Technology: Negotiating Tomorrow’s Armed Conflict and Terrorism in West Africa

Author:

Bukola Adeyemi Oyeniyi

Abstract:

This paper, using the case of Boko Haram in Nigeria, examines the impact of technology on future armed conflicts and violent extremism in Nigeria and West Africa. As Africa enters the new digital age, characterized by increasing access to mobile telephoning, internet penetration, 3D printing and the Internet of Things; networking between and among groups with similar ideologies will improve. Results from the author’s recent fieldwork in north-eastern Nigeria are used to shed light on Boko Haram’s activities across border communities in that region where Nigeria’s borders meet those of Niger and Cameroon. Those activities include tactical efforts like mobilizing crowds, disseminating ideologies, recruiting strategic assets, and sharing technical know-how, and have facilitated the transformation of Boko Haram from a dagger-wielding, arrow-shooting group into a deployer of mobile-phone-triggered IEDs, coordinating simultaneous attacks on multiple targets. Undoubtedly, the new digital age guarantees cultural cohesiveness and a more robust outside support that will serve in recruitment, financing, logistics and training.

With mobile telephony and internet access providing (dangerous) information and resources to aspiring insurgents, what future awaits Nigeria, West Africa and Africa should Boko Haram gain access to remote controlled flying drones, quadcopters, and other ‘toys’ fitted with homemade bombs and IEDs? What new level of domestic terror would emerge if Boko Haram develops a capacity for cyberterrorism, especially since cyberterrorism affects data and cash, guarantees no risk of personal bodily harm, involves minimal resources commitment, and affords opportunities to inflict a higher level of damage? This study examines these issues and type of responses available to government in dealing with a technology-driven armed conflict and terrorism.

Keywords:

Terrorism, Boko Haram, duress, drones, cyberterrorism

DOI:

10.31132/2412-5717-2019-47-2-48-67

References:

1. Aijmer, H. and J. Abbink (2000). Meanings of Violence: A Cross Cultural Perspective. Oxford and New York. Berg.
2. Anderson, B. (1991). Imagined Communities: Reflections on the Origin and Spread of Nationalism. London and New York. Verso.
3. Anonymous. (2012). A Case Study of Boko Haram. Journal of Religion in Africa, 42: 118–144.
4. Bharti Airtel Limited. (2017). About Bharti Airtel Limited. http://www.africa.airtel.com/ wps/wcm/connect/africarevamp/nigeria/home/about (accessed 17.02.2017)
5. Brinkman, Inge, de Bruijn, Mirjam and Hisham Bilal (2009). The Mobile Phone, ‘Modernity’ and Change in Khartoum, Sudan. Mirjam de Bruijn, Francis B. Nyamnjoh and Inge Brinkman (eds.) Mobile Phones: The New Talking Drums of Everyday Africa. Leiden. African Studies Center.
6. British Broadcasting Corporation (2011). Nigeria senator Ali Ndume ‘linked to Boko Haram’. 22 November 2011. http://www.bbc.com/news/world-africa-15829203 (accessed 19.02.2017)