Resources and Collection

To identify and verify suicide attacks, CPOST uses a comprehensive 3-step collection  process followed by a 2-step verification process. Attack data is hand-collected and regularly updated by extensively-trained reseachers. After collection, data is hand-verified by two experienced senior researchers. These researchers scrutinize the data for each individual attack, checking for possible mistakes or updates independently before resolving discrepancies between their findings. Through this process, CPOST is able to constantly provide the most reliable suicide attack data available. For more information on the details of our collection process, please refer to our codebook.

The SAD uses information collected from:

  • Newspapers and newswires

  • Social media (e.g. Twitter and Telegram)

  • Blogs and live maps

  • Militant group websites and publications

  • Martyr videos

CPOST also regularly compares its data to other terrorism databases, including START’s Global Terrorism Database and the South Asia Terrorism Portal in order to insure that our data provides the most comprehensive and verifiable list of suicide attacks in the world.

CPOST takes great measures to ensure inter-coder reliability. In addition to our verification process, coders constantly engage in dialogue concerning circumstances surrounding difficult-to-code attacks. Coders undergo and extensive, multi-day training process before starting work on the database and are under the constant supervision of at least one experienced staff member. Each and every attack is looked at by at least three individual researchers (and often times by more than three). Attacks are frequently unverified and reverified in order to ensure the most up-to-date, reliable coding.