Al Qaeda cells security structure:
Al Qaeda security structure:
Paradigm Intel and our BSU's accumulated
this data.
Our Hypothesis:
The printer bomber operation,
involves 3 cells.
The C2 cell made this call without
notifying al Quada central. They
are under a standing order to
bomb the West.
They have reverted to "Russian Rules".
Hard copy only and hand delivery.
Bomb Cell:
In setting up the operation they
made bomb requests from their
armourer. Size, and explosive
capability, fuse types and back
ups. Dogs can't smell PETN,
its stable, and safe to transport.
Very hard to detect.
Print Toner Bomber, Ibrahim HassanDelivery Cell:
This cell is internet savvy,
they handled the interjection
of the bombs into a Money
Mule operation. So the bombs
can only be traced back to
the stooges.
Russian FBS & RBN help on printer bombersuicidal for the RBN to knowingly
provide services to the terrorist,
it appears the Insurgents have
worked their way into some
of their services, either out
right hire, malware rental or subverting
on going Money Mule operation.
We have 3 individuals under surveillance,
we think are in this cell,
we think are in this cell,
but no definitive proof yet, just a strong
suspicion. One has athletes foot, bad.
Two in Egypt one in USA. All speak
Arabic. They change phones often.
BSU's tracking.
Transportation cell:
They picked up the Bombs
from a neutral location
And sent them on to the
Money Mules. They may not
have even known they were
bombs.
Under this SecOps any
cell that is penetrated can't
lead authorities to the other cells.
More as security allows.
Gerald
Internet Anthropologist
.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home