Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementSectorsSecurity Leadership and ManagementSecurity Education & TrainingGovernment: Federal, State and Local

Education & Training

Death by Association: Family Terror Networks

By Dean C. Alexander, Kevin Harrington
SEC0120-Edu-Feat-slide1_900px
SEC0120-Edu-slide2_900px

About the Authors

Dean C. Alexander is professor/director of the Homeland Security Research Program at Western Illinois University (WIU) and author of the book Family Terror Networks. Kevin Harrington earned a B.S. degree from the School of Law Enforcement and Justice Administration at WIU in 2019.

SEC0120-Edu-Feat-slide1_900px
SEC0120-Edu-slide2_900px
January 8, 2020

It is dangerous to be related to a terrorist, let alone a senior terror operative. Such an association can lead to one’s imminent death while participating in an attack encouraged by a family member, being vanquished by a state action, demise arising from a premature explosion, or at the hands of their kin. The latest example of death of family members due to their kin’s participation in terrorism is the passing of Islamic State leader Abu Bakr al-Baghdadi’s two children. They died in October 2019 when their father detonated his suicide belt as he was pursued by U.S. forces at his hideout in Barisha, Syria. Also, two of al-Baghdadi’s wives died during the raid of his compound.

Similarly, al Qaeda leader Osama bin Laden’s son Saad was killed in a drone strike in Pakistan in 2009. Khalid, another son, was vanquished along with bin Laden in Pakistan during the U.S. Navy Seal raid in May 2011. In January 2016, another bin Laden child, Hamza, called to avenge his father’s death: “If you think that your sinful crime that you committed in Abbottabad has passed without punishment, then you thought wrong.” In September 2019, President Donald Trump announced that Hamza was killed in a counterterrorism mission in Afghanistan-Pakistan region during the previous two years. Anwar al-Awlaki was a senior al Qaeda in the Arabian Peninsula operative before he perished in a U.S. drone strike in Yemen in September 2011. Al-Awlaki’s teenage son Abdulrahman died that same month in another drone strike, either purposely or as collateral damage.

In May 2018, Tri Murtiono, a member of terror group Jemaah Ansharut Daulah (JAD) aligned with the Islamic State, his wife Ernawti and three children blew themselves up while on two motorbikes at the Surabaya, Indonesia, police headquarters. Within a day, Dita Oepriarto, reportedly the Surabaya cell leader, drove a car bomb into the Surabaya Centre Pentecostal Church. His wife, Pui Kuswati, along with their two daughters, aged 9 and 12, detonated a bomb at the Indonesian Diponegoro Church in Surabaya. Their two sons, aged 16 and 18, rode a motorcycle to the Santa Maria Church and blew themselves up in the third strike in the same city.

In April 2019, a series of bombings perpetrated by an Islamic State-linked cabal, rocked several cities in Sri Lanka, killing over 250 people and injuring hundreds of others. Among the perpetrators were brothers Ilham Ahmed and Insaf Ahmed Ibrahim who blew themselves up at the Shangri-La and Cinnamon Grand hotels, respectively. As Sri Lankan authorities came to investigate Inshaf’s home, his wife Fatima, detonated a suicide vest, killing herself, their unborn child and their three sons. The ringleader of the attacks in Sri Lanka, Zahran Hashim, detonated his suicide belt while doing a joint attack with Insaf Ahmed Ibrahim. While investigating the terror incidents, police killed Zahran’s father, two brothers and multiple children in the clan.

Several family members engaged in carrying out high-profile terror attacks worldwide: the Brussels suicide bombings (Ibrahim and Khalid el Bakraoui brothers, March 2016), and the San Bernardino attack (couple Syed Rizwan Farook and Tashfeen Malik, December 2015). Likewise, kin have participated in terror attacks that were less noteworthy. For example, in July 2016, Saudi brothers Abdulrahman and Ibrahim Saleh Muhammad al-Imir, along with Pakistani Abdullah Gulzar Khan, conducted suicide bombings at a Shia mosque in al Qatif, Saudi Arabia. In April 2007, two brothers, Mohamed and Omar Maha, conducted suicide bombings near the U.S. consulate in Casablanca, Morocco.

In August 2009, Yemen-based Saudi Abdullah al-Asiri blew himself up while attempting to kill Saudi Arabia’s deputy interior minister, Prince Mohammed bin Nayef. Abdullah’s brother, Ibrahim, who served with al Qaeda in the Arabian Peninsula as a key bomb maker, made that explosive. In August 2018, authorities disclosed that Ibrahim was eliminated in an American drone strike in Yemen in 2017. Family members of terrorist leaders have participated in terror attacks, including martyrdom operations. In July 2017, the eldest son of Taliban leader Mullah Haibatullah Akhundzada, Khalid, perished while conducting a suicide bombing against Afghan security forces in Helmand province.

A family member’s mistake in assembling an explosive has led to the death of multiple family members. In January 2017, a Taliban commander in northern Afghanistan, Kamal Khan, accidentally killed himself and his four sons while building bombs in his home. The children died upstairs while Khan was constructing the explosives for use as roadside bombs. In May 2018, four members of a family terror network – Anton Febrianto, his wife Puspitasari and two of their children (aged 17 and 15) – died when a bomb the father was assembling detonated prematurely. This cabal was part of the Surabaya terror cell that bombed churches and police headquarters that same month.

An ISIS fighter, Ali Saqr al-Qasem, informed his superiors that his mother, Lena al-Qasem, planned to leave Raqqa and hadnasked Ali to join her. In January 2016, Ali shot and killed his mother in a public execution in Raqqa, Syria, for the crime of apostasy. In June 2016, twenty-year-old twin brothers, Khaled and Saleh al-Oraini stabbed their father, mother and twenty-two-year-old brother in Riyadh, Saudi Arabia. Their mother died of her injuries. She had objected to the twins’ plans to travel to Syria and fight on behalf of the Islamic State. Saudi authorities captured the twin brothers as they tried to escape along the Saudi-Yemeni border.

The expiration of al-Baghdadi at his own hands brought to the forefront another element of family terror networks: the often unpleasant fate of the kin of terrorists. As exhibited in the examples above, the perils of being related to a terrorist are manifold: being assassinated by a government, one’s imminent death while conducting an incident elicited by a family member, fatality stemming from an untimely explosion, or at the hands of their kindred should discord among them take hold. Besides inflicting untold horrors on unsuspecting victims worldwide, family terror networks may precipitate the wittingly and unwittingly death of their kin.

KEYWORDS: counterterrorism jihadist threats in the US security risk security risk management terrorist attack workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dean C. Alexander is Director of the Homeland Security Research Program and Professor at the School of Law Enforcement and Justice Administration at Western Illinois University. He is the author of the new book, Family Terror Networks (2019), available at Amazon.com. He is also a valued member of Security’s Editorial Advisory Board.

Kevin harrington
Kevin Harrington earned a B.S. degree from the School of Law Enforcement and Justice Administration at WIU.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • terrorist1-900px.jpg

    Death by Association: Family Terror Networks

    See More
  • Terrorist

    Understanding Family Terror Networks

    See More
  • 9/11 flags

    Understanding Family Terror Networks

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • Physical Layer Security in Wireless Communications

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing