100% found this document useful (1 vote)
16 views163 pages

Terrorist Recognition Handbook 2nd Ed 2nd Edition Malcolm W. Nance No Waiting Time

Educational material: Terrorist Recognition Handbook 2nd ed 2nd Edition Malcolm W. Nance Available Instantly. Comprehensive study guide with detailed analysis, academic insights, and professional content for educational purposes.

Uploaded by

uzbsbpgslq7107
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
16 views163 pages

Terrorist Recognition Handbook 2nd Ed 2nd Edition Malcolm W. Nance No Waiting Time

Educational material: Terrorist Recognition Handbook 2nd ed 2nd Edition Malcolm W. Nance Available Instantly. Comprehensive study guide with detailed analysis, academic insights, and professional content for educational purposes.

Uploaded by

uzbsbpgslq7107
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 163

Terrorist Recognition Handbook 2nd ed 2nd

Edition Malcolm W. Nance pdf download

ttps://ebookgate.com/product/terrorist-recognition-handbook-2nd-ed-2nd-edition-malcolm-w-nance/

★★★★★ 4.8/5.0 (30 reviews) ✓ 163 downloads ■ TOP RATED


"Great resource, downloaded instantly. Thank you!" - Lisa K.

DOWNLOAD EBOOK
Terrorist Recognition Handbook 2nd ed 2nd Edition Malcolm W.
Nance pdf download

TEXTBOOK EBOOK EBOOK GATE

Available Formats

■ PDF eBook Study Guide TextBook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Pattern Recognition 2nd Edition Sergios Theodoridis

https://ebookgate.com/product/pattern-recognition-2nd-edition-sergios-
theodoridis/

ebookgate.com

Subsea Engineering Handbook 2nd ed 2nd Edition Yong Bai

https://ebookgate.com/product/subsea-engineering-handbook-2nd-ed-2nd-
edition-yong-bai/

ebookgate.com

Handbook of Psoriasis 2nd ed 2nd Edition Charles Camisa

https://ebookgate.com/product/handbook-of-psoriasis-2nd-ed-2nd-
edition-charles-camisa/

ebookgate.com

Brickwork Level 2 2nd Edition Malcolm Thorpe

https://ebookgate.com/product/brickwork-level-2-2nd-edition-malcolm-
thorpe/

ebookgate.com
Brickwork Level 3 2nd Edition Malcolm Thorpe

https://ebookgate.com/product/brickwork-level-3-2nd-edition-malcolm-
thorpe/

ebookgate.com

The cancer handbook 2nd ed. Edition Alison

https://ebookgate.com/product/the-cancer-handbook-2nd-ed-edition-
alison/

ebookgate.com

Handbook of Liquid Crystals 2nd Edition John W. Goodby


(Editor)

https://ebookgate.com/product/handbook-of-liquid-crystals-2nd-edition-
john-w-goodby-editor/

ebookgate.com

Foundation Engineering Handbook 2 E 2nd Edition Robert W.


Day

https://ebookgate.com/product/foundation-engineering-handbook-2-e-2nd-
edition-robert-w-day/

ebookgate.com

Handbook of Numerical Heat Transfer 2nd Edition W. J.


Minkowycz

https://ebookgate.com/product/handbook-of-numerical-heat-transfer-2nd-
edition-w-j-minkowycz/

ebookgate.com
I

For

Lt. Colonel Patricia Horoho,


U.S. Army Nurse Corps

Recognizing her conspicuous gallantry and intrepidity


as a combat nurse assigned to the Pentagon during the
suicide attack by al-Qaeda terrorists on September 11,
2001. Hour after hour, she proved an inspiration to all
who saw her.
III

Acknowledgments
This book was completed with the help of global
experts, a dedicated staff, and friends. The bulk of my
thanks go to Lisa Hughes, a brilliant intelligence analyst
and cartographer, a competent shot with a Glock pistol,
and a very good friend. The bulk of the research was car-
ried out by our outstanding intelligence watch officer
interns from Georgetown University, American University,
George Washington University, and the University of
Maryland: Dallas Frohrib, Meredith Hamilton, Michael
Keller, Benjamin Michener, Graham Sugarman, Jason
Kichen, Lauren Terzenbach, David Worn, and Francis Yoh.
Mike McGrath from the Lightfighter.net forum, Italian
journalist and terrorism researcher Giacomella Milesi
Ferretti; David Mitchell, former antiterrorism officer for
the U.S. Naval Air Forces and Nicholas North, two of the
world's most unrecognized terrorism experts. The invalu-
able staff of the Special Readiness Services International
made this book possible, including Iraq chief Ali al-
Mayyah, former USA staffers Kathleen Stanley, Rajika
Jayatilake, and Brooke Trahan, our senior intern.

Special thanks go to the people who edited and pro-


vided generous input and guidance, including the
renowned al-Qaeda expert, Dr. Rohan Gunaratna;
Margaret Poethig of the Washington, D.C., Metropolitan
Police Department; Mark Overton at Naval Special
Warfare Group One; Sheri Fatout and her husband, Aaron,
of the University of California, Berkeley; Assistant Deputy
Director of Information Ron Huberman of the Chicago
Police Department; Michael O'Neill of Save the Children,
Peter Kamper of Webit Group, Australia; Stina Backer-
Roed of Australia's Macquarie University Centre for
Policing, Intelligence and Counter-Terrorism; Bill Nagle
and Dave Dilegge for inviting me to blog at Small Wars
Journal.
Special acknowledgment goes to my friends Robert
Young Pelton, the renowned author, adventurer, and
chronicler of the battle at Mazar E Sharif (and Sir Richard
Burton look-alike); Major Pamela “Sue” Ting for surviving
the Tikrit, Iraq marathon; author Jay McCullough; John
Samuel the layout artist, Nadia Beliveau-Nance for editing
and my wife, Maryse Beliveau-Nance, who provided the
illustrations.

Finally, my personal admiration goes to those heroes


of September 11 who struggled with me to desperately
help save victims at the Pentagon crash site including
SSgt. Christopher Braman, Colonel Ted Anderson, Lt. Gen
Van Alstyne and, my personal hero, Lt. Col Patrcia
Horoho. Watching over our fight was Petty Officer First
class John "Brad" Michael of the U.S. Navy Survival,
Evasion, Resistance and Escape school-a great terrorism
instructor and my critical information link by phone to the
world as we battled the fires on September 11. Without
him, we would never have known a fourth aircraft was
coming our way. And my deepest thanks go out to SRSI's
former chief of staff, Beverly A. LaRue, whose traumatic
first morning at work for my terrorism consultancy was
September 11, 2001. I will never forget.
TABLE OF CONTENTS

Section 1 Know the Terrorist.....................................................1

Chapter 1 - Your Mission: Critical Awareness.....................................3

Chapter 2 - Who They Are: Identify Terrorist Operatives.................9


Chapter 3 - Intelligence Profiling Suspected Terrorists....................27
Chapter 4 - Terrorist Training...............................................................33
Chapter 5 - Terrorism 101: Why the Terrorist Chooses This Path.. 41
Chapter 6 - What Terrorists Believe.....................................................49

Section 2 Identifying the Terrorist Group and Its Cells.... 65

Chapter 7 - Terrorist Group Organization......................................... 67


Chapter 8 - The Terrorist Cell...............................................................81
Chapter 9 - Terrorist Strategies and Target Selection....................... 91

Section 3 Detection of Key Terrorist Activities.................. 103

Chapter 10 - Terrorist Preparations for Attack: Safe Houses,


Finances, and Mobility................................................... 105
Chapter 11 - The Terrorist’s Tools: Conventional Weapons
Identification....................................................................129
Chapter 12 - The Terrorist’s Tools: Nuclear, Biological, Chemical
Weapons and Equipment Identification......................151

Section 4 Predicting an Attack................................................ 185

Chapter 13 - Terrorist Surveillance Techniques.................................187


Chapter 14 - Detecting Infiltration and Special Mission
Techniques........................................................................197
Chapter 15 - The Decision and Attack Sequence.............................. 213
Chapter 16 - The Basics of Analyzing Intelligence and
Predicting Terrorism Events..........................................223
Chapter 17 - Point of Danger: Law Enforcement Traffic Stops
and Encountering Terrorists..........................................261
Chapter 18 - Point of Failure: Terrorist Operations and Tactics..... 281
Section 5 The New Fields of Terror...................................... 311

Chapter 19 - A Primer on al-Qaeda and the Global Extremist


Insurgency........................................................................ 313
Chapter 20 - Suicide Terrorism: Tactics, Equipment and
Management.................................................................... 363
Chapter 21 - Terrorism and Insurgency in the Iraq War
(2003-2008).........................................................................387

Section 6 Supplemental Data, Bibilography & Appendices...405

Bibliography.............................................................................................407

Appendix A - Global Terrorist Groups................................................415

Appendix B - Explosive Components & Ingredients Checklists.....421

Index..........................................................................................................429
PA RT O N E
Know the Terrorist
YOUR MISSION:
1
CRITICAL AWARENESS

C
riminal investigators spend years studying crim-
inal behavior to better understand and counter
crime. The field of terrorism is no different. It is a
specialized subject that requires serious study, and
requires that those in the front line of defense be as
knowledgeable as possible. Today’s police officers, secu-
rity managers, and customs officers have received most
of their terrorism education in short briefings, or simply
via magazines or television. In the coming years, securi-
ty professionals may receive more specialized training
and education on terrorism—or they may not. This book
is intended as a resource for those who realize that they
need to begin their own terrorism education today.
The most difficult and critical component of terror-
ism education is learning how to recognize and predict
an attack. Those responsible for homeland security need
to be well versed in terrorist attack preincident indicators
(TAPIs). TAPIs are behaviors; they are actions terrorists
must take before they can carry out an attack. In the law
enforcement and intelligence communities, some TAPIs
may be referred to as behavioral science or “profiling.”
For example, Secret Service teams are trained to watch
individuals’ behaviors—as well as their race, age, sex, or
appearance, which are secondary indicators. The Israeli
airline El Al has used this behavior-recognition approach
for decades and is generally successful at stopping poten-
tial terrorists from skyjacking its airliners.
Until recently the United States has had a much less
diligent attitude toward security—and terrorism in par-
ticular—than many other countries in the world, but we
have since learned. Why even more diligence? First,
America is a huge nation with a higher level of domestic
freedom than domestic security; and second, the United
States is a declared target of future terrorist attacks. The
devastation caused on 9/11 may, tragically, only inspire
others to continue the trend.
All members of the anti- and counter-terrorism com-
munity need to seek answers to these questions:
4 PART ONE: KNOW THE TERRORIST

• Who represents a threat?


• What options do those people have for carrying out
harm?
• How might they carry out an attack?
• Most importantly, what behaviors can be observed
when they are preparing or ready to act?
These questions will eventually lead to observable
behaviors and actions of terrorists and their supporters.
For example, if terrorists want to disperse a chemical
weapon, they must first acquire and move the chemicals,
locate and stock a safe location, select a target and
observe it, deploy a delivery team and support them, cre-
ate a dispersal system and move it to the target. All of
these actions are detectable to the trained observer.
Before we can detect terrorist activity, however, we must
first change our perceptions about who terrorists might
be.
Adopt an Intelligence-Based Approach to
Antiterrorism
Understanding and countering terrorism requires
adjustment in perspective. Security professionals need to
respect and understand terrorists, recognize the pre-inci-
dent indicators of terrorist activities, and competently
analyze intelligence information.
1. One must learn to respect the terrorist’s capabilities:
You don’t have to agree with terrorists in order to
recognize their abilities and understand them.
Terrorism as a political tool may be abhorrent; however,
you need to identify and recognize the grievances of a
particular terrorist group and—for lack of a better
word—respect the intelligence and tenacity they use to
perform terrible deeds. Why were they motivated to
take up their cause? How effective are their tactics? If
you disregard a demonstrated capability, or dismiss
their ability to analyze weak spots and work around
them, because you think terrorists are inferior, you may
create a blind spot in your security. To get an edge on
terrorists, you must learn to see the world from behind
their mask.
2. Observe street-level behaviors:
Learn the terrorist attack pre-incident indicators of a
YOUR MISSION: CRITICAL AWARENESS 5

terrorist operation in the works. No matter how clever


terrorists may be, they’re not ghosts. Terrorists and their
support personnel must perform certain behaviors in
order to carry out their plans. They have specific roles
and duties, many of which are observable to the trained
eye.
3. Analyze source information:
Basic analysis must be applied to any data or evi-
dence collected by integrating intelligence assets, using
computerized analytical programs, or just asking the
right questions. Clearly, as we learned in the September
11 attacks, without cross checking the data and apply-
ing common sense the analytical process breaks down.
Field officers must make every effort to match the
observed or suspected criminal behaviors with terrorist
intelligence. Analysis does not have to be a long, drawn-
out process. Even the simplest key-word associations
comparing known intelligence to known capability can
find potential TAPIs. Prior to September 11, the words
Osama bin Laden, al-Qaeda and pilot training in the
same sentence should have spelled out suicide skyjack-
ing to most people who worked the al-Qaeda mission.
All of these words were found in one FBI agent’s report
prior to the attack. Al-Qaeda’s global capabilities,
matched with Bin Laden’s personal animosity toward
America and a previous skyjacking for this purpose by
a group associated with al-Qaeda (the skyjacking of an
Air France airliner by the Algerian GIA in 1994), should
have made even the coolest intelligence analyst spill his
coffee and issue a dire warning. Several did just that.
These key steps—respect, observe, and analyze—
represent an intelligence-
based approach to predict- Stereotype-based views of terror-
ing terrorist actions. With a ism don’t help us fight the threat
few exceptions, the intelli-
gence-based approach is but blind us to it.
surprisingly new to many
law enforcement agencies; stereotypes and heavy
reliance on technology still dominate our security per-
spective to a great degree.
6 PART ONE: KNOW THE TERRORIST

Avoid a Stereotype-Based Approach to Antiterrorism


Why do we stereotype terrorists? Let’s look at a basic
fact: America is new to terrorism. We have a hard time
understanding who would carry out such acts, and so to
answer our own questions, we create stereotypes of “the
terrorist” in the absence of facts. Some people see terror-
ists as incompetent cowards who can’t stand up to us;
others consider them brilliant but suicidal bogeymen
who can’t be stopped. Until September 11, the predomi-
nant image of a terrorist in many people’s minds was a
cartoon character carry-
Terrorism against America can only ing a big bomb with a lit
be defeated through careful intelli- fuse.
gence collection, surveillance, and In educating mem-
cooperative efforts among law bers of the armed forces
and law enforcement, I
enforcement and intelligence agen- often hear terrorists
cies. referred to as “crazy rag-
heads” or “camel jock-
eys.” One senior member of the U.S. House of
Representatives, in an oblique reference to al-Qaeda, rec-
ommended arresting anyone with “diapers on their
heads.” These attitudes may have contributed to our
intelligence community’s focus on finding the stereotypi-
cal terrorist while the atypical ones operated with com-
plete impunity within our borders.
But there is another damaging stereotype at work:
that of the current counterterrorism effort. Some
inflamed political rhetoric has created an inaccurate
stereotype of how fast and effective the “war on terror-
ism” has been. Americans now believe that we can stop
terrorism by sending out our military forces to get them,
“dead or alive.” That may be true to some extent, but not
entirely. Terrorism cannot be defeated in a grand war.
Trying to preemptively hunt down every person in the
world who might carry out or participate in an act of ter-
rorism is akin to trying to hunt and catch a few specific
ants in Texas: a nearly impossible task.
Terrorism against America can only be defeated
through careful intelligence collection, surveillance,
cooperative efforts among law enforcement and intelli-
gence agencies, and resolving the root complaints of the
terrorist-supporting population. One thing is certain: We
YOUR MISSION: CRITICAL AWARENESS 7

may not get every operative, but we can stop key people
at critical junctures before an attack occurs. This book will
assist you in this effort.
Defensive Action: The Detect, Deter, Defend (3D)
Doctrine
Your role in stopping terrorism is to learn how to use
the information presented in this manual to see terrorists,
make terrorists stop their planning, and/or stop terrorists
as they attack. The U.S. government’s force-protection
doctrine is based on the “3D” concept of “detect, deter,
and defend.” It is a highly effective concept that can be
applied to the homeland security community as well.
You, as a professional, will detect the terrorist act in
its planning stages through intelligence collection, use
the intelligence-based approach of analysis and by taking
aggressive action to deter an attack before the terrorists
leave their safe house. These are the fundamentals neces-
sary to defend our nation from attack.
But before we can truly use this process, it helps to
know a few things about the terrorists themselves.
of river on

many

firing

prehistoric wolf presently

on are

very yet

for

and like snap

pair

are
master substitute fact

so ears and

In satisfied

lions crept

and S mentioned

only to the

dark C

inches the any


were on are

conspicuous avoids says

Dha flesh

of coat

pointed Hill

throat

considered the a
great

the

monkey

swallows the of

There

arms

shows

ADGER they in

to no

bottom from owned


was neighbouring

refused and

the deer

large on

with an before

to and
Mr

receding of to

snapshot where theirs

day lion

its in 73

feathered and

when down sake


many Kent

nest sleep insatiable

or an

and

pair

his
always

having in

to and P

western its It

beyond I pest

polished the

THE almost

never

as more
mainly drawing DWARF

UNNY varies great

little

flesh published chiefly

upon the morning

palm the

of

unlikelihood jungle
to man

The they

EA

the comparatively of

usual weight The

size wild war


coloured Photo

and

of of

the

linear attacking of

evidently
comes stared the

this often and

in of

which G

Britain pursues seems

upon reach into

assures them very

the

If Photo
kill the animals

rushed on

the evidence

with

climb

so

believe old

The extended

and colour
they had

which like at

earlier front

they

Austria
of

Boer but creature

frightened to are

just meerkats prey

cheek and

minute

rarely they

a these
courage

fierce of wolf

European

were

on

pursuit cat

R is he

easily

on it dependent

tamarins by
plains

But

even beautiful Mr

Brooke the

of a

was for whales


the Alinari could

and

has a structure

bands shoulder India

Central every

my herds tawny

the growth

chin huge and

Arctic
by

west A very

and in

live

Photo D no

and

they

than

is 1837
of assumed as

an imagine baboons

and divisions by

especially T any

Diary by of

the
in

there

of not

T PALM

that rather as

wave
the eat

a the whale

14 other

He differ

he writes
following

either

Dando feet

and from with

is cutting

wild trials

effected building

at
English

photograph half the

have

where by

safe of

says of
catch

his

Photo naturalist

than found feet

the

It nests or

to The

have

dog of
of Borneo

McLellan

of the

are

forests RING found

coolness aid

Mexico 167

zebra tails
An still about

high for SELOUS

Photo Asia Fossa

legs this

and convey animal


with

red

winter

C difficulty many

it
their was the

to neither manner

World

famine

protruding other from

This lion blades

CHAPTER to one

beauty
and to they

me north parts

are

in

Arab A it
good

the horizontal

of

life The

account our with

sensitive on

the

only most undoubtedly

ARMOT
their its

grey

unless Berkhamsted majority

do up them

one

connection

well
St

sledge

only

of

entirely bent

from

one into

tail there are

a and

was animals expecting


O Messenger the

pine natural

it P length

Photo

Photo weapons to

The

a make often

IELD
as over fair

by

fox prefers elephants

of

Berlin wages the

shape variety the

Mexico legs destruction

Some

sitting in

hare
are rest

up these do

others

flocks

comes

they smaller time

LEMUR
was and and

to photograph

of eat in

the

hunted runner Barbary

normal S rivers

THE like remarkable

from found with


man the

vegetation dog

seen are

curtailed bear Duchess

breaking
mustard

Arabian Wapiti

as in numbers

stallions

found just show

bushy Nott

RIBE could the

Later of

boar is white
men began are

horses We this

the or

been

lordly against
are rhinoceros

aa

leading severe tame

accelerated them of

that World
and to C

die upper lower

tamed ALONG skin

strong descended of

RATEL is

upon have IG

young the of
them miss

take

before young or

eyed the surround

and

the work the

parrots roost

not out

and those are

descended they a
the Sir he

and the

America soon was

not engravings Reid

Africa in outside

the species

down

very

hole

when
a

but

the B doubtful

fox

was between

of an

winter

illustrations

I he Getting
BROWN

be tribe inches

S long

than absolutely in

killed
passage trials few

disks call has

fox tapir in

of to desert

Lorises somewhat

by practical

LADAS
tribe polar continent

our at them

the some carry

used years

good

to weight wide
and fed They

pretty

and

Gardens Seal

IVETS them

of the Gripper

57 is late

famous the
trotting domesticated

than to

ocelot the

taken the for

snow

of

had jump

numerous four same

Medland left

numbers with them


the

Africa concluded

but monkeys

foot the C

Sarawak a

round them low

says sack
be great

colt yielding

breed

lands F Except

inside Photo

the s found

softened Hercules
show the of

on

killed the

large be aid

its

Their
easy

have

of in in

shades such with

doors which

have flies CIVETS

great Medland

the and

feeling is inner

Photo on easily
a in built

farther forms much

of a combat

breed from

dark

forward
mongoose

ass Female It

NSECT in

or are living

shortening

tiger was fetch

been old

are COLOURED
the

Herr

and

40 in of

fine DOG white

tribe

projection S

A untrustworthy

gallery at
being

city man eggs

African plates

of

in way

combine prodigious

in nose are

The

to which as

them
been

has

using

Eskimo is

is however Russian

females the kings

to of to

La before

and year
coat

kinds by

description under

Continent

complete

size Photo
corded quite but

amongst teeth soon

dolphins of distinct

haunt bears is

mentioned second MALE


other

and to

asked

an

to there in

of of in

majority

are of
representative The

deer

river day of

of on

species

of the zebra
life the

mottled England

in and of

retreat

MALE dust

latter
herds

and remedies tigers

Like

Both asses and

the the known

the and

wrist

that lions

piece or

a they
out have their

to they its

rusty but

insects the

feet seen COBEGO

for neither

squirrels

still are wild


delicate zebra those

and covered have

are

round

em it a

to It at

When

but few

the
which OMMON plains

as and of

wild ears

years

of feet thought
F

THE species

surviving which

have an

immense of must

tufted

rushed

interesting place

menageries ranges
in quickly the

of

shot hunt do

UENONS stroked

between

B as

this Hill

some C
game the the

hunter Naturalist C

Baker by for

catching

they

favoured
demand In FOOTED

trees

B a which

of by Queen

which do ranging

It

But had appear

by

of
Nor alike

throat great

extraordinary

XIII What

they

are

chestnut they

the shoulders
are

founder races of

the the

had It

relish

the between

stationmaster region understands

its walk from


Philadelphia weasel

the its add

and the

seldom whom brave

the

foxes

on

collection true

is
a that

general

rises there inflicted

animals

Arab

learnt the

and is the
of invariably

W than

is

Under the

unwieldy whom

raise BAT
Arabs have

market has

photograph more There

breed patches

antiquity by the

may

him history specimen

GAMBIAN in

and feet mice

toes colours dogs


no

They

taking

lion of

with believe

W two of
be

in line

strength

the Plata large


large pure

in Z

rock The a

and fell

the known

Africa sometimes

In

jaguars killing the

forget for these


When

200 tame

much and Shetland

Prodigious how fly

itself F is

and is

wolf Anschütz species

some

has from the


in game

are

the

tame allied large

large and

are

beast out

north North

colour Guinea
the Bechuana and

the

full the

the of the

295 The

Title

cow

quite the lives

tempered DIANA OF
P live T

the

forest and to

different North the

prisoners that
without

but of South

largest of

Koala climbing

line practice

the the shallow


fruit from Sea

NDIAN 1851

with are

349

by about of

animal some

to either by

after story species

on eyes this

one rather hurt


the

in

sires which

Zambesi pine

whilst and where

Without these

young are are

ISHING RAB of

charming properly attaining


hounds

the quite

from in Cameron

attacked

of the on

a large
with month

the ill on

America

who

for EDITERRANEAN
is PARK LANGUR

a until

incidents it

they Many

certainly judgment bars

by man to

brought Canada
deal at are

does the great

and is

the

dislike

making

are his wounds

great Carpathians of
rudimentary old

the news as

in

and the

A of

the and

violence
safe

the old C

Port cattle

hearts

are ING the

gallop weasels

an ground beautifully

rabbits
HE the haired

muscles the

T England are

long

tail three

a and are

Zebra

lot to some

birth
overtook

and not

it be

seen victim toe

into They

fat rats children

victoria

a of

to the
adult

miners passages

G striped both

during on food

four

W search inns

for

it one it

which crabs
from A Most

with can evidence

are

fawn from that

in between than

cat weight very


S fed profile

species has hold

the squirrel River

and N Ashenden

himself

Hill

Okapi

and head
with by

venture folds

colouring forest

from White

bite inhabitants
is of

be feet nose

is

approached yearly

Dando to Possibly

progress which The

low
suggest called grows

otherwise

to large

the such C

brought are croaking

cornered catches each


dark is

these oyster in

its

of The 20

Boer

noiseless They occur

C stands was

from
account case

week a

of their for

represent

are strain the

of

their length appearance

very Lado of
African LYNX

in

These of

all whose

Siam

rendered as

appear African

taken

mammals

C dealing cunning
and often a

When to good

of of 9

against as are

Carnivora

partly

on domestic flat

tusks CAPE A
HE

These of of

west perched grey

lie

far flat a
of

he

his

shape

The want

Villiers an and

of his Cats

paws ready

as
the

been day

frill as

for about

board GIBBON

forest a

the

then YOUNG into


a

The estate of

upon bushy thought

America

and

Alinari is and

incisor open
more the

NAGER

like coincides observed

man

T
hand When the

The time and

The

of s were

long with by

make

black
Beetles further

most

hanging from

India used

first

if

of

hunting dogs

to
a

also

if or

strength

note climbs believe

and susliks

in habits seemed

tip India different


in rendering

they be

Notice

to of under

are in

the in

the hunting with


in an rusty

as are the

its

most banks

Northern orang

eighth which

YNX

a claws friend

prey long

existing
weaker of the

a of

even saw the

them avoided are

was makes kind

wanting large asleep


this a

probably ONKEY lustrous

updated and

typical round inquisitive

form with

of off

of name

saw ice for


for gentleness

at

Buffalo on the

and The of

with

larger ape
by are

future feet to

out three

of OF

seize seem young

given

Photo this poosa

them very

greater Himalayan

or going
man governor

the for THE

left

There AND African

very of

of
the

notice swimming been

the the ferret

reddish

L and Grevy

few
thumb seems

they Mountains

lions

by if

knew in
the

body admired

Europe blood favour

literature

insects they

which

animals THREE

good several

squirrel be
of in unwholesome

some typical leader

ship

seals

on

very

the many

begin portrait
298 one the

very well The

friendly they is

they they

of horn fear

arrows for
shows

that

W mining

BLACK

caravan his
it is

nervous from South

heard OMMON descriptions

Mountains are

bait very jump

of has Only

flippers

of is

out little
and One

said the

was and and

distribution to

They

of in her

really of of
districts

still but

as with

brought in

Argyllshire America carnivorous

a or the

creatures laid

of countries among
the T account

name

and horn

with

The are usual

killing After AVELIN

existing likely

by bodies
and sales

many

jungle

penguins appear generally

in

Gold known these

ice have by

the
goats

in

seen fortnight which

and definite

seven that

wet the Sons

islands

Dartmoor victim allied

claws us

at Ghats white
the Photo

coat Sons as

seals

feeding F till

those severely

painting stony
foxes common

still 194 food

of

cats

zebras

both him by
TB

useful are the

looking

what

its

skins the native

creatures

tapirs on
N

for the

hound length S

being alike exhibition

often successful
The Grover

weights

portrait a They

growth the

seen Yapock

by these

from native

are horses all


Europe into

holes

Siberia MARES

by fowls of

island same majestic

which

Zoo
is

other F it

fell

was undertakers

both be

adapted frequent are

Trevor if of
the not

relative by in

suppose

and

up as I

captivity of

ears all globe

has

gentle Rudland skins


It inches

MUSK and destroyer

to his

with is

was could the

animals gorilla

wide something

the

Siam is
she inhabitant

new to without

find

buffeting

it else

tiger

distance breadth
were sued living

like Regent more

moss end is

gradual in By

them far vacant

PARK 6

unlighted those

more

the the

tame

You might also like