ISWAP

ISWAP’s Impact on Nigeria’s National Interests

More than half a decade ago, the now dominant faction in Nigeria’s conflict, Islamic State West Africa Province (ISWAP), split from Boko Haram, pledging allegiance to ISIS. Formerly led by the late Abu Musab al-Barnawi, son of the former Boko Haram leader and founder, Mohammed Yusuf, the group is said to have disapproved of Boko Haram’s extremist strategies.

Most of its attacks have targeted the Nigerian Army and its close allies. With a robust weaponry base, steady flow of funding, and exploitable societal gaps that aid its recruitment and expand its membership, ISWAP has successfully launched several attacks in Nigeria, Cameroon, Chad, and Niger.

A Growing Threat

Recently, ISWAP resumed its quest to both overthrow and expand into Boko Haram’s territory in north-eastern Nigeria. Since 2016, both rival groups have clashed severely, often leading to many deaths of its members and innocent civilians. Over the years, these infightings occurred intermittently.

The recent fights in 2021 resulted in the death of several individuals, including the former Boko Haram leader Abubakar Shekau. ISWAP’s conquest over the region seems to be on track, even with the killing of Abu Musab al-Barnawi and his successor Malam Bako by the Nigerian Army.

Until They Struck

ISWAP has long constituted a high risk to the ongoing conflict in north-eastern Nigeria. With a membership base that is more than double the size of Boko Haram’s and a strategy that appeals to the locals, one would expect that curtailing the expansion of ISWAP would be prioritised. Unfortunately, these expectations have remained unmet as the group continues its offensives against the Nigerian military.

In December 2018, ISWAP attacked a Nigerian military base in Baga, a town reclaimed by the Nigerian army in February 2015. On February 23, 2019, while Nigeria held its general elections, ISWAP launched its first-ever attack on Borno state’s capital, Maiduguri, firing rockets at military targets.

In December 2021, ahead of the Nigerian president’s visit to Maiduguri, ISWAP launched multiple rocket attacks in the city and neighboring towns, perhaps their way of informing the president that the war with ISWAP was far from over. The attacks spurred reactions from the government, as the president called for an emergency meeting with his service chiefs 24 hours after the rocket attacks. Stressing the need to be firm and proactive in the fight against terrorism, the president urged the service chiefs to ensure that terrorists, especially ISWAP, be left with no room to escape.

The Culture of Silence

Nigeria has seen several democratic administrations come and go, one common trait among all is a culture of silence. Some internal conflicts and crises in Nigeria usually start as a minor problem that receives little to no attention from the concerned authorities. Before long, these problems manifest into grave issues that overwhelm the government; it appears as though if the situation fails to disrupt government activities, it is less of a priority.

At its initial stage, the conflict in north-eastern Nigeria received little attention from the government.  For a long time, what is now known as terrorism was not seen as a Nigerian problem but a minor northern problem; it took the disruption of activities in Abuja to provoke a response from the government. A similar trend occurred in the Niger Delta crisis, where a brief response only came after the country’s economy experienced a downward dive.

National Interests?

The safety of an impoverished citizen should mean as much as those in privileged and leadership positions. The culture of silence until resources and special interests are at risk questions the definition of the nation’s interests.

Although the concept of national interests remains ambiguous, whatever constitutes a nation’s interest should be collective and not individualistic. The culture of silence until a low-level issue is of consequence is dangerous and needs to change.

 

Joan McDappa, Counter-Terrorism Research Fellow

Cyberterrorism

The Rising Threat of Cyberterrorism

The newest form of terrorism is cyberterrorism, which has been a rising threat in the last several years. The fusion of cyberspace with terrorism is known as cyberterrorism, and it refers to illegal assaults and threats of attacks on computers, networks, and the information stored on them that are carried out to intimidate or compel a government or its citizens in the pursuit of political or social goals. Many cyberattacks have been planned, increasingly so after 2011. Specifically, in Syria, several attacks have been organized in cyberspace.

The General Threat of Cyberterrorism

There are many different forms of cyberterrorism, such as weaponizing propaganda and extremist ideology. Additionally, cyberterrorism can facilitate recruitment, radicalization, and prompt terrorist attacks.

Even though there are many different kinds of cyberattacks, many still question the validity of whether cyberterrorism is an existent threat. Since most essential infrastructure in Western nations is connected via computers, the possibility of cyberterrorism is concerning.

Hackers have proved that, while not driven by the same aims as terrorists, anyone may get access to sensitive information and the functioning of critical systems. Terrorists may, at least in principle, follow the hackers’ lead and paralyze advanced countries’ military, financial, and service sectors after breaking into government and commercial computer networks.

Cyberterrorism in Syria and Organized Social Media Cyberattacks

In Syria, there were many attacks planned via cyberspace. Throughout the years, the Islamic State of Iraq and Syria (ISIS) has adapted its abilities and stayed at the forefront of using the internet for cyberterrorist activities. ISIS declared an Islamic state, or caliphate, over the territory it had conquered in Iraq and Syria in 2014. Simultaneously, a group of hackers claiming to be related to ISIS built a “cyber caliphate.” According to the news, they created a series of online activities that have drawn worldwide attention.

Syria has been the focal point that controlled all the attacks. Plenty of cyberattacks in Europe were exclusively organized in Syria. However, they were directed in real-time over the internet and encrypted online chat platforms from Syria.

In addition, ISIS organized and promoted attacks through social media. In this case, they used social media, such as Facebook, Twitter, and YouTube, to spread their beliefs and synchronize attacks. Since the mid-2000s, the internet has become a common source of national defense and international security threats. Furthermore, the emergence and popularity of social media increased the militancy of a wide range of social groups, including terrorists.

In 2020, the Justice Department, the Department of Homeland Security, and the Department of the Treasury stated that they dismantled multiple cyber-financing schemes by the al-Qassam Brigades, Hamas’ military branch, al-Qaeda, and ISIS.  U.S. police confiscated millions of dollars from over 300 cryptocurrency accounts, three websites, and four Facebook pages. This operation represents the government’s largest-ever seizure of cryptocurrency in a terrorism-related case.

Sophisticated cyber-tools were used in all three financing systems, including the solicitation of bitcoin donations from across the world. These efforts by terrorist organizations reveal how they have shifted their terror financing efforts to online mediums. Organizations have resorted to bitcoin and social media campaigns to garner attention and earn funding.

Future Suggestions

The increasing reliance of today’s society on information technology has created a new type of vulnerability, allowing terrorists to attack targets that would otherwise be impregnable. The more technologically advanced a country is, the more exposed its infrastructure is to cyberattacks.

Therefore, one solution to minimize online terrorist financing and increase the cybersecurity of individual states is to create an organized global effort in securing government data from vulnerabilities. In addition, states must stay abreast of the newest technologies and ultimately outpace cyber advances of terrorist organizations, to achieve success.

Overall, states need to increase their investments in cybersecurity, especially considering the ever-evolving and global threat terrorist organizations now pose to cyberspace.

 

Katerina Rebecca Paraskeva, Counter-Terrorism Research Fellow

Arauca

A Fight for the Border: Clashes Between the ELN and the FARC in Arauca

At least 27 people have been killed over the previous days in Arauca, Colombia. The authorities indicate that the deaths are due to clashes between militiamen from the National Liberation Army (ELN) and dissidents from the Revolutionary Armed Forces of Colombia’s (FARC’s) 10th Front. The situation of violence in the department of Arauca has already left several civilian victims.

The Clashes

Clashes between the two terrorist organizations began at the beginning of January. The dispute occurred in the Arauca Department, which is located on the Colombian-Venezuelan border.

While initial reports indicated that 23 people died as a result of the fight on January 6th, the Colombian Prosecutor’s Office stated that the death toll rose to 27.  Likewise, it is likely that this number will continue to grow in the coming days.

Additionally, the investigations discovered that of the 21 identified bodies, 14 are Colombian while seven are Venezuelan. Thus, it is likely that both Colombians and Venezuelans comprise these criminal organizations.

Furthermore, regarding the damage caused against the civilian population, the Colombian Ombudsman’s Office pointed out that in municipalities of Arauca such as Tame, Fortul, and Saravena, 2,000 individuals are at risk of being displaced and seek to escape the armed confrontations.

The Colombian Defense Ministry indicated that among the deceased are high-ranking members of the FARC dissidents. For example, one of those identified is “Flaco Freddy,” a leader of the FARC dissidents, who had two arrest warrants, one for extortion and kidnapping and the other for illegal arms trafficking.

Some sources indicate that the conflict began due to the murder of Álvaro Padilla Tarazona, alias Mazamorro, second commander of the ELN’s Domingo Laín Sáez front, in the town of El Nula, on the border of Apure state. Colombian authorities have also revealed that many of those killed were apparently taken from their homes and shot at close range as revenge for the murder of Padilla Tarazona. However, the reasons for the confrontation stem from further back.

Historical Relationship and Rivalry Between the Two Guerrillas

The war between the ELN and the FARC has been reinvigorated with new actors. The clashes between the two guerrillas in Arauca between 2004 and 2010 left at least 500 civilians and 600 subversives dead and more than 50,000 people displaced.

Eventually, in 2010 the FARC and the ELN agreed to a truce in Arauca. The pact was known as “no more confrontation between revolutionaries” and put an end to the confrontations between the two guerrillas, and they divided the territory. In 2013, both guerrillas formally agreed to undertake a joint offensive against the Colombian Security Forces.

However, after the peace process with the FARC, several dissident groups emerged and called off the truce. The new FARC groups, especially the 10th Front, began to expand to control the regional illicit markets, such as drug trafficking and oil exploitation. Furthermore, Arauca is characterized as a strategic zone for the guerrillas due to its geographic location on the border and weak state presence.

To this day, the dispute for control of Arauca continues as the void left by the extinct FARC has not been filled and there is no clear winner for control of the region.

The State’s Response

In response to the increase in homicides and forced displacements in the Arauca Department, the Colombian Government implemented new measures. Two battalions with 680 army men have already been deployed to the Arauca Department, to strengthen security in Saravena, Arauquita, and Tame. Furthermore, checkpoints were installed on the roads of the affected municipalities, since some residents were confined to their homes for fear of clashes.

The Venezuelan Government also announced the dispatch of the military to the border. The Defense Minister of Venezuela, Vladimir Padrino López, reported that the Bolivarian National Armed Force (FANB) is deployed in the municipalities bordering Arauca.

Although it is true that the presence of the military will likely decrease the homicide rates in Arauca, a comprehensive approach is required to deal with the events that occurred in Arauca. Situations such as forced displacements require the intervention of public entities to guarantee the protection of human rights in the area.

Finally, to reduce the risk factors for sustained conflicts, it is necessary to increase the institutional supply on the border with Venezuela. Moreover, it is necessary to confront the terrorist organizations that operate there and attack their sources of financing, such as drug trafficking.

 

Daniel Felipe Ruiz Rozo, Counter-Terrorism Research Fellow

Counter-terrorism

The Misuse of Counter-Terrorism: How Authoritarian States Repress Dissent

Within the past two decades, governments across the world have worked diligently to prevent large-scale terrorist attacks. Furthermore, when examining the current global state of counter-terrorism, it is evident that the counter-terrorism tools at the disposal of governments are the most effective they have ever been.

However, there has been a noticeable rise of governments detaining critics under the guise of counter-terrorism. To understand what can be done, we must understand what circumstances led to the rise of this worrying trend in recent years.

Origins of Contemporary Counter-Terrorism

Although counter-terrorism is not a new phenomenon, the modern way we conceptualize and practice it began after the September 11th attacks. The deaths of thousands of Americans on U.S. soil provided a wake-up call to the traditional agencies of our national security apparatus. These attacks provided the impetus for the creation of new agencies such as the Department of Homeland Security, becoming the cornerstone of national security. In addition, the government passed the Patriot Act within the same year, giving newfound powers to agencies with a counter-terrorism focus.

The most infamous of these agencies which were given more authority to expand surveillance was the National Security Agency (NSA). The agency traces its heritage to the establishment of the Armed Forces Security Agency, which later became the agency it is today in 1952 to better coordinate communication intelligence (COMINT) across the government.

After the Cold War, the NSA was viewed similarly to other intelligence community agencies, as relics of a time where the USSR was our greatest threat. The agency was given a reinvigorated purpose in an era that had replaced the threat of Communism with the threat of terrorism.

Moreover, the United States shaped international counter-terrorism norms in the early years of the War on Terror.  A wide coalition of nations supported the U.S. decision to combat al-Qaeda in Afghanistan. This became evident by the unanimous passage of Resolution 1386 of the UN Security Council, which established the International Security of Assistance Form (ISAF).

Counter-terrorism operations became apolitical among the states participating in the international system. The use of tools to conduct mass surveillance was also normalized as it was seen as necessary to combat terrorism. While the tools used to conduct counter-terrorism were seen as controversial, they were indicative of an attitude by the United States to fight terrorism by any means necessary.

Authoritarian “Counter-Terrorism”

As the War on Terror has progressed, many states adopted the norms and tools used by the United States. The progression of time has also led to more advanced technology being adopted each year by governments around the world. These conditions have allowed authoritarian states the unprecedented ability to spy upon their citizens, accessing their movements and online presence. They have used this information on those they consider dissidents to quell criticism against their regimes by having them recant statements made online.

In the most extreme of these cases, regimes have used the excuse of counter-terrorism to imprison their citizens whom they believe weaken their regime. Authoritarian states have consistently targeted journalists.

Authoritarian regimes survive by instilling fear within their state by ensuring any forms of dissent are met with harsh repercussions. In a healthy society, journalists act as a fourth estate that safeguards against government abuses. These imprisonments of journalists have occurred from the Democratic Republic of the Congo to as far as Myanmar. Such actions only delegitimize counter-terror operations which aim to defeat extremist organizations, such as ISIS.

What Can Be Done

It is important to note the current deficiencies existing in contemporary counter-terrorism when confronting this issue. The most pressing issue is the varying doctrines among states regarding how they combat terrorism. Several of these doctrines have developed primarily from military rules of engagement. Attitudes and norms have also molded theses from the War on Terror.

In order for reform to occur, there must be a codification of rules of engagement within international law. Such reforms would limit the scope of counter-terrorism operations to only extremist groups, which are widely agreed upon to be threats to international security. Deviation from these newly established norms would ensure that states will no longer be able to use counter-terrorism as a justification for their nefarious actions in a legal context.

 

Christopher Ynclan Jr., Counter-Terrorism Research Fellow

Insurgency

Ending Insurgency in Nigeria

October 1, 1960 was a significant moment in the history of Nigeria; finally, this nation would become an independent, self-governing entity. Accepted with a remarkable mix of hope and doubts, Nigeria set off on a journey that thus far has been characterized by many pleasant and unpleasant events.

Regrettably, the unpleasant events continue to reoccur on this journey, becoming a definitive part of Nigeria’s identity.  One such event was the over-a-decade-long insurgency in the northeast. From 2009 until today, the expenses of the Nigerian government on defence are well more than six trillion Naira. Despite the efforts of the Nigerian government, the country continues to face diverse threats from various groups, spiraling its development in a downward plunge.

Take Them Out?

“Those who are behind this insurgency will be taken out. They are being taken out one after the other, and it will get to a point that the last of them will be taken out, and then we’ll get to the end of it. It can be done within 17 months, that remains for this institution,” declared Femi Adesina, Media Adviser to the President of Nigeria.

The recent statement by Femi Adesina in response to the ongoing insurgency in Nigeria is quite revealing. Interestingly, his view on taking the insurgents out to end the menace is not foreign to the government and has hitherto fueled its defence efforts.

Nothing short of an illusion is the premise that eliminating the insurgent group members is the solution to ending the bane of insurgency in the country. The current strength of the insurgency in Nigeria emanates from the same error of the government to eliminate members of the group in 2009. The lessons from the outcome of the government’s devastating error are still not learned, hence the repetition of the same failed strategy.

A Complex Situation

Considering the nature of the insurgency in Nigeria, it is not solely a matter of eliminating those behind it. Its sustainability thus far is mainly a function of the platform and the existing gaps in society it thrives on; so long as that platform exists, it is only a matter of time before another wave of insurgency awakens. Besides, the conflict in Nigeria is far too complex for the current proposed strategy.

The multifaceted nature of the insurgency poses a dire challenge to counterterrorism efforts. For instance, the famous terrorist group, Boko Haram, is highly defragmented with numerous cells, operating independently from various bases across Nigeria and other neighbouring countries in the West African region.

The continuity and the progression of Boko Haram’s operations and activities are clear indicators of the complexity of the problem. With the support and funding from other international terrorist groups, the activities of terrorist groups, like Boko Haram, in Nigeria continue to grow. Attempting to end insurgency in Nigeria without considering this essential aspect is more or less illogical.

The Way Out

The only way out of the problem Nigeria faces lies in a simple statement ascribed to the Chinese general Sun Tzu, “know thy enemy and know yourself; in a hundred battles, you will never be defeated. When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant both of your enemy and of yourself, you are sure to be defeated in every battle.”

Until Nigeria understands itself first and then its enemy, its efforts in achieving any progress in security and development will only meet setbacks. The weak structures and system failures are areas that the government must urgently monitor. The diversity of Nigeria, which underlies many of Nigeria’s conflicts, is a potential strength for its unity if rightly harnessed.

The insurgency in Nigeria feeds off the weaknesses and gaps present in the country. Identifying these gaps and sealing them off is key to ending the insurgency. The government must be wary in developing strategies to avoid conflict with other efforts. A take-them-out approach raises many questions on the purpose of governance and directly opposes the de-radicalization efforts that the government accords a high success rate.

 

Joan McDappa, Counter-Terrorism Research Fellow