22 de diciembre de 2011

Aplicación imprescindible para iPad si tienes niños iDraw for Family


Buenas si tenéis niños en casa y un iPad, vais a disfrutar estas navidades. Y puede que os salga gratis, porque iPhoneGamesDev en colaboración con appgiveaway.com están sorteando 43 copias GRATIS así que no perdáis el tiempo que el sorteo acaba el día 24.

http://www.appgiveaway.com/id/440/Education/2011/21/12/iDraw-for-Family-apple-iPad-app-promo-codes-to-giveaway/

Es la primera aplicación para iPad de tipo "Dibuja y colorea" por turnos, lo que te permite jugar con tus hijos a la vez que salvas tu valioso iPad de ser destruido por que el niño/a lo tire al suelo ya que estarás jugando con el/ella.

El primer turno es para el papá o la mamá, ha de dibujar algo. El segundo turno es para el peque y ha de colorear lo que papá o mamá han dibujado. Esto hace que el niño/a vea como se dibuja y aprenda antes de lo que lo haría haciendo rallas que es lo que hacen siempre.

Además si sois muy torpes también vienen dibujos prefabricados para que podáis pintar, eso si, pierde la gracia del juego.

19 de noviembre de 2011

AIGD Studio y su loco anuncio

Buenas, en iphonegamesdev.com ya tenemos nuestro primer proyecto en la app store.
La web es http://aigdstudio.iphonegamesdev.com. No os perdáis el video promocional.



Find Advanced IGD Studio on AppStoreHQ.
  Best iPhone apps at AppStoreHQ

6 de noviembre de 2011

DoubleGum iPhone Game

We got it almost ready, our new game DoubleGum is almost ready for masive distribution.

Improve your mind with this double matches mind trainner.

29 de octubre de 2011

Web sobre los hacks de Kinect


Bastante interesante, tiene algunas cosillas curiosas de ver.

24 de octubre de 2011

Dragon Ball online ya disponible su descarga

Pues que acabo de descubrir que ya se puede bajar el Dragon Ball online MMorpg, eso si esta en chino y coreano solo.

20 de septiembre de 2011

Wormed! Vídeo de presentación del juego de iPhone



Espero que os guste el nuevo vídeo. Compartidlo con vuestros amigos, os vais a reir.

3 de septiembre de 2011

Kernel.org Hackeada totalmente

  • Security breach on kernel.org


    Earlier this month, a number of servers in the kernel.org infrastructure were compromised. We discovered this August 28th. While we currently believe that the source code repositories were unaffected, we are in the process of verifying this and taking steps to enhance security across the kernel.org infrastructure.


    What happened?


    • Intruders gained root access on the server Hera. We believe they may have gained this access via a compromised user credential; how they managed to exploit that to root access is currently unknown and is being investigated.
    • Files belonging to ssh (openssh, openssh-server and openssh-clients) were modified and running live.
    • A trojan startup file was added to the system start up scripts
    • User interactions were logged, as well as some exploit code. We have retained this for now.
    • Trojan initially discovered due to the Xnest /dev/mem error message w/o Xnest installed; have been seen on other systems. It is unclear if systems that exhibit this message are susceptible, compromised or not. If developers see this, and you don't have Xnest installed, please investigate.
    • It *appears* that 3.1-rc2 might have blocked the exploit injector, we don't know if this is intentional or a side affect of another bugfix or change.


    What Has Been Done so far:


    • We have currently taken boxes off line to do a backup and are in the process of doing complete reinstalls.
    • We have notified authorities in the United States and in Europe to assist with the investigation
    • We will be doing a full reinstall on all boxes on kernel.org
    • We are in the process of doing an analysis on the code within git, and the tarballs to confirm that nothing has been modified


    The Linux community and kernel.org take the security of the kernel.org domain extremely seriously, and are pursuing all avenues to investigate this attack and prevent future ones.


    However, it's also useful to note that the potential damage of cracking kernel.org is far less than typical software repositories. That's because kernel development takes place using the git distributed revision control system, designed by Linus Torvalds. For each of the nearly 40,000 files in the Linux kernel, a cryptographically secure SHA-1 hash is calculated to uniquely define the exact contents of that file. Git is designed so that the name of each version of the kernel depends upon the complete development history leading up to that version. Once it is published, it is not possible to change the old versions without it being noticed.


    Those files and the corresponding hashes exist not just on the kernel.org machine and its mirrors, but on the hard drives of each several thousand kernel developers, distribution maintainers, and other users of kernel.org. Any tampering with any file in the kernel.org repository would immediately be noticed by each developer as they updated their personal repository, which most do daily.


    We are currently working with the 448 users of kernel.org to change their credentials and change their SSH keys.


    We are also currently auditing all security policies to make kernel.org more secure, but are confident that our systems, specifically git, have excellent design to prevent real damage from these types of attacks.


O lo que es lo mismo, les han entrado hasta la cocina y se han comidos sus helados

Fuente:
https://www.kernel.org/

27 de agosto de 2011

¡¡¡ ¿ Dos cazas escoltando a un OVNI !!! ?

Tiene todos los números para ser un Fake, pero la verdad es que está muy bien hecho. Faltarían saber más datos sobre el que ha grabado y saber que se supone que hacía grabando el suelo.

Via:

Don Ramon y Perchita en lanzanos.com

Parece que el bueno de Niko quiere recuperar unos de sus mejores personajes. Don Ramon y Perchita, ya sabéis esos que se parecen tanto a Doraimon y Nobita pero que uno es rosa y el otro Yonki.

Si no lo recordáis en 2008 ya os lo comentábamos: Don Ramon y Perchita

Pues para volver a la carga, ya que parece que ya se ha gastado los millones, está pidiendo ayuda / patrocinadores para la nueva serie.

Si queréis ayudar:


26 de agosto de 2011

Wormed! iPhone Game almost ready to go



Puedes ver mas sobre iPhoneGamesDev.com en iPad,iPhone,iPod touch, Mac, windows and linux Games

Nota, el vídeo fué eliminado así que hemos puesto el último vídeo.

25 de agosto de 2011

¿Que harías por 5 dolares?

Curioso sitio web donde todo el mundo se vende por solo 5 $

21 de agosto de 2011

Como conseguir un millón de visitas en tu web?

Es la pregunta que todo el mundo se hace, y parece que alguien tiene la respuesta, con un sistema aparentemente eficiente. Veremos que tal funciona.





P.D. Yo no garantizo que tengas un millón de visitas, ya que no lo he provado aún.

18 de agosto de 2011

juego curiosos del día

Al estilo defend the tower de plants vs zombies, nos llega este juego en html5, muy entretenido.

15 de agosto de 2011

Ya disponibles las betas de los juegos para Mac

Pues eso que ya se pueden descargar las betas que estaban para windows pero ahora para Mac.

10 de agosto de 2011

50 € en adsense, si lo activas en menos de 15 dias

Código promocional de adsense 50€, prueba con este código. 6GJ8-H87H-JZF5-GMZ9-GV82

No se si funcionará, pero pruebalo por si acaso.

31 de julio de 2011

Baterias Mac hackeables 0_0!

Y no precisamente para los buenos hacks, al menos este solo ha encontrado cosas malas que hacer con ello, como hacer explotar las baterias por ejemplo o robar contraseñas.


23 de julio de 2011

¿Cuanto vale AENA aeropuertos? Saberlo costará 440000 €

Me llega desde la Newsletter 66 de AENA, esto:

Aena adjudica a Analistas Financieros Internacionales el contrato de valorador independiente
Aena ha adjudicado a AFI Consultores de las Administraciones Públicas el contrato como valorador independiente en el proceso de desarrollo e implantación del nuevo modelo de gestión aeroportuario. AFI Consultores de las Administraciones Públicas, que desarrollará su trabajo junto al consultor internacional Roland Berger, deberá calcular el valor de la sociedad Aena Aeropuertos, incluyendo sus filiales y participaciones, de cara al proceso de privatización de hasta el 49% de su capital. Asimismo, deberá realizar una valoración de las sociedades concesionarias de los aeropuertos de Madrid-Barajas y Barcelona-El Prat. Para efectuar estas valoraciones deberá realizar proyecciones de tráfico aéreo, como mínimo hasta 2030.
En la realización de su trabajo, el valorador independiente podrá contar si lo desea con el plan de negocio de Aena Aeropuertos y de cada una de las sociedades concesionarias y con la valoración de los activos inmobiliarios realizada por Aena Aeropuertos. Toda esta información estará sometida a los correspondientes acuerdos de confidencialidad
En todo caso, esos datos serán considerados como una fuente más de información y en ningún caso como datos vinculantes, limitativos o condicionantes para su valoración. El plazo para realizar las valoraciones concluye el 1 de septiembre en el caso de las sociedades concesionarias y el 15 de septiembre en el caso de Aena Aeropuertos. El importe del contrato será de 440.000 euros.


¡¡¡¡ 440.000 € saber cuanto vale el Aeropuerto WTF !!!
Lo que es seguro es que ahora vale al menos 440.000 € menos que antes de no saberlo.

22 de junio de 2011

DebtOcracy documental griego sobre la crisis y su solución

Muy bueno e interesante documental sobre esta crisi. Hay que verlo.

http://debtocracy.gr

Además es un documental Creative Commons, paga tu entrada después de verla.

10 de junio de 2011

El manual supersecreto de anonymous

Después de reírme un rato con la conferencia de prensa que han dado la policía Española, con motivo de la detención de "la cúpula" de anonymous en España, me he puesto a ver que tal estaba el resto de cúpulas. Buscando entre cientos de webs, he llegado a este informativo manual.

pdf file: Anonymous - El Manual Super-Secreto - 0.2.1 - ES - Rev.1.pdf

Realmente es una lectura muy interesante y bastante paranoide.

P.D. Mis conclusiones son que Anonymous está activo y bien activo, así que de cúpula, nada de nada, solo publicidad para decir a la gente que los ataques D.O.S. son ilegales y que pueden caerte de 1 a 3 años de cárcel por hacer ping a una web a la vez que otros 500000 anónimos.

27 de mayo de 2011

La buena noticia del día, Aena comprará 33 coches eléctricos

En su apuesta decidida por la sostenibilidad medioambiental de la actividad aeroportuaria, Aena ha adquirido 33 coches eléctricos en modalidad de renting a 3 años a la empresa Northgate por un importe de 1.016.065,44 euros. Los vehículos empezarán a utilizarse a partir del mes de
julio en los aeropuertos de Madrid, Barcelona, Palma de Mallorca y Lanzarote. Se trata de la mayor fl ota de coches eléctricos de un gestor aeroportuario en Europa. La utilización de este tipo de vehículos está incluida en el Plan de Ahorro, Efi ciencia Energética y Reducción de
Emisiones, en el Transporte y la Vivienda del Ministerio de Fomento y se alinea con las propuestas del Libro Blanco de Transportes de la Comisión Europea.

Los 33 vehículos se distribuirán de la siguiente manera: 10 coches para Madrid – Barajas, otros 10 para Barcelona, 8 para Palma de Mallorca y 5 para Lanzarote. Los coches se utilizarán para dar servicio a los aeropuertos en las actividades realizadas en el “lado aire” por los departamentos de operaciones, medioambiente e ingeniería, entre otros. Con esta primera fl ota, Aena analizará la viabilidad de sustituir por coches eléctricos la totalidad de los vehículos convencionales que utiliza en la actividad aeroportuaria, más de 1.200, y extender su utilización también a otras empresas que operan en los aeropuertos como compañías aéreas o de handling.

Fuente: Newsletter 57 de AENA -> Copyright Aena Dirección de Comunicación C/ Arturo Soria 109 28043 Madrid


Desde luego una gran noticia para el medio ambiente, aunque la verdad es que podían haber jugado mejor sus cartas y no pagar esa burrada por cada coche eléctrico. (Si se van a un concesionario seguro que les habrían cobrado menos)

Vergüenza ajena, los mossos atacando a manifestantes pacificos


Ahora si me dan ganas de llenar la plaza Catalunya de nuevo, y eso que no puedo ir.

25 de mayo de 2011

Get paid for play

Just use the virtapay button and register on site.

Buy with VirtaPay

23 de mayo de 2011

Entrada en los ayuntamientos del Partido Pirata

Muchísimas felicidades al Partido Pirata, al final va a ser que no era tirar el voto a la basura como algunos decían...

8 de marzo de 2011

Tunel ssh usado como web proxy

Access Denied.
Access control configuration prevents your request from being allowed at this time. Please contact your service provider if you feel this is incorrect.

Y una mierda :)

7 de marzo de 2011

Grooveshark, música online y gratis

Voy a enlazar a un sitio que se puede escuchar música gratis ... uuuhhh ... ¿me denunciarán como al rincon de chus? Enlazar no es delito!!! Y si cambian la ley para que lo sea, que denuncien a google.

22 de febrero de 2011

¿Primer intento de capar Series Yonkis?

Hoy me he encontrado que seriesyonkis.com no se abría. Parece que no ha sido únicamente mi conexión (Jazztel), ya que tras una busqueda rápida me encuentro que también ha pasado en teléfonica. La solución ha sido cambiar de dns. Tal vez esten probando el nivel de inutilidad en informática de los "piratas", y aunque seguramente se carguen a alguno (cualquiera que no sepa usar google) están lejos de dejarnos sin series y menos aún sin libertad de expresión.

Sea como sea, www.nolesvotes.com


Por cierto, si cambiar de dns no os funciona probad a usar un webproxy o mejor aún usad vpn.

Ale, ya tenéis lo que necesitáis buscar en google.


16 de febrero de 2011

Hacker Evolution-Time dimensions


Si os molan los videojuegos, aquí tenéis uno para jugar a hackers y ya de paso practicar un pokito de comandline de linux(k a mas de uno le vendrá bien ;D). Este juego lo podéis pillar en Steam :DDD y nada, sino os mola podéis continuar jugando con vuestros sims( a ahogarlos en la piscina ;D).


Liberada Debian Squeeze 6.0


El pasado día 6 fue liberada la versión estable más reciente de esta estupenda distribución Linux, caracterizada por su estabilidad por encima de todo, y su política de software libre.Debian squeeze trae un montón de cambios respecto a lenny, entre los que destacan:


kde 4.5 (por fin!!!)
gnome 2.30
xfce 4.6
lxde 0.5.0
openoffice 3.2.1 (ya era hora…. )
gimp 2.6.11
X.org 7.5
iceweasel 3.5.16 (podian haber metido la 3.6…)
kernel linux-2.6.32 (si, en ubuntu ya usan el 35, y que… el 32 va bien.)
un nuevo artwork, muy distinto de lo que nos tienen acostumbrados (aunque es un poco feo. sobre todo el grub. pero bueno. decisiones mas desacertadas se han visto)


11 de febrero de 2011

Los videojuegos salen de la pantalla

Impresionante este juego que usa el AR Drone Parrot para captar las imagenes que este envía y aplicarles realidad aumentada en el Iphone. La mujer ya me ha dicho que ni de coña me gasto un euro en eso :_(

6 de febrero de 2011

Manual del terrorista islámico, encontrado en freenet

Esto que voy a pegar aqui, lo he encontrado en freenet, y nos da una muestra de lo que los fanatismos, unido a la locura de ciertos individuos, mas las ansias de poder de otros están creando.

Realmente con esto se podría hacer toda una película de espías/terroristas, con datos reales. Algunas afirmaciones aquí escritas, dan miedo, bueno ya lo leeréis y flipareis por vosotros mismos.

This is a translation of an original document written in Arabic

The complete original scans of the translated document. Some of them are not yet transcribed to HTML.

the al-Qaeda flag

Military Studies in the Jihad Against the Tyrants

In the name of Allah, the merciful and compassionate.

Presentation

To those champions who avowed the truth day and night... And wrote with their blood and sufferings these phrases...

The confrontation that we are calling for with the apostate regimes does not know Socratic debates..., Platonic ideals..., nor Aristotelian diplomacy. But it knows the dialogue of bullets, the ideals of assassination, bombing, and destruction, and the diplomacy of the cannon and machine-gun.

Islamic governments have never and will never be established through peaceful solutions and cooperative councils. They are established as they [always] have been

by pen and gun

by word and bullet

by tongue and teeth.

In the name of Allah, the merciful and compassionate

Belongs to the guest house. Please do not remove it from the house except with permission.

[signature illegible]

Pledge, O Sister

To the sister believer whose clothes the criminals have stripped off.

To the sister believer whose hair the oppressors have shaved.

To the sister believer whose body has been abused by the human dogs.

To the sister believer whose...

Pledge, O Sister

Covenant, O Sister...to make their women widows and their children orphans.

Covenant, O Sister...to make them desire death and hate appointments and prestige.

Covenant, O Sister... to slaughter them like lambs and let the Nile, al-Asi, and Euphrates rivers flow with their blood.

Covenant, O Sister... to be a pick of destruction for everygodless and apostate regime.

Covenant, O Sister... to retaliate for you against every dog who touch you even with a bad word.

In the name of Allah, the merciful and compassionate.

Thanks be to Allah. We thank him, turn to him, ask his forgiveness, and seek refuge in him from our wicked souls and bad deeds. Whomever Allah enlightens will not be misguided, and the deceiver will never be guided. I declare that there is no godbut Allah alone; he has no partners. I also declare that Mohammed is his servant and prophet.

[Koranic verses]:

O ye who believe! Fear Allah as He should be feared, and die not except in a state of Islam

O mankind! Fear your guardian lord who created you from a single person. Created, out of it, his mate, and from them twain scattered [like seeds] countless men and women; fear Allah, through whom ye demand your mutual [rights], and be heedful of the wombs [that bore you]: for Allah ever watches over you.

O ye who believe! Fear Allah, and make your utterance straight forward: That he may make your conduct whole and sound and forgive you your sins. He that obeys Allah and his messenger, has already attained the great victory.

Afterward,

The most truthful saying is the book of Allah and the best guidance is that of Mohammed, God bless and keep him. Therefore, the worst thing is to introduce something new, for every novelty is an act of heresy and each heresy is a deception.

Introduction

Martyrs were killed, women were widowed, children were orphaned, men were handcuffed, chaste women's heads were shaved, harlots' heads were crowned, atrocities were inflicted on the innocent, gifts were given to the wicked, virgins were raped on the prostitution altar...

After the fall of our orthodox caliphates on March 3, 1924 and after expelling the colonialists, our Islamic nation was afflicted with apostate rulers who took over in the Moslem nation. These .rulers turned out to be more infidel and criminal than the colonialists themselves. Moslems have endured all kinds of harm, oppression, and torture at their hands.

Those apostate rulers threw thousands of the Haraka Al-Islamyia (IslamicMovement) youth in gloomy jails and detention centers that were equipped with the most modern torture devices and [manned with] experts in oppression and torture. Those youth had refused to move in the rulers' orbit, obscure matters to the youth, and oppose the idea of rebelling against the rulers. But they [the rulers] did not stop there; they started to fragmentthe essence of the Islamic nation by trying to eradicate its Moslem identity. Thus, they started spreading godless and atheistic views among the youth. We found some that claimed that socialism was from Islam, democracy was the [religious] council, and the prophet - God bless and keep him - propagandized communism.

Colonialism and its followers, the apostate rulers, then started to openly erect crusader centers, societies, and organizations like Masonic Lodges, Lions and Rotary clubs, and foreign schools. They aimed at producing a wasted generation that pursued everything that is western and produced rulers, ministers, leaders, physicians, engineers, businessmen, politicians, journalists, and information specialists.

[Koranic verse:]

And Allah's enemies plotted and planned, and Allah too planned, and the best of planners is Allah.

They [the rulers] tried, using every means and [kind of] seduction, to produce a generation of young men that did not know [anything] except what they [the rulers] want, did not say except what they [the rulers] think about, did not live except according to their [the rulers') way, and did not dress except in their [the rulers'] clothes. However, majestic Allah turned their deception back on them, as a large group of those young men who were raised by them [the rulers] woke up from their sleep and returned to Allah, regretting and repenting.

The young men returning to Allah realized that Islam is not just performing rituals but a complete system: Religion and government, worship and Jihad [holy war], ethics and dealing with people, and the Koran and sword. The bitter situation that the nation has reached is a result of its divergence from Allah's course and his righteous law for all places and times. That [bitter situation] came about as a result of its children's love for the world, their loathing of death, and their abandonment of Jihad [holy war].

Unbelief is still the same. It pushed Abou Jahl - may Allah curse him - and Kureish's valiant infidels to battle the prophet - God bless and keep him - and to torture his companions - may Allah's grace be on them. It is the same unbelief that drove Sadat, Hosni Mubarak, Gadhafi, Hafez Assad, Saleh, Fahed - Allah's curse be upon the non-believing leaders - and all the apostate Arab rulers to torture, kill, imprison, and torment Moslems.

These young men realized that an Islamic government would never be established except by the bomb and rifle. Islam does not coincide or make a truce with unbelief, but rather confronts it.

The confrontation that Islam calls for with these godless and apostate regimes, does not know Socratic debates, Platonic ideals nor Aristotelian diplomacy. But it knows the dialogue of bullets, the ideals of assassination, bombing, and destruction, and the diplomacy of the cannon and machine-gun.

The young came to prepare themselves for Jihad [holy war], commanded by the majestic Allah's order in the holy Koran.

[Koranic verse:]

Against them make ready your strength to the utmost of your power, including steeds of war, to strike terror into (the hearts of) the enemies of Allah and your enemies, and others besides whom ye may not know, but whom Allah doth know.

I present this humble effort to these young Moslem men who are pure, believing, and fighting for the cause of Allah. It is my contribution toward paving the road that leads to majestic Allah and establishes a caliphate according to the prophecy.

According to Imam Ahmad's account, the prophet - God bless and keep him - said,...

[A few lines of Hadith verses, not translated]

First Lesson: General Introduction

We cannot resist this state of ignorance unless we unite our ranks, and adhere to our religion. Without that, the establishment of religion would be a dream or illusion that is impossible to achieve or even imagine its achievement. Sheik Ibn Taimia - may Allah have mercy on him - said,

The interests of all Adam's children would not be realized in the present life, nor in the next, except through assembly, cooperation, and mutual assistance. Cooperation is for achieving their interests and mutual assistance is for overcoming their adversities. That is why it has been said, 'man is civilized by nature.' Therefore, if they unite there will be favorable matters that they do, and corrupting matters to avoid. They will be obedient to the commandment of those goals and avoidant of those immoralities. It is necessary that all Adam's children obey.

He [Sheik Inb Taimia] then says,

It should be understood that governing the people's affairs is one of the greatest religious obligations. In fact, without it, religion and world [affairs] could not be established. The interests of Adam's children would not be achieved except in assembly, because of their mutual need. When they assemble, it is necessary to [have] a leader. Allah's prophet -God bless and keep him -even said, 'If three [people] come together let them pick a leader.' He then necessitated the rule by one of a small, non-essential travel assembly in order to draw attention to the remaining types of assembly. Since Allah has obligated us to do good and avoid the unlawful, that would not be done except through force and lording. Likewise, the rest of what he [God] obligated [us with] would not be accomplished except by force and lordship, be it Jihad [holy war], justice,pilgrimage, assembly, holidays, support of the oppressed, or the establishment of boundaries. That is why it has been said, "the sultan is Allah's shadow on earth"

The book Tharwat Al-Sinam Fe Al-Ta'at wa Al-Nizam, by Ibrahim Al-Masri, copying from Al-Fannawi Ibn Taimi's collection, 28-380.

Principles of Military Organization

Military Organization has three main principles without which it cannot be established.

  1. Military Organization commander and advisory council
  2. The soldiers (individualmembers)
  3. A clearly defined strategy

Military Organization Requirements

The Military Organization dictates a number of requirements to assist it in confrontation and endurance. These are:

  1. Forged documents and counterfeit currency
  2. Apartments and hiding places
  3. Communication means
  4. Transportation means
  5. Information
  6. Arms and ammunition
  7. Transport

Missions Required of the Military Organization

The main mission for which the Military Organization is responsible is: The overthrow of the godless regimes and their replacement with an Islamic regime. Other missions consist of the following:

  1. Gathering information about the enemy, the land, the installations, and the neighbors.
  2. Kidnapping enemy personnel, documents, secrets, and arms.
  3. Assassinating enemy personnel as well as foreign tourists.
  4. Freeing the brothers who are captured by the enemy.
  5. Spreading rumors and writing statements that instigate people against the enemy.
  6. Blasting and destroying the places of amusement, immorality, and sin; not a vital target.
  7. Blasting and destroying the embassies and attacking vital economic centers.
  8. Blasting and destroying bridges leading into and out of the cities.

Importance of the Military Organization

  1. Removal of those personalities that block the call's path. [A different handwriting:] All types of military and civilian intellectuals and thinkers for the state.
  2. Proper utilization of the individuals' unused capabilities.
  3. Precision in performing tasks, and using collective views on completing a job from all aspects, not just one.
  4. Controlling the work and not fragmenting it or deviating from it.
  5. Achieving long-term goals such as the establishment of an Islamic state and short-term goals such as operations against enemy individuals and sectors.
  6. Establishing the conditions for possible confrontation with the regressive regimes and their persistence.
  7. Achieving discipline in secrecy and through tasks.

Second Lesson: Necessary Qualifications and Characteristics for the Organization's Member

Necessary Qualifications for the Organization's members

Islam

The member of the Organization must be Moslem. How can an unbeliever, someone from a revealed religion [Christian, Jew], a secular person, a communist, etc. protect Islam and Moslems and defend their goals and secrets when he does not believe in that religion [Islam]? The Israeli Army requires that a fighter be of the Jewish religion. Likewise, the command leadership in the Afghan and Russian armies requires any one with an officer's position to be a member of the communist party.

Commitment to the Organization's Ideology

This commitment frees the Organization's members from conceptional problems.

Maturity

The requirements of military work are numerous, and a minor cannot perform them. The nature of hard and continuous work in dangerous conditions requires a great deal of psychological, mental, and intellectual fitness, which are not usually found in a minor. It is reported that Ibn Omar - may Allah be pleased with him - said, During Ahad [battle] when I was fourteen years of age, I was submitted [as a volunteer] to the prophet - God bless and keep him. He refused me and did not throw me in the battle. During Khandak [trench] Day [battle] when I was fifteen years of age, I was also submitted to him, and he permitted me [to fight].

Sacrifice

He [the member] has to be willing to do the work and undergo martyrdom for the purpose of achieving the goal and establishing the religion of majestic Allah on earth.

Listening and Obedience

In the military, this is known today as discipline. It is expressed by how the member obeys the orders given to him. That is what our religion urges. The Glorious says, O, ye who believe! Obey Allah and obey the messenger and those charged with authority among you. In the story of Hazifa Ben Al-Yaman - may Allah have mercy on him -who was exemplary in his obedience to Allah's messenger - Allah bless and keep him. When he [Mohammed] - Allah bless and keep him - sent him to spy on the Kureish and their allies during their siege of Madina, Hazifa said, As he [Mohammed] called me by name to stand, he said, Go get me information about those people and do not alarm them about me. As I departed, I saw Abou Soufian and I placed an arrow in the bow. I [then] remembered the words of the messenger - Allah bless and keep him -do not alarm them about me. If I had shot I would have hit him.

Keeping Secrets and Concealing Information

[This secrecy should be used] even with the closest people,for deceiving the enemies is not easy. Allah says, Even though their plots were such that as to shake the hills! [Koranic verse]. Allah's messenger - God bless and keep him - says, Seek Allah's help in doing your affairs in secrecy. It was said in the proverbs, The hearts of freemen are the tombs of secrets and Moslems' secrecy is faithfulness, and talking about it is faithlessness. [Mohammed] - God bless and keep him - used to keep work secrets from the closest people, even from his wife A'isha - may Allah's grace be on her.

Free of Illness

The Military Organization's member must fulfill this important requirement. Allah says, There is no blame for those who are infirm, or ill, or who have no resources to spend.

Patience

[The member] should have plenty of patience for [enduring] afflictions if he is overcome by the enemies. Be should not abandon this great path and sell himself and his religion to the enemies for his freedom. He should be patient in performing the work, even if it lasts a long time.

Tranquility and Unflappability

[The member] should have a calm personality that allows him to endure psychological traumas such as those involving bloodshed, murder, arrest, imprisonment, and reverse psychological traumas such as killing one or all of his Organization's comrades. [He should be able] to carry out the work.

Intelligence and Insight

When the prophet - Allah bless and keep him - sent Hazifa Ben Al-Yaman to spy on the polytheist and [Hafiza] sat among them, Abou Soufian said, Let each one of you look at his companion. Hazifa said to his companion, Who are you? The companion replied, So-and-so son of so-and-so.

In World War I, the German spy, Julius Seelber [PH] managed to enter Britain and work as a mail examiner due to the many languages he had mastered. From the letters, he succeeded in obtaining important information and sent it to the Germans. One of the letters that he checked was from a lady who had written to her brother's friend in the fleet. She mentioned that her brother used to live with her until he was transferred to a secret project that involved commercial ships. When Seelber read that letter, he went to meet that young woman and blamed her for her loose tongue in talking about military secrets. He, skillfully, managed to draw out of her that her brother worked in a secret project for arming old commercial ships. These ships were to be used as decoys in the submarine war in such a way that they could come close to the submarines, as they appeared innocent. Suddenly, cannonballs would be fired from the ships's hidden cannons on top of the ships, which would destroy the submarines. 48 hours later that secret was handed to the Germans.

Caution and Prudence

In his battle against the king of Tomedia [PHI,the Roman general Speer [PH]sent an emissary to discuss with that king the matter of truce between the two armies. In reality, he had sent him to learn about the Tomedians' ability to fight. The general picked, Lilius [PH], one of his top commanders, for that task and sent with him some of his officers, disguised as slaves. During that mission, one of the king's officers, Sifax [PH] pointed to one of the [disguised] slaves and yelled, That slave is a Roman officer I had met in a neighboring city. He was wearing a Roman uniform. At that point, Lilius used a clever trick and managed to divert the attention of the Tomedians from that by turning to the disguised officer and quickly slapping him on the face a number of times. He reprimanded him for wearing a Roman officer'suniform when he was a slave and for claiming a status that he did not deserve.

The officer accepted the slaps quietly. He bowed his head in humility and shame, as slaves do. Thus, Sifax men thought that officer was really a slave because they could not imagine that a Roman officer would accept these hits without defending himself.

King Sifax prepared a big feast for Lilius and his entourage and placed them in a house far away from his camp so they could not learn about his fortifications. They[the Romans] made another clever trick on top of the first one. They freed one of their horses and started chasinghim in and around the camp. After they learned about the extent of the fortifications they caught the horse and, as planned, managed to abort their mission about the truce agreement. Shortly after their return, the Roman generalattacked King Sifax' camp and burned the fortifications. Sifax was forced to seek reconciliation.

There was a secret agent who disguised himself as an American fur merchant. As the agent was playing cards aboard a boat with some passengers, one of the playersasked him about his profession. He replied that he was a fur merchant. The women showed interest [in him] and began asking the agent -the disguised fur merchant -manyquestions about the types and prices of fur. He mentioned fur price figures that amazed the women. They started avoiding and regarding him with suspicion, as though he were a thief, or crazy.

Truthfulness and Counsel

The Commander of the faithful, Omar Ibn Al-Khattab -mayAllah be pleased with him -asserted that this characteristic was vital in those who gather information and work as spies against the Moslems' enemies. He [Omar] sent a letter to Saad Ibn Abou Wakkas - may Allah be pleased with him - saying,

If you step foot on your enemies' land, get spies on them. Choose those whom you count on for their truthfulness and advice, whether Arabs or inhabitants of that land. Liars' accounts would not benefit you, even if some of them were true; the deceiver is a spy against you and not for you.
Ability to Observe and Analyze

The Israeli Mossad received news that some Palestinians were going to attack an Israeli El Al airplane. That plane was going to Rome with Golda Meir - Allah's curse upon her - the Prime Minister at the time, on board. The Palestinians had managed to use a clever trick that allowed them to wait for the arrival of the plane without being questioned by anyone. They had beaten a man who sold potatoes, kidnapped him, and hidden him. They made two holes in the top of that peddler's cart and placed two tubes next to the chimney through which two Russian-made Strella [PH] missiles could be launched. The Mossad officers traveled the airport back and forth looking for that lead them to the Palestinians. One officer passed the potato cart twice without noticing anything. On his third time, he noticed three chimneys, but only one of them was working with spoke coming out of it. He quickly steered toward the cart and hit it hard. The cart overturned, and the Palestinians were captured.

Ability to Act, Change Positions and Conceal Oneself
  • [An example] is what Noaim Ibn Masoud had done in his mission to cause agitation among the tribes of Koraish, those of Ghatfan, and the Jews of Koreitha. He would control his reactions and managed to skillfully play his role. Without showing signs of inconsistency, he would show his interest and zeal towards the Jews one time and show his concern about the Koraish at another.
  • In 1960, a car driven by an American colonel collided with a truck. The colonel lost consciousness, and while unconscious at the hospital, he started speaking Russian fluently. It was later discovered that the colonel was a Soviet spy who was planted in the United States. He had fought in Korea in order to conceal his true identity and to gather information and critical secrets. If not for the collision, no one would have suspected or confronted him.

This story is found in the book A'n Tarik Al-Khida' By Way of Deception Methods, by Victor Ostrovsky [PH]. The author claims that the Mossad wants to kill him for writing that book. However, I believe that the book was authorized by the Israeli Mossad.

Third Lesson: Counterfeit Currency And Forged Documents

Financial Security Precautions:

  1. Dividing operational funds into two parts: One part is to be invested in projects that offer financial return, and the other is to be saved and not spent except during operations.
  2. Not placing operational funds [all] in one place.
  3. Not telling the Organization members about the location of the funds.
  4. Having proper protection while carrying large amounts of money.
  5. Leaving the money with non-members and spending it as needed.

Forged Documents (IdentityCards, Records Books, Passports)

The following security precautions should be taken:

  1. Keeping the passport in a safe place so it would not be ceized by the security apparatus, and the brother it belongs to would have to negotiate its return (I'll give you your passport if you give me information)
  2. All documents of the undercover brother, such as identity cards and passport, should be falsified.
  3. When the undercover brother is traveling with a certain identity card or passport, he should know all pertinent[information] such as the name, profession, and place of residence.
  4. The brother who has special work status (commander,communication link,...) should have more than one identitycard and passport. He should learn the contents of each, the nature of the [indicated] profession, and the dialect of the residence area listed in the document.
  5. The photograph of the brother in these documents should be without a beard. It is preferable that the brother's public photograph [on these documents] be also without a beard. If he already has one [document] showing a photograph with a beard, he should replace it.
  6. When using an identity document in different names, no more than one such document should be carried at one time.
  7. The validity of the falsified travel documents should always be confirmed.
  8. All falsification matters should be carried out through the command and not haphazardly (procedurecontrol)
  9. Married brothers should not add their wives to their passports.
  10. When a brother is carrying the forged passport of a certain country, he should not travel to that country. It is easy to detect forgery at the airport, and the dialect of the brother is different from that of the people from that country.

Security Precautions Related to the Organization's Given Names:

  1. The name given by the Organization [to the brother] should not be odd in comparison with other names used around him.
  2. A brother should not have more than one name in the area where he lives {the undercover work place)

Fourth Lesson: Organization Military Bases

Apartments Places - Hiding

Definition of Bases:

* These are apartments, hiding places, command centers, etc. in which secret operations are executed against the enemy.

These bases may be in cities, and are [then] called homes or apartments. They may be in mountainous, harsh terrain far from the enemy, and are [then] called hiding places or bases.

During the initial stages, the Military Organization usually uses apartments in cities as places for launching assigned missions, such as collecting information, observing members of the ruling regime, etc.

Hiding places and bases in mountains and harsh terrain are used at later stages, from which Jihad [holy war] groups are dispatched to execute assassination operations of enemy individuals, bomb their centers, and capture their weapons. In some Arab countries such as Egypt, where there are no mountains or harsh terrain, all stages of Jihad work would take place in cities. The opposite was true in Afghanistan, where initiallyJihad work was in the cities, then the warriors shifted to mountains and harsh terrain. There, they started battling the Communists.

Security Precautions Related to Apartments

  1. Choosing the apartment carefully as far as the location, the size for the work necessary (meetings,storage, arms, fugitives, work preparation).
  2. It is preferable to rent apartments on the ground floor to facilitate escape and digging of trenches.
  3. Preparing secret locations in the apartment for securingdocuments, records, arms, and other important items.
  4. Preparing ways of vacating the apartment in case of a surprise attack (stands,wooden ladders).
  5. Under no circumstances should any one know about the apartment except those who use it.
  6. Providing the necessary cover for the people who frequent the apartment (students,workers, employees, etc.)
  7. Avoiding seclusion and isolation from the population and refraining from going to the apartment at suspicious times.
  8. It is preferable to rent these apartments using false names, appropriate cover, and non-Moslem appearance.
  9. A single brother should not rent more than one apartment in the same area, from the same agent, or using the same rental office.
  10. Care should be exercised not to rent apartments that are known to the security apparatus [such as] those used for immoral or prior Jihad activities.
  11. Avoiding police stations and government buildings. Apartments should not be rented near those places.
  12. When renting these apartments, one should avoid isolated or deserted locations so the enemy would not be able to catch those living there easily.
  13. It is preferable to rent apartments in newly developed areas where people do not know one another. Usually, in older quarters people know one another and strangers are easily identified, especially since these quarters have many informers.
  14. Ensuring that there is has been no surveillance prior to the members entering the apartment.
  15. Agreement among those living in the apartment on special ways of knocking on the door and special signs prior to entry into the building's main gate to indicate to those who wish to enter that the place is safe and not being monitored. Such signs include hanging out a towel, opening a curtain, placing a cushion in a special way, etc.
  16. If there is a telephone in the apartment, calls should be answered in an agreed-upon manner among those who use the apartment. That would prevent mistakes that would, otherwise, lead to revealing the names and nature of the occupants.
  17. For apartments, replacing the locks and keys with new ones. As for the other entities (camps,shops, mosques), appropriate security precautions should be taken depending on the entity's importance and role in the work.
  18. Apartments used for undercover work should not be visible from higher apartments in order not to expose the nature of the work.
  19. In a newer apartment, avoid talking loud because prefabricated ceilings and walls [used in the apartments] do not have the same thickness as those in old ones.
  20. It is necessary to have at hand documents supporting the undercover [member]. In the case of a physician, there should be an actual medical diploma, membership in the [medical] union, the government permit, and the rest of the routine procedures known in that country.
  21. The cover should blend well [with the environment]. For example, selecting a doctor's clinic in an area where there are clinics, or in a location suitable for it.
  22. The cover of those who frequent the location should match the cover of that location. For example, a common laborer should not enter a fancy hotel because that would be suspicious and draw attention.

Fifth Lesson: Means Of Communication And Transportation

In the name of Allah, the merciful and compassionate

Means of Transportation

Introduction:

It is well known that in undercover operations, communication is the mainstay of the movement for rapid accomplishment. However, it is a double-edged sword: It can be to our advantage if we use it well and it can be a knife dug into our back if we do not consider and take the necessary security measures.

Communication Means

The Military Organization in any Islamic group can, with its modest capabilities, use the following means:

  1. The telephone
  2. Meeting in-person
  3. Messenger
  4. Letters
  5. Some modern devices, such as the facsimile and wireless [communication].

Communication may be within the county, state, or even the country, in which case it is called local communication. When it extends expanded between countries, it is then called international communication.

Secret Communication is Limited to the Following Types: Common, standby, alarm

  1. Common Communication: It is a communication between two members of the Organization without being monitored by the security apparatus opposing the Organization. The common communication should be done under a certain cover and after inspecting the surveillance situation [by the enemy].
  2. Standby Communication: This replaces common communication when one of the two parties is unable to communicate with the other for some reason.
  3. Alarm Communication: This is used when the opposing security apparatus discovers an undercover activity or some undercover members. Based on this communication, the activity is stopped 'for a while, all matters related to the activity are abandoned,and the Organization's members are hidden from the security personnel.

Method of Communication Among Members of the Organization

  1. Communication about undercover activity should be done using a good cover; it should also be quick, explicit, and pertinent. That is, just for talking only.
  2. Prior to contacting his members, the commander of the cell[2] should agree with each of them separately (the cell members should never meet all in one place and should not know one another) on a manner and means of communication with each other. Likewise, the chief of the Organization should [use a similar technique] with the branch commanders.
  3. A higher-ranking commander determines the type and method of communication with lower-ranking leaders.

First Means: The Telephone:

Because of significant technological advances, security measuresfor monitoring the telephone and broadcasting equipment have increased. Monitoring may be done by installing a secondaryline or wireless broadcasting device on a telephone that relays the calls to a remote location. That is why the Organization takes security measures among its members who use this means of communication (the telephone).

  1. Communication should be carried out from public places. One should select telephones that are less suspicious to the security apparatus and are more difficult to monitor. It is preferable to use telephones in booths and on main streets. [2.] Cell or cluster methods should be adopted by the Organization. It should be composed of many cells whose members do not know one another, so that if a cell member is caught the other cells would not be affected, and work would proceed normally.
  2. Conversation should be coded or in general terms so as not to alert the person monitoring [the telephone].
  3. Periodically examining the telephone wire and the receiver.
  4. Telephone numbers should be memorized and not recorded. If the brother has to write them, he should do so using a code so they do not appear as telephone numbers (figures from a shopping list, etc.)
  5. The telephone caller and person called should mention some words or sentences prior to bringing up the intended subject. The brother who is calling may misdial one of the digits and actually call someone else. The person ‘called may claim that the call is for him, and the calling brother may start telling him work-related issues and reveal many things because of a minor error.
  6. In telephone conversations about undercover work, the voice should be changed and distorted.
  7. When feasible, it is preferable to change telephone lines to allow direct access to local and international calls. That and proper cover facilitate communications and provide security protection not available when the central telephone station in the presence of many employees is used.
  8. When a telephone [line] is identified [by the security apparatus], the command and all parties who were using it should be notified as soon as possible in order to take appropriate measures.
  9. When the command is certain that a particular telephone [line] is being monitored, it can exploit it by providing information that misleads the enemy and benefits the work plan.
  10. If the Organization manages to obtain jamming devices, it should use them immediately.

Second Means: Meeting in-person:

This is direct communication between the commander and a member of the Organization. During the meeting the following are accomplished:

  1. Information exchange
  2. Giving orders and instructions
  3. Financing
  4. Member follow-up

Stages of the In-Person Meeting:

  1. Before the meeting
  2. The meeting [itself]
  3. After the meeting
Before the Meeting:

The following measures should be taken:

  1. Designating the meeting location
  2. Finding a proper cover for the meeting
  3. Specifying the meeting date and time
  4. Defining special signals between those who meet
Identifying the meeting location:

If the meeting location is stationary, the following matters should be observed:

  1. The location should be far from police stations and security centers.
  2. Ease of transportation to the location.
  3. Selecting the location prior to the meeting and learning all its details.
  4. If the meeting location is an apartment, it should not be the first one, but one somewhere in the middle.
  5. The availability of many roads leading to the meetinglocation. That would provide easy escape in case the location ware raided by security personnel.
  6. The location should not be under suspicion (by the security [apparatus])
  7. The apartment where the meeting takes place should be on the ground floor, to facilitate escape.
  8. The ability to detect any surveillance from that location.
  9. When public transportation is used, one should alight at some distance from the meeting location and continue on foot. In the case of a private vehicle, one should park it far away or in a secure place so as to be able to maneuver it quickly at any time.

If the meeting location is not stationary, the following matters should be observed:

  1. The meeting location should be at the intersection of a large number of main and side streets to facilitate entry, exit, and escape.
  2. The meeting location (such as a coffee shop) should not have members that might be dealing with the security apparatus.
  3. The meeting should not be held in a crowded place because that would allow the security personnel to hide and monitor those who meet.
  4. It is imperative to agree on an alternative location for the meeting in case meeting in the first is unfeasible. That holds whether the meeting place is stationary or not.

Those who meet in-person should do the following:

  1. Verifying the security situation of the location before the meeting.
  2. Ensuring that there are no security personnel behind them or at the meeting place.
  3. Not heading to the location directly.
  4. Clothing and appearance should be appropriate for the meeting location.
  5. Verifying that private documents carried by the brother have appropriate cover.
  6. Prior to the meeting, designing a security plan that specifies what the security personnel would be told in case the location were raided by them, and what [the brothers] would resort to in dealing with the security personnel (fleeing, driving back,...)
Finding a proper cover for the meeting: [The cover]
  1. Should blend well with the nature of the location.
  2. In case they raid the place, the security personnel should believe the cover.
  3. Should not arouse the curiosity of those present.
  4. Should match the person's appearance and his financial and educational background.
  5. Should have documents that support it.
  6. Provide reasons for the two parties' meeting (for example, one of the two parties should have proof that he is an architect. The other should have documents as proof that he is a land owner. The architect has produced a construction plan for the land)
Specifying the Meeting Date and Time:
  1. Specifying the hour of the meeting as well as the date.
  2. Specifying the time of both parties' arrival and the time of the first party's departure.
  3. Specifying how long the meeting will last.
  4. Specifying an alternative date and time.
  5. Not allowing a long period of time between making the meeting arrangements and the meeting itself.
Designating special signals between those who meet

If the two individuals meeting know one another's shape and appearance, it is sufficient to use a single safety sign.

[In that case,] the sitting and arriving individuals inform each other that there is no enemy surveillance. The sign may be keys, beads, a newspaper, or a scarf. The two parties would agree on moving it in a special way so as not to attract the attention of those present.

If the two individuals do not know one another, they should do the following:

  1. The initial sign for becoming acquainted may be that both of them wear a certain type of clothing or carry a certain item. These signs should be appropriate for the place, easily identified, and meet the purpose. The initial sign for becoming acquainted does not [fully] identify one person by another. It does that at a rate of 30%.
  2. Safety Signal: It is given by the individual sitting in.the meeting location to inform the second individual that the place is safe. The second person would reply through signals to inform the first that he is not being monitored. The signals are agreed upon previously and should not cause suspicion.
  3. A second signal for getting acquainted is one in which the arriving person uses while sitting down. That signal may be a certain clause, a word, a sentence, or a gesture agreed upon previously, and should not cause suspicion for those who hear it or see it.
B. The Stage of the Meeting [itself]

The following measures should be taken:

  1. Caution during the meeting.
  2. Not acting unnaturally during the meeting in order not to raise suspicion.
  3. Not talking with either loud or very low voices ([should be] moderate).
  4. Not writing anything that has to do with the meeting.
  5. Agreeing on a security plan in case the enemy raids the location.
C. After the Meeting

The following measures should be taken:

  1. Not departing together, but each one separately.
  2. Not heading directly to the main road but through secondary ones.
  3. Not leaving anything in the meeting place that might indicate the identity or nature of those who met.

Meeting in-person has disadvantages, such as:

  1. Allowing the enemy to capture those who are meeting.
  2. Allowing them [the enemy] to take pictures of those who are meeting, record their conversation, and gather evidence against them.
  3. Revealing the appearance of the commander to the other person. However, that may be avoided by taking the previously mentioned measures such as disguising himself well and changing his appearance (glasses, wig, etc.)

Third Means: The Messenger

This is an intermediary between the sender and the receiver. The messenger should possess all characteristics mentioned in the first chapter regarding the Military Organization's member.

These are the security measures that a messenger should take:

  1. Knowledge of the person to whom he will deliver the message.
  2. Agreement on special signals, exact date, and specifictime.
  3. Selecting a public street or place that does not raise suspicion.
  4. Going through a secondary road that does not have check points.
  5. Using public transportation (train,bus,...) and disembarking before the main station. Likewise,embarking should not be done at the main station either, were there are a lot of security personnel and informants.
  6. Complete knowledge of the location to which he is going.

Fourth Means: Letters:

This means (letters)may be used as a method of communication between members and the Organization provided that the following security measures are taken:

  1. It is forbidden to write any secret information in the letter. If one must do so, the writing should be done in general terms.
  2. The letter should not be mailed from a post office close to the sender's residence, but from a distant one.
  3. The letter should not be sent directly to the receiver's address but to an inconspicuous location where there are many workers from your country. Afterwards, the letter will be forwarded to the intended receiver. (This is regarding the overseas- bound letter).
  4. The sender's name and address on the envelope should be fictitious. In case the letters and their contents are discovered, the security apparatus would not be able to determine his [the sender's] name and address.
  5. The envelope should not be transparent so as to reveal the letter inside.
  6. The enclosed pages should not be many, so as not to raise suspicion.
  7. The receiver's address should be written clearly so that the letter would not be returned.
  8. Paying the post office box fees should not be forgotten.

Fifth Means: Facsimile and Wireless:

Considering its modest capabilities and the pursuit by the security apparatus of its members and forces, the Islamic Military Organization cannot obtain theses devices. In case the Organization is able to obtain them, firm security measures should be taken to secure communication between the members in the country and the command outside. These measures are:

  1. The duration of transmission should not exceed five minutes in order to prevent the enemy from pinpointing the device location.
  2. The device should be placed in a location with highwireless frequency, such as close to a TV station,embassies, and consulates in order to prevent the enemy from identifying its location.
  3. The brother, using the wireless device to contact his command outside the country, should disguise his voice.
  4. The time of communication should be carefully specified.
  5. The frequency should be changed from time to time.
  6. The device should be frequently moved from one location to another.
  7. Do not reveal your location to the entity for which you report.
  8. The conversation should be in general terms so as not to raise suspicion.

Transportation Means:

The members of the Organization may move from one location to another using one of the following means:

  1. Public transportation
  2. Private transportation

Security Measures that Should be Observed in Public Transportation:

  1. One should select public transportation that is not subject to frequent checking along the way, such as crowded trains or public buses.
  2. Boarding should be done at a secondary station, as main stations undergo more careful surveillance. Likewise, embarkment should not be done at main stations.
  3. The cover should match the general appearance (tourist bus, first-class train, second-class train, etc).
  4. The existence of documents supporting the cover.
  5. Placing important luggage among the passengers' luggage without identifying the one who placed it. If it is discovered, its owner would not be arrested. In trains, it [the luggage] should be placed in a different car than that of its owner.
  6. The brother traveling on a 'special mission' should not get involved in religious issues (advocating good and denouncing evil) or day-to-day matters (seat reservation,...).
  7. The brother traveling on a mission should not arrive in the [destination] country at night because then travelers are few, and there are [search] parties and check points along the way.
  8. When cabs are used, conversation of any kind should not be started with the driver because many cab drivers work for the security apparatus.
  9. The brother should exercise extreme caution and apply all security measures to the members.

Security Measures that Should be Observed in Private Transportation:

Private transportation includes: cars, motorcycles

  1. Cars and motorcycles used in overt activity:
    1. One should possess the proper permit and not violate traffic rules in order to avoid trouble with the police.
    2. The location of the vehicle should be secure so that the security apparatus would not confiscate it.
    3. The vehicle make and model should be appropriate for the brother's cover.
    4. The vehicle should not be used in special military operations unless the Organization has no other choice.
  2. Cars and motorcycles used in covert activity:
    1. Attention should be given to permits and [obeying] the traffic rules in order to avoid trouble and reveal their actual mission.
    2. The vehicle should not be left in suspicious places (deserts, mountains, etc.). If it must be, then the work should be performed at suitable times when no one would keep close watch or follow it.
    3. The vehicle should be purchased using forged documents so that getting to its owners would be prevented once it is discovered.
    4. For the sake of continuity, have only one brother in charge of selling.
    5. While parking somewhere, one should be in a position to move quickly and flee in case of danger.
    6. The car or motorcycle color should be changed before the operation and returned to the original after the operation.
    7. The license plate number and county name should be falsified. Further, the digits should be numerous in order to prevent anyone from spotting and memorizing it.
    8. The operation vehicle should not be taken to large gasoline stations so that it would not be detected by the security apparatus.

Sixth Lesson: Training

The following security precautions should be taken during the training:

The Place:

The place should have the following specifications:

  1. Distance from the populated areas with the availability of living necessities.
  2. Availability of medical services during the training.
  3. The place should be suitable for the type of training (physical fitness, shooting, tactics).
  4. No one except the trainers and trainees should know about the place.
  5. The place should have many roads and entrances.
  6. The place should be visited at suitable times.
  7. Hiding any training traces immediately after the training.
  8. Guarding the place during the training.
  9. Appropriateness of the existing facilities for the number of training members.
  10. Exclusion of anyone who is not connected with the training.
  11. Taking all security measures regarding the establishment.
  12. Distance of the place from police stations, public establishments, and the eyes of informants.
  13. The place should not be situated in such a way that the training and trainees can be seen from another location.

The Trainees

  1. Before proceeding to the training place, all security measures connected with an undercover individual should be taken. Meanwhile, during training at the place, personnel safety should be ensured.
  2. Selecting the trainees carefully.
  3. The trainees should not know one another.
  4. The small size of groups that should be togetherduring the training (7-10 individuals).
  5. The trainees should not know the training place.
  6. Establishing a training plan for each trainee.

The Trainers

All measures taken with regard to the commanders apply also to the trainers. Also, the following should be applied:

  1. Fewness of the trainers in the training place. Onlythose conducting the training should be there, in order not to subject the training team to the risk of security exposure.
  2. Not revealing the identity of the trainer to trainees.
  3. Keeping a small ratio of trainees to trainer.
  4. The training team members should not know one another.

Seventh Lesson: Weapons

Measures Related to Buying and Transporting Them

Prior to dealing with weapons, whether buying, transporting, or storing them, it is essential to establish a careful, systematic and firm security plan that plan deals with all stages. It is necessary to divide that task into stages:

Prior to Purchase Stage:

It is necessary to take the following measures:

  1. In-depth knowledge of the place where weapons will be purchased, together with its entrances and exits.
  2. Verifying there are no informants or security personnel at the place where purchasing will take place.
  3. The place should be far from police stations and government establishments.
  4. Not proceeding to the purchasing place directly by the main road, but on secondary streets.
  5. Performing the exercises to detect the surveillance.
  6. One’s appearance and clothing should be appropriate for the place where purchasing will take place.
  7. The purchasing place should not be situated in such a way that the seller and buyer can be seen from another location. To the contrary, the purchasing placeshould be such that the seller and buyer can see the surrounding area.
  8. Determining a suitable cover for being in that place.
  9. The place should not be crowded because that would facilitate the police hiding among people, monitoring the arms receiving, and consequently arresting the brother purchasing.
  10. In case one of the parties is unable to arrive, it is essential to prearrange an alternativeplace and time with the seller.
  11. Selecting a time suitable for the purchase so that it does not raise suspicion.
  12. Prior to purchasing, the seller should be tested to ensure that he is not an agent of the security apparatus.
  13. Preparing a place for storage prior to purchasing.

The Purchase Stage:

  1. Verifying that the weapons are in working condition.
  2. Not paying the seller the price for the weapons before viewing, inspecting, and testing them.
  3. Not telling the seller about the mission for which the weapons are being purchased.
  4. Extreme caution should be used during the purchasing operation in the event of any unnatural behavior by the seller or those around you.
  5. Not lengthening the time spent with the seller. It is important to depart immediately after purchasing the weapons.

The Transport Stage:

  1. Avoid main roads where check points are common.
  2. Choose a suitable time for transporting the weapons.
  3. Observers should proceed on the road ahead of the transportation vehicle for early warning in case of an emergency.
  4. Not proceeding directly to the storage place until after verifying there is no surveillance.
  5. During the transport stage, weapons should be hidden in a way that they are inconspicuous and difficult to find.
  6. The route for transporting the weapons should be determined very carefully.
  7. Verifying the legality of the vehicle, performing its maintenance, checking its gasoline and water levels, etc.
  8. Driving the car normally in order to prevent accidents.

The Storage Stage:

  1. In order to avoid repeated transporting, suitable storage places should be selected. In case the materials are bombs or detonators, they should be protected from extreme heat and humidity.
  2. Explosive materials and detonators should be separated and stored apart from each other.
  3. Caution should be exercised when putting detonators in the arsenal.
  4. Lubricating the weapons and placing them in wooden or plastic crates. The ammunition should be treated likewise.

When selecting an arsenal, consider the following:

  1. The arsenal should not be in well-protected areas, or close to parks or public places.
  2. The arsenal should not be in a 'no-man's-land.'
  3. The arsenal should not be in an apartment previouslyused for suspicious activities and often frequented bysecurity personnel.
  4. The arsenal should not be a room that is constantlyused and cannot be given up by family members who do not know the nature of the father or husband's work.
  5. The apartment selected as an arsenal should be owned by the Organization or rented on a long-term basis.
  6. The brother responsible for storage should not visit the arsenal frequently, nor toy with the weapons.
  7. The arsenal keeper should record in a book all weapons, explosive materials, and ammunition. That book should be coded and well secured.
  8. Only the arsenal keeper and the commander should know the location of the arsenal.
  9. It is necessary to prepare alternative arsenals and not leave any leads in the original arsenals to the alternative ones.

Eighth Lesson: Member Safety

Defining Members' Safety

This is a set of measures taken by members who perform undercover missions in order to prevent the enemies from getting to them.

It is necessary for any party that adopts Jihad work and has many members to subdivide its members into three groups, each of which has its own security measures. The three groups are:

  1. The overt member
  2. The covert member
  3. The commander

Measures that Should be Taken by the Overt Member:

  1. He should not be curious and inquisitive about matters that do not concern him.
  2. He should not be chatty and talkative about everything he knows or hears.
  3. He should not carry on him the names and addresses of those members he knows. If he has to, he should keep them safe.
  4. During times of security concerns and arrest campaigns and especially if his appearance is Islamic, he should reduce his visits to the areas of trouble and remain at home instead.
  5. When conversing on the telephone, he should not talk about any information that might be of use to the enemy.
  6. When sending letters, he should not mention any information that might be of use to the enemy. When receiving letters, he should burn them immediately after reading them and pour water on them to prevent the enemy from reading them. Further, he should destroy any traces of fire so the enemy would not find out that something was burned.

Measures that Should be Taken by the Undercover Member

In addition to the above measures, the member should:

  1. Not reveal his true name to the Organization's members who are working with him, nor to the [Islamic] Da'wa [Call].
  2. Have a general appearance that does not indicate Islamic orientation (beard, toothpick, book, [long] shirt, small Koran).
  3. Be careful not to mention the brothers' common expressions or show their behaviors (special praying appearance, 'may Allah reward you', 'peace be on you' while arriving and departing, etc.)
  4. Avoid visiting famous Islamic places (mosques, libraries, Islamic fairs, etc.)
  5. Carry falsified personal documents and know all the information they contain.
  6. Not resort to utilizing letters and messengers except in an emergency.
  7. Have protection preceding his visit to any place while moving about (apartment,province, means of transportation, etc.).
  8. Have complete and accurate knowledge of the security status related to those around him in his place of work and residence, so that no danger or harm would catch him unaware.
  9. Maintain his family and neighborhood relationships and should not show any changes towards them so that theywould not attempt to bring him back [from the Organization] for security reasons.
  10. Not speak loudly.
  11. Not get involved in advocating good and denouncing evil in order not to attract attention to himself.
  12. Break the daily routine, especially when performing an undercover mission. For example, changing the departure and return routes, arrival and departure times, and the store where he buys his goods.
  13. Not causing any trouble in the neighborhood where he lives or at the place of work.
  14. Converse on the telephone using special code so that he does not attract attention.
  15. Not contacting the overt members except when necessary. Such contacts should be brief.
  16. Not fall into the enemy's excitement trap, either through praising or criticizing his Organization.
  17. Performing the exercises to detect surveillance whenever a task is to be performed.
  18. Not park in no-parking zones and not take photographs where it is forbidden.
  19. Closing all that should be closed before departing the place, whether at home or his place of undercover work.
  20. Not undergo a sudden change in his daily routine or any relationships that precede his Jihad involvement. Far example, there should not be an obvious change in his habits of conversing, movement, presence, or disappearance. Likewise, he should not be hasty to sever his previous relationships.
  21. Not meet in places where there are informers, such as coffee shops, and not live in areas close to the residences of important personalities, government establishments, and police stations.
  22. Not write down on any media, specially on paper, that could show the traces and words of the pen by rubbing the paper with lead powder.

Measures that Should be Taken by the Commander

The commander, whether in overt or covert work, has special importance for the following reasons:

  1. The large amount of information that he possesses.
  2. The difficulty of the command in replacing the commander.
  3. Therefore, all previously mentioned security precautions regarding members should be heightened for the commander. Many resources should be reserved for protecting the commanders.

Important Note

Married brothers should observe the following:

  1. Not talking with their wives about Jihad work.
  2. The members with security risks should not travel with their wives. A wife with an Islamic appearance (veil) attracts attention.

Ninth Lesson: Security Plan

Defining Security Plan:

This is a set of coordinated, cohesive, and integrated measures that are related to a certain activity and designed to confuse and surprise the enemy, and if uncovered, to minimize the work loss as much as possible.

Importance of the Security Plan:

The work will be successful if Allah grants that. The more solid is the security plan, the more successful [the work] and the fewer the losses. The less solid the security plan, the less successful [the work] and the greater the losses.

Specifications of the Security Policy

A number of conditions should be satisfied to help the security plan to succeed. These are: [It should be]

  1. realistic and based on fact so it would be credible to the enemy before and after the work.
  2. coordinated, integrated, cohesive, and accurate, without any gaps, to provide the enemy [the impression of] a continuous and linked chain of events.
  3. simple so that the members can assimilate it.
  4. creative.
  5. flexible.
  6. secretive.

The Method of Implementing the Security Plan

There should be a security plan for each activity that is subject to being uncovered by the enemy. For example, the brother who is chargedwith a certain mission might be arrested. It is, therefore, essential that a security plan be designed for him through which he will be able to deny any accusation. Likewise, for the groupassigned a collective mission, there should be a security plan to which all members are committed. Each member would then find out, learn, and be trained in his role to ensure his assimilation of it.

In this lesson, we shall cover many examples of security plans related to certain matters:

  1. Security plan for an individual mission.
  2. Security plan for a group (important meeting). mission (assassination operation)
  3. Security plan for a group

Example of a security plan for an individual mission (training in Afghanistan):

Prior to Departure:Traveling through an airport, the brother might be subjected to interrogation. It is essential that he be taught the answers to the following anticipated questions:

  1. What are the reasons for your travel?
  2. How did you get the money for travel?
  3. How long is the travel period?
  4. Who will meet you in the arrival country?
  5. What will you be doing in the arrival country?

(There are different degrees of interrogation)

During Travel (transit country): The brother should be taught the answers to the following questions:

  1. Why are you going to Pakistan?
  2. Do you belong to an religious organizations?
  3. How did you get the travel money?
  4. Who got you the visa to Pakistan?
  5. What will you be doing in Pakistan?
  6. With whom will you be staying in Pakistan?

Arrival Country (Pakistan): The brother should be taught the answers to the following questions:

  1. Why did you come to Pakistan?
  2. How long will you be spending in Pakistan?
  3. With whom will you be staying?

Transit Country (Return): The brother should be taught the answers to the following questions:

  1. What were you doing in Pakistan?
  2. Are you a Jihad fighter?
  3. Do you belong to religious organizations in your country?
  4. Why did you come to our country in particular?
  5. Whom will you be staying with now?
  6. How long will you spend here?

Return Country (Returning to your Country):

  1. What were you doing in the transit country?
  2. Addresses and telephone numbers of those who hosted you during your stay?
  3. Whom did you visit in your group, and for how long?

When Your Travel to Pakistan is Discovered:

  1. What were you doing in Pakistan or Afghanistan?
  2. In which camp were you trained?
  3. Who trained you? On what weapons were you trained?
  4. Who assigned you to go to Afghanistan?
  5. Whom will you contact in your country?
  6. What are 'the tasks and missions that you intend to execute in your country?
  7. Who else trained with you in Afghanistan?
  8. How many of your countrymen are in that camp and in Afghanistan?
  9. What are their names?
  10. Who are the group commanders there [in Pakistan]? Where do they live and what do they do?
  11. What things do the commanders talk about?

An Example of a Security Plan for a Group Mission (Important Meeting). The meeting is of two types:

  1. A meeting held by those responsible for overt work. That [meeting] is held in many places (mosque, apartment,...)
  2. A meeting held by those responsible for covert work. For that [meeting],great effort on our part should be exercised to ensure its safety. We shall discuss that meeting and what makes it secure from enemies spies.

The security plan for that meeting is divided into several stages:

  1. Before the meeting
  2. The meeting location
  3. During the meeting
  4. After the conclusion of meeting
  5. In case security personnel storm the meeting place and capture one of the members

Before the meeting

Here the meeting for covert work is divided into:

  • Meeting in a Stationary Location: A meeting where more than three members gather to discuss a plan or prepare for an activity.
  • Mobile Meeting (Encounter): A meeting among a small number of members, not more than three, to inform [one another] of a certain issue.

Security Measures Necessary Prior to the Stationary Meeting:

  1. Establishing a plan suitable for the members if any of them is arrested. It consists of: Who is the owner of the apartment? What was discussed in the meeting? Who was with you? What was agreed upon?
  2. Specifying the timing of the meeting in such a way as not to raise suspicion of the members' movements.
  3. Not allowing a long period of time between specifyingthe meeting time and the meeting itself.
  4. Securing the meeting location and the routes leading to it by the following:
    1. Ensuring the security status via telephone.
    2. Assigning members to monitor the place before and during the meeting.
    3. Planting a member close to the nearest enemy security point (police station, security administration) to communicate the first sight of security movement.
    4. Posting an armed guard to stop any attack and to give those meeting a chance to escape.
  5. Specifying what would happen in the event the police storm the place.
  6. Those members going to the meeting should consider the following:
    1. Ensuring that the enemy is not behind them while on the way to the meeting place.
    2. Not heading directly to the meeting place but through secondary places.
    3. Not going to the meeting place as a group but individually,with time gaps between them.
    4. The clothing and appearance should be suitable for the meeting place.
    5. If the brother uses public transportation, he should alight before or after the meeting location. In case he has a private car, he should park it in a secure place not near the location that allows him to maneuver quickly at any moment.
    6. Verifying the proper cover for the documents he has with him.
    7. If a member is armed, he should make sure that the weapon is in good working condition.

Necessary Security Measures Prior to the Mobile Meeting

When a brother goes to a certain meeting (mobile meeting), he should review these things:

  1. Is he sure that the enemy is not behind him nor at the meeting place?
  2. Who will meet him?
  3. Is there anything that might raise suspicion?
  4. Is this the first appointment or the second (alternative,changed)?
  5. Does he know the meeting place in detail?
  6. Are his appearance and clothing suitable for the location where he will stand [meet]?
  7. Is his weapon in good working condition?
  8. What is the alternative for each action?
  9. Not going directly to the person whom he would like to meet, Verifying the person's appearance and features.

The Stationary Meeting Location

It is necessary that it have special characteristics to confront any danger to the meeting members:

  1. Location-wise, it should be in the middle of a group of houses, not at the beginning.
  2. Having many routes leading tothat location. That would assist entering and exiting in many ways. Consequently, it makes surrounding the place difficult and facilitates escaping from danger.
  3. The location should not be close to suspicious locations ([where] individuals or establishments work with the security [apparatus]).
  4. It is preferable that the apartment be on the ground floor and have a telephone.

The Mobile Meeting Location (Encounter):

  1. The meeting location should be at the intersection of many roads where it is easy to come, go, and flee.
  2. [blank]
  3. The meeting should be held far from places where it is believed some of whose elements deal with the security apparatus (coffee shops).
  4. The place should not be crowded because that allows security personnel to go undetected.
  5. It is necessary to have alternative locations and times. That would make it difficult for security personnel to monitor the place.

During the Meeting

The following should be observed:

Establishing a security plan that consists of the following:

  1. Proper cover for the members' presence (students, for example, it is necessary to have books, notebooks,...)
  2. Verifying that personal documents match the agreed-upon cover.
  3. Not having written direction to the meeting place. If that is necessary, it should be coded.
  4. Not having or leaving food or anything else that would reveal the presence of many people.
  5. Surrounding the place with barb wire. That depends on the importance of the meeting and if there are items that cannot be carried during escape.

After the Conclusion of the Meeting

  1. Departing singly or in pairs, depending on the number of members present.
  2. Not heading directly onto main roads but to secondary ones.
  3. Not speaking about what was discussed in the meeting, during or after departure.
  4. Removing all observers after the members depart.
  5. Not leaving anything that would lead [to the fact that] there was anyone there except the owner.

Raiding and capturing one of the members.

Establishing a plan to repel the attack, which consists of the following:

  1. Who will engage the enemy with bullets?
  2. Who will flee with the important documents and who will burn the rest?
  3. Not heading directly to other organization locations.
  4. Specifying the escape roads and Streets.
  5. If the place is surrounded by barb wire, make sure all members have left.

In case an individual is caught, the following should be done:

Executing what was agreed upon with the brother in the security plan. If the brother has important work position (commander,one who knows the arsenal locations, ...), whatever is necessary should be done before the enemy discovers anything.

Instruct all members not to go to the meeting location.

Inform all members of the telephone number of that apartment in order to mislead the enemy.

An Example of a Security Plan for a Group Mission (assassinating an important person): Assassination is an operation of military means and basic security. Therefore, it is essential that the commanders who establish plans related to assassination give attention to two issues:

It is possible to also say 'kidnapping an important person.' All security measures and arrangements in assassination and kidnapping are the same.

  • First Issue: The importance of establishing a careful, systematic, and solid security plan to hide the operation from the enemy until the time of its execution, which would minimize the losses in case the executing party is discovered.
  • Second Issue: The importance of establishing a tactical planfor the assassination operation that consists of the operationalfactors themselves (members,weapons, hiding places ...) and factors of the operation (time,place). In this example, we shall explain in detail the part related to the security plan.The part related to operational tactics will be explained in the lesson on special operational tactics.

Security Plan for the Assassination Operation

The security plan must take into account the following matters:

  1. The Commander: The security apparatus should not know his whereabouts and movements. All security measures and arrangements related to members of the Military Organization (soldiers,commanders) apply to him.
  2. The Members:
    1. They are elements who are selected from various provinces and are suitable for the operation.
    2. During the selection process, members should not know one another. They should not know the original planners of the operation. In case they do, the commander should be notified. He then should modify the plan.
    3. They should be distributed as small groups (3 members) in apartments that are not known except to their proprietors. They should also be given field names.
    4. During the selection process, consider whether their absence from their families and jobs would clearly attract attention. We also apply to them all security measures related to the Organization's individuals (soldiers).

Method of Operating

  1. The matters of arming and financing should not be known by anyone except the commander.
  2. The apartments should not be rented under real names. They [the apartments] should undergo all security measures related to the Military Organization's camps.
  3. Prior to executing an operation, falsified documents should be prepared for the participating individuals.
  4. The documents related to the operation should be hidden in a secure place and burned immediately after the operation, and traces of the fire should be removed.
  5. The means of communication between the operation commander and the participating brothers should be established.
  6. Prior to the operation, apartments should be prepared to hide the brothers participating in it. These apartments should not be known except to the commander and his soldiers.
  7. Reliable transportation means must be made available. It is essential that prior to the operation, these means are checked and properly maintained.

Interrogation and Investigation

Prior to executing an operation, the commander should instruct his soldiers on what to say if they are captured. He should explain that more than once, in order to ensure that they have assimilated it. They should, in turn, explain it back to the commander. The commander should also sit with each of them individually (and go over] the agreed-upon matters that would be brought up during the interrogation:

  1. The one who conceived, planned, and executed this operation was a brother who has a record of those matters with the enemy.
  2. During the interrogation,each brother would mention a story that suits his personal status and the province of his residence. The story should be agreed upon with the commander.
  3. Each brother who is subjected to interrogation and torture, should state all that he agreed upon with the commander and not deviate from it. Coordination should be maintained with all brothers connected to the operation. Note: The fictitious brother who the brothers say conceived, planned, trained, and executed the operation, should be sent away on a journey [outside the country].

Tenth Lesson: Special Tactical Operations

(incomplete)

Definition of Special Operations

These are operations using military means and basic security. Special operations are some of the tasks of groups specialized in intelligence and security.

Characteristics of Members that Specialize in the Special Operations

  1. Individual's physical and combat fitness (jumping, climbing, running, etc.)
  2. Good training on the weapon of assassination, assault, kidnapping and bombing (special operations).
  3. Possessing cleverness, canniness and deception
  4. Possessing intelligence, precision and alertness.
  5. Tranquility and calm personality (that allows coping with psychological traumas such as those of the operation of bloodshed, mass murder). Likewise, [the ability to withstand] reverse psychological traumas, such as killing one or all members of his group. [He should be able to] proceed with the work.
  6. Special ability to keep secrets and not reveal them to anyone.
  7. [Good] security sense during the interrogation
  8. Great ability to make quick decisions after altering the agreed-upon plan (proper actions in urgent situation)
  9. Patience, ability to withstand, and religiousness
  10. Courage and boldness
  11. Unknown to the security apparatus

Weapons of Special Operations

  1. Cold steel weapons (rope, knife, rod)
  2. Poisons
  3. Pistols and rifles
  4. Explosives

We note that special operations include assassinations, bombing and demolition, assault, kidnapping hostages and confiscating documents, freeing prisoners.

Importance of Special Operations

  1. Boosting Islamic morale and lowering that of the enemy
  2. Preparing and training new members for future tasks
  3. A form of necessary punishment
  4. Mocking the regime's admiration among the population
  5. Removing the personalities that stand in the way of the (Islamic) Da'wa [CAll]
  6. Agitating [the population] regarding publicized matters
  7. Rejecting compliance with and submission to the regime's practices
  8. Giving legitimacy to the Jama'a (Islamic Group)
  9. Spreading fear and terror through the regime's ranks
  10. Bringing new members to the Organization's ranks

Disadvantages of Special Operations

  1. Restraining the [Islamic] Da'wa [Call] and preachers
  2. Revealing the structure of the Military Organization
  3. Financially draining the Military Organization
  4. Use of [operations] as propaganda against the Islamic Jama'a [Group]
  5. Spreading fear and terror among the population
  6. The regime's safeguards and precautions against any other operation
  7. Special operations cannot cause the fall of the regime in power
  8. Increase in failed [operation] attempts cause an increase in the regime's credibility
  9. [Operations] cause the regime to assassinate the Jama'a [Islamic Group] leaders
  10. Boosting enemy morale and lowering that of the Organization's members in case of repeated failure
  11. Members of the Organization lose faith in themselves and their leaders in case of repeatedly failed special operations. The inverse is also true

Necessary Characteristics of Special Operations

A successful special operation requires the following:

  1. A security plan for the operation (members, weapons, apartments, documents, etc.) This requirement has been explained in detail in the security plan (lesson). Refer to it.
  2. An operational tactical plan. This requirement will be explained in this lesson in detail.

more to be added...

Eleventh Lesson: Espionage (1) Information-Gathering Using Open Methods

Definition of Espionage[5]: It is the covert search for and examination of the enemy's news and information for the purpose of using them when a plan is devised. In [the book titled] 'Nile AI-Aoutar wa Fath Al-Bari,' [it is said that] the spy is called an eye because his work is through his eyes, or because of his excessive and preoccupation with observation, as if all his being is an eye.

Espionage in the era of the prophet - Allah bless and keep him - and his honored companions

The prophet - Allah bless and keep him - used informants in most of his attacks. As Abou Soufian's caravan, that was coming from Damascus, was approaching, the prophet - Allah bless and keep him - wanted to know the caravan's destination.

While the prophet was in Madina, he sent Talha Ibn Obaidallah and Said Ibn Zeid to the Damascus route to gather information about the caravan. On their way back to Madina, and at the conclusion of the Badr battle, they met the prophet - Allah bless and keep him - in Terban, as he was descending from Badr to take Madina. [Though] they did not participate in the battle, they nevertheless got their share of the [spoils].

In his attacks, the prophet - Allah bless and keep him - would find out the enemy's intention. In the Hodaibiya [battle] days, though he did not want war, he exercised caution by sending a special 40-man reconnaissance group, headed by A'kkasha Ibn Mohsen Al-Azda. One of that group forerunners found a man who led them to the enemy's livestock. They captured 200 camels from that livestock and brought them to Madina.

The prophet - Allah bless and keep him - had local informants in Mecca who told him everything, big and small, that might harm the Muslims' welfare. Among those [enemies] were his uncle Al-Abbas Ibn Abd Al-Mutlib, and Bashir Ibn Soufian Al-Atki. Al-Khulafa Arrashidun [Mohammed's successors] advised their commanders about the importance of using scouts and informants to learn the enemy's secrets. Abou Bakr Al-Siddik - may Allah be pleased with him - said to his commander Amro Ibn AI-A'ss - may Allah be pleased with him -, Send your informants to bring you Abou Obeida's news. If he is victorious over his enemy,then you fight those that are in Palestine. If he needs soldiers, then dispatch one battalion after another for him.

Omar Ibn Al-Khattab -may Allah be pleased with him -advised his commander Saad Ibn Abou Wakkas -may Allah be pleased with him -saying, If you step foot on your enemies' land, get spies for them. Choose those whom you count on for their truthfulness

[5] For details, refer to The Spying Journal: Religious Duty and Human Necessity. and advice, whether Arabs or inhabitants of that land. Liars' accounts would not benefit you, even if some of them were true; the deceiver is a spy against you and not for you. Khaled Ibn Al-Walid -may Allah be pleased with him -used to take informants and spies with him in each of his wars against the Christian Orthodox. He chose them carefully and treated them well.

Principle of Moslems Spying on their Enemies

Spying on the enemy is permitted and it may even be a duty in the case of war between Moslems and others. Winning the battle is dependent on knowing the enemy's secrets, movements, and plans. The prophet - Allah bless and keep him - used that method. He would send spies and informants. Perhaps, he - Allah bless and keep him - even went himself as in the major Badr attack. AI-Khulafa Arrashidun [Mohammed's successors] also ordered it [spying].

Since Islam is superior to all human conditions and earthly religions, it permits spying for itself but not for others. Majestic Allah says, Not equal are the companions of the fire and the companions of the garden, and the prophet says, Islam is supreme and there is nothing above it. Islam, therefore, fights so the word of Allah can become supreme. Others fight for worldly gains and lowly and inferior goals.

An Important Question

How can a Muslim spy live among enemies if he maintains his Islamic characteristics? How can he performhis duties to Allah and not want to appear Muslim?

Concerning the issue of clothing and appearance (appearance of true religion), Ibn Taimia - may Allah have mercy on him - said, If a Muslim is in a combat or godless area, he is not obligated to have a different appearance from [those around him]. The [Muslim] man may prefer or even be obligated to look like them, provided his action brings a religious benefit of preaching to them, learning their secrets and informing Muslims, preventing their harm, or some other beneficial goal.

Resembling the polytheist in religious appearance is a kind of necessity permits the forbidden even though they [forbidden acts] are basically prohibited. As for the visible duties, like fasting and praying, he can fast by using any justification not to eat with them [polytheist]. As for prayer, the book (Al-Manhaj Al-Haraki Lissira Al-Nabawiya) quotes Al-Bakhari that he [the Moslem] may combine the noon and afternoon [prayers], sunset and evening [prayers]. That is based on the fact that the prophet - Allah bless and keep him - combined [prayers] in Madina without fear or hesitation.

Though scholars have disagreed about the interpretation of that tradition, it is possible - though Allah knows best - that the Moslem spy combines [prayers]. It is noted, however, that it is forbidden to do the unlawful, such as drinking wine or fornicating. There is nothing that permits those[6].

Guidelines for Beating and Killing Hostages

Religious scholars have permitted beating. They use a tradition explained in Imam Mosallem's manuscript, who quotes Thabit Ibn Ans that Allah's prophet - Allah bless and keep him - sought counsel when he was informed about Abou Soufian's arrival. Abou Bakr and Omar spoke, yet he [the prophet] did not listen. Saad Ibn Ibada said, Do you want us, O Allah's prophet, who controls my life? If you order us to subdue the camel we would do it, or beat and follow them to Al-Ghimad lakes (5-day trip beyond Mecca), we would do it, too.

The prophet - Allah bless and keep him - called on the people, who then descended on Badr. They were met by Kureish camels carrying water. Among their takers was a young black [slave] man belonging to the Al-Hajjaj clan. They took him [as hostage]. The companions of the prophet - Allah bless and keep him - started asking him about Abou Sofian and his companions. He first said, I know nothing about Abou Soufian but I know about Abou Jahl, Atba, Sheiba, and Omaya Ibn Khalaf.

But when they beat him he said, O yes, I will tell you. This is the news of Abou Soufian... Meanwhile, the prophet - Allah bless and [6] Al-Morabitoun Magazine, Issue No. 6 keep him - , who was praying, started to depart saying, Strike him if he tells you the truth and release him if he lies. Then he said, That is the death of someone [the hostage]. He said that in the presence of his companions and while moving his hand on the ground.

In this tradition, we find permission to interrogate the hostage for the purpose of obtaining information. It is permitted to strike the nonbeliever who has no covenant until he reveals the news, information, and secrets of his people.

The religious scholars have also permitted the killing of a hostage if he insists on withholding information from Moslems. They permitted his killing so that he would not inform his people of what he learned about the Muslim condition, number, and secrets. In the Honein attack, after one of the spies learned about the Muslims' kindness and weakness then fled, the prophet - Allah bless and keep him - permitted [shedding] his blood and said,Find and kill him. Salma Ibn Al-Akwaa followed, caught, and killed him.

The scholars have also permitted the exchange of hostages for money, services, and expertise, as well as secrets of the enemy's army, plans, and numbers. After the Badr attack, the prophet - Allah bless and keep him - showed favor to some hostages, like the poet Abou Izza, by exchanging most of them for money. The rest were released for providing services and expertise to the Muslims'.

Importance of Information:

  1. Based on the enemy's up-to-date information, his capabilities, and plans, the Organization's command can design good-quality and secure plans. [7] Abdullah Ali Al-Salama: Military Espionage in Islam, pp. 253-258.
  2. Information about the enemy's intention provides early warning signs for the command, which in turn makes appropriate preparation and thwarts the enemy's opportunity.
  3. Information benefits the Organization's command by providing information about the enemy's strengths and weaknesses.
  4. Information benefits the Organization's command by providing information about movements of the enemy and his members.

Information requirements include: Newness, Trustworthiness, Forthcoming, security, and confirmation.

General Mahmoud Sheet Khattab said, The nation that wants to achieve victory over its enemy must know that enemy very well. It also must know the site of the battle in detail. Those who fight an enemy that they do not know, do not win because a successful military plan must be built on clear and trustworthy information. The commander who fights an enemy and does not know his strength (number and materiel) is blind and destined to fail and fall.

Information Sources

Any organization that desires to raise the flag of Islam high and proud, must gather as much information as possible about the enemy. Information has two sources:

  1. Public Source: Using this public source openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy. The percentage varies depending on the government's policy on freedom of the press and publication. It is possible to gather information through newspapers, magazines, books, periodicals, official publications, and enemy broadcasts. Attention should also be given to the opinion, comments, and jokes of common people.

    Truman, a past American President, said, We attribute our great advance to our press, because it gives America's enemies the capability of learning what we have not officially publicized about our plans and even our establishments.

    In 1954, Allan Dulles [PH], Director of American Intelligence [CIA], said, I am ready to pay any amount of money to obtain information about the Soviet Union, even as little as what the Soviet Union obtains by simply reading American newspapers.

    The one gathering public information should be a regular person (trained college graduate) who examines primary sources of information published by the enemy (newspapers, magazines, radio, TV, etc.). He should search for information directly related to the topic in question.

    The one gathering information with this public method is not exposed to any danger whatsoever. Any brother can gather information from those aforementioned sources. We cannot label that brother a 'Moslem Spy' because he does not make any effort to obtain unpublished and covert information.

  2. Secret Sources: It is possible, through these secret and dangerous methods, to obtain the 20% of information that is considered secret. The most important of these sources are:
    1. Individuals who are recruited as either volunteers or because of other motives
    2. Recording and monitoring
    3. Photography
    4. Interrogation
    5. Documents: By burglary or recruitment of personnel
    6. Drugging
    7. Surveillance, spying, and observation.

Information Gathering Using Public Means

Newspapers, Magazines,and Official and Party Publications:

In order to gather enemy information, the Military Organization can use means such as magazines, publications, periodicals, and official printed matter. Through these means, it is possible to learn about major government events and about the news, meetings, and travel of Presidents, ministers, and commanders. Information may be:

  1. Names and photographs of important government personalities, police commanders, and security leaders.
  2. Published meetings. Through these, one can learn about major decisions and topics being discussed.
  3. Future meeting plans.
  4. Present and future enemy capabilities through current photographs of projects and strategic sites or through meetings with top officials.
  5. Beneficial news about the enemy's diplomacy and its present and future plans.
  6. Tourism news and the arrival times of foreign tourist groups.
  7. Advertisements about apartments for rent, vacant positions, or anything else that is useful.
  8. Advertisements about new and used car lots. These may be used in assassination, kidnapping, and overthrowing the government.
  9. Learning the enemy position on current Islamic issues (veil, beard, dedication, Jihad, ...).

Radio and Television

The Military organization can use these important public sources to gather information all day and night. The importance of these means is explained below.

  1. Visual and audible news help the Organization to determine its present and future plans.
  2. Interviews may help to identify the government policy and its general directives.
  3. Spotting the appearance of those who occupy high positions.
  4. Learning the prevailing information diplomacy and its position on contemporary issues.
  5. Learning about the interior of important governmentplaces and establishments during their openingceremonies or through advertisements.

In addition to the aforementioned, [attention should be given] to newspapers, magazines, and the public's comments and jokes.

Twelfth Lesson: Espionage (2) Information-Gathering Using Covert Methods

Information needed through covert means: Information needed to be gathered through covert means is of only two types:

  • First: Information about government personnel, officers, important personalities, and all matters related to those (residence,work place, times of leaving and returning, wives and children, places visited)
  • Second: Information about strategic buildings, importantestablishments, and military bases. Examples are importantministries such as those of Defense and Internal Security,airports, seaports, land border points, embassies, and radio and TV stations.

General security measures that should be taken by the person gathering information

During the process of gathering information, whether about governing personalities or establishments, the person doing the gathering must take the following security measures:

  1. Performing the exercises to detect surveillance while executing the mission. These exercises are not well defined, but are dependent on the time, place, and the ability to be creative. These exercises include the following:
    1. Walking down a dead-end street and observing who is walking behind you. Beware of traps.
    2. Casually dropping something out of your pocket and observing who will pick it up.
    3. Walking fast then stopping suddenly at a corner and observing who will be affected.
    4. Stopping in front of store windows and observing who is watching you.
    5. Getting on a bus and then getting off after it departs and observing who will be affected.
    6. Agreeing with one of your brothers to look for whoever is watching you.
  2. When receiving the gathered information, let the informants travel as far as possible from their place of residence and yours. Let each of them get there using secondary roads, preferably at night.
  3. Gather what information you can without emphasizing any particular part. Do not rush or show urgency because your excitement may uncover you and the degree of importance of the information.
  4. Avoid anything that reveals your identity quickly. Do not attempt to be too creative or inventive. Remember what Taliran [PHI said to his political emissaries, Do not be anxious.
  5. Move slowly and travel a great distance. The one who issuccessful in gathering information is the one who is not known or conspicuous.
  6. Do not accept events at their face value. Do not overlook a quick friendship or an apparent dispute. Evaluate theimportance of events and do not judge them by their appearance.
  7. Do not speak vaguely or act mysteriously except when wanting to get a 'blabber mouth' to talk about what he knows.
  8. Carry personal credentials and know all their contents.
  9. Prior to collecting the information, make sure that all necessities related to the mission, especially money, are ready.
  10. Study the area where information-gathering takes place carefully: Open and closed streets, residents' customs, ways of dressing, and accent.
  11. It is not permitted to carry any weapons during the information-gathering process.
  12. Finding a cover prior to gathering the information.

Further, review all security measures concerning members of the Military [Organization] which are covered in prior lessons.

Methods of Gathering Information Using Covert Means

The Military Organization may obtain secret information using:

  1. Surveillance, intelligence, and observation
  2. Theft
  3. Interrogation
  4. Excitement
  5. Drugging
  6. Recruitment

A. Surveillance, Intelligence, and Observation

Civilian and military targets (personalities). The monitoring may be done on foot or by car.

Surveillance on foot:
  1. The brother or brothers performing the surveillance operation on foot study the available information about the target (height,weight, way of walking, looking at a recent photograph)
  2. Knowing the target's habits, places he visits, and communications
  3. Studying carefully the area where observation will take place: names of through and dead-end streets, residents' habits and way of dressing.
  4. Prior to the start of the surveillance mission, making sure that all needs related to the mission, especially money, are met.
  5. Agreeing on how communications with the leaders will take place in case the surveillance plan is uncovered (telephone,a person used for that purpose). The telephone number should not be written but memorized.
  6. Agreeing on special signals to exchange orders and instructions among the surveillance team members.
  7. Knowing the measures to be taken when the target is lost, such as contacting the leaders or something else agreed upon.
  8. It is not permitted to carry any weapons during the information-gatheringprocess.
  9. It is preferable to have a camera with the surveillance man in case the target is to personally contact others.
Surveillance by car:

Surveillance by car requires taking certain measures:

  1. Inspecting the car's fuel, water, and lights.
  2. The car should be of a common type so it would not attract people's attention.
  3. The car should be in good condition and the driver should be experienced.
  4. The car plates should not contain real numbers. It is important to use a false license plate and small numbers in order to prevent anyone from spotting and memorizing it.
  5. The car's interior light should be disabled in order to hide the identity of the surveillance team members sitting inside.
  6. The number and appearance of the car surveillance team members should match those of the target's car.

Performing Surveillance by Car:

  1. The car being used for surveillance should keep up with the target's car during the surveillance operation, especially in crowded areas and on side streets. The distance between the two cars depends on the circumstances.
  2. If the target gets out of his car and starts to walk, oneof the surveillance team members should get out and observe him.
  3. Follow all aforementioned measures for surveillance on foot.
.

Exercises to detect surveillance by car:

  1. The surveillance car speeds up then stops suddenly while observing which other car is affected (this is done where there is not a lot of traffic).
  2. The surveillance car enters a dead-end street.
  3. The surveillance car goes in the opposite direction of traffic.
  4. The surveillance car stops and goes backwards.
  5. [The surveillance car] enters a parking lot and immediately goes out.
  6. [The surveillance car] takes a side road and stops.

A. Surveillance, Intelligence,and Observation (Information about the enemy places)

The Organization's command needs detailed information about the enemy's vital establishments, whether civilian or military, in order to make safe plans, reach firm decisions, and avoid surprises. Thus, the individual who gathers information about a desired location should, in addition to drawing a diagram, describe it and all its details.

The Drawing

The brother should draw a diagram of the area, the street, and the location which is the target of the information-gathering. He should describe its shape and characteristics. The drawing should be realistic so that someone who never saw the location could visualize it. It is preferable to also put on the drawing the directions of traffic, police stations, and security centers.

The Description

It is necessary to gather as much information about the location as possible. For instance:

  1. Traffic directions and how wide the streets are
  2. Transportation leading to the location
  3. The area, appearance, and setting of the place
  4. Traffic signals and pedestrian areas
  5. Security personnel centers and government agencies
  6. Embassies and consulates
  7. The economic characteristics of the area and traffic congestion times
  8. Public parks
  9. Amount and location of lighting

It is preferable to photograph the area as a whole first, then the street of the [desired] location. If possible, panoramic pictures should be taken. That is, the collection of views should be continuous in a such way that all pictures are taken from one location and that the ending of one picture is the beginning of the next. The photographer should be experienced with and proficient in film processing and developing. It is risky to use an outside film processing service.

When observing a military installation or camp, we discourage taking pictures where it is forbidden. The brother/photographer should use a modern camera that can photograph at night or from a distance, and only the lens of the camera should be visible. When gathering information about a military camp, the brother should draw a diagram of the camp's overall area, the camp itself, and its interior, if possible.

The description of the base or camp must contain the following:

  1. Location
  2. Exterior shape
  3. Transportation to it
  4. Space [area]
  5. Weapons used
  6. Unit using the camp
  7. Fortifications and tunnels
  8. Guard posts
  9. Amount and periods of lighting
  10. Number of soldiers and officers. Officers' ranks
  11. Ammunition depot locations
  12. Vehicles and automobiles
  13. Leave policy
  14. Commander's name, rank, arrival and departure times
  15. Degree and speed of mobilization
  16. Brigades and names of companies
  17. Sleeping and waking times
  18. Telephone lines and means of communication

The brother gathering the information may start a friendship with one of the soldiers or officers of that base. Information may be collected gradually and easily from soldiers when giving them rides from the camp to the bus or train stations, etc.

B. Gathering Information Through Interrogation

Security personnel in our countries arrest brothers and obtain the needed information through interrogation and torture.

The Military Organization must do likewise. On one hand, the Organization can obtain important information about enemy establishments and personnel. On the other hand, that is a form of necessary punishment.

Information is collected in this method by kidnapping an enemy individual, interrogating him, and torturing him. This source of information is not permanent. Also, caution should be exercised about being deceived by misinformation from enemy individuals.

Thus, the brother who interrogates the hostage should possess the following characteristics:

  1. Should have knowledge and expertise about people's behavior and morals.
  2. Should have a strong personality.
  3. Should possess a sixth sense based on practice and experience.
  4. Should be extremely patient.
  5. Should be able to act, pretend, and mask himself.
  6. Should be intelligent, observant, analytical, and deductive.
  7. Should be able to establish an investigative plan.

C. Gathering Information Through Recruitment

Recruiting agents is the most dangerous task that an enlisted brother can perform. Because of this dangerous task, the brother may be killed or imprisoned. Thus, the recruitment task must be performed by special types of members.

There are a number of motives that might entice an uncommitted person to take part in intelligence work. These motives are:

  1. Coercion and entanglement
  2. Greed and love for money
  3. Displaying courage and love of adventure
  4. Love of amusement and deviance
  5. Mental and political orientation
  6. Fear of being harmed

The Organization may use motives No. 2, 3, 5, and 6 in recruitment.

Candidates for Recruitment Are

  1. Smugglers
  2. Those seeking political asylum
  3. Adventurers
  4. Workers at coffee shops, restaurants, and hotels
  5. People in need
  6. Employees at borders, airports, and seaports

Types of Agents Preferred by The American IntelligenceAgency [CIA]

  1. Foreign officials who are disenchanted with their country's policies and are looking towards the U.S. for guidance and direction.
  2. The ideologist (who is in his county but against his government) is considered a valuable catch and a goodcandidate for American Intelligence Agency [CIA].
  3. Officials who have a lavish lifestyle and cannot keep up using their regular wages, or those who have weaknesses for women, other men, or alcoholic beverages. The agent who can be bought using the aforementioned means is an easy target, but the agent who considers what he does a noble cause 'is difficult to recruit by enemy intelligence.
  4. For that purpose, students and soldiers in Third World countries are considered valuable targets. Soldiers are the dominating and controlling elements of those countries.

Recruitment Stages

Suppose the Islamic Organization, with its modest capabilities, wants to obtain information about an important target (important personality, building, camp, agency, ministry). It has to do the following:

  1. Finding the Agent: In this stage, the Organization picks the suitable person for supplying the information. The Organization learns about that person: His financial condition, his family status, his position regarding the government, and his weaknesses and strengths.
  2. Evaluating the Agent: In this stage, the agent is placed under continuous observation to learn the times of his departure to and return from work, the places he visits, the individuals he meets, and his social interaction with those that he meets in coffee shops, clubs, etc.
  3. Approachingthe Agent: After gathering information about him, a relationship with him is developed under a certain cover, such as:
    1. Family connection and tribal relations.
    2. Developing a friendship with him in the club, coffee shop, and workers union.

    The [recruiting] brother develops the friendship as if it were unpretentious and unplanned. The relationship should develop naturally and gradually in order not to attract the target's attention.

    Important Note: In case the first brother fails to develop a friendship with the target, another brother takes over after learning from the first about the target's weaknesses (motives that can be exploited) such as his love for money, opposition to the government, love for adventure, or display courage.

  4. Recruiting the Agent: After finding, evaluating, and approaching a target, comes the second stage of recruiting him. Recruiting may be direct, that is, telling the agent frankly about working for the Organization for a specific and agreed-upon salary. A promise is secured in writing or verbally. Or recruitment may be indirect, that is, information may be taken from the target without informing him that he is an agent. That may be accomplished by giving him gifts,sharing his joys and sorrows, and attempting to solve his problems.
  5. Testing the Agent: In this stage, the agent is assigned certain tasks in order to test his ability, loyalty, and dependability. The agent does not know that the Organization already has the sought information. If the information supplied by the agent does not match the Organization's existing information, then the agent may be an unreliable source of information or may be trying to mislead the Organization. During the testing stage, the agent should remain under careful observation to spot all his movements.
  6. Training the Agent: This stage applies to the recruited agent, that is, the agent who has been recruited directly and is aware that he has been recruited by someone or some organization for money or other things. That agent may be trained on the following:
    1. Work secrecy and means of gathering and hiding information
    2. The method of passing information on to officials
    3. Concealment and disguising
    4. Interrogation and resisting the interrogation
    5. Explaining the assigned mission in utmost detail
    6. Photography

    There might not be any training at all. The agent may be given freedom in his work, relying on his instinct, talents, background, and the capabilities of his superior brother.

  7. Treating the Agent: The brother who manages the agent should possess the qualifications of a perfect spy, a psychiatrist, and an interrogator. There are two points of view on treating the agent:
    • First Point of View: Maintaining a strong personal relationship with the agent. This technique provides the agent with the motivation that entices him to take chances in order to please his friend with the information. However, this technique has disadvantages. The barriers between the agent and his superiors are removed, and the agent may ask for many things that were not agreed upon.
    • Second Point of View: The person managing the agent treats him roughly and pushes him to the limits for the purpose of getting as much information as possible. This technique uses harshness, cruelty, and threats in order to keep the agent constantly active. I believe that the Islamic Military organization can combine the two techniques. The agent may be treated in a careful Islamic manner, while the managing brother appeals to the agent's conscience and his Islamic association with the work for majestic Allah's religion. He lures the agent with money and gifts, and uses cruelty and kindness when appropriate.
  8. Terminating the Agent's Services. That should occur when any of the following take place:
    1. The recruitment mission terminates
    2. Incapacity to work because of sickness or changes in the job situation
    3. Repeated errors in security measures
    4. The agent requests the termination

Means for Testing the Recruit

  1. Requesting specific information that the Organization knows well
  2. Monitoring him while he performs his covert work
  3. Overpaying him in order to know his trustworthiness
  4. Giving him a chance to tamper with the work documents (unimportant documents)

Important Advice About Dealing with Agents:

  1. Do not send sealed packages to the agent or receive them from him. These could be booby traps. Leaving something for the agent should be done as quickly as possible. When transporting and giving an item to the agent at the agreed location, it should not attract attention and lead to the agent's arrest
  2. The financial status of the agent should be controlled so agent at the agreed-upon location, it should not attract attention and lead to the agent's arrest. that the agent does not suddenly show great wealth. A portion of the payment should be given to him, while the other should be deposited in his bank account.
  3. When wishing to recruit an agent, events should occur naturally. You may agree with a friend that he invite the person to be recruited for dinner, or something similar. While that intermediary person is talking with him, he notices your arrival at your friends, greets you, starts to converse with you, and invites you to sit down with the person you want to recruit.
  4. When meeting with the agent, make sure neither you or the meeting place are being monitored. Do not enter a place to meet with an agent before he does. There could be a trap for you.
  5. If you wait for your agent at the agreed-upon location, you could be a target for him. Be especially careful if he goes to the bathroom. Once, in Belgium, an Israeli Mossad officer met an Arab agent. A few minutes after they sat down, the Arab agent said that he had to go get something. When he returned, the Israeli intelligence agent was still there. The Arab agent then pulled out a pistol and shot the Mossad agent several times.
  6. In order to communicate with the agent, it is necessary to specify locations such as parks, a university campus area, etc.
  7. It is necessary to continuously communicate with the agent, to learn about his problems and requests, help him as much as possible, lift his morale, and renew his confidence.

Thirteenth Lesson: Secret Writing and Ciphers and Codes

(incomplete)

Secret Ink

Fourteenth Lesson: Kidnapping and Assassinations Using Rifles and Pistols

(incomplete)

Fifteenth Lesson: Explosives

(incomplete)

Sixteenth Lesson: Assassinations Using Poisons and Cold Steel

(incomplete)

Seventeenth Lesson: Interrogation and Investigation

(incomplete)

Eighteenth Lesson: Prisons and Detention Centers

IF AN INDICTMENT IS ISSUED AND THE TRIAL, BEGINS, THE BROTHER HAS TO PAY ATTENTION TO THE FOLLOWING:

  1. At the beginning of the trial, once more the brothers must insist on proving that torture was inflicted on them by State Security [investigators] before the judge.
  2. Complain [to the court] of mistreatment while in prison.
  3. Make arrangements for the brother's defense with the attorney, whether he was retained by the brother's family or court-appointed.
  4. The brother has to do his best to know the names of the state security officers, who participated in his torture and mention their names to the judge. [These names may be obtained from brothers who had to deal with those officers in previous cases.]
  5. Some brothers may tell and may be lured by the state security investigators to testify against the brothers [i.e. affirmation witness], either by not keeping them together in the same prison during the trials, or by letting them talk to the media. In this case,they have to be treated gently, and should be offered good advice, good treatment, and pray that God may guide them.
  6. During the trial, the court has to be notified of any mistreatment of the brothers inside the prison.
  7. It is possible to resort to a hunger strike, but it is a tactic that caneither succeed or fail.
  8. Take advantage of visits to communicate with brothers outside prison and exchange information that may be helpful to them in their work outside prison [according to what occurred during the investigations]. The importance of mastering the art of hiding messages is self evident here.
  • When the brothers are transported from and to the prison [on their way to the court] they should shout Islamic slogans out loud from inside the prison cars to impress upon the people and their family the need to support Islam.
  • Inside the prison, the brother should not accept any work that may belittle or demean him or his brothers, such as the cleaning of the prison bathrooms or hallways.
  • The brothers should create an Islamic program for themselves inside the prison, as well as recreational and educational ones, etc.
  • The brother in prison should be a role model in selflessness. Brothers should also pay attention to each others needs and should help each other and unite vis a vis the prison officers.
  • The brothers must take advantage of their presence in prison for obeying and worshiping [God] and memorizing the Qora'an, etc. This is in addition to all guidelines and procedures that were contained in the lesson on interrogation and investigation. Lastly, each of us has to understand that we don't achieve victory against our enemies through these actions and security procedures. Rather, victory is achieved by obeying Almighty and Glorious God and because of their many sins. Every brother has to be careful so as not to commit sins and everyone of us has to do his best in obeying Almighty God, Who said in his Holy Book: We will, without doubt. help Our messengers and those who believe (both) in this world's life and the one Day when the Witnesses will stand forth.; May God guide us.

Dedication

To this pure Muslim youth, the believer, the mujahid (fighter) for God's sake. I present this modest effort as a contribution from me to pave the way that will lead to Almighty God and to establish a caliphate along the lines of the prophet.

The prophet, peace be upon him, said according to what was related by Imam Ahmed:

Let the prophecy that God wants be in you, yet God may remove it if He so wills, and then there will be a Caliphate according to the prophet's path [instruction], if God so wills it. He will also remove that [the Caliphate] if He so wills, and you will have a disobedient king if God so wills it. Once again, if God so wills, He will remove him [the disobedient king], and you will have an oppressive lung. [Finally], if God so wills, He will remove him [the oppressive king], and you will have a Caliphate according to the prophet's path [instruction]. He then became silent.

The Importance of Team Work

  1. Team work is the only translation of God's command, as well as that of the prophet, to unite and not to disunite. Almighty God says, And hold fast, all together, by the Rope which Allah (stretches out for you), and be not divided among yourselves. In 'Sahih Muslim', it was reported by Abu Horairah, may Allah look kindly upon him, that the prophet, may Allah's peace and greetings be upon him, said: Allah approves three [things] for you and disapproves three [things]: He approves that you worship him, that you do not disbelieve in Him, and that you hold fast, all together, by the Rope which Allah, and be not divided among yourselves. He disapproves of three: gossip, asking too much [for help], and squandering money.
  2. Abandoning 'team work' for individual and haphazard work means disobeying that orders of God and the prophet and falling victim to disunity.
  3. Team work is-conducive to cooperation in righteousness and piety.
  4. Upholding religion, which God has ordered us by His saying, Uphold religion, will necessarily require an all out confrontation against all our enemies, who want to recreate darkness. In addition, it is imperative to stand against darkness in all arenas: the media, education, [religious] guidance, and counseling, as well as others. This will make it necessary for us to move on numerous fields so as to enable the Islamic movement to confront ignorance and achieve victory against it in the battle to uphold religion. All these vital goals can not be adequately achieved without organized team work. Therefore, team work becomes a necessity, in accordance with the fundamental rule, Duty cannot be accomplished without it, and it is a requirement. This way, team work is achieved through mustering and organizing the ranks, while putting the Amir (the Prince) before them, and the right man in the right place, making plans for action, organizing work, and obtaining facets of power...

Military Studies in the Jihad Against the Tyrants aka Encyclopedia of the Afghan Jihad was found in an apartment belonging to a member of the terrorist group Al Qaeda in 2000.