Terrorist Recognition Handbook

Last updated

Terrorist Recognition Handbook
Terrorist Recognition Handbook.jpg
First edition
Author Malcolm Nance
Original titleTerrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities
CountryUnited States
LanguageEnglish
Subject Counterterrorism
Genre Warfare
Publisher The Lyons Press
Publication date
2003
Media typePaperback
Pages439
ISBN 978-1466554573
OCLC 777603223
Preceded by An End to al-Qaeda  
Followed by The Terrorists of Iraq  
Website Official website
[1] [2] [3]

Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities is a non-fiction book about counterterrorism strategies, written by U.S. Navy retired cryptology analyst Malcolm Nance. The book is intended to help law enforcement and intelligence officials with the professional practice of behavior analysis and criminal psychology of anticipating potential terrorists before they commit criminal acts. Nance draws from the field of traditional criminal analysis to posit that detecting domestic criminals is similar to determining which individuals are likely to commit acts of terrorism. The book provides resources for the law enforcement official including descriptions of devices used for possible bombs, a database of terrorist networks, and a list of references used. Nance gives the reader background on Al-Qaeda tactics, clandestine cell systems and sleeper agents, and terrorist communication methods.

Contents

Terrorist Recognition Handbook received two separate book reviews in the academic journal Perspectives on Terrorism . [2] [3] The journal placed the book on its "Top 150 Books on Terrorism and Counterterrorism". [2] Its second review of the book wrote that the Terrorist Recognition Handbook "provides a comprehensive and detailed treatment of terrorism and counter-terrorism." [3] A review published by RSA Conference called it "required reading", and "a must-read for anyone tasked with or interested in anti-terrorism activities." [4] Midwest Book Review rated it "highly recommended for those in charge of security and community library military collections." [5]

Background

Malcolm Nance, author of Terrorist Recognition Handbook Malcolm Nance.jpg
Malcolm Nance, author of Terrorist Recognition Handbook

Malcolm Nance is a retired U.S. Navy Senior Chief Petty Officer in naval cryptology. [6] [7] [8] He garnered expertise within the fields of intelligence and counterterrorism. [9] [10] [11] He served in the U.S. Navy for 20 years, from 1981–2001. [12] [13] Nance was an interpreter for Russian, and began working in the intelligence field through research into the history of the Soviet Union and its spying agency the KGB. [14] He devoted years of research to analyzing Middle East terrorism and sovereign nations with ties to Russia. [14] He graduated from New York's Excelsior College with a degree in Arabic. [15] Nance took part in combat operations which occurred after the 1983 Beirut barracks bombings, was involved with the 1986 United States bombing of Libya, served on USS Wainwright during Operation Praying Mantis and participated in the sinking of Iranian missile boat Joshan, served on USS Tripoli during the Gulf War, and assisted during a Banja Luka, Bosnia air strike. [12]

After retiring from military service, Nance founded a consulting company based in Georgetown, Washington, D.C. where he provided advising services to United States Special Operations Command. [12] During the September 11 attacks, Nance personally witnessed American Airlines Flight 77 crash into The Pentagon and he assisted in rescue operations at the impact site. [12] [13] He created a training center called the Advanced Terrorism, Abduction and Hostage Survival School. [13] Nance manages a think tank analyzing counterterrorism called "Terror Asymmetrics Project on Strategy, Tactics and Radical Ideologies", consisting of Central Intelligence Agency and military intelligence officers with direct prior field experience. [13] [11] Nance is a member of the board of directors for the International Spy Museum in Washington, D.C. [12] Nance's books on counter-terrorism include: The Terrorists of Iraq , [16] An End to al-Qaeda , [17] The Plot to Hack America , [18] Defeating ISIS , [19] and Hacking ISIS. [20]

Summary

The book serves as a manual for counter-terrorism and law enforcement officials to prevent terrorist attacks. [4] It is organized into six sections, covering topics including the motivations and methods of terrorists, warning signs of terrorism, intelligence collection management strategies, post-attack mitigation measures, and weapons used by terrorists, including weapons of mass destruction. [2] [3] [4] Appendix resources include indexes of explosive materials and terrorist groups. [3]

Nance discusses suicide bombers, noting that it is crucial to understand their extremist religious views in order to anticipate their attacks. Nance also covers the modus operandi of terrorist cells which are a key component of terror operations. His analysis includes the different types of cells, as well as their common tactics, communication and recruitment methods. [4]

The book provides background on worldwide extremism ideologies and the operations of al-Qaeda across the world. It explains how al-Qaeda categorizes their targets as "Near Enemies" or "Far Enemies". The former group includes federal bureaucracies in India, Bangladesh, Egypt, and Saudi Arabia. The latter includes Israel, Europe, Australia, and the United States. [4]

Nance emphasizes the splintered nature of al-Qaeda, which operates as a collective of smaller groups inspired by Osama bin Laden, with the Internet serving as a central organizing hub. He observes that where al-Qaeda had previously functioned as a set of terrorist entities, it shaped its operations to become more business-like, serving to disseminate information, motivate members, and provide economic funding for terrorist operations. [2] [3] [4]

Release and reception

The book was first published in 2003. [2] Its third edition was published in 2013 by CRC Press. [21] [22] An e-book edition was released the same year. [23] CRC Press published another release of the third edition of the book, both in print and e-book formats. [24] [25]

Nance's work received a book review from Midwest Book Review , which wrote: "Terrorist Recognition Handbook offers an examination of common and uncommon terrorist tactics – and how to identify an attack before it happens." [5] The review concluded, "Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities is highly recommended for those in charge of security and community library military collections." [5]

Terrorist Recognition Handbook received two separate book reviews in the academic journal Perspectives on Terrorism. [2] [3] The journal placed the book on its "Top 150 Books on Terrorism and Counterterrorism". [2] Joshua Sinai wrote for Perspectives on Terrorism, "Written by a 20-year veteran of the U.S. intelligence community, this book provides an assessment of terrorists’ motivations and methods, including a listing of pre-incident indicators of potential terrorist activity, and the methodologies required to organize such information into actionable intelligence for effective response measures." [2] Sinai wrote of the resources contained within the monograph, "The information is explained through numerous illustrations, including explanations of the types of conventional weapons and weapons of mass destruction that might be used by terrorists." [2] In his second review of the book for Perspectives on Terrorism, Sinai wrote that the book, "provides a comprehensive and detailed treatment of terrorism and counter-terrorism." [3]

Ben Rothke reviewed the book for RSA Conference, and called it "required reading". [4] Rothke praised the author's expertise and writing style, "Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, is unique in that author Malcolm Nance is a 20-year veteran of the U.S. intelligence community and writes from a first hand-perspective, but with the organization and methodology of writers such as Pipes and Emerson. Those combined traits make the book extraordinarily valuable and perhaps the definitive text on terrorist recognition." [4] Rothke's review concluded, "The Terrorist Recognition Handbook is a must-read for anyone tasked with or interested in anti-terrorism activities. One would hope that every TSA and Homeland Security manager and employee get a copy of this monumental reference." [4]

See also

Related Research Articles

Counterterrorism Activity to defend against or prevent terrorist actions

Counterterrorism, also known as anti-terrorism, incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcement, business, and intelligence agencies use to combat or prevent terrorism. Counter-terrorism strategy is a government's plan to use the instruments of national power to neutralize terrorists, their organizations, and their networks in order to render them incapable of using violence to instill fear and to coerce the government or its citizens to react in accordance with the terrorists' goals.

Richard A. Clarke American counter-terrorism expert

Richard Alan Clarke is an American novelist and former government official. He was National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States between 1998 and 2003.

FBI Counterterrorism Division US FBI division

The Counterterrorism Division (CTD) is a division of the National Security Branch of the Federal Bureau of Investigation. CTD investigates terrorist threats inside the United States, provides information on terrorists outside the country, and tracks known terrorists worldwide. In the wake of the September 11, 2001 attacks, CTD's funding and manpower have significantly increased.

Lone wolf attacks, or lone actor attacks, are a particular kind of mass murder, committed in public settings by individuals who plan and commit these violent acts on their own. In the United States, such attacks are usually committed with firearms. In other countries, knives are sometimes used to commit mass stabbings. Although definitions vary, most databases require a minimum of four victims for the event to be considered a mass murder.

Terrorism and mass attacks in Canada includes acts of terrorism, as well as mass shootings, vehicle-ramming attacks, mass stabbings, and other such acts committed in Canada that people may associate with terroristic tactics but have not been classified as terrorism by the Canadian legal system.

Terrorism Research Center

The Terrorism Research Center (TRC) is non-profit think tank focused on investigating and researching global terrorism issues through multi-disciplinary collaboration amongst a group of international experts.

National Counterterrorism Center U.S. government organization responsible for national and international counterterrorism efforts

The National Counterterrorism Center (NCTC) is a United States government organization responsible for national and international counterterrorism efforts. It is based in Liberty Crossing, a modern complex near Tysons Corner in McLean, Virginia. NCTC advises the United States on terrorism.

The Rewards for Justice Program (RFJ) is the counterterrorism rewards program of the U.S. Department of State's Diplomatic Security Service. The Secretary of State is currently offering rewards for information that prevents or favorably resolves acts of international terrorism against U.S. persons or property worldwide. Rewards also may be paid for information leading to the arrest or conviction of terrorists attempting, committing, conspiring to commit, or aiding and abetting in the commission of such acts. The Rewards for Justice Program has paid more than $145 million for information that prevented international terrorist attacks or helped bring to justice those involved in prior acts.

Operation Juniper Shield Counter-terrorism military operation in Central Africa led by the US (2007-present)

Operation Juniper Shield, formerly known as Operation Enduring Freedom – Trans Sahara (OEF-TS), is the military operation conducted by the United States and partner nations in the Sahara/Sahel region of Africa, consisting of counterterrorism efforts and policing of arms and drug trafficking across central Africa. It is part of the Global War on Terrorism (GWOT). The other OEF mission in Africa is Operation Enduring Freedom – Horn of Africa (OEF-HOA).

Malcolm Nance American author, former intelligence officer, and terrorism expert

Malcolm Wrightson Nance is an American author and media pundit on terrorism, intelligence, insurgency, and torture. He is a former United States Navy Senior Chief Petty Officer specializing in naval cryptology.

International counter-terrorism activities of the CIA

After the Central Intelligence Agency lost its role as the coordinator of the entire Intelligence Community (IC), special coordinating structures were created by each president to fit his administrative style and the perceived level of threat from terrorists during his term.

An Afghan training camp is a camp or facility used for militant training located in the central Asian country of Afghanistan. At the time of the September 11, 2001 attacks, Indian intelligence officials estimated that there were over 120 training camps operating in Afghanistan and Pakistan, run by a variety of militant groups. Afghan training camps are not exclusive to any one group. Afghanistan is commonly used by groups such as ISIS and Al-Qaeda.

Michael S. Smith II US counterterrorist

Michael S. Smith II is an American terrorism analyst, specialist in open source intelligence (OSINT), and a consultant in preventing and countering violent extremism. He is also a lecturer at Johns Hopkins University's Global Security Studies program.

<i>Dezinformatsia</i> (book) 1984 non-fiction book

Dezinformatsia: Active Measures in Soviet Strategy is a non-fiction book about disinformation and information warfare used by the KGB during the Soviet Union period, as part of their active measures tactics. The book was co-authored by Richard H. Shultz, professor of international politics at Tufts University, and Roy Godson, professor emeritus of government at Georgetown University.

Clint Watts

Clinton Watts is a senior fellow at the Center for Cyber and Homeland Security at George Washington University and a Foreign Policy Research Institute fellow. He previously was an infantry officer in the United States Army, and was the Executive Officer of the Combating Terrorism Center at United States Military Academy at West Point (CTC). He became a Special Agent for the Federal Bureau of Investigation where he served on the Joint Terrorism Task Force (JTTF). He has consulted for the FBI Counterterrorism Division (CTD) and FBI National Security Branch (NSB).

<i>The Plot to Hack America</i> Non-fiction book by Malcolm Nance

The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election is a non-fiction book by Malcolm Nance about what the author describes as Russian interference in the 2016 United States elections. It was published in paperback, audiobook, and e-book formats in 2016 by Skyhorse Publishing. A second edition was also published the same year, and a third edition in 2017. Nance researched Russian intelligence, working as a Russian interpreter and studying KGB history.

<i>Defeating ISIS</i>

Defeating ISIS: Who They Are, How They Fight, What They Believe is a non-fiction book about counterterrorism against ISIS. It was written by Malcolm Nance, a former cryptology analyst, with a foreword by Richard Engel. Its thesis is that ISIS is not part of Islam, instead, it functions as a separate destructive extremist group. He emphasizes the fact that the majority of those who have been harmed by ISIS are themselves Muslim. The book traces the history of the movement back to the history of Al-Qaeda in Iraq, and it also discusses ISIS's combat style and recruiting tactics. Nance offers a four-point plan to defeat ISIS, including airpower and special forces, Internet tactics, strengthening the Syrian military, and engaging Arab world states.

<i>The Terrorists of Iraq</i> 2014 book by Malcolm Nance

The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003–2014 is a nonfiction book about the Iraqi insurgency, written by U.S. Navy retired cryptology analyst Malcolm Nance. It was published by CRC Press in 2014. The book discusses the terrorist evolution of the Iraqi insurgency which led to the formation of Islamic State of Iraq and the Levant (ISIS). Nance cites the 2003 Iraq war by the Bush Administration for causing regional instability. He criticizes Coalition Provisional Authority leader Paul Bremer. The book emphasizes lessons the U.S. neglected to learn from the Vietnam War, the Iraqi revolt against the British, and the South Lebanon conflict. Nance writes in favor of the Iran nuclear deal framework by the Obama Administration, saying it is in the interests of all parties involved.

<i>An End to al-Qaeda</i> Book by Malcolm Nance

An End to al-Qaeda: Destroying Bin Laden's Jihad and Restoring America's Honor is a non-fiction book about counterterrorism strategies towards al-Qaeda, written by U.S. Navy retired cryptology analyst Malcolm Nance. The book describes how the September 11 attacks changed the traditional Muslim community around the globe. Nance criticizes the approach of the George W. Bush administration, including the verbiage and public presentations used in the War on Terror. The author argues al-Qaeda is not part of Islam but is instead a dangerous religious cult. Nance writes the United States should commit to better education with a public relations campaign to encourage traditional believers in Islam around the world to denounce al-Qaeda.

<i>Final Report of the Task Force on Combating Terrorist and Foreign Fighter Travel</i>

Final Report of the Task Force on Combating Terrorist and Foreign Fighter Travel is a report about counterterrorism and foreign fighters in the Syrian and Iraqi Civil Wars by a bipartisan task force of the United States House Committee on Homeland Security, with a foreword by cryptology analyst and author Malcolm Nance. The work was released by the United States Government Publishing Office in 2015 as an unillustrated committee print, by the United States House Committee on Homeland Security in September 2015 in an illustrated edition, and as a paperback book in 2016 by Skyhorse Publishing. The report discusses United States citizens leaving their country to gain fighting experience in Iraq and Syria on the battlefield. It notes some linked up with the Syrian Civil War in order to attempt to remove Syrian leader Bashar al-Assad from power, later joining ISIS. According to the work, approximately 4,500 from the Western world left their countries to join ISIS, including over 250 American citizens. The report gives thirty-two recommendations to address the problem, including tactics to stop travels of battlefield soldiers to and from their countries of origin, ways to change executive branch policies, and methods to determine which individuals are planning terrorist activities.

References

  1. Govern, Kevin H.; Ave Maria School of Law (April 13, 2009), Renda-Tanali, Irmak; McGee, Sibel (eds.), "Book Review: Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, by Malcolm Nance", Journal of Homeland Security and Emergency Management, 6 (1), doi:10.2202/1547-7355.1571, ISSN   1547-7355, OCLC   4957793059, S2CID   144240026
  2. 1 2 3 4 5 6 7 8 9 10 Sinai, Joshua (2012), "Book Review: Terrorism Bookshelf: Top 150 Books on Terrorism and Counterterrorism", Perspectives on Terrorism, Terrorism Research Initiative and the Center for Terrorism and Security Studies, 6 (2), ISSN   2334-3745, archived from the original on May 28, 2017, retrieved June 10, 2017
  3. 1 2 3 4 5 6 7 8 Sinai, Joshua (2014), "Book Review: 'Counterterrorism Bookshelf' – 23 Books on Terrorism & Counter-terrorism Related Subjects", Perspectives on Terrorism, Terrorism Research Initiative and the Center for Terrorism and Security Studies, 8 (1), ISSN   2334-3745 , retrieved June 10, 2017
  4. 1 2 3 4 5 6 7 8 9 Rothke, Ben (December 28, 2009), "Required reading: The Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities", RSA Conference, EMC Corporation, retrieved June 10, 2017
  5. 1 2 3 "Book Review: The Military Shelf – Terrorist Recognition Handbook", Internet Bookwatch, Midwest Book Review, 18 (7), July 2008, retrieved June 10, 2017
  6. Wolcott, James (March 21, 2017), "5 essential Twitter feeds for keeping up with Trump and Russia", Vanity Fair , retrieved June 7, 2017
  7. Cabanatuan, Michael (May 21, 2017), "Barbara Lee brings John Dean, Malcolm Nance to town hall meeting", San Francisco Chronicle , retrieved June 7, 2017
  8. Concha, Joe (February 18, 2017), "Maher: Russian election influence is worst political scandal in US history", The Hill , retrieved June 7, 2017
  9. Devega, Chauncey (March 14, 2017), "Intelligence expert Malcolm Nance on Trump scandal: 'As close to Benedict Arnold as we're ever going to get'", Salon , retrieved June 7, 2017
  10. Donahue, Joe (January 5, 2017), "Counterterrorism Expert Malcolm Nance", WAMC , retrieved June 7, 2017
  11. 1 2 Hobson, Jeremy (October 12, 2016), "How Hackable Is The Election?", Here and Now, WBUR , retrieved June 7, 2017
  12. 1 2 3 4 5 Lamb, Brian (April 28, 2017), "Q&A with Malcolm Nance", C-SPAN (video), retrieved June 7, 2017
  13. 1 2 3 4 Jones, Layla A. (March 10, 2017), "Philly native is media expert on intelligence", The Philadelphia Tribune , retrieved June 7, 2017
  14. 1 2 Lipkin, Michael (October 10, 2016), "The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election", New York Journal of Books, retrieved June 7, 2017
  15. "Malcolm Nance to present fall 2016 Manatt-Phelps Lecture in Political Science". Iowa State University. August 23, 2016. Retrieved May 28, 2017.
  16. Nance, Malcolm (2014), The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003–2014, CRC Press, ISBN   978-1498706896
  17. Nance, Malcolm (2010), An End to al-Qaeda: Destroying Bin Laden's Jihad and Restoring America's Honor, St. Martin's Press, ISBN   978-0312592493
  18. Nance, Malcolm (October 10, 2016), The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election, Skyhorse Publishing, p. 216, ISBN   978-1510723320
  19. Nance, Malcolm (2016), Defeating ISIS: Who They Are, How They Fight, What They Believe, Skyhorse Publishing, ISBN   978-1510711846
  20. Nance, Malcolm (2017), Hacking ISIS: How to Destroy the Cyber Jihad, Skyhorse Publishing, ISBN   978-1510718920
  21. OCLC   856196239
  22. Nance, Malcolm (2013), Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Third Edition, CRC Press, ISBN   978-1466554573
  23. OCLC   857769665
  24. OCLC   777603223
  25. OCLC   869789587

Further reading