Skip to main content

19 Members of Abu Sayyaf Group (ASG) Surrendered to Authorities in Basilan Province

The Armed Forces of the Philippines in Southern Philippines confirmed to the media that a total of nineteen members of the Abu Sayyaf Group (ASG) surrendered to authorities in Basilan province on Thursday, May 4, 2017.


Nur Hassan Lahaman and Mudz-Ar Angkun, two sub-leaders of the notorious Abu Sayyaf Group, surrendered to authorities together with their followers.

The surrendered Abu Sayyaf Group members surrendered to troops of the 64th Infantry Batallion in Barangay, Tumahubong, Sumisip, Basilan.

According to the AFP, Angkun's group operates in the areas of Sumisip while Hassan operates in Tuburan municipality. The ASG members who surrendered to the military also yielded several high powered firearms to the government.


The military also reported that four of the surrenderees are followers of slain ASG leader Alhabsy Misaya, who was killed in Sulu clash last week.

The four ASG members were identified as Patta Salapuddin aka Patta, Asbi Salapuddin, Sayyadi Salapuddin, and Arci Salapudding of Barangay Basakan Hadji Mohammad Ajul Basilan.

All the ASG surrenderees are undergoing processing and debriefing at the Basilan Provincial Police Office.

Source: CNN Philippines

Popular posts from this blog

You can pay at a restaurant by smiling at a camera

© Provided by Engadget As easy as it is to make purchases in the era of tap-to-pay services , it's about to get easier still. Alipay (which handles purchases for Chinese shopping giant Alibaba) has launched what it says is the first payment system that uses facial recognition to complete the sale. If you visit one of KFC's KPRO restaurants in Hangzhou, China, you can pay for your panini or salad by smiling at a camera-equipped kiosk -- you need to verify the purchase on your phone, but you don't have to punch in digits or bring your phone up to an NFC reader. The system (Smile to Pay) is purportedly resistant to spoofing with photos and other tricks. It relies on both depth-sensing cameras and a "likeness detection algorithm" to make sure it's really you. Reportedly, the technology is good enough that it can accurately identify people even when they're disguising themselves through makeup or wigs. You shouldn't have to worry about someone buying ...

Cimatu warns miners: Don’t befoul watersheds, forests, aquatic resources

© Provided by Mediamerge Corporation Newly-appointed Environment and Natural Resources Secretary Roy Cimatu poses for a photo before being sworn into office by President Rodrigo Duterte ahead of the 15th Cabinet meeting in Malacañang on Monday, May 7, 2017. Robinson Niñal/PPD Environment Secretary Roy Cimatu on Tuesday warned mining firms to observe responsible mining and avoid destructive practices or face sanctions His pronouncement came in response to President Rodrigo Duterte's second State of the Nation Address, in which the chief executive emphasized mining's impact on the environment. "I know for a fact that in a number of cases, weak and irresponsible mining practices result [in] environmental destruction—contaminating farmlands and poisoning our rivers and seas," Cimatu said in a statement. "Miners better refrain from despoiling our watersheds, forests and aquatic resources," he added. Cimatu said the Department of Environment and Natural Res...

Tesla cloud account hacked to mine cryptocurrency

© Provided by The Hill An unidentified outside hacker infiltrated Tesla's Amazon cloud account and used its systems to quietly mine for cryptocurrencies, a cybersecurity firm announced Tuesday. The hack also potentially exposed the electric car company's data. Researchers for RedLock found that Tesla's credentials on an IT administrative console were not password protected. They made the discovery while trying to track down which organizations had left their Amazon Web Services (AWS) credentials openly exposed on the internet last month. The hackers quietly hijacked the console and began running scripts to generate virtual currency like bitcoin, the latest in a series of "cryptojacking" attacks. The researchers also found the hackers used "sophisticated evasion measures" to go undetected. A spokesperson for Tesla said the company learned about the breach in a company-sanctioned bug bounty program that pays outside hackers to discover vulnerabilitie...