computer expert and was part of the team that did surveillance on the embassy in Nairobi. This is potentially a big win for us.”

“What are we looking for?” a detective asked.

“We’re looking for any notes, pictures, or documents, anything related to al-Qaeda, the embassy bombings, or the Libyan Islamic Fighting Group, which he’s also a member of, as well as being a member of al-Qaeda. We need to find in his possession evidence linking him to the bombings, or we won’t be able to hold him.”

Liby’s location was raided, and he was caught before he could escape. He was brought down to the police station for preliminary questioning, and in the meantime his property was searched and all potential evidence was brought into the office. In his interview with the British police he didn’t cooperate and denied involvement in terrorism.

As the detectives searched through Liby’s computer files and possessions, it soon became apparent that in this case, unlike raids on other operatives, there was no “smoking gun” evidence that would tie Liby to the attacks and allow us to hold him. He was one of the more intelligent al-Qaeda operatives and had closely observed how we’d arrested other operatives: beyond going into hiding, he had destroyed as much evidence as he could. His computer hard drive had been cleared, and no incriminating files were found.

“Sorry, we’re going to have to release him,” a Manchester police detective told us. “Under British law we can’t continue holding him just on suspicion. We need concrete evidence. And in his interview he denied everything.”

“But if you release him, you can be certain he’ll skip town before we have time to sort through all the evidence and find something—which I’m sure is there,” John said.

“Sorry, it’s British law.”

Liby was released and evaded the team that was sent to follow him. We didn’t know where he had disappeared to, but we were pretty certain he was on his way to Afghanistan. While he fled, our British partners gave us access to all evidence recovered from his residence. We searched through his computer files and other property, consoling ourselves with the thought that, though we had lost the man, we would find something of use against al-Qaeda.

Searching through one pile of files, documents, and books in Arabic, I saw what looked like a log or journal. I pulled it out from the pile and flicked through; it was full of photocopied handwritten pages. I turned to the first page, and on it was a note saying: “It is forbidden to take this out of the guesthouse.” I started reading and saw that it was full of “lessons” (as the book termed it) for terrorist operatives, covering everything from “necessary qualifications” to espionage techniques, to “torture methods.” It was written by an EIJ instructor based on his experiences in Egypt fighting the Mubarak regime.

Once I had skimmed a substantial portion of it, I told the team that it looked to be something of considerable interest.

“What is it?” asked Jack Cloonan, the senior agent on the team.

“It’s the training manual that operatives, I’m guessing al-Qaeda operatives, use. It lists everything from how they should conceal themselves to the importance of conducting special operations.”

“But does that actually lead us to any terrorists?” an officer asked.

“Not directly, but it will. This teaches us exactly how the terrorists are taught to think and prepare themselves for operations and interrogations. It offers insight into their mind-set, and behavior patterns we need to watch for. So it should help us catch them and, when we catch them, understand how to interrogate them successfully.”

“Can you give an example of what the book says?” John asked.

“Sure. For example, this chapter contains instructions on how covert operatives should act. They’re told not to reveal their real names, even to other members. They are told to remove anything that indicates they are Islamists. For example, beards, long shirts, copies of the Quran, or greetings such as ‘May God reward you’ are to be avoided.

“They’re also told to avoid visiting public spaces such as libraries and mosques. They should avoid attracting any attention to themselves. It even says here that they need to be careful where they park. And they’re warned not to speak to their wives about what they’re doing.

“Another chapter here,” I said, reading as I spoke, “is on the cell model they use, which is the cluster model—where cell members don’t know members of other cells.”

“Why is that?” John asked.

“It says so that if one part of the cell is caught, everyone else won’t be compromised. They don’t even know the communication methods that members of other cells use. And cell members are told not to recognize one another in public.”

“That’s amazing,” declared an FBI colleague.

“It is. Look at this section here on safe houses. The manual says that ground-floor facilities are preferred, as they offer more escape options. All safe houses must have contingency plans for speedy evacuation, as well as secure areas to hide documents. And anyone going into a safe house needs to have sufficient cover—so as to avoid attention. No two safe houses should be rented from the same office, or in the same area—they’re very careful.”

“What does the section on interrogations tell them to do if caught?” John asked.

“Hold on,” I said, and I went to that section and sped through its pages. “What’s interesting is that it warns operatives that they’ll be subjected to torture when caught. It tells them to hold off as much as they can, especially for the first forty-eight hours.”

“Why forty-eight hours?” another colleague asked.

“It says because that will give fellow cell members enough time to reorganize, rendering information less valuable.”

“And it tells them to expect to be tortured?”

“Yes, this manual is actually written warning them what would happen if the Egyptian or another Middle Eastern government arrests them. It says their sisters and mothers will be raped in front of them and they themselves will be sodomized by dogs.”

“And they have to bear it?”

“They’re told that their reward will come in heaven, but that they can pretend to cooperate in order to trick the interrogator.”

“Meaning what?” John asked.

“It says they should give information to the interrogator, so the interrogator thinks the terrorist is cooperating, but really the information he gives up isn’t valuable.”

Later translated into English, the Manchester Manual, as it came to be known, was used by CIA contractors to justify the use of so-called enhanced interrogation techniques (EITs) authorized by the administration of President George W. Bush. To anyone who understood the point of the manual, this is ironic, as the manual teaches terrorists to expect and endure far worse. It is no surprise that these harsh techniques failed to work.

“Ali, I want you to head to Pakistan. We’ve got a potentially very important source who has come in, and I want you to evaluate him,” John O’Neill told me a few weeks later. It was early in 2000.

“Sure, boss, what’s the backstory?”

“It’s an [1 word redacted] man who approached an agent from the [4 words redacted] in [1 word redacted] saying that he had been working with [3 words redacted] in [3 words redacted] and didn’t like them, so he wanted to work with the U.S. against them.”

“That’s pretty convenient for us,” I said.

“You’d think, but the [8 words redacted]—the source didn’t have anything on drug trafficking, so he was out of their area of interest. But when the source met with the agency, he was told that they weren’t interested and they sent him away.”

“Why?”

“Apparently they think he is full of it and lying, but our FBI guy there, Chris Reimann, called me to say he thinks this guy is the real deal. Go to [1 word redacted],” John continued, “and meet him and evaluate him. And if he’s credible, get information and arrange a permanent way of contacting him.”

“Yes, sir.”

“One more thing. Make sure you thank him and let him know we’re appreciative.”

Вы читаете The Black Banners
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату