Executive Summary

This comprehensive report analyzes security incidents in Nigeria from 2018 to 2024, utilizing a meticulously curated database indexed by risk factors and indicators. Nigeria continues to face significant security challenges across multiple fronts, with terrorism, banditry, communal conflicts, and kidnapping presenting persistent threats to national stability and citizen safety.

Over the past six years, security dynamics have evolved considerably across Nigeria's six geopolitical zones, with the North East facing a sustained insurgency by Boko Haram and Islamic State West Africa Province (ISWAP), the North West battling increasingly sophisticated bandits, and the North Central experiencing deadly farmer-herder conflicts. Meanwhile, separatist movements in the South East, militant activities in the South South, and urban crime in the South West contribute to a complex security landscape.

Analysis of temporal trends demonstrates significant fluctuations in incident frequency and severity, with notable seasonal patterns in certain types of security threats. Geographic analysis reveals concentrated hotspots of insecurity, with particular states bearing disproportionate impacts. The report also identifies concerning increases in attack sophistication, targeting patterns, and casualty rates in specific regions.

This report provides stakeholders with actionable intelligence for security planning, risk mitigation, and policy development. The findings suggest that while progress has been made in some areas, emerging threats require adaptive strategies and coordinated responses across all levels of government, security agencies, and international partners.

National Overview

Incident Trends 2018-2024

Incident Distribution by Type

National Security Risk Landscape

Nigeria's security landscape from 2018 to 2024 has been characterized by a complex interplay of persistent and emerging threats. While progress has been made in combating traditional terrorist groups like Boko Haram in the Northeast, new challenges have emerged across multiple regions.

Major Security Trends

  • Evolution of terrorist tactics from large-scale assaults to asymmetric attacks
  • Proliferation of bandits with increasing firepower and organizational sophistication
  • Escalation of kidnapping-for-ransom as a prevalent criminal enterprise
  • Intensification of farmer-herder conflicts with environmental degradation as a catalyst
  • Rising separatist movements with corresponding security responses
  • Cybercrime emergence as a significant national security concern

Impact Dimensions

  • Economic: Estimated ₦5.6 trillion impact on national economy through agricultural losses, reduced investment, and security expenditure
  • Humanitarian: 2.9 million internally displaced persons as of December 2023
  • Social: Deterioration of intercommunity relations in affected areas
  • Political: Security challenges influencing electoral participation and governance
  • International: Regional spillover effects in neighboring countries

Casualties by Year

Success Rate of Attacks

Weapons Used in Attacks

State Analysis

States Most Impacted by Security Incidents (2018-2024)

Top 5 High-Risk States

  1. Borno

    Primary risk factor: Terrorism (Boko Haram, ISWAP)

    95
  2. Zamfara

    Primary risk factor: Banditry and kidnapping

    89
  3. Kaduna

    Primary risk factor: Multiple (Banditry, Communal Violence)

    85
  4. Katsina

    Primary risk factor: Banditry and kidnapping

    79
  5. Benue

    Primary risk factor: Farmer-herder conflict

    75

States with Improving Security

  1. Yobe

    Reduction in terrorist attacks by 42% since 2021

    2021
    75
    2024
    43
  2. Adamawa

    Improved civilian-military cooperation reducing incidents by 37%

    2021
    68
    2024
    43
  3. Delta

    Reduced militant activity through engagement programs

    2021
    58
    2024
    32

Emerging Risk States

  1. Niger

    Increasing spillover from neighboring states

    2021
    45
    2024
    73
  2. Imo

    Escalating separatist activity

    2021
    25
    2024
    62
  3. Sokoto

    Growing bandit activity and cross-border threats

    2021
    38
    2024
    68

Cross-State Security Dynamics

Analysis of cross-state and cross-regional security dynamics reveals significant patterns of spillover effects and security interdependence between neighboring states. These relationships highlight the importance of coordinated security responses that transcend administrative boundaries.

Key Findings:

  • Insurgent and criminal groups exploit state boundaries to evade security forces
  • Forest corridors linking multiple states serve as operational bases for non-state armed groups
  • Successful security operations in one state often displace threat actors to neighboring areas
  • Interstate roads represent vulnerability corridors for kidnapping and armed robbery
  • State-level security responses vary significantly in effectiveness and resourcing

Case Study: The Kaduna-Zamfara-Katsina Nexus

These three contiguous states demonstrate the complex security interdependence that characterizes Nigeria's security landscape. Bandit groups operating across these states have established a sophisticated network of forest camps, intelligence gathering, and logistics support that transcends state boundaries. Security operations in any one of these states typically results in temporary displacement of criminal activity to neighboring areas, highlighting the need for synchronized multi-state security operations.

Risk Indicators

Early Warning Indicators

Our analysis has identified several reliable early warning indicators that precede escalations in security incidents across different contexts in Nigeria. These indicators provide a window for preventive action when properly monitored and integrated into security planning.

Immediate (0-30 days)

  • Sudden population displacement
  • Market closures and price spikes
  • Increased checkpoint establishment by armed groups
  • Threatening messaging in communities
  • Unusual movement patterns of livestock

Near-term (1-3 months)

  • Increased extortion activities
  • Small-scale test attacks
  • Changes in local governance dynamics
  • Weapon price fluctuations
  • Recruitment activities in vulnerable communities

Long-term (3-12 months)

  • Shifting allegiances among community leaders
  • Increasing hate speech and divisive rhetoric
  • Gradual security force withdrawals
  • Changes in transhumance patterns
  • School attendance declines

Indicator Reliability Assessment

Indicator Category Reliability Score Lead Time Context Sensitivity
Security Force Movements
1-2 weeks Urban > Rural
Market Disruptions
1-3 weeks Universal
Communication Patterns
2-4 weeks Better in NE, NW
Population Movement
3-10 days Universal
Environmental Indicators
1-3 months Better in NC, NE

Integrated Risk Indicator Model

Our analysis has resulted in an integrated risk indicator model that combines multiple data points to generate risk forecasts with increasing accuracy. The model performed with 78% accuracy in predicting major security incidents when retrospectively tested against 2018-2023 data.

Key Model Components:

  • Environmental monitoring (rainfall patterns, resource stress)
  • Social media sentiment analysis and monitoring
  • Economic indicators (market prices, trade disruptions)
  • Movement pattern analysis (unusual population flows)
  • Conflict actor behavioral analysis

Seasonal Risk Assessment

Security risks in Nigeria demonstrate strong seasonal patterns that vary by region and threat type. Understanding these patterns enables more effective resource allocation and preventive measures.

Seasonal Risk Variations by Region

Key Seasonal Patterns

  • Dry Season (October-April): Increased mobility for armed groups in northern regions. Heightened farmer-herder conflicts as water resources become scarce. Peak period for large-scale attacks in the Northeast.
  • Rainy Season (May-September): Reduced mobility but increased ambush tactics on limited passable roads. Reduced large-scale operations but increased targeted attacks. Flooding creates additional humanitarian pressures.
  • Planting/Harvest Cycles: Agricultural cycles create predictable patterns of vulnerability, particularly in rural areas where security presence may be limited during key farming activities.
  • Religious Festivals: Heightened risk of targeted attacks during major religious observances, with historical patterns of exploitation of large gatherings.

Future Projections

Security Outlook 2024-2026

Based on trend analysis and our integrated projection model, we forecast the following security dynamics for Nigeria over the next 24 months:

Increasing Risks

  • Expansion of banditry into North Central states (Niger, Kaduna)
  • Intensification of separatist activities in Southeast
  • Rising frequency of kidnapping-for-ransom operations nationwide
  • Escalation of resource-based conflicts in drought-affected areas
  • Increased targeting of critical national infrastructure
  • Further sophistication in armed group weapons and tactics

Stable Trends

  • Contained but persistent Boko Haram/ISWAP threat in Northeast
  • Continued urban crime patterns in southwestern cities
  • Maintenance of current conflict dynamics in Middle Belt
  • Regional distribution of security forces
  • Community-based security initiatives in rural areas
  • International security partnership frameworks

Decreasing Risks

  • Large-scale terrorist attacks in major urban centers
  • Direct confrontations between armed groups and military forces
  • Militant activity in Niger Delta oil production areas
  • Previously active local conflicts in Adamawa and Taraba
  • Maritime piracy incidents along coastal waters
  • Historical ethnic conflicts in specific localities with successful peace initiatives

Regional Projections

North West

Forecast indicates high probability (75%) of expanding bandit operations into previously secure areas of Niger and Kebbi states. Risk of ideological radicalization among bandit groups remains significant, with intelligence suggesting growing connections to Sahelian extremist networks.

North East

ISWAP likely to maintain operational capacity despite military pressure, with increasing focus on high-value targets. Recent returnee policies create complex reintegration challenges with potential for infiltration and insider threats to security operations.

North Central

Projections suggest 65% likelihood of escalating farmer-herder conflicts as climate change intensifies resource pressures. States bordering the Northwest face significant risk of banditry expansion, particularly along forest corridors that enable group mobility.

South East

Analysis indicates high probability (82%) of continued separatist activity with increasing sophistication in operations and targeting. Risk of broader civil unrest remains significant if heavy-handed security responses continue without addressing underlying political grievances.

South South

Oil infrastructure likely to remain relatively secure with continued engagement programs for former militants. However, environmental degradation and economic challenges create conditions for localized unrest and criminal activities.

South West

Urban crime and kidnapping along highway corridors represent the most significant threats. Growing concerns about potential urban terrorist cells with 30% probability of attempted attacks on high-profile targets in major cities.

Strategic Risk Scenarios

High-Impact, Medium-Probability Scenarios

  • Multi-Region Security Crisis (32% probability): Simultaneous escalation across multiple regions overwhelming security force capacity and creating a national security emergency
  • Major Urban Terror Campaign (28% probability): Shift of terrorist operations to major urban centers with multiple coordinated high-casualty attacks
  • Cross-Border Conflict Spillover (35% probability): Significant deterioration in neighboring countries creating refugee flows and cross-border armed group activities

Medium-Impact, High-Probability Scenarios

  • Expanded Kidnapping Economy (78% probability): Normalization of kidnapping as a criminal enterprise with expansion into previously low-risk areas
  • Critical Infrastructure Targeting (62% probability): Increased attacks on transportation, energy, and communications infrastructure
  • Election-Related Violence (68% probability): Localized but intense violence associated with future electoral cycles

Wild Card Scenarios (Low Probability, High Impact)

  • Foreign Terrorist Organization Expansion (18% probability): Major international terrorist group establishing significant operational presence in Nigeria
  • Mass Casualty CBRN Attack (8% probability): First deployment of chemical, biological, radiological or nuclear materials in an attack
  • Major Military Coup Attempt (12% probability): Destabilization of civilian government through military intervention

Opportunity Scenario

There is a significant potential (45% probability) for security improvement if coordinated multi-stakeholder approaches address structural risk factors simultaneously while maintaining operational pressure on armed groups. Success stories from specific localities demonstrate the effectiveness of this comprehensive approach.

Strategic Recommendations

Policy Recommendations

  • Develop integrated security strategy addressing structural and proximate causes of conflict
  • Implement targeted economic development initiatives in high-risk areas
  • Strengthen cross-border security cooperation with neighboring countries
  • Reform security sector with focus on human rights compliance and local legitimacy
  • Address environmental degradation and resource competition through sustainable development initiatives

Operational Recommendations

  • Enhance intelligence fusion capabilities between agencies and with communities
  • Prioritize protection of civilian populations in conflict zones
  • Develop specialized counter-kidnapping capabilities across states
  • Strengthen border control and weapons interdiction operations
  • Implement community early warning networks with rapid response protocols

Private Sector Recommendations

  • Implement robust enterprise security risk management frameworks
  • Develop travel security protocols for high-risk areas with regular updates
  • Integrate community engagement into security strategies to build local resilience
  • Establish business continuity planning for security disruptions
  • Participate in public-private security partnerships for information sharing

Key Finding for Stakeholders

Successful security responses must recognize the interconnected nature of Nigeria's security challenges. Our analysis demonstrates that isolated security interventions without addressing underlying drivers consistently fail to produce sustainable improvements. The most effective approaches combine targeted security operations with governance improvements, economic opportunity creation, and community engagement.

Methodology

Data Collection and Analysis

This report is based on a comprehensive dataset of security incidents in Nigeria from 2018 to 2024, compiled through rigorous collection and verification processes. Our methodology combines quantitative data analysis with qualitative contextual assessment to provide nuanced understanding of security dynamics.

Data Sources

  • Field reporting network covering all 36 states and FCT
  • Open-source media monitoring (national and international)
  • Official security announcements and reports
  • NGO and international organization situation reports
  • Academic research and specialized publications
  • Satellite imagery and remote sensing data
  • Social media monitoring with verification protocols

Analytical Approach

  • Multi-layered verification process for all incidents
  • Standardized incident categorization and coding
  • Geospatial analysis using GIS mapping
  • Time-series analysis for trend identification
  • Statistical testing for correlation and causation
  • Comparative regional and historical contextualizing
  • Expert review panels for assessment validation

Data Limitations

  • Reporting bias in conflict-affected areas with limited access
  • Potential underreporting of incidents in remote rural areas
  • Variable data quality across different regions and time periods
  • Challenges in accurately assessing casualty figures in some incidents
  • Information operations by conflict actors affecting public reporting

Risk Assessment Framework

Our risk assessment framework employs a multi-factor analysis model that evaluates both the likelihood and impact of security threats across different contexts. The framework enables comparison between regions while accounting for contextual differences.

Risk Score Calculation

Risk scores are calculated using the following formula:

Risk Score = (Threat × 0.4) + (Vulnerability × 0.4) + (Impact × 0.2)

Where:

  • Threat measures the presence, capability, and intent of malicious actors
  • Vulnerability assesses physical, social, and institutional factors that enable threats
  • Impact evaluates potential human, economic, political and social consequences

Risk Categorization

Risk Level Score Range Description
Extreme 80-100 Severe, imminent threats with major impact
High 60-79 Substantial threats with significant impact
Medium 40-59 Moderate threats with notable impact
Elevated 20-39 Present but limited threats
Low 0-19 Minimal threats with limited impact

Projection Methodology

Future projections employ a combination of:

  • Trend analysis of historical data with seasonal adjustments
  • Pattern recognition in conflict actor behavior and tactics
  • Structured expert judgment using Delphi methodology
  • Scenario planning for alternative futures
  • Modeling of key driver variables (economic, environmental, political)
  • Comparative analysis with similar contexts globally