Pentagon Confirms US Air Strike Killed Al-Shabab Leader

Somali government soldiers patrol during an attack on the country's parliament in Mogadishu on May 24, 2014.

Farah Abdi Warsameh/AP

AA Font size + Print

Somali government soldiers patrol during an attack on the country's parliament in Mogadishu on May 24, 2014.

Monday’s U.S. air strike in Somalia killed the co-founder of the terrorist organization al-Shabab. By Stephanie Gaskell

A U.S. air strike in Somalia on Monday was successful in taking out the leader of the terrorist group al-Shabab, Pentagon officials confirmed. 

We have confirmed that Ahmed Godane, the co-founder of al-Shabab, has been killed,” Pentagon spokesman Rear Adm. John Kirby said in a statement on Friday.

U.S. intelligence pointed to a facility south of Mogadishu, where Godane — the mastermind of the deadly attacks on a shopping mall in Kenya last fall — was believed to be located. In coordination with the Somali military, the U.S. military deployed both manned and unmanned aircraft, firing several Hellfire and precision-guided missiles on the target. There were no U.S. troops on the ground, Kirby said.

“Removing Godane from the battlefield is a major symbolic and operational loss to al-Shabab,” he said.

At a press conference in Wales on Friday, President Barack Obama said the U.S. will go after terrorists, including the Islamic State in Iraq and Syria, in a “very systematic and methodical” way.

[READ MORE: US Strike Against Al-Shabab Leader Reflects Obama’s Counterterrorism Strategy]

“As I said, it’s not going to happen overnight, but we are steadily moving in the right direction. And we are going to achieve our goal. We are going to degrade and ultimately defeat ISIL the same way that we have gone after al-Qaeda, the same way that we have gone after the al-Qaeda-affiliated Somalia, where we released today the fact that we have killed the leader of al-Shabab in Somalia and have consistently worked to degrade their operations,” Obama said.

“We have been very systematic and methodical in going after these kinds of organizations that may threaten U.S. personnel and the homeland, and that deliberation allows us to do it right. But have no doubt. We will continue and I will continue to do what is necessary to protect the American people,” he said. 

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.