-
1
-
-
33745854048
-
Taliban 'asymmetric' tactics hamper US strikes
-
31 October Tufts electronic library database (accessed 16 September 2004)
-
See Kim Burger, "Taliban 'Asymmetric' Tactics Hamper US Strikes," Jane's Defense Weekly, 31 October 2001, available through Tufts electronic library database (accessed 16 September 2004);
-
(2001)
Jane's Defense Weekly
-
-
Burger, K.1
-
3
-
-
33745838101
-
-
Defend America, (accessed 26 November 2004)
-
and Gerry J. Gilmore, "Denial and Deception," Defend America, available at http://www.defendamerica.mil/articles/a020702a.html (accessed 26 November 2004).
-
Denial and Deception
-
-
Gilmore, G.J.1
-
4
-
-
33745848327
-
-
Zawahiri's Letter to Abu Musab al-Zarqawi (9 July English) (accessed 29 November 2005)
-
For the most recent proof of this strategy, see Zawahiri's Letter to Abu Musab al-Zarqawi (9 July 2005), available in English at http://www.dni.gov/ letter_in_english.pdf (accessed 29 November 2005).
-
(2005)
-
-
-
5
-
-
0005878644
-
-
New York: New American Library
-
See Basil Henry Liddell Hart, Strategy (New York: New American Library, 1974).
-
(1974)
Strategy
-
-
Hart, B.H.L.1
-
6
-
-
85055301919
-
Winning hearts and minds in the 'war on terrorism,'
-
See Thomas R. Mockaitis, "Winning Hearts and Minds in the 'War on Terrorism,' Small Wars and Insurgencies 14, no. 1 (2003): 24-25.
-
(2003)
Small Wars and Insurgencies
, vol.14
, Issue.1
, pp. 24-25
-
-
Mockaitis, T.R.1
-
7
-
-
33745855281
-
Elements of strategic denial and deception
-
Roy Godson and James J. Wirtz eds. (New Brunswick, NJ: Transaction Publishers)
-
Abram Shulsky, "Elements of Strategic Denial and Deception," in Strategic Denial and Deception, Roy Godson and James J. Wirtz eds. (New Brunswick, NJ: Transaction Publishers, 2002), 15.
-
(2002)
Strategic Denial and Deception
, pp. 15
-
-
Shulsky, A.1
-
10
-
-
21544473902
-
Al Qaeda's growing sanctuary
-
14 July
-
Ungoverned territories are becoming havens for Al Qaeda and other terrorist groups. See Douglas Farah and Richard Shultz, "Al Qaeda's Growing Sanctuary," Washington Post 14 July 2004, A19.
-
(2004)
Washington Post
-
-
Farah, D.1
Shultz, R.2
-
13
-
-
25144496937
-
In video message, Bin Laden issues warning to U.S.
-
30 October
-
Audio and videotapes with bin Laden referring to the attacks have been aired multiple times since late 2001, but this was the first time bin Laden came out with a direct admission of Al Qaeda's responsibility for the attacks. See Douglas Jehl and David Johnston, "In Video Message, Bin Laden Issues Warning to U.S.," New York Times, 30 October 2004, A1.
-
(2004)
New York Times
-
-
Jehl, D.1
Johnston, D.2
-
14
-
-
33745811148
-
Al Qaeda's new tactic: Deception and denial
-
13 November (accessed 26 November 2004)
-
Faye Bowers, "Al Qaeda's New Tactic: Deception and Denial," Christian Science Monitor, 13 November 2003, available at http://www.csmonitor. com/2003/1113/p02s01-wome.htm (accessed 26 November 2004).
-
(2003)
Christian Science Monitor
-
-
Bowers, F.1
-
15
-
-
33745818222
-
-
Shulsky, 15
-
Shulsky, 15.
-
-
-
-
16
-
-
33745811429
-
-
Ibid., 16
-
Ibid., 16.
-
-
-
-
17
-
-
33745834135
-
-
Bell, 130
-
Bell, 130.
-
-
-
-
18
-
-
33745810422
-
-
Bell, 150
-
Bell, 150.
-
-
-
-
19
-
-
33745833766
-
-
Bell, 139
-
He does write that tactical denial can help foster strategic deception, but he sees such occurrences as the exception rather than the rule, and says nothing of tactical deceptions having strategic results. See Bell, 139.
-
-
-
-
20
-
-
33745824103
-
-
Gunaratna, 13
-
Gunaratna, 13.
-
-
-
-
21
-
-
33745834221
-
Linking bin Laden to Bali
-
27 January
-
Take, for example, Al Qaeda's complicity in the Bali bombings, which were conducted by JI. Al Qaeda was directly involved in the planning and financing of that operation. See Jason Tedjasukmana, "Linking bin Laden to Bali," Time 161, no. 4, 27 January 2003, 16.
-
(2003)
Time
, vol.161
, Issue.4
, pp. 16
-
-
Tedjasukmana, J.1
-
22
-
-
33745836948
-
-
Gunaratna, 281
-
Gunaratna, 281.
-
-
-
-
24
-
-
33745858541
-
-
Alexandria, VA: Tempest Publishing
-
The manual quoted from in this paper was captured at an Al Qaeda safe house in Britain and used during the 1993 WTC bombing trials. It will be referred to as "Al Qaeda Manual" hereafter in the notes. I was given a copy in Richard Shultz's U.S. Terrorism, Intelligence and National Security seminar at the Fletcher School, Tufts University, and all references are from that copy. A similar copy can be found in The Al Qaeda Documents, Vol. 1 (Alexandria, VA: Tempest Publishing, 2002), 5-99.
-
(2002)
The Al Qaeda Documents
, vol.1
, pp. 5-99
-
-
-
25
-
-
85055304950
-
Tactical deception and strategic surprise in Al-Qai'da's operations
-
June
-
As noticed by Richard Shultz and Ruth Margolies Beitler, "Tactical Deception and Strategic Surprise in Al-Qai'da's Operations," Middle East Review of International Affairs 8, no. 2 June 2004: 60.
-
(2004)
Middle East Review of International Affairs
, vol.8
, Issue.2
, pp. 60
-
-
Shultz, R.1
Beitler, R.M.2
-
27
-
-
33745821922
-
-
Mockaitis, 26
-
Mockaitis, 26.
-
-
-
-
28
-
-
33745824846
-
-
'al-Taqiyya/Dissimulation' (n.d.), (accessed 14 March 2006)
-
For an interesting-although questionably authoritative-exposition by a Shiite writer who believes Sunnis do in fact believe in the practice, see The Shi'ite Encyclopedia, 'al-Taqiyya/Dissimulation' (n.d.), available at http://www.al-islam.org/encyclopedia/chapterob/ (accessed 14 March 2006).
-
The Shi'ite Encyclopedia
-
-
-
29
-
-
8744240653
-
-
New York: W.W. Norton
-
National Commission on Terrorist Attacks Upon the United States [hereafter "National Commission"], 9/11 Commission Report (New York: W.W. Norton, 2004), 156, 168. Note: References in the 9/11 Report and other reports associated with the 9/11 Commission (monographs, staff reports, etc.) have generally been omitted in this analysis since they refer to government documents, interviews, etc., which this author does not have access to.
-
(2004)
9/11 Commission Report
, pp. 156
-
-
-
32
-
-
27944497220
-
-
(21 August) (accessed 26 November 2004)
-
Thomas R. Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice L. Kephart and Kelly Moore, 9/77 and Terrorist Travel; Staff Report of the National Commission on Terrorist Attacks Upon the United States (21 August 2004), 47, available at http://www.9-11commission.gov/staff-statements/911_TerrTrav. Monograph.pdf (accessed 26 November 2004).
-
(2004)
9/77 and Terrorist Travel; Staff Report of the National Commission on Terrorist Attacks Upon the United States
, pp. 47
-
-
Eldridge, T.R.1
Ginsburg, S.2
Hempel II, W.T.3
Kephart, J.L.4
Moore, K.5
-
35
-
-
33745832924
-
-
Eldridge et al., 56
-
Eldridge et al., 56.
-
-
-
-
36
-
-
33745843900
-
-
Ibid
-
Ibid.
-
-
-
-
37
-
-
33745846658
-
-
Ibid., 55
-
Ibid., 55.
-
-
-
-
38
-
-
33745816581
-
-
Ibid., 58-59
-
Ibid., 58-59.
-
-
-
-
39
-
-
33745815887
-
-
National Commission, 178
-
National Commission, 178.
-
-
-
-
40
-
-
33745838840
-
-
Ibid
-
Ibid.
-
-
-
-
42
-
-
33745825779
-
-
Eldridge et al., 61
-
Eldridge et al., 61.
-
-
-
-
43
-
-
33745829659
-
-
Ibid., 60
-
Ibid., 60.
-
-
-
-
44
-
-
33745832554
-
-
Ibid
-
Ibid.
-
-
-
-
45
-
-
33745836017
-
-
Gunaratna, 75
-
Gunaratna, 75.
-
-
-
-
47
-
-
33745849595
-
-
National Commission, 169
-
National Commission, 169.
-
-
-
-
48
-
-
33745841776
-
-
Eldridge et al., 60
-
Eldridge et al., 60. Interestingly, legitimate Saudi passports can also contain a hidden indicator that the holder may belong to a terrorist organization. Three of the operatives involved in the 1993 WTC bombing traveled on Saudi passports with such an indicator, and three of the 9/11 hijackers had it as well.
-
-
-
-
49
-
-
33745830015
-
-
Eldridge et al., 46
-
See Eldridge et al., 46. Apparently AI Qaeda did not know the indicator existed or it surely would have attempted to remove or change it.
-
-
-
-
50
-
-
33745843899
-
-
National Commission, 158
-
National Commission, 158.
-
-
-
-
51
-
-
33745841043
-
-
Ibid
-
Ibid.
-
-
-
-
52
-
-
33745865781
-
-
Ibid., 240
-
Ibid., 240.
-
-
-
-
54
-
-
33745817687
-
-
Eldridge et al., 8
-
Eldridge et al., 8. Since the 9/11 attacks, customs have taken steps to address visa fraud, but with the enormous number of foreigners entering the United States and its allies yearly, current and future Al Qaeda operatives will probably exploit this deception tactic for some time to come.
-
-
-
-
55
-
-
33745831808
-
-
Ibid., 46-47
-
Ibid., 46-47.
-
-
-
-
57
-
-
33745873983
-
-
Eldridge et al., 49
-
Eldridge et al., 49. Evidence from Hizballah operatives using the same techniques indicates that some American women actually use would-be permanent residents in order to earn a living. In the late 1990s, an American woman - Angela Tsioumas - married Mohamad Youssef Hammoud specifically for the purpose of helping him gain citizenship, and for a price. She noted that as soon as Hammoud no longer needed her, she would marry another would-be immigrant.
-
-
-
-
58
-
-
33745872796
-
The Hezbollah in America: An alarming network
-
28 August (accessed 16 September 2004.)
-
[Daniel Pipes, "The Hezbollah in America: An Alarming Network," National Review, 28 August 2004, available at http://www.findarticles.com/p/ articles/mi_ml282/ is_16-52/ai64341399/print (accessed 16 September 2004.)] There has been no evidence that Al Qaeda used these "marriage facilitators," but the fact they exist and can assist terrorist operatives is nevertheless troubling.
-
(2004)
National Review
-
-
Pipes, D.1
-
59
-
-
33745866858
-
-
Eldridge et al., 47
-
Eldridge et al., 47.
-
-
-
-
60
-
-
33745814255
-
-
note
-
This is apparently an area where, since 9/11, airports have become more vigilant, at least in America. It is doubtful that a terrorist today would receive less scrutiny simply because he or she traveled in first class than if he or she were to travel further back in the plane. Many foreign airports, however, have not implemented these measures, and Al Qaeda operatives could conceivably still use them to their advantage when traveling overseas.
-
-
-
-
62
-
-
33745858539
-
-
Roth, Greenburg and Wille, 17
-
Roth, Greenburg and Wille, 17.
-
-
-
-
63
-
-
33745867851
-
-
Ibid., 25
-
Ibid., 25.
-
-
-
-
64
-
-
33745812667
-
-
National Commission, 171
-
National Commission, 171.
-
-
-
-
65
-
-
33745860613
-
-
Gunaratna, xli
-
Gunaratna, xli;
-
-
-
-
66
-
-
33745855009
-
-
Roth, Greenburg and Wille, 25-26
-
and Roth, Greenburg and Wille, 25-26.
-
-
-
-
67
-
-
33745873767
-
-
as noted in Gunaratna (note 9)
-
AI Qaeda Manual as noted in Gunaratna (note 9), 84 (possibly a different translation than referred to otherwise herein);
-
AI Qaeda Manual
, pp. 84
-
-
-
68
-
-
7644226084
-
Strangling the hydra: Targeting Al Qaeda's finances
-
James F. Hoge, Jr. and Gideon Rose, eds., (New York: Public Affairs), noted in Gunaratna (note 10), 84
-
and William F. Wechsler, "Strangling the Hydra: Targeting Al Qaeda's Finances," in James F. Hoge, Jr. and Gideon Rose, eds., How Did This Happen? Terrorism and the New War (New York: Public Affairs, 2001), 137, noted in Gunaratna (note 10), 84.
-
(2001)
How Did This Happen? Terrorism and the New War
, pp. 137
-
-
Wechsler, W.F.1
-
69
-
-
33745873982
-
-
Roth, Greenburg and Wille, 22
-
Roth, Greenburg and Wille, 22.
-
-
-
-
71
-
-
33745810081
-
-
(n.d.), (accessed 26 November 2004)
-
9/11 Commission Staff, "Overview of the Enemy: Staff Statement No. 15," (n.d.), 10, available at http://www.9-11commission.gov/ staff_statements/staff.statement_15.pdf (accessed 26 November 2004);
-
Overview of the Enemy: Staff Statement No. 15
, vol.15
, pp. 10
-
-
-
72
-
-
33745865403
-
-
Roth, Greenburg and Wille, 20-22
-
and Roth, Greenburg and Wille, 20-22.
-
-
-
-
73
-
-
33745857555
-
Dirty money
-
(Paris: March) ProQuest database (accessed 20 September 2004)
-
Organization for Economic Cooperation and Development, "Dirty Money," The OECD Observer 242 (Paris: March 2004), 40, available through ProQuest database (accessed 20 September 2004);
-
(2004)
The OECD Observer
, vol.242
, pp. 40
-
-
-
75
-
-
33745824099
-
-
Gunaratna, 42, 83-84, 87
-
and Gunaratna, 42, 83-84, 87.
-
-
-
-
76
-
-
33745830733
-
-
OECD, 40
-
OECD, 40.
-
-
-
-
77
-
-
33745848326
-
-
Gunaratna, 82-83
-
Gunaratna, 82-83.
-
-
-
-
78
-
-
33745824844
-
-
Ibid., 42
-
Ibid., 42.
-
-
-
-
79
-
-
33745873400
-
-
Roth, Greenburg and Wille, 140
-
Roth, Greenburg and Wille, 140.
-
-
-
-
80
-
-
33745869305
-
-
Gunaratna, 84
-
Gunaratna, 84.
-
-
-
-
81
-
-
33745868214
-
-
Roth, Greenburg and Wille, 134-137
-
Roth, Greenburg and Wille, 134-137.
-
-
-
-
83
-
-
33745830369
-
-
National Commission, 169
-
National Commission, 169.
-
-
-
-
84
-
-
33745842805
-
-
Gunaratna, 143
-
Gunaratna, 143.
-
-
-
-
85
-
-
33745862238
-
-
Roth, Greenburg and Wille, 135
-
Roth, Greenburg and Wille, 135;
-
-
-
-
86
-
-
33745829658
-
-
National Commission, 224
-
and National Commission, 224.
-
-
-
-
87
-
-
33745853362
-
-
Roth, Greenburg and Wille, 135
-
Roth, Greenburg and Wille, 135.
-
-
-
-
88
-
-
33745868945
-
-
Ibid., 131
-
Ibid., 131.
-
-
-
-
89
-
-
33745830713
-
-
CNN.com, 10 September (accessed 19 October 2004)
-
CNN, "CNN Breaking News," CNN.com, 10 September 2003, available at http://cnnstudentnews.cnn.com/TRANSCRIPTS/0309/10/bn.07.html (accessed 19 October 2004).
-
(2003)
CNN Breaking News
-
-
-
92
-
-
85048941387
-
AI Qaeda and the internet: The danger of 'cyberplanning,'
-
(Spring) (accessed 4 November 2004)
-
Timothy L. Thomas, "AI Qaeda and the Internet: The Danger of 'Cyberplanning,'" Parameters (Spring 2003): 118, available at http://carlisle-www.army.mil/usawc/ Parameters/03spring/thomas.htm (accessed 4 November 2004);
-
(2003)
Parameters
, pp. 118
-
-
Thomas, T.L.1
-
93
-
-
33745819832
-
-
National Commission, 226
-
and National Commission, 226.
-
-
-
-
94
-
-
33745832553
-
U.S. alarmed by use of AI Qaeda bomb term
-
12 February (accessed 30 October 2004)
-
"U.S. Alarmed by Use of AI Qaeda Bomb Term," Reuters, 12 February 2003, available at http://www.intelmessages.org/Messages/National. Security/wwwboard/messages.02/ 3824.html (accessed 30 October 2004).
-
(2003)
Reuters
-
-
-
95
-
-
33745872087
-
Virtual Soldiers in a Holy War
-
17 September (not accessed), quoted in Thomas (note 25)
-
Yossi Melman, "Virtual Soldiers in a Holy War," Ha'aretz, 17 September 2002, available at http://www.haaretz.com (not accessed), quoted in Thomas (note 25), 19.
-
(2002)
Ha'aretz
, pp. 19
-
-
Melman, Y.1
-
96
-
-
33745863754
-
-
Melman and National Commission, 248-249
-
Reports differ on whether he used these terms or faculties of "architecture" and "politics" instead of "urban planning" and "engineering." See Melman and National Commission, 248-249.
-
-
-
-
97
-
-
0039430385
-
Terror groups hide behind web encryption
-
5 February (accessed 19 October 2004)
-
Jack Kelley, "Terror Groups Hide Behind Web Encryption," USA Today, 5 February 2001, available at http://www.usatoday.com/tech/news/2001-02- 05-binladen.htm (accessed 19 October 2004).
-
(2001)
USA Today
-
-
Kelley, J.1
-
98
-
-
0039430385
-
Terror groups hide behind web encryption
-
Jack Kelley, "Terror Groups Hide Behind Web Encryption," USA Today, 2001, available at http://www.usatoday.com/tech/news/2001-02-05-binladen. htm, Ibid.
-
(2001)
USA Today
-
-
Kelley, J.1
-
99
-
-
33745854692
-
-
Gunaratna, 141
-
Gunaratna, 141;
-
-
-
-
100
-
-
33745820213
-
-
Kelley
-
and Kelley.
-
-
-
-
101
-
-
33745850344
-
-
Gunaratna, 238
-
Gunaratna, 238;
-
-
-
-
102
-
-
33745823367
-
-
Kelley
-
and Kelley. Interestingly, it seems that the encryption technology Al Qaeda was able to procure and use before 9/11, while still difficult to decrypt, was actually somewhat weak on encryption standards, namely because of export restrictions which were in place at the time the programs were purchased.
-
-
-
-
103
-
-
33745832922
-
Weakened encryption lays bare Al Qaeda files
-
17 January (accessed 30 October 2004)
-
See "Weakened Encryption Lays Bare Al Qaeda Files," New Scientist, 17 January 2002, available at http://www.newscientist.com/news/print. jsp?id = ns99991804 (accessed 30 October 2004).
-
(2002)
New Scientist
-
-
-
104
-
-
33745852478
-
Tools of terror: The art and science of steganography
-
19 January (accessed 19 October 2004)
-
Yashwant Deva, "Tools of Terror: The Art and Science of Steganography," Institute of Peace & Conflict Studies, 19 January 2002, available at http://www.ipcs.org/print Article.jsp?kValue = 680 (accessed 19 October 2004).
-
(2002)
Institute of Peace & Conflict Studies
-
-
Deva, Y.1
-
105
-
-
33745860611
-
Terrorists and steganography
-
30 September (accessed 27 November 2004)
-
Bruce Schneier, "Terrorists and Steganography," Crypto-Gram Newsletter, 30 September 2001, available at http://www.schneier.com/crypto-gram- 0109a.html (accessed 27 November 2004).
-
(2001)
Crypto-gram Newsletter
-
-
Schneier, B.1
-
106
-
-
3843069353
-
Use and abuse of the internet in fraud and money laundering
-
Nigel Morris-Cotterill, "Use and Abuse of the Internet in Fraud and Money Laundering," International Review of Law, Computers and Technology 13, no. 2 (1999): 217 (paraphrasing what he heard at the 1997 Symposium on Economic Crime in Cambridge, England, although he admits that he cannot remember the original source).
-
(1999)
International Review of Law, Computers and Technology
, vol.13
, Issue.2
, pp. 217
-
-
Morris-Cotterill, N.1
-
107
-
-
33745850663
-
Bin Laden's cybertrail proves elusive
-
20 September (accessed 19 October 2004)
-
However, considering the use of dissimulation discussed above, and the fact that some of the 9/11 hijackers indulged in pornography, this is still a possibility. "Bin Laden's Cybertrail Proves Elusive," USA Today, 20 September 2001, available at http://www.usatoday.com/tech/news/2001/09/20/ attacks-cybertrail.htrn (accessed 19 October 2004);
-
(2001)
USA Today
-
-
-
108
-
-
33745807479
-
-
Kelley
-
and Kelley.
-
-
-
-
109
-
-
33745820570
-
How Al Qaeda uses the internet
-
19 March (accessed 30 October 2004)
-
"How Al Qaeda Uses the Internet," ABC News Online, 19 March 2004, available at http://www.abc.net.au/news/newsitems/s1069629.htm (accessed 30 October 2004).
-
(2004)
ABC News Online
-
-
-
110
-
-
33745830368
-
Online and even near home, a new front is opening in the global terror battle
-
23 September
-
Eric Lipton and Eric Lichtblau, "Online and Even Near Home, a New Front is Opening in the Global Terror Battle," New York Times, 23 September 2004, A6.
-
(2004)
New York Times
-
-
Lipton, E.1
Lichtblau, E.2
-
112
-
-
33745868944
-
-
Thomas, 117
-
Thomas, 117.
-
-
-
-
113
-
-
33745869304
-
Al Qaeda takes fight for 'hearts and minds' to the web
-
(August) report in CNO/IO Newsletter, 5-11 August 2002, noted in Thomas (note 9)
-
Paul Eedle, "Al Qaeda Takes Fight for 'Hearts and Minds' to the Web," Jane's Intelligence Review (August 2002), report in CNO/IO Newsletter, 5-11 August 2002, noted in Thomas p. 115 (note 9).
-
(2002)
Jane's Intelligence Review
, pp. 115
-
-
Eedle, P.1
-
114
-
-
79960309019
-
How Al Qaeda put internet to use
-
11 November (could not access), accessible through http://www.crime- research.org/news/2002/11/Mess1203.htm (accessed 30 October 2004)
-
Andrew Higgins, 'How Al Qaeda Put Internet to Use,' Wall Street Journal (11 November 2002), available at http://msnbc.msn.com/news/833533.asp?cpl = 1 (could not access), accessible through http://www.crime-research.org/news/2002/ 11/Mess1203.htm (accessed 30 October 2004).
-
(2002)
Wall Street Journal
-
-
Higgins, A.1
-
117
-
-
33745812270
-
-
Thomas, 112
-
Thomas, 112.
-
-
-
-
118
-
-
33745852086
-
Terrorist is driven by hatred for U.S., Israel
-
21 August, 1, noted in National Commission, (note 105)
-
Higgins and Martin Sieff, "Terrorist Is Driven by Hatred for U.S., Israel," Washington Times, 21 August 1998, 1, noted in National Commission, 127 (note 105).
-
(1998)
Washington Times
, pp. 127
-
-
Higgins1
Sieff, M.2
-
119
-
-
33745830732
-
-
Gunaratna, 16
-
Gunaratna, 16.
-
-
-
-
121
-
-
33745843187
-
How Al Qaeda got back on the attack
-
28 October
-
Michael Elliott, "How Al Qaeda Got Back on the Attack," Time 160, no. 18 (28 October 2002): 26.
-
(2002)
Time
, vol.160
, Issue.18
, pp. 26
-
-
Elliott, M.1
-
122
-
-
33745840729
-
-
National Commission, 243-244
-
National Commission, 243-244.
-
-
-
-
123
-
-
33745836588
-
Al Qaeda's new hideouts
-
29 July (accessed 27 November 2004)
-
Tom McGirk/Kohat, "Al Qaeda's New Hideouts," Time (Asia) 160, no. 3 (29 July 2002), available at http://www.time.com/asia/magazine/printout/0, 13675,501020729-322672,00.html (accessed 27 November 2004).
-
(2002)
Time (Asia)
, vol.160
, Issue.3
-
-
Tom, M.-K.1
-
124
-
-
33745865054
-
-
Gunaratna, 96
-
Gunaratna, 96.
-
-
-
-
126
-
-
33745849995
-
-
Gunaratna, 138
-
Gunaratna, 138;
-
-
-
-
127
-
-
33745864216
-
-
Shultz and Beitler, 69
-
Shultz and Beitler, 69;
-
-
-
-
128
-
-
33745827623
-
-
National Commission, 235-236
-
and National Commission, 235-236.
-
-
-
-
129
-
-
33745840728
-
-
National Commission, 247, 249
-
National Commission, 247, 249.
-
-
-
-
130
-
-
33745814115
-
-
Bell, 150
-
Bell, 150.
-
-
-
-
131
-
-
84911204339
-
-
Cover techniques are interspersed throughout the manual. Some of clearest examples are at Al Qaeda Manual, 53-55.
-
Al Qaeda Manual
, pp. 53-55
-
-
-
132
-
-
33745860280
-
-
Gunaratna, 79
-
Gunaratna, 79.
-
-
-
-
133
-
-
33745850662
-
Background of accomplice detailed
-
Lahore, 3 April, 3, noted in Gunaratna, xxvii (notes 36 and 39)
-
"Background of Accomplice Detailed," Friday Times, Lahore, 3 April 1995, 3, noted in Gunaratna, xxvii (notes 36 and 39).
-
(1995)
Friday Times
-
-
-
134
-
-
33745841774
-
-
Gunaratna, 78
-
Gunaratna, 78. Again, Al Qaeda is beginning to find some sanctuary in failed states (see note 8 above).
-
-
-
-
135
-
-
33745842448
-
-
Bell, 160
-
Bell, 160.
-
-
-
-
136
-
-
33745873399
-
-
Gunaratna, 114
-
Gunaratna, 114.
-
-
-
-
137
-
-
33745814114
-
-
members. Tripod.com/~Suhayb (not accessed), as quoted in Gunaratna, (note 80)
-
Ibn Taymiyyah, The Religious and Moral Doctrine of Jihad, available at members. Tripod.com/~Suhayb (not accessed), as quoted in Gunaratna, 113-114 (note 80).
-
The Religious and Moral Doctrine of Jihad
, pp. 113-114
-
-
Taymiyyah, I.1
-
138
-
-
33745830731
-
-
Gunaratna, 115
-
Gunaratna, 115.
-
-
-
-
141
-
-
33745834218
-
-
Gunaratna, 115
-
Gunaratna, 115.
-
-
-
-
142
-
-
33745848325
-
-
Bell, 149
-
Bell, 149.
-
-
-
-
143
-
-
33745846274
-
-
Ibid
-
Ibid.
-
-
-
-
144
-
-
33745811144
-
-
note
-
I thank class discussion in Shultz's seminar for this and many of the insights present in these conclusions (see note 22 above).
-
-
-
|