- In November 2019, Islamic State in the Greater Sahara (ISGS) attacks in eastern Mali forced Malian troops to withdraw from advanced border positions, exposing bases in neighbouring southwestern Niger to cross-border attacks.
With security forces ill-placed to curb escalating ISGS militancy in the Mali-Niger border region, the group is poised to expand its control over the area.
- ISGS’s displacement of al-Qaeda affiliate Jama’at Nusrat al-Islam wal-Muslimin (JNIM) as the most active militant group in the Sahel will prompt a substantial response from JNIM. Both groups will continue to compete for influence by attacking military bases in the region over the coming months.
- Islamist militant groups are also likely to target foreign nationals in West African cities as they vie for influence among their Sahelian constituencies.
On 9 January, suspected ISGS militants killed 89 Nigerien soldiers in an attack on the Chinagodrar military base near the border with Mali. The attack, the deadliest to target the military in Niger’s history, came just one month after ISGS killed 71 soldiers at the Inates base in the country’s Tillaberi region.
Both attacks were facilitated by the withdrawal of Malian soldiers from border positions following an ISGS attack on the Indelimane military base in Mali’s Menaka region in November 2019. Malian forces retreated from advanced border positions in three locations, leaving Nigerien military bases considerably more exposed to cross-border attacks from Malian-based ISGS militants.
ISGS’s operations in Niger are part of an ongoing trend of Islamist militant groups targeting geographically isolated military bases in the Sahel. This trend started in September 2019 when JNIM attacked two military bases in central Mali near the border with Burkina Faso. Since then, ISGS have followed suit by attacking at least four bases in Mali and Niger, killing over 200 soldiers in total.
ISGS: Expansion in Mali-Niger border region
The Nigerien army withdrew from three advanced border positions following the Chinagodrar attack, a move that will effectively hand control of the Mali-Niger border region to ISGS. Together with the withdrawals on the Malian side of the border, this strategy will allow ISGS to expand recruitment efforts and attack previously inaccessible targets further south and north of border areas.
ISGS is likely to step up assassinations of community leaders in the border region in an effort to increase its authority in the area. ISGS killed around 15 pro-government community leaders in Tillaberi region in 2019, with five killed in the space of just three days in November. The killing of leaders will undermine local intelligence-sharing capabilities and the state’s authority in the region.
ISGS will also seek to further its existing alliances with disaffected factions within the Tuareg, Daosahak and Peul ethnic groups in order to control local populations. ISGS has set up networks of informants in the border region, enabling it to punish local communities who co-operate with security forces and therefore reduce the army’s capabilities in the area.
Competing for influence
Additional ISGS attacks on military bases are likely in the near term amid weakened security capabilities in the Mali-Niger border region. The Chinagodrar attack was the fourth major ISGS operation targeting military forces in Niger within the space of just six weeks, and the group is likely to capitalise on its growing momentum by attacking targets further south and north of the border.
ISGS’s displacement of al-Qaeda affiliate JNIM as the most active militant group in the Sahel will likely prompt a substantial response from JNIM. JNIM killed 20 soldiers in an attack on a military base in Segou region, central Mali, near the border with Mauritania on 26 January, and further attacks targeting military bases in Burkina Faso and Mali are to be expected in the coming months. A JNIM attack targeting Western nationals or assets in West African countries such as Côte d’Ivoire, Ghana and Senegal also remains possible in the near term given the positive impact it would have on the group’s perceived strength.
The Nigerien army is likely to launch counter-terrorism operations in the coming months in an attempt to reassert control over the border region. Given that ISGS is able to move between the porous border virtually uncontested at present, military operations will only be effective if they are conducted in co-ordination with Malian and Barkhane forces on the Malian side of the border. However, given the remote nature of the terrain, joint operations on this scale do not appear feasible in the near term.
Nigerien and Malian forces are highly unlikely to regain control over the border region in the short-to-medium term. Local forces have suffered a series of major defeats that have significantly damaged the army’s morale. The Malian government’s recently announced plan to recruit 10,000 new soldiers in the coming months seems unachievable, and it is also unclear how Mali will pay for the increased costs or train the new recruits to an adequate standard. At present, amid weak security forces’ capabilities, containment of Islamist militancy in the Mali-Niger border region remains the only realistic strategy available to armed forces.
Promises of increased security co-operation between France and G5 Sahel countries following the Pau summit in January are also unlikely to lead to an improvement in the security situation, at least in the near term. French forces, who provide vital aerial, tactical and on-the-ground support to local forces, remain severely overstretched in Mali. France has announced plans to reinforce its Barkhane contingent with an additional 600 troops, most of whom will be stationed in the tri-border region with Burkina Faso, Mali and Niger. However, it remains unlikely that the reinforcements will prove sufficient to halt escalating militancy in the border region given the difficulties of the terrain, weak local counter-terrorism capabilities and the growing strength of ISGS.
PGI’s Intelligence specialists provide business intelligence and geopolitical risk analysis to multinational corporations and governments worldwide. For more information on how they can assist your organisation, please contact us: email@example.com
Your free global geopolitical
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Making ongoing compliance easier for you and your business
GDPR is now in force. Make sure your business meets the necessary requirements, providing assurance for all of your customers and employees.
A full audit of your business to assess the level of your compliance against GDPR requirements.
Become GDPR compliant with minimal work. We will conduct an analysis, review, report and implement any necessary changes to your business.
We will conduct simple security assessments to help you understand and mitigate the potential risks to your business.
Get your business ready to face the cyber challenge.
We provide a full range of accredited, certified and bespoke services that assess the resilience of your cyber security posture.
PGI’s Qualified Security Assessors (QSA) will help you meet Payment Card Industry Data Security Standards (PCI DSS).
Find out more on PCI DSS
Demonstrate your commitment to cyber security by achieving and maintaining accreditation for the globally-recognised information security standard.
Find out more on ISO 27001
Understand the threats of phishing and malware to avoid being targeted.
Undertake our phishing vulnerability assessment to reduce your organisation’s risk of attack, by measuring the cyber awareness of your workforce.
PGI will conduct a tailored phishing campaign, using multiple methods, to identify realism and train employees where necessary to mitigate future attacks.
PGI monitor multiple metrics to identify the types of phishing, generate in-depth analytical reports and provide an informed decision to help improve your organisation’s level of security and awareness.
Prevent attacks, respond to breaches and protect your business.
Our bespoke range of cyber security services not only protect your critical assets but provide the education you need to keep your operations and data safe.
Implement this cost-effective cyber security measure launched by the government to prevent cyber-attacks, demonstrate information security commitment to your clients, and attract new business by being recognised as a secure organisation.
Find out more on Cyber Essentials Accreditation
The most effective way to identify how attackers target your organisation’s weaknesses is by evaluating your system, your network security, and reporting on any vulnerabilities that could have an impact on your business.
Find out more on Penetration Testing
If your business has experienced breaches, network compromises or operational disruption, our team of cyber security specialists can deploy quickly, and will begin the process of detecting and eliminating the threat efficiently.
Find out more on Data Breach Response & Recovery
Data Breach Response & Recovery
We prevent attacks, respond to security breaches, and protect your business
Our team of specialists can deploy quickly and efficiently to begin the process of detecting, eliminating and preventing future threats of a breach.
A vital part of the response process is making a copy of your data for safe forensic analysis. We will work with you to preserve and use this evidence to discover the extent of an intrusion.
Find out more on Digital Forensics
We will identify and minimise the risks, as well as the possibility of future risks to your business.
Consistent interaction with your management team and recommendations on how to approach all outcomes that need attention.
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.