Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementSecurity Education & Training

Brussels Attacks Indicative of Jihadist Threats Facing the United States

By Trent Smith, Dean C. Alexander
Brussels Attacks Indicative of Jihadist Threats Facing the United States
May 1, 2016

The March multiple terror attacks in Brussels that resulted in more than 30 people killed and more than 250 injured raises again the specter of terrorism globally. While since 9/11 fewer than 50 people have been in killed in the United States due to jihadist-inspired terrorism, that paltry number fails to illustrate that the jihadi threat here is significant as hundreds – if not thousands – of persons would have succumbed to otherwise stymied plots. More specifically, there have been dozens of jihadi terror plots here during the past 14 years, especially since 2014 with those inspired by the Islamic State.

Jihadist activity on U.S. soil since September 11 includes successful attacks resulting in deaths, attacks causing injuries to victims, and attempted plots involving planned mayhem big and small. The participants of these incidents include individuals linked formally and/or ideologically across a variety of jihadist “homes,” including a multitude of U.S.-designated foreign terrorist organizations, among them al Qaeda, al Qaeda in the Arabian Peninsula (AQAP), Pakistani Taliban, and increasingly, of late, the Islamic State.

The perpetrators have acted as part of small cabals, linked by a variance of social networks – some family-affiliated or otherwise – and as lone wolves. The weaponry used most frequently that resulted in these killings was gunfire, followed by explosive devices. The targets of successful attacks included military and civilian settings.

From September 2001 through 2015, the number of victims killed during jihadist attacks in the United States was 44, arising from nine incidents (and their aftermaths):

  • Hesham Mohamed Hadayet shot and killed two people and wounded four others at the El Al Israeli airline counter at Los Angeles International Airport in July 2002. An airline security officer shot and killed Hadayet. Hadayet was deemed to be a lone wolf inspired by anti-Israeli sentiments. He legally purchased the gun used in the attack.
  • Naveed Haq killed one person and injured five during an attack with two semi-automatic pistols at the Seattle Jewish Federation office in July 2006. He was sentenced to life in prison. Haq, too, has been characterized as a lone wolf, triggered by anti-Israeli and anti-Semitic perspectives. He legally purchased the guns used in the incident.
  • In June 2009, Carlos Bledsoe carried out a drive-by shooting (with a rifle) at a military recruiting station in Little Rock, Arkansas. The incident resulted in the death of one U.S. soldier and injury of another. He was sentenced to life in prison. Bledsoe claimed affiliation with AQAP. He is alleged to have met Anwar al-Awlaki, the group’s former senior operative.
  • Dr. Nidal Hasan killed 13 and injured another 39 during a shooting at Fort Hood, Texas, in November 2009. Hasan was shot and injured by police during their response to the incident. He was sentenced to death for the murders. Hasan legally purchased the handgun used in the attack. Prior to the incident, Hasan communicated online with al-Awlaki.
  • In April 2013, Tamerlan and Dzhokhar Tsarnaev detonated two improvised explosive devices at the Boston Marathon, killing three and injuring more than 260. In the days following the attack, Tamerlan shot and killed one MIT police officer (the gun used was loaned to Dzhokhar), while one Boston police officer was killed after the brothers released pressure cooker bombs from their car during a police chase. Tamerlan was killed when his brother ran him over while they were evading police. Dzhokhar was found guilty of perpetrating the attacks and sentenced to death. This cabal was inspired by various jihadist ideals.
  • Between April and June 2014, Ali Muhammad Brown shot and killed three people in Seattle, Washington, during different incidents, and another person later in New Jersey. Brown claimed to have undertaken the attacks in retaliation for U.S. foreign policy in the Middle East. Brown’s wife legally purchased the handgun that was used in the murders.
  • In September 2014, Alton Nolen beheaded a female co-worker and attempted to behead another woman in Oklahoma City, Oklahoma, before he was shot and taken into custody. Nolen’s Facebook page had photos and commentary on jihadi beheadings as well as photos of jihadi fighters. In 2016, Nolen is on trial for these crimes.
  • In July 2015, Muhammad Youssef Abdulazeez attacked two military locations in Chattanooga, Tennessee, killing five persons, and injuring two others. Abdulazeez initially attacked a military recruiting center, and later drove to a U.S. Navy Reserve center, where the fatalities took place. Police killed Abduelazeez while responding to the incident.  He used several weapons in the attack, including a semi-automatic rifle, shotgun and handgun, a number of which were acquired legally. The FBI reported that Abdulazeez was inspired by a foreign terrorist organization.
  • In December 2015, Syed Rizwan Farook and his wife Tashfeen Malik attacked a holiday party in San Bernardino, California, organized by Farook’s employer, killing 14 and wounding 21 others, using semiautomatic weapons (purchased legally by Farook’s friend, Enrique Marquez, several years earlier). The couple had been radicalized for several years, including prior to meeting. Malik pledged allegiance to Islamic State leader al-Baghdadi during their attack.

Besides attacks resulting in deaths and injuries, failed plots encompassed some plans to kill scores. Core al Qaeda-directed ineffectual plots included infamous shoe bomber Richard Reid in 2001, and three planned simultaneous suicide bombers in NYC in 2009, led by Najibullah Zazi.

Also, in 2009, AQAP-linked Umar Farouk Abdulmutallab unsuccessfully detonated an explosive device on a flight from Amsterdam, the Netherlands, to Detroit, Michigan, with nearly 300 people on board. The following year, Faisal Shazad, a Pakistani Taliban-connected perpetrator, detonated a poorly devised vehicle-borne explosive device in New York’s Times Square.

Unaffiliated jihadist-inspired terrorists likewise sought to kill during many planned or actual attacks. In March 2006, Mohamed Taheri Azar, an Iranian-born U.S. citizen, tried to run over University of North Carolina-Chapel Hill students with a rented SUV at an outdoor, on-campus hangout. In August 2008, he pleaded guilty to nine counts of attempted murder and sentenced to over two decades in prison.

Although many subsequent failed plots included operatives who interacted with informants and/or undercover agents during sting operations, the lethal intentions of the operatives should not be characterized as otherwise. For example, in 2009 two lone wolf plotters separately attempted to detonate what they believed were vehicle-borne explosives. Hosam Smadi and Michael Finton targeted a Dallas, Texas, skyscraper, and a federal building in Springfield, Illinois, respectively.

More recently, other jihadists sought to kill numerous persons in, ultimately, failed terror plans. In September 2012 Ahmed Daoud attempted to remotely detonate a vehicle-borne explosives device outside a Chicago, Illinois, bar. According to taped conversations during a sting operation. Daoud intended to kill many, “If it’s only like five, 10 people, I’m not gonna feel that good. I wanted something that’s ... massive.”  In 2016, Daoud is on trial for that crime.

In March 2015, Jonas Edmonds, one of two Illinois-based cousins inspired by the Islamic State, was arrested in relation to a plot to kill some 150 people in an intended attack at the National Guard base in Joliet. His cousin, Hasan, was arrested prior to boarding an overseas flight with an intention to travel and join the self-declared caliphate. The pair ultimately pleaded guilty to conspiracy to provide material support to the group (Hasan also for attempting to provide such support) as the sting operation served its objective.

Other significant, failed Islamic State-inspired plots during 2015 were comprised of a: planned attack at the U.S. Capitol using semiautomatic weapons and pipe bombs (Christopher Lee Cornell), suicide bombing to be conducted at the Ft. Riley, Kansas (John T. Booker, Jr.), and improvised explosive device to be left on a crowded beach in Florida (Harlem Saurez).

Jihadist-linked planned carnage continues here as illustrated by a 2016 case. Khalil Abu-Rayya told an undercover agent that he intended to undertake an Islamic State-inspired attack at a 6,000-member church in Detroit. Later, Abu-Rayyan was arrested for another crime.

To reiterate, the attacks in Brussels merely illustrate that the intentions and capabilities of jihadist terror groups – and those inspired by them in cabals or as lone wolves – are real and worthy of taking seriously in the homeland and abroad.

KEYWORDS: counterterrorism jihadist threats in the US security risk management terrorist attack workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0516 edu slide3 200px1

Trent Smith contributing writer and member of the Illinois National Guard, completing his B.S. degree at Western Illinois University.

Dean alexander 200px

Dean C. Alexander is Director of the Homeland Security Research Program and Professor at the School of Law Enforcement and Justice Administration at Western Illinois University. He is the author of the new book, Family Terror Networks (2019), available at Amazon.com. He is also a valued member of Security’s Editorial Advisory Board.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • government 2 responsive default

    Brussels Attacks Indicative of Jihadist Threats Facing the United States

    See More
  • Extremism in the United States: where are the risks and what security enterprises can do regarding extremism

    Extremism in the United States in 2021: What’s out there and where are the risks?

    See More
  • Great Britain votes to leave the EU, in a move largely referred to as the "Brexit."

    The Unraveling: Brexit to Secession in the United States

    See More

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing