Historic Border Patrol  Badge Artifact
This site is maintained by supporters of the United States Border Patrol and is not an official government site. The contents of this site are privately managed and not subject to the direction of the United States Border Patrol.
Back 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Next
USBP Overview
USBP Today
USBP History
Border At Night
Southern Barrier
West California

East California

West Arizona
Mid Arizona
East Arizona
New Mexico
Northern Border
Border Images
USBP Weapons
Immigrant Effects
Being Detained
Sex Slaves
Al Qaeda
Travel Documents

Al Qaeda Manual, Part 9

vi. Prior to the meeting, designing a security plan that specifies what the security personnel would be told in case the location were raided by them, and what [the brothers] would resort to in dealing with the security personnel (fleeing,driving b a c k ,...)

2. Finding a proper cover for the meeting: [The cover]

i. should blend well with the nature of the location.

ii. In case they raid the place, the security personnel should believe the cover.

iii. should not arouse the curiosity of those present.

iv. should match the person’s appearance and his financial and educational background.

v. should have documents that support it.

vi. provide reasons for the two parties’ meeting (for example, one of the two parties should have proof that he is an architect. The other should have documents as proof that he is a land owner. The architect has produced a construction plan for the land)

3. Specifying the Meeting Date and Time:

i. Specifying the hour of the meeting as well as the date.


ii. Specifying the time of both parties’ arrival ana the time of the first party’s departure.

iii. Specifying h o w long the meeting will last.

iv. Specifying an alternative date and time.

v. Not allowing a long period of time between making the meeting arrangements and the meeting itself.

4 . Designating special signals between those who meet If the two individuals meeting know one another’s shape and appearance, it is sufficient to use a single safety sign. [In that case,] the sitting and arriving individuals inform each other that there is no enemy surveillance. The sign may be keys, beads, a newspaper, or a scarf. The two parties would agree on moving it in a special way so as not to attract the attention of those present.

If the two individuals do not know one another, they should do the following:

a. The initial sign for becoming acquainted may be that both of them wear a certain type of clothing or carry a certain item. These signs should be appropriate for the place, easily identified, and meet the purpose. The initial sign for becoming acquainted does not [fully] identify one person by another. It does that at a rate of 30%.

b. Safety Signal: It is given by the individual sitting in. the meeting location to inform the second individual that the place is safe. The second person


would reply through signals to inform the first that he is not being monitored. The signals are agreed upon previously and should not cause suspicion.

c. A second signal for getting acquainted is one in which the arriving person uses while sitting down. That signal may be a certain clause, a word, a sentence, or a gesture agreed upon previously, and should not cause suspicion for those who hear it or see it.

B. The Stage of the Meeting [itself]:The following measures should be taken:

1. Caution during the meeting.

2 . Not acting unnaturally during the meeting in order not to raise suspicion.

3. Not talking with either loud or very low voices ([should be] moderate).

4. Not writing anything that has to do with the meeting.

5. Agreeing on a security plan in case the enemy raids the location.

C. After the Meeting: The following measures should be taken:

1. Not departing together, but each one separately.

2. Not heading directly to the main road but through secondary ones.

3. Not leaving anything in the meeting place that might indicate the identity or nature of those who met. Meeting in-person has disadvantages, such as:

1. Allowing the enemy to capture those who are meeting.

2. Allowing them [the enemy] to take pictures of those who are meeting, record their conversation, and gather evidence against them.


Back 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Next