This is a joint series of publications by ACLED and the GI-TOC profiling non-state armed groups in West Africa and exploring the intersections between their involvement in illicit economies and the provision of governance. The series brings new material and updated analyses using the ACLED database and qualitative research, examining how armed groups survive in their political and economic environments.
Each paper will examine the evolution, structure and tactics of armed groups, as well as their transnational relationships, means of financing and governance practices.
Rejoignez-nous le 10 septembre à 10h ET/ 15h WAT/ 16h CET pour le lancement virtuel du troisième volet – Groupes armés non étatiques et économies illicites en Afrique de l’Ouest : Séparatistes anglophones au Cameroun
Il s’agit d’une série de publications conjointes par ACLED et Global Initiative Against Transnational Organized Crime (GI-TOC), dressant le profil des groupes armés non étatiques en Afrique de l’Ouest. La série explore l’intersection entre l’implication des groupes armés dans dans les économies illicites et leurs objectifs de gouvernance.
Sur la base de données ACLED et de recherche qualitative, la série apporte des analyses originales examinant comment les groupes armés survivent dans leurs environnements politiques et économiques.
Chaque rapport examine l’évolution, la structure et les tactiques des groupes armés, ainsi que leurs relations transnationales, leurs moyens de financement et leurs pratiques de gouvernance.
Reports Series
Read the full reports in English or French and watch our recorded webinars examining how armed groups survive in their political and economic environments.
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.