Cover: Exploring Patterns of Behaviour in Violent Jihadist Terrorists

Exploring Patterns of Behaviour in Violent Jihadist Terrorists

An analysis of six significant terrorist conspiracies in the UK

Published Jul 12, 2011

by Lindsay Clutterbuck, Richard Warnes

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 0.6 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.1 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them.

The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation".

These findings open up the possibility of identifying through their behaviour individuals and groups engaged in the planning and preparation of a terrorist attack, thus allowing such attacks to be prevented or disrupted before they can be implemented. However, additional refinement and testing will be necessary to identify substantive "signal indicators" of potential use to police and security forces.

Research conducted by

The research described in this report was prepared for the Airey Neave Trust and conducted by RAND Europe.

This report is part of the RAND technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.