Administering Violence: A Special Project on Violence Targeting Local Officials
Our inaugural special issue examines trends in violence targeting local officials in the European Union, Ukraine, Mexico, Brazil, the Philippines, and South Africa.
Local government officials and administrators — including governors, mayors, councilors, and other civil servants — frequently come under attack by a wide array of armed actors, from cartels waging turf wars in Mexico to Russian occupying forces in Ukraine. In order to better analyze this trend and its impacts around the world, ACLED has launched a new project to systematically track incidents of violence targeting local officials for the first time.
Our inaugural special issue examines trends in violence targeting local officials in the European Union, Ukraine, Mexico, Brazil, the Philippines, and South Africa.
This file contains events classified as violence targeting local government officials with the ‘local administrators’ tag, where 1) violence is used against local officials or administrators; or 2) property owned by (or symbolic of) local government administration is targeted or destroyed. Local officials are understood as administrators who are part of subnational government institutions, from the first-level administration division down to cities, towns, and villages. Examples of local officials are: elected or appointed officials or representatives from subnational state institutions (including former); civil servants, election officials and poll workers, local justice officials, and other local authorities; and relatives of local officials or representatives. The tag also applies to attacks that target property linked to government functions or owned by local officials, including local government buildings, courts, local election centers, and/or adjacent public or private property. For more information, check the methodology note on the ‘local administrators’ tag. Please note differences in time period coverage per country and region. A full list of country-year coverage is available here.
Violence Targeting Local Administrators ( 10 May 2024 )
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.