Ujasusi Blog

Ujasusi Blog

Share this post

Ujasusi Blog
Ujasusi Blog
Intelligence Brief: Inside the Espionage Machinery of Boko Haram
Copy link
Facebook
Email
Notes
More

Intelligence Brief: Inside the Espionage Machinery of Boko Haram

Evarist Chahali's avatar
Evarist Chahali
Jun 10, 2025
∙ Paid

Share this post

Ujasusi Blog
Ujasusi Blog
Intelligence Brief: Inside the Espionage Machinery of Boko Haram
Copy link
Facebook
Email
Notes
More
Share

Ujasusi Blog’s Terrorism Monitor Desk | 10 June 2025 | Intel Cut-Off: 0200 BST


Executive Summary

Boko Haram, despite a military disadvantage against Nigeria’s robust security architecture, continues to defy tactical suppression largely through an underestimated but highly efficient espionage and counterintelligence strategy. The insurgents' ability to penetrate military ranks, exploit reintegration programmes, and manipulate local populations has enabled sustained asymmetrical warfare for over a decade. This brief unpacks the intelligence infrastructure that has allowed Boko Haram to embed itself within and around Nigerian security forces, communities, and even deradicalisation frameworks, with particular focus on Governor Babagana Zulum’s recent alarm over 'repentant' insurgents acting as spies.

Introduction

The evolution of Boko Haram from a localised religious movement to a regionally destabilising insurgent group owes much to its intelligence capabilities. While the Nigerian Armed Forces retain clear superiority in manpower, firepower, and technological assets, the insurgents have consistently leveraged human intelligence (HUMINT) networks, insider infiltration, and community-based espionage to execute surprise attacks, evade capture, and manipulate public sentiment.

This report provides a comprehensive analysis of Boko Haram’s espionage infrastructure, focusing on:

  • Use of 'repentant' insurgents as double agents

  • Exploitation of deradicalisation programmes

  • Local intelligence cells and civilian recruitment

  • Cyber and communications intelligence

  • Structural weaknesses within Nigeria’s counterintelligence response

This post is for paid subscribers

Already a paid subscriber? Sign in
© 2025 Evarist Chahali
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More