Professional Documents
Culture Documents
Intelligence Gathering Chapter I-V
Intelligence Gathering Chapter I-V
BY
KHADIJAH ADENIKE
NOU167534194
MAY, 2021
CERTIFICATION
This is to certify that this study ‘The impact of intelligence gathering on the operations of
the Nigeria Security and Civil Defence Corps (NSCDC) in Ipokia L.G.A, Ogun State’ was
SUPERVISOR
M.I.L.R. (Ibadan)
M.Sc (Ibadan)
Ph.D (Ibadan)
ii
DEDICATION
This research work is dedicated to God almighty, the Creator and Ruler of the world. Also
iii
ACKNOWLEDGEMENT
All glories and adorations, praises, gratitude and salutes belong to the Most Magnificent
and Most Merciful God of all creation, the beginning of all things and the end of
everything. I register my gratitude with total submission to Your will, and for the
My gratitude will be eternal to my family: my parents Mr. and Mrs. Falabi and my
siblings, and my darling husband Mr. Ashimiyu Adisa Adeoye, for their support,
understanding and care. Your love for me has brought me this far, to the glory of God. I
Lagos; M.I.L.R, Ibadan; M.Sc, Ibadan; Ph.D, Ibadan), under whose guidance this
research work comes to successful completion. I am also full of appreciation to all the
instructors of Criminology and Security Studies for providing the materials and guides
My special gratitude is reserved for my true friends, yard sticks and benefactors: Mr
Ayodeji Olawale, Mr Ibrahim Adeagbo, Mr Jibrin Mohammed and Mrs Tina, whose kind
gesture and compassionate outreach redefined friendship and brought hope back to life
To all my fathers who have had great impact in my life: Mr James Falabi, Mr Giwa
and encouragement. I have come this far, to Allah’s glory, this is a success to all of you.
You all have my eternal love. I am fortunate to be related to you. God bless you all.
iv
Finally, to all my colleagues in Criminology and Security Studies department, may we all
be successful in life.
v
ABSTRACT
vi
TABLE OF CONTENTS
Cover Page i
Certification ii
Dedication iii
Acknowledgement iv – v
Abstract vi
Chapter One
1.0 Introduction 1
Chapter Two
2.1.2 A brief history of Nigeria Security and Civil Defence Corps (NSCDC) 14 – 15
vii
2.2 Theoretical Framework 24 – 25
Chapter Three
3.1 Introduction 28
3.6 Instrumentation 32
Chapter Four
4.1 Introduction 35
Personnel 36
viii
4.4 Insecurity Challenges 52 – 53
Chapter Five
5.1 Summary 54
5.2 Findings 55 – 57
5.3 Recommendation 57 – 58
5.4 Conclusion 58
Reference 59 – 62
ix
KHADIJAH ADENIKE FALABI (NOU167534194)
CHAPTER ONE
INTRODUCTION
Intelligence refers to information that meets the stated, understood needs of policy makers
and has been collected, refined and narrowed to meet those needs. Nations require
intelligence about their immediate environment and that of other nations. This is
necessary because, in order to preserve their security, they need to keep track of internal
Consequently, nations require certain instruments to contain these threats. Also, nations
adopt strategies and policies such as defence and security policies to enable them to
respond appropriately and safeguard them from both external and internal threats
(Enahoro, 2010).
imminent threats to policy makers in order to protect a nation from being subjected to
2013). This is achieved through the acquisition of covert information by covert means on
analyzed and disseminated for use to support action. Thus, the role of intelligence is to
1
KHADIJAH ADENIKE FALABI (NOU167534194)
support action that may be deemed necessary in the furtherance of national interests
(Lowenthal, 2009).
Security operations are the procedures and actions taken by security agencies to protect
lives and properties in order to ensure there is no state of insecurity within a society. The
When it is proactive, it involves essentially the use of intelligence to avert any threat to
national security. These threats could be in the form of sabotage, subversion, terrorism
and all other destructive actions that could undermine national security. Reactive security
operations involve the use of security apparatuses to contain conflicts that are already on
ground. When that happens, states involve security operations that are reactive in nature
and the use of military force is employed in conjunction with national intelligence assets
In Nigeria, internal threats manifest mostly in the form of communal conflicts, both inter
and intra, ethnic, religious as well as finding expression in militant activities. Typical
examples of a security operation in Nigeria include the Joint Tasks Force (JTF) Operation
RESTORE HOPE in Niger Delta, Operation FLUSHOUT III in Rivers State and
operations was to reverse the state of insecurity in the affected areas (Ufot et al., 2014).
It is necessary for the government to deploy the military and other sister security agencies
to manage internal security threats whenever and wherever troubles arise. The Nigeria
Security and Civil Defence Corps (NSCDC) is one of such agencies. A paramilitary
security outfit created with the mandate to assist in managing threats to internal security
in the country.
2
KHADIJAH ADENIKE FALABI (NOU167534194)
security system and nation building. It has power to arrest with warrant or without
warrant, detain, investigate and institute legal proceedings against any person who is
reasonably suspected to have committed an offence, investigate and take necessary step to
forestall any planned act of terrorism and report same to appropriate federal security
Recent events in Nigeria, which include; the Boko Haram onslaught and the recurrent
Jos–Plateau sectarian crises among others have thrown up arguments on the level and
quality of the intelligence support provided for national security (Ofongo, 2018). Within
the military that plays a leading role in operations, there are three schools of thought
amongst commanders.
In the first school of thought are some commanders whose opinion is that intelligence as
practiced in Nigeria is not real time and therefore does not add value to operations. A
analytical skills and is therefore unable to predict events correctly. The third school of
thought believes that intelligence in operation are unreliable and therefore not needed.
The arguments on the need for intelligence or lack of it when critically dissected are
equipment and computers that are essential input to the production of intelligence. In
other words, it amplifies the fact that technology is not an end itself, but the means to
3
KHADIJAH ADENIKE FALABI (NOU167534194)
process and pass intelligence in support of the commander and the mission (IIogho,
2006).
The lack of real time intelligence and lack of analytical skills to predict incident
accurately before, during and after they occur as well as intelligence as a product being
unreliable during operations, are some of the issue that have created doubt in the quality
between military commanders and the intelligence staff on the necessity to rely on
It is the need for the resolution of these arguments that has aroused this researcher’s
interest in the matter. Thus this study sets out to find out the issues associated with how
intelligence gathering has mitigate insecurity in Nigeria with a view to ascertaining the
and proper utilization of same. There are several challenges combating intelligence
gathering among which are unwillingness of the public to share viable information with
volunteering security information to law enforcement agencies remain part of the lapses
The proper employment and accurate designation of tasks for the intelligence agencies to
4
KHADIJAH ADENIKE FALABI (NOU167534194)
country. Hence, lack of analytical skills and others denigrate the value of intelligence
the Chibok girls revealed the inadequate management of intelligence by the Goodluck
Jonathan administration which culminated in the abduction of the Chibok school girls and
the destruction of lives and properties following the campaign of terror visited on the
This study therefore seeks to provide answers to such questions as; What is the level of
intelligence gathered? What are the intelligence lapses in the operations of the corps in
Nigeria? What can be done to cover these lapses? Answers to these questions will provide
useful insights into the management of intelligence gathered by the NSCDC in supporting
(i) What is the relationship between intelligence gathering and the operations of the
(iii) What are the intelligence lapses in the security operations of NSCDC in Ipokia
local government?
(iv) What is the public opinion on the programme of the NSCDC in Ipokia
local government?
5
KHADIJAH ADENIKE FALABI (NOU167534194)
The general objective of the study is to evaluate how intelligence gathering has impacted
(i) Identify the issues involved in the intelligence gathering in support of security
(ii) Examine the relationship between intelligence gathering and the operations of the
(iii) Examine the intelligence lapses in the operations of the NSCDC in Ipokia local
government.
(iv) Investigate public opinion on the programme of the NSCDC in Ipokia local
government.
Hypothesis I
NSCDC.
operations of NSCDC.
Hypothesis II
H0: Intelligence gathering does not have any impact on the operations of the NSCDC.
H1: Intelligence gathering has significant impact on the operations of the NSCDC.
6
KHADIJAH ADENIKE FALABI (NOU167534194)
This study set out to find out the challenges faced by NSCDC in intelligence gathering in
Ipokia local government and how effective the agency utilizes intelligence gathered to
tackle insecurity in the area. The motive behind this study is to proffer solutions to the
system through which information about a particular entity is collected for the benefit of
another through the use of more than one, inter-related source. Such information may be
network. The focus of this study is on the intelligence gathering of NSCDC in the Ipokia
Operations: Operation means the actions and decisions of an organization which requires
the use of resources and assets and affect organization’s performance. Operations in this
study refers to the actions and decisions taken by the NSCDC from the intelligence it
NSCDC: This is an acronym for Nigeria Security and Civil Defence Corps, a paramilitary
entity that was created to tackle internal security challenges of Nigeria. The acronym
NSCDC is used in this study refers to this security outfit and any mention of the acronym
7
KHADIJAH ADENIKE FALABI (NOU167534194)
CHAPTER TWO
LITERATURE REVIEW
Intelligence is a relative rather than absolute term used to describe the process of
gathering, analyzing and making use of information (Jackson & Scott, 2004). Intelligence
has many meanings and it is in the context in which the term is used that it can be
understood.
security such as defence and internal security. It is the information most often provided to
decision makers to help guide future decision or actions. Examples of such actions are
outright war and Military Operation Other Than War (MOOTW) of which security
operation is one? In order to provide the necessary intelligence, nations establish and
The structure of the intelligence organizations differs from one country to another, but
generally consists of the domestic and foreign intelligence. In the case of Nigeria, the
Department of State Service (DSS) and National Intelligence Agency (NIA) are the
There are also the three military service intelligence organizations which are the Defence
Intelligence Agency (DIA), the Directorate of Air intelligence (DIA) and the Directorate
The role of intelligence in national security has increased in significance as a tool of state
policy. Thus, Micheal Herman thinks that intelligence is a form of state power in its own
right (Jackson & Scott, 2004). This concept of intelligence as a form of power is based on
8
KHADIJAH ADENIKE FALABI (NOU167534194)
the definition of power by Freedman (2005). Freedman defined power as the capacity to
produce effects that are more advantageous than would have been otherwise been
(Herman, 1996). This concept has not captured the basic processes involved in
intelligence production.
Conversely, Ferris (1998) has a different view and posited that intelligence is not a form
of power but a means to guide its use, whether as combat multiple or by helping one to
understand one’s environment and options. Thus, it relates to how to apply force or
information which allows the use of resource in the most effective way possible against
rivals who are doing the same. He therefore concluded that the knowledge (commonly
referred to as intelligence) derived from the information collected is for the purpose of
supporting an action, the concept dwelled more on the application and usage of
intelligence. Though it captures some aspects of intelligence process, it cannot satisfy the
Lowenthal (2009) on his own part defines intelligence as “the process by which specific
types of information important to national security are requested, collected, analyzed and
provided to policymakers; the products of that process; the safe guarding of these
processes and this information by counter intelligence activities; and the carrying out
The essential elements involved in the intelligence process are captured in the concept,
which are collection and analysis involved in the processing of information. It is the
analysis of raw information that leads to the finished product, which is intelligence.
9
KHADIJAH ADENIKE FALABI (NOU167534194)
Therefore, without analysis there cannot be intelligence. The term intelligence here also
refers to the organization that is primarily involved in the chain of activities in the
concept as a profession that carries out certain activities such as intelligence activities.
environment or areas of operations that has been collected, processed, analyzed and the
safeguarding of the product and process which is provided to security policy makers to
According to Mroz (1991), security, “is the relative freedom from harmful threats,
However; security is underscored by the need to protect a nation against threats such as
espionage, sabotage and terrorism. It is not surprising that the ultimate pursuit of many
nations is the search for stability, peace and which are achieved through security
operations.
According to Adebayo (2008), security operations are all the activities, procedures,
actions taken or involved in the protection of lives and properties and provision of a
peaceful and stable environment for the daily conduct of lawful activities by individuals
and groups within the community. This concept gave a general format of security
10
KHADIJAH ADENIKE FALABI (NOU167534194)
pre-empting threats (proactive security operations) to internal security.
11
KHADIJAH ADENIKE FALABI (NOU167534194)
However, it is silent on the specific type and activities to be taken in security operations
particularly when a state of insecurity has been established. Security is the deliberate
operations such as intelligence operations and cordon and search operation designed to
detect, and counter all forms of threats capable of creating insecurity within a section or
parts of a country in order that there is peaceful environment conducive for stable
Security has to do with the process connected with alleviation, assuaging any kind of
threat to man and his cherished values. It is such an important concept that every state,
organization and human person desire. This is why Afolabi (2014) asserts that security is
about freedom from threat and ability of state and society to maintain independent
identity and their functional integrity against forces of change, which they see as hostile,
Generally, security is an elastic concept which view opinions in different fields and study
and its day to day activity of men. It is referring to safety from harm and danger which
Imobighe (2003) when he affirms that security has to do with freedom from danger or
threat of a nation’s ability to protect and develop itself, promote it’s cherish values and
Therefore, internal security could be seen as the freedom from or absence of those
tendencies which could undermine internal cohesion and the cooperate existence of a
country and its ability to maintain its vital institution for the promotion of its core values
and socio-political and economic objection as well as meet the legitimate operation of the
people.
12
KHADIJAH ADENIKE FALABI (NOU167534194)
government, security outfits and entire Nigeria citizenry (Bodunde et al., 2014). Security
outfits include.
Responsible Nigerians are now skeptical about the capability of our security outfits and
The pre-eminent security outfits - the Nigeria Police have been incapacitated to subdue
the menace of criminality in Nigeria while the Nigeria Security and Civil Defence Corps
with the new armed squad men seem unfit to make an impact apart from their
humanitarian services. One may infer that internal security has attracted very little
The porosity of Nigeria borders and infiltration of weapons and ammunitions from
neighboring states account for the inefficiency of Nigeria Custom Service and
13
KHADIJAH ADENIKE FALABI (NOU167534194)
Bluntly speaking, activities of criminals are the major yardstick by which internal security
could be measured. One of the elements of a society is the presence of criminals who are
minority in number, but they are so toxic that they trouble the peaceful co-existence of the
society. It should be noted that if citizens are not secure, then the state is not secure.
Threats to internal security amount to the threats to National security (Bodunde et al,
2014).
The Nigeria Security and Civil Defence Corps (NSCDC) had been assigned to play
crucial roles in grassroots security system and nation building It has power to arrest with
warrant or without warrant, detain, investigate and institute legal proceedings against any
person who is reasonably suspected to have committed an offence, investigate and take
necessary step to forestall any planned act of terrorism and report same to appropriate
federal security agency among others (Abolurin 2011). The organization lacks adequate
It is disheartening to state that most Nigerian do not know the constitutional responsibility
of the organization despite the availability of the offices and stations across states of
Nigeria Federation.
Amendment of the NSCDC Act 2007 empowered the organization to have arm squad. A
cursory look at armed men of this organization, one can infer that NSCDC is grappling
Trailing behind the foregoing, it is difficult for NSCDC to combat crime efficiently in the
country. Thus, a secured country is one that is able to protect and develop itself so that it
can promote its precious values, meet the needs of its citizenry and provide them with
14
KHADIJAH ADENIKE FALABI (NOU167534194)
The advent of Boko Haram insurgency demands holistic approach and the need for
security agencies to synergize and share intelligence in the bid to curtail the prevailing
CORPS (NSCDC)
The Nigeria Security and Civil Defence Corps (NSCDC) is a Para-military agency of the
Federal Republic of Nigeria that is commissioned to provide measures against threat and
any form of attack or disaster against the nation and its citizenry. The Corps is statutorily
The Corps is empowered to institute legal proceedings by or in the name of the Attorney
General of the Federation in accordance with provision of the constitution of the Federal
offence. It maintains an armed squad in order to bear fire arms among others to
The Nigeria Security and Civil Defence was first introduced in May 1967 during the
Nigerian Civil War within the then Federal Capital Territory of Lagos for the purpose of
sensitization and protection of the civil populace. It was then known as Lagos Civil
Defence Committee. It later metamorphosed into the present-day Nigeria Security and
On inception the Corps had the objective of carrying out some educational and
sensitize members of the civil populace on enemy attacks and how to save them from
danger as most Nigerian living in and around Lagos territory had little or no knowledge
15
KHADIJAH ADENIKE FALABI (NOU167534194)
about war and its
16
KHADIJAH ADENIKE FALABI (NOU167534194)
implications. This was done through electronic and print media on how to guide
themselves during air raids, bomb attacks, identify bomb and how to dive into trenches
In 1984, the Corps was transformed into a National security outfit and the addition of
special functions by the Federal Government and on the 28th of June 2003, an Act to give
statutory backing to the NSCDC passed by the National Assembly was signed into law by
Chief Olusegun Obasanjo, GCFR, the former president and commander in chief of the
These functions include: power to arrest with or without a warrant, detain, investigate and
institute legal proceedings by or in the name of the power of the Attorney General of the
Federation, monitor the activities of religious bodies and trade union, monitor, investigate
and take every necessary step to forestall any planned act of terrorism, provide
riot, disorder etc. (Nigeria Security and Civil Defence Corps [NSCDC], 2014).
SECURITY OPERATIONS
processing, and analytical capabilities are fused together in the entire intelligence process
Intelligence gathering thus ensures that intelligence requirement is met through the
disposition and activities of an adversary security operation on the other hand help in
17
KHADIJAH ADENIKE FALABI (NOU167534194)
identifying and defeating imminent threats within the area of operations through counter
Intelligence gathering and security operations feed each other. This is because all
operation has intelligence component in that it also reports information. Effective security
which produce opposite results. For instance, if intelligence is not provided on the
location, strength and capabilities of an adversary, such as experienced in the Niger Delta,
the success of the operation may be at higher cost to both human and equipment.
Therefore, intelligence gathering and security operations have a mutual but cause and
CHALLENGE
took shape with the establishment of the Nigeria Security Organization (NSO) via Decree
As it were, the Nigeria Security Organization was to combine the duties of the Federal
Bureau of Investigation (FBI) of the USA which involved counter intelligence activities
and the Central Intelligence Agency (CIA) (Hoffman, 2002). It was headed by a Director-
General who was also a member of the Supreme Military Council and the National
Security and Defence Council. However, as argued by Peters (1986), “the body not only
18
KHADIJAH ADENIKE FALABI (NOU167534194)
By 1984, a Directorate of Intelligence was set up in the office of the Chief of Staff. It had
four directors within three years of existence (Odezulu, 2008). Incidentally, within the
same period, the Defence intelligence Agency (DIA) was also set up within the office of
the Minister of Defence. Clearly, from the outset, it showed that a clash of interest was
By 1986, Decree No. 19 (under Rtd. General Ibrahim Babagida Administration) formally
abolished the NSO and created the National Intelligence Agency (NIA) and the State
Security Service (SSS) (Adebayo, 2011). By virtue of the provisions of this decree, it
The State Security Service became saddled with the duty of prevention and detection
within Nigeria of any crime against internal security, protection and preservation of all
non- military classified matters concerning the internal security of Nigeria and such other
responsibilities affecting internal security within the country, including the Armed Forces
Ruling Council or the President, Commander-in-Chief of the Armed Forces as the case
Unfortunately, the security challenges that the country has faced since the dawn of the
Twenty-first Century, especially since the upsurge in the terrorist activities of the Boko
Haram sect since 2011, seem to give the impression that the intelligence branch of the
Armed Forces has gone to sleep. This is regrettable because the continuity of killings as
has been experienced in the recent past portends nothing positive hut grave danger to the
Nigeria nation-state.
19
KHADIJAH ADENIKE FALABI (NOU167534194)
Terrorism, no doubt, is a global threat to peace but government must fight it head-long
and this requires political will. Conflicts, where unchecked could lead to threat of
In recent times, commentators on the increased menace of insurgency in the country have
warned against the likelihood of the division of the country, but the President of the
Federal Republic of Nigeria, Dr. Goodluck Ebele Jonathan, has consistently assured the
citizens that insurgency would be brought under control. However, it is important to draw
This underscores the reason why effort should be more on how to check the act than
reliefs when destructions have been made (Takaya, 2001). In fact, from the analysis of
scholars, three levels of activities that could elicit war are: individual level in which there
is bad decisions by leaders, communication failure and misperceptions; the societal level
in which there is ethno-national challenges and the persistence of anarchy - all of which
The case of the moribund Yugoslavia seems to fit into the aforesaid three levels of
analysis and thus offers a good lesson for Nigeria to learn from. After the collapse of
communism, Serbian leadership tried to maintain the country’s unity in the face of strong
Individual leaders particularly Serbian leader Slobodan Milosevic, were able to stoke in
the Serb masses, an ultra-nationalism that threatened other groups in the Yugoslav
federation (Sederberg, 2003). It is only hoped that the failure of intelligence agencies to
quickly check
20
KHADIJAH ADENIKE FALABI (NOU167534194)
the activities of insurgents does not plunge the country into similar experience because of
insurgency. If it were so, then it means we have to compensate all such persons affected
from the period of independence. This, therefore, means our leaders must get to the root
of the problem and it is the position of this paper that the only way forward is to energize
overemphasized (Idowu, 2008). First, it helps to keep record of events and thereby detect
the likelihood of dangers or indicators of crisis situation and forestall surprises. Second, it
and above all, helps to identify insurgent groups and the need to apply requisite
Nigeria is presently faced by severe security challenges. Security outfits in the country
need to be re-energized to address the menace. Some of the security challenges are
discussed thus:
This commenced in the South-south region of Nigeria and it had cut across Niger-Delta
states. Kidnapping and hostage taking are notorious act in Oil rich Niger Delta. Agbode
(2011) argues that it has been used to address wanton neglect of their communities by
successive government. This is why Fayemi (2013) observed, for South-East, kidnapping
and hostage taking are now tools for settling personal and political scores.
21
KHADIJAH ADENIKE FALABI (NOU167534194)
Youths in the region utilized the tools to make huge amount of money as they call the
families of their victims to pay millions of naira for ransom. Politicians equally use it to
deal with their opponents and perceived enemies leaving citizens in fear. Many officials
of multinational oil companies in the region have been victims thereby portraying Nigeria
dimension to the security crisis that is stretching the country to its limit. A cursory look at
Nigeria democracy since 1999 reveals many unresolved high profile killings. To
exemplify, former Attorney-General and Minister of Justice, Chief Bola Ige was killed on
23rd December, 2002 in his home at Ibadan. This marks the first scenario after the rebirth
of democratic rule.
It is unfortunate that the government has failed to fish out the perpetrators. Dikko,
National Vice Chairman of Peoples Democratic Party [PDP] was murdered in cold blood
while travelling in 2004, Ayo Daramola and Engr. Funso Williams, PDP’s gubernatorial
aspirants in Ekiti and Lagos State were assassinated while Philip Olorunwipe, Kogi State
chairman of State Independent Electoral Commission was killed in 2004 (Nwanegbo &
Odigbo, 2013).
More so, Harry Marshall, the National Vice Chairman of All Nigeria Peoples Party
[ANPP] was also murdered, the former Nigerian Bar Association [NBA] chairman of
Onitsha in Anambra State, Barnabas Igwe, and his wife were gruesomely murdered on
22
KHADIJAH ADENIKE FALABI (NOU167534194)
Not quite long, a serving Senator Dantong Daylop and the majority leader of Plateau
House of Assembly, Honourable Gyand Filani were also murdered. Alemika (2013)
observes that wave of assassination is sweeping across the country and the perpetrators
have not been brought to book. Ahmed Pategi, a former PDP chairman of Kwara State
was killed in 2005 while Godwin Agboroko, a former editorial board chairman of This
From the foregoing, it could be observed that the situation has not been seriously
addressed and the Police has not been able to unmask the killers. Hence, assassination has
posed serious security challenge to successive Nigeria government as there are reports of
lack of cordiality, mutual suspicion, fear and a tendency towards violent confrontation
(Salawu, 2010).
Ethnic cum religion violence has always been a troublesome tension facing Nigeria
security. Northern Nigeria States and Plateau state in particular have become the hotbed
of ethnic and religious violence with regular report of maiming and killings of innocent
citizens which informed the emergency rule during Obasanjo led administration.
Religious intolerance has been identified as the prominent causes of ethno-religious crises
and the incidents has been noticeable in Nigeria times without number (Bodunde et al.,
2014).
23
KHADIJAH ADENIKE FALABI (NOU167534194)
Ethnic and religion connections now determine who gets what in Nigeria. Such crises
have occurred in other parts of the country like Shagamu (Ogun State), Lagos, Abia
among others. Salawu is of the opinion that a major cause of present day ethno-religious
In recent times, Nigeria National security had been threatening by a religious gang that
believed that western education and culture were forbidden – Boko Haram. This group
has killed many innocent citizens and even security operatives to the extent that Nigeria
Police could not manage the attack which necessitated the involvement of armed forces
The factual fact is that activities of Boko Haram are now international affairs since
terrorist attack on any part of the world is a concern and threat to international
Another big security challenge threatening Nigeria is the smuggling and trans-border
crimes. Smuggling and circulation of contraband goods like small arms and light
weapons, human trafficking, drug trafficking lead to other threats to Nigeria internal
security.
Ngoa opines that these hinder the social and economic development of not only Nigeria
but the continent of Africa (Ngoa, 2012). Smuggling encourages proliferation of arms,
24
KHADIJAH ADENIKE FALABI (NOU167534194)
Porosity of Nigeria borders instigate smuggling as Nigeria has over one thousand illegal
routes through which aliens from neighbouring country can trek into the country. This
equally informs the high rate of crime and public disorder in Nigeria.
The influx of non – Nigerians and illegal immigrants mixing up with the teaming
unemployed youths in Nigeria calls for Nigeria Immigration Service and Nigeria Custom
Service to double their effort in the course of discharging their statutory duties.
Some Nigeria borders are demarcated with drums and logs of woods which show the state
of our borders. In spite of joint patrol and task force at the borders, security personnel are
not enough to manage both regular and irregular route of entrance into Nigeria state
(Alemika, 2013).
Since 1999 when Nigeria returns to civil rule, electoral violence appears to have
presumed a devilish dimension. This had given birth to political assassinations and other
With the number of security formations put in place by Nigeria Government, there is no
fact to show any remarkable drop in the incidents of armed robbery. Thus, with the
increase in security outfits and private security organizations, cases of armed attack are
on the increase.
25
KHADIJAH ADENIKE FALABI (NOU167534194)
It seems Nigeria security agencies are helpless in the face of rising wave of criminality in
Nigeria. In 2011, in the first half of the year, about 5,000 cases of armed robbery were
recorded, 2700 arrested, 700 killed, 800 assorted weapons recovered from hoodlums
(Abolurin, 2011).
The fact above reveals the wave of the menace. In fact, annual report of National Bureau
of Statistics has proved the trend. The situation now is such that every Nigerians now
guards. There are other challenges like subversion, sabotage and public infrastructure
security operations, counter insurgency and support peace operations. Thus, this study
The theoretical framework selected for this study is the Structural Functional Theory. The
foundation for this theory, also called Structural Functionalism, was laid by Emile
Durkheim (Fisher, 2010). The theory focus on the assumption that the society is a single,
The analysis further explains activities in relation to the role they play in keeping a given
system in a proper working order and thus maintain its equilibrium, in other words, every
system is made up of subsystems or part which work for the maintenance of the system
(John, 2008).
According to Gabriel (2001), “a system is comprehensive in the sense that it includes all
26
KHADIJAH ADENIKE FALABI (NOU167534194)
political system is therefore through their functions. These functions were classified into
input and output. Although the theory provides a comprehensive analytical tool for an
The theory has been criticized for being unable to account for social change. The theory
has been said to be teleological. In other words, it attempts to describe social institution
solely through their effects and does not explain causes of these effects.
Despite these criticisms, the theory still has significant relevance to the understanding of
the role, structure and functions of political institutions in political systems. The theory is
relevant to this study by virtue of its theoretical construct that emphasize on the analysis
it enables one to be able to understand the positive roles they play in the maintenance of
The theory will therefore give a better understanding of the role and function of the
intelligence arm of the state, in gathering relevant intelligence to assist the state in taking
informed decisions at both the strategic and operational levels with regards to the need to
Nigerian state from harnessing the critical or essential elements of security in achieving
the nation’s stability and integration concluded that the Nigerian Government which has
the sole statutory mandate to manage state security has not effectively harnessed the
critical essentials of security to achieve the stability and integration of the country.
27
KHADIJAH ADENIKE FALABI (NOU167534194)
The work therefore recommends that Nigerian leaders should holistically address and
utilize the essential elements of security in ensuring the stability and integration of the
and integrating technical elements with human, and material resources towards achieving
A quantitative study carried out by Ngboawaji (2013) to examine Nigeria’s grapple with
the problem of threats to her internal security revealed that intelligence management has
not impacted positively on security activities in Nigeria. This is because the impact of
The study further affirmed that the intelligence community lacked the requisite
challenges which include; lack of funding, lack of real time intelligence, lack of analytical
To mitigate these challenges, the study suggested the need to ensure that the intelligence
Uchenna, et al. (2018) studied the impact of ICT on national security applying a
security operations of the NSCDC and pointed at the crucial role ICT plays in the security
of any nation. The outcome of the research suggests from all indications, that ICT has
Oghi and Unumen (2014) examined the challenge of security in Nigeria in the twenty-
first century and the role that military intelligence can play in combating it.
28
KHADIJAH ADENIKE FALABI (NOU167534194)
Adopted the
29
KHADIJAH ADENIKE FALABI (NOU167534194)
historical method of analysis and interpretation of data the study opined that the failure of
military intelligence is largely responsible for the current state of quagmire of national
make them more proactive and effective as well as collaboration with the locals in each
30
KHADIJAH ADENIKE FALABI (NOU167534194)
CHAPTER THREE
RESEARCH METHODOLOGY
3.1 INTRODUCTION
This chapter discusses the research methods used for data collection and analysis, the
framework and the underlying techniques and assumptions that were made in collecting
and analyzing the data for the study are provided, as well as information that explains
The research design for the study is Survey Research Design. It will be conducted using
the Quantitative data adopted for the study, and the method involves the use of
questionnaire.
This study involves the collection of data through open-ended and closed-ended. The
The open-ended questions will discuss the views of selected participants for the questions
based on their understanding of the concepts under study. The quantitative approach will
support simple computations of data collected on various concepts that are researched.
Questionnaire is the main instrument used in this research. The first part of the
questionnaire includes open-ended questions. Open ended questions will be useful for this
research because they will support the collection of data and give participants the
31
KHADIJAH ADENIKE FALABI (NOU167534194)
The questions will be based on the main research objectives and the research questions
which seek to establish the intelligence gathering efforts of the NSCDC and the ways
insecurity challenges are managed among other concepts. 30 NSCDC personnel will be
The second part of the questionnaire will have closed-ended questions, and these will
support the collection of statistical data on the issue under study. This part of the
The Likert scale will require participants to choose answer options that best represent
their thoughts. The customized Likert scale will have five options including strongly
disagree, disagree, neutral, agree, and strongly agree. These options will outline the
extents to which participants agree or disagree with the statements that relate to the
The final part of the questionnaire will have a rating scale. The scale will represent: 1-
Low, 2-Medium, 3-High. The rating scale will have the different types of security
challenges faced in Ipokia local government for rating and these include: kidnapping,
ethnicity, religion, cyber-crime, cultism, armed robbery, raping, ritual killings and
lawlessness.
The questionnaire supports collecting extensive data at once. This constitutes the main
reason for its selection. It will allow the researcher to collect data with ease and within a
short time.
local government, from 18 years and above, selected for the research. Descriptive
There are two groups that will take part in the study. One of the groups that will take part
in the study comprises members of the public from 18 years and above, who are citizens
of Nigeria, who have lived most part of their lives in Ipokia local government and are still
residents thereof.
According to city-facts, the population of Ipokia local government in 2015 was 216,658.
Thus, the civilian sample respondents for this study will be extracted from this figure.
The sample will represent the male and female residents of the local government under
The second group of participants will constitute personnel of NSCDC. The number of
The participants will be required to have served in the NSCDC for at least 5 years and
with minimum rank of the Assistant Superintendent Officer Cadre in order for them to be
well positioned to give valued opinions about intelligence gathering and security
challenges in Nigeria.
Sampling is the procedure for drawing sample from a population. The aim is to have an
The 2015 population (216,658) of Ipokia local government is large, thus making the need
for sampling necessary. The sample is determined using the formula given below:
33
KHADIJAH ADENIKE FALABI (NOU167534194)
𝑁
𝑛=
1 + 𝑁(𝑒2)
𝑛= 216,658
1 + 216,658(0.052)
216,658
𝑛=
542.645
𝑛 = 399.26
𝑛 399
The sample size shall be 399 respondents who represent the members of public of Ipokia
local government, Ogun State. In other words, 399 closed-ended questionnaires will be
In order to get the desired participants, random sampling will be used. Random sampling
was selected because it reduces bias. Random sampling will be conducted in order to
select participants from the lists that will be generated through call outs for volunteering
For the open-ended questionnaire part, the researcher will find participants among the
NSCDC personnel and use those found to get referrals to more participants. All
volunteers will be enlisted after which random sampling will be used to select the desired
34
KHADIJAH ADENIKE FALABI (NOU167534194)
3.6 INSTRUMENTATION
After the participants are identified, they will be requested to provide their phone
numbers, and their email addresses. Email is cheap, and it uses less time.
The researcher will start the process of data collection in the research with the survey
questionnaires, which will be sent to the participants. The researcher will send all
questionnaires via the email addresses provided and phone calls will be made to each
participant to inform them that the questionnaires have been sent to them.
The questionnaires sent to the participants will have accompanied messages informing
them of the duration within which they should fill them up and send them back to the
researcher.
The same will also be communicated through the phone calls made to the participants.
They will be given two weeks to find time to fill in the questionnaire after which they will
The researcher will also review previous literature on intelligence gathering and security
challenges faced in Nigeria. The review will support a synthesis of information and an
Nigeria.
Review of literature will focus on gathering information about the historical and current
area and issues that influence it. This will reinforce first hand data that are collected for
the report.
35
KHADIJAH ADENIKE FALABI (NOU167534194)
The first method of data analysis will be coding. Coding involves arranging information
into themes that are relevant to answering the research questions. The researcher will
utilize open coding, which will be used to ensure that there is adequate room for the
Open coding is flexible in that it allows researchers to analyze data with the possibility of
changing topics and adding new topics as they complete the analysis process. This data
analysis method will be used mainly to analyze the open-ended data that will be
collected.
The second method of data analysis will involve conducting simple computations of the
quantitative data that will be collected through the customized Likert scale, and the
To derive useful meaning from the data, and examine the propositions of the study,
the demographic characteristics of the respondents and using the Statistical Package for
The researcher has attempted to come up with a research whose results are admissible and
applicable to the selected context, but even so, there are some limitations to the study.
The research will involve a total of 429 participants, and though the number is feasible
for the study, it limits the transferability of the results. The views they hold may not be
36
KHADIJAH ADENIKE FALABI (NOU167534194)
transferable to the whole Nigerian population.
37
KHADIJAH ADENIKE FALABI (NOU167534194)
The second limitation lies in the subjectivity that is related to open-ended data. Open-
ended data mainly involves the collection of opinionated information. The participants
may very well give opinions that do not necessarily represent what they truly think.
In other words, there is a chance that the data collected does not fully represent what the
participants think. There is also a chance of subjectivity with regard to data analysis
These limitations, however, do not mean that the research should be dismissed. With
regard to the participants, there is always a limit to the extent to which the results of any
research can be transferred/are externally valid. In order to increase the chances of getting
objective responses, the researcher opted to use follow up interviews which will support
counters the effect of subjectivity that may arise in the analysis of open-ended data.
38
KHADIJAH ADENIKE FALABI (NOU167534194)
CHAPTER FOUR
4.1 INTRODUCTION
This chapter is concerned with the detailed analysis of the data collected from the
questionnaire used for the study and the responses given to the questions designed for the
analysis. The objective of this chapter is to analyze, present and interpret the data
obtained with the aid of questionnaires and use them to answer the research questions
The data analysis is based on the returned questionnaires and responses gathered from the
field work. Specifically, three hundred and ninety-nine (399) copies of closed-ended
questionnaire were administered to members of the public of the area under study.
From the closed-ended questionnaires administered, three hundred and sixty-six 366,
Also, thrirty (30) closed-ended questionnaires were administered to the personnel of the
NSCDC to gather their opinions about intelligence gathering efforts of the agency and the
challenges it faced in tackling insecurity in the Ipokia area of Ogun State. Personnel
questioned were from the rank of Assistance Superintendent Cadre and above.
39
KHADIJAH ADENIKE FALABI (NOU167534194)
Total 30 100
Data was collected on several concepts that are linked to the main research questions on
which the research is based. To establish a solid base for the findings, the researcher
‘insecurity’ to mean.
There were diverse opinions, but to a greater extent, the participants understood
mean the presence of threats, and the occurrence of events that threaten or take people’s
40
KHADIJAH ADENIKE FALABI (NOU167534194)
The question was open and therefore, the participants used it as an opportunity to give
examples of what they thought constituted intelligence gathering and insecurity. Their
descriptions of insecurity included certain words and phrases including “high chances of
Out of all these, ‘smuggling’ and ‘oil bunkering’ were the most reoccurring answers
Besides what may be termed as insecurity issues, some of the participants also mentioned
other aspects of insecurity such as touting and cultism which may have smaller magnitude
of effects.
Causes of Insecurity
Part of the interview targeted what the participants thought were the causes of insecurity
in the area under study. One of the causes of insecurity that was highly mentioned by the
From the responses that were collected from the participants, it is clear that they thought
people engaged in activities that lead to insecurity because, it benefited them financially.
This was deduced from the statements which they made. For example, these statements
were extracted from their responses, they stated “people engaged in smuggling to make
money”, “since the government doesn’t care for the people of the area they have to learn
to survive”, “oil bunkering is a lucrative business due to the closeness to the nation’s
border”.
41
KHADIJAH ADENIKE FALABI (NOU167534194)
These statements among many more that were recorded allude to the causes of insecurity.
below.
There are those who stated that, there are too many youths who are unemployed and as
such, they turn to crime as an avenue to make money, and also, as part of spending idle
time.
These are some of the statements that were picked from their responses: “when intelligent
youths are unemployed they may decide to use their intelligence to plan and commit
crime”. These are some of the statements that clearly articulated the stated connection.
The participants also mentioned poor intelligence gathering to combat insecurity. The
stated that the government has not strengthened the NSCDC enough to ensure proper
There are also, those who felt that the NSCDC is not internally structured, and therefore,
lack the ability to function appropriately. These are some of the statements that were
gotten from the collected responses. They stated that; “the government is not committed
to fighting criminals and ensuring the security of the people”, “some politicians fund oil
bunkers and smugglers to perpetrate these crimes”, “some government officials are
corrupt and they support activities that increase insecurity”, “the NSCDC does not have
This alludes to the presence of poor structures that do not fully support enforcement of
42
KHADIJAH ADENIKE FALABI (NOU167534194)
The participants were asked to explain what they thought was the role of the NSCDC in
ensuring security. The respondents in this case outlined several things which they thought
the NSCDC should do to ensure security in the area under study. Some of the roles
gathering processes
(ii) Cooperation between the NSCDC and the public in the prompt notification of
(iii) Proper motivation of the NSCDC personnel to encourage them in their crime-
fighting activities
(iv) NSCDC officers should be committed to fighting crime and not give room to
corruption
operations
Asked whether they believe intelligence gathering has any effect on the current situation
in the Ipokia, the respondents explained that the extreme crime that undermine security
Some claimed that only the Armed Forces which consist of the Army, the Navy and their
Air Force are given priority by government on intelligence gathering. They pointed out
that
43
KHADIJAH ADENIKE FALABI (NOU167534194)
the civil security agencies which are majorly tasked with the internal security are always
Most time, the military refuses to share intelligence with other civil security agencies
The participants were also asked what they thought were the major challenges faced by
the NSCDC in their fight against insecurity. The participants mentioned several
challenges, but the main responses were lack of equipment, poor training, and minimal
support from the public. Lack of equipment was the most reoccurring response cited by
They stated that sometimes the NSCDC are not well equipped with requisite knowledge
to analyze information in their possession about certain imminent crime, and this
In relation to lack of equipment, the security officers claimed that inadequate equipment
vehicles and other security tools make the agency lag in its security operations.
Another challenge mentioned was that members of the public sometimes withhold crucial
information that could assist in fighting insecurity. They stated that members of the public
hold on to information about oil bunkering, smuggling, cyber-crime, and other criminal
acts. People do not always report suspicious activities until it is too late.
The security personnel expressed great concern on the ability of the NSCDC to tackle
current security challenges due to the reasons mentioned above and believe the
44
KHADIJAH ADENIKE FALABI (NOU167534194)
government
45
KHADIJAH ADENIKE FALABI (NOU167534194)
can improve the ability of the security agency with proper motivation, encouragement and
They were confident that the security operations of the NSCDC will be highly enhanced
if all proper provisions are made to improve the intelligence gathering efforts of the
agency.
The participants stated many things, which they thought should be done, and these
systems for criminals who pose security threats, promoting collaboration between the
NSCDC and the public, fighting corruption, improving the management of resources,
increasing job opportunities for the public, and reducing poverty level in the area.
operations
Almost all of the NSCDC personnel questioned were confident that if provided proper
equipment and motivation and structure, the NSCDC will be better positioned to tackle
the internal insecurity and ensure adequate protection of the people and public property in
the locality.
46
KHADIJAH ADENIKE FALABI (NOU167534194)
GOVERNMENT
The table above shows that 53% of the respondents are male while 47% are female. This
47
KHADIJAH ADENIKE FALABI (NOU167534194)
The table above shows that 14% of the respondents are between 18 and 20 years of age,
48% are 21-40 years of age, 28% are 41-50 years while 10% are 51 years of age and
The table above shows that 25.4% of the respondents have WASSCE/WAEC
12.3% have MBA/MSc qualification, while 8.5% have other qualifications. This indicates
that the sample selected for this study is educated and able to answer the research
questions.
The table above shows that 38% of the respondents are single, 54% are married while 8%
are divorced/separated. This indicates that there are more married respondents than single
From the table above, the higher proportion of the respondents do not agree to the
statement. This indicates people’s distrust in the ability of the security outfit to overcome
49
KHADIJAH ADENIKE FALABI (NOU167534194)
The table above shows that 73% of the respondents believe the security challenges in the
area adversely affect their livelihood. This shows that without adequate security the
people of the local government are living in fear of all forms of violence and open to
issues
The table above shows that the majority of respondents representing 71% never agreed
that NSCDC personnel are well-trained to combat insecurity. They indicated that the
50
KHADIJAH ADENIKE FALABI (NOU167534194)
Table 8: The public is highly cooperative with the NSCDC in eliminating security
challenges in Ipokia
The table above shows very little difference between those that agreed and those that
disagreed with this statement. This shows that the respondents really did not take a clear
stand. The implication of this is that there should be more cooperation between the
51
KHADIJAH ADENIKE FALABI (NOU167534194)
The table above shows that a higher proportion of the respondents agree that the NSCDC
is not well equipped to tackle insecurity. The lack of adequate equipment to gather
intelligence will undermine the effectiveness of the NSCDC in their fight against
In the table 10 above the higher proportion of the respondents agree that information
Table 11: Combating insecurity can be achieved greatly with adequate intelligence
gathering.
52
KHADIJAH ADENIKE FALABI (NOU167534194)
The table above shows that the majority of the respondents agree to the statement that
NSCDC. This means that the NSCDC will be more effective in tackling insecurity with
adequate intelligence.
The table above shows 67% of the respondents agree that NSCDC’s expertise in
intelligence is a cause for concern. This is implying that the NSCDC personnel lack the
53
KHADIJAH ADENIKE FALABI (NOU167534194)
The table above shows that the majority of the respondents agree that improving
intelligence gathering system would improve security situation. This implies that more
training is required for the NSCDC personnel to enhance their skills in intelligence
gathering.
Table 14: NSCDC personnel lack the requisite intelligence know-how to tackle
insecurity.
The table above shows that about 60% of the respondents believe that personnel of the
NSCDC lack the requisite intelligence know-how to tackle insecurity. This lack of know-
how will undermine the effectiveness of the NSCDC in their combat against insecurity.
NSCDC.
54
KHADIJAH ADENIKE FALABI (NOU167534194)
operations of NSCDC.
suggests that there is a significant and positive relationship between the independent
variable: intelligence gathering and the dependent variable: NSCDC operations at 0.01
level of significance.
This outcome implies that improvement in intelligence gathering will enhance the
operations of the NSCDC in their fight against insecurity in the Ipokia area of Ogun
State. This positive relationship therefore suggests the rejection of the null hypothesis
which purported that there is no relationship between intelligence gathering and the
operations of NSCDC.
This rejection of the null hypothesis implies the acceptance of the alternative hypothesis
which support the claim that intelligence gathering has significant impact on the
55
KHADIJAH ADENIKE FALABI (NOU167534194)
H0: Intelligence gathering does not have any impact on the operations of the NSCDC.
H1: Intelligence gathering has significant impact on the operations of the NSCDC.
Model Summary
The results of the Regression Analysis of the relationship between the dependent
variable: intelligence gathering and the independent variable: NSCDC’s operations are
It can be inferred from the model that intelligence gathering has an impact on the
operations of the Nigerian Security and Civil Defence Corps. This is evidenced by the
0.361 parameter of intelligence gathering in the coefficient table 17b. Since p-value of
56
KHADIJAH ADENIKE FALABI (NOU167534194)
0.000 is less than the
57
KHADIJAH ADENIKE FALABI (NOU167534194)
Therefore, the null hypothesis which purported that intelligence gathering does not have
Thus, the alternative hypothesis that intelligence gathering has significant impact on the
Table 15 above shows the ranking of the various security challenges in Nigeria. The
respondents were required to indicate the seriousness of each challenge listed in the
above, and the result shows that six of the challenges mentioned in the table ranked high
58
KHADIJAH ADENIKE FALABI (NOU167534194)
Due to its closeness to the border, Ipokia has a high prevalence of illegal oil bunkering
and smuggling as supported by 253 (69%) and 243 (66%) out of the respondents
respectively. The other challenges also rated as highly prevalent by different percentages
of participants are: Ritual killings, 243 (66%), Kidnapping, 162 (44%), Cyber-crime, 149
(41%), and Robbery, 144 (39%). The other challenges, according to the respondents, pose
59
KHADIJAH ADENIKE FALABI (NOU167534194)
CHAPTER FIVE
5.1 SUMMARY
This study is centered on an in-depth examination and analysis of the issues and prospect
government of Ogun State. The research work identifies the different ills associated with
intelligence gathering and security operations and their impact on the operational level.
The results of the research show that the study area has a multitude of security challenges
with which it grapples. While the questionnaire was limited to certain challenges
there were other challenges that were mentioned to include; robbery, cultism, and ritual
killing.
The findings of the study show a high prevalence of security challenges, because, no
single crime out of those outlined, was outlined by the participants as being non-
prevalent.
The study goes further to stress the need and ways to provide the NSCDC with adequate
support and security control or management so as to fend off all manners of crime which,
Each of the security challenges captured in the literature review was cited by the
participants as low, medium or high, and this is indicative of the need for comprehensive
61
KHADIJAH ADENIKE FALABI (NOU167534194)
5.2 FINDINGS
The broad objective of the study was to evaluate how intelligence gathering could aid the
security operations of the NSCDC in Ipokia local government of Ogun State. The study
established that intelligence gathering was necessary for all operations of the NSCDC.
The study also revealed that the effectiveness of the intelligence gathering was
insecurity, poor intelligence gathering infrastructure, poor structure within the NSCDC,
lack of cooperation by the public in the prompt alert over criminalities in the study area,
amongst others.
NSCDC was adversely affected by its inability to provide real intelligence as well as its
collection.
Also, finding from the study highlighted some security challenges that highly undermine
the security operations of the NSCDC. Out of the ones mentioned, Illegal oil bunkering,
Smuggling, Ritual killing, Kidnapping, Cyber-crime and Robbery were said to have high
Other challenges like Touting, Religious violence, Ethnic clash and Religion recorded
The study listed the roles of NSCDC in ensuring security in the study area to include:
63
KHADIJAH ADENIKE FALABI (NOU167534194)
operations in the local government; regular training of NSCDC personnel to ensure they
are up-to- date with recent intelligence activities and tackle insecurity in a proactive way.
The public opinion on the activities of the NSCDC in the Ipokia area of Ogun State was
that of reservation. Findings from the study established the following based on the
- Another finding showed that lack of job opportunity and high level of poverty in
- There is palpable fear in the atmosphere, due to the high vulnerability level due to
the unchecked activities of the smugglers, oil bunkers, kidnappers and other
security risks in the area. The people claimed that this high security risks adversely
- The public believed that the NSCDC lacks adequate infrastructure to tackle
- It was further suggested by the public that adequate infrastructure will highly
enhance the ability of the NSCDC and also improve the expertise of its personnel
in intelligence gathering. The current poor expertise of the personnel is a cause for
intelligence gathering and the operations of the NSCDC, implying that improving
intelligence gathering efforts of the security agency will improve the operation of
64
KHADIJAH ADENIKE FALABI (NOU167534194)
5.3 RECOMMENDATION
Going by the findings of this study, the following recommendations are made:
There was palpable fear in the environment which need to be alleviated by beefing
up the security operations of the NSCDC in the local government area. This
implies the proper provision of necessary motivation for the personnel of the
security agency to ensure their commitment to the fight against insecurity in the
study area.
The government should engage the public in productive activities that will ensure
income generation to cater for themselves and their families. This will
significantly enable the people of the area to shun violence, insecurity activities
and crime.
The public should also be encouraged to share information that are critical to the
Thus, the agency must build trust with the public and vice versa.
Oil bunkering, kidnapping and smuggling are the major criminal activities that are
carried out in the study area due to its proximity to the nation’s border. From the
finding, the NSCDC is not well equipped to tackle these menaces. The agency
must invest in the regular training of its personnel and equip them with necessary
intelligence gathering tools to quickly and easily identify where criminalities are
65
KHADIJAH ADENIKE FALABI (NOU167534194)
5.4 CONCLUSION
the NSCDC, the study found that the agency needs to adopt strategies that would ensure
the provision of real time intelligence and adequate analytical skills while the necessary
period of time.
This study does not cover all area to be evaluated regarding the intelligence gathering and
security challenges, mainly because it is still an ongoing challenge and new issues are
surfacing with limited literatures on them. As the situation develops, there will be a need
for additional research; hence this study proposes the use for further studies on:
66
KHADIJAH ADENIKE FALABI (NOU167534194)
REFERENCE
Abolurin, A. (2011). Para-military agencies and the promotion of good governance for
national security in Nigeria, in Ade Abolurin [ed] Nigeria’s national security:
Issues and challenges. John Archers Publishers.
Adebayo, A. (2008). Managerial and operational skills for modern security practice.
Institute of Security of Nigeria.
Adebayo, F. (February, 2011). The world’s most dangerous places. Tell Weekly, 46.
Agbode P. A. U. (2011). Poverty, national resources and public policy in Nigeria. Jetta
Press Ltd.
Alemika, L. O. E (2013). Intelligence led policing and internal security: The imperative
to community partnership in National Security: Intelligence and Community
Partnership Approach. Lawlords Publications.
Asika, N. (2009). Research methodology in the behavioural science. Longman Nigeria Plc.
Bodunde, D. O., Ola, A. A. & Afolabi, M. B. (2014). Internal insecurity in Nigeria, the
irony of multiplicity of security outfits and security challenges. International
Journal of Research in Humanities, Arts and Literature, 2(5), 2347–4564.
Ferris, B. (1998). Security a new framework for analysis. Lynne Rienner Publishers.
67
KHADIJAH ADENIKE FALABI (NOU167534194)
Ferris, J., & Handel, M. (1995). Clausewitz, intelligence, uncertainty and the art of
command in Military operations. Intelligence and National Security 10(2), 1–58.
Fisher, J. R. (2010). System theory and structural functionalism. In John T. Ishiyama and
Mzrijke Breuning (2018). 21st Century Political Science: A reference book (ed).
Sage.
Flavius-Cristian, M., & Andreea, C. (2013). The role of intelligence in the fight against
terror. European Scientific Journal, 9(2), 1–11.
Gabriel, A. (2001). Modern political theory. Vikas Publishing House, PVT Limited.
Githens, D., & Hughbank, R. (2010). Intelligence and Its Role in Protecting Against
Terrorism. Journal of Strategic Security, 3(1), 31–38.
Handel, M. (1990). Intelligence and Military operations. Frank Cass and Company
Limited.
Herman, M. (1996). Intelligence power in peace and war. Cambridge Univ. Press.
Iduh, S. (2011). The challenges to peace in Nigeria. Journal of Vocational and Technical
Education, 3(8).
Idowu, A. O. (2008). “Meeting the challenges of low intensity conflicts in Nigeria: The
role of the National Intelligence Agency”. AFCSC.
Ilogho, A. (2006). “The Activities of Joint Task Force Operation Restore Hope”. Being
Brief for Chief of Defence Staff, Warri, September 6.
Jackson, P. & Scott, L. (2004). Understanding intelligence in the twenty first century.
Routledge.
68
KHADIJAH ADENIKE FALABI (NOU167534194)
Jackson, P. & Scott, L. (2004). Understanding Intelligence in the Twenty First Century.
Routledge.
Mroz, J. E. (1991). Beyond security, private perceptions between Arabs and Israelis.
International Peace Academy.
Ngoa, S. (2012). “The mass media and national security dilemma of balancing the
doctrine of the public to know and magnifying the propaganda of terrorist group”.
A Paper Presented at Abuja Summit.
Nwanegbo, C. J. & Odigbo, J. (2013). Security and national development in Nigeria: The
threat of Boko Haram. International Journal of Humanities and Social Sciences,
3(4).
Oghi, F. E. & Unumen, J. O. (2014). Military Intelligence and the Challenge of National
Security in Contemporary Nigeria. International Journal of Research in
Humanities and Social Studies, 1(2), 7–13.
Peters, J. (1986). Intelligence: its role and future in Nigeria’s external relations. Nigerian
Journal of International Affairs, 12(1 & 2), 152.
69
KHADIJAH ADENIKE FALABI (NOU167534194)
Phenson, U. A., Ojie, P. A., Esin, O. & Atai, A. J. (2014). Essential elements of security
and their applications in ensuring stability and integration of Nigeria. Journal of
Research & Method in Education, 4(4), 1–14.
Salawu, B. (2010). Ethno-religious conflicts in Nigeria: Casual analysis and proposal for
new management strategies. European Journal of Social Sciences, 13(3).
Ufot, A. P., Peter, A. O., John, O. E. & Aniette, J. A. (2014). Essential elements of
security and their applications in ensuring stability and integration of Nigeria.
IOSR Journal of Research & Method in Education, 4(4), 1–14.
Unumen, J. O. (2014). Boko Haram Movement in Nigeria and its implication for national
security, in U. M. Nwankwo, C. I. Anaere, J. M., O. A Ayuba, and L. Olurode
(eds.), Towards Peace, Security and Sustainable Development in Africa. IT
Educational Publishers.
70