Loading data...
0%
Failed to load data
Welcome to the BUGBusters visualization project. Despite decades of counterterrorism efforts, terrorism remains an unresolved issue affecting communities worldwide. This interactive platform raises awareness about terrorism (1970–2020) through clear, focused visual analyses.
We begin with an overview of the total number of terrorist attacks globally, establishing the scale and scope of this phenomenon across decades, and then let you explore three themed categories: Groups, Attacks, and Targets.
Groups: deep insights into major organizations and their patterns over time.
Attacks: analysis of tactics (bombings, armed assaults, assassinations, etc.), casualties and trends.
Targets: who and what are attacked — military, government, civilians, transport and infrastructure — and how preferences change.
To navigate across the temporal dimension, use the timeline slider at the bottom to select specific years or play an animation showing changes over time.
Lastly, all the visualizations are interactive. Hover over elements to see detailed tooltips, and click on items to filter and explore related data across the different views.
The Global Terrorism Database (GTD) is an event-level dataset maintained by the University of Maryland. It contains over 200,000 records of terrorist attacks worldwide, spanning from 1970 to 2020.
Data are collected from multiple open sources. The GTD research team integrates and standardizes them to ensure consistency over time, performing rigorous quality control, retrospective coding, and cross-referencing with other terrorism databases to identify and include missing events.
Each record represents a single terrorist incident and includes detailed information such as the date and location of the attack, type of weapon used, targets and victims, perpetrators, and claims of responsibility. Additional variables describe casualties, outcomes, and data sources. A full codebook and documentation can be found on the GTD website.
During our analysis of the GTD dataset, we identified and processed numerous data columns. Several columns presented significant sparsity and were excluded from our visualizations due to limited utility for our narrative. We strategically created multiple specialized JSON files tailored to each visualization type in our project, extracting only the most relevant features for deeper insights. Despite its comprehensive nature, the GTD dataset proved manageable and didn't present insurmountable technical challenges during our processing pipeline.
Throughout the development of this project, we encountered minimal significant implementation difficulties. Our team successfully managed the data pipeline, developed robust visualizations, and maintained code quality throughout the workflow. The combination of careful planning and agile problem-solving allowed us to work efficiently and deliver a comprehensive, well integrated visualization platform that effectively communicates complex patterns in the GTD data.
The BUGBusters study group is composed of three students enrolled in the Master's Degree in Artificial Intelligence at the University of Genoa, within the Data Visualization course taught by Professor Annalisa Barla.
Luca Ninivaggi
Backend development for category data processing and globe interactions. Technical implementation of category switching and world map navigation functionality.
Isabella Tagliafico
Attacks section visualization and overview module. Contributed to target classification development in collaboration with Flavio.
Flavio Barrara Stefani
Groups section development. Target category implementation in partnership with Isabella.
The year 2013 marked a definitive turning point with the declaration of the Caliphate, triggering an explosion of violence that redefined global terrorism. The group expanded rapidly, maintaining a relentless operational tempo for years. This period defined their dominance until 2017, when the loss of key territories finally broke their momentum.
While their ideology inspired attacks worldwide, the physical heart of the organization remained deeply rooted in the Middle East and North Africa. Iraq served as their primary stronghold and center of gravity, holding the weight of a campaign designed to establish and defend a centralized, territorial state.
To enforce their rule and fight opponents, ISIL utilized a brutal combination of massive bombings and hostage-taking. These tactics were deployed with dual intent: engaging military forces in direct, while targeting private citizens to instill absolute fear and compliance in the population (asymmetric combat).
As the conflict evolved, so did their strategic priorities. The organization constantly oscillated between acting as a militia fighting for territory against police and military forces, and reverting to insurgent terrorism against soft targets. This shift became particularly pronounced around 2018-2019 as their territorial control became weaker.
The defining characteristic of ISIL's campaign was its uncompromising lethality. Operations were rarely designed merely to disrupt; they were intended to destroy. Mass-casualty events became a grim signature of the group, resulting in a disproportionately high fatality ratio compared to other insurgent movements.
The Taliban insurgency represents one of the most sustained conflicts in modern history. The cumulative data reveals a relentless escalation over three decades, with a dramatic intensification after 2005. This surge marked their successful regrouping and the launch of a widespread campaign against coalition forces and the Afghan government.
Unlike global terror networks, the Taliban operated as a localized insurgent force with deep roots in the region. The map highlights the extreme concentration of their operations within Afghanistan and the porous border regions of Pakistan, where they maintained safe havens and logistical support networks.
To counter superior conventional forces, the Taliban relied heavily on asymmetric warfare. The flow of tactics illustrates their primary methods: armed assaults on checkpoints and the widespread use of Improvised Explosive Devices (IEDs). These were strategically directed at Police and Military targets to erode state security infrastructure.
The ranking chart reveals a tactical inconsistency over time, reflecting an opportunistic strategy. Rather than focusing on a single target type, the Taliban frequently shifted their priority between Civilians, Police, and Military forces, adapting their operations based on the vulnerability of targets and the political climate.
The human cost of this insurgency was devastating. While the data shows numerous small-scale skirmishes typical of guerrilla warfare, it also captures a significant number of high-fatality events. These mass-casualty incidents often resulted from coordinated large-scale assaults on military bases or urban centers.
The trajectory of the Shining Path (Sendero Luminoso) is captured by this sharp rise in activity during the 1980s, marking the onset of the "internal armed conflict" in Peru. This period of intense violence came to an abrupt plateau in the early 1990s, following the pivotal capture of their leader, Abimael Guzmán, which effectively decapitated the organization.
Operating almost exclusively within Peru, the group's strategy of "encircling the cities from the countryside" is one the most common ways to describe their operations. The violence was most intense in the impoverished Andean highlands of Ayacucho (their birthplace) and eventually spread to the capital Lima, as they attempted to bring the war to the center of political power.
To paralyze the state, the Shining Path employed a dual tactic of economic sabotage and targeted killing. The data reveals a high volume of bombings directed at Utilities (such as power pylons) to plunge cities into darkness, alongside systematic assassinations of local police and government officials to create a power vacuum.
Throughout the peak of their insurgency in the 1980s and 90s, the group maintained focus on destabilizing infrastructure. "Utilities" and "Government" targets remained consistent priorities, reflecting their doctrine that destroying the economic machinery of the state was a prerequisite for gaining power.
The human cost reflects the brutality of their campaign. While acts of sabotage against infrastructure often resulted in lower direct casualties, many others were massacres of rural communities and targeted assassinations, creating a legacy of violence that claimed tens of thousands of lives.
The red area extending beyond the average visualizes a shockwave. Unlike targeted strikes, explosives saturate the environment, driving metrics to a peak. This tactic trades precision to maximize indiscriminate casualties and economic damage within the blast radius.
This radial timeline illustrates a spiral of escalation. It tells the story of a threat that has evolved from low-frequency incidents into a systemic, high-volume global crisis.
The visualization narrates a definitive strategic shift. The overwhelming density of the red field illustrates how explosives have eclipsed firearms as the primary vector.
The geometry reveals a distinct tactical trade-off. The purple area projects a single spike towards lethality, far exceeding the global benchmark while ignoring material damage. It narrates the shift from property destruction to person-centric violence.
This radial timeline maps the heartbeat of global conflict. Regardless of the metric viewed, the chart reveals a seismic shift in intensity.
This chart mirrors the intimacy of violence. Unlike the remote detachment of explosives, the dominance of the black firearm icons reveals a strategy of direct confrontation.
Assassinations target specific individuals, typically political figures, officials, or community leaders. These attacks are characterized by their precision and intended symbolic impact.
This radial timeline maps the heartbeat of global conflict. Regardless of the metric viewed, the chart reveals a seismic shift in intensity.
The Waffle Chart highlights the stark predominance of firearms in assassination scenarios. This tactical hegemony stems from the operational necessity for discretion and surgical precision—characteristics that make ballistic engagement preferable to the indiscriminate, high-visibility nature of explosives.
Hostage-taking incidents include kidnappings for ransom and barricade situations. These events create prolonged crises with significant psychological impact on victims and communities.
This radial timeline maps the heartbeat of global conflict. Regardless of the metric viewed, the chart reveals a seismic shift in intensity.
This distribution visualizes the mechanics of abduction. The combined dominance of firearms and melee weapons highlights a strategy of forced compliance.
Infrastructure attacks target essential services including power grids, water systems, and transportation networks. These attacks aim to disrupt daily life and undermine government capabilities.
Energy infrastructure, particularly oil and gas facilities, represents high-value targets. Attacks on pipelines and refineries can have significant economic consequences.
The visualization confirms a shift from lethal intent to material damage. The overwhelming prevalence of incendiary devices illustrates a doctrine of capital destruction. The chart tells the story of attacks designed to inflict maximum financial loss and operational downtime
Military and police forces represent the most direct challenge to insurgent groups. Attacks on these targets are strategically designed to undermine state authority, demonstrate operational capability, and demoralize the security apparatus tasked with protecting the population.
In active conflict zones, checkpoints, barracks, and patrols become daily targets. Beyond the symbolic victory, these operations often serve a practical purpose: seizing weapons, ammunition, and equipment to sustain the insurgency's logistical needs.
Government buildings, diplomats, and civil servants are prime targets for organizations seeking to erode public trust in the state. By striking the administrative core of a nation, terrorists aim to paralyze governance and prove that the state cannot protect even its own officials.
Targeted killings of politicians and judges are calculated moves to disrupt the political process and create power vacuums. These high-profile attacks garner extensive media coverage, amplifying the group's message and intimidating those who remain in power.
Attacks on businesses, from local markets to multinational corporations, are designed to inflict economic damage. By disrupting commerce and creating an environment of risk, terrorists aim to deter investment, increase insurance costs, and weaken the national economy.
International brands and hotels often serve as proxies for Western influence or globalization. Striking these targets allows groups to project their ideological grievances onto a global stage, often impacting the tourism and hospitality sectors most severely.
Private citizens bear the heaviest burden of modern terrorism. Attacks on soft targets (public squares, schools, and residential areas) are cynically designed to maximize casualties and instill a pervasive sense of vulnerability across the entire population.
Religious gatherings and community festivals are frequently targeted to incite hate. By attacking specific ethnic or religious groups, terrorists aim to tear the social fabric, provoking retaliation and fueling cycles of communal violence.
Transportation networks are the arteries of modern society. Attacks on trains, buses, and subways cause immediate, widespread disruption to daily life. These high-density targets ensure mass casualties and guarantee significant media attention.
Since the dawn of modern terrorism, aviation has been a coveted target due to its international visibility. While hijackings have decreased due to rigorous security, the threat has evolved toward complex plots involving explosives, driving constant innovation in screening technologies.
We don't support landscape mode on phones. Please rotate your phone to portrait.