Study: Attacks, Plots by Homegrown Terrorists in the United States Have Increased

Over the past decade, attacks and plots by homegrown terrorists in the United States have increased, the work of extremists from across the political spectrum -- roughly 40 percent of it by so-called "lone wolf," non-aligned actors -- says an analysis by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) based at the University of Maryland.

The statistics underscore the threat addressed in a White House plan released Thursday: Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in the United States - a blueprint for "building community resilience against violent extremism."

"There have been more than 200 terrorist attacks in the United States since 9/11, but what has really increased is the total number of foiled terrorist plots," says UMD researcher and START director Gary LaFree, who has developed the largest and most comprehensive unclassified terrorism database in the world with funding from the U.S. Department of Homeland Security. "Our researchers have tracked over 100 foiled plots in the past decade. Most of these would be classified as homegrown terrorism."

The new White House plan follows up on a strategy first laid out last August, and discussed at UMD by Secretary of Homeland Security Janet Napolitano in October.

"The facts make it clear - homegrown, violent extremism is not just a problem for other countries," LaFree explains. "The administration plan confronts this reality by providing a strategy that draws heavily on local communities as the key to prevention."

FACT SHEET: VIOLENT EXTREMISM IN THE UNITED STATES

Overall Domestic Terror Stats (from the Global Terrorism Database)

  • Between 2000 and 2010 there were 213 terrorist attacks in the United States. Seventeen of these, including the four 9/11 attacks, were fatal.
  • Since Sept. 11, 2001, 32 people have been killed in terrorist attacks in the United States. The most lethal attack was the 2009 shooting at Ft. Hood in Texas, in which 13 people died.
  • Forty percent of terrorist attacks in the United States since 2000 have involved individuals with no apparent affiliation to a known extremist group. These individuals included adherents of a range of ideologies, including anti-abortion extremists, environmental extremists, White supremacists, and Islamist extremists.
  • Of the attacks in the United States for which perpetrator information is known (73 percent), the groups most frequently launching completed attacks were the Earth Liberation Front (ELF) and the Animal Liberation Front (ALF). High-profile attacks by individuals affiliated with Tehrik-i-Taliban Pakistan (TTP) and al-Qaida in the Arabian Peninsula (AQAP) were successfully foiled.

The Global Terrorism Database is an open-source database including information on more than 98,000 terrorist events around the world from 1970 through 2010. It is currently the most comprehensive unclassified database on terrorist events in the world. For each incident, information is available on the date and location of the incident, weapons used and nature of the target, the number of casualties, and - when identifiable -the group or individual responsible.

Profiles of Islamic Radicalization in North America

START's "Profiles of Islamic Radicalization in North America Database" provides information on 211 individuals known to have radicalized in North America to the point of supporting violence from 1989 to 2011. These homegrown violent extremists started and completed a significant portion of their radicalization in North America, though not all attempted or carried out violence in North America.

  • The vast majority of homegrown Islamist extremists (80 percent) began their radicalization after the events of 9/11 and the subsequent Global War on Terrorism.
  • Nearly half of the identified homegrown Islamist extremists (45 percent) come from a middle class background, and the majority (59 percent) are highly rooted in their host society.
  • At least 24 percent of the individuals included in this study were converts to Islam.

Extremist Crimes

START's "Extremist Crime Database" includes a systematic collection of open-source data on non-violent and violent criminal behavior in the United States associated with far-right extremist groups, far-left extremist groups, and al-Qaida-influenced groups. By developing this database, START researchers have thus far recorded thousands of criminal incidents committed by far-right extremists between 1990 and 2010 and more than one hundred by those inspired by al-Qaida. Data collection on far-left criminal activity is currently underway.

  • More than 345 homicide incidents were committed by at least one far-rightist between 1990 and 2010.
  • Far-rightists killed almost 50 law enforcement officials between 1990 and 2010. These incidents involved federal, state and local police officers, correctional officers, private security guards and one judge.
  • Far-right extremists committed more than 350 "financial schemes" since 1990. Since data collection and coding is ongoing this number will grow.
  • Almost 25 fatal incidents (in which the suspect killed others and/or was killed by police or committed suicide) have been committed by al-Qaida-inspired extremists since 1990.
  • Al-Qaida-inspired extremists committed close to 100 "financial schemes" since 1990.

Featured

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.