North Central Region
The data reflects the 2 most recent violent security related incidents for Benue which are September, 2024 and August, 2024.
Violent Threats In
September, 2024
3
Violent Threats In
August, 2024
5
Violent Threats
% Difference
40%
ID | State | Violent Incident | Terrorism Incident | Kidnapping Incident | Casualties Number |
---|---|---|---|---|---|
1 | Abia | 1 | 0 | 0 | 1 |
2 | Adamawa | 1 | 0 | 0 | 3 |
3 | Akwa Ibom | 0 | 0 | 0 | 0 |
4 | Anambra | 6 | 0 | 0 | 12 |
5 | Bauchi | 4 | 0 | 1 | 5 |
6 | Bayelsa | 1 | 0 | 0 | 0 |
7 | Benue | 3 | 0 | 0 | 9 |
8 | Borno | 0 | 0 | 0 | 0 |
9 | Cross River | 0 | 0 | 0 | 0 |
10 | Delta | 7 | 0 | 3 | 4 |
11 | Ebonyi | 1 | 0 | 0 | 1 |
12 | Edo | 5 | 0 | 3 | 3 |
13 | Ekiti | 1 | 0 | 0 | 0 |
14 | Enugu | 3 | 0 | 0 | 6 |
15 | Federal Capital Territory | 3 | 0 | 2 | 1 |
16 | Gombe | 0 | 0 | 0 | 0 |
17 | Imo | 6 | 0 | 1 | 4 |
18 | Jigawa | 0 | 0 | 0 | 0 |
19 | Kaduna | 8 | 0 | 6 | 3 |
20 | Kano | 5 | 0 | 2 | 5 |
21 | Katsina | 1 | 0 | 1 | 0 |
22 | Kebbi | 1 | 0 | 0 | 0 |
23 | Kogi | 2 | 0 | 0 | 1 |
24 | Kwara | 4 | 0 | 2 | 1 |
25 | Lagos | 6 | 0 | 1 | 6 |
26 | Nasarawa | 2 | 0 | 0 | 2 |
27 | Niger | 2 | 0 | 0 | 4 |
28 | Ogun | 3 | 0 | 3 | 1 |
29 | Ondo | 1 | 0 | 0 | 1 |
30 | Osun | 2 | 0 | 1 | 0 |
31 | Oyo | 4 | 0 | 2 | 3 |
32 | Plateau | 2 | 0 | 0 | 13 |
33 | Rivers | 7 | 0 | 2 | 5 |
34 | Sokoto | 4 | 0 | 1 | 3 |
35 | Taraba | 0 | 0 | 0 | 0 |
36 | Yobe | 4 | 1 | 0 | 4 |
37 | Zamfara | 4 | 0 | 1 | 8 |
Total | ** | ** | ** | ** |
ID: The unique identifier for each entry.
State: The geographical location or region.
Current Month: The data for the current month.
Previous Month: The data for the previous month.
% Difference: Represents the percentage change between Current Month and Previous Month values.
You can also reach out to us for tailored security solutions and advice to tackle the following variable protection and security management challenges.
Site Security Review : Minimize risks and vulnerabilities, Security Plan Development : Enhance your business safety.
Background Screening : Safeguard from potential internal threats and toxic relationships. Security Staff Training : Elevate your team's performance and response.
Security Management : Streamlined protocols and efficient site security management with proprietary software.
Copyright 2024. All Right Reserved