This document is the outline of a document providing basic security procedures for al-Qa`ida cells and organizations. The document identifies three hostile groups: intelligence agencies, atheists and apostates, and the existing government, presumably in Pakistan or Afghanistan. The document goes on to identify various threats to the organization, including assassinations, sabotage, spying, and stealing, and describes various techniques that can be used to minimize risks. The outline is divided into three chapters: External Security, Dealing with Visitors, and Counterterrorism Spying. The former provides instruction on physical defenses, including where and how to post lookouts and the utility of trenches. The second identifies the risks associated with various classes of visitors, and the third very briefly suggests plans to recruit and place spies.

Stay Informed

Sign up to receive updates from CTC.

Sign up