Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementSecurity Education & Training

Brussels Attacks Indicative of Jihadist Threats Facing the United States

By Trent Smith, Dean C. Alexander
Brussels Attacks Indicative of Jihadist Threats Facing the United States
May 1, 2016

The March multiple terror attacks in Brussels that resulted in more than 30 people killed and more than 250 injured raises again the specter of terrorism globally. While since 9/11 fewer than 50 people have been in killed in the United States due to jihadist-inspired terrorism, that paltry number fails to illustrate that the jihadi threat here is significant as hundreds – if not thousands – of persons would have succumbed to otherwise stymied plots. More specifically, there have been dozens of jihadi terror plots here during the past 14 years, especially since 2014 with those inspired by the Islamic State.

Jihadist activity on U.S. soil since September 11 includes successful attacks resulting in deaths, attacks causing injuries to victims, and attempted plots involving planned mayhem big and small. The participants of these incidents include individuals linked formally and/or ideologically across a variety of jihadist “homes,” including a multitude of U.S.-designated foreign terrorist organizations, among them al Qaeda, al Qaeda in the Arabian Peninsula (AQAP), Pakistani Taliban, and increasingly, of late, the Islamic State.

The perpetrators have acted as part of small cabals, linked by a variance of social networks – some family-affiliated or otherwise – and as lone wolves. The weaponry used most frequently that resulted in these killings was gunfire, followed by explosive devices. The targets of successful attacks included military and civilian settings.

From September 2001 through 2015, the number of victims killed during jihadist attacks in the United States was 44, arising from nine incidents (and their aftermaths):

  • Hesham Mohamed Hadayet shot and killed two people and wounded four others at the El Al Israeli airline counter at Los Angeles International Airport in July 2002. An airline security officer shot and killed Hadayet. Hadayet was deemed to be a lone wolf inspired by anti-Israeli sentiments. He legally purchased the gun used in the attack.
  • Naveed Haq killed one person and injured five during an attack with two semi-automatic pistols at the Seattle Jewish Federation office in July 2006. He was sentenced to life in prison. Haq, too, has been characterized as a lone wolf, triggered by anti-Israeli and anti-Semitic perspectives. He legally purchased the guns used in the incident.
  • In June 2009, Carlos Bledsoe carried out a drive-by shooting (with a rifle) at a military recruiting station in Little Rock, Arkansas. The incident resulted in the death of one U.S. soldier and injury of another. He was sentenced to life in prison. Bledsoe claimed affiliation with AQAP. He is alleged to have met Anwar al-Awlaki, the group’s former senior operative.
  • Dr. Nidal Hasan killed 13 and injured another 39 during a shooting at Fort Hood, Texas, in November 2009. Hasan was shot and injured by police during their response to the incident. He was sentenced to death for the murders. Hasan legally purchased the handgun used in the attack. Prior to the incident, Hasan communicated online with al-Awlaki.
  • In April 2013, Tamerlan and Dzhokhar Tsarnaev detonated two improvised explosive devices at the Boston Marathon, killing three and injuring more than 260. In the days following the attack, Tamerlan shot and killed one MIT police officer (the gun used was loaned to Dzhokhar), while one Boston police officer was killed after the brothers released pressure cooker bombs from their car during a police chase. Tamerlan was killed when his brother ran him over while they were evading police. Dzhokhar was found guilty of perpetrating the attacks and sentenced to death. This cabal was inspired by various jihadist ideals.
  • Between April and June 2014, Ali Muhammad Brown shot and killed three people in Seattle, Washington, during different incidents, and another person later in New Jersey. Brown claimed to have undertaken the attacks in retaliation for U.S. foreign policy in the Middle East. Brown’s wife legally purchased the handgun that was used in the murders.
  • In September 2014, Alton Nolen beheaded a female co-worker and attempted to behead another woman in Oklahoma City, Oklahoma, before he was shot and taken into custody. Nolen’s Facebook page had photos and commentary on jihadi beheadings as well as photos of jihadi fighters. In 2016, Nolen is on trial for these crimes.
  • In July 2015, Muhammad Youssef Abdulazeez attacked two military locations in Chattanooga, Tennessee, killing five persons, and injuring two others. Abdulazeez initially attacked a military recruiting center, and later drove to a U.S. Navy Reserve center, where the fatalities took place. Police killed Abduelazeez while responding to the incident.  He used several weapons in the attack, including a semi-automatic rifle, shotgun and handgun, a number of which were acquired legally. The FBI reported that Abdulazeez was inspired by a foreign terrorist organization.
  • In December 2015, Syed Rizwan Farook and his wife Tashfeen Malik attacked a holiday party in San Bernardino, California, organized by Farook’s employer, killing 14 and wounding 21 others, using semiautomatic weapons (purchased legally by Farook’s friend, Enrique Marquez, several years earlier). The couple had been radicalized for several years, including prior to meeting. Malik pledged allegiance to Islamic State leader al-Baghdadi during their attack.

Besides attacks resulting in deaths and injuries, failed plots encompassed some plans to kill scores. Core al Qaeda-directed ineffectual plots included infamous shoe bomber Richard Reid in 2001, and three planned simultaneous suicide bombers in NYC in 2009, led by Najibullah Zazi.

Also, in 2009, AQAP-linked Umar Farouk Abdulmutallab unsuccessfully detonated an explosive device on a flight from Amsterdam, the Netherlands, to Detroit, Michigan, with nearly 300 people on board. The following year, Faisal Shazad, a Pakistani Taliban-connected perpetrator, detonated a poorly devised vehicle-borne explosive device in New York’s Times Square.

Unaffiliated jihadist-inspired terrorists likewise sought to kill during many planned or actual attacks. In March 2006, Mohamed Taheri Azar, an Iranian-born U.S. citizen, tried to run over University of North Carolina-Chapel Hill students with a rented SUV at an outdoor, on-campus hangout. In August 2008, he pleaded guilty to nine counts of attempted murder and sentenced to over two decades in prison.

Although many subsequent failed plots included operatives who interacted with informants and/or undercover agents during sting operations, the lethal intentions of the operatives should not be characterized as otherwise. For example, in 2009 two lone wolf plotters separately attempted to detonate what they believed were vehicle-borne explosives. Hosam Smadi and Michael Finton targeted a Dallas, Texas, skyscraper, and a federal building in Springfield, Illinois, respectively.

More recently, other jihadists sought to kill numerous persons in, ultimately, failed terror plans. In September 2012 Ahmed Daoud attempted to remotely detonate a vehicle-borne explosives device outside a Chicago, Illinois, bar. According to taped conversations during a sting operation. Daoud intended to kill many, “If it’s only like five, 10 people, I’m not gonna feel that good. I wanted something that’s ... massive.”  In 2016, Daoud is on trial for that crime.

In March 2015, Jonas Edmonds, one of two Illinois-based cousins inspired by the Islamic State, was arrested in relation to a plot to kill some 150 people in an intended attack at the National Guard base in Joliet. His cousin, Hasan, was arrested prior to boarding an overseas flight with an intention to travel and join the self-declared caliphate. The pair ultimately pleaded guilty to conspiracy to provide material support to the group (Hasan also for attempting to provide such support) as the sting operation served its objective.

Other significant, failed Islamic State-inspired plots during 2015 were comprised of a: planned attack at the U.S. Capitol using semiautomatic weapons and pipe bombs (Christopher Lee Cornell), suicide bombing to be conducted at the Ft. Riley, Kansas (John T. Booker, Jr.), and improvised explosive device to be left on a crowded beach in Florida (Harlem Saurez).

Jihadist-linked planned carnage continues here as illustrated by a 2016 case. Khalil Abu-Rayya told an undercover agent that he intended to undertake an Islamic State-inspired attack at a 6,000-member church in Detroit. Later, Abu-Rayyan was arrested for another crime.

To reiterate, the attacks in Brussels merely illustrate that the intentions and capabilities of jihadist terror groups – and those inspired by them in cabals or as lone wolves – are real and worthy of taking seriously in the homeland and abroad.

KEYWORDS: counterterrorism jihadist threats in the US security risk management terrorist attack workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0516 edu slide3 200px1

Trent Smith contributing writer and member of the Illinois National Guard, completing his B.S. degree at Western Illinois University.

Dean C. Alexander is Director of the Homeland Security Research Program and Professor at the School of Law Enforcement and Justice Administration at Western Illinois University. He is the author of the new book, Family Terror Networks (2019), available at Amazon.com. He is also a valued member of Security’s Editorial Advisory Board.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Brussels Attacks Indicative of Jihadist Threats Facing the United States

    See More
  • Extremism in the United States: where are the risks and what security enterprises can do regarding extremism

    Extremism in the United States in 2021: What’s out there and where are the risks?

    See More
  • Great Britain votes to leave the EU, in a move largely referred to as the "Brexit."

    The Unraveling: Brexit to Secession in the United States

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing