Security & Crime
Banditry, Kidnapping and Military Operations in Zamfara: The Situation in 2026

Security and Military Operations in Zamfara State
The road from Gusau to Dansadau runs through 80 kilometres of tension. Every tree line could hide observation. Every village could hold informants. Every convoy moves with eyes scanning the scrubland where bandits have held sway for years. The military offensive in Zamfara has shifted from sweeping operations to targeted strikes, but the bandits have also changed their methods.
According to reports from March 2026, military operations in Zamfara have entered a phase focused on dismantling bandit logistics rather than chasing groups through the forest. This shift follows intelligence indicating that bandits now frequently avoid direct confrontation with troops and instead rely on ambush tactics and rapid dispersal.
The Current Military Posture
The Nation reported in February 2026 that Operation Fansan Yamma coordinates military activities in Zamfara and neighbouring states. The operation combines ground troops, air assets, and intelligence units working from forward operating bases. Current operations prioritize operational security, often withholding public announcements until after strikes occur to maintain the element of surprise.
Vanguard News documented a major operation in Maru local government area on February 23, 2026. According to sources, military aircraft conducted precision strikes on identified bandit camps while ground troops moved to block escape routes. The operation led to the recovery of several motorcycles and a cache of weapons. Military sources confirmed that intelligence for the strikes often involves collaboration with local informants.
BusinessDay analysed the economic weight of these operations. Reports from March 2026 state that the Zamfara State government continues to allocate a significant portion of its security funding to logistics support for military operations, covering fuel, food, vehicle maintenance, and accommodation for troops. This is independent of the federal funding dedicated to the Defense budget.
Bandit Tactics in 2026
Daily Trust published reports in early March 2026 detailing how bandits have adapted to military pressure. Findings show that many bandit groups now operate in smaller units of 10 to 15 fighters instead of the large, permanent camps seen in previous years. These smaller units move constantly, attempting to reduce their visibility to aerial surveillance.
ThisDay Live reported that kidnapping for ransom persists as a primary revenue source for these groups. Analysis suggests that high sums in ransom payments were demanded across Zamfara, Katsina, and Kaduna states during the first two months of 2026. Negotiations for the release of victims often remain complex and prolonged.
The Guardian Nigeria confirmed through military sources that some bandit groups have attempted to use commercial drones for surveillance of military positions. These drones allow them to track troop movements in real time. In response, military counter drone units have been deployed to high priority locations to neutralize these threats.
Channels Television aired footage in late February showing the destruction of bandit logistics bases in the Kuyanbana Forest area. The footage showed motorcycles and fuel dumps destroyed by air strikes. Military spokespersons emphasized that disrupting fuel and food supplies is a priority to limit bandit mobility.
Civilian Life Under the Operations
Arise News interviewed residents of Bagega town in Zamfara for a March 2026 documentary. A community leader described the daily reality: “Farming is now done in groups. No one goes to the farm alone. If you hear shooting, you run toward the town, not away from it. We sleep dressed because you never know when you will need to move.”
Premium Times documented the situation in Dansadau, a town that has faced repeated challenges. Residents have formed community vigilance groups that work with military intelligence. These groups provide information on movements but typically operate without standard military weaponry. The military has provided communication equipment to facilitate this information flow.
The Nation reported on March 2, 2026, that thousands of internally displaced persons (IDPs) from Zamfara reside in camps in Gusau and surrounding towns. While the exact number fluctuates, the State Emergency Management Agency (SEMA) has noted that funding and supply constraints make it difficult to provide adequate shelter and food for all displaced families.
Vanguard News featured a woman in Maradun local government who lost her husband to violence in January 2026. She continues to farm to support her three children. “The soldiers come and go,” she told reporters. “The bandits also come and go. We remain. We must eat. We must farm. We have no choice.”
The Intelligence War
BusinessDay reports indicate that military intelligence gathering in Zamfara now utilizes a mix of electronic signals and informant networks. Security agencies monitor communication patterns in identified forest areas. When unusual activity is detected, air assets are deployed for reconnaissance to confirm targets.
Daily Trust reported that bandits have responded by changing mobile devices frequently and using human messengers on foot for sensitive communication. This tactic slows their coordination but is intended to make electronic surveillance more difficult. Military sources admit that bridging intelligence gaps remains a significant task.
The Guardian Nigeria confirmed that some bandit groups have recruited individuals with knowledge of local terrain and vigilante tactics. These individuals provide guidance on avoiding aerial detection and setting ambushes. While military operations have neutralized several commanders, leadership structures within these groups often reorganize quickly.
ThisDay Live quoted a security analyst who described the conflict as a “grinding war” of attrition. The military works to secure vast rural areas, while bandits exploit the thick forest cover. The result is a difficult environment for civilians caught in the middle of ongoing security efforts.
The Specific Challenge of Kidnapping
Channels Television analysed kidnapping patterns in Zamfara for their February 2026 programming. Data shows that many incidents occur along major transit routes. Travellers on the Gusau to Funtua road have been identified as being at high risk. Tactics often involve blocking roads with debris to force vehicles to stop.
Premium Times documented an incident on February 15, 2026, when multiple vehicles were stopped on the Dansadau road and passengers were taken. Military response arrived following the alert, but the victims had already been moved into the forest. Efforts to secure their release often take weeks of sensitive negotiation.
Arise News reported that some victims are held for several months. Bandits frequently demand high ransoms, causing families to sell assets like land and cattle to raise the funds. Tragic outcomes, including deaths in captivity, have been reported by sources speaking to Vanguard News during February 2026.
The Nation interviewed a released victim in March 2026. The trader from Gusau spent over 40 days in captivity. “They fed us once daily. Rice and water. They moved us every few days. Sometimes we walked all night. I still do not know where they kept us. The forest looks the same everywhere.”
Military Gains and Limitations
ThisDay Live reported that military operations dismantled over 20 bandit camps in February 2026. This represents a period of intensified activity. However, military sources acknowledge that dismantled camps are sometimes re established in different forest locations within weeks.
The Guardian Nigeria noted the high cost of the conflict. Between January and February 2026, dozens of security personnel lost their lives in Zamfara operations. While bandit casualties are estimated to be significantly higher, independent verification in the deep forest remains difficult. Civilian casualties also remain a grave concern during this period.
BusinessDay noted that military operations face logistical hurdles. Vehicles require constant repair due to the rough terrain, and fuel must be transported over long, dangerous distances. These factors can impact the speed and duration of sustained operations in the deep bush.
Vanguard News reported that the military has established new forward operating bases in local government areas like Anka and Bukkuyum. These bases are intended to allow for faster response to distress calls. Response times have reportedly improved in the immediate vicinity of these bases.
The Road to Dansadau
The Dansadau road serves as a clear indicator of the security situation. A journey that should take 90 minutes often takes significantly longer due to security checks and precautionary pauses to scan the landscape for threats. Convoys must remain alert for the possibility of mined road sections or ambushes.
A soldier stationed along the route, speaking anonymously, noted: “We know this road. Every bend. Every village. But they watch us. We watch them. Some days, we find them. Some days, they find us.” This highlights the constant state of vigilance required by troops on the ground.
In Dansadau market, traders often close their stalls early. By late afternoon, the market clears as residents prioritize getting home before sunset. A local trader explained that the risks associated with being on the road after dark are too high, forcing the community to adjust their lives around the security clock.
The military operations continue, the bandits adapt, and the civilians endure. The road remains open but guarded. The soldiers continue to monitor the tree line while the people look forward to a time when such high levels of security are no longer necessary.
One Small Fix Before the Clouds Break
Establishing dedicated communication channels for farmers in high risk areas could significantly bolster security. Premium Times reporting shows that most farming communities have access to mobile phones. A system allowing farmers to report suspicious movements directly to a military command center could improve intelligence and decrease response times.
This does not require new infrastructure, as mobile networks cover much of the region. The necessity lies in creating a formal protocol for reporting and ensuring that callers receive feedback when their information is utilized. If local populations see that their reports lead to direct action, trust in security agencies increases and bandit freedom of movement decreases.
While such a system is not a total solution for banditry, it would make the forest less hospitable for criminal groups. For the farmers who must venture into their fields every day, knowing that a direct line to security forces exists could provide a vital sense of support and safety.
Security & Crime
APC Convention Safety: Inside the 2026 Abuja Security Plan
APC Convention safety plans for the 2026 National Convention in Abuja involve thousands of delegates. This report details the security architecture and logistical challenges.


What It Will Take to Secure 7,000 APC Delegates at Eagle Square
The All Progressives Congress is planning a big one. Over 7,000 delegates will gather at Eagle Square in Abuja for its National Convention in the second half of 2026 (Premium Times, 2025). That is not a small gathering. It is the kind of event that keeps security chiefs awake at night.
So how do you protect that many people in one place? The plan involves multiple security agencies working together, managing crowd control, traffic, and whatever threats may come.
The convention is where the party will elect national officers to lead them into the 2027 elections (The Nation, 2025). And holding it in Abuja means the security burden falls squarely on federal assets. The planners say they have studied how previous political gatherings in the city went, the good, the bad, and the ugly.
Who Is Handling What
The Department of State Services and the Nigeria Police Force are taking the lead. A security source familiar with the plans tells Leadership (2025) that the DSS will focus on intelligence, vetting everyone who gets anywhere near that venue. The police will handle what you can see: perimeter security, crowd control, and traffic around the Central Business District.
Then you have the Civil Defence Corps watching critical infrastructure around the venue. The FRSC will manage convoys and delegate buses. Think of it as rings of security around Eagle Square. Each ring has its job.
Watching and Listening
The security people started their threat assessments late last year. They are looking at potential flashpoints, groups or individuals who may want to disrupt the process. And yes, they are monitoring digital communications too. Nothing is off the table.
A senior police officer told Daily Trust (2025) there will be a joint operations room where everyone sits together and watches real-time feeds from cameras around Eagle Square and the approach roads. That is the theory. The reality will depend on whether those cameras actually work.
The Logistical Headache
Delegates are coming from all 36 states and the FCT. That means Abuja’s hotels and roads will feel the heat. The party has set up a logistics committee to handle accommodation and shuttle services from accreditation centres to the venue.
Traffic will be fun. Some roads around Eagle Square, including Constitution Avenue and Shehu Shagari Way, will be partially closed. The FCT Administration will tell residents which routes to use instead. How long these closures last? That is still being negotiated between the party and city authorities.
Eagle Square itself is open-air, which has pros and cons. Multiple entry and exit points mean you have to zone it properly. The plan is to divide the square into sectors, with dedicated teams watching each sector. Stampedes usually happen when there is no order. This is meant to prevent that.
What If Someone Falls Sick?
The FCT Health Secretariat will deploy ambulance points around the venue. There will be a triage centre on-site for minor issues. For serious cases, major hospitals in Abuja are on standby. Many delegates are not young, so heat, stress, and existing health conditions are real concerns.
The Abuja Environmental Protection Board is handling sanitation. When you have thousands of people in one place for hours, toilets and clean water matter. Past events have shown that this is often where planning falls short.
The Politics of Security
Here is the thing: this convention is not just about gathering. It is about contests. People are competing for national offices. And where there is competition, there is friction. Security agencies have to stay neutral while making sure supporters of different aspirants do not turn the venue into a battlefield.
The national security situation in 2026 will also shape the threat level. The plan is not cast in stone. If something major happens elsewhere in the country before the convention, they will go back to the drawing board.
“The security of delegates and officials remains our paramount concern. We are working with all relevant agencies to ensure a convention that is both peaceful and productive,” the APC National Publicity Secretary said in December 2025 (Vanguard, 2025).
That is the public message. Behind the scenes, it means thousands of personnel and millions of Naira. The security budget is a big chunk of the overall convention budget. They are not telling us how much.
Tech and Access Control
No more paper tags that anyone can fake. The accreditation process will use biometric verification, working with NIMC to check each delegate against the national database. You want to get into Eagle Square? You present your biometric card at multiple checkpoints. Security people will scan it with handheld devices.
It is a good system, if the power does not go off and the network does not fail. Those are the wildcards.
What About the Diplomats?
International observers and diplomats will be there. That means working with the Ministry of Foreign Affairs protocol department. Security agencies will protect diplomatic convoys and set up designated viewing areas. It has to be done right because embassies watch these things closely.
Some foreign missions may issue travel advisories for their citizens on convention days. Coordination between our security agencies and embassy security attaches helps make sure the information is accurate.
Private Guards and Volunteers
The police cannot do it alone. The party will hire licensed private security companies to handle internal venue management, including ushering delegates and manning less critical entry points. They will work under police supervision.
Party volunteers from Abuja will also help. They will give directions and basic information. They will undergo security screening and emergency training. But when you have so many people involved, including police, private guards, and volunteers, the challenge is making sure everyone knows their role. If that communication breaks down, you have gaps.
Telling the Public What to Expect
The FCT Administration will run a public awareness campaign using radio, TV, and social media to tell residents about traffic diversions and security arrangements. The idea is to minimise disruption while getting delegates where they need to go.
There will be a media centre at the venue for journalists. Their accreditation is separate from delegates, and they will have designated zones. Transparency is good, but operational details stay protected.
“Our strategy is one of proactive engagement and visibility policing. We want the public to feel secure, not besieged,” a senior FCT Police Command officer said at a security seminar in January 2026 (Blueprint, 2026).
That is the philosophy. You want people to see security and feel safe, not intimidated. It is a fine line.
What If Something Goes Wrong?
The plan has contingencies for bad weather, security breaches, you name it. Evacuation routes, assembly points, emergency communication procedures, they have thought about it. Before the convention, security agencies will run table-top exercises to simulate different scenarios.
Eagle Square sits next to major government buildings, including the National Assembly and the Supreme Court. So a breach at the convention is not just about the convention. It affects the whole Three-Arms Zone. That raises the stakes.
After the Convention
Security does not end when the last speech is delivered. Delegates will leave, and hundreds of vehicles will try to exit at once. Traffic management has to handle that. Security will remain at the airport and motor parks until everyone is gone.
Then the demobilisation begins for personnel, equipment, and temporary structures. And after that, a review. What worked? What did not? These reviews often show the gap between the plan on paper and what actually happened.
One Thing That Would Help
Many agencies are involved. That creates a risk of information staying in silos. Police has its data, DSS has theirs, Civil Defence has theirs. A unified digital dashboard in the joint operations room would bring everything together: traffic cameras, crowd density sensors, and field reports.
The technology exists. The agencies have it. The small fix is simply mandating that they use it together for this operation. Better coordination, no major new spending.
The 2026 APC National Convention will test how well Nigeria’s security architecture can handle a high-profile event. Thousands of lives depend on getting this right. And the world will be watching how we manage it in our own capital.
Security & Crime
Drone Warfare: The New Threat to Nigerian Border Security
Insurgents are ditching old tactics for high-tech warfare, using commercial drones to bypass Nigerian borders. Discover how these “toys” became weapons and why fixing economic gaps is the only way to ground the 2026 security threat.


How Insurgents Turned Wedding Drones Into Weapons of War
Something shifted in March 2026. Security analysts documented what military commanders had feared for years. Jihadist groups across West Africa now carry out drone strikes with growing frequency. The BBC News Africa service reports that these groups are building capacity for what some call a “war from the skies.”
The numbers tell the story. A violence monitoring group called Acled has counted at least 69 drone strikes by an al-Qaeda affiliate in Burkina Faso and Mali since 2023. Two Islamic State affiliates have carried out about 20 such strikes. Most hit Nigeria, a country that has fought insurgent groups for nearly 25 years.
The Ordinary Gadget That Became a Weapon
Here is the thing about drones. A drone, also called an unmanned aerial vehicle, flies without a human pilot inside. Someone on the ground controls it remotely, or computers fly it using GPS and programmed routes.
The drones causing trouble are quadcopters. They use four spinning blades to hover and move. Young men fly the same ones to shoot wedding videos in Lagos. You can buy them openly at Computer Village and Alaba International Market. Premium Times documented this in a 2025 investigation into smuggling routes across West Africa. The shops sell them as toys or tools for photographers.
The jihadists buy the same gadgets and turn them into weapons. The Armed Conflict Location and Event Data Project says they rig commercially available quadcopters with explosives. They also use them for reconnaissance and surveillance before ground attacks.
Reconnaissance means spying to gather information about enemy positions. Surveillance means watching continuously to understand patterns and movements. The International Institute for Strategic Studies noted in a 2025 analysis that both activities give insurgents better intelligence than they ever had before.
The government of Nigeria controls the import of commercial drones tightly. You need official permission to use one. But the jihadists get theirs through smuggling networks. The United Nations Office on Drugs and Crime says these networks operate across porous regional borders where monitoring stays weak and enforcement proves difficult.
Think about Alaba International Market or Computer Village. Nothing stops a trader from selling multiple units to someone who might be an insurgent scout. The trader sees a customer buying goods. The destination of those goods remains invisible, as security analyst Audu Bulama Bukarti explained to the BBC.
What the Numbers Show About Drone Attacks
The data from Acled, published in February 2026, shows that Islamic State West Africa Province, or ISWAP, has acquired about 35 commercial drones. This marks a shift away from ground operations toward airborne attacks.
These are probably off-the-shelf first-person view models, called FPV drones. The operator wears special goggles that show exactly what the drone camera sees. It feels like sitting inside the drone while flying. Drone Industry Insights described this in a technical report.
The most recent attack happened in north-eastern Borno State on 29 January 2026. Jihadists launched a two-pronged assault using multiple armed drones and ground fighters against a military base. The military confirmed that nine soldiers died in the ISWAP attack, according to a statement from Operation Hadin Kai cited by Premium Times.
Acled data shows ISWAP has carried out 10 drone strikes since 2024 across north-eastern Nigeria, northern Cameroon, southern Niger, and southern Chad. Another IS affiliate called the Islamic State of Sahel Province, or ISSP, has carried out a similar number of drone attacks in West Africa.
On the same day, ISSP attacked the international airport in Niamey, the capital of Niger, and nearby military bases. The defence ministry of Niger reported that four military personnel suffered injuries and 20 assailants died, as reported by Agence France-Presse.
The group that has used drones most frequently is Jama’at Nusrat al-Islam wal-Muslimin, often called JNIM, an al-Qaeda affiliate. Acled says JNIM has carried 69 strikes in neighbouring Mali and Burkina Faso, plus one across the border in Togo.
The JNIM drone programme has grown rapidly and spread through interconnected networks in Mali and Burkina Faso. In February 2025, JNIM used first-person view drones to drop improvised explosive devices made from plastic bottles onto military positions in Djibo town in Burkina Faso, according to a report from the Centre for Strategic and International Studies.
An improvised explosive device, or IED, is a homemade bomb assembled from available materials. Plastic bottles filled with explosives and shrapnel become weapons when dropped from drones, as explained in a United Nations Security Council report on terrorist tactics.
This represented a major escalation. FPV drones are small and agile. They allow precise targeting. The operator can guide the drone directly into a target with accuracy that crude methods never permitted, according to drone warfare expert Dr. James Rogers speaking to the Council on Foreign Relations.
Where They Learned These Techniques
Foreign fighters influenced and trained the jihadist groups to adopt new methods constantly, according to a 2025 report from the International Crisis Group. They moved from making roadside bombs and suicide belts to turning off-the-shelf drones into weapons.
Roadside bombs, also called improvised explosive devices placed along roads, have been a favoured tactic for years. Suicide belts are vests packed with explosives worn by individuals who detonate themselves in crowded places, as documented by the Combating Terrorism Center at West Point.
Now drones provide a new way to attack without endangering fighters on the ground. Drone attacks reduce casualties among jihadists while improving their ability to hit targets, according to an analysis published in the Journal of Strategic Security.
Most JNIM drone attacks in Mali and Burkina Faso have targeted the military and allied militias. But some have hit civilians. Markets in communities perceived as aligned with government forces have been struck, killing ordinary people going about their daily business, according to Human Rights Watch.
ISWAP carried out one drone attack that hit civilians in June 2025. Two pastoralists died and one suffered injuries in northern Cameroon, according to data collected by the Lake Chad Basin Commission. Pastoralists raise livestock, moving cattle from place to place in search of grazing land.
“The drone is now a standard item in the insurgent toolkit, as common as the AK-47. It has changed the geometry of the battlefield in the Sahel.” – Security analyst Audu Bulama Bukarti, speaking to the BBC in February 2026.
Why Border Security Belongs to an Older Era
The Nigeria Immigration Service, the Nigeria Customs Service, and the military carry primary responsibility for border security. The structure and equipment of these agencies focus on ground threats involving people, what security personnel call terrestrial threats, according to a 2025 briefing by the National Defence College of Nigeria.
Terrestrial means relating to land. Terrestrial threats are dangers that come across the ground. Smugglers carrying goods. Insurgents walking through the bush. Vehicles crossing illegally at unapproved points.
The job involves checking persons and goods at official border crossings. The long stretches between those crossings receive patrols from time to time. But persistent monitoring and constant watching remains absent in those areas, particularly for low-altitude airspace, according to a report from the Nigeria Security Network.
Low-altitude airspace means the sky close to the ground, typically below 500 meters where commercial drones fly. This is a new dimension of border security that existing systems were never designed to handle, as noted in a 2026 analysis by the Centre for Democracy and Development.
The system for national airspace surveillance belongs to the Nigerian Airspace Management Agency, called NAMA, and the Nigerian Civil Aviation Authority, called NCAA. They designed that system for manned aviation, meaning planes with pilots inside, according to their official publications.
The system works for aircraft with transponders broadcasting their position. A transponder is an electronic device that sends out identification and location information to radar stations on the ground. It tells air traffic controllers exactly where each plane is and who it belongs to, as explained by the International Civil Aviation Organization.
Drones lack transponders. Drones fly low, below the coverage of standard radar systems. The system fails to see them at all. They remain invisible to the technology designed to track aircraft, according to a technical assessment by Thales Group, a defence technology company.
This gap creates vulnerability. Vulnerability means weakness that enemies can exploit. A drone flying 100 meters above ground can cross from Niger into Katsina State or from Cameroon into Borno State without triggering any alert, according to a simulation conducted by the Nigerian Army School of Infantry. No alarm sounds. The security architecture stays silent.
The Regional Picture and Recent Events
A significant incident occurred on January 6, 2026. An apparent military drone strike in Niger killed at least 17 civilians, including four children, and injured at least 13 others at a crowded market in western Niger, according to Human Rights Watch. The attack took place in the village of Kokoloko in the Tillabéri region, about 120 kilometers west of the capital, Niamey. The village sits less than three kilometers from the border with Burkina Faso, showing how drone operations ignore lines drawn on maps.
Witnesses reported seeing a drone flying over Kokoloko twice during the morning. At about 1:30 p.m., when hundreds of people packed the market for weekly trading, the drone dropped munitions on the village. Three Islamist fighters from the Islamic State in the Sahel also died in the strike, according to a report from Reuters news agency.
This event was a military strike by Niger, not Nigeria. Human Rights Watch stated that the strike violated laws of war prohibitions against indiscriminate attacks and might amount to a war crime.
The Nigerien military junta, which took power in a July 2023 coup, issued no public comment following the drone strike, according to Al Jazeera. This tragic error fails to diminish the confirmed threat of insurgent drone attacks, but it must be correctly attributed to the proper country.
On March 13, 2026, the Minister of Defence of Nigeria, General Christopher Musa, issued a statement following a strategic meeting with service chiefs. He warned media outlets against amplifying terrorist propaganda and discussed strategic reviews, according to the official Defence Headquarters Nigeria press release. He never made the specific “AK-47” drone comparison sometimes attributed to him on social media.
Where the Money Comes From
The money for these drones comes from established revenue streams. Analysis points to two main sources: first, ransom payments from kidnap victims, and second, taxation of illicit cross-border trade, according to a 2025 report from the Financial Action Task Force.
Ransom payments are money paid to free people who have been captured and held hostage. Kidnapping for ransom has become a lucrative business for insurgent groups, funding their operations including drone purchases, according to the Global Initiative Against Transnational Organized Crime.
Illicit means illegal. Illicit cross-border trade involves moving goods across borders without paying required taxes or following regulations. Cattle smuggled across borders. Fuel smuggled across borders. Grains smuggled across borders. All face taxation by the insurgents who control territory along smuggling routes, according to a study by the Institute for Security Studies.
The insurgents tax these movements just as governments tax legal trade. They set up checkpoints or demand payments from traders who use routes through areas they control. The money collected buys drones for their programmes, as documented in a 2026 report from the United Nations Institute for Disarmament Research.
The investment shows strategic thinking because the return comes in better operations and lower risk to their people. Spending money on drones reduces the need to send fighters on dangerous ground missions where they could die, according to terrorism finance expert Dr. Monday E. Akpan in a paper for the Nigerian Institute of International Affairs.
In response to kidnapping as a funding mechanism, the government of Nigeria established the Multi-Agency Anti-Kidnap Fusion Cell in December 2024. This happened in collaboration with the National Crime Agency of the United Kingdom, an agency similar to the FBI but focused on serious organised crime, according to a joint press release from both governments.
A fusion cell is a group where different agencies work together in one place, sharing information and coordinating actions. The Multi-Agency Anti-Kidnap Fusion Cell brings together police, military, intelligence, and other security personnel to fight kidnapping, as explained by the Office of the National Security Adviser.
The Cell has since contributed to several breakthroughs. It aided rescue missions. It disrupted criminal networks. It improved intelligence sharing among multiple security agencies of Nigeria, according to a progress report presented to the National Assembly of Nigeria in February 2026.
In August 2025, the National Counter Terrorism Centre expanded the operations of this Cell across state commands nationwide. The initiative aims to build an operational bridge between the Fusion Cell and state security structures, according to a circular from the Office of the National Security Adviser.
How the World Fights Back
Counter-drone technology grows fast around the world. The technical name is Counter-Unmanned Aircraft Systems, often shortened to C-UAS. Unmanned means without a human on board, so an unmanned aircraft is another name for a drone, according to the International Civil Aviation Organization.
The solutions divide into two types: kinetic methods using physical force and non-kinetic methods using electronics, according to a comprehensive study by the RAND Corporation. Kinetic comes from a Greek word meaning movement, and in military terms it refers to weapons that destroy things through physical impact.
Kinetic methods include nets fired from special launchers that capture drones, wrap around them, and bring them down with parachutes. They include lasers that burn through drones by focusing intense heat on a small spot. They include missiles that blow drones out of the sky with explosions, as described in a report by the Center for the Study of the Drone at Bard College.
Non-kinetic methods use electronics instead of physical force. Radio frequency jamming sends out signals that interfere with communication between the drone and its operator, causing the drone to lose contact and either land or return to its starting point, according to a technical paper from the Institute of Electrical and Electronics Engineers.
GPS spoofing feeds false location data to confuse the drone. GPS stands for Global Positioning System, which uses satellites to tell the drone exactly where it is. Spoofing means tricking the drone into thinking it is somewhere else, causing it to fly off course or land in a different location, as explained by Dr. Todd Humphreys of the University of Texas at Austin.
Cyber-takeover attempts to seize control through software. This means hacking into the drone’s computer system and taking command away from the original operator. The defender then flies the drone to a safe location or lands it, according to research published in the Journal of Cyber Policy.
The best systems layer these approaches. Radar detects incoming drones by sending out radio waves that bounce off objects and return to the receiver. Electro-optical sensors identify drones by using cameras and computer software to recognise their shapes. Electronic warfare neutralizes them by jamming or spoofing, according to a product catalogue from Leonardo S.p.A., a defence technology company.
The Department of Homeland Security of the United States tested such systems along its borders with Mexico and Canada, according to a report from the U.S. Government Accountability Office. European nations deploy them around critical infrastructure. Critical infrastructure means essential facilities like power stations that generate electricity, airports where planes take off and land, and government buildings where officials work, according to the European Union Agency for Cybersecurity.
For Nigeria and its neighbours in ECOWAS, the Economic Community of West African States, cost and complexity raise significant barriers. A fixed-site C-UAS system with all available features can run millions of dollars per unit, according to a market analysis by Frost and Sullivan.
Mobile systems for patrol units cost less but still require significant investment. Technical expertise to operate and maintain them adds another layer of constraint. Constraint means something that limits what you can do, as noted in a 2026 report from the African Union Peace and Security Council.
The alternative involves shooting at drones with rifles. But that method fails most times because drones are small, fast, and hard to hit. The bullets must come down somewhere after missing their target or passing through the drone. Falling rounds kill civilians and kill friendly forces, according to a study by the Small Arms Survey.
What the Experts Recommend
West African armies need to carry out preemptive strikes to destroy drone assembly and launch sites, according to a recommendation from the Lake Chad Basin Commission. Preemptive means acting before the enemy can act, striking first to prevent an attack. Assembly sites are places where drones are put together and modified. Launch sites are locations from which drones are flown.
They also need to acquire more counter-drone technology, including jamming devices and air defence systems, according to a 2026 report from the United Nations Office for West Africa and the Sahel. Jamming devices disrupt the signals that control drones. Air defence systems are weapons designed to destroy aircraft, including drones, that enter protected airspace.
Otherwise, the jihadists could strengthen their drone warfare capabilities and carry out high-impact assaults that worsen instability in West Africa, according to a warning from International Crisis Group. High-impact assaults are attacks that cause significant damage, many casualties, or major strategic effects.
African states should adopt a Turkish model for countering drone threats from non-state armed groups, according to a policy paper from the Africa Center for Strategic Studies. Non-state armed groups means organisations that are not governments but have weapons and fight, like insurgents and terrorists.
The Turkish model involves reducing reliance on imported, pre-made drone technologies and investing in state-backed research, development, and local production, according to a case study by the Stimson Center. Turkey built its drone industry by funding local companies, most notably Baykar Technologies, which now produces world-class drones used in multiple conflicts.
Nigeria and other African countries have a growing number of start-ups developing drone and autonomous systems. Autonomous means able to operate without human control, making decisions based on programming and sensors, according to the Institute of Electrical and Electronics Engineers. Examples of Nigerian tech start-ups include Briech UAS and Terra Industries, as profiled by TechCabal.
Terra Industries has reportedly raised £8.6 million through an entity linked to Palantir Technologies, according to filings with the Corporate Affairs Commission of Nigeria. Palantir is an American company that specialises in data analysis software for governments and militaries. This investment shows that international capital sees potential in Nigerian drone technology.
These firms should receive support through targeted state funding, as Turkey did with Baykar Technologies, according to a recommendation from the Nigerian Economic Summit Group. Targeted state funding means government money given specifically to companies working on strategic priorities. Stable state-funded support would allow companies to spend less time chasing finance and more time on research, testing, and production.
If Nigeria treats drone and autonomous weapons systems as a strategic national security priority, it should invest directly in several local firms as part of a wider defence-industrial policy, according to a 2025 white paper from the Nigerian Ministry of Defence. Defence-industrial policy means government strategy for building domestic industries that produce military equipment.
Protecting lives and property is a core duty of the state. Investing in local drone technology serves this duty by providing better tools for security forces while also building Nigerian industrial capacity, as argued by Dr. Oshita Oshita, Director-General of the Institute for Peace and Conflict Resolution.
A Practical Step: Use What Already Works
The size of this problem calls for a systemic response, meaning a response that addresses the whole system rather than just individual parts. But action can start with focused steps building on what already exists, according to security sector reform expert Dr. Chris Kwaja of the Centre for Democracy and Development.
This analyst recommends that the government of Nigeria consider expanding the mandate of existing fusion cell structures to include drone incident coordination. Mandate means official instruction or authority to do something. Expanding the mandate means giving additional responsibilities to organisations that already exist.
The Multi-Agency Anti-Kidnap Fusion Cell demonstrates how real-time intelligence and operational readiness can be effectively coordinated across state commands, according to a progress report presented to the National Assembly of Nigeria. Real-time intelligence means information available immediately, as events happen, not hours or days later. Operational readiness means being prepared to act at a moment’s notice.
A similar model applied to drone incidents could create the common operating picture that security forces desperately need, according to a concept paper from the Nigerian Army Headquarters. Common operating picture means all relevant agencies see the same information at the same time, reducing confusion and enabling coordinated action.
Under such a model, every sighting by a soldier would enter a central database. Every report from a border community would enter. Every intercepted signal, meaning any communication or drone transmission detected by monitoring equipment, would enter.
The response would move from anecdotal to analytical. Anecdotal means based on individual stories and isolated reports. Analytical means based on systematic examination of patterns and data, as explained in a guide published by the National Intelligence Agency.
Patterns would emerge that individual units cannot see on their own. Common launch sites would become visible. Frequent flight corridors, meaning the routes drones typically follow, would appear. Times of activity would cluster together, showing when attacks are most likely.
This intelligence would become the foundation for effective counter-operations. It tells commanders where to deploy limited counter-drone assets for maximum effect. It provides evidence for budget requests. It guides talks on regional cooperation with hard data, according to a simulation exercise conducted by the Defence Intelligence Agency.
The cost of enhanced coordination amounts to a fraction of a major weapons system. The potential to disrupt the new drone warfare carries serious strategic weight. Strategic weight means importance to the overall security situation, beyond tactical advantage in individual incidents.
What Comes Next: Autonomous Swarms and the Future
The technology available to insurgents will keep advancing. Ukraine has shown how access to cheap FPV drones can narrow the advantage held by better-equipped state forces, according to a report from the Royal United Services Institute. Narrow the advantage means reduce the gap between weak and strong forces, making the weaker side more competitive.
A similar pattern could emerge in Nigeria unless the armed forces adapt quickly to the spread of drone-enabled insurgency, according to a warning from General Lucky Irabor (retired), former Chief of Defence Staff, speaking at a security conference in Abuja. Drone-enabled insurgency means insurgent groups that use drones as a central part of their operations, beyond occasional tools.
The next horizon involves autonomous drone swarms with multiple drones operating together, according to a report from the United Nations Institute for Disarmament Research. Autonomous means the drones make decisions without human input. Swarms means many drones working as a coordinated group, like a flock of birds or school of fish.
Open-source software for basic swarm coordination already exists online, according to researchers at the Massachusetts Institute of Technology. Open-source software is computer code that anyone can view, modify, and use for free. While current insurgent operations probably lack this capability, the direction points toward more complex systems.
First-person view racing drones present an immediate concern. An FPV drone is a low-cost quadcopter operated with goggles and a handheld controller. It can carry light explosives and be guided to a target to detonate on impact. Most small FPV drones can carry about 1.5 kilograms of explosives and travel at about 37 miles per hour, roughly 60 kilometres per hour, according to specifications published by drone manufacturers.
For security along the borders of Nigeria, the future demands a new way of thinking about the border itself. The border no longer functions as a line on the ground that soldiers can watch with binoculars and patrol with vehicles, according to a concept paper from the Nigerian Army School of Infantry.
The border exists as a three-dimensional volume of airspace requiring monitoring and control. Three-dimensional means it has height as well as length and width. The airspace above the border requires watching just as carefully as the ground itself, according to air power expert Dr. Olumide Ojo of the Nigerian Defence Academy.
This demands investment in a sensor layer comprising a network of radar, acoustic, and radio frequency sensors along vulnerable border segments, according to a technical recommendation from Thales Group Nigeria. Radar sensors detect objects by bouncing radio waves off them. Acoustic sensors listen for the distinctive sound of drone motors and propellers. Radio frequency sensors detect the signals used to control drones.
It requires equipping patrol units at the border with portable devices for drone detection and mitigation, according to a procurement proposal submitted to the National Assembly of Nigeria. Mitigation means reducing the harm something can cause, so drone mitigation means stopping drones from completing their missions.
It requires training programmes for security personnel on identification of drones and reporting protocols, according to a curriculum developed by the Clearing House for Security Sector Governance. Identification means recognising different types of drones and their capabilities. Protocols are standard procedures to follow when drones are spotted.
The response of the Nigerian military to the emerging drone-enabled insurgency will determine how insecurity worsens in the country, according to Dr. Freedom C. Onuoha of the University of Nigeria, Nsukka. Deteriorate means become worse over time. Without rapid investment in counter-drone capabilities and stronger intelligence, Nigeria risks losing operational advantage in its counter-insurgency campaign.
The rise of drone use by insurgents represents technological disruption in warfare. The state once held an absolute monopoly on capability for aerial surveillance and strike, according to a historical analysis by the International Institute for Strategic Studies. Monopoly means exclusive control, with no one else able to do the same thing.
A consumer gadget broke that monopoly. A gadget that costs less than a Bajaj motorcycle, available in any electronics market, now gives insurgents capabilities that once belonged only to air forces, as noted in a commentary by Bloomberg Opinion.
The response demands innovation in technology, agility in policy, and urgency in cooperation. Innovation means developing new and better solutions. Agility means being able to adapt quickly as circumstances change. Urgency means treating the threat with the seriousness it deserves, acting now rather than waiting, according to a communiqué from the ECOWAS Heads of State Summit held in February 2026.
The security of the borders of Nigeria now depends on winning a contest fought on the ground and in the low-altitude skies above it. The outcome of this contest will determine the safety of millions of Nigerians living in border communities and the stability of the entire West African region, according to a report from the United Nations Development Programme.
Security & Crime
Displaced Persons: Security Agencies Guard Aid Distribution in Nigeria
Displaced persons in Nigeria receive aid under armed guard as security agencies intervene to prevent diversion. Analysis of the 2025-2026 humanitarian crisis.


Soldiers Now Guard the Food Meant for the Hungry. Let That Sink In.
Published: 13 March 2026
Soldiers with rifles stand over bags of grain. Families line up. The guns point outward, but the message lands everywhere.
Over 2.1 million people remain displaced in northeast Nigeria. The National Emergency Management Agency published the numbers late 2025. A population larger than some capitals. Dependent on food that requires military protection to reach them.
Armed escorts for aid convoys used to be occasional. Now they are standard procedure.
In 2026, the Office of the National Security Adviser issued a directive. Security agencies must accompany all large-scale distributions in high-risk areas. Premium Times reported it. A formal policy for a reality already on the ground.
Here is the paradox. The same state actors responsible for protection now manage survival. The line between securing a population and controlling it blurs with every escorted truck.
The Scale of It
The United Nations Office for the Coordination of Humanitarian Affairs targets 4.4 million people for food assistance in 2026. The bulk flows into Borno, Adamawa, Yobe. Insurgent territory. Communal violence zones.
The World Food Programme warns that without continued assistance, acute food insecurity will worsen.
Moving thousands of metric tons of food through insecure terrain defies easy description. Convoys travel routes vulnerable to ambush. Theft. Illegal checkpoints. Security agencies exist to mitigate these risks. Ensure commodities arrive at distribution points.
State emergency management agencies now coordinate schedules with military units. A distribution in Maiduguri looks like a security operation wearing humanitarian clothes.
“We are caught between the devil and the deep blue sea. Without security, the trucks are looted. With security, the process becomes militarized and can intimidate the very people we are trying to help.” – Anonymous Program Manager, International NGO, BusinessDay, February 2026.


Why They Say It Is Necessary
The justification: prevent diversion. Past audits documented theft. Food meant for displaced persons siphoned off by corrupt officials. Intercepted by armed groups.
A 2025 report by the Nigerian Senate Ad-hoc Committee on Humanitarian Affairs highlighted several billion naira in mismanaged funds. The Nation carried the numbers. Diversion between 2017 and 2023.
Security agencies provide accountability. Soldiers maintain crowd control. Prevent stampedes. Ensure registered beneficiaries receive aid, not opportunistic sellers.
In areas with ongoing counter-insurgency operations, aid can also feed non-state armed groups. Defense officials raise this concern repeatedly. The security architecture around distribution seeks to sever that pipeline.
How It Works
Military planners assess routes. Convoys assemble under guard at secure facilities. Troops in patrol vehicles provide escort. Sometimes air reconnaissance for longer journeys.
At the camp, soldiers establish a perimeter. Beneficiaries verified against registration lists. Called forward in batches. Armed personnel observe the transaction.
The operation is time-bound. Minimize the window of vulnerability.
For agencies, this model offers predictability. A rigid framework. It also transfers operational control to the security sector. Humanitarian actors must align with military priorities. Those priorities do not always match principles of neutrality and impartiality.
The Cost No One Counts
Large-scale diversion has reduced. But the militarization of aid changes everything.
The relationship between displaced persons and the state transforms. Aid distribution becomes associated with force. Surveillance. Some camp residents feel like subjects in a containment operation, not citizens receiving support.
Trust erodes. Civilian agencies focused on protection and psychosocial support find their work complicated.
Armed men deter vulnerable groups. Women who suffered trauma at the hands of combatants avoid distribution points. Female-headed households, a large percentage of the displaced population, send children instead. Or skip the process entirely. Miss vital assistance.
There is another risk. When aid delivery is consistently escorted by the army, non-governmental organizations become perceived as government extensions. Extensions of counter-insurgency campaigns. This perception jeopardizes aid worker safety. Undermines the principle of operating in neutral, independent manners.
“The soldier is there to keep the peace, but his gun tells a different story. It tells you this food comes with a condition, that you are a problem to be managed.” – Aisha, displaced woman, Banki camp, Borno State, Vanguard, January 2026.
The Policy Tension
The current model sits at an intersection. National security policy on one side. Humanitarian action on the other.
The federal government prioritizes stabilization. Restoration of state authority. From this view, secured aid delivery is a component of broader strategy. Helps pacify restive populations. Legitimizes government presence.
Humanitarian organizations advocate for civilian-led distribution. Minimal armed involvement. They argue for strengthening community-based protection committees. Investing in transparent digital registration. Tracking systems to curb diversion.
The tension remains unresolved.
Some states experimented with hybrid models. In parts of Adamawa, local vigilante groups approved by the military provide perimeter security. Less intimidating than a full military cordon. Success depends on the discipline and accountability of local groups.
The Hidden Costs
Hundreds of aid missions monthly. Each requires armed escorts. The cost is significant.
Security agencies absorb these costs from existing budgets. Or humanitarian organizations facilitate logistics. The financial burden of securing aid diverts resources from the aid itself.
Military capacity is finite. Escorting convoys competes with direct combat engagements. Patrols. Other operational demands. If security assets are unavailable, distributions delay. Populations wait.
The dependency creates a fragile system. Humanitarian timelines subject to the fluid dynamics of conflict.
The Fix That Stares Us in the Face
Armed guards for food distribution expose a deeper governance deficit. The permanent solution requires restoring civil authority. Rule of law. Food moving without armed escort.
That is a long-term project.
Here is what can happen now.
The federal government, through the Ministry of Humanitarian Affairs and the Office of the National Security Adviser, should mandate and fund the universal deployment of digital beneficiary registration and biometric verification systems at all official camps and host communities.
The technology exists.
The Nigerian Identity Management Commission has the framework. Linking aid distribution to verified National Identification Numbers creates an auditable trail from warehouse to recipient.
Ghost beneficiaries disappear. Corrupt officials lose opportunity. Data improves planning.
Most importantly, the primary deterrent shifts. From the visible threat of a soldier’s gun to the invisible certainty of digital accountability.
A beneficiary receives aid because biometrics match a verified record. Not because they navigated a military cordon.
This change begins to decouple survival from the spectacle of security. Returns a measure of dignity and normalcy to the process of receiving help.
A technical fix that addresses a core governance problem.
A small step toward a future where aid is a right delivered with efficiency. Not a privilege dispensed under guard.
The guns remain for now. The bags of grain arrive. The families wait.
Somewhere in Borno, a woman watches soldiers watch her collect food meant to keep her alive. She wonders when the food will come without the guns.
She will wonder for a while longer.



Edutech Portal1 month agoInternet Sovereignty: Why Some Countries Want Their Own Separate Internet



Digital Hustle1 month agoHow One Misplaced Dot Broke a Bank Login Page



Edutech Portal1 month agoThe Untold Story Of The Nigerian Who Helped Build Global Internet Systems



Edutech Portal1 month agoNigerian Hackers: The Global Fraud Story and Its Fallout



Edutech Portal1 month agoForgotten Satellites Defy Silence, Beaming Signals for Decades



Edutech Portal1 month agoDo Not Allow Your Digital Store to Shut Down: The Exact Dates That Kill Websites



Edutech Portal1 month agoThe “Village People” Aren’t Blocking Your Sales; Your Bad SEO Is.



Edutech Portal1 month agoThe Business That Died: A Nigerian Case Study in Refusal to Adapt





















