• About
  • Advertise
  • Privacy & Policy
  • Contact
Africa Security Report
Advertisement
  • Home
  • Threat Landscape
    • All
    • Border Security
    • Cybersecurity & Digital Threats
    • Insurgencies & Armed Groups
    • Terrorism & Extremism
    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Shooting More than 40 Years of New York’s Halloween Parade

    Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Trending Tags

    • Data & Analysis
      • All
      • Forecasts & Alerts
      • Infographics & Maps
      • Intelligence Briefs
      Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

      Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

      Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

      Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

      Northern Ghana: Pre-Harvest Kidnap Threat Spike

      Northern Ghana: Pre-Harvest Kidnap Threat Spike

      Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

      Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

      Kenya 2025 Election Risk Monitor

      Kenya 2025 Election Risk Monitor

      Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

      Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

      Trending Tags

      • Press Releases
        • All
        • Emergency Alerts
        • Media Coverage & Interviews
        • Official Statements

        President Obama Holds his Final Press Conference

        How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

        Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

        The heart of Nintendo’s new console isn’t the Switch

        Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

        Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

        These delicious Balinese street foods you need to try right now

        Trending Tags

        • Security Tips
          • All
          • Community Vigilance Tips
          • Digital Security & Cyber Hygiene
          • Personal Safety Guidelines
          Youth on the Radar: Preventing Recruitment Through Peer Networks

          Youth on the Radar: Preventing Recruitment Through Peer Networks

          Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

          Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

          Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

          Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

          Digital Footprint Awareness: What You Share Could Endanger You

          Digital Footprint Awareness: What You Share Could Endanger You

          Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

          Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

          Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

          Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

        No Result
        View All Result
        • Home
        • Threat Landscape
          • All
          • Border Security
          • Cybersecurity & Digital Threats
          • Insurgencies & Armed Groups
          • Terrorism & Extremism
          Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

          Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

          Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

          Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

          Shooting More than 40 Years of New York’s Halloween Parade

          Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

          The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

          The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

          Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

          Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

          Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

          Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

          Trending Tags

          • Data & Analysis
            • All
            • Forecasts & Alerts
            • Infographics & Maps
            • Intelligence Briefs
            Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

            Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

            Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

            Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

            Northern Ghana: Pre-Harvest Kidnap Threat Spike

            Northern Ghana: Pre-Harvest Kidnap Threat Spike

            Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

            Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

            Kenya 2025 Election Risk Monitor

            Kenya 2025 Election Risk Monitor

            Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

            Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

            Trending Tags

            • Press Releases
              • All
              • Emergency Alerts
              • Media Coverage & Interviews
              • Official Statements

              President Obama Holds his Final Press Conference

              How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

              Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

              The heart of Nintendo’s new console isn’t the Switch

              Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

              Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

              These delicious Balinese street foods you need to try right now

              Trending Tags

              • Security Tips
                • All
                • Community Vigilance Tips
                • Digital Security & Cyber Hygiene
                • Personal Safety Guidelines
                Youth on the Radar: Preventing Recruitment Through Peer Networks

                Youth on the Radar: Preventing Recruitment Through Peer Networks

                Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

                Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

                Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

                Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

                Digital Footprint Awareness: What You Share Could Endanger You

                Digital Footprint Awareness: What You Share Could Endanger You

                Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

                Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

                Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

                Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

              No Result
              View All Result
              Africa Security Report
              No Result
              View All Result
              Home Threat Landscape Terrorism & Extremism

              Boko Haram Resurgence: Nigerian Troops Clash with Insurgents in Borno as Sleeper Cells Reactivate

              The best way to pay for a lovely moment is to enjoy it.

              Kotin by Kotin
              May 20, 2025
              in Terrorism & Extremism, Threat Landscape
              0
              Boko Haram Resurgence: Nigerian Troops Clash with Insurgents in Borno as Sleeper Cells Reactivate
              0
              SHARES
              1
              VIEWS
              Share on FacebookShare on Twitter

              In a troubling development, Nigerian military forces have engaged in a series of fierce clashes with Boko Haram militants in the northeastern state of Borno, reigniting fears of a larger resurgence. The firefights—centered around Konduga, Gwoza, and Damboa—were triggered by intelligence reports indicating the reactivation of dormant sleeper cells across the Lake Chad basin.

              At least 26 insurgents have been killed, 9 soldiers wounded, and multiple IEDs uncovered. Authorities say the Islamic State West Africa Province (ISWAP), a breakaway faction of Boko Haram, is also involved in coordinated operations, hinting at renewed tactical collaboration between rival jihadist groups once thought fragmented.

              Casualties and Humanitarian Fallout

              • Civilian Deaths: 11 confirmed, including 3 children caught in crossfire

              • Military Casualties: 9 soldiers injured, 2 vehicles damaged

              • Displacement: Over 3,200 civilians have fled newly volatile areas around Gwoza and Konduga

              • Schools Closed: 7 government primary and secondary schools have been shut as a precaution

              Humanitarian agencies report growing food insecurity and psychosocial trauma in IDP camps, where overcrowding and disease outbreaks now pose secondary risks.

              Insurgent Tactics: A Shift in Strategy

              Field intelligence suggests Boko Haram and ISWAP have adopted a “shadow insurgency” model—favoring smaller, unpredictable attacks, temporary occupation of villages, and targeted kidnappings. They also appear to be recruiting via encrypted messaging apps and through radical clerical networks in Nigeria and neighboring countries.

              Recent intercepted communications refer to “Operation Istiqamah”, believed to be an internal code for coordinated sleeper cell activation.

              “Their aim now is not total occupation—it’s disruption, destabilization, and soft-target exploitation,”
              — ACCT Counterterrorism Analyst, Abuja

              Strategic Commentary: Emmanuel Kotin, Executive Director, ACCT

              “The reactivation of Boko Haram sleeper cells in Borno is a critical inflection point. We are no longer dealing with isolated raids; we are witnessing the reconfiguration of terrorist strategy—blending ideology, technology, and local grievances into a potent threat.”

              “Unless regional actors prioritize synchronized intelligence, border surveillance, and community-based counter-radicalization, the Lake Chad basin risks becoming a permanent zone of jihadist entrenchment.”

              “Nigeria must also reevaluate the current reintegration models. While amnesty and rehabilitation have value, poorly monitored reabsorption risks recycling violence under new labels.”

              Policy Recommendations and Forward Outlook

              1. Launch a regional intelligence-sharing task force focused on Lake Chad insurgent migration patterns.

              2. Deploy high-altitude drones to monitor movement corridors across Sambisa Forest and Mandara Mountains.

              3. Strengthen reintegration vetting protocols, ensuring de-radicalization is thorough and community-approved.

              4. Increase humanitarian funding to IDP camps to prevent extremism-driven recruitment.

              5. Engage clerics and religious networks to counter online and offline radicalization narratives.

              Nigeria’s Fight Enters a New Phase

              Boko Haram’s apparent resurgence, underscored by renewed violence and reactivated sleeper networks, marks a dangerous evolution in the group’s operational framework. While tactical victories may be won in the short term, defeating insurgency in the northeast will require a shift from reactive military responses to proactive, multidimensional strategies.

              The Africa Center for Counter Terrorism (ACCT) will continue to monitor developments and provide open-source intelligence and strategic recommendations to governments, civil society, and regional partners committed to lasting peace in West Africa.

              Previous Post

              M23 Rebels Advance in Eastern DRC as Ceasefire Talks Stall and Civilians Flee

              Next Post

              ISIS-Linked Militants Seize Strategic Villages in Northern Mozambique as Insurgency Regroups

              Kotin

              Kotin

              Next Post
              ISIS-Linked Militants Seize Strategic Villages in Northern Mozambique as Insurgency Regroups

              ISIS-Linked Militants Seize Strategic Villages in Northern Mozambique as Insurgency Regroups

              Leave a Reply Cancel reply

              Your email address will not be published. Required fields are marked *

              Stay Connected test

              • 23.9k Followers
              • 99 Subscribers
              • Trending
              • Comments
              • Latest
              Moroccan Security Forces Disrupt ISIS Cell Plotting Attacks on Critical Infrastructure

              Moroccan Security Forces Disrupt ISIS Cell Plotting Attacks on Critical Infrastructure

              May 20, 2025
              Al-Shabaab Expands Reach: Somali-Based Militants Claim Responsibility for Deadly Raid in Kenya’s Garissa County

              Al-Shabaab Expands Reach: Somali-Based Militants Claim Responsibility for Deadly Raid in Kenya’s Garissa County

              May 19, 2025
              West African Sextortion Ring Dismantled Following California Teen’s Tragic Suicide

              West African Sextortion Ring Dismantled Following California Teen’s Tragic Suicide

              May 18, 2025
              Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

              Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

              May 23, 2025
              Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

              Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

              0
              Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

              Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

              0
              Northern Ghana: Pre-Harvest Kidnap Threat Spike

              Northern Ghana: Pre-Harvest Kidnap Threat Spike

              0
              Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

              Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

              0
              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              May 27, 2025
              Digital Footprint Awareness: What You Share Could Endanger You

              Digital Footprint Awareness: What You Share Could Endanger You

              May 27, 2025

              Recent News

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              May 27, 2025
              Digital Footprint Awareness: What You Share Could Endanger You

              Digital Footprint Awareness: What You Share Could Endanger You

              May 27, 2025
              Africa Security Report

              Tracking Africa’s Security Threats. Informing Africa’s Future.

              Follow Us

              Browse by Category

              • Border Security
              • Community Vigilance Tips
              • Cybersecurity & Digital Threats
              • Data & Analysis
              • Digital Security & Cyber Hygiene
              • Emergency Alerts
              • Forecasts & Alerts
              • Infographics & Maps
              • Insurgencies & Armed Groups
              • Intelligence Briefs
              • Media Coverage & Interviews
              • Official Statements
              • Personal Safety Guidelines
              • Press Releases
              • Security Tips
              • Terrorism & Extremism
              • Threat Landscape
              • Uncategorized

              Recent News

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              • About
              • Advertise
              • Privacy & Policy
              • Contact

              © 2025 ACCT - Africa Centre For Counter Terrorism Reports & Maintain by Abdulhamid Muhammad

              No Result
              View All Result

              © 2025 ACCT - Africa Centre For Counter Terrorism Reports & Maintain by Abdulhamid Muhammad