Al-Qaeda Is Still Exploiting Weak Governments in West Africa with Deadly Results

Soldiers take notes on a car that was burnt out outside the Splendid Hotel in Ouagadougou, Burkina Faso, Sunday, Jan. 17, 2016.

Sunday Alamba/AP

AA Font size + Print

Soldiers take notes on a car that was burnt out outside the Splendid Hotel in Ouagadougou, Burkina Faso, Sunday, Jan. 17, 2016.

The group has targeted Algeria, Niger, Mali and now Burkina Faso—killing people and carrying out kidnappings for ransom, all to stop what they perceive as the corrupt influence of the West.

The attacks in Burkina Faso that left 28 people dead and 55 injured point to an increasing security challenge in West Africa, where, analysts say, militant groups affiliated to Al-Qaeda and Islamic State are taking advantage of fragile and weak states to hit western targets.

This is the second time in a couple of months that militants launched an assaulted directed at an establishment popular with foreigners. In neighboring Mali last November, in a similar fashion to what happened at the Splendid Hotel in Ouagadougou, gunmen stormed the Radisson Hotel in Bamako and took 170 people hostage and ultimately killing 21 people many of whom westerners.

In both of these cases, the militant group Al-Qaeda in the Islamic Maghreb (AQIM) claimed responsibility.

AQIM, which traces its roots to the Algerian civil conflict in the 1990s and became an al-Qaeda affiliate in mid-2000s, has increasingly focused their strategies on targets located in countries that are either weak or unstable. In west Africa, it has targeted Algeria, Niger, Mali killing people and carrying out kidnappings for ransom, all done with the objective of ridding the region of what they perceive to be the corrupting influence of the West.

In 2012, the group launched one of its most audacious operations helping to orchestrate the takeover of northern Mali and imposed its version of Sharia law in the area. While the territory was eventually taken back into government control with the help of a French intervention, the event showcased how dangerous AQIM could be.

Their ability to operate with some success is helped considerably by a lack of strong governing institutions in countries in the region, United States’ top commander in the region has said. “The network of al-Qa’ida and its affiliates and adherents continues to exploit Africa’s under-governed regions and porous borders to train and conduct attacks,” Gen. David M. Rodriguez, the head of the United States Africa Command (AFRICOM), told the U.S. Senate Armed Services Committee last year.

The power vacuum in Libya that followed the fall of Muammar Gaddafi has allowed militant groups, including AQIM, to acquire weaponry that they are now employing to devastating effect against targets in the region. On top of that, they are using the country as a lunching pad for their missions.

“Libya appears to be emerging as a safe haven where terrorists, including al-Qa’ida and Islamic State of Iraq and the Levant-affiliated groups, can train and rebuild with impunity,” Rodriguez told Senators.

With Libya as a base, AQIM has exploited instability in the region to conduct their attacks. Burkina Faso is a case in point. The country has no history of terrorism but over the last two years Burkinabes have endured tremendous political turmoil. A toppling of a long-term ruler in 2014 was followed by an interim government that was overthrown last September only to be reinstated a few days later. The newly elected government of Roch Marc Christian Kaboré has only been in power for less than a month. This kind of uncertainty is ideal breeding ground for militants like AQIM, analysts say.

“Weak government and chaos are always conducive to terrorism,” Hans-Jakob Schindler, a coordinator of a United Nations Security Council committee that monitors al-Qaeda, told the New York Times. “These groups do take advantage of that.”

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.