Cover image for The terrorist recognition handbook : a manual for predicting and identifying terrorist activities
The terrorist recognition handbook : a manual for predicting and identifying terrorist activities
Nance, Malcolm W.
Personal Author:
Publication Information:
Guilford, Conn. : Lyons Press, [2003]

Physical Description:
320 pages : illustrations ; 26 cm
Part 1. Know the terrorist -- Your mission : critical awareness -- Who they are : identifying the terrorist operative -- "Intelligence profiling" a suspected terrorist -- Terrorist training -- Why the terrorist chooses this path : terrorism -- What the terrorist believes -- Part 2. Identifying the terrorist group and its cells -- Terrorist group organization -- The terrorist cell -- Terrorist strategies and target selection -- Part 3. Detection of key terrorist activities -- Terrorist preparations for attack : safe houses, finances, and mobility -- Terrorist tools : conventional weapons identification -- Nuclear, biological, and chemical weapons : effects and associated equipment identification -- Part 4. Terrorist surveillance techniques -- Detecting infiltration and special mission techniques -- The last chance to stop an attack : the decision and attack sequence -- The basics of analyzing intelligence and predicting terrorism events -- Point of danger : law enforcement traffic stops and encountering terrorists -- The point of failure : terrorist operations and tactics.
Subject Term:
Electronic Access:
Publisher description on/globe031/2003002595.html
Format :


Call Number
Material Type
Home Location
Item Holds
HV6431 .N365 2003 Adult Non-Fiction Non-Fiction Area

On Order



Whether they are acting as a one-person cell, or with a sophisticated global finance and logistics network, terrorists can be members of nearly any race, sex, religion, or political persuasion. But every terrorist operation always has certain characteristics, and the only effective way to identify and prevent terrorists is to observe their behavior and analyze it with an intelligence-based approach. In THE TERRORIST RECOGNITION HANDBOOK, terrorism expert Malcolm Nance shows:

· How terrorist groups are classified and organized
· How intelligence, operations, planning, logistics cells operate
· The key steps every terrorist group always follow
· How to recognize the stages of a terrorist plot
· Known terrorist groups and their tactics
· How and why groups use conventional, biological, and chemical weapons
· How to analyze intelligence with inductive and deductive reasoning

THE TERRORIST RECOGNITION HANDBOOK is the first and only commercially available handbook that debunks the aura of mystery surrounding terrorist activities as it uncovers the terrorists' means, methods, organization, and motivations. It will be an invaluable resource and training guide for police officers, SWAT teams, federal officials, security companies, local water boards, chemical plants, oil refineries, power generating facilities, electrical and telephone utilities, airport facilities, public transportation officials, education officials, journalists, and ordinary citizens.

Author Notes

Malcolm Nance is a former naval intelligence counter-terrorism and intelligence officer. He specializes in the Middle East and speaks fluent Arabic. He is a combat veteran with several areas of expertise. He spent 35 years working in field and combat intelligence activity.

He is a writer whose books include, An End to al-Qaeda: An End to al-Qaeda: Destroying Bin Laden's Jihad and Restoring America's Honor (2010), The Plot to hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election (2016), and The Plot to Destroy Democracy: How Putin and His Spies Are Undermining America and Dismantling the West (2018).

(Bowker Author Biography)

Table of Contents

Prefacep. xi
Acknowledgmentsp. xv
Part 1 Know the Terrorist
1 Your Mission: Critical Awarenessp. 3
Adopt an Intelligence-Based Approach to Antiterrorismp. 4
Avoid a Stereotype-Based Approach to Antiterrorismp. 5
Defensive Action: The Detect, Deter, Defend (3D) Doctrinep. 6
2 Who They Are: Identifying Terrorist Operativesp. 7
If You Know the Terrorists, You Know Their Plansp. 7
Who are Terrorists?p. 8
Classifying Terrorist Operatives by Skills Levelp. 9
Class I The Government-Trained Professionalp. 11
Class II The Religious Extremist Professionalp. 12
Class III The Radical Revolutionary or Quasi-Religious Extremistp. 16
Class IV Guerrilla or Mercenary Soldierp. 19
Class V Amateur (Civilian, Untrained Criminal or Militia-Vigilante)p. 21
3 Intelligence Profiling a Suspected Terroristp. 23
4 Terrorist Trainingp. 29
Terrorist Training Schools and Campsp. 29
Terrorist Combat Trainingp. 30
Pre-Incident Indicators of Terrorist Training or Practicep. 31
Survival and Tradecraft Trainingp. 32
Suicide/Martyrdom Preparationp. 34
5 Why the Terrorist Chooses This Path: Terrorism 101p. 39
What Is Terrorism?p. 39
Definitions of Terrorismp. 39
Are You Capable of Being a Terrorist?p. 42
What Is Not Terrorism?p. 44
Additional Termsp. 45
6 What Terrorists Believep. 47
The Historical Context of Terrorismp. 47
Historical Events That Influenced Today's Terrorismp. 48
Ideologies Terrorists Espousep. 52
Part 2 Identifying the Terrorist Group and Its Cells
7 Terrorist Group Organizationp. 63
Common Characteristics of Terrorist Groupsp. 63
Terrorist Areas of Operationsp. 64
Classifying Terrorist Sources of Supportp. 65
Terrorist Group Structures and Membership: Who Orders Terrorist Acts?p. 65
8 The Terrorist Cellp. 73
Types of Terrorist Cellsp. 73
Operative Membership Poolsp. 74
Terrorist Cell Sizep. 75
How Cells and Leadership Communicatep. 76
Terrorist Command and Control Cellsp. 78
Terrorist Intelligence Cellsp. 78
Terrorist Tactical Operations Cellsp. 81
Terrorist Logistics Cellsp. 82
9 Terrorist Strategies and Target Selectionp. 85
Terrorist Strategiesp. 85
Strategic Objectivesp. 86
Tactical Objectivesp. 87
Misdirection and Deception Strategiesp. 87
Wave Strategiesp. 88
Strategy Execution Time Linesp. 89
Target Selection (T2--Terrorist Targeteering)p. 90
General Target Categoriesp. 91
Specific Target Categoriesp. 92
Part 3 Detection of Key Terrorist Activities
10 Terrorist Preparations for Attack: Safe Houses, Finances, and Mobilityp. 97
Identifying Safe Housesp. 97
Detection of Terrorist Supply Chainsp. 100
Detecting Terrorist Logistics Cellsp. 103
Storage of Suppliesp. 106
Terrorist Transportation and Mobilityp. 108
Computers, Communication, and Intelligence (C2I)p. 112
Secret Communicationsp. 113
Voice Communications Systemsp. 113
Identification of Terrorist Financingp. 114
11 Terrorist Tools: Conventional Weapons Identificationp. 119
Terrorist Weapons Sourcesp. 119
Manual Weapons: Knives, Clubs, and Garrotesp. 120
Explosives and Bomb Componentsp. 121
Handguns: Pistols and Revolversp. 125
Submachine Guns and Machine Pistolsp. 126
Automatic Assault Rifles (Long Rifles)p. 126
Sniper Riflesp. 126
Shotgunsp. 130
Heavy or Light Machine Guns (Crew Served)p. 131
Anti-Tank Rockets and Gunsp. 132
Mortarsp. 134
Surface-to-Air Missiles/Man Portable Air Defense Systems (SAM/MANPADS)p. 136
12 Nuclear, Biological, and Chemical Weapons: Effects and Associated Equipment Identificationp. 139
Chemical and Biological Warfare (CBW) Associated Equipmentp. 139
Chemical or Biological Agent Dispersal Systemsp. 142
Offensive Chemical Weapons (CW)p. 147
Biological Weapons (BW)p. 154
Nuclear-Related WMD Equipment and Componentsp. 166
Part 4 Predicting an Attack
13 Terrorist Surveillance Techniquesp. 173
Will You Come Under Surveillance?p. 173
Who Conducts Surveillance?p. 174
Methods of Surveillancep. 174
Types of Surveillancep. 176
Surveillance Detection Checklistsp. 179
Detecting Surveillancep. 180
14 Detecting Infiltration and Special Mission Techniquesp. 181
Terrorist Operatives: Special Cultural Survival Skillsp. 181
Special Mission Tactics and Techniques: Defeating Border Controls and Customsp. 185
Special Mission Tactics and Techniques: Defeating Airport Controls and Aviation Transportation Securityp. 186
Special Mission Tactics and Techniques: Defeating Maritime Securityp. 189
Special Mission Tactics and Techniques: Defeating High-Value Target Physical Securityp. 193
15 The Last Chance to Stop an Attack: The Decision and Attack Sequencep. 195
16 The Basics of Analyzing Intelligence and Predicting Terrorism Eventsp. 205
People Are Predictable ... So Is Terrorismp. 205
The Basics of Predicting and Preventing Terrorismp. 209
1. Collectp. 209
2. Analyzep. 213
3. Concludep. 231
4. Reportp. 233
5. Respondp. 234
Integration and Interpretation Simulated Case Studyp. 235
17 Point of Danger: Law Enforcement Traffic Stops and Encountering Terroristsp. 239
Terrorists and the Patrol Officerp. 240
Terrorist Intelligence Profiling and the Traffic Stopp. 241
Indicators of Foreign Terror Suspects During the Traffic Stopp. 243
Traffic Stop Indicators and Warning Signs for American Antigovernment Extremists and Terroristsp. 245
Case Studies of Terrorist Traffic Stops Before and After Terrorist Actsp. 247
18 The Point of Failure: Terrorist Operations and Tacticsp. 255
Recognizing the Point of Failurep. 255
Terrrorist Attack Profilesp. 256
Explosives Bombing Attackp. 256
Arson or Fire Attackp. 258
Assassinationp. 258
Light Infantry Weapons Attackp. 260
Armed Raidp. 261
Abduction (Kidnapping, Hostage Taking)p. 262
Barricade or Hostage Barricadep. 263
Human-Guided (Suicide/Martyr) Weapon Attackp. 264
Aviation Attacksp. 267
Maritime Attacksp. 270
Vehicle Commandeering (Hijacking) and Theftp. 273
Industrial and Infrastructure Attackp. 273
Physical Intimidation or Maimingp. 275
Psychological Threatp. 275
Improvised or Offensive Chemical Weapons Attackp. 276
Biological Terror Weapons Attackp. 276
Agro-Terrorist Attackp. 277
Nuclear Systems and Radiological Materials Attackp. 279
Ecological Attackp. 280
Cyberattackp. 281
Appendix A Who and Where They Are: A List of Active Terrorist Groupsp. 283
Appendix B Explosives Components and Ingredients Checklistp. 293
Bomb and Improvised Explosive Device Componentsp. 294
Explosives and Ingredients Identification Checklistp. 294
Quick-Reference Chart: Homemade Explosives Chemical Precursorsp. 296
Comparison Chart: Illicit Drug Precursors (DEA Monitored)p. 298
BATF Vehicle Bomb Explosion Hazard and Evacuation Distance Tablesp. 299
Bibliographyp. 301
Indexp. 309