Study: Attacks, Plots by Homegrown Terrorists in the United States Have Increased

Over the past decade, attacks and plots by homegrown terrorists in the United States have increased, the work of extremists from across the political spectrum -- roughly 40 percent of it by so-called "lone wolf," non-aligned actors -- says an analysis by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) based at the University of Maryland.

The statistics underscore the threat addressed in a White House plan released Thursday: Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in the United States - a blueprint for "building community resilience against violent extremism."

"There have been more than 200 terrorist attacks in the United States since 9/11, but what has really increased is the total number of foiled terrorist plots," says UMD researcher and START director Gary LaFree, who has developed the largest and most comprehensive unclassified terrorism database in the world with funding from the U.S. Department of Homeland Security. "Our researchers have tracked over 100 foiled plots in the past decade. Most of these would be classified as homegrown terrorism."

The new White House plan follows up on a strategy first laid out last August, and discussed at UMD by Secretary of Homeland Security Janet Napolitano in October.

"The facts make it clear - homegrown, violent extremism is not just a problem for other countries," LaFree explains. "The administration plan confronts this reality by providing a strategy that draws heavily on local communities as the key to prevention."

FACT SHEET: VIOLENT EXTREMISM IN THE UNITED STATES

Overall Domestic Terror Stats (from the Global Terrorism Database)

  • Between 2000 and 2010 there were 213 terrorist attacks in the United States. Seventeen of these, including the four 9/11 attacks, were fatal.
  • Since Sept. 11, 2001, 32 people have been killed in terrorist attacks in the United States. The most lethal attack was the 2009 shooting at Ft. Hood in Texas, in which 13 people died.
  • Forty percent of terrorist attacks in the United States since 2000 have involved individuals with no apparent affiliation to a known extremist group. These individuals included adherents of a range of ideologies, including anti-abortion extremists, environmental extremists, White supremacists, and Islamist extremists.
  • Of the attacks in the United States for which perpetrator information is known (73 percent), the groups most frequently launching completed attacks were the Earth Liberation Front (ELF) and the Animal Liberation Front (ALF). High-profile attacks by individuals affiliated with Tehrik-i-Taliban Pakistan (TTP) and al-Qaida in the Arabian Peninsula (AQAP) were successfully foiled.

The Global Terrorism Database is an open-source database including information on more than 98,000 terrorist events around the world from 1970 through 2010. It is currently the most comprehensive unclassified database on terrorist events in the world. For each incident, information is available on the date and location of the incident, weapons used and nature of the target, the number of casualties, and - when identifiable -the group or individual responsible.

Profiles of Islamic Radicalization in North America

START's "Profiles of Islamic Radicalization in North America Database" provides information on 211 individuals known to have radicalized in North America to the point of supporting violence from 1989 to 2011. These homegrown violent extremists started and completed a significant portion of their radicalization in North America, though not all attempted or carried out violence in North America.

  • The vast majority of homegrown Islamist extremists (80 percent) began their radicalization after the events of 9/11 and the subsequent Global War on Terrorism.
  • Nearly half of the identified homegrown Islamist extremists (45 percent) come from a middle class background, and the majority (59 percent) are highly rooted in their host society.
  • At least 24 percent of the individuals included in this study were converts to Islam.

Extremist Crimes

START's "Extremist Crime Database" includes a systematic collection of open-source data on non-violent and violent criminal behavior in the United States associated with far-right extremist groups, far-left extremist groups, and al-Qaida-influenced groups. By developing this database, START researchers have thus far recorded thousands of criminal incidents committed by far-right extremists between 1990 and 2010 and more than one hundred by those inspired by al-Qaida. Data collection on far-left criminal activity is currently underway.

  • More than 345 homicide incidents were committed by at least one far-rightist between 1990 and 2010.
  • Far-rightists killed almost 50 law enforcement officials between 1990 and 2010. These incidents involved federal, state and local police officers, correctional officers, private security guards and one judge.
  • Far-right extremists committed more than 350 "financial schemes" since 1990. Since data collection and coding is ongoing this number will grow.
  • Almost 25 fatal incidents (in which the suspect killed others and/or was killed by police or committed suicide) have been committed by al-Qaida-inspired extremists since 1990.
  • Al-Qaida-inspired extremists committed close to 100 "financial schemes" since 1990.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.