Following the short but deadly burst of fighting in May, Mali has generally seen a decreasing trend in overall events over the past few months (which follows a broader trend in decreasing violence since this time last year), with a spike in fatalities during July (see Figure 1).…
The use of improvised explosive devices (IEDs) in conflict zones across has become increasingly prevalent over the past few years (Norton-Taylor, 3 July 2014). Conflict in Africa mirrors this global trend, as the number of discrete events involving IEDs grew from 9 reports in 2005 to 468 in 2013.…
Since June 2014, Libya has been the fourth most volatile country in the ACLED African dataset with 534 reported conflict events. Political violence continued to escalate throughout the month of October (see Figure 1)with September recording the highest fatalities – and over double those reported since the beginning of the renewed post-civil war violence.…
Mozambique continues to see riots and protests surrounding its elections on October 15 last month. In November 2013, Mozambique saw a marked increase in election-related riots and protests in association with its local elections involving the ruling Frente de Libertacao de Mocambique (FRELIMO) party (who have held a monopoly on ruling power since independence from Portugal in 1975) and opposition Mozambique Democratic Movement (MDM) party.…
When looking at violence against civilians in DR-Congo from 2009-2014, rebel groups have been responsible for the majority of fatalities in these violent events (Figure 1). ACLED regards ‘rebels’ as armed agents in opposition to the established government with aims to overthrow the regime, or establish a separate state; in short, these groups have national political aims.…
Reporters Without Borders (RSF) launched a new awareness campaign last week about the persecution of journalists and news media in Libya (Figure 1); since the end of the Libyan revolution in 2011, RSF has reported a number of murders, abductions, and physical attacks or acts of harassment targeting journalists.[1]…
Does the use of remote violence indicate weakness in a non-state conflict actor? Forms of ‘remote violence’, such as roadside bombs and improvised explosive devices (IEDs), enable armed groups to attack targets that they do not have the capacity to face directly.…
In February 2012, Boko Haram members burned down three schools in the town of Maiduguri in north-eastern Nigeria. The group claimed that the attack was provoked by indiscriminate student arrests in Islamic schools by state forces (IRIN, 4 October 2013).…
With peace talks between president Salva Kiir and SPLA/M-In Opposition leader and former vice-president Riek Machar on hiatus, conflict in South Sudan continues. Since the ceasefire agreement between the two in May, the number of conflict events involving the government and the SPLA/M-IO has not significantly decreased. …
While the Arab Spring was lauded as a triumph of democracy by various Western politicians, the response from security analysts have been more ambiguous (CNN, 28 May 2011). There have been concerns that the dramatic shifts, or outright disintegration, of existing power structures could aid international and domestic conflict, particularly within the region (BBC News, 22 June 2011).…
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.