Activities of the Boko Haram Sect as Threat to Nigeria Security
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 5)Publication Date: 2014-05-15
Authors : Agbegbedia Oghenevwoke Anthony;
Page : 1450-1458
Keywords : Terrorism; security; national security; Boko Haram; Nigeria;
Abstract
Since 2009 when Boko Haram was dispersed by a military operation in Borno State and its founder, Yusuf Mohammed killed, the sect has launched untiring violent attacks on security agents, civilians, personnel and any imaginary opponents of its insidious teaching. More than a thousand people have since been killed by the sect members. The painful thing is that the security agencies have failed woefully to prevent this outright incidence from a local fringe sect, to its current ascendancy as an affiliate of Al-Qaeda. While the political leaders and security agents remained perturbed in the politics of denial, the international terror network has began pulling the country to its hall of infamy as far back as 2003 when Osama bin Laden reportedly declared that Nigeria was ripe for Jihad. Thus, the study explained acts of terrorism as well as addressed the activities of the Boko Haram sect in Nigeria and its impacts. Secondary source from published books, magazines, newspapers and internet materials were basically used and inferences drawn qualitatively for the study. The activities of the Boko Haram had posed great challenges as well as negative impacts on the nation. However, there have been so diversions of resources into internal security duties of the country. This has led to the rapid increase in internal security budgets which depicts no sign of abating and the private security industry is tremendously involving itself in internal security type operations. Nigeria’s security agencies should redouble their efforts to make Nigeria safer than it is now. Also, the security agents should be well equipped in order to confront these insurgent groups in the country.
Other Latest Articles
- Cluster Based Efficient Location Aware - Source Multicast Routing Approach for Wireless Sensor Networks
- A Review on Security Attacks in Mobile Ad-hoc Networks
- Face Sketch to Photo Matching Using LFDA and Pre-Processing
- Software Engineering a Web Based Performance Evaluation System and Devising Mathematical Model for Performance Measurement
- Managing Service Quality to Gain Competitive Advantage in Retail Environment
Last modified: 2014-07-03 16:30:28