate that neglect of Iranian sources and perspectives by many scholars and analysts has led to incomplete and inaccurate assessments of the Islamic Republic. As a result, our primary objective was to discuss the two most important security challenges Iran has faced in its contemporary history, the Iran-Iraq War and the nuclear file, by grounding our research in Iranian sources.
|
When Does Aerial Bombing Work? Quantitative Empirical Tests, 1917-1999 |
Dan Reiter; Michael Horowitz |
|
security-resources |
Coercion through air power has been and continues to be an important tool of foreign policy. Multivariate probit analysis is used to test three hypotheses on all instances of air power coercion from 1917 to 1999: (1) air power coercion attempts are more likely to work if they exploit military rather than civilian vulnerabilities, (2) the regime type of the target affects the chances of success, and (3) success is less likely if the attacker demands that the target change its leadership. Results show that coercion is more likely to work if the target's military vulnerability is higher, but higher levels of civilian vulnerability have no effect on the chances of coercion success; that target regime type has no effect; and that success is less likely when the attacker demands the target change its leadership.
|
WHO/UNICEF Joint Monitoring Programme (JMP) for Water Supply and Sanitation |
World Heath Organization (WHO), UNICEF |
|
human-development-resources |
Provides annual statistics (% of rural/urban populations with general/in-home access) on access to improved water and sanitation availability at national, regional, and global levels.
|
Why Factions Switch Sides in Civil Wars Rivalry, Patronage, and Realignment in Sudan |
Lee J.M. Seymour |
Sudan |
intrastate-conflict |
A nested analysis drawing on original data from wars in southern Sudan and Darfur supports this argument. The findings have implications for understanding alignments in civil wars, the role of weak states in counterinsurgency, and ethnic politics more generally, as well as policy relevance for factionalized civil wars.
|
Why Foreign-Imposed Regime Change Seldom Improves Interstate Relations |
Alexander B. Downs and Lindsey A. O'Rourke |
|
international-relations-resources |
This file includes the data necessary to replicate the statistical results and most of the robustness tests in Alexander B. Downes and Lindsey A. O'Rourke, "You Can't Always Get What You Want: Why Foreign-Imposed Regime Change Seldom Improves Interstate Relations," International Security, Vol. 41, No. 2 (Fall 2016), pp. 43–89. (2016-10-05).
|
Woodrow Wilson International Center for Scholars - Digital Archive |
|
United States |
think-tanks |
Declassified American and foreign government archives, organized and annotated thematically in collections.
|
World Bank E-Library |
|
|
political-economy-resources |
Online search portal for over 4,500 World Bank documents. Includes over 1,800 World Bank publications and over 2,700 policy research working papers. Topics covered include: poverty reduction, development, finance, economics, education, legal and judicial
|
World Bank Health, Nutrition and Population Statistics |
|
|
human-development-resources |
Indicators for: population dynamics, nutrition, reproductive health, health financing, immunization, infectious disease, and HIV/AIDS. Data sources: World Bank surveys, major international organizations. Provides the latest information available.
|
World Bank Open Data |
|
|
political-economy-resources |
The database provides free and open data on issues global development.
|
World Database of Happiness |
|
|
human-development-resources |
Wide variety of socio-economic indicators from various sources. Approx. 135 countries covered within past ten years.
|
World Development Indicators |
The World Bank |
|
human-development-resources |
World Development Indicators through August 2020 from the World Bank.
|
World Health Organization Global Health Observatory |
|
|
human-development-resources |
The GHO data repository contains an extensive list of indicators, which can be selected by theme or through a multi-dimension query functionality. It is the World Health Organization's main health statistics repository.
|
World Military Expenditures and Arms Transfers (WMEAT) |
U.S. Department of State |
United States |
international-relations-resources |
The “World Military Expenditures and Arms Transfers” (WMEAT) series of publications is designed to be a convenient reference on annual military expenditures, arms transfers, armed forces, selected economic data, and relative indicators consisting of pertinent military-economic ratios. The aim is to provide the arms control and international security community with useful, comprehensive, and accurate data, accompanied by analyses and highlights.
From its inception in the 1960s until 1999, WMEAT was prepared and published by the U.S. Arms Control and Disarmament Agency, which was absorbed by the Department of State in 1999. Starting with WMEAT 2005, WMEAT is published only online, not in hardcopy.
|
World Military Guide |
|
|
security-resources |
Information on military conflicts and organizational structure easily divided into regions, states, and topics.
|
World News Connection |
|
|
international-relations-resources |
A blog maintained by Pieter Van Ostaeyen that tries to give an objective view of international jihadism.
|
World Nuclear Association Reactor Database |
World Nuclear Assosciation |
|
security-resources |
|
World Population Growth |
Max Roser, Hannah Ritchie and Esteban Ortiz-Ospina |
|
human-development-resources |
|
World Population Prospects 2019 |
United Nations |
|
human-development-resources |
The 2019 Revision of World Population Prospects is the twenty-sixth round of official United Nations population estimates and projections that have been prepared by the Population Division of the Department of Economic and Social Affairs of the United Nations Secretariat. The main results are presented in a series of Excel files displaying key demographic indicators for each UN development group, World Bank income group, geographic region, Sustainable Development Goals (SDGs) region, subregion and country or area for selected periods or dates within 1950-2100.
|
World Public Opinion |
|
|
polls |
Articles present major public opinion survey results worldwide. Generally provides comprehensive reports, few full datasets.
|
World Values Survey |
|
|
polls |
Polls focusing on cultural values. This comprehensive source is commonly cited in social science literature and includes 73 countries (includes Iran, Iraq, Saudi Arabia, Pakistan, Jordan, Egypt, Morocco, Algeria, Indonesia).
|
Worldwide Governance Indicator |
|
|
governance-resources |
Provided by the World Bank. Select an economy and generate charts and tables and have the option of comparing the results with previous years, with regional averages, or with income group averages, as well as have access to underlying individual ratings.
|
Worldwide Incidents Tracking System (WITS) |
|
|
terrorism-and-armed-nonstate-actors |
The NCTC discontinued WITS in 2012. The data became part of the Global Terrorism Database (GTD), which is linked below.
|
Worldwide Political Science Abstracts |
|
|
international-relations-resources |
Provides citations and abstracts of journals in political science and related fields including international relations, law, and public administration/policy. Covers 1975-present. Note: Proquest subscription required.
|
Youth Resilience to Violent Extremism: Development and Validation of the BRAVE Measure |
Grossman |
United States |
terrorism-and-armed-nonstate-actors |
Building resilience to violent extremism has featured in preventing violent extremism efforts for over a decade. Validated and standardized cross-cultural measures can help identify protective capacities and vulnerabilities toward violent extremism for young people. Because drivers for violent extremism are multi-factorial, a measure of resilience cannot be used to predict who will and will not commit acts of terror. Instead, its purpose is to track the multiple forms of capital available to youth at risk of adopting violence to resolve ideological, religious and political grievances, and to use this data to inform interventions that increase young people’s capacity to resist violent extremism’s push and pull forces. In this study, we developed such a measure, using data from 200 Australian and 275 Canadian participants aged eighteen to thirty years old. Following exploratory and confirmatory factor analysis, a fourteen-item measure emerged consisting of five factors: cultural identity and connectedness; bridging capital; linking capital; violence-related behaviors, and violence-related beliefs. The Building Resilience against Violent Extremism (BRAVE) measure was found to have good internal reliability (α = .76), correlating in expected directions with related measures. The BRAVE shows promise for helping understand young people’s resilience to violent extremism.
|
Youth, Emotional Energy, and Political Violence: The Cases of Egypt and Saudi Arabia Survey, 2005 |
|
|
middle-eastern-politics-resources |
Survey explores the sociopolitical and cultural attitudes of young Egyptians and Saudis. Data focus on sources of epistemic authorities, awareness of development ideas, attitudes toward political and social issues, and religiosity.
|