Security Chiefs’ Reassurance Amid Tinubu’s Military Procurement

Security Chiefs' Reassurance Amid Tinubu's Military Procurement

The term Security chiefs reassurance became the buzzword after a top-level security conference held in Abuja by Bola Tinubu on March 12, 2026. The gathering focused the highest security officials of Nigeria to discuss the insurgents attacks experienced in the northeast in the recent past and discuss the military tactics being undertaken in the area. […]

Nigeria-US Joint Working Group Signals Aggressive Counterterrorism Shift

Nigeria-US Joint Group Boosts Counterterrorism

Structured bilateral security coordination was achieved through the launching of the Nigeria-US Joint Working Group, held in Abuja, on January 22, 2026. That framework unites senior defense and intelligence and diplomatic officials of both governments and institutionalizes cooperation that had been run ad hoc and through Joint Terrorism Task Force interactions. The project was proposed […]

Myanmar’s Amnesty Release Masks Junta’s Terror Label Abuses

Myanmar's Amnesty Release Masks Junta's Terror Label Abuses

The amnesty release in Myanmar was one of the biggest pardons of prisoners since the military took over power in 2021. State media reports indicated that over 7,300 inmates have been released including those found guilty of counterterrorism laws of financing, housing, or supporting groups that the junta considered terrorist organizations. 300+ prisoners were observed […]

Anti-Terror Courts Target Lawyers Amid Opposition Trials

Anti-Terror Courts Target Lawyers Amid Opposition Trials

The phrase Anti-terror courts target lawyers has gained renewed traction following the February 23, 2026 release of Ahmed Souab from Tebourba prison. Souab, a 69-year-old former judge turned defense attorney, had been sentenced to five years under Tunisia’s 2015 Counterterrorism Law and the 2022 Decree 54 on cybercrime before an appeals court reduced the term […]

Ethiopia Leads Continental Push on Organized Crime Networks

Ethiopia Leads Continental Push on Organized Crime Networks

Ethiopia Leads Continental Push Organized Crime Networks Analysis centers on a February 2026 high-level seminar in Addis Ababa that brought together nearly 80 delegates from African security and intelligence agencies. Convened under the framework of the Committee of Intelligence and Security Services of Africa, the gathering focused on disrupting terrorism financing and dismantling transnational organized […]

2,000 Troops by 2026: Reviving Regional Security in West Africa

2,000 Troops by 2026: Reviving Regional Security in West Africa

The 2,000 Troops by 2026 Reviving Regional Security West Africa Analysis begins with the February 2026 summit of the Economic Community of West African States in Freetown, Sierra Leone. Military chiefs gathered to operationalize a long-discussed standby force intended to respond swiftly to the accelerating spread of terrorism across the Sahel and into coastal states. […]

Kenya’s Curriculum: A Proactive Shield Against Africa’s Terrorism Financing Networks

Kenya's Curriculum: A Proactive Shield Against Africa's Terrorism Financing Networks

The Curriculum of Kenya represents a systematic change in the manner in which the African countries treat the prosecutions of terrorism financing. Launched as a customized prosecutor training system, the initiative aims at sealing gaps in evidence and processes that have undermined complicated cases of terror financing throughout sub-Saharan Africa. The curriculum represents a more […]

Christian Persecution Funding: Burke’s Visit and Nigeria’s Terror Finance Reckoning

Christian Persecution Funding: Burke's Visit and Nigeria's Terror Finance Reckoning

Christian Persecution Funding has moved from advocacy discourse into the center of Nigeria’s national security calculus. What was once framed primarily as sectarian violence in the Middle Belt is increasingly analyzed by policymakers as a financially sustained campaign supported by layered domestic and international channels. The financial architecture behind recurring attacks has become a core […]