• fr Français
  • en English
CISA NEWSLETTER
Advertisement
  • Home
  • Editions
    • 2025
      • July 2025
      • June 2025
      • May 2025
      • April 2025
      • March 2025
      • February 2025
      • January 2025
    • 2024
      • December 2024
      • November 2024
      • October 2024
      • September 2024
      • August 2024
      • July 2024
      • June 2024
      • May 2024
      • April 2024
      • March 2024
      • February 2024
      • January 2024
    • 2023
      • December 2023
  • News
    • All
    • Business
    • Politics
    • Science
    • World
    Okada Operations In Ghana; Economic Necessity Or Security Risk

    Okada Operations In Ghana; Economic Necessity Or Security Risk

    Cedi Appreciation and National Security in Ghana: Currency Stability Amid Persistent Structural Risks

    Cedi Appreciation and National Security in Ghana: Currency Stability Amid Persistent Structural Risks

    The Mirror in the Politician: How Ghanaian Society Breeds the Corruption It Condemns

    The Mirror in the Politician: How Ghanaian Society Breeds the Corruption It Condemns

    Terrorism Financing in The Sahel/West Africa: Mechanisms, Drivers, And Responses

    Terrorism Financing in The Sahel/West Africa: Mechanisms, Drivers, And Responses

    The Silent Threat: Impact of Human and Sex Trafficking on National Security

    The Silent Threat: Impact of Human and Sex Trafficking on National Security

    How JNIM is dominating the terrorism landscape in the Sahel

    How JNIM is dominating the terrorism landscape in the Sahel

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Tech
    Securing Africa’s Digital Future: A Call to Action on Cybersecurity.

    Securing Africa’s Digital Future: A Call to Action on Cybersecurity.

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
  • Lifestyle
    • All
    • Food
    • Health
    • Travel
    Security Contagion and the Urban Poor: Begging and the Invisible Threat in Accra’s Streets

    Security Contagion and the Urban Poor: Begging and the Invisible Threat in Accra’s Streets

    ECOWAS@50: Ghana as a Stakeholder in West Africa’s Integration Aspiration

    ECOWAS@50: Ghana as a Stakeholder in West Africa’s Integration Aspiration

    The Rise of Substance Abuse Among Ghanaian Youth: A Deep Dive into Music, Media, and Mental Health

    The Rise of Substance Abuse Among Ghanaian Youth: A Deep Dive into Music, Media, and Mental Health

    Impact Of Russia’s War in Ukraine on Africa’s Agriculture and Food Security

    Impact Of Russia’s War in Ukraine on Africa’s Agriculture and Food Security

    Transforming Africa’s Agriculture to Mitigate Food Crisis

    Transforming Africa’s Agriculture to Mitigate Food Crisis

    Framing Food Insecurity as A Security Contagion

    Framing Food Insecurity as A Security Contagion

    Trending Tags

    • Golden Globes
    • Game of Thrones
    • MotoGP 2017
    • eSports
    • Fashion Week
  • Review
    Key Drivers of Voter Choices for Ghana’s 2024 General Elections – A Review

    Key Drivers of Voter Choices for Ghana’s 2024 General Elections – A Review

  • CISA Ghana
No Result
View All Result
  • Home
  • Editions
    • 2025
      • July 2025
      • June 2025
      • May 2025
      • April 2025
      • March 2025
      • February 2025
      • January 2025
    • 2024
      • December 2024
      • November 2024
      • October 2024
      • September 2024
      • August 2024
      • July 2024
      • June 2024
      • May 2024
      • April 2024
      • March 2024
      • February 2024
      • January 2024
    • 2023
      • December 2023
  • News
    • All
    • Business
    • Politics
    • Science
    • World
    Okada Operations In Ghana; Economic Necessity Or Security Risk

    Okada Operations In Ghana; Economic Necessity Or Security Risk

    Cedi Appreciation and National Security in Ghana: Currency Stability Amid Persistent Structural Risks

    Cedi Appreciation and National Security in Ghana: Currency Stability Amid Persistent Structural Risks

    The Mirror in the Politician: How Ghanaian Society Breeds the Corruption It Condemns

    The Mirror in the Politician: How Ghanaian Society Breeds the Corruption It Condemns

    Terrorism Financing in The Sahel/West Africa: Mechanisms, Drivers, And Responses

    Terrorism Financing in The Sahel/West Africa: Mechanisms, Drivers, And Responses

    The Silent Threat: Impact of Human and Sex Trafficking on National Security

    The Silent Threat: Impact of Human and Sex Trafficking on National Security

    How JNIM is dominating the terrorism landscape in the Sahel

    How JNIM is dominating the terrorism landscape in the Sahel

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Tech
    Securing Africa’s Digital Future: A Call to Action on Cybersecurity.

    Securing Africa’s Digital Future: A Call to Action on Cybersecurity.

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
  • Entertainment
  • Lifestyle
    • All
    • Food
    • Health
    • Travel
    Security Contagion and the Urban Poor: Begging and the Invisible Threat in Accra’s Streets

    Security Contagion and the Urban Poor: Begging and the Invisible Threat in Accra’s Streets

    ECOWAS@50: Ghana as a Stakeholder in West Africa’s Integration Aspiration

    ECOWAS@50: Ghana as a Stakeholder in West Africa’s Integration Aspiration

    The Rise of Substance Abuse Among Ghanaian Youth: A Deep Dive into Music, Media, and Mental Health

    The Rise of Substance Abuse Among Ghanaian Youth: A Deep Dive into Music, Media, and Mental Health

    Impact Of Russia’s War in Ukraine on Africa’s Agriculture and Food Security

    Impact Of Russia’s War in Ukraine on Africa’s Agriculture and Food Security

    Transforming Africa’s Agriculture to Mitigate Food Crisis

    Transforming Africa’s Agriculture to Mitigate Food Crisis

    Framing Food Insecurity as A Security Contagion

    Framing Food Insecurity as A Security Contagion

    Trending Tags

    • Golden Globes
    • Game of Thrones
    • MotoGP 2017
    • eSports
    • Fashion Week
  • Review
    Key Drivers of Voter Choices for Ghana’s 2024 General Elections – A Review

    Key Drivers of Voter Choices for Ghana’s 2024 General Elections – A Review

  • CISA Ghana
No Result
View All Result
CISA NEWSLETTER
No Result
View All Result
Home ANALYSTS

From Preaching to Posting: The Psychology of Violent Extremist Recruitment in West Africa

July 30, 2025
in ANALYSTS
0
From Preaching to Posting: The Psychology of Violent Extremist Recruitment in West Africa
0
SHARES
8
VIEWS
Share on FacebookShare on Twitter

Across West Africa, particularly in the Sahel, violent extremism is no longer just a problem of conflict zones, it is a looming threat in areas that have not yet experienced large-scale terrorism but are increasingly vulnerable. While policy conversations often focus on extremist actors and events, a quieter and more dangerous process is unfolding: the recruitment of youth through psychological manipulation, both via traditional in-person methods and increasingly, through digital platforms like social media and encrypted messaging apps.

This article explores the psychological underpinnings of violent extremist recruitment, comparing traditional face-to-face methods with modern digital strategies, and examines their implications for youth in non-conflict West African regions that may soon become the next battleground.

 Traditional Recruitment versus the digital shift

Historically, violent extremist groups in the Sahel and broader West Africa relied on interpersonal recruitment strategies rooted in religious preaching, kinship ties, and community-based grievances according to delegates at the high level security conference organised by the Centre for Intelligence and Security Analysis in November, 2024. In addition, the delegates added that these processes often involved charismatic preachers or community leaders who exploited local injustices, poverty and political exclusion to lure young men offering them a sense of belonging, purpose, and spiritual justification for violence.

The psychological strategy here is deeply relational: recruiters build trust and emotional connection with recruits, gradually shaping their worldview through repetition, peer pressure and isolation from dissenting voices. This grooming often occurred in madrassas, mosques, and informal community gatherings, where ideological narratives were layered with personal support and economic promises. Such methods remain active in parts of Mali, Burkina Faso, and northern Nigeria, where state presence is weak, and faith-based institutions are more trusted than government (see Omenma et al., 2020; Okech, 2021;  Osisanwo et al., 2024)

In recent years, however, violent extremist recruitment has expanded into cyberspace, transforming from sermons to memes, livestreams, and encrypted messages (Lakhani & CIVIPOL, 2021). After the late 1990s, the internet’s rapid growth allowed the dissemination of propaganda, communication with supporters, and planning operations (Shah, 2024). Social media platforms like Facebook, WhatsApp, Telegram, and TikTok are now used to target, groom, and radicalise youth, even in regions that have not yet experienced violence (Sharma, 2023). The modern strategy relies less on physical proximity and more on psychological vulnerability and digital immersion (Asthana, 2020; Vermeersch et al., 2020). Recruiters use algorithms and hashtags to identify youth who express disillusionment, anger, or identity confusion online. Platforms like Telegram, known for its end-to-end encryption and loose moderation have become safe havens for extremist propaganda networks, including jihadist and white supremacist groups. For example, the Australian government listed Terrogram, a network of violent extremist chatroom-like channels on telegram as an official terrorist organisation as it has been linked to lone-actor attacks in Slovakia, Turkey, Brazil and the United States (see Campell, 2025). In 2015, Nazir Nortei Alema, a Kwame Nkrumah University of Science and Technology graduate who had done his national service at the Ghana Statistical Service was part of a WhatsApp group called “Sadaqa Train.” Within this online feedback space, they shared and discussed extremist views of Islam, which led him to join ISIS. These recruiters deploy slick videos, persuasive storytelling, and gamified content to manipulate emotions (Shah, 2024). A young person in northern Ghana, Côte d’Ivoire, or Senegal might scroll through content promising spiritual redemption, global brotherhood, or heroic martyrdom. Over time, the constant exposure normalises violence and makes radical action appear not only justified but necessary.

The Psychology of Recruitment: What Drives Vulnerable Youth?

Violent extremist recruitment, whether executed through traditional in-person methods or via digital platforms, operates by exploiting core psychological vulnerabilities, especially among marginalized youth. These vulnerabilities are not random but they align closely with established psychological theories that help us understand why some individuals are more susceptible than others. In this section, CISA analysts delve into the psychology of recruitment through the lens of established theories.

1. Identity and Belonging

Many West African youth grow up facing social exclusion, chronic unemployment, and weakened communal ties, which contribute to identity crises (see Fox et al., 2016; Kelly et al., 2025). Extremist recruiters offer an alternative community, one that appears to provide meaning, purpose, and a strong sense of belonging. This process resonates strongly with Maslow’s Hierarchy of Needs, where love and belonging is foundational. When these social needs are unmet, individuals are more likely to seek acceptance elsewhere, including from extremist groups. Similarly, Social Identity Theory (Tajfel & Turner, 1979) explains how individuals derive part of their self-concept from the groups to which they belong. Extremist organisations offer a clear in-group identity (“we, the believers”) and position outsiders as enemies, reinforcing a binary view of the world and offering identity stability where societal chaos prevails.

2. Need for Certainty

In an environment of moral ambiguity, political corruption, and socio-economic precarity, many youth long for psychological closure.. For example, in the case of Nazir Nortei Alema, he complained bitterly about social injustice and exclusion in the country and referred to Ghana as a “corrupt democratic state” in a WhatsApp message he sent to his family before leaving to join ISIS. Extremist ideologies offer black-and-white worldviews, with simple answers to complex societal problems. This tendency is illuminated by Need for Cognitive Closure Theory (Kruglanski & Webster, 1996), which posits that some individuals, especially under uncertainty or stress, desire firm answers and are uncomfortable with ambiguity. Extremist ideologies satisfy this need by offering rigid belief systems, clear moral dichotomies, and an absolutist narrative about who is right or wrong. Moreover, such closure can prevent critical thinking, making recruits more accepting of violence as a justified solution.

3. Perceived Injustice and Collective Grievance

A key psychological trigger for radicalisation is the internalisation of real or perceived injustice, whether it stems from historical marginalisation, ethnic exclusion, or the fallout of global geopolitics. Extremist groups frame these grievances into collective victimhood narratives, enhancing emotional resonance. This aligns with Relative Deprivation Theory developed by Gurr, (1970) in his book “Why Men Rebel”. The theory suggests that individuals who perceive a gap between their expectations and their reality (especially when they feel others are treated more fairly) are more likely to experience anger and support radical change. Further, Moral Disengagement Theory (Bandura, 1990) explains how perceived injustice enables people to justify violence. Once convinced that the system is evil or corrupt, individuals become more willing to dehumanise others and legitimise violence as retaliation. These two theories provide an explanation to the reasons why the Fulani are easily susceptible to recruitment by terrorist groups in the sahel. This is due to factors such as stereotypes, marginalisation, stigmatisation and exclusion.

4. Online Echo Chambers and Radical Reinforcement

The digital environment plays a unique psychological role in intensifying and sustaining radical beliefs. Once a youth begins engaging with extremist content, social media algorithms push them into echo chambers where similar content is amplified, dissent is filtered out, and violent ideologies are normalised. This aligns with Confirmation Bias Theory, where individuals tend to seek, interpret, and remember information that confirms their existing beliefs (Van den Brand et al., 2023). Additionally, Group Polarisation Theory suggests that discussions within ideologically homogeneous groups lead individuals to adopt more extreme positions over time (see Campell, 2025). The anonymity and social validation mechanisms on platforms like Telegram, TikTok, or YouTube further reduce inhibitions and bolster commitment to radical causes.

Why “Terror-Free” Zones Should Worry

Regions in West Africa currently free from terrorist attacks are not immune. In fact, they are at risk precisely because they lack awareness or preparedness. Recruiters target youth in these areas before violence arrives, aiming to build ideological networks and sleeper cells. In these zones, the false sense of security means schools, communities, and governments often neglect psychological and digital resilience programs. The result? A fertile ground for invisible radicalisation, until it is too late. Preventing violent extremist recruitment requires a multi-layered approach that addresses both psychological drivers and digital vulnerabilities:

  • Strengthen Identity Formation: Schools, faith groups, and families must foster inclusive, pluralistic identities that inoculate youth against polarising ideologies.
  • Digital Literacy Campaigns: Teach youth how to spot propaganda, challenge misinformation, and navigate digital spaces safely.
  •  Mental Health Support: Many at-risk youth suffer from trauma, isolation, or depression. Community-based counselling and peer support can close the emotional gaps extremists exploit. In addition, youth should be given employment and be given the chance to participate in governance so as to make them develop the spirit of patriotism.
  • Alternative Narratives: Governments and civil society must counter extremist messaging with compelling, locally relevant stories of peace, resilience, and hope, delivered on the same platforms extremists use.
  • Community Monitoring and Early Warning: Establish trusted networks that can detect early signs of radicalisation, not through surveillance, but through community engagement and dialogue.

Conclusion

The fight against violent extremism is not just about guns and geopolitics. It is a psychological battle for the hearts and minds of youth, increasingly waged through smartphones and sermons. Understanding the psychological foundations of extremist recruitment is crucial for crafting effective counter-radicalisation strategies in West Africa. These strategies must go beyond securitised responses to address youth identity formation, emotional resilience, and digital media literacy. By grounding our responses in psychological theory, we can better design interventions that inoculate vulnerable youth against both traditional ideological grooming and modern digital manipulation, thereby building long-term resilience in regions not yet consumed by violent extremism. If West Africa wants to stay ahead of the curve, it must begin by recognising the early signs of radicalisation, whether whispered in a madrassa or posted on Telegram.The time to act is before the violence starts, while minds are still open, and futures still unwritten. We are not fire services and must not wait for the fire before we struggle to quench it.

Reference

Asthana, S. (2020). Youth, ICTs, and “Violent Extremism”. The Handbook of Media Education Research, 47-59. https://doi.org/10.1002/9781119166900.ch3

Bandura, A. (1990). Selective Activation and Disengagement of Moral Control. Journal of Social Issues, 46(1), 27-46. https://doi.org/10.1111/j.1540-4560.1990.tb00270.x

Campell, H. (2025). Terrorgram block is a welcome step towards countering violent .. www.aspistrategist.org.a. July 16, 2025. https://www.aspistrategist.org.au/terrorgram-block-is-a-welcome-step-towards-countering-violent-extremism/

Fox, L., Senbet, L. W., & Simbanegavi, W. (2016). Youth Employment in Sub-Saharan Africa: Challenges, Constraints and Opportunities. Journal of African Economies, 25. https://doi.org/10.1093/jae/ejv027

Gurr, T. R. (1970). Why men rebel. Princeton, NJ: Princeton University Press

https://doi.org/10.1037/0033-295X.103.2.263

Kelly, B., Van Breda, A. D., & Frimpong-Manso, K. (2025). “You are nothing and you have nothing”: Exploring social justice for youth leaving care in African contexts. Children and Youth Services Review, 172, 108291. https://doi.org/10.1016/j.childyouth.2025.108291

Kruglanski, A. W., & Webster, D. M. (1996). Motivated Closing of the Mind: “Seizing” and “Freezing”. Psychological Review, 103, 263-283.

Lakhani, S., & CIVIPOL,. (2021). Gaming and Extremism; The Radicalization of Digital Playgrounds; 1. library.oapen.org. July 16, 2025. https://library.oapen.org/bitstream/handle/20.500.12657/87528/9781003850397.pdf?sequence=1&isAllowed=y

Okech, A. (2021). Governing Gender: Violent Extremism in Northern Nigeria. Africa Development / Afrique et Développement, 46(3), 1–20. https://www.jstor.org/stable/48630968

Omenma, J., Hendricks, C., & Ajaebili, N. (2020). Al-Shabaab and Boko Haram: Recruitment Strategies. Peace and Conflict Studies. https://doi.org/10.46743/1082-7307/2020.1460

Osisanwo, A. (2024). Manipulative and Recruitment Strategies in Boko Haram Terrorist

Statements. Journal of Asian and African Studies. https://doi.org/10.1177/00219096241228795

Shah, M. (2024). The Digital Weaponry of Radicalisation: AI and the Recruitment Nexus. gnet-research.org. July 16, 2025. https://gnet-research.org/2024/07/04/the-digital-weaponry-of-radicalisation-ai-and-the-recruitment-nexus/

Sharma, S. (2023). Online Radicalisation: How Social Media Is Promoting Islamist Militancy. South Asian Survey, 30(2), 189-209. https://doi.org/10.1177/09715231231218822

Tajfel, H., & Turner, J. C. (1979). An integrative theory of intergroup conflict. In W. G. Austin, & S. Worchel (Eds.), The social psychology of intergroup relations (pp. 33-37). Monterey, CA: Brooks/Cole.

Van den Brand, A. J., Hendriks-Hartensveld, A. E., Havermans, R. C., & Nederkoorn, C. (2023). Child characteristic correlates of food rejection in preschool children: A narrative review. Appetite, 190, 107044. https://doi.org/10.1016/j.appet.2023.107044

Vermeersch, E., Coleman, J., Demuynck, M., & Santo, E. D. (2020). Social Media in Mali and its Relation to Violent Extremism: A Youth .. icct.nl. July 16, 2025. https://icct.nl/publication/social-media-mali-and-its-relation-violent-extremism-youth-perspective

Source: CISA ANALYST
Tags: 20258th Edition 2025
Previous Post

Leveraging Traditional Leadership for National Security: A Community-Centred Approach to Counter Violent Extremism in Ghana

Next Post

Everyday Theft in a Busy Nucleus: Understanding Pickpocketing Practices in Madina, Accra

Next Post
Everyday Theft in a Busy Nucleus: Understanding Pickpocketing Practices in Madina, Accra

Everyday Theft in a Busy Nucleus: Understanding Pickpocketing Practices in Madina, Accra

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected test

  • 23.9k Followers
  • 99 Subscribers
  • Trending
  • Comments
  • Latest
Africa's Natural Resources: Who’s After What And What’s The Continent’s Strategy In The Scramble Game?

Africa’s Natural Resources: Who’s After What And What’s The Continent’s Strategy In The Scramble Game?

July 22, 2024
Effects of overpopulation in class on quality of education

Effects of overpopulation in class on quality of education

March 25, 2024
Integration of environmental security into Ghana’s National Security Strategy safeguards the future

Integration of environmental security into Ghana’s National Security Strategy safeguards the future

January 31, 2024
The Growing Influence Of AES On African Countries

The Growing Influence Of AES On African Countries

April 1, 2025
Integration of environmental security into Ghana’s National Security Strategy safeguards the future

Integration of environmental security into Ghana’s National Security Strategy safeguards the future

10
Border Security: A Door Left Wide Open

Border Security: A Door Left Wide Open

3
Polls close in Liberia

Liberia: Once a war-torn country, now Africa’s beacon of democracy – Lessons for Africa

1
Alliance Of Sahel States Formation: Objectives & Implications for ECOWAS

Alliance Of Sahel States Formation: Objectives & Implications for ECOWAS

1
Digitalisation, Security Contagion, and Mobile Money Fraud in Ghana: Navigating the Dark Side of Financial Innovation

Digitalisation, Security Contagion, and Mobile Money Fraud in Ghana: Navigating the Dark Side of Financial Innovation

August 1, 2025
North Korea’s New Rocket Launcher And It’s Implication On The Sahel Conflict

North Korea’s New Rocket Launcher And It’s Implication On The Sahel Conflict

August 1, 2025
Losing Our Words: The Threat to World Languages

Losing Our Words: The Threat to World Languages

July 30, 2025
Efficient for Whom? Revisiting Pareto Optimality in the Age of Insecurity in West Africa.

Efficient for Whom? Revisiting Pareto Optimality in the Age of Insecurity in West Africa.

July 30, 2025

Recent News

Digitalisation, Security Contagion, and Mobile Money Fraud in Ghana: Navigating the Dark Side of Financial Innovation

Digitalisation, Security Contagion, and Mobile Money Fraud in Ghana: Navigating the Dark Side of Financial Innovation

August 1, 2025
North Korea’s New Rocket Launcher And It’s Implication On The Sahel Conflict

North Korea’s New Rocket Launcher And It’s Implication On The Sahel Conflict

August 1, 2025
Losing Our Words: The Threat to World Languages

Losing Our Words: The Threat to World Languages

July 30, 2025
Efficient for Whom? Revisiting Pareto Optimality in the Age of Insecurity in West Africa.

Efficient for Whom? Revisiting Pareto Optimality in the Age of Insecurity in West Africa.

July 30, 2025

CISA Newsletter

Headlining West African News

Follow Us

Browse by Category

  • ANALYSTS
  • Business
  • ECONOMY
  • EDITORIAL
  • Environment
  • Food
  • Health
  • Lifestyle
  • News
  • Politics
  • Review
  • Science
  • Sports
  • Tech
  • Travel
  • Uncategorized
  • World

Recent News

Digitalisation, Security Contagion, and Mobile Money Fraud in Ghana: Navigating the Dark Side of Financial Innovation

Digitalisation, Security Contagion, and Mobile Money Fraud in Ghana: Navigating the Dark Side of Financial Innovation

August 1, 2025
North Korea’s New Rocket Launcher And It’s Implication On The Sahel Conflict

North Korea’s New Rocket Launcher And It’s Implication On The Sahel Conflict

August 1, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 CISA Ghana Newsletter - Headlines West Africa.

  • fr Français
  • en English
No Result
View All Result
  • Home
  • Editions
    • 2025
      • July 2025
      • June 2025
      • May 2025
      • April 2025
      • March 2025
      • February 2025
      • January 2025
    • 2024
      • December 2024
      • November 2024
      • October 2024
      • September 2024
      • August 2024
      • July 2024
      • June 2024
      • May 2024
      • April 2024
      • March 2024
      • February 2024
      • January 2024
    • 2023
      • December 2023
  • News
  • Tech
  • Entertainment
  • Lifestyle
  • Review
  • CISA Ghana

© 2023 CISA Ghana Newsletter - Headlines West Africa.

  • English
  • Français (French)