• About
  • Advertise
  • Privacy & Policy
  • Contact
Africa Security Report
Advertisement
  • Home
  • Threat Landscape
    • All
    • Border Security
    • Cybersecurity & Digital Threats
    • Insurgencies & Armed Groups
    • Terrorism & Extremism
    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

    Shooting More than 40 Years of New York’s Halloween Parade

    Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

    Trending Tags

    • Data & Analysis
      • All
      • Forecasts & Alerts
      • Infographics & Maps
      • Intelligence Briefs
      Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

      Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

      Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

      Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

      Northern Ghana: Pre-Harvest Kidnap Threat Spike

      Northern Ghana: Pre-Harvest Kidnap Threat Spike

      Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

      Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

      Kenya 2025 Election Risk Monitor

      Kenya 2025 Election Risk Monitor

      Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

      Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

      Trending Tags

      • Press Releases
        • All
        • Emergency Alerts
        • Media Coverage & Interviews
        • Official Statements

        President Obama Holds his Final Press Conference

        How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

        Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

        The heart of Nintendo’s new console isn’t the Switch

        Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

        Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

        These delicious Balinese street foods you need to try right now

        Trending Tags

        • Security Tips
          • All
          • Community Vigilance Tips
          • Digital Security & Cyber Hygiene
          • Personal Safety Guidelines
          Youth on the Radar: Preventing Recruitment Through Peer Networks

          Youth on the Radar: Preventing Recruitment Through Peer Networks

          Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

          Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

          Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

          Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

          Digital Footprint Awareness: What You Share Could Endanger You

          Digital Footprint Awareness: What You Share Could Endanger You

          Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

          Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

          Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

          Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

        No Result
        View All Result
        • Home
        • Threat Landscape
          • All
          • Border Security
          • Cybersecurity & Digital Threats
          • Insurgencies & Armed Groups
          • Terrorism & Extremism
          Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

          Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

          Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

          Nigeria-Cameroon Border Tensions Escalate After Deadly Cross-Border Militant Attacks

          Shooting More than 40 Years of New York’s Halloween Parade

          Border Boom or Breakdown? Kenya’s Smart Fence with Somalia Faces Technical, Tribal Challenges

          The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

          The Gold Route: How Illegal Mining and Arms Trafficking Undermine West Africa’s Borders

          Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

          Southern Africa’s Silent Invasion: Border Gaps Fuel Human Trafficking from Zimbabwe to South Africa

          Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

          Guns, Goods, and Ghost Routes: Unmasking Libya’s Border Chaos in the Post-Gaddafi Era

          Trending Tags

          • Data & Analysis
            • All
            • Forecasts & Alerts
            • Infographics & Maps
            • Intelligence Briefs
            Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

            Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

            Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

            Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

            Northern Ghana: Pre-Harvest Kidnap Threat Spike

            Northern Ghana: Pre-Harvest Kidnap Threat Spike

            Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

            Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

            Kenya 2025 Election Risk Monitor

            Kenya 2025 Election Risk Monitor

            Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

            Sudan’s Paramilitary War: Emerging Arms Corridors to South Sudan and CAR

            Trending Tags

            • Press Releases
              • All
              • Emergency Alerts
              • Media Coverage & Interviews
              • Official Statements

              President Obama Holds his Final Press Conference

              How this Nigerian woman went from aspiring developer to meeting Mark Zuckerberg

              Explore Morocco’s Desert and Seaside With These Stunning 35mm Images

              The heart of Nintendo’s new console isn’t the Switch

              Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

              Sahel on Fire: South African Intelligence Flags Growing Online Recruitment by Foreign Jihadist Networks

              These delicious Balinese street foods you need to try right now

              Trending Tags

              • Security Tips
                • All
                • Community Vigilance Tips
                • Digital Security & Cyber Hygiene
                • Personal Safety Guidelines
                Youth on the Radar: Preventing Recruitment Through Peer Networks

                Youth on the Radar: Preventing Recruitment Through Peer Networks

                Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

                Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

                Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

                Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

                Digital Footprint Awareness: What You Share Could Endanger You

                Digital Footprint Awareness: What You Share Could Endanger You

                Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

                Mobile Security 101: Locking Down Your Smartphone in a Surveillance Age

                Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

                Don’t Get Hooked: Spotting and Avoiding Online Scams in Africa

              No Result
              View All Result
              Africa Security Report
              No Result
              View All Result
              Home Threat Landscape Cybersecurity & Digital Threats

              West African Sextortion Ring Dismantled Following California Teen’s Tragic Suicide

              The best way to pay for a lovely moment is to enjoy it.

              Kotin by Kotin
              May 18, 2025
              in Cybersecurity & Digital Threats, Threat Landscape
              0
              West African Sextortion Ring Dismantled Following California Teen’s Tragic Suicide
              0
              SHARES
              11
              VIEWS
              Share on FacebookShare on Twitter

              In a significant breakthrough, international law enforcement agencies have dismantled a West African sextortion ring responsible for the 2022 suicide of 17-year-old Ryan Last from San Jose, California. The operation underscores the escalating threat of cyber-enabled sexual extortion and the imperative for robust countermeasures.

              The Tragic Case of Ryan Last

              In February 2022, Ryan Last, a high-achieving high school senior, fell victim to an online sextortion scheme. Believing he was communicating with a young woman on a social media platform, Ryan was coerced into sending explicit images. The perpetrator, later identified as Alfred Kassi from Côte d’Ivoire, demanded $5,000, threatening to disseminate the images. After Ryan paid $150, the harassment persisted, leading him to take his own life hours later.

              International Investigation and Arrests

              A collaborative investigation involving the FBI, San Jose Police Department, U.S. Department of Justice, and Ivorian authorities led to the arrest of four individuals in Côte d’Ivoire:

              • Alfred Kassi: The primary suspect who engaged directly with Ryan.

              • Oumarou Ouedraogo, Moussa Diaby, and Oumar Cisse: Accomplices involved in laundering the extorted funds.

              Due to Côte d’Ivoire’s non-extradition policy for its citizens, the suspects will face prosecution under Ivorian cybercrime laws.

              Expert Commentary

              Emmanuel Kotin, Executive Director and Security Analyst at the African Centre for Counter Terrorism, commented on the case:

              “The dismantling of this sextortion ring highlights the pervasive nature of cybercrime and its devastating impact on victims worldwide. It is imperative that African nations strengthen their cybersecurity frameworks and foster international cooperation to combat such transnational threats.”

              The Rise of ‘Hustle Academies’

              The operation also sheds light on the emergence of so-called “hustle academies” in West Africa—informal networks where individuals are trained in various online scams, including sextortion. These entities exploit socio-economic vulnerabilities, drawing youths into cybercriminal activities under the guise of economic empowerment.        

              Call to Action

              This case serves as a stark reminder of the urgent need for:

              • Enhanced Cybersecurity Measures: African nations must invest in cybersecurity infrastructure and training.

              • Public Awareness Campaigns: Educating the public, especially youths, about the dangers of online interactions and the tactics employed by cybercriminals.

              • International Collaboration: Strengthening partnerships between African law enforcement agencies and international bodies to effectively tackle cross-border cybercrime.

              Previous Post

              Al-Shabaab Expands Reach: Somali-Based Militants Claim Responsibility for Deadly Raid in Kenya’s Garissa County

              Next Post

              Interpol’s Operation Serengeti: Over 1,000 Arrested in Pan-African Cybercrime Crackdown

              Kotin

              Kotin

              Next Post
              Interpol’s Operation Serengeti: Over 1,000 Arrested in Pan-African Cybercrime Crackdown

              Interpol's Operation Serengeti: Over 1,000 Arrested in Pan-African Cybercrime Crackdown

              Leave a Reply Cancel reply

              Your email address will not be published. Required fields are marked *

              Stay Connected test

              • 23.9k Followers
              • 99 Subscribers
              • Trending
              • Comments
              • Latest
              Moroccan Security Forces Disrupt ISIS Cell Plotting Attacks on Critical Infrastructure

              Moroccan Security Forces Disrupt ISIS Cell Plotting Attacks on Critical Infrastructure

              May 20, 2025
              Al-Shabaab Expands Reach: Somali-Based Militants Claim Responsibility for Deadly Raid in Kenya’s Garissa County

              Al-Shabaab Expands Reach: Somali-Based Militants Claim Responsibility for Deadly Raid in Kenya’s Garissa County

              May 19, 2025
              West African Sextortion Ring Dismantled Following California Teen’s Tragic Suicide

              West African Sextortion Ring Dismantled Following California Teen’s Tragic Suicide

              May 18, 2025
              Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

              Cracks in the Fence: Smugglers and Militants Exploit Weak Sahel Borders

              May 23, 2025
              Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

              Sahel Flashpoint: Anticipated Surge in Cross-Border Raids (Q3 2025)

              0
              Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

              Nigeria’s Middle Belt Faces Renewed Bandit Insurgency

              0
              Northern Ghana: Pre-Harvest Kidnap Threat Spike

              Northern Ghana: Pre-Harvest Kidnap Threat Spike

              0
              Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

              Ghana’s Border Intelligence Brief: New Smuggling Route Tied to Sahel Jihadists

              0
              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              May 27, 2025
              Digital Footprint Awareness: What You Share Could Endanger You

              Digital Footprint Awareness: What You Share Could Endanger You

              May 27, 2025

              Recent News

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              Community Dialogue Against Hate: Strengthening Bonds to Deter Extremism

              May 27, 2025
              Digital Footprint Awareness: What You Share Could Endanger You

              Digital Footprint Awareness: What You Share Could Endanger You

              May 27, 2025
              Africa Security Report

              Tracking Africa’s Security Threats. Informing Africa’s Future.

              Follow Us

              Browse by Category

              • Border Security
              • Community Vigilance Tips
              • Cybersecurity & Digital Threats
              • Data & Analysis
              • Digital Security & Cyber Hygiene
              • Emergency Alerts
              • Forecasts & Alerts
              • Infographics & Maps
              • Insurgencies & Armed Groups
              • Intelligence Briefs
              • Media Coverage & Interviews
              • Official Statements
              • Personal Safety Guidelines
              • Press Releases
              • Security Tips
              • Terrorism & Extremism
              • Threat Landscape
              • Uncategorized

              Recent News

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              Youth on the Radar: Preventing Recruitment Through Peer Networks

              May 27, 2025
              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              Speak Up, Stay Safe: How to Report Suspicious Activity Without Retaliation

              May 27, 2025
              • About
              • Advertise
              • Privacy & Policy
              • Contact

              © 2025 ACCT - Africa Centre For Counter Terrorism Reports & Maintain by Abdulhamid Muhammad

              No Result
              View All Result

              © 2025 ACCT - Africa Centre For Counter Terrorism Reports & Maintain by Abdulhamid Muhammad