SYNERGY IN SECURITY: EVALUATING THE EFFICACY OF COLLABORATIVE STRATEGIES EMPLOYED BY THE ARMED FORCES OF NIGERIA IN COUNTERING VIOLENT EXTREMISM
Okwudiwa Gogogwute , PhD Student City University, Cambodia Dr. M. O. Musa , Department of Cybersecurity, Faculty of Computing, University of Port Harcourt, NigeriaAbstract
In the face of evolving security threats, the Armed Forces of Nigeria (AFN) stand at a critical juncture, where the echoes of gunfire meet the whispers of diplomacy. This study delves into the heart of Nigeria's counter-extremism efforts, examining the AFN's journey from traditional military approaches to a symphony of collaborative strategies. Through an extensive literature review, the study unravels the tapestry of stakeholder engagement woven by the AFN in their quest to combat violent extremism. This research navigates the complex terrain of Nigeria's security landscape, exploring how the AFN has transformed from a lone sentinel to a conductor of a diverse orchestra of stakeholders. It analyses key initiatives such as the National Security Strategy and the National Action Plan for Preventing and Countering Violent Extremism, viewing them as scores that guide this intricate performance of national security. The study reveals a narrative of progress punctuated by persistent challenges. It found that while the AFN has successfully harmonized efforts with civil society, religious leaders, and international partners, discordant notes of mistrust and resource constraints continue to resonate. The analysis uncovers the delicate balance the AFN must maintain – striking a chord between military might and community engagement, between national sovereignty and international collaboration. Emerging from our review is a portrait of an armed force in transition, learning to wield soft power alongside hard power. The study identifies innovative practices where the AFN has successfully bridged divides, creating unexpected alliances in the fight against extremism. However, we also highlight the unfinished symphony – areas where the collaboration falls short of its potential. This study contributes to the growing body of literature on military transformation in the face of asymmetric threats. By examining the AFN's collaborative strategies, it provides insights applicable not only to Nigeria but to armed forces globally grappling with similar security challenges. As the AFN continues to compose its response to violent extremism, this research offers both a reflection on its current performance and a prelude to future harmonies in national security efforts.
Keywords
Synergy in Security, Collaborative Strategies, Armed Forces of Nigeria
References
Adegbulu, F., 2021. The role of religious leaders in countering violent extremism in Nigeria.
Journal of Religion and Violence, 9(1), pp.45-67.
Adelaja, A., Labo, A. and Penar, E., 2018. Public opinion on the root causes of terrorism and objectives of terrorists: A Boko Haram case study. Perspectives on Terrorism, 12(3), pp.35-49.
Adelaja, A., Labo, A. and Penar, P. (2021) 'Campus-based interventions and student attitudes towards extremism: Evidence from northern Nigerian universities', African Security Review, 30(3), pp. 277-298.
Aderonke, M. (2015) 'Terrorism and Counter-Terrorism in Nigeria: Theoretical Paradigms and Lessons for Public Policy', Canadian Social Science, 11(3), pp. 72-79.
Briggs, R., 2010. Community engagement for counterterrorism: lessons from the United Kingdom. International Affairs, 86(4), pp.971-981.
Budget Office of the Federation (2020) Security Sector Expenditure Analysis 2015-2019. Abuja: Federal Government of Nigeria.
Bures, O., 2018. EU counterterrorism policy: a paper tiger?. Routledge.
Buzan, B. (1991) People, states and fear: An agenda for international security studies in the post- cold war era. 2nd edn. Boulder: Lynne Rienner.
Buzan, B., Wæver, O. and de Wilde, J. (1998) Security: A new framework for analysis. Boulder: Lynne Rienner.
Caballero-Anthony, M. (2015) An introduction to non-traditional security studies: A transnational approach. London: SAGE Publications.
Center for Democracy and Development, 2021. Public perceptions of security and counter- extremism efforts in northeastern Nigeria. Abuja: CDD.
Centre for Democracy and Development (2020) Assessment of Civil Society Involvement in Preventing and Countering Violent Extremism in Nigeria. Abuja: CDD.
Chermak, S., Freilich, J.D., Parkin, W.S. and Lynch, J.P., 2013. American terrorism and extremist crime data sources and selectivity bias: An investigation focusing on homicide events committed by far-right extremists. Journal of quantitative criminology, 29(3), pp.441- 467.
Choucri, N. (2012) Cyberpolitics in international relations. Cambridge: MIT Press.
Dasuki, M.S. (2013) 'Nigeria's Soft Approach to Countering Terrorism', Office of the National Security Adviser, Abuja.
Eji, E. (2016) 'Rethinking Nigeria's Counter-Terrorism Strategy', The International Journal of Intelligence, Security, and Public Affairs, 18(3), pp. 198-220.
Harris-Hogan, S., Barrelle, K. and Zammit, A., 2016. What is countering violent extremism? Exploring CVE policy and practice in Australia. Behavioral Sciences of Terrorism and Political Aggression, 8(1), pp.6-24.
Hassan, I. and Tyvoll, J., 2018. After Boko Haram: Prospects for Transitional Justice in Northeast Nigeria. Center for Strategic and International Studies (CSIS).
Hogg, M.A. and Abrams, D., 1988. Social identifications: A social psychology of intergroup relations and group processes. Routledge.
Ojewale, O. (2021) 'Nigeria's Inter-Religious Council and the Quest for Religious Harmony',
Journal of Inter-Religious Studies, 32, pp. 63-78.
Okenyodo, K. (2022) 'Building sustainable peace: A case study of community engagement for countering extremism in Kaduna State', African Journal on Conflict Resolution, 22(1), pp. 33-58.
Okoli, A.C. and Ogayi, C.O., 2018. Herdsmen militancy and humanitarian crisis in Nigeria: A theoretical briefing. African Security Review, 27(2), pp.129-143.
Omenma, J.T., Hendricks, C.M. and Ajaebili, N.C. (2020) 'al-Shabaab and Boko Haram: Recruitment Strategies', Peace and Conflict Studies, 27(1), pp. 1-26.
Sampson, I.T. (2016) 'The dilemmas of counter-bokoharamism: Debating state responses to Boko Haram terrorism in northern Nigeria', Security Journal, 29(2), pp. 122-146.
Sampson, I.T. and Onuoha, F.C. (2011) 'Forcing the Horse to Drink or Making it Realise its
Thirst? Understanding the Enactment of Anti-Terrorism Legislation (ATL) in Nigeria', Perspectives on Terrorism, 5(3-4), pp. 33-49
Vermeulen, F., 2014. Suspect communities—Targeting violent extremism at the local level: Policies of engagement in Amsterdam, Berlin, and London. Terrorism and Political Violence, 26(2), pp.286-306.
Vivekananda, J., Wall, M., Sylvestre, F. and Nagarajan, C., 2019. Shoring up stability: Addressing climate and fragility risks in the Lake Chad region. Berlin: Adelphi.
Wolfers, A. (1952) '"National Security" as an ambiguous symbol', Political Science Quarterly, 67(4), pp. 481-502.
Woodside-Jiron, H., Russell, K. and Rosenblum, K.E., 2019. Investigating youth radicalization through interactional dynamics in a Canadian community-based program. Studies in Conflict & Terrorism, 42(7), pp.683-703.
World Bank, 2016. North-East Nigeria Recovery and Peace Building Assessment: Synthesis Report. Washington, DC: World Bank.
Zenn, J., 2018. Boko Haram's Conquest for the Caliphate: How Al Qaeda Helped Islamic State Acquire Territory. Studies in Conflict & Terrorism, 43(2), pp.89-122.
Article Statistics
Downloads
Copyright License
Copyright (c) 2024 Okwudiwa Gogogwute, Dr. M. O. Musa
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.