Here are excerpts from documents seized from the compound in Pakistan where Osama bin Laden was killed.
His final wishes to his wife:
“If I get killed, and you want to return to your family, then that is O.K., but you have to raise my children properly, and to watch them, and be careful of bad company for them.”
“As for you, you are the apple of my eye, and the most precious thing that I have in this world. If you want to marry after me, I have no objection, but I really want for you to be my wife in paradise, and the woman, if she marries two men, is given a choice on Judgment Day to be with one of them.”
On how an Islamic state can be established only after the United States is defeated:
“We should stress on the importance of timing in establishing the Islamic state. We should be aware that planning for the establishment of the state begins with exhausting the main influential power that enforced the siege on the Hamas government, and that overthrew the Islamic Emirate in Afghanistan and Iraq despite the fact this power was depleted. We should keep in mind that this main power still has the capacity to lay siege on any Islamic state, and that such a siege might force the people to overthrow their duly elected governments.”
“We have to continue with exhausting and depleting them till they become so weak that they can’t overthrow any state that we establish. That will be the time to commence with forming the Islamic state.”
On the WikiLeaks disclosures:
“Please dedicate some brothers to translate the documents on Afghanistan and Pakistan that were leaked from the Pentagon because these documents contain the strategy of the enemy in the area. The U.S. secretary of defense stated that the leak of these documents will negatively affect the war. The website that published these documents revealed 92,000 documents and then another 15,000.”
On email and encryption:
“We should assume that the enemy can see these emails and only send through email information that can bring no harm if the enemy reads it. They should not trust it just because it is encrypted, because the enemy can easily monitor all email traffic to the al-Mujahidin area. Computer science is not our science and we are not the ones who invented it. I think that depending on encryption in sending secrets is a great risk. Encryption system works with ordinary people, but not against those who created email and the Internet. All sensitive communications should be done through carriers.”
No comments:
Post a Comment