Study: Attacks, Plots by Homegrown Terrorists in the United States Have Increased

Over the past decade, attacks and plots by homegrown terrorists in the United States have increased, the work of extremists from across the political spectrum -- roughly 40 percent of it by so-called "lone wolf," non-aligned actors -- says an analysis by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) based at the University of Maryland.

The statistics underscore the threat addressed in a White House plan released Thursday: Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in the United States - a blueprint for "building community resilience against violent extremism."

"There have been more than 200 terrorist attacks in the United States since 9/11, but what has really increased is the total number of foiled terrorist plots," says UMD researcher and START director Gary LaFree, who has developed the largest and most comprehensive unclassified terrorism database in the world with funding from the U.S. Department of Homeland Security. "Our researchers have tracked over 100 foiled plots in the past decade. Most of these would be classified as homegrown terrorism."

The new White House plan follows up on a strategy first laid out last August, and discussed at UMD by Secretary of Homeland Security Janet Napolitano in October.

"The facts make it clear - homegrown, violent extremism is not just a problem for other countries," LaFree explains. "The administration plan confronts this reality by providing a strategy that draws heavily on local communities as the key to prevention."

FACT SHEET: VIOLENT EXTREMISM IN THE UNITED STATES

Overall Domestic Terror Stats (from the Global Terrorism Database)

  • Between 2000 and 2010 there were 213 terrorist attacks in the United States. Seventeen of these, including the four 9/11 attacks, were fatal.
  • Since Sept. 11, 2001, 32 people have been killed in terrorist attacks in the United States. The most lethal attack was the 2009 shooting at Ft. Hood in Texas, in which 13 people died.
  • Forty percent of terrorist attacks in the United States since 2000 have involved individuals with no apparent affiliation to a known extremist group. These individuals included adherents of a range of ideologies, including anti-abortion extremists, environmental extremists, White supremacists, and Islamist extremists.
  • Of the attacks in the United States for which perpetrator information is known (73 percent), the groups most frequently launching completed attacks were the Earth Liberation Front (ELF) and the Animal Liberation Front (ALF). High-profile attacks by individuals affiliated with Tehrik-i-Taliban Pakistan (TTP) and al-Qaida in the Arabian Peninsula (AQAP) were successfully foiled.

The Global Terrorism Database is an open-source database including information on more than 98,000 terrorist events around the world from 1970 through 2010. It is currently the most comprehensive unclassified database on terrorist events in the world. For each incident, information is available on the date and location of the incident, weapons used and nature of the target, the number of casualties, and - when identifiable -the group or individual responsible.

Profiles of Islamic Radicalization in North America

START's "Profiles of Islamic Radicalization in North America Database" provides information on 211 individuals known to have radicalized in North America to the point of supporting violence from 1989 to 2011. These homegrown violent extremists started and completed a significant portion of their radicalization in North America, though not all attempted or carried out violence in North America.

  • The vast majority of homegrown Islamist extremists (80 percent) began their radicalization after the events of 9/11 and the subsequent Global War on Terrorism.
  • Nearly half of the identified homegrown Islamist extremists (45 percent) come from a middle class background, and the majority (59 percent) are highly rooted in their host society.
  • At least 24 percent of the individuals included in this study were converts to Islam.

Extremist Crimes

START's "Extremist Crime Database" includes a systematic collection of open-source data on non-violent and violent criminal behavior in the United States associated with far-right extremist groups, far-left extremist groups, and al-Qaida-influenced groups. By developing this database, START researchers have thus far recorded thousands of criminal incidents committed by far-right extremists between 1990 and 2010 and more than one hundred by those inspired by al-Qaida. Data collection on far-left criminal activity is currently underway.

  • More than 345 homicide incidents were committed by at least one far-rightist between 1990 and 2010.
  • Far-rightists killed almost 50 law enforcement officials between 1990 and 2010. These incidents involved federal, state and local police officers, correctional officers, private security guards and one judge.
  • Far-right extremists committed more than 350 "financial schemes" since 1990. Since data collection and coding is ongoing this number will grow.
  • Almost 25 fatal incidents (in which the suspect killed others and/or was killed by police or committed suicide) have been committed by al-Qaida-inspired extremists since 1990.
  • Al-Qaida-inspired extremists committed close to 100 "financial schemes" since 1990.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.