• About
  • Advertise
  • Privacy & Policy
  • Contact
Africa Security Report
Advertisement
  • Home
  • Threat Landscape
    • All
    • Border Security
    • Cybersecurity & Digital Threats
    • Insurgencies & Armed Groups
    • Terrorism & Extremism
    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Shooting More than 40 Years of New York’s Halloween Parade

    Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Trending Tags

    • Data & Analysis
      • All
      • Forecasts & Alerts
      • Infographics & Maps
      • Intelligence Briefs
      Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

      Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

      Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

      Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

      Northern Ghana: Pre-Harvest Kidnap Threat Spike

      Northern Ghana: Pre-Harvest Kidnap Threat Spike

      Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

      Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

      Kenya 2025 Election Risk Monitor

      Kenya 2025 Election Risk Monitor

      Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

      Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

      Trending Tags

      • Press Releases
        • All
        • Emergency Alerts
        • Media Coverage & Interviews
        • Official Statements

        President Obama Holds his Final Press Conference

        How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

        Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

        The heart of Nintendo’s new console isn’t the Switch

        Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

        Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

        These delicious Balinese street foods you need to try right now

        Trending Tags

        • Security Tips
          • All
          • Community Vigilance Tips
          • Digital Security & Cyber Hygiene
          • Personal Safety Guidelines
          Youth on the Radar: Preventing Recruitment Through Peer Networks

          Youth on the Radar: Preventing Recruitment Through Peer Networks

          Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

          Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

          Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

          Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

          Digital Footprint Awareness: What You Share Could Endanger You

          Digital Footprint Awareness: What You Share Could Endanger You

          Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

          Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

          Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

          Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

        No Result
        View All Result
        • Home
        • Threat Landscape
          • All
          • Border Security
          • Cybersecurity & Digital Threats
          • Insurgencies & Armed Groups
          • Terrorism & Extremism
          Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

          Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

          Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

          Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

          Shooting More than 40 Years of New York’s Halloween Parade

          Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

          The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

          The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

          Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

          Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

          Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

          Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

          Trending Tags

          • Data & Analysis
            • All
            • Forecasts & Alerts
            • Infographics & Maps
            • Intelligence Briefs
            Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

            Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

            Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

            Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

            Northern Ghana: Pre-Harvest Kidnap Threat Spike

            Northern Ghana: Pre-Harvest Kidnap Threat Spike

            Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

            Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

            Kenya 2025 Election Risk Monitor

            Kenya 2025 Election Risk Monitor

            Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

            Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

            Trending Tags

            • Press Releases
              • All
              • Emergency Alerts
              • Media Coverage & Interviews
              • Official Statements

              President Obama Holds his Final Press Conference

              How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

              Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

              The heart of Nintendo’s new console isn’t the Switch

              Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

              Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

              These delicious Balinese street foods you need to try right now

              Trending Tags

              • Security Tips
                • All
                • Community Vigilance Tips
                • Digital Security & Cyber Hygiene
                • Personal Safety Guidelines
                Youth on the Radar: Preventing Recruitment Through Peer Networks

                Youth on the Radar: Preventing Recruitment Through Peer Networks

                Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

                Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

                Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

                Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

                Digital Footprint Awareness: What You Share Could Endanger You

                Digital Footprint Awareness: What You Share Could Endanger You

                Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

                Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

                Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

                Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

              No Result
              View All Result
              Africa Security Report
              No Result
              View All Result
              Home Data & Analysis

              Terror-Tech Tactics: Encrypted Messaging and Bitcoin in Burkina Faso

              Kotin by Kotin
              May 24, 2025
              in Data & Analysis, Intelligence Briefs
              0
              Terror-Tech Tactics: Encrypted Messaging and Bitcoin in Burkina Faso
              0
              SHARES
              3
              VIEWS
              Share on FacebookShare on Twitter

              Between 2022 and 2025, terrorist groups operating within Burkina Faso—chiefly ISIS-Greater Sahara (ISGS) and Jama’at Nasr al-Islam wal Muslimin (JNIM)—have embraced encrypted communication platforms and decentralized cryptocurrencies to bolster their recruitment, logistical coordination, financial flows, and operational security. These digital tactics have allowed jihadist cells to bypass traditional surveillance mechanisms, build resilient funding pipelines, and maintain control over increasingly fragmented and volatile territories.

              Field intelligence, digital forensic analysis, open-source monitoring, and regional counterterrorism briefings confirm that jihadists now use end-to-end encrypted platforms such as Telegram, Signal, and Element (Matrix) to coordinate attacks, plan logistics, and disseminate propaganda. Simultaneously, groups receive funding in Bitcoin and Monero through foreign sympathizers and dark web intermediaries, then convert those assets via peer-to-peer (P2P) exchanges and rural mobile money agents to finance real-world insurgency operations.

              “The battlefield has shifted. Our enemies are not only hiding in the bush—they’re hiding behind encrypted chats and blockchain addresses. If we don’t innovate our intelligence capabilities, we will lose the war before the next shot is fired.” — Emmanuel Kotin, Executive Director, Africa Center for Counter Terrorism


              The Digital Evolution of Terrorism in West Africa

              Globally, terrorist groups have leveraged digital anonymity to circumvent international sanctions and surveillance. In West Africa, this trend accelerated as state security infrastructures eroded across the Sahel. Encrypted messaging platforms and cryptocurrencies have emerged as the preferred tools for jihadist movements. Groups like ISGS and JNIM now use these tools not only for secrecy but also for mobility, decentralization, and ideological dissemination.


              II. Burkina Faso’s Security Landscape (2022–2025)

              Burkina Faso’s political instability—including two military coups in 2022—and ongoing military setbacks have led to a vacuum in the country’s northern and eastern regions. Jihadist forces control entire provinces, effectively replacing the state in many areas. The collapse of formal authority has allowed extremists to operate parallel systems for justice, taxation, and communications—including digital networks that are immune to state surveillance.


              III. Encrypted Messaging Platforms in Use

              ISGS and JNIM operatives rely on a suite of encrypted platforms:

              • Telegram: Primary channel for propaganda, recruitment, and updates

              • Signal and Threema: Used for sensitive tactical coordination

              • Element (Matrix protocol): Offers decentralized, private server deployment

              • WhatsApp: Still used among foot soldiers for day-to-day communication

              These platforms are often set to auto-delete messages, employ disappearing media, and prevent screenshots. Operational groups also create duplicate or rotating channels to evade content takedown.


              IV. Patterns of Use

              Communication:

              • Real-time attack coordination via voice or text

              • Propaganda uploads, including beheading videos and sharia law tutorials

              • Negotiation of ransom demands from kidnappings

              Recruitment:

              • Sharing of digital pamphlets, audio sermons, and “call-to-jihad” videos

              • Interactive Q&A with new recruits via anonymous groups

              • Offering technical OpSec guides for mobile phone hygiene

              Meetings:

              • Scheduled group chats for emirs and lieutenants

              • Private invitation-only discussion boards on ideological training


              V. Case Study: The Djibo Axis

              In late 2023, intercepted data from a captured JNIM courier revealed that militants used Telegram channels to coordinate an ambush on a military convoy outside Djibo. The operation was remotely overseen by a commander in Arbinda, who used encrypted maps and live updates to redirect fighters. Intelligence confirmed that the militants used Signal for fallback coordination and paid local scouts via mobile money wallets linked to Bitcoin conversions.


              VI. Bitcoin and Cryptocurrency Networks

              ISGS and JNIM receive external funding through the following channels:

              • Bitcoin and Monero donations from overseas sympathizers

              • Dark web wallets registered on foreign-based crypto platforms

              • USDT transactions routed through illicit exchange hubs in Niger and Libya

              Once received, funds are converted via:

              • P2P crypto marketplaces (e.g., Paxful, LocalBitcoins)

              • Third-party mobile money vendors operating in conflict zones

              • Local gold and cattle traders willing to exchange crypto for cash


              VII. Digital Financial Infrastructure Gaps in Burkina Faso

              Burkina Faso lacks a comprehensive framework to monitor crypto activity. Weak know-your-customer (KYC) and anti-money laundering (AML) enforcement allows jihadists to exploit mobile payment apps and rural cash-out agents. Telecom providers and mobile money platforms have limited oversight of suspicious transactions, particularly in regions without law enforcement presence.


              VIII. Cross-Border Digital Finance Routes

              Crypto funds flow into Burkina Faso via multiple vectors:

              • From Niger: Through black-market exchanges in Niamey

              • From Mali: Via routes near Gao, controlled by ISGS affiliates

              • From Libya: Laundered through arms-for-crypto networks

              • From Nigeria: Through cyber fraud syndicates and diaspora donations


              IX. Social Media and Dark Web Integration

              Jihadist-linked content has been identified on:

              • Encrypted chat forums with dark web links to wallet donations

              • Social media pages disguised as Islamic study groups

              • Messaging bots that distribute malware and propaganda simultaneously


              X. Operational Security (OpSec) Training in the Field

              Captured training manuals and recruit interviews reveal:

              • Courses on SIM card rotation, IMEI masking, and metadata deletion

              • Field protocols for disabling GPS, microphones, and Bluetooth

              • Use of Faraday bags to transport sensitive digital devices


              XI. Youth Recruitment through Encrypted Media

              Encrypted media channels appeal to tech-savvy youth:

              • Emphasizing narratives of state failure and anti-colonial resistance

              • Promising digital anonymity and crypto stipends for loyalty

              • Mobilizing marginalized youth in urban and rural zones with tailored content


              XII. Challenges for Burkina Faso’s Cyber Intelligence Units

              • Limited access to advanced digital forensic tools

              • Minimal collaboration with global cybercrime platforms

              • Lack of real-time access to ISP data and encrypted traffic metadata

              • Underfunded cyber units and inconsistent training


              XIII. Regional Risk Projection

              Jihadist tech strategies used in Burkina Faso are spreading into:

              • Ghana: Especially Upper East and Savannah Regions

              • Togo and Benin: Along trans-border Fulani communities

              • Coastal West Africa: Targeting digital youth through Telegram and TikTok jihadism


              XIV. International Money Trails

              Monitoring suggests:

              • Contributions from Gulf-based donors using untraceable crypto

              • Diaspora remittances via cryptocurrency disguised as aid

              • Hawala operators laundering digital assets into physical cash


              XV. Government Response and Legislative Gaps

              Burkina Faso lacks a specialized cyber-terrorism framework. While anti-cybercrime laws exist, enforcement is patchy. The central bank has no real-time monitoring of crypto exchanges, and financial intelligence units are under-resourced. Inter-ministerial coordination remains weak.


              XVI. Private Sector & ISP Collaboration Failures

              • ISPs lack regulatory incentives to cooperate with cyber investigations

              • Mobile money operators fail to flag high-risk transactions

              • Crypto exchange platforms remain unlicensed and unmonitored


              XVII. Policy Recommendations

              For national governments, regional blocs, and international bodies:

              • Mandate KYC/AML compliance across all crypto and mobile platforms

              • Fund training for cyber units and forensic specialists

              • Create a regional anti-crypto terror taskforce (under ECOWAS or G5 Sahel)

              • Partner with Chainalysis, Elliptic, and Europol for wallet tracing

              • Build legal frameworks that compel ISPs and fintech to report threats


              XVIII. Forecast (2025–2026)

              • ISGS and JNIM likely to scale up drone use via encrypted platforms

              • Encrypted platforms will integrate AI chatbots for recruitment

              • Dark web financing networks expected to triple in reach

              • Risk of Bitcoin-funded attacks in Ghana or Benin increasing


              The convergence of jihadist ideology with decentralized digital tools has produced a hybrid threat—part guerrilla insurgency, part encrypted network. Burkina Faso now represents a frontline in this evolution. Defeating this threat requires more than boots on the ground. It demands a fusion of cyber intelligence, financial forensics, and cross-border cooperation tailored to the complexities of digital insurgency.

              Previous Post

              Chad-Libya Arms Flow Alert

              Next Post

              G5 Sahel Troop Drawdown: Security Vacuum Alert

              Kotin

              Kotin

              Next Post
              G5 Sahel Troop Drawdown: Security Vacuum Alert

              G5 Sahel Troop Drawdown: Security Vacuum Alert

              Leave a Reply Cancel reply

              Your email address will not be published. Required fields are marked *

              Stay Connected test

              • 23.9k Followers
              • 99 Subscribers
              • Trending
              • Comments
              • Latest
              Moroccan Security Forces Disrupt ISIS Cell Plotting Attacks on Critical Infrastructure

              Moroccan Security Forces Disrupt ISIS Cell Plotting Attacks on Critical Infrastructure

              May 20, 2025
              Al-Shabaab Expands Reach: Somali-Based Militants Claim Responsibility for Deadly Raid in Kenya’s Garissa County

              Al-Shabaab Expands Reach: Somali-Based Militants Claim Responsibility for Deadly Raid in Kenya’s Garissa County

              May 19, 2025
              West African Sextortion Ring Dismantled Following California Teen’s Tragic Suicide

              West African Sextortion Ring Dismantled Following California Teen’s Tragic Suicide

              May 18, 2025
              Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

              Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

              May 23, 2025
              Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

              Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

              0
              Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

              Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

              0
              Northern Ghana: Pre-Harvest Kidnap Threat Spike

              Northern Ghana: Pre-Harvest Kidnap Threat Spike

              0
              Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

              Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

              0
              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              May 27, 2025
              Digital Footprint Awareness: What You Share Could Endanger You

              Digital Footprint Awareness: What You Share Could Endanger You

              May 27, 2025

              Recent News

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              May 27, 2025
              Digital Footprint Awareness: What You Share Could Endanger You

              Digital Footprint Awareness: What You Share Could Endanger You

              May 27, 2025
              Africa Security Report

              Tracking Africa’s Security Threats. Informing Africa’s Future.

              Follow Us

              Browse by Category

              • Border Security
              • Community Vigilance Tips
              • Cybersecurity & Digital Threats
              • Data & Analysis
              • Digital Security & Cyber Hygiene
              • Emergency Alerts
              • Forecasts & Alerts
              • Infographics & Maps
              • Insurgencies & Armed Groups
              • Intelligence Briefs
              • Media Coverage & Interviews
              • Official Statements
              • Personal Safety Guidelines
              • Press Releases
              • Security Tips
              • Terrorism & Extremism
              • Threat Landscape
              • Uncategorized

              Recent News

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              • About
              • Advertise
              • Privacy & Policy
              • Contact

              © 2025 ACCT - Africa Centre For Counter Terrorism Reports & Maintain by Abdulhamid Muhammad

              No Result
              View All Result

              © 2025 ACCT - Africa Centre For Counter Terrorism Reports & Maintain by Abdulhamid Muhammad