• Cart
  • Checkout
  • Demo
  • Home
  • Home 1
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • My account
  • Sample Page
  • Shop
Africa Security Report
Advertisement
  • Home
  • Threat Landscape
    • All
    • Border Security
    • Cybersecurity & Digital Threats
    • Insurgencies & Armed Groups
    • Terrorism & Extremism
    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

  • Data & Analysis
    • All
    • Forecasts & Alerts
    • Infographics & Maps
    • Intelligence Briefs
    Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

    Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

    Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

    Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

    Northern Ghana: Pre-Harvest Kidnap Threat Spike

    Northern Ghana: Pre-Harvest Kidnap Threat Spike

    Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

    Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

    Kenya 2025 Election Risk Monitor

    Kenya 2025 Election Risk Monitor

    Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

    Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

  • Press Releases
    • All
    • Emergency Alerts
    • Media Coverage & Interviews
    • Official Statements

    President Obama Holds his Final Press Conference

    How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

    Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

    The heart of Nintendo’s new console isn’t the Switch

    Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

    Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

    These delicious Balinese street foods you need to try right now

  • Security Tips
    • All
    • Community Vigilance Tips
    • Digital Security & Cyber Hygiene
    • Personal Safety Guidelines
    Youth on the Radar: Preventing Recruitment Through Peer Networks

    Youth on the Radar: Preventing Recruitment Through Peer Networks

    Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

    Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

    Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

    Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

    Digital Footprint Awareness: What You Share Could Endanger You

    Digital Footprint Awareness: What You Share Could Endanger You

    Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

    Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

    Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

    Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

No Result
View All Result
  • Home
  • Threat Landscape
    • All
    • Border Security
    • Cybersecurity & Digital Threats
    • Insurgencies & Armed Groups
    • Terrorism & Extremism
    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

  • Data & Analysis
    • All
    • Forecasts & Alerts
    • Infographics & Maps
    • Intelligence Briefs
    Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

    Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

    Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

    Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

    Northern Ghana: Pre-Harvest Kidnap Threat Spike

    Northern Ghana: Pre-Harvest Kidnap Threat Spike

    Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

    Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

    Kenya 2025 Election Risk Monitor

    Kenya 2025 Election Risk Monitor

    Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

    Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

  • Press Releases
    • All
    • Emergency Alerts
    • Media Coverage & Interviews
    • Official Statements

    President Obama Holds his Final Press Conference

    How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

    Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

    The heart of Nintendo’s new console isn’t the Switch

    Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

    Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

    These delicious Balinese street foods you need to try right now

  • Security Tips
    • All
    • Community Vigilance Tips
    • Digital Security & Cyber Hygiene
    • Personal Safety Guidelines
    Youth on the Radar: Preventing Recruitment Through Peer Networks

    Youth on the Radar: Preventing Recruitment Through Peer Networks

    Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

    Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

    Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

    Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

    Digital Footprint Awareness: What You Share Could Endanger You

    Digital Footprint Awareness: What You Share Could Endanger You

    Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

    Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

    Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

    Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

No Result
View All Result
Africa Security Report
No Result
View All Result
Home Data & Analysis Infographics & Maps

ISIS-Linked Militant Activity in Africa: Continental Threat Assessment

The best way to pay for a lovely moment is to enjoy it.

Kotin by Kotin
May 22, 2025
in Data & Analysis, Infographics & Maps
0
ISIS-Linked Militant Activity in Africa: Continental Threat Assessment
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

Over the past decade, Africa has emerged as a primary frontier in the global jihadist insurgency, with ISIS-affiliated groups capitalizing on weak governance, ethnic divisions, and ungoverned spaces. The transformation of Africa from a secondary battlefield into a central theater of extremist violence marks a dangerous evolution in the continent’s security landscape. These groups are no longer isolated, local actors but parts of a transnational network, emboldened by battlefield successes, illicit funding flows, and sophisticated digital propaganda. From the deserts of Libya to the coasts of Mozambique, ISIS affiliates are entrenched, adaptive, and expanding.

This comprehensive report maps the geostrategic trajectory of ISIS across the continent—layered with incident data, regional analyses, and organizational profiles—offering actionable insights for counterterrorism stakeholders.

“The map we unveil today reflects a sobering reality — ISIS is no longer a distant threat; its affiliates are entrenched in Africa’s heartlands, exploiting governance gaps, local grievances, and porous borders.”
— Emmanuel Kotin, Executive Director, Africa Centre for Counter Terrorism (ACCT)

ISIS Expansion into Africa

ISIS’s pivot to Africa was driven by battlefield defeats in Iraq and Syria (2016–2019). As its Middle Eastern caliphate crumbled, Africa’s ungoverned spaces and existing jihadist networks provided fertile ground for regrouping and expansion.

  • Nigeria: Boko Haram splintered, leading to the birth of ISWAP in 2015.
  • Sahel: ISIS in the Greater Sahara (IS-GS) emerged from former MUJAO elements.
  • Central & East Africa: Congolese ADF and Mozambican insurgents pledged allegiance, giving rise to ISIS-Central Africa Province (ISCAP).

2. Regional Analysis

North Africa
Countries: Libya, Egypt, Tunisia

  • Libya: ISIS cells continue to train, recruit, and facilitate arms flows via southern corridors (Fezzan).
  • Egypt: IS-Sinai Province maintains resilience despite joint security crackdowns.
  • Tunisia: Faces threats from both returnees and domestic radicalization, especially in border regions.

West Africa
Groups: ISWAP, ISGS

  • ISWAP: Focuses on targeted assassinations, propaganda distribution, and governance via Sharia rule.
  • ISGS: Utilizes mobility and cross-border sanctuaries in the tri-border area for coordinated strikes.

East Africa
Group: ADF (ISIS-CA)

  • Based in eastern DRC, responsible for hundreds of deaths annually.
  • Sophisticated attacks, including IEDs and cross-border raids into Uganda.

Central Africa
Territories: DRC, Mozambique

  • ADF expansion into North Kivu and Ituri.
  • Mozambique’s Cabo Delgado insurgency destabilizes coastal development zones.

Southern Africa

  • Mozambique: Persistent violence in gas-rich zones.
  • South Africa: Growing concern over online radicalization and youth recruitment.

3. Key Groups and Affiliates

Group Region Notable Activities
ISWAP Nigeria, Niger, Cameroon Ambushes, base attacks, Sharia governance
ISIS-Greater Sahara Mali, Burkina Faso, Niger Guerrilla raids, IEDs, civilian massacres
ADF (ISIS-CA) DRC, Uganda Beheadings, jailbreaks, cross-border infiltration
ISIS-Mozambique Cabo Delgado Attacks on LNG sites, displacement campaigns
ISIS-Libya Sirte, Derna, Fezzan Recruitment, arms trafficking, training camps

4. Recruitment Strategies and Digital Propaganda

  • Use of encrypted messaging platforms (Telegram, Rocket.Chat).
  • Propaganda themes include anti-imperialism, victimhood, and utopian Islam.
  • Target demographics: disenfranchised youth, ex-convicts, displaced persons.
  • Content localized in Hausa, Swahili, Arabic, French.

5. Arms Flow and Funding Channels

Weapons Sources:

  • Post-2011 Libyan stockpiles
  • Cross-border smuggling from Sudan, Chad, and South Sudan
  • Capture from state security installations

Funding Streams:

  • Kidnapping-for-Ransom (KFR)
  • Smuggling: gold (Burkina Faso), charcoal (Somalia), drugs (Sahel)
  • Gulf donations laundered through informal hawala networks
  • Cryptocurrency transfers increasing post-2020

6. Counterterrorism Responses and Regional Gaps

Successes:

  • French-led Operation Barkhane (now dissolved)
  • AU-ECOWAS joint task forces in Sahel and Lake Chad
  • U.S. drone surveillance in Horn of Africa

Gaps:

  • Inadequate coordination among national forces
  • Intelligence silos and minimal real-time sharing
  • Underfunded border monitoring and surveillance tech

7. Emerging Hotspots and Future Forecasts

  • DRC: Intensification in Ituri and North Kivu by ADF.
  • Ghana-Togo-Benin: Frontier zones face militant infiltration from Burkina Faso.
  • Mozambique: Insurgents pivot inland after naval pressure.
  • South Africa & Kenya: Rise in extremist digital footprints, recruitment cells.

8. Policy Recommendations

To African Governments & RECs:

  • Modernize border surveillance systems (drones, satellites, biometrics)
  • Develop community-based counter-radicalization programs
  • Reintegration and skills training for repentant fighters

To AU, ECOWAS, and International Partners:

  • Expand real-time cross-border intelligence cooperation
  • Provide sustainable funding for ISR (intelligence, surveillance, reconnaissance)
  • Address root causes: unemployment, poor governance, identity marginalization

 

Post Views: 42
Previous Post

Valentino Rossi: Maverick Vinales can fight for title with Yamaha

Next Post

Snapchat ex-employee claims company faked growth stats to boost value

Kotin

Kotin

Next Post

Snapchat ex-employee claims company faked growth stats to boost value

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Browse by Category

  • Border Security
  • Community Vigilance Tips
  • Cybersecurity & Digital Threats
  • Data & Analysis
  • Digital Security & Cyber Hygiene
  • Emergency Alerts
  • Forecasts & Alerts
  • Infographics & Maps
  • Insurgencies & Armed Groups
  • Intelligence Briefs
  • Media Coverage & Interviews
  • Official Statements
  • Personal Safety Guidelines
  • Press Releases
  • Security Tips
  • Terrorism & Extremism
  • Threat Landscape
  • Uncategorized
  • Cart
  • Checkout
  • Demo
  • Home
  • Home 1
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • My account
  • Sample Page
  • Shop

© 2025 ACCT — Africa Centre for Counter Terrorism Reports. Proudly maintained by Ofori Michael.

No Result
View All Result
  • Home
  • Threat Landscape
  • Data & Analysis
  • Press Releases
  • Security Tips

© 2025 ACCT — Africa Centre for Counter Terrorism Reports. Proudly maintained by Ofori Michael.