Lessons from Colombia for Curtailing the Boko Haram Insurgency in Nigeria
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
BOKO HARAM Emerging Threat to the U.S
112TH CONGRESS COMMITTEE " COMMITTEE PRINT ! 1st Session PRINT 112–B BOKO HARAM Emerging Threat to the U.S. Homeland SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES December 2011 FIRST SESSION U.S. GOVERNMENT PRINTING OFFICE 71–725 PDF WASHINGTON : 2011 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi DANIEL E. LUNGREN, California LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas MICHAEL T. MCCAUL, Texas HENRY CUELLAR, Texas GUS M. BILIRAKIS, Florida YVETTE D. CLARKE, New York PAUL C. BROUN, Georgia LAURA RICHARDSON, California CANDICE S. MILLER, Michigan DANNY K. DAVIS, Illinois TIM WALBERG, Michigan BRIAN HIGGINS, New York CHIP CRAVAACK, Minnesota JACKIE SPEIER, California JOE WALSH, Illinois CEDRIC L. RICHMOND, Louisiana PATRICK MEEHAN, Pennsylvania HANSEN CLARKE, Michigan BEN QUAYLE, Arizona WILLIAM R. KEATING, Massachusetts SCOTT RIGELL, Virginia KATHLEEN C. HOCHUL, New York BILLY LONG, Missouri VACANCY JEFF DUNCAN, South Carolina TOM MARINO, Pennsylvania BLAKE FARENTHOLD, Texas MO BROOKS, Alabama MICHAEL J. RUSSELL, Staff Director & Chief Counsel KERRY ANN WATKINS, Senior Policy Director MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director (II) C O N T E N T S BOKO HARAM EMERGING THREAT TO THE U.S. HOMELAND I. Introduction .......................................................................................................... 1 II. Findings .............................................................................................................. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
Boko Haram Beyond the Headlines: Analyses of Africa’S Enduring Insurgency
Boko Haram Beyond the Headlines: Analyses of Africa’s Enduring Insurgency Editor: Jacob Zenn Boko Haram Beyond the Headlines: Analyses of Africa’s Enduring Insurgency Jacob Zenn (Editor) Abdulbasit Kassim Elizabeth Pearson Atta Barkindo Idayat Hassan Zacharias Pieri Omar Mahmoud Combating Terrorism Center at West Point United States Military Academy www.ctc.usma.edu The views expressed in this report are the authors’ and do not necessarily reflect those of the Combating Terrorism Center, United States Military Academy, Department of Defense, or U.S. Government. May 2018 Cover Photo: A group of Boko Haram fighters line up in this still taken from a propaganda video dated March 31, 2016. COMBATING TERRORISM CENTER ACKNOWLEDGMENTS Director The editor thanks colleagues at the Combating Terrorism Center at West Point (CTC), all of whom supported this endeavor by proposing the idea to carry out a LTC Bryan Price, Ph.D. report on Boko Haram and working with the editor and contributors to see the Deputy Director project to its rightful end. In this regard, I thank especially Brian Dodwell, Dan- iel Milton, Jason Warner, Kristina Hummel, and Larisa Baste, who all directly Brian Dodwell collaborated on the report. I also thank the two peer reviewers, Brandon Kend- hammer and Matthew Page, for their input and valuable feedback without which Research Director we could not have completed this project up to such a high standard. There were Dr. Daniel Milton numerous other leaders and experts at the CTC who assisted with this project behind-the-scenes, and I thank them, too. Distinguished Chair Most importantly, we would like to dedicate this volume to all those whose lives LTG (Ret) Dell Dailey have been afected by conflict and to those who have devoted their lives to seeking Class of 1987 Senior Fellow peace and justice. -
Breaking Boko Haram and Ramping up Recovery: US-Lake Chad Region 2013-2016
From Pariah to Partner: The US Integrated Reform Mission in Burma, 2009 to 2015 Breaking Boko Haram and Ramping Up Recovery Making Peace Possible US Engagement in the Lake Chad Region 2301 Constitution Avenue NW 2013 to 2016 Washington, DC 20037 202.457.1700 Beth Ellen Cole, Alexa Courtney, www.USIP.org Making Peace Possible Erica Kaster, and Noah Sheinbaum @usip 2 Looking for Justice ACKNOWLEDGMENTS This case study is the product of an extensive nine- month study that included a detailed literature review, stakeholder consultations in and outside of government, workshops, and a senior validation session. The project team is humbled by the commitment and sacrifices made by the men and women who serve the United States and its interests at home and abroad in some of the most challenging environments imaginable, furthering the national security objectives discussed herein. This project owes a significant debt of gratitude to all those who contributed to the case study process by recommending literature, participating in workshops, sharing reflections in interviews, and offering feedback on drafts of this docu- ment. The stories and lessons described in this document are dedicated to them. Thank you to the leadership of the United States Institute of Peace (USIP) and its Center for Applied Conflict Transformation for supporting this study. Special thanks also to the US Agency for International Development (USAID) Office of Transition Initiatives (USAID/OTI) for assisting with the production of various maps and graphics within this report. Any errors or omis- sions are the responsibility of the authors alone. ABOUT THE AUTHORS This case study was produced by a team led by Beth ABOUT THE INSTITUTE Ellen Cole, special adviser for violent extremism, conflict, and fragility at USIP, with Alexa Courtney, Erica Kaster, The United States Institute of Peace is an independent, nonpartisan and Noah Sheinbaum of Frontier Design Group. -
How Sophisticated Are Terrorist Attacks on Passenger Rail Transportation
How Sophisticated are Terrorist Attacks on Passenger Rail Project SP 0520 Transportation June 2020 Brian Michael Jenkins and Bruce R. Butterworth Executive Summary Summary of Key Findings Terrorist attacks on passenger rail transportation are statistically rare events in the developed world— only about seven attacks per year are carried out against all of the economically advanced countries combined. However, uncovered plots and attempts indicate continuing terrorist interest in attacking transportation targets. The vast majority of terrorist attacks on passenger rail transportation are aimed at disrupting travel or causing casualties. Most of the attacks (87%) and 100% of the casualties result from attacks on passengers aboard trains and in stations, i.e., where the people are. We have defined sophistication by identifying four criteria, of which at least one must be met: The attack must (1) involve the recruitment of inside assistance, the use of insider knowledge, or the acquisition of specialized skills through training; (2) require the penetration of manned or closely monitored security systems; (3) involve the use of sophisticated weapons, devices, or means (for an IED to be considered sophisticated, it must do more than simply explode—it must have a timing or remote detonating system that guarantees detonation at a remote time or in a specific location, or it must be miniaturized or disguised so as to evade detection); and (4) must be complex—it must involve multiple actors with individual roles or coordinated simultaneous or near-simultaneous attacks at different locations. Using those criteria, we find few of the terrorist attacks on public surface transport are sophisticated. -
Pervasive Corruption in Nigeria: a Holistic Approach
KIU Journal of Social Sciences KIU Journal of Social Sciences Copyright©2017 Kampala International University ISSN: 1996902-3; 3(1): 199–207 Pervasive Corruption in Nigeria: A Holistic Approach S.M. ABDULMALIK Lead City University, Ibadan, Nigeria. L.A. AYINLA University of Ilorin, Nigeria Abstract. “Our strange romance with corruption constitutes the major political agenda of began with the enthronement of a kleptomaniac President Mohammadu Buhari led Federal leadership at the exits of the military from our Government of Nigeria as manifested in his on- polity. The biggest mistake of the electorates is going fight against the malaise. To this end, this the sale of its franchise to greedy ruling elites paper therefore sets out to examine the varying who captured power and cornered our resources avalanches of corrupt practices by political and to the extent that it is now adept at the tricks of public office holders in Nigeria coupled with its self-perpetuation---We now have corruption attendant negative consequences with a view to sharing the spotlight with terrorism as our proffer workable and viable remedies to this biggest and most common problem. They are clog in wheel of the Nigeria progress. Emphasis like Siamese twins who have an embryonic will be placed on the on-going crusade, activities relationship”. Going by international rating as /actions of the Buhari led Federal Government regard corrupt practices, Nigeria has consistently of Nigeria in the fight against the menace. been rated as either the most corrupt or one of the most corrupt countries in the world. Keywords: Corruption, Pervasive Corruption, Corrupt Practices, Democracy and Nigeria. -
Nigeria Page 1 of 8
Nigeria Page 1 of 8 Published on Freedom House (https://freedomhouse.org) Home > Nigeria Nigeria Country: Nigeria Year: 2016 Freedom Status: Partly Free Political Rights: 4 Civil Liberties: 5 Aggregate Score: 48 Freedom Rating: 4.5 Overview: After 16 years in power, the Peoples Democratic Party (PDP) lost the 2015 presidential election and its majority in the National Assembly to the opposition All Progressives Congress (APC). The polls, which observers regarded as competitive and generally well conducted, represented a milestone in the country’s democratic development, marking the first time that the opposition gained power at the national level through elections. On assuming office in May, President Muhammadu Buhari identified combatting corruption, defeating the militant Islamist group Boko Haram, and boosting the living standards of Nigerians as his main policy priorities. The new administration implemented reforms to increase the effectiveness of the Nigerian military in its counterinsurgency efforts. By December, the government had recaptured a significant amount of territory, and Buhari announced that the military had “technically” defeated Boko Haram, saying the group could no longer mount full-scale attacks on security forces or population centers. The government’s gains were attributed in part to an offensive launched in mid-February by the Multinational Joint Task Force (MNJTF), which includes soldiers from Nigeria, Niger, Cameroon, Chad, and Benin. Nevertheless, the security situation in northeastern Nigeria remained grave throughout 2015, as Boko Haram carried out guerilla-style attacks and suicide bombings against civilian and government targets. In addition, reports from domestic and international https://freedomhouse.org/print/48089 6/17/2016 Nigeria Page 2 of 8 advocacy groups indicated that government forces continued to commit gross human rights violations with impunity, including extrajudicial killings, arbitrary mass arrests, illegal detentions, and torture of civilians. -
Living Through Nigeria's Six-Year
“When We Can’t See the Enemy, Civilians Become the Enemy” Living Through Nigeria’s Six-Year Insurgency About the Report This report explores the experiences of civilians and armed actors living through the conflict in northeastern Nigeria. The ultimate goal is to better understand the gaps in protection from all sides, how civilians perceive security actors, and what communities expect from those who are supposed to protect them from harm. With this understanding, we analyze the structural impediments to protecting civilians, and propose practical—and locally informed—solutions to improve civilian protection and response to the harm caused by all armed actors in this conflict. About Center for Civilians in Conflict Center for Civilians in Conflict (CIVIC) works to improve protection for civil- ians caught in conflicts around the world. We call on and advise international organizations, governments, militaries, and armed non-state actors to adopt and implement policies to prevent civilian harm. When civilians are harmed we advocate the provision of amends and post-harm assistance. We bring the voices of civilians themselves to those making decisions affecting their lives. The organization was founded as Campaign for Innocent Victims in Conflict in 2003 by Marla Ruzicka, a courageous humanitarian killed by a suicide bomber in 2005 while advocating for Iraqi families. T +1 202 558 6958 E [email protected] www.civiliansinconflict.org © 2015 Center for Civilians in Conflict “When We Can’t See the Enemy, Civilians Become the Enemy” Living Through Nigeria’s Six-Year Insurgency This report was authored by Kyle Dietrich, Senior Program Manager for Africa and Peacekeeping at CIVIC. -
En Download (10.33
FGN’S 2020 BUDGET BREAKDOWN Sinking Funds Statutory Transfer 296bn N556bn Deficit 2.18tn Debt Service N2.453tn Non-Oil Revenue Recurrent N1.81tn Expenditure N4.88tn IN OUT Other Revenue Sources 3.7tn* • Overall budget deficit of N2.175 trillion in 2020 represents 1.52% of GDP. MDA’s Capital • Projected deficit within threshold stipulat- Oil Revenue Expenditure ed in the Fiscal Responsibility Act (FRA) 2007. N2.64tn N2.145 • Budget deficit is to be financed mainly by borrowing N1.594 trillion. Expenditure Revenue • Domestic sources - N744.99 billion • Foreign sources (gradual shift away from 8.15tn 10.33tn commercial to more concessionary financ- * Includes Dividends, Recoveries/fines, Independent ing) - N850 billion Revenue, Signature Bonus etc Overview of the revenue framework The aggregate revenue available to fund the 2020 budget is projected at N8.155 trillion (7% or N561.2 billion more than the 2019 Budget of N7.59 trillion). To promote transparency, account- ability & comprehensiveness, the bud- get of 10 major GOEs are integrated in the FGNs budget w.e.f 2020 Overview of the Expenditure framework . 2020 FGN spending (inclusive of GOEs/PT Loans) is projected to be N10.33 trillion. Recurrent (non-debt) spending expected to rise by 11.28%, from N4.39 trillion in FY2019 to N4.88 trillion (reflecting increases in salaries & pensions including provisions for implementation of the new minimum wage) . Capital Expenditure (Inclusive of Transfers, GOEs Capital & Project-tied loans) as % of FGN Expendi- ture is 24% . At N2.45 trillion, debt service is 23.74% of planned spending . Provision to retire maturing bond to local contrac- tors increased by 169.09% from N110 billion in FY2019 to N296 billion. -
Female Suicide Bombers in Boko Haram Insurgency: Victims Or Perpetrators?
International Journal of World Policy and Development Studies ISSN(e): 2415-2331, ISSN(p): 2415-5241 Vol. 6, Issue. 2, pp: 11-18, 2020 Academic Research Publishing URL: https://arpgweb.com/journal/journal/11 Group DOI: https://doi.org/10.32861/ijwpds.62.11.18 Original Research Open Access Female Suicide Bombers in Boko Haram Insurgency: Victims or Perpetrators? James E. Archibong Article History Received: January 5, 2020 Department of Jurisprudence and International Law, Faculty of Law, University of Calabar, Nigeria Revised: January 30, 2020 Email: [email protected] Accepted: February 6, 2020 Published: February 8, 2020 Copyright © 2020 ARPG & Author This work is licensed under the Creative Commons Attribution International CC BY: Creative Commons Attribution License 4.0 Abstract The increasing involvement of women in the advancement of insurgency in Nigeria has become a thing of great worry. The question often asked is as to whether their involvement is induced or free-willed. The concept of consent is on different layers and one would imagine the extent of consent given before they become members of the sect or culprits. The different ways women have been used to perpetrate the activities of Boko Haram ranges from threats to abuse, Indoctrination to hypnotism and many others. Due to the subtle and unsuspecting nature of women, they form a good strategy for members of the sect. However, their involvement is not evidence against them as they face situations that almost deny them the opportunity to choose whether or not to subscribe to the forceful approach used by Boko Haram insurgents!. Keywords: Boko haram; Women; Suicide bombing; Terrorism; Nigeria. -
Nigeria Update to the IMB Nigeria
Progress in Polio Eradication Initiative in Nigeria: Challenges and Mitigation Strategies 16th Independent Monitoring Board Meeting 1 November 2017 London 0 Outline 1. Epidemiology 2. Challenges and Mitigation strategies SIAs Surveillance Routine Immunization 3. Summary and way forward 1 Epidemiology 2 Polio Viruses in Nigeria, 2015-2017 Past 24 months Past 12 months 3 Nigeria has gone 13 months without Wild Polio Virus and 11 months without cVDPV2 13 months without WPV 11 months – cVDPV2 4 Challenges and Mitigation strategies 5 SIAs 6 Before the onset of the Wild Polio Virus Outbreak in July 2016, there were several unreached settlements in Borno Borno Accessibility Status by Ward, March 2016 # of Wards in % Partially LGAs % Fully Accessible % Inaccessible LGA Accessible Abadam 10 0% 0% 100% Askira-Uba 13 100% 0% 0% Bama 14 14% 0% 86% Bayo 10 100% 0% 0% Biu 11 91% 9% 0% Chibok 11 100% 0% 0% Damboa 10 20% 0% 80% Dikwa 10 10% 0% 90% Gubio 10 50% 10% 40% Guzamala 10 0% 0% 100% Gwoza 13 8% 8% 85% Hawul 12 83% 17% 0% Jere 12 50% 50% 0% Kaga 15 0% 7% 93% Kala-Balge 10 0% 0% 100% Konduga 11 0% 64% 36% Kukawa 10 20% 0% 80% Kwaya Kusar 10 100% 0% 0% Mafa 12 8% 0% 92% Magumeri 13 100% 0% 0% Maiduguri 15 100% 0% 0% Marte 13 0% 0% 100% Mobbar 10 0% 0% 100% Monguno 12 8% 0% 92% Ngala 11 0% 0% 100% Nganzai 12 17% 0% 83% Shani 11 100% 0% 0% State 311 41% 6% 53% 7 Source: Borno EOC Data team analysis Four Strategies were deployed to expand polio vaccination reach and increase population immunity in Borno state SIAs RES2 RIC4 Special interventions 12