State Security Brief

Gombe

North East Region

Violent Threats
Breakdown

The data reflects the 2 most recent violent security related incidents for Gombe which are March, 2025 and February, 2025.

Violent Threats In
March, 2025

1

Violent Threats In
February, 2025

2

Violent Threats
% Difference

50%

Violent Related Incident For The Month Of March, 2025
ID State Violent Incident Terrorism Incident Kidnapping Incident Casualties Number
1 Abia 5 0 4 2
2 Adamawa 3 0 0 3
3 Akwa Ibom 1 0 0 1
4 Anambra 6 0 5 1
5 Bauchi 3 0 1 2
6 Bayelsa 1 0 1 0
7 Benue 8 0 2 23
8 Borno 9 7 1 9
9 Cross River 1 0 0 1
10 Delta 7 0 2 5
11 Ebonyi 2 0 0 2
12 Edo 8 0 2 21
13 Ekiti 1 0 0 2
14 Enugu 3 0 0 2
15 Federal Capital Territory 11 0 4 8
16 Gombe 1 0 0 2
17 Imo 4 0 1 3
18 Jigawa 4 0 0 3
19 Kaduna 8 1 2 8
20 Kano 1 0 0 1
21 Katsina 7 1 2 9
22 Kebbi 3 2 0 23
23 Kogi 5 0 3 5
24 Kwara 2 0 0 5
25 Lagos 16 0 5 6
26 Nasarawa 3 0 1 0
27 Niger 5 0 1 2
28 Ogun 13 0 2 12
29 Ondo 7 0 2 27
30 Osun 2 0 0 1
31 Oyo 0 0 0 0
32 Plateau 8 1 1 14
33 Rivers 3 0 1 3
34 Sokoto 2 0 1 1
35 Taraba 2 0 2 0
36 Yobe 6 2 0 8
37 Zamfara 2 0 0 10
Total ** ** ** **

ID: The unique identifier for each entry.

State: The geographical location or region.

Current Month: The data for the current month.

Previous Month: The data for the previous month.

% Difference: Represents the percentage change between Current Month and Previous Month values.

NRI Premium Members can get detailed threat insights, perform data analysis, and make state by state comparisons

Make state by state comparisons and get threat insights

The Safety And Security Of Your Business
Are Our Top Priority

You can also reach out to us for tailored security solutions and advice to tackle the following variable protection and security management challenges.

Site Security Review : Minimize risks and vulnerabilities, Security Plan Development : Enhance your business safety.

Background Screening : Safeguard from potential internal threats and toxic relationships. Security Staff Training : Elevate your team's performance and response.

Security Management : Streamlined protocols and efficient site security management with proprietary software.

Copyright 2025. All Right Reserved