Professional Documents
Culture Documents
DELETED PAGE(S)
NO DUPLICATIONFEE
FOR THIS PAGE.
Page(s) I-2
IAGPA-CSF Form 6-R
1 Sep 93
UNCLASSTFIED
NGIC-2003-00174-HT
Encyclopedia of Jihad, Security and Intelligence Volume, (pp. 1049-1059)t
SECRET WRITING:
writing by use of secret ink or ciphers2. kr this study we will explain the meaning of
enciphering, and some other terms that are connected to the topic.
Ciphers is the operation of replacing letters or numbers in such a way that they are
replaced with other lettels that are not the originals, with the intention of concealing,
camouflaging, and hiding the real mer.:ring. This is agreed upon by all of the sides that
are concemed with this enciphering, and especially betwee,n the branches of
headquarters.
Al-Code (the Code) or The Secret Messaee: - This is a group of letters or words that
represent otler words or topics. For example, I say, "I am starting a business," The
meaning of this phrase is, with rcspect to the other patties, "I am declaring JITIAD; and I
am starting it."
Wtitine with Ciohers: The art of se,nding messages in a method that conceals its true
The procedure of writing by means of ciphers, symbols, and riddles and delivery is
I
The document appearc to be an imprecise trauslafion fronr a second language into Arabic. Underscorirrg
and arrolvs have been added to this document to facilitate its reading.
t
The Arabic nornshfrah [:IFR? in SATTS] is equally translated into the terms "ciphers" or "enciphering"
based on its use in the original document.
3
Thc verbal noun tasffrft:FlR] could bE translated "encrypting" or "encoding" but is gencrally ransiated
"enciphering" for the sake ofconsistency.
UNICLASSIFTEI)
o
J
UNCLASSIFIED
NGIC-2003-00174-HT
4 - a common system on the basis of which it operates and the security rules adhered to
by our security sources.
These elements are strongly linked together. But if one element fails in its task theu tire
entire operation (of secret communications) tails. On one hand, the information spills out.
On the other, the information is cut offfrom the other party. For a fwther explanation see
Figtne l, which shows the elements' association with respect to each other.
so the one who comes across it does not understand it. Secret writing, also named the
Ciphers and Codes: In the system of ciphers the messages change according to fixed
formulas that make solving thern difficult, except for those who know the formulas.
The systern of codes uses a series of codes and words that represent the words of
the text in such a way that understanding the message becomes impossible without being
acquainted with the codebook and its table. Now, how do we learn the steps of
enciphering a message, and what are the steps? The answer: There are important rules
1- There is a thing in the enciphered message called the solution key: - This is a
number of factors in order to increase the complexity: (1) a solution key and
4
Tlre past particrple mush{far [M:FR] can also be tanslated as "encrypted" or "encoded." See footuote 3.
Ui\CLASSIFIED
4
T]NCLASSIFIED
NGrC-2003-00r7+I{r
@1 the text, the most direc! clear fomr of the message. The mcaning of this is
Now we take in detail what is memt by the cipher key in a clear way.
The Cipher Kev; It is the path that the reseiver of the code follows in order to arrive at
the breaking down the message's code and oipher. Occasionally the key has an unspecific
goal. It is a communication to the receiver that we are the ones who sent the message and
no one else but us; because it is possible for an organizatiotr to penehate into the systems
and begin inlerference operations with messages-its goal is to fragment the system.
Definitely here, inside of the secret communication is a specific key or, we can call it if
wished, the secret word.
Comments:
Diplomats and sailors prefer using encodeds symbols because they are stationed at
one place.
As for intelligeirce people and the army, they prefer using cipher becawe they are
constantly moving and do not have the time to work throug! lvrittng special books of
synrbols.
Twes of Ciphors:
s
tbtct.
t Th" acfiral word found herc ahdathiaris
[AIIDACIAT] is comrnonly translated "coordinates"; but in this
contcxt the term chart or table is more accurate.
UNCLASSIFIED
F
c
TII\CLASSIFIED
NGIC-2003-00174-Ht
2- The Cipher of Books, Newspapers, andMagazines include a number of methods. Among
them is assembling the ietters found in a magazine according to apreviously agreed upon
method.
3- The Cipher of Symbols andTerms: And this also we clarifu in its place.
To use cipher in aprosperous and successful way one must fulfill and accomplish the
following:
2- The requirement of defining beforehand the identity of the sender and the
receiver.
3- The requireme.nt of appointing the time and date beforehand for the
4- Begin the message by defining the sender's identity and the identity of the one to
whom it is sent.
6- The necessity that there be an agreeme,nt beforehand between the sender and the
8- Conceal any trace of the key and the message after its solution and
' Ibtd.
TNCLASSIFIED
6
UI{CLASSIFIED
NGrC-2003-00174-HT
Also to understand that there are two systems in enciphering, or tlat it includes two
As for the method of the System of Transposing now we clarifu it as follows: First of all
there is a difference between transposing of the letter from one place to another and
substituting one letter for another. I mean that the esse,ntial nature of the method of
transposing is changing the locations of the letters, and its conventional definition is as
follows:
It is: - Shifting the ciphers. This operation includes reorganizing the leters or changing
their sequence in the open message without making changes to the essence of the letter
itself. This example is provided to you for clarification, for example: "l want to write
In this example we ire using the method of geometric forms to distribute the letters. If
you noticed the sentEnce, it is composed of three words. The first word is composed of
three letters, the second word likewise, and the third is composed of four letters. Now
UNCLASSIFMD
7
T]NCLASSIFIED
NGIC-2003-00174-IrT
3 - Now we rotate the letters one rotation to the right [forus to the left]. Therefore it
becomes as follows
WSD
,t /t it\
/
*_J
/\
A B
*J
A N
*J
:HI
/\
4 - Now we take from the figures the higlest horizontal level (--
> Or we write all of the Ietters fouad on this level. It is as follows: (W S D).
5 - To increase the complcxity of the message we insert some nurnbErs and take down the
number of letters in each word as follows: the first word 3 letters; and the second 3 letters; and
the third 4 laten. We add with each number the number ( 6 ). tt is as follows:
33
+6 +6 +6
9 9 9 [sic]
form of the message, we must nention that the receiver knows this metlod also.
1 - The first step the receiver does is to take the numbers and subtract the solution k"y ( 6I
UNCLASSIFIED
TJNCLASSIF'IED
NGIC-2003-00174-HT
basis of this result he draws the nunber of figures. The receiver is able to know the
number of words from the number of letters found in the parenthesis (W S D).
We selectthe number of points of tre triangle on the basis of the number of letters inside
of the first word. For example it means the word (ABW) ["Abu" or "fa*rer"]8 has 3
letters. Therefore, we select a triangle having 3 points, and so on.) The beginner
3 - The remaining letters are dishibuted according to the empty spaces in sequence from the
WSD
{\ 4\ d\
/lt\ /\
/l /\
l.)
atsg A< N :'H I
4 - Now he rotates to the opposite of flre se.nders' rotation of the letters. lt means that he
moves the letters in the left directionr0. So the letters go back like so:
4$':
tIl
tll
1t,
1,,
ttt
#)w N4)s s'Po
t The parenthesis should end here, but the author misplaces it firrther in the sent€nce at the end ofthe words
"and so on."
e
This is for the Arabic version; in our case from left to right.
)0
-IDd.d. see diagrarn immediatelr above item 4
UNCLASSTFIEI)
TINCLASSIFIED
NGIC-2003-00 114-HT
5 - Now he writes the letters of the entire figure together. It is as follows ABW
Another example regarding the method oftransposing, on the basis of the system of geometric
forms:
t- We count the number of letters in each word. The tirst word has 5 letters and the second
2 - We select a pentagonal form for the first word and tetagonal form .or the second word.
BW A
3 - We shift the first cycle to the rightl2 and write the highest horizontal tevel firsl along
with adding the number 5 to the number of letters in each word like so:
N+- tB A
.r i r k
A H
{ BTNBA)ASHFwR 10 9t
,-' \ .ru
-ls w
ll This refers to the diacritical mark that changes the sound at tlre end ofa word to 'AN' when converting it
into its advcbial form.l
12
[n our case to the left, see diagram below item 3.
T]I\CLASSIFIEI)
L0
UNCLASSIFIED
NGIC-2003-00174-trr
Asweagreedthereceiversubtractsthenumbers ( 10 - 5l:5 and( 9 - 5 l:4. ttris
meaus flrat flre first rvord has 5 leters and the second has 4 letters. Therefore. he draws
the geomefiic figures according to the number of letters [see the figrne below]. After this,
he dishibutes the letters, beginning with the letters of the highest level and then the
remaining letters, incrementally from right to leftr3, The last step is the oppositer4 of the
A
s.
Aa" F
^lrr
,r,
.)'n
is
The Cioher's Concealment: One of the many methods is the concealment of ciphers by
SIAETIKM DWN MJIE ALMDD ['Don'tbe hasty, but proceed carefully. The victory
If the agreement is made between the two sides to depend on the last word of the
" Ibid.
'o Or "to reverse.- This portion of the description remains
unclear after consulting the final figure that was
been provided. The figure appears to be identical, with respect to the relative locations of [etters, to the
figure immediately preceding it on the previous page.
TNCLASSIFIEI)
1t
TINCLASSTFIED
NGIC-2003-00174-HT
Example 2: (ATTNI ALQ:"IR T)GIB?A HMI MwEtM? ["shivering came ro me,
by a painful fever."])
_.accompanied
If we take the first letters in the words the unknown word is (A.LTHM
[ffanslation:
"sh'ggle"]). This cipher is appropriate for dissemination by telephone.
2- Each torvn has its own cipher, and if possible each group.
3- As a rule expressions of optimism are used with the ciphers, like "Journey on! Allah is
it (R BI J [inArabic]), etc.?
Replace each letter with another letter or designated character or designated nunber
according to the previous agreement between the two parties concerned with the contacl
It Grammar
term for the diacritical mark that rnakes a noun indefinite or denotes an adverbial fuirction.
16
PhonenricaUy equivalent to a letter, br.rt orthograplrically dependent upon other letter forms.
" A modified Arabic lefter '?' placed at the end of a word to indicate feminine gender functionally
e-quivalent to both "ah- and'at''in diffetent contexts-
r"
Reference to pronunciation as "a!" or "a" plus the assimilation of the following letter.
{-II{CLASSTFIED l0
L2
T]NCLASSIFIED
NG[C-2003-00174-HT
The method of zubstitution has degrees of complexity. We will begin with the simplest of
the methods. It is the Method of Coorrdinates (the Table Method). The following example
is among the simplest table forms. It is a very easy method and the first step in it is
1- We draw the horizontal cells (sguares) with the value that you need and arrange
2- We draw the vertical cells (squares) in the amount desired and anz.rge the enfries
4- Now between the horizontal level for the nurnbers and the vertical level for the
numbers we place the ( 28 ) letters. We place any synbols ttrat we want but with
the condition that the sender and the receiver have the same copy of the table.
1 2 3 4 5 6 7 8
1 K N A R LA
2 S T B It
H o
?
3 X C J W tO. Markl
4 U V I L
?
5 C G M fl,etterl R w
BSR'?
6 L lquicktyl
ASLI{? :?ID UWARIE
7 lweaponl lrnarWrl lcrisesl
UNCLASSTFIED 11
13
UNCLASSIFIED
NGIC-2003-00174-HT
1- lf I took any letter from the table, or any sigrr or symbol, then two numbers that I took
iudicate the one we took. The first number is horizoutal. The second number is
vertical. For exa:nple if we took the letter (A) we find the number ( 3 ) above ttre
letter (A); and on the horizontal level to the rightre of the letter (A) is the number ( 1
). This means that the coordinate numbers of (A) are ( 1,3 ). That is, the number of
the place where the letter A is found is in the row ( I ) and column ( 3 ). fnus Ae
numbers found at the top of the table are, in other words, the numbers of the columns
and numbers formd to the right2o of the table are the row numbers.
2- The second comment is that each letter, symbol, or word that is blue in color [the source
document contains no colors] is indicated by two numbers ouly, and no other, one for tle
An example oftle use of the table: I assume that I want to write the foilowing: (BDAET
Look at the frst word and the fust Ietbr in it, (B). Therefore I search directly in the table
for the letter (B). If I found i! I search for the column number found at the letter. Also I
search for the row number formd at the letter. lt is recorded beginning with the row
number. lf you notice the coordinates of the letter "baa" [B] are ( 2,3 1. I mean by that
the second row and the third column, because the coordinates of letter "daal" [D] are (
6,4)" [sic], the coordinates of letter (A) are ( 1,3 ), and the coordinates of letter (T) are
UF{CLASSIFIEI) T2
L4
UNCLASSIFIED
NGIC-2003-00174-HT
(2,2).As for the second word, it is AL-IIARB ["the war"]. Thus the coordinates of
letter (A) are ( 103 ), the coordinates of letter (L) are (4,4 ), the coordinates of letter (J)
ue (2,5 ) [sic], the coordinates of letter (R) are ( 5,5 ; ana *t" coordinates of letter (B)
(2,3).
The next step is to bring together all of the numb ers {2,3 - 6,4 - I ,3 - 2,2 - 7 ,3
Now we do the step that increases the order in sequence. Remove tt,e commas and the
operation does not hinder the receiver's action because he knows tlat each joined pair of
The last operation that we paform to increase complexity is to add the solution number
(the solution key) to each one of these numbers. Let it be, for example, 3 is as follows:
2364132213442s523
+33 3333333333333333
s697 46ss4677s88856
Thus the final form for the cipher is (5 69146554677 58885 61.
All that remains is for the solver to refer to this cipher. This means the receiver retraces
the steps in reverse exactly, beginning by deducting the solution number and then
l3
UI\CLASSTF'IED
1s
UNCLASSIFIED
NGIC-2003-00 r 74-HT
successively separates each number. He searches for these numbers in the copy that he
A very important commert assume that you established the solution number as 8, and
you want to add it to each ofthe previous nurnbers. l,et us take for example the first
number. lt is ( 2 ); thus ( 8+2-70 ). When the result of the addition comes out with zero
[sic.] (meaning more than one cell) it is preferred that you write zero, which indicates that
the number is 1 10 ). Therefore when the solver of the message sees ( 0 ) he knows that
it is ( 10 ) and subtacts the solution number from t 10 I tsic.l. T:ris is so that the solver
does not make a mistake in the higher numbers or the result of the additional operation.
Now we take the opposite example: Presune that you are the solver of the message and
that it came to you in this form 4424324532 ). The solutiou uumber agreed upon at
this time is ( 1 ). Consequently the steps are simply, firs! we deduct ( 1 ) from each
number as follows:
4424324s32
-11 I 1t 11111
33.t3.2r.34.21
Second, we take each number one at a time and search for them in the table. For example
Therefore it is the letter (J). The number 1 1.3 I is the letter (A). The number ( 3.1 ) tsicl
is the letler (S). The number t3.4 I is the letter (W). The number ( 2.1) is the letter (S).
He joins the letters and the result is the word (JASWS ["spy"])
t4
TNCLASSTFIEI)
16
UNCLASSIFIEI)
NGIC-2003-00174-Frt
Another mcthod for using the table is (by the sptem of fransmitting - the alphabetical
The method is as follows: we make a regular table with cells but according to the nunber
of ietters of the words desired to be chosen. The operating principle of tltis table is to take
the first row of the table and fill the empty spaces found rvith the solution word (the key
word). The row that is directly undorneath it has the solution number. We have the lower
squares left over. Therefore we write our secret message directly in lhem frorn the riglrt to
tlre lef2. Each square takes one letter. To increase the clarity, fbllow the fbllowing steps:
1 We draw the table and create for example tle key word (XI-AH ALDIN [Sa]lah
al-Din or Saladin, a Medieval Muslim hero]. We write these lettets in the first row.
2- We give to each letter of the letters of the key word a number, with the condition that a
repeated letter is given the following number. Notice the repeated lettsr (A) in the
solutiou word, how the frst (A) hkes the number 1 I ; ana tfre second (A) takes the
3 We decide what we want to write. For example, we want to send tlre following message:
(ANTYR T"LIMATI\A IWM ALIlvf'? OMS? SBTBR ["wait for ou inshuctions Friday
5 September"]) Now we write the message from the right to left, square by square (see
the figure.)
l5
[NCLASSIFIED
T7
UNCLASSIF'IED
NGrC-2003-00 17 4-HT
X L A H A L D I N
5 6 I 3 2 7 4 9 8
tl
A N T Y R T L I
M A T N A I w M A
L J M ? o M S ?
S B T M B R
4 - Look over table wetl. You will observe that each number has a column below it rvith
letters in it. If I now took each number and the letters below it the form is as follows (take
1,23456
TTMT RA?B YN'M ..WM AMLS NAJB
789
TIOR IA? LMS
(TTMT _ RA?B _ ..wM NAJB _ TloR - - LMS). This is the frnal fonn
- YN'M - I,A?
With regard to the solver, he has the solution nunrber and solution word" which changes
at each agreed upon period. He nothing more to do than to rctum the original numbers to
the groups according to the sequence. He rearranges them in the table and reads the
l6
TINCLASSIFIED
1B
TIIICLASSIFIED
NGIC-2003-0017+HT
The method of enciphering letters with lefters [sic.]:
The method of enciphering the symbols with the letter [sic.], where the numbers are
dimensions of this table are 4 columns aud 7 rows. See the figure'
Notice that these are the letter coordinates. Now the empty space we fiIl with the ( 28 I
A B J D
A B .I D
A M L A R
B H Y o
J B S a
D F T Z
? J G B V
w c x U L
,)
N w I
t7
TNCLASSIFIEI)
19
UNCLASSIFIED
NGIC-2003-00174-HT
Now we take apractical example on the basis of the table. For example, we wanr to
I- We take the letter ( A ). We obselve the table and find that is the result of the
II- We take the letter ( H ). We observe the table and find that is the result of the
V- We take the letter ( Z ). W e observe the table and find that is the result of the
VffI - We take the letter ( R ). We observe the table and find that is the result of the
solver has a copy of this table. He comes to ( A J ) and takes their intersection. lt is the
Exa:nple 2 : we want to write the word ( URIQ ["rcute"]). (U:W I) (R=A D) (I= D)
(Q:JD).
Cipher as slow as a Mousez3: This means that alphabetical letters are distributed in the
shape of a rectangular form. This table is fixed. This table can begin with the agreed
r8
U]\[CLASSTFIED
2,0
T]NCLASSIFIEI)
NGIC-2003-00174-HT
Study the table very well before you read the steps of the operation (frgure 4). |f you
noticed the key word, it is ( M"AWI? ["a howling dog"]), located at the top of the table'
The remaiuing squares have the letters of the alphabetic being distributed just as you
M A w
I ? c s
U B R a
v N J
B T D
Y H G z
T F o x
[Note that B and T are entered twice, while K and L arc missing-]
The first method of the table is: using the horizontal rows. But how are the rows used?
I- Substinrte each real letter with the letter that follows it on the right fin our case
leftl.
An example from the table: this example is that we want to encipher the word (
(A:")(bG)(?:I)(B:U).
This is a singular [sic.] method.
19
[A[CLASSTPTND
21
T]NCLASSIFIEI)
NGIC-2003-00174-HT
*Gru Tha'e is the dual each pair of the
The final tbnn is ( ). [sic.] method that enciphers
letterstogether.Anexampleis(WA=A")because(A)isontheright2aofthe'waaw'
[W] and the 'eiin' f'l is to the right2s of the 'aliph' [A].
tI - Substitute the desired real letter requested with the cipher letter precisely underneath the
An important comment:
There are letters on the right [for us left] of the chart for which there is no letter on its
A - Substitgte the real letter with a letter along the diagonal line and in the diagonal
direction agreed upon together. So if, for example, we took the diagonal form [sic.] to the
lower left [in olr case the right] and we tookthe word ( JWAB f"answet''] ), the solution
line. The solution -- we took the same letter and can change the method according to tle
agreement. The benefit of this method is that you are able to encipher an entire message!
each word enciphered by a different method than the others, or that you are able to
2o
lhid.
'5 lbtd.
'o llrtd.
2A
UI{CLASSTFIED
22
UNCLASSIFIED
NGIC-2003-00 17 4-HT
2- (R:N)(Q:J)(M-I)"
tt This is the methoddescribed in paragraph I,imnrediatetybelowthe table on p.19. If one of the fwo B
enhies in the table is the missing L, then "r.:T" can be correct by this method. The writer Ieft out the last
letter of the first rvord in this example.
tE
This is the method described in paragraph tr above.
t'This is tbe method described in paragraph A above.
T|r[CLASSIFTED 2l
23