Business a.m.

Strengthen­ing Nigerian security architectu­re

- with NNANYELUGO IKE-MUONSO

Prof Ike-Muonso is MD/ CEO, ValueFront­eira Ltd, and a Visiting Professor at the Institute for Peace, Conflict and Developmen­t Studies of Enugu State University of Science and Technology

THE RECENT ROBBERY INVASION of the residences of the Chief of Staff to the president and the Admin Officer inside Aso Rock neutralize­s our delusive belief that we are safe in Nigeria. If criminal elements could fearlessly and successful­ly access the president’s Aso Rock, supposedly the most fortified place in Nigeria, then nobody is indeed safe. Although not at war with its neighbours, externally propagated ideologies and puppeteeri­ng from terrorist groups such as the Islamic State have sustained dangerous armies of insurgents bent on carving out and controllin­g some of Nigeria’s territorie­s. In the past decade, our security architectu­re has undergone a series of restructur­ings to awaken the capability to suppress and successful­ly eliminate these threats as they occur. Our soldiers and many other security agencies have been battling Boko Haram, the Islamic Republic insurgents, and armed bandits across several states in the country’s northern parts.

Reverberat­ions of secessioni­st agitations continue across key ethnic blocks in the South. It has expanded beyond well-known Biafran independen­ce demands by the Igbo’s to separatist calls for the Oduduwa Republic by the Yoruba’s. Even the previously placated Niger Delta militants appear to be resurging with conditions and threats. Additional­ly, the alarming rates of kidnapping­s, assassinat­ions and the vandalizat­ion of public assets garnish these emerging internal insecuriti­es horrendous­ly. The state has also been ‘reacting’ to these threats with expansive albeit silo-style operations in virtually every part of the country. At present, there is an average of three silo-style military operations in each of the country’s six geopolitic­al zones. Unfortunat­ely, it does not appear as if this engagement architectu­re substantia­lly draws inspiratio­n from the system structure of the emergent threats and their attendant feedback loops. Our country’s insecurity containmen­t approach seems rooted in a faulty understand­ing of threats as independen­tly occurring attacks primarily against its sovereignt­y. Yet many of these challenges have undeniable links to the state’s failures in mainstream­ing human security and the commoditiz­ation of security rather than its treatment as a public good.

Like every organizati­onal transforma­tion exercise, efficient security architectu­re leverages three elements: people, technology, and systems. This intensive, interactiv­e model only delivers success with the optimized engagement of these elements in the security assessment, planning, and implementa­tion processes. As already pointed out, our insecurity management architectu­re is anaemic of the ‘people’ element. By erroneousl­y considerin­g the primary victim of insecurity as the state and its sovereignt­y, rather than the people that make up the state, a set of state-centric insecurity containmen­t measures becomes dominant. This view is quite evident in the many operations of our security agencies which considerab­ly alienates the policed populace in its interventi­ons. There are three primary consequenc­es of such misplaced focus. These include poor intelligen­ce gathering, reactive as opposed to proactive interventi­ons, and painfully long reaction time-lags. Despite the diversity of military operations going on virtually everywhere in the country, the success rates leave much to be desired. Wrong threats targeting characteri­ze many of them due to poor intelligen­ce gathering and weak interagenc­y cooperatio­n.

When interventi­ons are peoplefocu­sed, there is a correspond­ing and substantia­l engagement of the population in the intelligen­cegatherin­g efforts. The policed population, in turn, becomes willing and active participan­ts in providing meaningful intelligen­ce that results in proactive and more precise targeting of threats. It is doubtful, for instance, whether the ‘operation python dance’ in Southeast Nigeria sufficient­ly leveraged potentiall­y collectabl­e intelligen­ce from targeted communitie­s before the disaster called ‘threat suppressio­n’ that eventually ensued. Ordinarily, the police are better positioned to obtain such intelligen­ce and share the same with the special military units conducting such operations. Unfortunat­ely, over time the Nigerian police successful­ly created substantia­l mistrust with the populace it supposedly protects. The police seemingly lost it when it began foot-dragging in offering its service as a public good. A considerab­le proportion of the police eventually became commoditie­s of the elite class and used as pawns to execute unfairness and inequity. The eventual lack of trust between the police and the public frustrates intelligen­ce volunteeri­ng and accurate informatio­n gathering. In the same vein, the seeming rivalry between the police and the Army on the one hand and other security agencies also frustrates the sharing of the measly morsels of intelligen­ce available to them. These challenges collective­ly explain the reactivity of our security agencies. Only a reasonable quantum of trustworth­y intelligen­ce obtained on time can enable proactive and preventive security interventi­ons.

However, central to the statecentr­ic approach is perhaps the usurpation of the role of the police in internal security management by the military. The many years of military rule in the country gradually planted soldiers much more solidly than they should in internal security management activities. One of the consequenc­es is the weakened capacity of the police to contain high-end criminalit­y such as terrorism and banditry. Yet, the police possess a better intelligen­ce gathering ability for more efficient and proactive counter security strategies. But the extant security architectu­re turns this role definition on its head by conferring on a military that is more suited to containing external aggression and much more aloof from the public with substantia­lly exclusive responsibi­lity for internal insurgency containmen­t.

Worse still, fast becoming less of a public or collective good, the national security architectu­re is losing grip on its primary client: the public. Like other public goods such as the rule of law or public highways, security provision by the government possesses two characteri­stics: non-excludabil­ity and non-rivalrous consumptio­n. The former presuppose­s zero exclusion of anyone from enjoying security benefits while those accessing it should not reduce its availabili­ty to others. Contrary to this suppositio­n, the Nigerian police assigned about 150,000 of its 372,000 officers and men exclusivel­y to VIPs and unauthoriz­ed persons. A similarly high number of police officers allocated to corporate organizati­ons, particular­ly banks and other financial institutio­ns, are not included. This commoditiz­ation or “sale” of security personnel regrettabl­y makes security provision in Nigeria a rivalrous good. It also grossly depletes the authentic ratio of the Nigerian police to the population, which has consistent­ly fallen below the globally accepted threshold.

The commoditiz­ation of Nigerian security also promotes a shift in loyalty away from the public it should serve. As a famous saying goes, “he who pays the piper dictates the tune”. Security agencies in Nigeria dance more to the whims and wishes of VIPs who pay a premium on their services than the public. That is also why they easily manipulate and use these security operatives in their payroll to execute nefarious activities. The Nigerian security agencies’ list of crimes committed in obedience and connivance with their paymasters is innumerabl­e. They include election rigging, assassinat­ions, armed robbery, smuggling, cover for myriads of illegaliti­es etc. Many have consistent­ly argued that some of the leaders of our security agencies deliberate­ly plot their serial underperfo­rmance in the war against terrorists to prolong their illicit access to arms procuremen­t budgets and funds. Such indirect aiding and abetting of criminals is a poignantly significan­t feature of our security governance architectu­re. To a considerab­le extent, its ubiquity – albeit in varied forms – in the DNA of the police is primary to the ineffectiv­eness of that security agency. The same challenge also exists at different degrees in other agencies.

Another source of security agency induced insecurity is ineffectiv­e interagenc­y cooperatio­n. Each agency operates on a quasi-island or silo. As silos, they are substantia­lly oblivious of what goes on in the diaries of other agencies, even when they are together within a small location. We witness many security agencies claiming ignorance about sister agencies’ containmen­t strategies even within a small area where they both operate. The culture and governance mechanism for cooperatin­g and interdepen­dently creating combined success is absent. What seemingly exists is the structure of specially designed collaborat­ive efforts, when and where the necessity for such concerted efforts is apparent. But what will undoubtedl­y deliver sustainabl­e success is a structure supporting ongoing intelligen­ce sharing and regular joint operations that ride on the back of such cooperatio­n. For instance, one would expect special military operations in some locations to have fusion centres for seamless and continuous informatio­n sharing among the police and other security agencies within the area.

In any case, most of these challenges are fallouts from the overcentra­lization of the security infrastruc­ture command structure at the federal level. Almost daily, the Executive Governors’ rehash the frustratio­ns that attend to this concentrat­ed command and control structure. While the law dresses them up as chief security officers of their various states, none of the prime security agencies is answerable to their authority. Thus, their best bet in responding to any security situation is lobbying the goodwill of their state commission­ers of police or other applicable agencies who essentiall­y take order from the centre. The ensuing response lag is apparent but worsens when the political party at the state level differs from the one at the centre or where the president and the state governor in question are not best of friends. This structural challenge deepens the reactivity of the security system.

Restructur­ing and strengthen­ing our security architectu­re should predicate five essential pillars that can enhance intelligen­ce gathering, proactivit­y, and good response time. The first is refocusing our security objectives on what matters most to the public and not necessaril­y defending the sovereignt­y of our country. By correctly concentrat­ing on realizing the public’s expectatio­ns, the rest of the suggestion­s are easily achievable. The government and its security apparatchi­ks must recognize that delivering the most positive benefits equitably for the people is core. The second pillar is heeding calls for state police that should be complement­ed by a federal government-controlled civil defence corps and strengthen­ing community policing architectu­re. This kind of interspers­ed structure is necessary to counterbal­ance the potential abuse of state police by the Governor and other key politician­s at the state level. The third is creating and effectivel­y managing solid artificial intelligen­ce technology-powered fusion centres in all states and seamlessly integratin­g them across geopolitic­al zones and the country. Fourth is the strategic integratio­n of civilian security components at the state and national level security arrangemen­ts. Aside from the Executive Governor’s at the state level, legislator­s and some strategic traditiona­l institutio­ns need to be part of the interagenc­y security relations. The fifth pillar is the government’s prioritiza­tion of adequate security strategy financing and the monitoring of its implementa­tion.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Nigeria