Terrorist Recognition Handbook 344
Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Second Edition | |
author | Malcolm Nance |
pages | 480 |
publisher | CRC |
rating | 10 |
reviewer | Ben Rothke |
ISBN | 978-1420071832 |
summary | Perhaps the definitive text on terrorist recognition. |
The
main theme of the book, as detailed in chapter 1 is
critical
awareness.
The book notes that criminal investigators spend years
studying criminal behavior to better understand and counter
crime. Nance writes that the
field of terrorism is no different as it is a specialized subject that
requires serious study and requires that those in the front line of defense be
as knowledge as possible.
In
a later chapter, Nance gives the Iraq war as an example of a group of leaders
that were not as knowledge as possible and ignored the advice of those that
were as knowledge as possible.
Had the Bush administration consulted Nance, a trillion
dollars and thousands of lives could have been saved in the Iraq
debacle.
The
book is divided into 5 sections comprising 21 heavily-detailed
chapters. Each chapter is a
progression in detailing, understanding and identifying
terrorists. In chapter after
chapter, the book details every aspect of terrorism and indentifies all of the
various elements. The various
aspects of different guns, explosives, and other elements are described and
categorized in detail.
In
the section on suicide bombers, an important point the book makes is that
contrary to popular belief, suicide bombers are rarely
insane. They are most often
intelligent, rational individuals with beliefs that those in the West finds
difficult to comprehend.
Nance does not for a second rationalize the actions of
such groups and individuals.
But notes that it is critical to understand why they do it
in order to prevent future attacks.
Chapter
8 is quite valuable in that it provides a comprehensive overview of how
terrorist cells operate and are organized.
While the cell is the fundamental unit of a terrorist
group; cell operations and their members are the least understood part of
terrorism. Their operations
are always secret and never seen, until they
attack. The chapter details
the many types of terrorist cells, operative membership pools, and how cells
and leadership communicate.
Chapter
19 is a fascinating primer on al-Qaeda and the global extremist
insurgency. The chapter
details how al-Qaeda divides its enemies into two categories:
Far Enemies and Near
Enemies. The terms are taken from the Islamic concept of the
community and those who oppose it.
While the far enemies of al-Qaeda are the USA, Australia,
UK, Europe and Israel, the near enemies are those Moslem's or nations that
al-Qaeda sees as corrupted governments or apostate
rules. These include the
governments of over 20 countries including Saudi Arabia, Egypt, Bangladesh,
India and many more comprising billions of people.
While
the post-9/11 attacks from coalition forces have indeed hurt al-Qaeda and
killed many of its top leaders, Nance notes that al-Qaeda now acts a terror
strategy consultancy. This
transformation of al-Qaeda is in response to the loss of its base of
operations in Afghanistan and the displacement of its leadership to the
Pakistani border.
The most significant
changes were a shift of operational responsibility from the regional terror
commanders, who executed a long awaited plan for jihad operations, to a more
radical and difficult to detect posture: jihadist who were self-starting and
worked independently from al-Qaeda.
The
most significant changes al-Qaeda's structure occurred when it was able to
co-opt the Jordanian Salafist group Tawhed Wal Jihad and organize the foreign
fighters into Iraq into al-Qaeda in Iraq (AQI).
AQI changed the structure of the military committee's
roles dramatically and Iraq would become the cornerstone of al-Qaeda's global
operations. Much of the
invasion of Iraq was premised on a link between Iraq and
al-Qaeda. There was never
such a link, but the war turned into a self-fulfilling prophecy, as al-Qaeda
is now a mainstay in Iraq.
The
book writes that it is important to note that contrary to popular belief,
al-Qaeda is not a single terrorist group, rather a collection of like-minded
organizations that cooperate and receive funds, advice and orders from Osama
bin Laden and his supporters. al-Qaeda has transformed itself from a physical
chain of terrorist training camps to a virtual network that uses the Internet
to create a network centric information and advisory
body. Nance therefore notes
that al-Qaeda has transformed itself from a global terrorism operation into a
terrorism management consultancy.
The 6 main aspects of this
consultancy are that al-Qaeda: provides inspiration, contributes finances,
shares collective knowledge, provides weapons resource and contacts, accepts
responsibility and releases video propaganda.
Besides
a few minor historical errors, some grammatical and punctuation mistakes, and
not a lot of details about cyber-based terrorism,
Terrorist Recognition Handbook: A Practitioner's Manual
for Predicting and Identifying Terrorist Activities is a most
important book in that it avoids all of the hype, politics and bias that come
along with such titles, and simply focuses on its task at hand, to be a field
guide for anti-terrorist and counter-terrorist professionals to use to prevent
attacks.
Such
a title is sorely needed by groups such as the TSA, who still think that
anti-terrorism means having people remove their shoes at
airports. The book notes
that the European approach of guarded vigilance
via a sustained level of anti-terrorism readiness and
awareness is a much better concept than the US approach of spiking to
heightened alert levels.
The
Terrorist Recognition Handbook is a
must-read for anyone tasked with or interested in anti-terrorism
activities. One would hope
that every TSA and Homeland Security manager and employee get a copy of this
monumental reference.
It would change the face of TSA and the Department of
Homeland Security, and might perhaps really enable them to identify
terrorists, and not simply require the elderly to take off their support shoes
at airport checkpoints.
Ben Rothke is the author
of
Computer
Security: 20 Things Every Employee Should
Know.
You can purchase Terrorist Recognition Handbook: A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Second Edition from amazon.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
That's easy (Score:4, Funny)
great (Score:1, Funny)
This is easy! (Score:2, Funny)
Re:The Sad Part (Score:3, Funny)
if you buy that book ... (Score:5, Funny)
Terror Suspect No. 1 Found: (Score:0, Funny)
He is George W. Bush [whitehouse.org].
Re:The Sad Part (Score:3, Funny)
"the subject is white" = allow
"the subject is not white" = deny
Re:just as bad or worse than the RIAA (Score:3, Funny)
If he's drinking this [photobucket.com] look out for car bombs!
this guy [wordpress.com] would have ME calling the Department of Homeland Cowardice in a New York minute! And how about this guy? [theodoresworld.net]
Look at da bomb in that terrorist's [johnseiler.com] hand!
this asshat [punchstock.com] is not a terrorist.
SCARY TERRORIST! [vox.com] ANOTHER SCARY TERRORIST! [collegecandy.com] EVEN SCARIER TERRORIST! [wordpress.com] And OMFG the scariest one of al!!!! [thebestpag...iverse.net]
RUN! RUN! RAISE THE THREAT LEVEL FROM YELLOW TO "SCARED SHITLESS!"
The fact that 40,000 people that die on the American highways every year tells me some of that damned Homeland Security money should go to highway safety improvements. You want to spot a terrorist? Look in a tobacco company boardroom; half a million Americans die every year from cancer.
Terrorism is a tool of the US government to take away Americans' liberties. You, sir, are part of the problem.
Ah, but even more useful... (Score:3, Funny)