Skip to main content
Log in

Developing an early screening guide for jihadi terrorism: A behavioural analysis of 30 terror attacks

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

This study seeks to develop a screening guide for jihadi terrorism with the intention of streamlining the huge amounts of raw intelligence into smaller amounts of data for further analysis. On the basis of the authors’ collective experience in dealing with terrorists, and a review of the literature and pre-attack indicators developed by law enforcement agencies worldwide, 53 features of jihadi terrorism belonging to three domains (behaviour ideology, group psychology and operational preparatory) were identified. These features were then mapped against 30 jihadi attacks from different parts of the world. The frequency distribution of each feature across the 30 attacks were analysed using Pearson’s χ 2 test. Three significant features were identified: (i) individuals pushing for terrorist ideals through violence; (ii) individuals showing a desire for revenge; and (iii) the presence of a leader figure who espouses terrorist ideology. Results further revealed that features from the behaviour-ideology domain had higher prevalence estimates across the 30 attacks. Recommendations are made for operationalising these features as a potential early screening guide for the interpretation of data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2

Similar content being viewed by others

References

  • Bandura, A. (2004) The role of selective moral disengagement in terrorism and counterterrorism. In: F.M. Moghaddam and A.J. Marsella (eds.) Understanding Terrorism: Psychosocial Roots, Causes and Consequences. Washington DC: American Psychological Association, pp. 121–150.

    Chapter  Google Scholar 

  • Baxter, P. and Jack, S. (2008) Qualitative case study methodology: Study design and implementation for novice researchers. The Qualitative Report 13(4): 544–559.

    Google Scholar 

  • BBC. (2002) Bali bombing ‘mastermind’ named. British Broadcasting Corporation News 17 November, http://news.bbc.co.uk/2/hi/asia-pacific/2485279.stm, accessed 21 December 2010.

  • Bjørgo, T. and Horgan, J. (2009) Leaving Terrorism Behind: Individual and Collective Disengagement. New York: Routledge.

    Google Scholar 

  • Borum, R. (2004) Psychology of Terrorism. Tampa, FL: University of South Florida.

    Google Scholar 

  • Borum, R. (2011) Radicalization into violent extremism I: A review of social science theories. Journal of Strategic Security 4(4): 7–36.

    Article  Google Scholar 

  • Bunker, R.J. (2005) Suicide (Homicide) Bombers: Part 1 (Training Key #581). Washington DC: International Association of Chiefs of Police.

    Google Scholar 

  • Centre for Human Rights and Global Justice. (2006) Irreversible Consequences: Radical Profiling and Lethal Force in the War on Terror. New York: New York University School of Law.

  • Christmann, K. (2012) Preventing Religious Radicalisation and Violent Extremism: A Systematic Review of the Research Evidence. London: Youth Justice Board.

    Google Scholar 

  • Clutterbuck, L. and Warnes, R. (2011) Exploring Patterns of Behaviour in Violent Jihadist Terrorists. Santa Monica, CA: RAND Corporation.

    Google Scholar 

  • Cole, J. and Cole, B. (2009) Martyrdom: Radicalisation and Terrorist Violence among British Muslims. London: Pennant Books.

    Google Scholar 

  • Cole, J., Alison, E., Cole, B. and Alison, L. (2010) Guidance for Identifying People Vulnerable to Recruitment into Violent Extremism. Liverpool, UK: University of Liverpool, School of Psychology.

    Google Scholar 

  • Cragin, R.K. (2014) Resisting violent extremism: A conceptual model for non-radicalisation. Terrorism and Political Violence 26(2): 337–353.

    Article  Google Scholar 

  • Cragin, K., Chalk, P., Daly, S.A. and Jackson, B.A. (2007) Sharing the Dragon’s Teeth: Terrorist Groups and the Exchange of New Technologies. Santa Monica, CA: RAND Corporation.

    Google Scholar 

  • Dean, G. (2014) Neurocognitive Risk Assessment for the Early Detection of Violent Extremists. New York: Springer.

    Book  Google Scholar 

  • Edward, R. (2008) Terror suspects’ ‘limitless ambition’. The Scotsman 5 April, http://thescotsman.scotsman.com/latestnews/Terror-suspects39-39limitless-ambition39.3951153.jp, accessed 21 December 2010.

  • Eidelson, R.J. and Eidelson, J.I. (2003) Dangerous ideas: Five beliefs that propel groups toward conflict. American Psychologist 58(3): 182–192.

    Article  Google Scholar 

  • European Commission’s Expert Group on Violent Radicalisation. (2008) Radicalisation Processes Leading to Acts of Terrorism. Report prepared for the European Commission.

  • Field, A. (2005) Discovering Statistics Using SPSS. 2nd edn. London: Sage Publications.

    Google Scholar 

  • Gartenstein-Ross, D. and Grossman, L. (2009) Homegrown Terrorists in the U.S. and U.K.: An Empirical Examination of the Radicalisation Process. Washington DC: Foundation for Defense of Democracies.

    Google Scholar 

  • Ghosh, B. and Graff, J. (2004) A strike at Europe’s heart. Time 14 March, http://www.time.com/time/world/article/0,8599,2050314,00.html, accessed 21 December 2010.

  • Güss, C.D., Tuason, M.T. and Teixeira, V.B. (2007) A cultural-psychological theory of contemporary Islamic martyrdom. Journal for the Theory of Social Behaviour 37(4): 415–445.

    Article  Google Scholar 

  • Gunaratna, R. (2005) Ideology in Terrorism and Counter Terrorism: Lessons from Combating Al-Qaeda and Al Jemaah Al Islamiyah in Southeast Asia. CSRC Discussion Paper 05/42.

  • Horgan, J. (2005) The Psychology of Terrorism. New York: Routledge.

    Book  Google Scholar 

  • Horgan, J. (2008) From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The Annals of the American Academy of Political and Social Science 618(1): 80–94.

    Article  Google Scholar 

  • International Crisis Group. (2006) Terrorism in Indonesia: Noordin’s Networks. Jakarta, Indonesia: International Crisis Group. Asia Report No 114.

  • Jackson, B.A., Baker, J.C., Cragin, K., Parachini, J., Trujillo, H.R. and Chalk, P. (2005) Aptitude for Destruction, Volume 1: Organisational Learning in Terrorist Groups and its Implications for Combating Terrorism. Santa Monica, CA: RAND Corporation.

    Google Scholar 

  • Kebbell, R.M. and Porter, L. (2012) An intelligence assessment framework for identifying individuals at risk of committing acts of violent extremism against the West. Security Journal 25(3): 212–228.

    Article  Google Scholar 

  • Kleinmann, S.M. (2012) Radicalization of homegrown Sunni militants in the United States: Comparing converts and non-converts. Studies in Conflict & Terrorism 35(4): 278–297.

    Article  Google Scholar 

  • Koschade, S. (2006) A social network analysis of Jemmah Islamiyah: The applications to counterterrorism and intelligence. Studies in Conflict and Terrorism 29(6): 559–575.

    Article  Google Scholar 

  • Kossowska, M., Trejtowicz, M., de Lemus, S., Bukowski, M., Van Hiel, A. and Goodwin, R. (2011) Relationships between right-wing authoritarianism, terrorism threat, and attitudes towards restrictions of civil rights: A comparison among four European countries. British Journal of Psychology 102(2): 245–259.

    Google Scholar 

  • Kumar, R. (2004) Democratisation of Hate: The Spread of Al Qaedaism. RSIS Commentaries (17/04). S. Rajartnam School of International Studies. Singapore: Nanyang Technological University.

  • LaFree, G. and Dugan, L. (2009) Research on terrorism and countering terrorism. Crime and Justice 38(1): 413–477.

    Article  Google Scholar 

  • Locicero, A. and Sinclair, S.J. (2008) Terrorism and terrorist leaders: Insights from developmental and ecological psychology. Studies in Conflict & Terrorism 31(3): 227–250.

    Article  Google Scholar 

  • Marquise, R. (2008) Terrorist threat indicator. The Counter Terrorist 1(3): 24–32.

    Google Scholar 

  • Martin, G. (2013) Understanding Terrorism: Challenges, Perspectives, and Issues, 4th edn. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Mascini, P. (2006) Can the violent jihad do without sympathizers? Studies in Conflict & Terrorism 29(4): 343–357.

    Article  Google Scholar 

  • Mccartan, L.M., Masselli, A., Rey, M. and Rusnak, D. (2008) The logic of terrorist target choice: An examination of Chechen rebel bombings from 1997–2003. Studies in Conflict & Terrorism 31(1): 60–79.

    Article  Google Scholar 

  • McCauley, C. and Moskalenko, S. (2008) Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence 20(3): 415–433.

    Article  Google Scholar 

  • McIntosh, D.N. (1995) Religion-as-schema, with implications for the relation between religion and coping. The International Journal for the Psychology of Religion 5(1): 1–16.

    Article  Google Scholar 

  • Mullins, S. (2009) Parallels between crime and terrorism: A social psychological perspective. Studies in Conflict & Terrorism 32(9): 811–830.

    Article  Google Scholar 

  • Neo, L.S., Khader, M., Ang, J., Ong, G. and Quek, J. (2013) Identifying individuals radicalised via the internet: An exploratory risk assessment analysis. Paper presented at the Asian Conference of Criminal & Operations Psychology (ACCOP), 20–23 May, Singapore.

  • Newman, G.R. and Lynch, M.J. (1987) From feuding to terrorism: The ideology of vengeance. Contemporary Crises 11(3): 223–242.

    Article  Google Scholar 

  • Pedahzur, A. (2005) Suicide Terrorism. Malden, MA: Polity.

    Google Scholar 

  • Post, J.M., Ruby, K.G. and Shaw, E.C. (2002) The radical group in context: 1. An integrated framework for the analysis of group risk for terrorism. Studies in Conflict & Terrorism 25(2): 73–100.

    Article  Google Scholar 

  • Post, J.M., Sprinzak, E. and Denny, L.M. (2003) The terrorists in their own words: Interviews with 35 incarcerated middle Eastern terrorists. Terrorism and Political Violence 15(1): 171–184.

    Article  Google Scholar 

  • Pressman, D.E. (2009) Risk Assessment Decisions for Violent Political Extremism. Ottawa: Public Safety Canada.

    Google Scholar 

  • Radlauer, D. (2007) Virtual communities as pathways to Extremism. In: B. Ganor, K.V. Knop and C. Duarte (eds.) Hypermedia Seduction for Terrorist Recruiting. Washington DC: IOS Press, pp. 67–75.

    Google Scholar 

  • Roberts, K. and Horgan, J. (2008) Risk assessment and the terrorist. Perspectives on Terrorism 2(6): 3–9.

    Google Scholar 

  • Sageman, M. (2004) Understanding Terror Networks. Philadelphia, PA: University of Pennsylvania Press.

    Book  Google Scholar 

  • Sageman, M. (2008) Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia, PA: University of Pennsylvania Press.

    Book  Google Scholar 

  • Shelley, L. (2002) The nexus of organized international criminals and terrorism. International Annals of Criminology 20(1–2): 85–92.

    Google Scholar 

  • Sheppard, B. (2009) The Psychology of Strategic Terrorism: Public and Government Responses to Attack. New York: Routledge.

    Google Scholar 

  • Silber, M.D. and Bhatt, A. (2007) Radicalization in the West: The Home Grown Threat. New York: NYPD.

    Google Scholar 

  • Silke, A. (ed.) (2004) An introduction to terrorism research. In: Research on Terrorism: Trends, Achievement and Failures. London: Frank Cass, pp. 1–29.

    Chapter  Google Scholar 

  • Singapore Ministry of Home Affairs. (2003) White Paper: The Jemaah Islamiyah Arrests and the Threat of Terrorism. Singapore: Author.

  • Smith, B.L., Damphousse, K.R. and Roberts, P. (2006) Pre-Incident Indicators of Terrorist Incidents: The Identification of Behavioral, Geographic, and Temporal Patterns of Preparatory Conduct. Washington DC: US Department of Justice, National Institute of Justice.

    Google Scholar 

  • Stankov, L., Higgins, D., Saucier, G. and Knežević, G. (2010) Contemporary militant extremism: A linguistic approach to scale development. Psychological Assessment 22(2): 246–258.

    Article  Google Scholar 

  • Tan, E. (2006) Road to Radicalisation: A Psychological Analysis of the Jemaah Islamiyah Group and its Members. Singapore: Ministry of Home Affairs, Home Team Behavioural Sciences Centre. Research Report No. 01/2006.

  • Taylor, M. (1991) The Fanatics: A Behavioural Approach to Political Violence. London: Brassey’s.

    Google Scholar 

  • Teddlie, C. and Yu, F. (2007) Mixed methods sampling: A typology with examples. Journal of Mixed Methods Research 1(1): 77–100.

    Article  Google Scholar 

  • Tetlock, P.E. (1998) Social psychology and world politics. In: D.T. Gilbert, S.T. Fiske and G. Lindzey (eds.) Handbook of Social Psychology. New York: McGraw-Hill, pp. 866–912.

    Google Scholar 

  • United States Department of State. (2014) Country Reports on Terrorism 2013. Washington DC: United States Department of State Publication.

  • Wilner, A.S. and Dubouloz, C. (2011) Transformative radicalization: Applying learning theory to Islamist radicalization. Studies in Conflict & Terrorism 34(5): 418–438.

    Article  Google Scholar 

  • Yin, R.K. (2014) Case Study Research: Design and Methods. 5th edn. Thousand Oaks, CA: Sage.

    Google Scholar 

Download references

Acknowledgements

The views expressed in this article are the authors’ only and do not represent the official position or view of the Ministry of Home Affairs, Singapore. The authors would like to thank Professor Mark Kebbell of Griffith University for his comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Loo Seng Neo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Neo, L., Khader, M., Ang, J. et al. Developing an early screening guide for jihadi terrorism: A behavioural analysis of 30 terror attacks. Secur J 30, 227–246 (2017). https://doi.org/10.1057/sj.2014.44

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2014.44

Keywords

Navigation