词条 | Draft:J.T. Patten |
释义 |
{{Infobox writer | name = J.T. Patten, Author | image = | image_size = | alt = | caption = | birth_name = | birth_date = | birth_place = Illinois U.S. | death_date = | death_place = | resting_place = | occupation = Novelist | language = English | nationality = American | education = Illinois State University, American Military University, St. Andrews University | genre = Techno thriller, Spy-Fi, Thriller, espionage, military, assassination, political, action-adventure | influences = Mark Greaney Robert Ludlum Dalton Fury John Le Carré | website = {{URL|http://www.jtpattenbooks.com}} [https://www.amazon.com/J.T.-Patten/e/B00I3SPP10 J.T. Patten Amazon Author Page] }}J.T. Patten (born September 1, 1969) is the pen name of an American writer of Spy-Fi - Techno-thriller military / espionage novels[1]. He is best known for his initial Self-publishing black ops series featuring CIA NOC protagonist Sean Havens.[2] His latest series, the Task Force Orange novels [3], published by Kensington Books,[4] focus on fictional missions of the Joint Special Operations Command ultra-secretive Intelligence Support Activity, a Special Access Program, and has SIGINT and Covert Operations themes and settings around his hometown Chicago area.[5] Patten has been represented by literary agent John Talbot.[6] HistoryPrior to becoming an author, "J.T. Patten" worked for the government intelligence and military special operations community in support of national defense and policy.[7] [8] He is a notable authority on Iran and the Islamic Revolutionary Guard Corps (IRGC) Qods Force[9] and referenced as having worked with former Delta Force deputy commander Major General David L. Grange and collaborated on published articles, such as Assessing and Targeting Illicit Funding. He has recently collaborated with Fox News coverage of the El Chapo drug lord trials providing insights on criminal patterns and social cultural nuances of cartel influence in Mexico.[10][11] Patten's true name is Scott Swanson[12] a globally recognized expert in cyber Insider threat detection and financial crime[13], Deloitte corporate intelligence [14], and military intelligence community for Irregular and Unconventional Warfare strategies in counterterrorism, intelligence collection, and social network disruption. "Patten" (Scott Swanson) has a degree in Foreign Languages from Illinois State University, a Masters in Strategic intelligence from the American Military University, post-graduate degree in Counter Terrorism from the University of St Andrews Center for the Study of Terrorism and Political Violence (CSTPV), and numerous expertise certifications in intelligence analysis, cyber forensics and counterintelligence, mobile device tracing, and financial crime investigations.[15] [16] Military WritingsSwanson, who joined ARMY ROTC in college, is most known for his initial classified works disrupting human factors and social networks to defeat Improvised Explosive Devices in Iraq and creating a model used across the Intelligence Community for Social Media monitoring and disruption.[17] His writings and lectures are prevalent in Secret and Top Secret environments and are cited in numerous War College journals, graduate thesis, and global conferences and military strategy sessions.[18][19][20][21][22][23][24][25][26][27] His contributions are sited across military studies and academia to include the Air Command and Staff College, USMC Command and Staff College, Naval Postgraduate College, Joint Special Operations University, U.S. Army Command and General Staff College (SAMS and SOF Studies))[28], U.S. Army Professional Writing Collection, U.S. Army Military Intelligence Professional Bulletin, and the U.S. Army John F. Kennedy Special Warfare Center and School ("SWCS"). Similar to the Irregular Warfare, Intelligence, and Cyber/Surveillance aspects of his novels, he has experience and has written or collaborated (with a literal Who's Who in special activities and special mission units) in the following articles and white papers of Intelligence and Special Operations activities [29] [30] [31]: Cyber Threat Indications & Warning: Predict, Identify, and Counter[32], Enhancing Red Team Performance: Driving Measurable Value and Qualilty Outcomes with Process Improvement, [https://www.army.mil/article/9045/operationalizing_intelligence Operationalizing Intelligence] with Lieutenant General William Boykin [33] Winning Damaged Hearts and Minds with Major General David L. Grange Confronting Iran: Securing Iraq's Borders, an Irregular Warfare Concept with Major General David L. Grange, American Special Forces Sergeant Major and Central Intelligence Agency Paramilitary Operations Officer Billy Waugh, and former OSS officer and retired Major General John K. Singlaub, Viral Targeting of the IED Social Network System, [https://static.dvidshub.net/media/pubs/pdf_8244.pdf Know Your Enemy: Human Intelligence Key to SOF Missions] Special Warfare Magazine, and Third Party Combatants as a Tool of Terrorism.[34] Swanson appears in WikiLeaks IC Watch with the following experience highlighted: Iran Area Studies; Human Intelligence (HUMINT); Counterintelligence, Covert Action, Afg/Pak Intelligence Issues, Structured Analysis, and Illicit Finance; and Intelligence Studies Program Committee Adviser Responsible for developing course material and instructing AMU Intelligence Program's Iran Area Studies course students to cover the human terrain assessment of Iran's political, historical, economic, social, and cultural issues formatted in military and intelligence community writing, analytic, and presentation style. Provided similar course development and instruction for the Human Intelligence course instruction covering source management, ethics, and HUMINT operational planning, and Illicit Finance course instruction covering Shari'a banking, informal and formal monetary transfer, drug money, monetary schemes, money laundering and commodity exchange, and the DOD, IC, and federal CT finance programs. [35] Government DisclosureNotable in Patten's book forwards are the following disclosures as required by the U.S. Government and military community "The fictional works of J.T. Patten do not constitute an official release of CIA, NSA, or DoD information. All statements of fact, opinion, or analysis expressed are those of the author and do not reflect the official positions or views of the Central Intelligence Agency (CIA) or any other U.S. Government agency. Nothing in the contents should be construed as asserting or implying U.S. Government authentication of information or CIA endorsement of the author’s views. All published material has been reviewed for classification." Patten's works are considered sensitive enough by his prior background that all of his manuscripts must be reviewed by pre-publication boards of the CIA, Department of Defense, and the National Security Agency. J.T. Patten Book ListJ.T. Patten's stories tend to parallel military Thriller (genre) authors Dalton Fury, Mark Greaney, and Brad Taylor, with Patten's being described as "blacker than black" with many of his characters developed to be dark and brooding with anti-social behaviors, and many characterized as having Posttraumatic stress disorder from endless deployments. Patten tends to shy from traditional white hat heroes with his literary Character arc highlighting changes based on fallibility, failed family balance, psychological trauma, and moments of self-doubt.
Author InterviewsJ.T. Patten is the host of HOTWASH After Action Book Report, a BlogTalkRadio author interview segment. Patten interviews former military and intelligence thriller authors focusing the discussions on subtle community nuances and authenticity. [36] To date, he has hosted the following authors: Josh HoodKevin MaurerJack Murphy Mark Greaney Ted BellJoe GoldbergAndrews and Wilson Jack CarrMark HenshawKyle Mills Ben CoesChuck PfarrerJohn GilstrapMitch Gerads References1. ^http://www.fraud-magazine.com/article.aspx?id=4294989041/ 2. ^https://therealbookspy.com/2018/08/26/a-book-spy-review-buried-in-black-by-j-t-patten/ 3. ^http://www.kensingtonbooks.com/author.aspx/32039 4. ^https://therealbookspy.com/2017/10/02/exclusive-author-j-t-patten-signs-three-book-deal-with-kensington/ 5. ^https://www.nbc-2.com/story/39541379/best-selling-counterterrorism-expert-writes-in-napervilles-safe-haven 6. ^https://therealbookspy.com/2017/10/02/exclusive-author-j-t-patten-signs-three-book-deal-with-kensington/ 7. ^https://www.foxnews.com/us/kim-kardashian-of-mexico-meet-el-chapos-young-beauty-queen-wife-living-the-us-mexico-high-life 8. ^https://sofrep.com/sofrep-radio/episode-199-author-j-t-patten-talks-counterterrorism/ 9. ^https://clarionproject.org/iranian-spies-arrested-plotting-attacks/ 10. ^https://www.foxnews.com/us/finding-jesus-chapo-carries-bible-highlighting-complex-relationship-between-church-and-cartel 11. ^https://www.foxnews.com/world/el-chapo-goes-to-trial-everything-you-need-to-know 12. ^http://www.acfe.com/fraud-examiner.aspx?id=4294985580 13. ^https://www.bai.org/banking-strategies/article-detail/it-s-no-secret-the-bank-secrecy-act-needs-a-major-overhaul 14. ^https://www.cnbc.com/2016/12/19/accountants-and-spies-the-secret-history-of-deloittes-espionage-practice.html 15. ^[https://www.jtpattenbooks.com] 16. ^http://www.fraud-magazine.com/article.aspx?id=4294989041 17. ^https://www.slideshare.net/Swanssc/swanson-messagebehaviormodel-evaluation-and-impact 18. ^http://publications.armywarcollege.edu/pubs/2377.pdf 19. ^https://www.jstor.org%2Fstable%2F26201947&usg=AOvVaw15l3EgnQdUVHjXni6qPEFt 20. ^http://www.dtic.mil/dtic/tr/fulltext/u2/a580153.pdf 21. ^http://nsiteam.com/social/wp-content/uploads/2016/01/The-Human-Domain-The-Unconventional-Collection-and-Analysis-Challenge-Workshop.pdf 22. ^http://www.dtic.mil/dtic/tr/fulltext/u2/a603813.pdf 23. ^https://bawarketabtoon.com/data0/books/5a82b608e6c5c/pdf/Steve_Coll-Directorate_S__The_C_I_A_and_America_s_Secret_Wars_in_Afghanistan_and_Pakistan.2018_1_.pdf 24. ^http://www.dtic.mil/docs/citations/AD1030779 25. ^http://discovery.ucl.ac.uk/1563541/1/Morgan_1-s2.0-S0379073817302359-main.pdf 26. ^http://www.difesaonline.it/evidenza/approfondimenti/la-minaccia-degli-ied-iraq-2003–2006 27. ^https://pure.uvt.nl/portal/files/1353218/thesis_Lindelauf_20_09_final2.pdf 28. ^https://usacac.army.mil/CAC2/cgsc/SAMS/media 29. ^http://smallwarsjournal.com/author/scott-swanson-0 30. ^https://chicagoinfragard.org/scott_swanson/ 31. ^https://chicagoinfragard.org/about-us/officers-bios/ 32. ^http://smallwarsjournal.com/index.php/jrnl/art/cyber-threat-indications-warning-predict-identify-and-counter 33. ^https://www.army.mil/article/9045/operationalizing_intelligence Operationalizing Intelligence 34. ^https://www.trackingterrorism.org/article/third-party-combatants-tool-terrorism 35. ^https://icwatch.wikileaks.org/docs/rScott-Swansone2212df38b05191b%3Fsp=0OracleCorporationGlobalIntelligenceDirectorCEOOffice2002-10-01icwatch_indeed 36. ^http://www.blogtalkradio.com/jtpatten
|
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。