After a cursory look at the Fund for Peace’s (hereafter FFP) 2014 fragile state rankings, @ACLEDInfo mentioned on twitter that the metrics were ‘questionable’. We suggested index’s rankings of fragility bear little relationship to reality.…
Details
Conflict event levels actually fell in Kenya in May, in spite of the high profile attacks which drew international attention, while reported fatalities increased, pointing to the intensification of violence in the country.…
Details
Conflict levels fell in CAR in May (see Figure 2), and several changes to the conflict in CAR represent the beginning of a new phase: first, the government continues to have little to no role in what is occurring within the state, or indeed – as the attacks in Bangui last week attest – government forces have little to no control in the capital.…
Details
The escalating security crisis in northern Nigeria has drawn international attention in recent weeks. ACLED has received a number of requests for data on the activity of Boko Haram, and has compiled here some resources for researchers, journalists and other practitioners.…
Details
Caitriona Dowd has put together a fascinating comparison of Boko Haram and LRA. Both are ‘non-traditional’ political violence threats, and exhibit common traits which may come to characterize many groups across African states.…
Details
Below are several links and pieces that help to explain the current situation in South Sudan by reviewing the violence that has occurred across the state (and in particular Jonglei) since Independence.…
Details
Many wonder how the current crisis in the Central African Republic has come about. In the visualization below, we see that (most recently) the former president Bozize’s call for elections began a process of peace negotiation with various rebel groups and those groups then re-organizing into the Seleka rebels.…
Details
Race for governor seats are contentious as the constitution has given these districts considerable power. See map for comparison between normal and 2013 rates of violence.…
Details
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.