}

“Identifying a threat is equivalent to preventing an attack. Distance is your first protection.”— from keynote at Owerri summit

At an interfaith security summit in Owerri this week senior counter terrorism officers warned that improvised explosive devices now exploit normality to evade detection.

This report examines incident patterns across Nigeria. It explains how attackers weaponise everyday behaviour and delivery channels. The report evaluates explosive ordnance disposal capacity. It offers an actionable checklist for worship centres and communities.

The findings draw on official command briefings and recent investigations into coordinated bombings in the north east. 

What the Owerri warning actually means

The commanding officer who addressed religious leaders argued that IEDs now blend in seamlessly with ordinary parcels. They are also indistinguishable from household items. The operational implication is sharp. Security can no longer rely on visual clues alone. Screening must extend to context, pattern recognition and behavioural anomalies. The Owerri summit framed this as a public problem not merely a technical one. 

Mapping recent incident patterns

A clear pattern has emerged in 2025 and into 2026. Insurgent groups and their affiliates have shifted from high signature attacks to low signature methods. Recent coordinated explosions in Maiduguri struck crowded civic nodes; markets, post offices and hospital entrances were targeted during high footfall times.

Those attacks used small, concealable devices and, according to security bulletins, likely combined suicide tactics with planted low signature IEDs. The operational aim is twofold. Create mass casualties and erode public confidence in everyday spaces. 

Two further patterns are visible from field reports and military briefings. First, delivery vectors have diversified. Attackers use both direct placement and indirect delivery through couriers or timed drop offs. Second, attackers exploit routine human behaviours. They rely on curiosity and assistance. Common access practices help create the moment of opportunity. This converts an object into a weapon.

How attackers exploit civilian behaviour

Attackers depend on predictable routines. The following behaviours are repeatedly exploited

Unsupervised drops and casual handoffs. An item is left where staff assume it belongs to the congregation or facility. Distraction techniques. Someone creates a commotion or asks for help while a device is being placed. False deliveries. A person posing as a vendor or delivery agent leaves a parcel and departs. Exploitation of social norms. In many communities refusing to assist an elderly caller or a distressed person is culturally sensitive. Attackers weaponise goodwill.

Each vector converts a moment of social trust into a vulnerability. The Owerri guidance therefore insists on behavioural training as much as physical checks. 

The reach and limits of EOD and counter IED capacity

Nigeria has expanded specialized training for police and joint forces and has received UN support for explosive ordnance risk education. Recent courses trained hundreds of officers in counter IED techniques and EOD procedures. However capacity remains uneven geographically. Urban centres and command headquarters have faster response times. Rural and semi urban worship centres often lie beyond the effective reach of rapid EOD deployment. That gap is the operational window attackers seek to exploit. 

Humanitarian mine action reports confirm that explosive ordnance risk education remains the principal scalable intervention for communities. Security and defence forces are operationally responsible for survey and clearance. That means the public will continue to be the first observers. Strengthening their ability to notice and report anomalies therefore lowers risk. 

Case studies that illustrate exploitation tactics

Case study 1 Maiduguri market blasts March 2026

Multiple blasts at a market and the entrance of a teaching hospital demonstrate how attackers coordinate timed events across nodes of predictable movement. The crowding made the market a force multiplier for casualties. The attack combined disguised devices and suicide tactics to saturate response capacity. 

Case study 2 peripheral IED ambushes against security patrols

IED attacks on patrols show a different exploitation. Here the device is mounted to trigger when troops are lured into predictable routes. The pattern underlines the tactical value of unpredictability for defenders rather than routinised patrols along known tracks. Recent military briefings confirm fatalities from such ambushes early in 2026. 

Practical, low cost measures for worship centres

These are measures that can be implemented immediately and scaled

Controlled delivery protocol. All deliveries must be logged. Assign an authorised receiver. Unscheduled parcels remain in a supervised holding area away from crowds. Behavioural briefing. Begin services with a short security announcement. Ask congregants to report unattended items and suspicious behaviour. Ushers as sentinels. Train ushers to recognise the four exploitation behaviours described earlier. Rotate ushers to avoid patterns. Simple perimeter management. Use visual cordons and inner sanctum controls. Unattended bags are kept visible but not touched until professionals arrive. Clear reporting lines. Display a single contact for EOD or nearest police station and rehearse the call procedure during drills. No hero policy. Reinforce the rule. Distance. Contain movement. Call EOD.

These steps trade little for a large reduction in exposure.

Community accountability and what to demand from security agencies

Communities and religious leadership must insist on transparency. Ask local commands two simple questions

What is the expected EOD response time for this facility Which unit covers our neighbourhood and what is the direct contact number

Demands for published after action reviews and periodic joint drills will force metrics into the system. If response times are long, then higher level mitigations should be agreed upon temporarily. These include hardened holding areas and auxiliary volunteer observation teams.

Data and intelligence gaps that need urgent attention

Investigators must prioritise three improvements

A national register of response times by state command so communities know the operational risk they face. Standardised behavioural indicator training modules that are culturally adapted for Christian and Muslim worship contexts. Rapid reporting apps that feed tips to local commands with geo tagged information while preserving anonymity when required.

Filling these gaps will make the early warning network measurable and auditable.


Follow us on our broadcast channels today!


Discover more from Atlantic Post

Subscribe to get the latest posts sent to your email.

Processing…
Success! You're on the list.

Trending

Discover more from Atlantic Post

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from Atlantic Post

Subscribe now to keep reading and get access to the full archive.

Continue reading