Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

Man Arrested in Plot to Attack Pentagon via Remote Control Aircraft Loaded with C-4

Defendant planned to attack the Pentagon and the Capitol using aircraft similar to “small drone airplanes” filled with explosives and guided by GPS equipment.

Defendant planned to attack the Pentagon and the Capitol using aircraft similar to “small drone airplanes” filled with explosives and guided by GPS equipment.

A 26-year-old man from Ashland, Massachusetts was arrested and charged yesterday in connection with his plot to damage or destroy the Pentagon and U.S. Capitol, using large remote controlled aircraft filled with explosives. Rezwan Ferdaus, a U.S. citizen, was also charged with attempting to provide support and resources to a foreign terrorist organization, specifically Al Qaeda, in order to carry out attacks on U.S. soldiers overseas. The public was not in danger from explosive devices, which were controlled by undercover FBI employees .

Massachusetts Man Plots Attack on Pentagon The affidavit alleges the following: Ferdaus, a Northeastern University graduate with a degree in physics, began planning to commit a violent “jihad” against the U.S. in early 2010. He obtained mobile phones, each of which he modified to act as an electrical switch for an IED. He then supplied the phones to FBI undercover employees (UCs), who he believed to be members of, or recruiters for, al Qaeda. According to the affidavit, Ferdaus believed that the devices would be used to kill American soldiers overseas.

In recorded conversations with the government’s cooperating witness (CW) that began in January 2011, Ferdaus stated that he planned to attack the Pentagon and the Capitol using aircraft similar to “small drone airplanes” filled with explosives and guided by GPS equipment.

In May 2011, Ferdaus traveled from Boston to Washington, D.C., conducted surveillance and took photographs of his targets (Pentagon and Capitol), and identified and photographed sites at the East Potomac Park from which he planned to launch his aircraft filled with explosives. Upon his return, he decided to couple his “aerial assault” plan with a “ground directive.”

Between May and September 2011, Ferdaus researched, ordered and acquired the necessary components for his attack plans. In June 2011, Ferdaus rented a storage facility in Framingham, Mass., under a false name, to use to build his attack planes and maintain all his equipment. Ferdaus delivered a total of eight detonation devices to the UCs over the course of the investigation, which he built with the intention that they be used by al Qaeda operatives overseas to kill U.S. soldiers. On September 20, 2011 Ferdaus made a training video, which he provided to the UCs, demonstrating how to make “cell phone detonators.”

After inspecting the explosives and firearms, Ferdaus was immediately arrested.

If convicted, Ferdaus faces up to 15 years in prison on the material support and resources to a foreign terrorist organization charge; up to 20 years in prison on the charge of attempting to destroy national defense premises; and a five-year minimum mandatory in prison and up to 20 years on the charge of attempting to damage and destroy buildings that are owned by the United States, by using an explosive. On each charge Ferdaus also faces up to three years of supervised release and a $250,000 fine.

Related Reading:

Advertisement. Scroll to continue reading.

• Man Pleads Guilty to Hacking Neighbor’s Wireless, Sending Threats against Vice President

• Mobile & Smart Device Security Survey 2010 – Concern Grows as Vulnerable Devices Proliferate

• Former Goldman Sachs Programmer Found Guilty After Stealing Computer Code

•  Mobile & Smart Device Security Survey 2010 – Concern Grows as Vulnerable Devices Proliferate 

 Chinese National Pleads Guilty to Stealing Ford Trade Secrets

• Akamai Employee Arrested, Accused of Trying to Sell Information to Foreign Government

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

CISO Strategy

The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks.

Cybercrime

A global cyber espionage campaign has resulted in the networks of many organizations around the world becoming compromised after the attackers managed to breach...

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...