How Qaeda Warned Its Operatives on Using Cell Phones BY ELI LAKE - Staff Reporter of the Sun October 18, 2006 URL: http://www.nysun.com/article/41774 WASHINGTON When an aspiring Al Qaeda terrorist is buying a cell phone, it's best that he purchase the chip inside the device under a phony name or from a black market vendor that does not sell the accompanying documentation. If he has any reason to believe his phone has been tapped, he should sell it immediately to a stranger. This is the kind of advice contained in "Myth of Delusion," a 151-page manuscript making the rounds on password-protected jihadi Web sites. The book recently caught the attention of American intelligence analysts, who estimate that it was released sometime this summer. An English translation obtained by The New York Sun and whose authenticity was confirmed by a senior intelligence official gives an insight into what America's Islamist enemies believe they know about the CIA and the National Security Agency. It also underscores the paranoid mind at the heart of the international jihad movement, devoting paragraphs to how South Korean intelligence influences America's national security through a newspaper controlled by the Unification Church, the Washington Times. The author of the book is a little-known terrorist named Mohammed al-Hakaymah, a member of a violent group that recently splintered off from an Egyptian Islamist organization, Gama'a al-Islamiyya, when it signed a cease-fire agreement with Cairo. Mr. Hakaymah gained some notoriety on August 5, when Osama bin Laden's Egyptian-born deputy, Ayman al-Zawahiri, mentioned his name in an announcement that Al Qaeda was merging with the splinter group. An independent analyst affiliated with the Washington-based Jamestown Foundation, Chris Zambelis, said yesterday that the book is similar to a military manual published by a Syrian named Abu Musab al-Suri, which was based largely on open sources and information released by the Pentagon. "You see this kind of thing a lot. On the radical Islamic forums, you have people put up U.S.military manuals advising followers about American military tactics. In terms of an actual manual for intelligence, though, this is the most extensive and comprehensive I have seen," Mr. Zambelis said. Intelligence community analysts are aware of the book, but it is seen as more of a strategic document and contains no tactical threat information, a senior intelligence analyst who spoke to the Sun on condition of anonymity said. In the scope of its sources and its attempt to write a history of the CIA and other intelligence agencies, Mr. Hakaymah's book is different from other jihadist tracts on American intelligence. While he makes no mention of the December 2005 New YorkTimes article that first disclosed that the National Security Agency was tapping phone numbers found in cell phones captured from suspected Al Qaeda operatives in Afghanistan, he does devote a chapter to electronic surveillance. In it, Mr. Hakaymah writes that any electronic communication between operatives can be monitored using key words such as "Mullah Omar," the name of the Taliban leader, or even voice printing. Two pages are devoted to the Echelon surveillance system, which Britain and America developed in the 1990s. Mr. Hakaymah warns future terrorists not to repeat the mistake of the Kurdish terrorist leader Abdullah Öcalan, who was captured in Nairobi, Kenya, after making a cell phone call to northern Iraq. "The surveillance may be for a certain number or for detecting a certain voice fingerprint for a wanted person," Mr. Hakaymah writes. "When a person's number is detected, the recorded calls can be retrieved whether it was incoming or outgoing on that number." The book also gives a detailed description of how the CIA recruits spies, based on information widely available in fiction and nonfiction books about espionage. But in this section, the author conflates the training of spies and officers, writing that recruited spies are trained in the West Virginia CIA facility known as the Farm, when in fact only officers receive training there. Yesterday, the senior intelligence official summed up the book as "an assessment of American intelligence, a mixture of a couple of things. There is some element of training from things they gather from open sources. ... But this is also clearly propaganda." The propaganda element appears to be aimed at certain Islamists who have rejected Al Qaeda's view that America, or what the group's leaders call "the far enemy," is too powerful and too efficient to challenge. One of the purposes of the book is to show that America's intelligence agencies "make mistakes and are not infallible," a professor of strategic studies at Johns Hopkins University, Mary Habeck, said. The author is saying, "We don't have to fear them like we always fear them. That is why it is called the Myth of Delusion.' One of bin Laden's purposes, he says, in authorizing 9/11 was to break the media blockade, to show the invincibility of the United States as a media myth," Ms. Habeck added. In his preface, Mr. Hakaymah writes that the book will "use the published reports, news, and research, which expose the extent of the failure of the American intelligence services inside and outside the United States." To that end, he speculates that a high-level spy may have tipped off Al Qaeda's September 11 hijackers or that elements of the American intelligence apparatus had prior knowledge of the plot. He writes that the November 2001 killing of a CIA officer, Michael Spann, in Afghanistan represented an enormous victory for Al Qaeda because the agency had to admit his death publicly. But the book also shows a paranoid and conspiratorial worldview that mimics many of the more radical critiques of American intelligence. The RAND Corporation, the Hoover Institute, the American Enterprise Institute, and the Center for Strategic and International Studies were founded, Mr. Hakaymah writes, by a cabal of "financial and industrial groups of Texas, including the giant weapons manufacturers together with the intelligence community headed by the CIA." Mr. Hakaymah also devotes several pages to the pending case against a former Pentagon analyst, Lawrence Franklin, who pleaded guilty last fall to mishandling classified documents but was initially reported in the press to be a spy for Israel. (F)AIR USE NOTICE: All original content and/or articles and graphics in this message are copyrighted, unless specifically noted otherwise. All rights to these copyrighted items are reserved. Articles and graphics have been placed within for educational and discussion purposes only, in compliance with "Fair Use" criteria established in Section 107 of the Copyright Act of 1976. The principle of "Fair Use" was established as law by Section 107 of The Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of display include "criticism, comment, news reporting, teaching, scholarship, and research." Section 107 establishes four criteria for determining whether the use of a work in any particular case qualifies as a "fair use". A work used does not necessarily have to satisfy all four criteria to qualify as an instance of "fair use". Rather, "fair use" is determined by the overall extent to which the cited work does or does not substantially satisfy the criteria in their totality. If you wish to use copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS. [Non-text portions of this message have been removed] -------------------------- Want to discuss this topic? Head on over to our discussion list, [EMAIL PROTECTED] -------------------------- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: osint@yahoogroups.com Subscribe: [EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/