The al Qaeda Training ManualThe Manchester Document:A Practical Guide for Islamic Warriors
This Briefing is UNCLASSIFIEDThis manual was located by the Manchester, England,Metropolitan Police during a search of an ...
ObjectiveAction: Identify modus operandi, training anddoctrine of al Qaeda.Conditions: Given student handoutsStandards: Id...
AdministrativeThere are no safety requirements.The risk assessment level is low.There are no environmental considerationsE...
Al Qaeda LessonsLesson 1: General Intro        Lesson 8: Member SafetyLesson 2: Qualifications and   Lesson 9: Security Pl...
Lessons Continued        Lesson 15: Explosives        Lesson 16:        Assassinations; Poison &        Cold Steel        ...
Introduction“Martyrs were killed,women were widowed,children were orphaned,men were handcuffed,chaste women’s headswere sh...
L1: General IntroductionPrinciples of MilitaryOrganization – Commander & Advisory Council – Soldiers – Clearly defined str...
L1: General IntroductionMissions of the Organization – Primary: Overthrow the godless regimes   and replace them with an I...
L1: General Introduction            Importance of the Military            Organization            – Remove obstacles      ...
L2: Qualifications &      Characteristics of the MemberIslamCommitment to theOrganization’s ideologyMaturitySacrificeListe...
L2: Qualifications &       Characteristics of the MemberPatienceTranquility &“Unflappability”Intelligence and InsightCauti...
L3: Counterfeit Currency and     Forged Documents              Financial Security Precautions               – Divide opera...
L3: Counterfeit Currency and            Forged DocumentsForged Documents                 – Be photographed w/outSecurity  ...
L3: Counterfeit Currency and           Forged DocumentsWhen Giving Names– The name should fit in  with others in the area–...
L4: Military Bases &   Hiding Places          Location from which to          launch operations          against the enemy...
L4: Military Bases &                          Hiding PlacesSecurity Precautions for Apartments   -- Rent under false name ...
L4: Military Bases &                       Hiding PlacesSecurity Precautions for Apartments(Cont) – Standard for answering...
L5: Means of Communication &               Transportation                      Communication Means                      – ...
L5: Means of Communication &                 TransportationTelephone– Used in public places– Preferably in booths on main ...
L5: Means of Communication &                 TransportationTelephone (Cont)– Change/distort voice when  discussing underco...
L5: Means of Communication &           TransportationIn-Person Meeting– Purpose   • Information Exchange   • Giving instru...
L5: Means of Communication &                       Transportation                                                         ...
L5: Means of Communication &             Transportation                    Before the Meeting                    – Designa...
L5: Means of Communication &                   TransportationBefore the Meeting – Participant Responsibilities    • Check ...
L5: Means of Communication &                       Transportation                                              Before the ...
L5: Means of Communication &                      Transportation                                      Before the Meeting  ...
L5: Means of Communication &           TransportationDuring the Meeting – Exercise caution – Act naturally – Talk in moder...
L5: Means of Communication &       Transportation              After the Meeting              – Depart separately         ...
L5: Means of Communication &            TransportationIn-Person Meetings – Disadvantages    • Vulnerable to      capture  ...
L5: Means of Communication &                    TransportationMessenger – Intermediary between sender and   receiver – Mea...
5L: Means of Communication &                 TransportationLetters – No sensitive information – Do not mail from post offi...
L5: Means of Communication &                TransportationModern Devices– Transmission no longer than  5 minutes– Place ne...
L5: Means of Communication &                                Transportation                                   Public Transp...
L5: Means of Communication &                        Transportation                                             Private Tra...
L5: Means of Communication &                 Transportation                   Private Transportation                    – ...
L6: TrainingLocation                       – Place guards during – Away from populated           training   areas         ...
L6: TrainingTrainees – Implement Security   Measures as if for Covert   Activity – Select trainees carefully – Trainees sh...
L6: TrainingTrainers – Apply same measures as   for commanders – Limit number present to   reduce exposure to   security –...
L7: Buying and Transporting                    Weapons                    Prior to Purchase                     – Know phy...
L7: Buying and Transporting                 WeaponsThe Purchase – Verify condition of   weapons – Pay only after viewing, ...
L7: Buying and Transporting         Weapons             Transporting Weapons              – Avoid main roads              ...
L7: Buying and Transporting                     WeaponsChoosing an Arsenal – Not close to well-protected or   public place...
L8: Member SafetyOvert-Operator Security– Do not be curious with others– Do not gossip– Do not carry names/  addresses of ...
L8: Member Safety                                                 Covert-Operator Security                                ...
L8: Member Safety               Covert-Operator Security                – Speak softly                – Do not attract att...
L8: Member Safety                             Commander Security                             – Special Importance         ...
L9: Security PlanDefinition: A set ofcoordinated, cohesive, andintegrated measuresdesigned to confuse andsurprise the enem...
L9: Security PlanExample of a plan for anIndividual mission (Trainingin Afghanistan) – Know prior to departure    •   Reas...
L9: Security Plan        Example (Cont’d)         – Know during travel            • Why going to Pakistan?            • Be...
L9: Security Plan                       Example (Cont’d)                        – Know upon arrival                       ...
L9: Security PlanExample Questions oncedestination is learned – Why were you in Pakistan?   Afghanistan? – Are you a Jihad...
L9: Security PlanRequire Security Plans forall activitiesMust account for–   Commander–   Members–   Method of Operation– ...
L10: Special Tactical     Operations          Characteristics of          Special Forces          Members           –   Ph...
L10: Special Tactical                   OperationsImportance of SpecialOps–   Boost Islamic Morale–   Training new members...
L10: Special Tactical                       OperationsDisadvantages – Restraining the Da’wa – Reveal military structure – ...
L10: Special Tactical     Operations          Special Operations          Tactical Plan           – Research and          ...
L10: Special Tactical     Operations          Research &          Reconnaissance           – Target’s personal            ...
L10: Special Tactical                   OperationsPlanning Stage– Target– Weapons– Personnel– Tactic– Duration– Rally poin...
L10: Special Tactical     Operations          Execution (Pre-operation          considerations)           – Task matched w...
L10: Special Tactical                           OperationsExecution (Post-operationconsiderations) – After Action Review –...
EspionagePrinciple of Moslems Spying on their              Enemies
L11: Espionage from                 Open MethodsImportance of Information – Allows Command to   design quality plans – Ear...
L11: Espionage from   Open Methods         Public Information Sources          – 80% of Intelligence             • Newspap...
L12: Espionage from  Covert Methods         Secret Sources          – Recruited spies          – Recording and            ...
L12: Espionage from                Covert MethodsDetect Surveillance– Walk down a dead-end  street– Drop something– Walk f...
L12: Espionage from                    Covert MethodsGeneral Considerations – Meet far away from   residence. Prefer night...
L12: Espionage from  Covert Methods         Methods          – Surveillance, Intelligence,            & Observation       ...
L12: Espionage from  Covert Methods         Surveillance, Intelligence &         Observation          – Surveillance      ...
L12: Espionage from                                Covert Methods                                       Interrogation     ...
L12: Espionage from  Covert Methods         Interrogation : Guidelines         for Beating & Killing Hostages          – F...
L12: Espionage from                Covert MethodsRecruitment– Most dangerous task– Candidates   • Smugglers   • Political ...
L12: Espionage from                          Covert MethodsRecruitment – Motivation    • Coercion & entanglement    • Gree...
L12: Espionage from                Covert MethodsRecruitment– Stages   • Finding the Agent   • Evaluating   • Approaching ...
L12: Espionage from  Covert Methods         Recruitment          – Advice             • Don’t exchange packages           ...
L13: Secret Writing, Ciphers,          & Code              Secret Writing               – Paper                   • Smooth...
L13: Secret Writing, Ciphers,          & Code              Secret Writing               – Expose the writing              ...
L13: Secret Writing, Ciphers,                 & CodeSecret Ink Considerations – Write only on smooth   surface – Don’t emb...
L13: Secret Writing, Ciphers,                   & CodeCiphers & Codes– Cipher   • A letter, number, or     symbol that tak...
L13: Secret Writing, Ciphers,                       & CodeTypes of Ciphers and Codes – Enciphering w/ coordinates – Enciph...
L13: Secret Writing, Ciphers,                           & Code                                                   The numer...
L13: Secret Writing, Ciphers,                & Code     Numeric Method Example    ((ABJD ?W; HUI KLMN S”FX QR:T COZ VYG))S...
L13: Secret Writing, Ciphers,                   & Code        Numeric Method Example       QAM ALAOW? BQTL REIS ALJM?WRI? ...
L13: Secret Writing, Ciphers,                     & Code          Another Numeric Method Example                          ...
L13: Secret Writing, Ciphers,                     & Code          Numeric Method (2) Example         QAM ALAOW? BQTL W;IR ...
L13: Secret Writing, Ciphers,                 & CodeMethod of Symbols andNumbers– Separate letters of  alphabet into a num...
L13: Secret Writing, Ciphers,                     & Code         Method of Symbols and Numbers6th Group 5th Group 4th Grou...
L13: Secret Writing, Ciphers,                      & Code    Example of Method of Symbols and Numbers     AL?JWM ALSA”? AL...
L13: Secret Writing, Ciphers,                  & CodeThe Letter Method – Eliminate three of the 28   Arabic letters       ...
L13: Secret Writing, Ciphers,                        & Code       The Letter Method ExampleAQTL ?ZA ALUAGWT               ...
L13: Secret Writing, Ciphers,                     & CodeThe Coordinates Method           5   4   3   2   1– Every letter c...
L13: Secret Writing, Ciphers,                      & Code                             How to Complicate96 70   34 32   20 ...
L13: Secret Writing, Ciphers,                      & Code      The Coordinate Method Example                             9...
L14: Kidnapping &        Assassination with FirearmsHandguns– Characteristics of the  automatic pistol– Shortcomings of th...
L14: Kidnapping &Assassination with Firearms           Handgun Grip            – One or two hands               • 2 hands ...
L14: Kidnapping &Assassination with Firearms             Introduction to Rifles             Principles of Aims            ...
14: Kidnapping & Assassination             with FirearmsCritical Parts of theBody–   The Face–   The Neck–   The Heart–   ...
L14: Kidnapping &               Assassination with FirearmsElementary Assassination OpsCrossing the Street – Target on the...
L14: Kidnapping &Assassination with Firearms             Assassination Ops Cont              – The Entrance to a Building ...
L15: ExplosivesThe safest weapon for theMujChemical compounds ormixtures capable ofconversion to largequantities of hot ga...
L15: ExplosivesTypes of Fuses– Slow Fuse (Safety Fuse)   • Cotton or linen woven     together, insulated, and     contains...
L15: Explosives       Detonating Cord (Cortex)        – Ignites at 5 to 7 km/sec        – Can explode w/ the force of     ...
L15: Explosives       Blasting Caps        – Normal        – Electric       Connecting        – Slow fuse to another      ...
L15: ExplosivesBooby Traps – Creative, innovative method   to plant explosive charges,   injuring the enemy as a   result ...
L15: Explosives       Switches        – Electrical           •   Manual           •   Delayed           •   Natural Circum...
L15: ExplosivesClosing the Switch– Television and Recorder– Automobile– Alarm Clock/Time BombExample– Using a car bomb
L16: Assassinations with             Poison and Cold SteelWith KnivesFrom the Front–   Rib Cage–   Eyes–   Pelvis–   Above...
L16: Assassinations with             Poison and Cold SteelWith a Blunt ObjectFrom the Front– The eyes– Where veins and art...
L16: Assassinations with Poison and Cold Steel            Poison            Not as in-depth as the            Muj Poisons ...
L17: Interrogation &                          InvestigationInterrogation – Conducted by Ministry of Interior Affairs – Psy...
L17: Interrogation &                 InvestigationConsiderationsMay reveal some secretsunder pressure of tortureConfession...
L17: Interrogation &   Investigation          Countermeasures (Prosecution)           – Ask to be seen by Medical         ...
L17: Interrogation &                   InvestigationInterrogationTechniquesSummoning–   Simplest type–   Summoned to appea...
L17: Interrogation &                     InvestigationInterrogation TechniquesPublicized Arrests– Result of a public incid...
L17: Interrogation &           Investigation                  Steps of Interrogation                  –   Arrest          ...
L17: Interrogation &                          InvestigationSpecific InvestigationsIf captured in connection to an incident...
L17: Interrogation &                 InvestigationResistance– Remain patient, steadfast  and silent– Stick with Security P...
L17: Interrogation &                            Investigation                                   Physical Torture          ...
L17: Interrogation &                 Investigation                       Physical Torture Cont                        –   ...
L17: Interrogation &                    InvestigationPsychological Torture– Solitary confinement– Replace name with a numb...
L17: Interrogation &                         InvestigationAdvice from Memoirs of a CapturedCommando – Concentrate on layou...
L17: Interrogation &                        InvestigationAdvice from Memoirs of a CapturedCommando Cont – Giving informati...
L18: Prisons and Detention                  Centers                     During Trial                      – Insist on prov...
L18: Prisons and Detention                               Centers                                  Inside Prison           ...
A Note on the Importance of                TeamworkAbandoning Team workis equal to disobeying theWord of Allah“Duty cannot...
Conclusion
Questions???
The al qaeda training manual
Upcoming SlideShare
Loading in …5
×

The al qaeda training manual

5,106 views

Published on

Published in: News & Politics
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,106
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
78
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

The al qaeda training manual

  1. 1. The al Qaeda Training ManualThe Manchester Document:A Practical Guide for Islamic Warriors
  2. 2. This Briefing is UNCLASSIFIEDThis manual was located by the Manchester, England,Metropolitan Police during a search of an al Qaeda member’shome. The manual was found in a computer file described as“the military series” related to the “Declaration of Jihad.” Themanual was translated into English and introduced at the AfricanEmbassy Bombing Trial in New York.
  3. 3. ObjectiveAction: Identify modus operandi, training anddoctrine of al Qaeda.Conditions: Given student handoutsStandards: Identified modus operandi, trainingand doctrine of al Qaeda.
  4. 4. AdministrativeThere are no safety requirements.The risk assessment level is low.There are no environmental considerationsEvaluations Student Checks
  5. 5. Al Qaeda LessonsLesson 1: General Intro Lesson 8: Member SafetyLesson 2: Qualifications and Lesson 9: Security PlanCharacteristics Lesson 10: Special TacticalLesson 3: Counterfeit OpsCurrency and Forged Lesson 11: Espionage; OpenDocuments SourceLesson 4: Military Bases Lesson 12: Espionage;(Safehouses) Covert MethodsLesson 5: Commo and Lesson 13: Secret Writing,Transportation Ciphers, & CodeLesson 6: Training Lesson 14: Kidnapping andLesson 7: Weapons; Buying Assassinations; Firearmsand Transporting
  6. 6. Lessons Continued Lesson 15: Explosives Lesson 16: Assassinations; Poison & Cold Steel Lesson 17: Interrogation & Investigation Lesson 18: Prisons & Detention Centers
  7. 7. Introduction“Martyrs were killed,women were widowed,children were orphaned,men were handcuffed,chaste women’s headswere shaved, harlots’heads were crowned,atrocities were inflictedon the innocent, giftswere given to the wicked,virgins were raped on the Mustafa Kemal Ataturkprostitution alter…"
  8. 8. L1: General IntroductionPrinciples of MilitaryOrganization – Commander & Advisory Council – Soldiers – Clearly defined strategyMilitary OrganizationRequirements – Counterfeit Docs/currency – Apartments/Hiding Places – Communications – Transportation – Information – Arms & Ammo
  9. 9. L1: General IntroductionMissions of the Organization – Primary: Overthrow the godless regimes and replace them with an Islamic regime. – Secondary • Collect Intelligence • Kidnapping • Assassination • Freeing captured comrades • Propaganda • Destroy places of amusement • Destroy embassies • Attack economic centers • Destroy bridges into and out of cities
  10. 10. L1: General Introduction Importance of the Military Organization – Remove obstacles – Proper utilization of capabilities – Precision performance – Steadfastness to the work – Achievement of long and short- term goals – Establish conditions for confrontation – Discipline in secrecy
  11. 11. L2: Qualifications & Characteristics of the MemberIslamCommitment to theOrganization’s ideologyMaturitySacrificeListening/ObedienceSecrecy & ConcealinginformationFree of Illness
  12. 12. L2: Qualifications & Characteristics of the MemberPatienceTranquility &“Unflappability”Intelligence and InsightCaution & PrudenceTruthfulness andCounselTo Observe & AnalyzeTo Act, Change, andConceal oneself 9/11: Pennsylvania
  13. 13. L3: Counterfeit Currency and Forged Documents Financial Security Precautions – Divide operational funds • Invested for return • Saved – Don’t keep all funds in one place – Don’t tell other members location of the funds – Proper protection when carrying funds – Leave funds w/ non-members • Spend when needed
  14. 14. L3: Counterfeit Currency and Forged DocumentsForged Documents – Be photographed w/outSecurity beard – Keep passport in safe – Carry documents of only place one name at a time • Negotiate for its return – Confirm document– For undercover, all docs validity should be forged – Forgery is a command– Know all pertinent info on responsibility docs – Don’t carry a false– Important personnel passport of the country should have multiple you are traveling to identities • Easy Identification of fraud
  15. 15. L3: Counterfeit Currency and Forged DocumentsWhen Giving Names– The name should fit in with others in the area– Do not have more than one name in the area in which you live Rich Reid
  16. 16. L4: Military Bases & Hiding Places Location from which to launch operations against the enemy – Urban-- Houses or Apartments – Rural-- Hiding places or bases Use bases in mountains or country side in the late stages of Jihad
  17. 17. L4: Military Bases & Hiding PlacesSecurity Precautions for Apartments -- Rent under false name and – Consider size and location non/Moslem appearance when choosing – Individuals should rent only one – Ground floor facilitates escape apartment per person – Have secret locations inside for – Don’t rent an apt previously used for important items Jihad – Prepare escape routes – Avoid renting near police or gov’t – Limit knowledge to those who buildings use it – Avoid isolated areas – Provide necessary cover – Preference to new developments stories – Check surveillance prior to entering – Avoid seclusion from the – Special signals prior to entry population
  18. 18. L4: Military Bases & Hiding PlacesSecurity Precautions for Apartments(Cont) – Standard for answering telephones – Replace existing locks/keys – Check for no overhead visibility – Avoid loud talk in newer buildings – Have appropriate supporting documents to support cover – Cover should blend with the environment – Cover for members should match cover of location
  19. 19. L5: Means of Communication & Transportation Communication Means – Telephone – In-person meeting – Messenger – Letters – Modern Devices • Facsimile or wireless Secret Communications – Common – StandbyClean Cut KSM – Alarm
  20. 20. L5: Means of Communication & TransportationTelephone– Used in public places– Preferably in booths on main streets– Use code or general terms– Periodically examine phone hardware– Numbers should be memorized– Establish method of bona fides Gulbuddin Haektmayer
  21. 21. L5: Means of Communication & TransportationTelephone (Cont)– Change/distort voice when discussing undercover work– Direct local and long distance calls– Proper cover in crowded areas– Notify all parties as soon as compromise is evident– Provide misinformation when Abu Qatada being monitored– Use of jamming devices
  22. 22. L5: Means of Communication & TransportationIn-Person Meeting– Purpose • Information Exchange • Giving instructions • Financing • Member follow-up– Stages of the Meeting • Before • During • After
  23. 23. L5: Means of Communication & Transportation Before the Meeting – Designate location – Multiple-use • Far from security centers • Ease of transportation • Learn location details • Apartments in the middleA curious anti-al-Qaeda fighter looks into a small cave which • Avenues of escapewas used at an al-Qaeda training camp for ammunition storage inthe White Mountains near Tora Bora, Afghanistan, Tuesday, • Free fromDec. 18, 2001 surveillance • Plan for approach by
  24. 24. L5: Means of Communication & Transportation Before the Meeting – Designate location – Single Use • Intersection of large streets • Free from Security personnel • Avoid crowded placesNYC • Alternate location
  25. 25. L5: Means of Communication & TransportationBefore the Meeting – Participant Responsibilities • Check security situation at location • Check for surveillance trailing approach • Do not go directly to the location • Wear clothing appropriate to the location Participant in Background • Verify documents are correct • Establish Security Plan
  26. 26. L5: Means of Communication & Transportation Before the Meeting – Cover • Blend with location • Must be believable • Should not arose curiosity • Match appearance, financial, and educational background • Supporting documentsSenior Clubbers: Ayman, Osama, and Abu Hafs • Provide purpose for the meeting
  27. 27. L5: Means of Communication & Transportation Before the Meeting – Planning • Specify hour and date • Specify time of departure • Alternate time and date • Short time between notification and actual meetingOnly two Seniors left: Hafs is Dead
  28. 28. L5: Means of Communication & TransportationDuring the Meeting – Exercise caution – Act naturally – Talk in moderate voice – Agree on Security Plan Wedding photo: Osama’s son (center) marries Abu Hafs’ daughter (not pictured)
  29. 29. L5: Means of Communication & Transportation After the Meeting – Depart separately – Use secondary roads – Police the area
  30. 30. L5: Means of Communication & TransportationIn-Person Meetings – Disadvantages • Vulnerable to capture • Enemy can gather evidence – Photographs • Revealing the leader to the other Member Abu Hamza
  31. 31. L5: Means of Communication & TransportationMessenger – Intermediary between sender and receiver – Measures • Must know who is recipient • Agreement on signals and date • Use public streets/place • Travel on secondary streets • Use public transportation • Complete knowledge of the area
  32. 32. 5L: Means of Communication & TransportationLetters – No sensitive information – Do not mail from post office near residence – Do not send directly to the recipient – Use fictitious name and address – Use opaque envelope – Limit number of pages – Write address clearly – Don’t forget to pay P.O. Box fees
  33. 33. L5: Means of Communication & TransportationModern Devices– Transmission no longer than 5 minutes– Place near device with high frequency– TV station or embassy– Carefully specify time– Change frequency occasionally– Move device frequently– Do not reveal location– Use general terms
  34. 34. L5: Means of Communication & Transportation Public Transportation – Select one not subject to frequent checking – Board at a secondary station – Match the cover • Supporting documents – Place important luggage among other passengers’ – Forgo religious issues on special missionsKandahar International – Arrive during the day – Don’t start conversations in taxi cabs – Use extreme caution
  35. 35. L5: Means of Communication & Transportation Private Transportation – For Overt Operations • Proper permits • Obey Traffic laws • Park in secure locations • Match with cover • Use in special militaryBinalshibh’s public transportation to jail operations only as last option
  36. 36. L5: Means of Communication & Transportation Private Transportation – For Covert Operations • Proper permits • Obey Traffic laws • Park in inconspicuous location • Purchase with forged documents • One person in charge of selling • Park with quick avenue of escape • Change color before and afterBojinka operation • Use false license plate and country • Use small gasoline stations
  37. 37. L6: TrainingLocation – Place guards during – Away from populated training areas – Appropriate facility for – Medical service available number of trainees – Suitable for type of – Exclude those not training involved in training – Many roads and – Take all appropriate entrances security measures – Visit during suitable – Distant from police hours stations/eye of public – Hide evidence of training – Prevent observation from upon completion another place
  38. 38. L6: TrainingTrainees – Implement Security Measures as if for Covert Activity – Select trainees carefully – Trainees should not know each other – Limit to 7 to 10 – Should not know the training place – Establish individual Hicks training plans
  39. 39. L6: TrainingTrainers – Apply same measures as for commanders – Limit number present to reduce exposure to security – Do not reveal identity to trainees – Small trainee to trainer ratio – Trainers should not know each other
  40. 40. L7: Buying and Transporting Weapons Prior to Purchase – Know physical location of transaction – Verify absence of security personnel • Location far from police stations – Take secondary streets – Perform Surveillance detection methods – Locate in unobservable place – Suitable cover – Avoid crowded placesAl Qaeda – Arrange alternate site – Test Seller – Prepare hiding/storage place
  41. 41. L7: Buying and Transporting WeaponsThe Purchase – Verify condition of weapons – Pay only after viewing, inspecting, & testing – Don’t tell the Seller the weapon’s purpose – Watch for unnatural behavior – Depart immediately after transaction completed
  42. 42. L7: Buying and Transporting Weapons Transporting Weapons – Avoid main roads – Choose appropriate time – Post observers ahead of weapons’ vehicle – Surveillance Detection Route – Hide weapons in an inconspicuous manner – Carefully determine the route – PMCS the vehicle, obey the law – Drive normal
  43. 43. L7: Buying and Transporting WeaponsChoosing an Arsenal – Not close to well-protected or public places – Should not be in completely isolated area – Not in an apartment known to the police – Should be in an unused room – Long-term lease or own outright Finsbury Park Mosque – Do not play with the weapons – Inventory all material – Compartmentalize arsenals
  44. 44. L8: Member SafetyOvert-Operator Security– Do not be curious with others– Do not gossip– Do not carry names/ addresses of others– Stay ay home during periods of civil unrest– Use OPSEC on the phone– Burn letters upon receipt Moussaoui • H2O on the ashes
  45. 45. L8: Member Safety Covert-Operator Security – Never reveal true name – Abandon traditional Islamic appearance, sayings, gestures – Avoid famous Islamic places – Carry and know falsified documents – Have protection – Complete knowledge of security situation – Maintain relationshipsAn undated photo of Abu Musab al Zarqawi, a – Use letters and messengers only inJordanian believed to be an emerging terroristkingpin. (Petra/AP Photo) emergency
  46. 46. L8: Member Safety Covert-Operator Security – Speak softly – Do not attract attention – Vary routine – Cause no trouble – Limit contact w/ overt members – Do not comment on the Organization – Surveillance detection alwaysAtta – No sudden changes prior to Jihad activity – Do not live near security offices
  47. 47. L8: Member Safety Commander Security – Special Importance – Possess large amounts of information – Difficult to replace – Use all previously mentioned measures and divert resources to commander’s securityNOTE: Married Brothers should nottalk with their wives about Jihad work
  48. 48. L9: Security PlanDefinition: A set ofcoordinated, cohesive, andintegrated measuresdesigned to confuse andsurprise the enemy.Should be – Realistic – Without gaps – Simple – Creative – Flexible – Secretive
  49. 49. L9: Security PlanExample of a plan for anIndividual mission (Trainingin Afghanistan) – Know prior to departure • Reasons for travel? • Origin of money? • Duration of trip? • Who will meet at arrival? • Activities in that country?
  50. 50. L9: Security Plan Example (Cont’d) – Know during travel • Why going to Pakistan? • Belong to religious organizations? • Origin of money? • Origin of visa? • Activities in Pakistan? • Staying with in Pakistan?
  51. 51. L9: Security Plan Example (Cont’d) – Know upon arrival • Why in Pakistan? • How long will you be here? • With whom are you staying?Boston Int’l
  52. 52. L9: Security PlanExample Questions oncedestination is learned – Why were you in Pakistan? Afghanistan? – Are you a Jihad fighter? – At what camp were you trained? – Who told you to go to AF? – Who are your contacts? – Who else was there? Did you train at Darunta?? – Who were your commanders? – Etc…..
  53. 53. L9: Security PlanRequire Security Plans forall activitiesMust account for– Commander– Members– Method of Operation– Interrogation and InvestigationMembers should explain theplan back to the Commanderto ensure understanding U/I Muj
  54. 54. L10: Special Tactical Operations Characteristics of Special Forces Members – Physically fit – Trained in weapons – Clever, Canny, Deceptive – Intelligent, precise, alert – Cold Blooded – Able to Keep Secrets – Quick thinker – Unknown to the Gov’t
  55. 55. L10: Special Tactical OperationsImportance of SpecialOps– Boost Islamic Morale– Training new members– Punishment– Mock the regime– Assassination– Agitation– Resistance Ibn-ul-Khattab– Legitimacy– Terror– Recruitment
  56. 56. L10: Special Tactical OperationsDisadvantages – Restraining the Da’wa – Reveal military structure – Expensive – Bad publicity by Gov’t – Terror – Cannot defeat the regime – Failure increases regime credibility Female warrior – Success leads to assassination of Group leaders by regime
  57. 57. L10: Special Tactical Operations Special Operations Tactical Plan – Research and Reconnaissance Stage – Planning Stage – Execution Stage
  58. 58. L10: Special Tactical Operations Research & Reconnaissance – Target’s personal information • Car type, time of departure…etc – Physical layout (building) • Avenues of approach/escape • Inside • Outside – Security measures
  59. 59. L10: Special Tactical OperationsPlanning Stage– Target– Weapons– Personnel– Tactic– Duration– Rally points (before & after)– Security during movement– Potential difficulties At the firing line– Create an alternate plan
  60. 60. L10: Special Tactical Operations Execution (Pre-operation considerations) – Task matched w/ ability – Volunteer force – Pre-position equipment – Member disguise/cover – Last minute recon – PMCS weapons – Weapons locked and loaded
  61. 61. L10: Special Tactical OperationsExecution (Post-operationconsiderations) – After Action Review – Performance-based rewards/punishment – Hiding members/weapons involved – Destroy all documents – Defending captured members • Care for their families – Care not to ID participants – Leave no evidence
  62. 62. EspionagePrinciple of Moslems Spying on their Enemies
  63. 63. L11: Espionage from Open MethodsImportance of Information – Allows Command to design quality plans – Early Warning – Enemy’s strengths & weakness – Enemy movementsRequirements – Timely – Trustworthy – Forthcoming
  64. 64. L11: Espionage from Open Methods Public Information Sources – 80% of Intelligence • Newspapers • Magazines • Official Publications – Names and photographs of leaders – Meeting places & topics – Future plans – Present & future enemy capabilities
  65. 65. L12: Espionage from Covert Methods Secret Sources – Recruited spies – Recording and monitoring – Photography – Documents – Burglary – Drugging – Surveillance and observations
  66. 66. L12: Espionage from Covert MethodsDetect Surveillance– Walk down a dead-end street– Drop something– Walk fast/stop suddenly– Use store windows as mirrors– Get on & get off a bus– Work w/counter- surveillance
  67. 67. L12: Espionage from Covert MethodsGeneral Considerations – Meet far away from residence. Prefer night – Do not emphasize information gap – Do not reveal ID quickly – Move slowly – Look beyond appearance – Study the area – Do not carry weapons – Use Cover
  68. 68. L12: Espionage from Covert Methods Methods – Surveillance, Intelligence, & Observation – Theft – Interrogation – Excitement – Drugging – Recruitment
  69. 69. L12: Espionage from Covert Methods Surveillance, Intelligence & Observation – Surveillance • By foot • By Car • Detection by car – Enemy places • Draw a diagram • Description – Photo’s are best – 18 point minimum • Make friends w/ someone on the installation
  70. 70. L12: Espionage from Covert Methods Interrogation – Knowledge of behavior & morals – Strong personality – Posses a Sixth Sense – Extremely patient – Able to act, pretend, and maskU/I Russian POW in Chechnya – Intelligent, observant, and analytical – Able to establish investigative plan
  71. 71. L12: Espionage from Covert Methods Interrogation : Guidelines for Beating & Killing Hostages – For the purpose of obtaining information – Umma permit beatings • “…strike the nonbeliever…until he reveals the…news and secrets.” – Kill the hostage to secure information about the org – May exchange hostage • Money, services, or expertise
  72. 72. L12: Espionage from Covert MethodsRecruitment– Most dangerous task– Candidates • Smugglers • Political Asylum Seekers • Service industry • Needy people • Port/border employees Look well-fed to me
  73. 73. L12: Espionage from Covert MethodsRecruitment – Motivation • Coercion & entanglement • Greed & love of money ** • Love of adventure ** • Love of amusement/deviance • Mental or political orientation ** • Fear of being harmed** Motivated Muj– The organization can only use ** in recruitment
  74. 74. L12: Espionage from Covert MethodsRecruitment– Stages • Finding the Agent • Evaluating • Approaching • Recruiting • Testing • Training Buffalo 6 • Terminating
  75. 75. L12: Espionage from Covert Methods Recruitment – Advice • Don’t exchange packages • Be quick and smooth • Manage agent’s financial status • Let events unfold naturally • Always check for surveillance • You may be a target • Maintain constant communication
  76. 76. L13: Secret Writing, Ciphers, & Code Secret Writing – Paper • Smooth • Ink doesn’t spread • Free of attention getters – Invisible ink • Organic • Chemical
  77. 77. L13: Secret Writing, Ciphers, & Code Secret Writing – Expose the writing • Any animal or fruit fluid • Place over light • Iron • Aspirin/alcohol solution • Colorless vitamin solution (i.e. Vitamin A) • Don’t use metallic compounds
  78. 78. L13: Secret Writing, Ciphers, & CodeSecret Ink Considerations – Write only on smooth surface – Don’t emboss paper – Use quality paper – Don’t write names – Wash pen after use • Do not use with any other ink – Write in between lines of a normal letter
  79. 79. L13: Secret Writing, Ciphers, & CodeCiphers & Codes– Cipher • A letter, number, or symbol that takes the place of another letter, number or symbol– Code • Symbols, words, or groups of letter chosen to represent other words
  80. 80. L13: Secret Writing, Ciphers, & CodeTypes of Ciphers and Codes – Enciphering w/ coordinates – Enciphering w/ symbols and words – Enciphering books, newspapers, and magazinesElements – A fixed system • Sender and recipient agree – A key which changes periodically Enigma
  81. 81. L13: Secret Writing, Ciphers, & Code The numeric method – Each letter replaced by a number – Do not have to be sequential – 28 letters in the Arabic language – Example • ABJD ?W; HUI KLMN S”FX QR:T COZ VYGdetail of a page from Johannes Trithemius,Polygraphiae libri sex, 1518, exercises incypher alphabets in the first published study ofencrypting information
  82. 82. L13: Secret Writing, Ciphers, & Code Numeric Method Example ((ABJD ?W; HUI KLMN S”FX QR:T COZ VYG))Sample Key: A=1 B=2 J=3 D=4 ?=5 W=10 ;=15 H=20 U=25 I=30 K=40 L=50 M=60 N=75S=80 “=90 F=100 X=200 Q=300 R=400 : =500 T=600 C=700 O=800 Z=900 V=1000 Y=1500 G=2000
  83. 83. L13: Secret Writing, Ciphers, & Code Numeric Method Example QAM ALAOW? BQTL REIS ALJM?WRI? “The brothers killed the President of the Republic”530400105603501803014005060030025108001501601300 From right to left
  84. 84. L13: Secret Writing, Ciphers, & Code Another Numeric Method Example • Using digits • Could be used via radio/telephone A=1 B=2 T=3 C=4 J=5 H=6 O=7 • Easily deciphered viaD=11 Z=12 R=13 ;=14 S=15 :=16 X=17 letterV=21 U=22 Y=23 ‘=23 G=25 F=26 Q=27K=31 L=32 M=33 N=34 ?=35 W=36 I=37
  85. 85. L13: Secret Writing, Ciphers, & Code Numeric Method (2) Example QAM ALAOW? BQTL W;IR ALDAOLI? “The brothers killed the Minister of the Interior” 3537327111321133714363232723536732133127 From right to left370320701011032010130370140360320302702035036070320103301027 •Using --0-- as a separator
  86. 86. L13: Secret Writing, Ciphers, & CodeMethod of Symbols andNumbers– Separate letters of alphabet into a number of groups– Each group is composed of a number of digits– Every group has a symbol Giovanni Della Porta, De Furtivis Literarum Notis Vulgo published by the great esoteric in 1591
  87. 87. L13: Secret Writing, Ciphers, & Code Method of Symbols and Numbers6th Group 5th Group 4th Group 3d Group 2d Group 1st GroupI W ? N M L K Q F G “ Y U V X : S ; R Z D O H J C T B A3 2 1 5 4 3 2 1 5 4 3 2 1 5 4 32 1 5 4 3 2 1 5 4 3 2 16th Group 5th Group 4th Group 3d Group 2d Group 1st Group __ __ __ __  I W ? N M L K Q F G “ Y U V X : S ; R Z D O H J C T B A3 2 1 5 4 3 2 1 5 4 3 2 1 5 4 32 1 5 4 3 2 1 5 4 3 2 1
  88. 88. L13: Secret Writing, Ciphers, & Code Example of Method of Symbols and Numbers AL?JWM ALSA”? ALSAB”? XBAHA “The attack will be at seven in the morning”1 3_1_5 2_4_1 3_2_1 3_1_1 3_2_1 2 3_1_4_2 1 11 From left to right
  89. 89. L13: Secret Writing, Ciphers, & CodeThe Letter Method – Eliminate three of the 28 Arabic letters M “ : O A • For example (C-G-Z) – Create a 5x5 chart N F X D B – “K”= WL – If last letter needed ? Q V R T • “H” = IA • “N” = BI W K U ; J – Can insert removed letter for spacer I L Y S H
  90. 90. L13: Secret Writing, Ciphers, & Code The Letter Method ExampleAQTL ?ZA ALUAGWT M “ : O A“Kill this devil.” N F X D BMH?L?HI”TINSMHMHI” ? Q V R TWYMHLJI?H W K U ; J I L Y S H
  91. 91. L13: Secret Writing, Ciphers, & CodeThe Coordinates Method 5 4 3 2 1– Every letter corresponds to M “ : O A A number (vertical) & letter (horizontal) N F X D B H– Create a table of 25 letters ? Q V R T M– Omit (C-Z-G) W K U ; J W– Note: Example is extremely easy to break I L Y S H D
  92. 92. L13: Secret Writing, Ciphers, & Code How to Complicate96 70 34 32 20 9 – Scramble letters without N H K K sequence? L J O W R – Leave blanks in the table – Write the coordinates of T Q D M the higher letterI B A R ; • The key is KRM ;?DIY “ ; X ? (Karem Zouhdi) F : S • May God release him DM V U I
  93. 93. L13: Secret Writing, Ciphers, & Code The Coordinate Method Example 96 70 34 32 20 9AST:?D AHD ALAOW? N H K KMN ;D? ALT”ZIB ? L J O W R“One of the martyrs T Q D Mdied due to the severe I B A R ;torture.” Y “ ; X ? F : S D M V U I
  94. 94. L14: Kidnapping & Assassination with FirearmsHandguns– Characteristics of the automatic pistol– Shortcomings of the automatic pistol– Characteristics of the revolver– Shortcomings of the revolver Soviet Pistol
  95. 95. L14: Kidnapping &Assassination with Firearms Handgun Grip – One or two hands • 2 hands decrease recoil • Dominant hand pushes, other pulls • 2 hands prevents shaking – Automatic pistols • Right thumb on left side • Mechanism above thumb and forefinger • Left thumb centered on right thumb • No space between hand and weapon
  96. 96. L14: Kidnapping &Assassination with Firearms Introduction to Rifles Principles of Aims – Control yourself – Squeeze, don’t pull – Anticipate discharge sound – Not tense, not relaxed – Close eye opposite to firing position – Don’t take too long – Note: • Rounds high = grip too tight • Rounds right = pulling..nervous • Rounds left = opposite • Rounds below = nervous aiming
  97. 97. 14: Kidnapping & Assassination with FirearmsCritical Parts of theBody– The Face– The Neck– The Heart– The Stomach– The Liver– The Kidneys Da Vinci’s Head Study– The Spinal Column
  98. 98. L14: Kidnapping & Assassination with FirearmsElementary Assassination OpsCrossing the Street – Target on the way to work via public transportation – Two personnel, on motorcycle, open fire as he crosses street.Block Target’s Car – Target in car behind driver – 3 to 4 assassins in wait – Assassins’ car blocks the target – Shooters get out and fire – Requires utmost speed
  99. 99. L14: Kidnapping &Assassination with Firearms Assassination Ops Cont – The Entrance to a Building • Assassins’ park near target’s building • Assault Target • Flee immediately – En Route to Work • Target driving to work • Assassins lie in wait • Hit tires, guard, driver, & target
  100. 100. L15: ExplosivesThe safest weapon for theMujChemical compounds ormixtures capable ofconversion to largequantities of hot gas in ashort amount of timeExplosive Chain – Spark – Combustible material – Secondary material – Charge
  101. 101. L15: ExplosivesTypes of Fuses– Slow Fuse (Safety Fuse) • Cotton or linen woven together, insulated, and contains capsules of black gunpowder • Ignites at 1cm/sec • Ignites under water– Fast Fuse • Similar to slow fuse • Ignites at 90cm/sec • Use limited to ambushes
  102. 102. L15: Explosives Detonating Cord (Cortex) – Ignites at 5 to 7 km/sec – Can explode w/ the force of 15kg (one round of ammo) – Use underwater? – Adversely affected by moisture? – Used as a belt to fell trees and iron pillars – Shaped in a coil – Substitute for large number of fuses
  103. 103. L15: Explosives Blasting Caps – Normal – Electric Connecting – Slow fuse to another – Slow fuse to a blasting cap – Blasting cap to Det cord – Knots and Connectors
  104. 104. L15: ExplosivesBooby Traps – Creative, innovative method to plant explosive charges, injuring the enemy as a result of his normal movement w/out paying attention to surroundings
  105. 105. L15: Explosives Switches – Electrical • Manual • Delayed • Natural Circumstances • Influence of Waves – Chemical – Mechanical – Friction
  106. 106. L15: ExplosivesClosing the Switch– Television and Recorder– Automobile– Alarm Clock/Time BombExample– Using a car bomb
  107. 107. L16: Assassinations with Poison and Cold SteelWith KnivesFrom the Front– Rib Cage– Eyes– Pelvis– Above the genitalsFrom Behind– Back of head– Spine, directly above buttocks. Milan Islamic Cultural Center
  108. 108. L16: Assassinations with Poison and Cold SteelWith a Blunt ObjectFrom the Front– The eyes– Where veins and arteries meet in the neck– Top of stomach (end of stick)– Above genitals (end of stick)– Area of tongue– Choke w/ stickFrom Behind– The left ear Site of L. Foley Assassination– Back of the headWith a Rope and Hands
  109. 109. L16: Assassinations with Poison and Cold Steel Poison Not as in-depth as the Muj Poisons Manual Herbal poisons – Castor Beans (Ricin) – Precatory Beans (Abrin) – Tanj Oil Tree – Potato Sprout Spoiled Food
  110. 110. L17: Interrogation & InvestigationInterrogation – Conducted by Ministry of Interior Affairs – Psychological and physical techniques – Leads to total collapse – No ethics – Bodily and emotional tortureQuestioning – Conducted by Office of Prosecution (D.A.) – Psychological warfare • Confrontation & Repeat questions– Without torture
  111. 111. L17: Interrogation & InvestigationConsiderationsMay reveal some secretsunder pressure of tortureConfessions toProsecution will be usedagainst youMay be tortured by theGovt to confess at theProsecution Office
  112. 112. L17: Interrogation & Investigation Countermeasures (Prosecution) – Ask to be seen by Medical Personnel – Ask that evidence of torture be recorded in reports – Ask for an attorney, preferably by name – Ask for food – Deny all accusations, claim interrogators fabricated – Claim admissions were result of torture – Ask to repeat interrogation
  113. 113. L17: Interrogation & InvestigationInterrogationTechniquesSummoning– Simplest type– Summoned to appear– Command must approve– Coached on answers– Be de-briefed by Command upon return Binalshibh • Memorize all details of the event
  114. 114. L17: Interrogation & InvestigationInterrogation TechniquesPublicized Arrests– Result of a public incident– Interrogation is more severe– Questions will be general without direct link to event– Degree of torture is proportional to the importance of the individual Jose Padilla
  115. 115. L17: Interrogation & Investigation Steps of Interrogation – Arrest – Search – Several days w/out interrogation – Treated kindly at first – Denial increases harshness • Refuse all Interrogator commands – Beatings will ensue – Soon, beaten againGTMO! – Made to believe role in operation is known – Disclose nothing • Pray to Allah
  116. 116. L17: Interrogation & InvestigationSpecific InvestigationsIf captured in connection to an incident – Placed in a holding room – Questioning begins friendly – 1st Session used to study detainee • If unsuccessful – 2d Session physical torture • Approach succeeds: leads to increased physical torture • Approach fails: leads to psychological torture
  117. 117. L17: Interrogation & InvestigationResistance– Remain patient, steadfast and silent– Stick with Security Plan– Test individuals prior to engaging in operations– Practice OPSEC with other members of the group Mecca’s this way, fellas
  118. 118. L17: Interrogation & Investigation Physical Torture – Blindfolding & stripping – Hanging by hands or feet – Beating w/ sticks/wire/rubber belts or hands and feet – Stand naked for long periods of time – Pouring cold water on head – Extinguishing cigarettes on skin – Attacking with dogsEgyptian PolicePolice Officers Cap Insignia – Made to sit on a stake – Throw in a septic tank
  119. 119. L17: Interrogation & Investigation Physical Torture Cont – Pulling out hair or nails – Dragging – Using sharp objects – Burning – Sleep on bare floor flooded w/ sewer water – Standing on toes for long hours – Deprivation of sleep, food, drink, medicine – Forced hydration then preventing urinationROYAL SAUDI – DrugsLAND FORCESMILITARY – Squeezing genitals…etcPOLICE
  120. 120. L17: Interrogation & InvestigationPsychological Torture– Solitary confinement– Replace name with a number– Threatening rape of family– Threaten to rape detainee– Threaten to confiscate possessions– Threaten to maim– Offer incentives Bienvinidos a Guantanamo– Use of harsh treatment, insults, and curses
  121. 121. L17: Interrogation & InvestigationAdvice from Memoirs of a CapturedCommando – Concentrate on layout of detention facility – Interrogator will deceive at first by being friendly – Discard all documents concerning operations – Firmly oppose & disobey the enemy – Exaggerate pain by crying loudly – As torture intensifies, its end nears KSM – The interrogator will bargain between torture sessions
  122. 122. L17: Interrogation & InvestigationAdvice from Memoirs of a CapturedCommando Cont – Giving information intensifies torture – Plan for capture – Only mention well known dates – Memorize dates – Pretend to be naïve – Less information means lighter judgment Zubaida – Do not reveal information to cell mates – Do not be humiliated or disgraced – Long periods of time between sessions
  123. 123. L18: Prisons and Detention Centers During Trial – Insist on proving torture – Complain of mistreatment – Make arrangements with defense attorney – Know the names of security officials – Court must be notified of mistreatmentGTMO! – Hunger strikes may succeed or fail – Take opportunity to exchange hidden messages
  124. 124. L18: Prisons and Detention Centers Inside Prison – En route, shout Islamic slogans to impress people – Do not accept demeaning work – Create an Islamic, recreational, and educational Programs – Be a model of selflessness – Use the time to worship andNice view at least read the Koran
  125. 125. A Note on the Importance of TeamworkAbandoning Team workis equal to disobeying theWord of Allah“Duty cannot beaccomplished without itand it is a requirement” Turn the ground beneath their feet into an inferno: Zawahri
  126. 126. Conclusion
  127. 127. Questions???

×