0 0
Read Time:53 Second

Lake Chad: The destabilization of northeastern Nigeria has led to an uptick in mass kidnappings of schoolchildren. Islamic State militants in Nigeria targeted security forces and aid workers.

Sahel: An Islamic State affiliate disrupted presidential elections in western Niger.

Somalia. Al Shabaab doubled attacks in the capital since January amid political unrest.

Kenya: Al Shabaab is exerting increasing social control in parts of northeastern Kenya.

Ethiopia: Fighting is ongoing in the Tigray region in northeastern Ethiopia. A related border dispute has also raised tensions between Ethiopia and Sudan.

Libya: Delays and accusations signal danger for the new Libyan transitional government.

Mozambique: Hundreds of people were killed when ISIS took over the town of palma

BOKO HARAM

More than 30,000 people have been killed and nearly 3 million displaced in a decade of Boko Haram’s terror activities in Nigeria, according to the UN Office for the Coordination of Humanitarian Affairs.

Violence committed by Boko Haram has affected 26 million people in the Lake Chad region and displaced 2.6 million others, according to the UN Refugee Agency.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence