Date post: | 30-May-2018 |
Category: |
Documents |
Upload: | 911-document-archive |
View: | 213 times |
Download: | 0 times |
of 8
8/14/2019 FO B3 Public Hearing 1-26-04 1 of 3 Fdr- Tab 3-4 Excerpt From DOJ Version of Al Qaeda Training Manual (Total in F
1/8
U.S.Department of JusticeFederal Bureau of Investigation
TERRORIST TRAINING MANUAL
Printed courtesy of the Na tional Security Divis ion's Operat ional Training U n i tFBI Headquarters, November 2001
8/14/2019 FO B3 Public Hearing 1-26-04 1 of 3 Fdr- Tab 3-4 Excerpt From DOJ Version of Al Qaeda Training Manual (Total in F
2/8
TERRORIST TRAINING MANUAL(Found in the apartment of a suspected al Qaeda member in Manchester, England, May 2000)
Printed courtesy of the National Security Division's Operational Training UnitFBI Headquarters, November 2001
8/14/2019 FO B3 Public Hearing 1-26-04 1 of 3 Fdr- Tab 3-4 Excerpt From DOJ Version of Al Qaeda Training Manual (Total in F
3/8
Attached is a copy of a training manual found hi May 2000 by British investigators hiManchester, England, while searching the apartment of suspected al Qaeda member Anasal-Liby, AKA Nazih al-Raghie, who, as of November 2000, is a fugitive. The Southern DistrictofNew York included this manual as evidence in the recent African embassy bombing trials,since it clearly outlines terrorist cell-members' goals and many of their operational techniques.Although the manual is somewhat dated (for example, it does not mention the Internet, which isused extensively by current terrorists for communicating with one another), and was apparentlywritten for another part of the world (there are references to "polytheists"~presumably Hindusand to the use of torture during interrogations, which would refer to oppressive regimes in theMiddle East), it nevertheless contains much material that is relevant to terrorist cell members'behavior in Western Europe and the United States. Of particular interest are the sections onsurveillance detection and evasion, how to maintain cover in foreign lands, and how to deal witharrest and interrogation. Most important, the manual provides insight into the general mindset ofradical Islamic terrorists, and should prove useful to any law enforcement officer involved incounterterrorism investigations.
8/14/2019 FO B3 Public Hearing 1-26-04 1 of 3 Fdr- Tab 3-4 Excerpt From DOJ Version of Al Qaeda Training Manual (Total in F
4/8
Table of Contents
DedicationIntroductionFirst LessonSecond Lesson
Third LessonFourth Lesson
Fifth LessonSixth LessonSeventh Lesson
Eighth LessonNinth LessonTenth LessonEleventh Lesson
Twelfth Lesson
Thirteenth LessonFourteenth Lesson
General IntroductionNecessary Qualifications and CharacterFor Organization's MembersCounterfeit Currency and Forged DocumentsOrganization M ilitary Bases:Apartments and Hiding PlacesMeans of Communication and TransportationTrainingW eapons: M easures Related to Buying andTransporting ThemMember SafetySecurity PlanSpecial Tactical O perationsEspionage: Inform ation-Gathering UsingOpen MethodsEspionage: In formation-Gathering UsingCovert M ethodsSecret W riting and Ciphers and CodesKidnapping and Assassination UsingRifles and Pistols
37
1014
2124
284346
5156
68
75
84
99116
Fifteenth Lesson Assassination Using Explosives 139
8/14/2019 FO B3 Public Hearing 1-26-04 1 of 3 Fdr- Tab 3-4 Excerpt From DOJ Version of Al Qaeda Training Manual (Total in F
5/8
Sixteenth Lesson Assassination Using Poisons and Cold Steel 153Seventeenth Lesson Interrogation and Investigation 161Eighteenth Lesson Prisons and Detention Centers 176
8/14/2019 FO B3 Public Hearing 1-26-04 1 of 3 Fdr- Tab 3-4 Excerpt From DOJ Version of Al Qaeda Training Manual (Total in F
6/8
UK/BM-21 TRANSLATION
THIRD LESSON
COUNTERFEIT CURRENCY AND FORGED DOCUMENTS
8/14/2019 FO B3 Public Hearing 1-26-04 1 of 3 Fdr- Tab 3-4 Excerpt From DOJ Version of Al Qaeda Training Manual (Total in F
7/8
rUK/BM-22 TRANSLATION
Financial Security Precautions:1. Dividing operational funds into two parts: One part is to
be invested in projects that offer financial return, andthe other is to be saved and not spent except duringoperations.
2. Not placing operational funds [all] in one place.3. Not telling the Organization members about the location of
the funds.4. Having proper protection while carrying large amounts of
money.5. Leaving the money with non-members and spending it as
needed.
Forged Documents (Identity Cards. Records Books, Passports)The following security precautions should be taken:1. Keeping the passport in a safe place so it would not be
ceized by the security apparatus, and the brother itbelongs to would have to negotiate its return (I'll give.you your passport if you give me information)
2. All documents of the undercover brother, such as identitycards and passport, should be falsified.
3. When the undercover brother is traveling with a certainidentity card or passport, he should know all pertinent[information] such as the name, profession, and place ofresidence.
4. The brother who .has special work status (commander,communication link, ...) should have more than one identitycard and passport. He should learn the contents of each,the nature of the [indicated] profession, and the dialectof the residence area listed in the document.
5. The photograph of the brother in these documents should bewithout a beard. It is preferable that the brother'spublic photograph [on these documents] be also without abeard. If he already has one [document] showing aphotograph with a beard, he should replace it.
6. When using an identity document in different names, no morethan one such document should be carried at one time.
8/14/2019 FO B3 Public Hearing 1-26-04 1 of 3 Fdr- Tab 3-4 Excerpt From DOJ Version of Al Qaeda Training Manual (Total in F
8/8
UK/BM-23 TRANSLATION
7. The validity of the falsified travel documents shouldalways be confirmed.
8. All falsification matters should be carried out through thecommand and not haphazardly (procedure control)
9 . Married brothers should not add their wives to theirpassports.10. When a brother is carrying the forged passport of a certain
country, he should not travel to that country. It is easyto detect forgery at the airport, and the dialect of thebrother is different from that of the people from thatcountry.
Security Precautions Related to the Organizations' Given Names:1 . The name given by the Organization [to the brother] should
not be odd in comparison with other names used around him.2 . A brother should not have more than one name in the areawhere he lives (the undercover work place)