Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home/africase/public_html/wp-includes/functions.php on line 6131
  • Cart
  • Checkout
  • Demo
  • Home
  • Home 1
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • My account
  • Sample Page
  • Shop
Africa Security Report
Advertisement
  • Home
  • Threat Landscape
    • All
    • Border Security
    • Cybersecurity & Digital Threats
    • Insurgencies & Armed Groups
    • Terrorism & Extremism
    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

  • Data & Analysis
    • All
    • Forecasts & Alerts
    • Infographics & Maps
    • Intelligence Briefs
    Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

    Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

    Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

    Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

    Northern Ghana: Pre-Harvest Kidnap Threat Spike

    Northern Ghana: Pre-Harvest Kidnap Threat Spike

    Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

    Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

    Kenya 2025 Election Risk Monitor

    Kenya 2025 Election Risk Monitor

    Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

    Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

  • Press Releases
    • All
    • Emergency Alerts
    • Media Coverage & Interviews
    • Official Statements

    President Obama Holds his Final Press Conference

    How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

    Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

    The heart of Nintendo’s new console isn’t the Switch

    Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

    Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

    These delicious Balinese street foods you need to try right now

  • Security Tips
    • All
    • Community Vigilance Tips
    • Digital Security & Cyber Hygiene
    • Personal Safety Guidelines
    Youth on the Radar: Preventing Recruitment Through Peer Networks

    Youth on the Radar: Preventing Recruitment Through Peer Networks

    Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

    Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

    Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

    Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

    Digital Footprint Awareness: What You Share Could Endanger You

    Digital Footprint Awareness: What You Share Could Endanger You

    Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

    Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

    Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

    Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

No Result
View All Result
  • Home
  • Threat Landscape
    • All
    • Border Security
    • Cybersecurity & Digital Threats
    • Insurgencies & Armed Groups
    • Terrorism & Extremism
    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

  • Data & Analysis
    • All
    • Forecasts & Alerts
    • Infographics & Maps
    • Intelligence Briefs
    Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

    Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

    Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

    Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

    Northern Ghana: Pre-Harvest Kidnap Threat Spike

    Northern Ghana: Pre-Harvest Kidnap Threat Spike

    Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

    Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

    Kenya 2025 Election Risk Monitor

    Kenya 2025 Election Risk Monitor

    Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

    Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

  • Press Releases
    • All
    • Emergency Alerts
    • Media Coverage & Interviews
    • Official Statements

    President Obama Holds his Final Press Conference

    How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

    Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

    The heart of Nintendo’s new console isn’t the Switch

    Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

    Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

    These delicious Balinese street foods you need to try right now

  • Security Tips
    • All
    • Community Vigilance Tips
    • Digital Security & Cyber Hygiene
    • Personal Safety Guidelines
    Youth on the Radar: Preventing Recruitment Through Peer Networks

    Youth on the Radar: Preventing Recruitment Through Peer Networks

    Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

    Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

    Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

    Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

    Digital Footprint Awareness: What You Share Could Endanger You

    Digital Footprint Awareness: What You Share Could Endanger You

    Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

    Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

    Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

    Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

No Result
View All Result
Africa Security Report
No Result
View All Result
Home Threat Landscape Terrorism & Extremism

Moroccan Security Forces Disrupt ISIS Cell Plotting Attacks on Critical Infrastructure

The best way to pay for a lovely moment is to enjoy it.

Kotin by Kotin
May 20, 2025
in Terrorism & Extremism, Threat Landscape
0
Moroccan Security Forces Disrupt ISIS Cell Plotting Attacks on Critical Infrastructure
0
SHARES
20
VIEWS
Share on FacebookShare on TwitterShare on Telegram

Moroccan security services have successfully dismantled a highly organized ISIS-affiliated terror cell that was allegedly plotting synchronized attacks on critical national infrastructure, including power grids, transport hubs, and water treatment facilities in Rabat and Casablanca. According to an official communiqué from the General Directorate for Territorial Surveillance (DGST), the cell was in an advanced stage of operational planning, with recovered materials suggesting imminent execution.

This operation underscores Morocco’s central role in regional counterterrorism and its effectiveness in preempting threats through proactive surveillance, intelligence sharing, and digital counter-radicalization.

Operation Details: A Coordinated Counterterrorism Strike

The operation, dubbed “Tamnine 2025,” was carried out in the early hours of May 17 across four urban neighborhoods in the cities of Casablanca, Salé, and Temara. Key outcomes:

  • 5 suspected ISIS members arrested, aged 22–38, all Moroccan nationals

  • One suspect had previous ties to ISIS fighters in the Sahel, particularly Mali and Niger

  • Recovered Items:

    • A cache of explosive precursors, including ammonium nitrate

    • Remote detonation devices and timers

    • Drones modified for reconnaissance

    • Maps and schematics of Casablanca’s electrical grid and water supply lines

“These individuals were trained in operational security and counter-surveillance. Their targeting of infrastructure shows a shift from symbolic terror to strategic destabilization,”
— Moroccan Intelligence Officer, DGST

Why Target Infrastructure?

Unlike previous ISIS-inspired attacks in Morocco that focused on tourists or symbolic targets, this cell’s focus on infrastructure represents a tactical evolution.

Possible Objectives:

  • Create nationwide panic through cascading blackouts and utility disruptions

  • Undermine public trust in state stability and crisis response

  • Emulate IS-style attacks in Iraq and Syria, where infrastructure sabotage crippled post-conflict recovery

  • Trigger economic paralysis and damage Morocco’s international reputation as a secure investment hub

The Moroccan Ministry of Energy confirmed that no actual infrastructure was damaged, but it has since heightened security at national utility facilities.

The Digital Dimension of Radicalization

Investigators revealed that the suspects had been radicalized online via Telegram and encrypted chat groups, connecting them with ISIS propagandists based in the Sahel and parts of Europe. Materials recovered included:

  • PDFs of DIY explosive manuals

  • ISIS publications in Arabic and French

  • Instructions for bypassing surveillance technologies

  • Pledge of allegiance (Bay’ah) videos to the ISIS leadership

Digital footprints suggest attempted communication with ISIS-linked operatives in Mali’s Gao region, currently a hotbed of jihadist convergence.

Regional Implications

This foiled plot arrives as Morocco takes on greater security responsibilities in the Sahel, supporting ECOWAS efforts, while maintaining deep ties with Western intelligence agencies. Analysts warn that the North African kingdom is increasingly seen by jihadist groups as:

  • A symbol of Western alignment

  • A strategic chokepoint between Europe and the Sahel

  • A technologically advanced adversary with effective counterterrorism units

Government and Regional Response

The Moroccan government has since:

  • Elevated the national terror alert level

  • Ordered a comprehensive audit of security around public utilities

  • Requested further support from INTERPOL and the EUROPOL Cyber Intelligence Division

  • Hosted an emergency intelligence coordination session with partners from France, Algeria, and Spain

The African Union’s Peace and Security Council has issued a statement commending Morocco’s actions and calling for cross-border tracking of terror financing and cyber-radicalization.

Strategic Commentary: Emmanuel Kotin, Executive Director, ACCT

“The attempted sabotage of Morocco’s infrastructure is not just an attack on a country—it is an attack on the idea of stability in North Africa. Infrastructure is the backbone of national security, and jihadists now understand that disrupting water and power can create more chaos than a suicide bombing.”

“This case is a wake-up call for all African states: we must strengthen cyber surveillance, invest in protecting digital and physical infrastructure, and coordinate our intelligence efforts across borders. Morocco’s success must be a template—not an exception.”

ACCT Policy Recommendations

  1. Mandate infrastructure vulnerability audits across African capitals

  2. Develop joint North African counter-IED training programs

  3. Launch a continental cybersecurity threat-sharing platform

  4. Train utility workers in suspicious activity reporting and digital hygiene

  5. Support Morocco in building a regional infrastructure protection task force

Preemption Is the New Deterrence

The successful disruption of this ISIS cell highlights Morocco’s readiness, capability, and strategic foresight. It also sends a clear signal to extremist groups: Africa is no longer vulnerable by default. The battle for national resilience will be fought not just on battlefields, but in server rooms, control centers, and cyber space.

The Africa Center for Counter Terrorism (ACCT) stands committed to supporting Morocco and other nations in creating a proactive, intelligence-led, and tech-driven approach to defeating terrorism before it reaches the streets.

Post Views: 137
Previous Post

Commercial Bank of Ethiopia Glitch Leads to Unauthorized Withdrawals

Next Post

Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

Kotin

Kotin

Next Post
Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Browse by Category

  • Border Security
  • Community Vigilance Tips
  • Cybersecurity & Digital Threats
  • Data & Analysis
  • Digital Security & Cyber Hygiene
  • Emergency Alerts
  • Forecasts & Alerts
  • Infographics & Maps
  • Insurgencies & Armed Groups
  • Intelligence Briefs
  • Media Coverage & Interviews
  • Official Statements
  • Personal Safety Guidelines
  • Press Releases
  • Security Tips
  • Terrorism & Extremism
  • Threat Landscape
  • Uncategorized
Africa Security Report

Tracking Africa’s Security Threats. Informing Africa’s Future.

Follow Us

Recent News

Youth on the Radar: Preventing Recruitment Through Peer Networks

Youth on the Radar: Preventing Recruitment Through Peer Networks

May 27, 2025
Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

May 27, 2025
  • Home
  • Threat Landscape
  • Data & Analysis
  • Press Releases
  • Security Tips

© 2025 ACCT — Africa Centre for Counter Terrorism Reports. Proudly maintained by Ofori Michael.

No Result
View All Result
  • Home
  • Threat Landscape
  • Data & Analysis
  • Press Releases
  • Security Tips

© 2025 ACCT — Africa Centre for Counter Terrorism Reports. Proudly maintained by Ofori Michael.