The Patriot Files Forums  

Go Back   The Patriot Files Forums > International > Terrorism

Post New Thread  Reply
 
Thread Tools Display Modes
  #1  
Old 06-03-2005, 03:15 PM
Arrow's Avatar
Arrow Arrow is offline
Senior Member
 

Join Date: Apr 2002
Location: Indian Territory
Posts: 4,240
Distinctions
POM Contributor 
Default Al Qaeda Manual Lessons 5-8

UK/BM-28 TRANSLATION

FIFTH LESSON

MEANS OF COMMUNICATION AND TRANSPORTATION

UK/BM-29 TRANSLATIONIn the name of Allah, the merciful and compassionate

Means of Transportation

Introduction:

It is well known that in undercover operations, communication is the mainstay of the movement for rapid accomplishment. However, it is a double-edged sword: It can be to our advantage if we use it well and it can be a knife dug into our back if we do not consider and take the necessary security measures.

Communication Means:

The Military Organization in any Islamic group can, with its modest capabilities, use the following means:

1. The telephone,

2. Meeting in-person,

3. Messenger,

4. Letters,

5. Some modern devices, such as the facsimile and wireless [communication].

Communication may be within the county, state, or even the country, in which case it is called local communication. When it extends expanded between countries, it is then called international communication.

Secret Communication is Limited to the Following Types: Common, standby, alarm

1. Common Communication: It is a communication between two members of the Organization without being monitored by the security apparatus opposing the Organization. The common communication should be done under a certain cover and after inspecting the surveillance situation [by the enemy].

2. Standby Communication: This replaces common communication when one of the two parties is unable to communicate with the other for some reason.

3. Alarm Communication: This is used when the opposing security apparatus discovers an undercover activity or some undercover members. Based on this communication, the activity is stopped 'for a while, all matters related to the activity are abandoned, UK/BM-30 TRANSLATION

and the Organization's members are hidden from the security personnel.

Method of Communication Among Members of the Organization:

1. Communication about undercover activity should be done

using a good cover; it should also be quick, explicit, and pertinent. That is, just for talking only.2. Prior to contacting his members, the commander of the cell[2]should agree with each of them separately (the cell members should never meet all in one place and should not know one another) on a manner and means of communication with each other. Likewise, the chief of the Organization should [use a similar technique] with the branch commanders.

3. A higher-ranking commander determines the type and method of communication with lower-ranking leaders.

First Means: The Telephone:

Because of significant technological advances, security measures for monitoring the telephone and broadcasting equipment have increased. Monitoring may be done by installing a secondary line or wireless broadcasting device on a telephone that relays the calls to a remote location...That is why the Organization takes security measures among its members who use this means of communication (the telephone).

1. Communication should be carried out from public places. One should select telephones that are less suspicious to the security apparatus and are more difficult to monitor. It is preferable to use telephones in booths and on main streets.

[2.] Cell or cluster methods should be adopted by the Organization. It should be composed of many cells whose members do not know one another, so that if a cell member is caught the other cells wouldnot be affected, and work would proceed normally.UK/BM-31 TRANSLATION

2. Conversation should be coded or in general terms so as not to alert the person monitoring [the telephone].

3. Periodically examining the telephone wire and the receiver.

4. Telephone numbers should be memorized and not recorded. If the brother has to write them, he should do so using a code so they do not appear as telephone numbers (figures from a shopping list, etc.)

5. The telephone caller and person called should mention some words or sentences prior to bringing up the intended subject. The brother who is calling may misdial one of the digits and actually call someone else. The person ?called may claim that the call is for him, and the calling brother may start telling him work-related issues and reveal many things because of a minor error.

6. In telephone conversations about undercover work, the voice should be changed and distorted.

7. When feasible, it is preferable to change telephone lines to allow direct access to local and international calls. That and proper cover facilitate communications and provide security protection not available when the central telephone station in the presence of many employees is used.

8. When a telephone [line] is identified [by the security

apparatus], the command and all parties who were using it

should be notified as soon as possible in order to take

appropriate measures.

9. When the command is certain that a particular telephone [line] is being monitored, it can exploit it by providing information that misleads the enemy and benefits the work plan.UK/BM-32 TRANSLATION10. If the Organization manages to obtain jamming devices, it should use them immediately.

Second Means: Meeting in-person:

This is direct communication between the commander and a member of the Organization. During the meeting the following are accomplished:

1. Information exchange,

2. Giving orders and instructions,

3. Financing,

4. Member follow-up Stages of the In-Person Meeting:

A. Before the meeting,

B. The meeting [itself],

C. After the meeting

A. Before the Meeting: The following measures should be taken:

1. Designating the meeting location,

2. Finding a proper

cover for the meeting,

3. Specifying the meeting date and

time,

4. Defining special signals between those who meet.

1. Identifying the meeting location: If the meetinglocation is stationary, the following matters should be observed: i. The location should be far from police stations and security centers.

ii. Ease of transportation to the location.

iii. Selecting the location prior to the meeting and learning all its details.

iv. If the meeting location is an apartment, it should not be the first one, but one somewhere in the middle.

v. The availability of many roads leading to the meetinglocation. That would provide easy escape in case the location ware raided by security personnel.UK/BM-33 TRANSLATION

vi. The location should not be under suspicion (by the

security [apparatus])

vii. The apartment where the meeting takes place should beon the ground floor, to facilitate escape.

viii.The ability to detect any surveillance from that

location.

ix. When public transportation is used, one should alight

at some distance from the meeting location and

continue on foot. In the case of a private vehicle,

one should park it far away or in a secure place so as

to be able to maneuver it quickly at any time. If the meeting location is not stationary, the following

matters should be observed:

i. The meeting location should be at the

intersection of a large number of main and

side streets to facilitate entry, exit, and

escape.

ii. The meeting location (such as a coffee shop) should

not have members that might be dealing with the

security apparatus.

iii. The meeting should not be held in a crowded place

because that would allow the security personnel to

hide and monitor those who meet.

iv. It is imperative to agree on an alternative location

for the meeting in case meeting in the first is

unfeasible. That holds whether the meeting place is

stationary or not.

Those who meet in-person should do the following:

i. Verifying the security situation of the location

before the meeting.UK/BM-34 TRANSLATION

ii. Ensuring that there are no security personnel behind

them or at the meeting place.

iii. Not heading to the location directly.

iv. Clothing and appearance should be appropriate for the meeting location.

v. Verifying that private documents carried by the

brother have appropriate cover.

vi. Prior to the meeting, designing a security plan that specifies what the security personnel would be told in case the location were raided by them, and what [thebrothers] would resort to in dealing with the securitypersonnel (fleeing,driving back,...)

2. Finding a proper cover for the meeting:

[The cover]

i. should blend well with the nature of the location.

ii. In case they raid the place, the security personnel

should believe the cover.

iii. should not arouse the curiosity of those present.

iv. should match the person's appearance and his financial and educational background.

v. should have documents that support it.

vi. provide reasons for the two parties' meeting (for

example, one of the two parties should have proof that

he is an architect. The other should have documents

as proof that he is a land owner. The architect has

produced a construction plan for the land)

3. Specifyingthe Meeting Date and Time:

i. Specifying the hour of the meeting as well as the

date.UK/BM-35 TRANSLATION

ii. Specifying the time of both parties' arrival ana the

time of the first party's departure.

iii. Specifying how long the meeting will last. iv. Specifying an alternative date and time.

v. Not allowing a long period of time between making the

meeting arrangements and the meeting itself.

4. Designating special signals between those who meet If the two individuals meeting know one another's shape and

appearance, it is sufficient to use a single safety sign.

[In that case,] the sitting and arriving individuals inform each other that there is no enemy surveillance. The sign may be keys, beads, a newspaper, or a scarf. The two parties would agree on moving it in a special way so as not to attract the attention of those present.

If the two individuals do not know one another, they should do the following:

a. The initial sign for becoming acquainted may be that

both of them wear a certain type of clothing or carry

a certain item. These signs should be appropriate for

the place, easily identified, and meet the purpose.

The initial sign for becoming acquainted does not

[fully] identify one person by another. It does that

at a rate of 30%.

b. Safety Signal: It is given by the individual sitting

in.the meeting location to inform the second

individual that the place is safe. The second personUK/BM-36 TRANSLATION

would reply through signals to inform the first

that he is not being monitored. The signals are

agreed upon previously and should not cause

suspicion.

c. A second signal for getting acquainted is one in which

the arriving person uses while sitting down. That

signal may be a certain clause, a word, a sentence, or

a gesture agreed upon previously, and should not cause

suspicion for those who hear it or see it.

B. The Stage of the Meeting [itself]:The following measures should be taken:

1. Caution during the meeting.

2. Not acting unnaturally during the meeting in order not to raise suspicion.

3. Not talking with either loud or very low voices

([should be] moderate).

4. Not writing anything that has to do with the meeting.

5. Agreeing on a security plan in case the enemy raids

the location.

C. After the Meeting:The following measures should be taken:

1. Not departing together, but each one separately.

2. Not heading directly to the main road but through

secondary ones.

3. Not leaving anything in the meeting place that might

indicate the identity or nature of those who met.

Meeting in-person has disadvantages, such as:

1. Allowing the enemy to capture those who are meeting.

2. Allowing them [the enemy] to take pictures of those

who are meeting, record their conversation, and gather

evidence against them.UK/BM-37 TRANSLATION

3. Revealing the appearance of the commander to the other

person. However, that may be avoided by taking the

previously mentioned measures such as disguising

himself well and changing his appearance (glasses,

wig, etc.)

Third Means: The Messenger:

This is an intermediary between the sender and the receiver. The messenger should possess all characteristics mentioned in the first chapter regarding the Military Organization?smember. These are the security measures that a messenger should take:

1. Knowledge of the person to whom he will deliver the

message.

2. Agreement on special signals, exact date, and specifictime.

3. Selecting a public street or place that does not raise suspicion.

4. Going through a secondary road that does not have

check points.

5. Using public transportation (train,bus,...) and disembarking before the main station. Likewise,embarking should not be done at the main station either, were there are a lot of security personnel and informants.

6. Complete knowledge of the location to which he is

going.

Fourth Means:

Letters:

This means (letters)may be used as a method of communicationUK/BM-38 TRANSLATION

between members and the Organization provided that the following security measures are taken:

1. It is forbidden to write any secret information in the letter. If one must do so, the writing should be done in general terms.

2. The letter should not be mailed from a post office

close to the sender's residence, but from a distant

one.

3. The letter should not be sent directly to the

receiver's address but to an inconspicuous location

where there are many workers from your country.

Afterwards, the letter will be forwarded to the

intended receiver. (This is regarding the overseas-

bound letter).

4. The sender's name and address on the envelope should

be fictitious. In case the letters and their contents

are discovered, the security apparatus would not be

able to determine his [the sender's] name and address.

5. The envelope should not be transparent so as to reveal

the letter inside.

6. The enclosed pages should not be many, so as not to

raise suspicion.

7. The receiver's address should be written clearly so

that the letter would not be returned.

8. Paying the post office box fees should not be

forgotten.

Fifth Means: Facsimile and Wireless:

Considering its modest capabilities and the pursuit by the security apparatus of its members and forces, the IslamicUK/BM-39 TRANSLATION

Military Organization cannot obtain theses devices. In case the Organization is able to obtain them, firm security measures should be taken to secure communication between the members in the country and the command outside.

These measures are:

1. The duration of transmission should not exceed five

minutes in order to prevent the enemy from pinpointing

the device location.

2. The device should be placed in a location with highwireless frequency, such as close to a TV station,embassies, and consulates in order to prevent the enemy from identifying its location.

3. The brother, using the wireless device to contact his

command outside the country, should disguise his

voice.

4. The time of communication should be carefully

specified.

5. The frequency should be changed from time to time.

6. The device should be frequently moved from one

location to another.

7. Do not reveal your location to the entity for which

you report.

8. The conversation should be in general terms so as not to raise suspicion.

Transportation Means:

The members of the Organization may move from one location to another using one of the following means:

a. Public transportation,

b. Private transportationUK/BM-40 TRANSLATION

Security Measures that Should be Observed in Public

Transportation:

1. One should select public transportation that is not

subject to frequent checking along the way, such as

crowded trains or public buses.

2. Boarding should be done at a secondary station, as

main stations undergo more careful surveillance.

Likewise, embarkment should not be done at main

stations.

3. The cover should match the general appearance (tourist

bus, first-class train, second-class train, etc).

4. The existence of documents supporting the cover.

5. Placing important luggage among the passengers'

luggage without identifying the one who placed it.

If it is discovered, its owner would not be arrested.

In trains, it [the luggage] should be placed in a

different car than that of its owner.

6. The brother traveling on a "special mission" should not get involved in religious issues (advocating goodand denouncing evil) or day-to-day matters (seat reservation,...). The brother traveling on a mission should not arrive

in the [destination] country at night because then

travelers are few, and there are [search] parties and

check points along the way.7. 8. When cabs are used, conversation of any kind should

not be started with the driver because many cab

drivers work for the security apparatus.

9. The brother should exercise extreme caution and apply

all security measures to the members.UK/BM-41 TRANSLATION

Security Measures that Should be Observed in Private

Transportation:

Private transportation includes: cars, motorcycles

A. Cars and motorcycles used in overt activity:

1. One should possess the proper permit and not violate

traffic rules in order to avoid trouble with the

police.

2. The location of the vehicle should be secure so that

the security apparatus would not confiscate it.

3. The vehicle make and model should be appropriate for

the brother?s cover.

4. The vehicle should not be used in special military

operations unless the Organization has no other

choice.

B. Cars and motorcycles used in covert activity:

1. Attention should be given to permits and [obeying] the traffic rules in order to avoid trouble and reveal

their actual mission.

2. The vehicle should not be left in suspicious places

(deserts,mountains, etc.). If it must be, then the

work should be performed at suitable times when no one

would keep close watch or follow it.

3. The vehicle should be purchased using forged documents

so that getting to its owners would be prevented once

it is discovered.

4. For the sake of continuity, have only one brother in

charge of selling.

5. While parking somewhere, one should be in a position

to move quickly and flee in case of danger.

6. The car or motorcycle color should be changed before

the operation and returned to the original after the

operation.UK/BM-42 TRANSLATION

7. The license plate number and county name should be

falsified. Further, the digits should be numerous in

order to prevent anyone from spotting and memorizing

it.

8. The operation vehicle should not be taken to large

gasoline stations so that it would not be detected by

the security apparatus.UK/BM-43 TRANSLATION

SIXTH LESSON

TRAINING

UK/BM-44 TRANSLATION* The following security precautions should be taken during the training: The Place:

The place should have the following specifications:

1. Distance from the populated areas with the

availability of living necessities.

2. Availability of medical services during the training.

3. The place should be suitable for the type of training

(physical fitness, shooting, tactics).

4. No one except the trainers and trainees should know

about the place.

5. The place should have many roads and entrances

.

6. The place should be visited at suitable times.

7. Hiding any training traces immediately after the

training.

8. Guarding the place during the training.

9. Appropriateness of the existing facilities for the

number of training members.

10. Exclusion of anyone who is not connected with the

training.

11. Taking all security measures regarding the

establishment.

12. Distance of the place from police stations, public

establishments, and the eyes of informants.

13. The place should not be situated in such a way that

the training and trainees can be seen from another

location.UK/BM-45 TRANSLATION

The Trainees:

1. Before proceeding to the training place, all security

measures connected with an undercover individual

should be taken. Meanwhile, during training at the

place, personnel safety should be ensured.

2. Selecting the trainees carefully.

3. The trainees should not know one another.

4. The small size of groups that should be togetherduring the training (7-10 individuals).

5. The trainees should not know the training place.

6. Establishing a training plan for each trainee. The Trainers: All measures taken with regard to the commanders apply also to the trainers. Also, the following should be applied:

1. Fewness of the trainers in the training place. Onlythose conducting the training should be there, in order not to subject the training team to the risk of security exposure.

2. Not revealing the identity of the trainer to trainees.

3. Keeping a small ratio of trainees to trainer.

4. The training team members should not know one another.UK/BM-46 TRANSLATION

SEVENTH LESSON WEAPONS:

MEASURES RELATED TO BUYING AND TRANSPORTING THEMUK/BM-47 TRANSLATION

Prior to dealing with weapons, whether buying, transporting, or storing them, it is essential to establish a careful, systematic and firm security plan that plan deals with all stages. It is necessary to divide that task into stages:

First Stage:

Prior to Purchase;

Second Stage: Purchasing;

Third Stage: Transport;

Fourth Stage: Storage.

1. Prior to Purchase Stage: It is necessary to take the

following measures:

a. In-depth knowledge of the place where weapons will be

purchased, together with its entrances and exits.

b. Verifying there are no informants or security

personnel at the place where purchasing will take

place.

c. The place should be far from police stations and

government establishments.

d. Not proceeding to the purchasing place directly by the

main road, but on secondary streets.

e. Performing the exercises to detect the surveillance.

f. One?s appearance and clothing should be appropriate

for the place where purchasing will take place.

g. The purchasing place should not be situated in such a way that the seller and buyer can be seen from another location. To the contrary, the purchasing place should be such that the seller and buyer can see the surrounding area.

h. Determining a suitable cover for being in that place.

i. The place should not be crowded because that would

facilitate the police hiding among people, monitoring

the arms receiving, and consequently arresting the

brother purchasing.UK/BM-48 TRANSLATION

j. In case one of the parties is unable to arrive, it is essential to prearrange an alternativeplace and time with the seller. k. Selecting a time suitable for the purchase so that it does not raise suspicion.

l. Prior to purchasing, the seller should be tested to

ensure that he is not an agent of the security

apparatus.

m. Preparing a place for storage prior to purchasing.

2. The Purchase Stage:

a. Verifying that the weapons are in working condition.

b. Not paying the seller the price for the weapons before

viewing, inspecting, and testing them.

c. Not telling the seller about the mission for which the

weapons are being purchased.

d. Extreme caution should be used during the purchasing

operation in the event of any unnatural behavior by

the seller or those around you.

e. Not lengthening the time spent with the seller. It is

important to depart immediately after purchasing the

weapons.

3. The Transport Stage:

a. Avoid main roads where check points are common.

b. Choose a suitable time for transporting the weapons.

c. Observers should proceed on the road ahead of the

transportation vehicle for early warning in case of an

emergency.

d. Not proceeding directly to the storage place until

after verifying there is no surveillance.UK/BM-49 TRANSLATION

e. During the transport stage, weapons should be hidden

in a way that they are inconspicuous and difficult to

find. f. The route for transporting the weapons should be

determined very carefully.g. Verifying the legality of the vehicle, performing its maintenance, checking its gasoline and water levels, etc.

h. Driving the car normally in order to prevent

accidents.

4. The Storage Stage:

a. In order to avoid repeated transporting, suitable

storage places should be selected. In case the

materials are bombs or detonators, they should be

protected from extreme heat and humidity.

b. Explosive materials and detonators should be separated

and stored apart from each other.

c. Caution should be exercised when putting detonators in

the arsenal.

d. Lubricating the weapons and placing them in wooden or

plastic crates. The ammunition should be treated

likewise.

When selecting an arsenal, consider the following:

1. The arsenal should not be in well-protected areas, or

close to parks or public places.

2. The arsenal should not be in a "no-man's-land."3. The arsenal should not be in an apartment previously used for suspicious activities and often frequented by security personnel.

4. The arsenal should not be a room that is constantly used and cannot be given up by family members who do not know the nature of the father or husband's work.UK/BM-50 TRANSLATION

5. The apartment selected as an arsenal should be owned

by the Organization or rented on a long-term basis.

6. The brother responsible for storage should not visit

the arsenal frequently, nor toy with the weapons.

7. The arsenal keeper should record in a book all

weapons, explosive materials, and ammunition. That

book should be coded and well secured.

8. Only the arsenal keeper and the commander should know the location of the arsenal.

9. It is necessary to prepare alternative arsenals and not leave any leads in the original arsenals to the alternative ones.UK/BM-51 TRANSLATION

EIGHT LESSONMEMBER SAFETYUK/BM-52 TRANSLATION

Defining Members Safety:

This is a set of measures taken by members who perform

undercover missions in order to prevent the enemies from

getting to them. It is necessary for any party that adopts Jihad work and has many members to subdivide its members into three groups, each of which has its own security measures. The three groups are:

1. The overt member,

2. The covert member,

3. The commander

Measures that Should be Taken by the Overt Member:

1. He should not be curious and inquisitive about matters

that do not concern him.

2. He should not be chatty and talkative about everything

he knows or hears.

3. He should not carry on him the names and addresses of

those members he knows. If he has to, he should keep

them safe.

4. During times of security concerns and arrest campaigns

and especially if his appearance is Islamic, he should

reduce his visits to the areas of trouble and remain

at home instead.

5. When conversing on the telephone, he should not talk

about any information that might be of use to the

enemy.

6. When sending letters, he should not mention any

information that might be of use to the enemy. When

receiving letters, he should burn them immediately

after reading them and pour water on them to preventUK/BM-53 TRANSLATION

the enemy from reading them. Further, he should destroy any traces of fire so the enemy would not find out that something was burned.

Measures that Should be Taken by the Undercover Member:

In addition to the above measures, the member should...

1. Not reveal his true name to the Organization's members

who are working with him, nor to the [Islamic] Da'wa

[Call].

2. Have a general appearance that does not indicate Islamic orientation (beard, toothpick, book,[long]shirt, small Koran).

3. Be careful not to mention the brothers' common

expressions or show their behaviors (special praying

appearance, "may Allah reward you", "peace be on you"

while arriving and departing, etc.)

4. Avoid visiting famous Islamic places (mosques,

libraries, Islamic fairs, etc.)Carry falsified personal documents and know all the information they contain.5. 6. 7. 8. 9. Not resort to utilizing letters and messengers except in an emergency. Have protection preceding his visit to any place while moving about apartment,province, means of transportation, etc.). Have complete and accurate knowledge of the security

status related to those around him in his place of

work and residence, so that no danger or harm would

catch him unaware.Maintain his family and neighborhood relationships and should not show any changes towards them so that they would not attempt to bring him back [from the Organization] for security reasons.UK/BM-54 TRANSLATION10. Not speak loudly.

11. Not get involved in advocating good and denouncing

evil in order not to attract attention to himself.

12. Break the daily routine, especially when performing an undercover mission. For example, changing the

departure and return routes, arrival and departure

times, and the store where he buys his goods.

13. Not causing any trouble in the neighborhood where he

lives or at the place of work.

14. Converse on the telephone using special code so that

he does not attract attention.

15. Not contacting the overt members except when

necessary. Such contacts should be brief.

16. Not fall into the enemy's excitement trap, either

through praising or criticizing his Organization.

17. Performing the exercises to detect surveillance

whenever a task is to be performed.

18. Not park in no-parking zones and not take photographs

where it is forbidden.

19. Closing all that should be closed before departing the place, whether at home or his place of undercover

work.

20. Not undergo a sudden change in his daily routine or

any relationships that precede his Jihad involvement.

Far example, there should not be an obvious change in

his habits of conversing, movement, presence, or

disappearance. Likewise, he should not be hasty to

sever his previous relationships.

21. Not meet in places where there are informers, such as

coffee shops, and not live in areas close to the

residences of important personalities, government

establishments, and police stations.UK/BM-55 TRANSLATION

22. Not write down on any media, specially on paper, that could show the traces and words of the pen by rubbing the paper with lead powder.

Measures that Should be Taken by the Commander:

* The commander, whether in overt or covert work, has special importance for the following reasons:

1. The large amount of information that he possesses.

2. The difficulty of the command in replacing the

commander.

3. Therefore, all previously mentioned security

precautions regarding members should be heightened for

the commander. Many resources should be reserved for

protecting the commanders.

Important Note:

* Married brothers should observe the following:

1. Not talking with their wives about Jihad work.

2. The members with security risks should not travel with their wives. A wife with an Islamic appearance (veil) attracts attention.


http://www.usdoj.gov/ag/trainingmanual.htm
__________________

Thomas Jefferson, Kentucky Resolutions of 1798: "In questions of power then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution."
sendpm.gif Reply With Quote
Sponsored Links
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Similar Threads
Thread Thread Starter Forum Replies Last Post
The Al Qaeda Manual Arrow Terrorism 0 06-03-2005 01:19 PM
PTSD Manual Arrow Enduring Freedom 0 11-24-2003 08:19 PM
PTSD Manual Arrow Iraqi Freedom 0 11-24-2003 08:17 PM
PTSD Manual Arrow Vietnam 0 11-24-2003 08:11 PM
PTSD Manual Arrow Gulf War 0 11-24-2003 08:08 PM

All times are GMT -7. The time now is 09:24 PM.


Powered by vBulletin, Jelsoft Enterprises Ltd.