Terrorist Recognition Handbook
Terrorist Recognition Handbook | |
Author | Malcolm Nance |
---|---|
Original title | Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities |
Country | United States |
Language | English |
Subject | Counterterrorism |
Genre | Warfare |
Publisher | CRC Press |
Publication date | 2013 |
Media type | Paperback |
Pages | 439 |
ISBN | 978-1466554573 |
OCLC | 777603223 |
Preceded by | An End to al-Qaeda |
Followed by | The Terrorists of Iraq |
Website | Official website |
[1][2][3] |
Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities is a non-fiction book about counterterrorism strategies, written by U.S. Navy retired cryptology analyst Malcolm Nance. The book is intended to help law enforcement and intelligence officials with the professional practice of behavior analysis and criminal psychology of anticipating potential terrorists before they commit criminal acts. Nance draws from the field of traditional criminal analysis to posit that detecting domestic criminals is similar to determining which individuals are likely to commit acts of terrorism. The book provides resources for the law enforcement official including descriptions of devices used for possible bombs, a database of terrorist networks, and a list of references used. Nance gives the reader background on Al-Qaeda tactics, clandestine cell systems and sleeper agents, and terrorist communication methods.
Terrorist Recognition Handbook received two separate book reviews in the academic journal Perspectives on Terrorism.[2][3] The journal placed the book on its "Top 150 Books on Terrorism and Counterterrorism".[2] Its second review of the book wrote that the Terrorist Recognition Handbook, "provides a comprehensive and detailed treatment of terrorism and counter-terrorism."[3] A review published by RSA Conference called it "required reading", and "a must-read for anyone tasked with or interested in anti-terrorism activities."[4] Midwest Book Review rated it, "highly recommended for those in charge of security and community library military collections."[5] The work received a book review from Kevin H. Govern of the Ave Maria School of Law published in the Journal of Homeland Security and Emergency Management.[1]
Background
Malcolm Nance is a retired U.S. Navy Senior Chief Petty Officer in naval cryptology.[6][7][8] He garnered expertise within the fields of intelligence and counterterrorism.[9][10][11] He served in the U.S. Navy for 20 years, from 1981–2001.[12][13] Nance was an interpreter for Russian, and began working in the intelligence field through research into the history of the Soviet Union and its spying agency the KGB.[14] He devoted years of research to analyzing Middle East terrorism and sovereign nations with ties to Russia.[14] He graduated from New York's Excelsior College with a degree in Arabic.[15] Nance took part in combat operations which occurred after the 1983 Beirut barracks bombings, was involved with the 1986 United States bombing of Libya, served on USS Wainwright during Operation Praying Mantis and participated in the sinking of Iranian missile boat Joshan, served on USS Tripoli during the Gulf War, and assisted during a Banja Luka, Bosnia air strike.[12]
After retiring from military service, Nance founded a consulting company based in Georgetown, Washington, D.C. where he provided advising services to United States Special Operations Command.[12] During the September 11 attacks, Nance personally witnessed American Airlines Flight 77 crash into The Pentagon and he assisted in rescue operations at the impact site.[12][13] He created a training center called the Advanced Terrorism, Abduction and Hostage Survival School.[13] Nance manages a think tank analyzing counterterrorism called "Terror Asymmetrics Project on Strategy, Tactics and Radical Ideologies", consisting of Central Intelligence Agency and military intelligence officers with direct prior field experience.[13][11] Nance is a member of the board of directors for the International Spy Museum in Washington, D.C.[12] Nance's books on counter-terrorism include: The Terrorists of Iraq,[16] An End to al-Qaeda,[17] The Plot to Hack America,[18] Defeating ISIS,[19] and Hacking ISIS.[20]
Contents summary
Terrorist Recognition Handbook is organized to give the reader an analysis of what drives terrorists to commit violent crimes, and how to detect them beforehand. The book provides an itemized grouping of tells that could indicate a terrorist in the act of planning a crime, and the strategy for how to group the collected intelligence on such individuals for intelligence reporting.[2][3][4] Nance goes over ways to reduce the negative impact from potential incidents of terrorism. The author illustrates his points with charts and describes weapons of mass destruction and the more easily obtainable weapons of terror used by suspects.[2][3][4]
The book is primarily designed for use by counterterrorism and law enforcement officials. Terrorist Recognition Handbook is structured into six main sections of information and resources. Appendix resources include explanations of combustible materials, a reference to existing terrorist networks, and a list of works cited. Nance's main thesis throughout the work is that law enforcement officials must remain vigilant for potential terrorist activities. He compares and contrasts the field of counterterrorism to ordinary criminal prevention, noting that in both cases law enforcement officials should become experts on developing awareness of commons behavior patterns of suspects.[2][3][4]
Nance provides a discussion on suicide attacks, and stresses that in most cases those who commit suicide by bombing other individuals are generally not psychotic in nature. He emphasizes that these individuals are for the most part logical and smart people with extremist religious viewpoints. While not attempting to explain their acts, Nance notes it is crucial to comprehend terrorists' thought processes so that law enforcement officials may attempt to anticipate them. The book goes over common tactics used by clandestine cell systems and sleeper agents. Nance notes such organizations are a key component to terror operations, and require additional study. He gives forth an analysis of different types of clandestine cell systems, explaining common methodologies, covert communication methods, and from where they recruit their agents.[2][3][4]
The book grounds the reader in background material about worldwide extremism ideologies and the operations of al-Qaeda across the world. Nance explains that al-Qaeda examines their targets from a perspective of distance, breaking them into groups of those close and distant. The author notes close targets of al-Qaeda include federal bureaucracies in India, Bangladesh, Egypt, and Saudi Arabia. Distant targets include Israel, Europe (and the United Kingdom), Australia, and the United States.[2][3][4]
Nance emphasizes the splintered nature of al-Qaeda, and points out that it is in fact operating as a collective of smaller groups inspired by Osama bin Laden. The author warns of the power of the Internet as used by terrorists for recruitment and communication. He observes that where al-Qaeda had previously functioned as a set of terrorism criminal entities, it shaped its operations to become more like a business. Nance cites key business elements to al-Qaeda and ways it serves as a central organizing hub for splinter groups globally, that include: use of videos and audio recordings of Osama bin Laden, beheading videos, and martyrdom videos, serving as a central repository of information, giving armament materials to followers, motivating each other, and providing economic funding for terrorist operations.[2][3][4]
Release and reception
The book was first published in 2003.[2] Its third edition was published in 2013 by CRC Press.[21][22] An e-book edition was released the same year.[23] CRC Press published another release of the third edition of the book, both in print and e-book formats.[24][25]
Kevin H. Govern of the Ave Maria School of Law wrote a book review for the work, published in the Journal of Homeland Security and Emergency Management.[1] Nance's work received a book review from Midwest Book Review, which wrote: "Terrorist Recognition Handbook offers an examination of common and uncommon terrorist tactics – and how to identify an attack before it happens."[5] The review concluded, "Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities is highly recommended for those in charge of security and community library military collections."[5]
Terrorist Recognition Handbook received two separate book reviews in the academic journal Perspectives on Terrorism.[2][3] The journal placed the book on its "Top 150 Books on Terrorism and Counterterrorism".[2] Joshua Sinai wrote for Perspectives on Terrorism, "Written by a 20-year veteran of the U.S. intelligence community, this book provides an assessment of terrorists’ motivations and methods, including a listing of pre-incident indicators of potential terrorist activity, and the methodologies required to organize such information into actionable intelligence for effective response measures."[2] Sinai wrote of the resources contained within the monograph, "The information is explained through numerous illustrations, including explanations of the types of conventional weapons and weapons of mass destruction that might be used by terrorists."[2] In his second review of the book for Perspectives on Terrorism, Sinai wrote that the book, "provides a comprehensive and detailed treatment of terrorism and counter-terrorism."[3]
Ben Rothke reviewed the book for RSA Conference, and called it "required reading".[4] Rothke praised the author's expertise and writing style, "Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, is unique in that author Malcolm Nance is a 20-year veteran of the U.S. intelligence community and writes from a first hand-perspective, but with the organization and methodology of writers such as Pipes and Emerson. Those combined traits make the book extraordinarily valuable and perhaps the definitive text on terrorist recognition."[4] Rothke's review concluded, "The Terrorist Recognition Handbook is a must-read for anyone tasked with or interested in anti-terrorism activities. One would hope that every TSA and Homeland Security manager and employee get a copy of this monumental reference."[4]
See also
- List of books about al-Qaeda
- Arab Spring
- Iraq War
- Islam and violence
- Islamic extremism
- Islamic fundamentalism
- Islamic terrorism
- Muslim attitudes toward terrorism
- Syrian Civil War
- War in Afghanistan (2001–2014)
- War in Afghanistan (2015–present)
References
- 1 2 3 Govern, Kevin H.; Ave Maria School of Law (April 13, 2009), Renda-Tanali, Irmak; McGee, Sibel, eds., "Book Review: Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, by Malcolm Nance", Journal of Homeland Security and Emergency Management, 6 (1), ISSN 1547-7355, OCLC 4957793059, doi:10.2202/1547-7355.1571, retrieved June 10, 2017
- 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Sinai, Joshua (2012), "Book Review: Terrorism Bookshelf: Top 150 Books on Terrorism and Counterterrorism", Perspectives on Terrorism, Terrorism Research Initiative and the Center for Terrorism and Security Studies, 6 (2), ISSN 2334-3745, retrieved June 10, 2017
- 1 2 3 4 5 6 7 8 9 10 11 Sinai, Joshua (2014), "Book Review: 'Counterterrorism Bookshelf' – 23 Books on Terrorism & Counter-terrorism Related Subjects", Perspectives on Terrorism, Terrorism Research Initiative and the Center for Terrorism and Security Studies, 8 (1), ISSN 2334-3745, retrieved June 10, 2017
- 1 2 3 4 5 6 7 8 9 10 Rothke, Ben (December 28, 2009), "Required reading: The Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities", RSA Conference, EMC Corporation, retrieved June 10, 2017
- 1 2 3 "Book Review: The Military Shelf – Terrorist Recognition Handbook", Internet Bookwatch, Midwest Book Review, 18 (7), July 2008, retrieved June 10, 2017
- ↑ Wolcott, James (March 21, 2017), "5 essential Twitter feeds for keeping up with Trump and Russia", Vanity Fair, retrieved June 7, 2017
- ↑ Cabanatuan, Michael (May 21, 2017), "Barbara Lee brings John Dean, Malcolm Nance to town hall meeting", San Francisco Chronicle, retrieved June 7, 2017
- ↑ Concha, Joe (February 18, 2017), "Maher: Russian election influence is worst political scandal in US history", The Hill, retrieved June 7, 2017
- ↑ Devega, Chauncey (March 14, 2017), "Intelligence expert Malcolm Nance on Trump scandal: 'As close to Benedict Arnold as we’re ever going to get'", Salon, retrieved June 7, 2017
- ↑ Donahue, Joe (January 5, 2017), "Counterterrorism Expert Malcolm Nance", WAMC, retrieved June 7, 2017
- 1 2 Hobson, Jeremy (October 12, 2016), "How Hackable Is The Election?", Here and Now, WBUR, retrieved June 7, 2017
- 1 2 3 4 5 Lamb, Brian (April 28, 2017), "Q&A with Malcolm Nance", C-SPAN (video), retrieved June 7, 2017
- 1 2 3 4 Jones, Layla A. (March 10, 2017), "Philly native is media expert on intelligence", The Philadelphia Tribune, retrieved June 7, 2017
- 1 2 Lipkin, Michael (October 10, 2016), "The Plot to Hack America: How Putin’s Cyberspies and WikiLeaks Tried to Steal the 2016 Election", New York Journal of Books, retrieved June 7, 2017
- ↑ "Malcolm Nance to present fall 2016 Manatt-Phelps Lecture in Political Science". Iowa State University. August 23, 2016. Retrieved May 28, 2017.
- ↑ Nance, Malcolm (2014), The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003–2014, CRC Press, ISBN 978-1498706896
- ↑ Nance, Malcolm (2010), An End to al-Qaeda: Destroying Bin Laden's Jihad and Restoring America's Honor, St. Martin's Press, ISBN 978-0312592493
- ↑ Nance, Malcolm (October 10, 2016), The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election, Skyhorse Publishing, p. 216, ISBN 978-1510723320
- ↑ Nance, Malcolm (2016), Defeating ISIS: Who They Are, How They Fight, What They Believe, Skyhorse Publishing, ISBN 978-1510711846
- ↑ Nance, Malcolm (2017), Hacking ISIS: How to Destroy the Cyber Jihad, Skyhorse Publishing, ISBN 978-1510718920
- ↑ OCLC 856196239
- ↑ Nance, Malcolm (2013), Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Third Edition, CRC Press, ISBN 978-1466554573
- ↑ OCLC 857769665
- ↑ OCLC 777603223
- ↑ OCLC 869789587
Further reading
- Nance, Malcolm (October 10, 2016), The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election, Skyhorse Publishing, p. 216, ISBN 978-1510723320
- Nance, Malcolm (2016), Defeating ISIS: Who They Are, How They Fight, What They Believe, Skyhorse Publishing, ISBN 978-1-510-71184-6.
- Nance, Malcolm (2014), The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003–2014, CRC Press, ISBN 978-1498706896
- Nance, Malcolm (2010), An End to al-Qaeda: Destroying Bin Laden's Jihad and Restoring America's Honor, St. Martin's Press, ISBN 978-0312592493
- Combating Terrorist and Foreign Fighter Travel task force of the U.S. House Homeland Security Committee; Nance, Malcolm (foreword) (2016), Final Report of the Task Force on Combating Terrorist and Foreign Fighter Travel, Skyhorse Publishing, ISBN 978-1510712386
- Nance, Malcolm (2017), Hacking ISIS: How to Destroy the Cyber Jihad, Skyhorse Publishing, ISBN 978-1510718920