North Central Region
The data reflects the 2 most recent violent security related incidents for Niger which are April, 2025 and March, 2025.
Violent Threats In
April, 2025
5
Violent Threats In
March, 2025
5
Violent Threats
% Difference
0%
ID | State | Violent Incident | Terrorism Incident | Kidnapping Incident | Casualties Number |
---|---|---|---|---|---|
1 | Abia | 2 | 0 | 0 | 4 |
2 | Adamawa | 3 | 1 | 0 | 24 |
3 | Akwa Ibom | 1 | 0 | 1 | 0 |
4 | Anambra | 8 | 0 | 5 | 3 |
5 | Bauchi | 3 | 0 | 0 | 3 |
6 | Bayelsa | 4 | 0 | 0 | 12 |
7 | Benue | 16 | 2 | 3 | 119 |
8 | Borno | 8 | 7 | 0 | 74 |
9 | Cross River | 1 | 0 | 0 | 5 |
10 | Delta | 9 | 0 | 4 | 11 |
11 | Ebonyi | 3 | 0 | 0 | 4 |
12 | Edo | 5 | 0 | 1 | 2 |
13 | Ekiti | 2 | 0 | 1 | 0 |
14 | Enugu | 3 | 0 | 1 | 3 |
15 | Federal Capital Territory | 5 | 0 | 2 | 1 |
16 | Gombe | 0 | 0 | 0 | 0 |
17 | Imo | 1 | 0 | 1 | 0 |
18 | Jigawa | 1 | 0 | 0 | 1 |
19 | Kaduna | 8 | 0 | 6 | 2 |
20 | Kano | 3 | 0 | 2 | 3 |
21 | Katsina | 7 | 1 | 2 | 17 |
22 | Kebbi | 4 | 1 | 1 | 31 |
23 | Kogi | 4 | 0 | 1 | 2 |
24 | Kwara | 7 | 1 | 2 | 9 |
25 | Lagos | 12 | 1 | 2 | 11 |
26 | Nasarawa | 4 | 0 | 1 | 3 |
27 | Niger | 5 | 0 | 0 | 5 |
28 | Ogun | 1 | 0 | 0 | 1 |
29 | Ondo | 7 | 0 | 1 | 9 |
30 | Osun | 1 | 0 | 0 | 1 |
31 | Oyo | 1 | 0 | 0 | 1 |
32 | Plateau | 8 | 2 | 2 | 60 |
33 | Rivers | 5 | 0 | 2 | 2 |
34 | Sokoto | 3 | 0 | 0 | 3 |
35 | Taraba | 5 | 0 | 3 | 3 |
36 | Yobe | 1 | 1 | 0 | 3 |
37 | Zamfara | 5 | 0 | 3 | 5 |
Total | ** | ** | ** | ** |
ID: The unique identifier for each entry.
State: The geographical location or region.
Current Month: The data for the current month.
Previous Month: The data for the previous month.
% Difference: Represents the percentage change between Current Month and Previous Month values.
You can also reach out to us for tailored security solutions and advice to tackle the following variable protection and security management challenges.
Site Security Review : Minimize risks and vulnerabilities, Security Plan Development : Enhance your business safety.
Background Screening : Safeguard from potential internal threats and toxic relationships. Security Staff Training : Elevate your team's performance and response.
Security Management : Streamlined protocols and efficient site security management with proprietary software.
Copyright 2025. All Right Reserved