Al Qaeda Manual, Part 7
The Military Organization in any Islamic group can, with its modest capabilities, use the following means:
1. The telephone,
2. Meeting in-person,
4 . Letters,
5. Some modern devices, such as the facsimile and wireless [communication].
Communication may be within the county, state, or even the country, in which case it is called local communication. When it extends expanded between countries, it is then called international communication.
Secret Communication is Limited to the Following Types:
Common, standby, alarm
1. Common Communication: It is a communication between two members of the Organization without being monitored by the security apparatus opposing the Organization. The common communication should be done under a certain cover and after inspecting the surveillance situation [by the enemy].
2. Standby Communication: This replaces common communication when one of the two parties is unable to communicate with the other for some reason.
3. Alarm Communication: This is used when the opposing security apparatus discovers an undercover activity or some undercover members. Based on this communication, the activity is stopped ’for a while, all matters related to the activity are abandoned,
and the Organization’s members are hidden from the security personnel.
Method of Communication Among Members of the Organization:
1. Communication about undercover activity should be done using a good cover– it should also be quick, explicit, and pertinent. That is, just for talking only.
2 . Prior to contacting his members, the commander of the cell should agree with each of them separately (the cell members should never meet all in one place and should not know one another) on a manner and means of communication with each other. Likewise, the chief of the Organization should [use a similar technique] with the branch commanders.
3 . A higher-ranking commander determines the type and method of communication with lower-ranking leaders.
First Means: The Telephone:
Because of significant technological advances, security measures for monitoring the telephone and broadcasting equipment have increased. Monitoring may be done by installing a secondary line or wireless broadcasting device on a telephone that relays the calls to a remote location...That is why the Organization takes security measures among its members who use this means of communication (the telephone).
1. Communication should be carried out from public places. One should select telephones that are less suspicious to the security apparatus and are more difficult to monitor. It is preferable to use telephones in booths and on main streets.
[2.] Cell or cluster methods should be adopted by the Organization. It should be composed of many cells whose members do not know one another, so that if a cell member is caught the other cells would not be affected, and work would proceed normally.
2. Conversation should be coded or in general terms so as not to alert the person monitoring [the telephone].
3. Periodically examining the telephone wire and the receiver.
4. Telephone numbers should be memorized and not recorded. If the brother has to write them, he should do so using a code so they do not appear as telephone numbers (figures from a shopping list, etc.)
5 . The telephone caller and person called should mention some words or sentences prior to bringing up the intended subject. The brother who is calling may misdial one of the digits and actually call someone else. The person ‘called may claim that the call is for him, and the calling brother may start telling him work-related issues and reveal many things because of a minor error.
6. In telephone conversations about undercover work, the voice should be changed and distorted.
7. When feasible, it is preferable to change telephone lines to allow direct access to local and international calls. That and proper cover facilitate communications and provide security protection not available when the central telephone station in the presence of many employees is used.
8. When a telephone [line] is identified [by the security apparatus], the command and all parties who were using it should be notified as soon as possible in order to take appropriate measures.
9. When the command is certain that a particular telephone [line] is being monitored, it can exploit it by providing information that misleads the enemy and benefits the work plan.
10. If the Organization manages to obtain jamming devices, it should use them immediately.
Second Means: Meeting in-person:
This is direct communication between the commander and a member of the Organization. During the meeting the following are accomplished: