Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 79

THE IMPACT OF INTELLIGENCE GATHERING ON THE

OPERATIONS OF THE NIGERIA SECURITY AND CIVIL DEFENCE

CORPS (NSCDC) IN IPOKIA L.G.A, OGUN STATE.

BY

KHADIJAH ADENIKE

FALABI MATRIC NUMBER

NOU167534194

BEING A PROJECT SUBMITTED IN PARTIAL FULFILMENT OF

THE AWARD OF BACHELOR OF SCIENCE DEGREE IN THE

DEPARTMENT OF CRIMINOLOGY AND SECURITY STUDIES

OF NATIONAL OPEN UNIVERSITY OF NIGERIA.

MAY, 2021
CERTIFICATION

This is to certify that this study ‘The impact of intelligence gathering on the operations of

the Nigeria Security and Civil Defence Corps (NSCDC) in Ipokia L.G.A, Ogun State’ was

conducted under my supervision by Falabi, Khadijah Adenike, with matriculation number

NOU167534194, in the department of Criminology and Security Studies, National Open

University of Nigeria, Ibadan Study Centre, Oyo State.

Dr. Julius Olusegun Ajegbomogun Date

SUPERVISOR

B.Sc Sociology (Lagos)

M.I.L.R. (Ibadan)

M.Sc (Ibadan)

Ph.D (Ibadan)

ii
DEDICATION

This research work is dedicated to God almighty, the Creator and Ruler of the world. Also

to my parents, the Falabi’s.

iii
ACKNOWLEDGEMENT

All glories and adorations, praises, gratitude and salutes belong to the Most Magnificent

and Most Merciful God of all creation, the beginning of all things and the end of

everything. I register my gratitude with total submission to Your will, and for the

completion of this research work, I say Alhamdulilahi Robil Alamin.

My gratitude will be eternal to my family: my parents Mr. and Mrs. Falabi and my

siblings, and my darling husband Mr. Ashimiyu Adisa Adeoye, for their support,

understanding and care. Your love for me has brought me this far, to the glory of God. I

will forever be grateful.

Many thanks to my supervisor, Dr. Julius Olusegun Ajegbomogun (B.Sc Sociology,

Lagos; M.I.L.R, Ibadan; M.Sc, Ibadan; Ph.D, Ibadan), under whose guidance this

research work comes to successful completion. I am also full of appreciation to all the

instructors of Criminology and Security Studies for providing the materials and guides

for proper understanding of the course.

My special gratitude is reserved for my true friends, yard sticks and benefactors: Mr

Ayodeji Olawale, Mr Ibrahim Adeagbo, Mr Jibrin Mohammed and Mrs Tina, whose kind

gesture and compassionate outreach redefined friendship and brought hope back to life

for me, God bless you all.

To all my fathers who have had great impact in my life: Mr James Falabi, Mr Giwa

Jubril, and Mr Olayiwola Falabi. My academic achievement is as a result of your support

and encouragement. I have come this far, to Allah’s glory, this is a success to all of you.

You all have my eternal love. I am fortunate to be related to you. God bless you all.

iv
Finally, to all my colleagues in Criminology and Security Studies department, may we all

be successful in life.

v
ABSTRACT

The challenges of insecurity in Nigeria are traceable to lapses in intelligence gathering


and proper utilization of same. There are several challenges combating intelligence
gathering among which are unwillingness of the public to share viable information with
the security agencies. This research work is an empirical study on the impact of
intelligence gathering on the operations of the Nigeria Security and Civil Defence Corps
(NSCDC) in Ipokia L.G.A, Ogun State. It reviewed relevant literatures on Intelligence
gathering and security operations of NSCDC.
Survey research design was used to carry out the study and simple random sampling was
used to select the sample size for this study. Questionnaire was adopted as the instrument
for this study. 399 respondents representing the members of public of Ipokia local
government and 30 NSCDC personnel were employed to participate in the study.
Questionnaires were administered to 399 selected sample. 30 Questionnaire administered
to the NSCDC personnel were returned completed. The theoretical framework for this
study was Structural Functionalism.
Regression Analysis and Pearson Moment Correlation Coefficient through SPSS 22
(Statistical Packages for Social Sciences) data editor were used to test the hypotheses put
forward in the study. The outcome of the analysis revealed that Intelligence gathering has
significant impact on the operations of the NSCDC. Findings also revealed that the
security challenges ranked highest are Illegal oil bunkering and other criminal activities.
The study recommends that the agency should adopt strategies that would ensure the
provision of real time intelligence and adequate analytical skills while the necessary
facilities, integrated communication system and technical intelligence collection systems
are to be put in place through a systematic approach of gradual procurement of the
necessary intelligence infrastructure through deliberate and dedicated budgetary
allocation over a period of time.

Keywords: Intelligence gathering, Security operation, NSCDC

Word Count: 11,200

vi
TABLE OF CONTENTS

Cover Page i

Certification ii

Dedication iii

Acknowledgement iv – v

Abstract vi

Table of contents vii – ix

Chapter One

1.0 Introduction 1

1.1 Background of the study 1–4

1.2 Statement of the problem 4–5

1.3 Research Questions 5

1.4 Objectives of the study 5–6

1.5 Research Hypotheses 6

1.6 Scope of the study 6

1.7 Definition of Terms 7

Chapter Two

2.0 Literature Review 8

2.1 Intelligence Gathering 8 – 10

2.1.1 Security Operations 10 – 14

2.1.2 A brief history of Nigeria Security and Civil Defence Corps (NSCDC) 14 – 15

2.1.3 Relationship between intelligence gathering and security operations 15 – 16

2.1.4 Intelligence gathering and the Nigeria’s Security Challenge 16 – 19

2.1.5 Security challenges confronting Nigeria state 19 – 24

vii
2.2 Theoretical Framework 24 – 25

2.3 Empirical study/works done by different authors 25 – 27

Chapter Three

3.0 Research Methodology 28

3.1 Introduction 28

3.2 Research Design 28

3.3 Research Instrument 28 – 29

3.4 Population of the study 30

3.5 Sample size selection/sampling technique 30 – 31

3.6 Instrumentation 32

3.7 Data Analysis 33

3.8 Limitations of the study 33 – 35

Chapter Four

4.0 Data Presentation and Analysis 35

4.1 Introduction 35

4.1.1 Responses from open-ended Questionnaires administered to the NSCDC

Personnel 36

4.1.2 Data Presentation 36 – 41

4.2 Responses from closed-ended Questionnaires administered to the members

of public of Ipokia Local Government 42

4.2.1 Data Presentation 42 – 49

4.3 Test of Hypotheses 49

4.3.1 Test of Hypothesis I 49 – 50

4.3.2 Test of Hypothesis II 51 – 52

viii
4.4 Insecurity Challenges 52 – 53

Chapter Five

5.0 Summary, Conclusion and Recommendation 54

5.1 Summary 54

5.2 Findings 55 – 57

5.3 Recommendation 57 – 58

5.4 Conclusion 58

5.5 Recommendations for Further Studies 58

Reference 59 – 62

ix
KHADIJAH ADENIKE FALABI (NOU167534194)

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

Intelligence refers to information that meets the stated, understood needs of policy makers

and has been collected, refined and narrowed to meet those needs. Nations require

intelligence about their immediate environment and that of other nations. This is

necessary because, in order to preserve their security, they need to keep track of internal

and external threats (Lowenthal, 2000).

Consequently, nations require certain instruments to contain these threats. Also, nations

adopt strategies and policies such as defence and security policies to enable them to

respond appropriately and safeguard them from both external and internal threats

(Enahoro, 2010).

Intelligence, as a critical tool of statecraft, provides the necessary warning about

imminent threats to policy makers in order to protect a nation from being subjected to

surprise military attacks.

Intelligence gathering in an organization is able to avert imminent threats to a country by

providing timely, processed information to national security decision makers (Ngboawaji,

2013). This is achieved through the acquisition of covert information by covert means on

the actions, policies and capabilities of other nations.

The information, which is of utmost importance to national security, is collected,

analyzed and disseminated for use to support action. Thus, the role of intelligence is to

1
KHADIJAH ADENIKE FALABI (NOU167534194)

support action that may be deemed necessary in the furtherance of national interests

(Lowenthal, 2009).

Security operations are the procedures and actions taken by security agencies to protect

lives and properties in order to ensure there is no state of insecurity within a society. The

conduct of security operations in Nigeria is shaped by the peculiarity of the security

environment; thus, security operation could be proactive or reactive.

When it is proactive, it involves essentially the use of intelligence to avert any threat to

national security. These threats could be in the form of sabotage, subversion, terrorism

and all other destructive actions that could undermine national security. Reactive security

operations involve the use of security apparatuses to contain conflicts that are already on

ground. When that happens, states involve security operations that are reactive in nature

and the use of military force is employed in conjunction with national intelligence assets

to contain threats (Jackson et al, 2004).

In Nigeria, internal threats manifest mostly in the form of communal conflicts, both inter

and intra, ethnic, religious as well as finding expression in militant activities. Typical

examples of a security operation in Nigeria include the Joint Tasks Force (JTF) Operation

RESTORE HOPE in Niger Delta, Operation FLUSHOUT III in Rivers State and

Operation HARMONY IV in the Bakassi Peninsular. The mandate of these security

operations was to reverse the state of insecurity in the affected areas (Ufot et al., 2014).

It is necessary for the government to deploy the military and other sister security agencies

to manage internal security threats whenever and wherever troubles arise. The Nigeria

Security and Civil Defence Corps (NSCDC) is one of such agencies. A paramilitary

security outfit created with the mandate to assist in managing threats to internal security

in the country.
2
KHADIJAH ADENIKE FALABI (NOU167534194)

Established by an Act of 2003, NSCDC is assigned to play crucial roles in grassroots

security system and nation building. It has power to arrest with warrant or without

warrant, detain, investigate and institute legal proceedings against any person who is

reasonably suspected to have committed an offence, investigate and take necessary step to

forestall any planned act of terrorism and report same to appropriate federal security

agency among others (Abolurin, 2010).

The non-effectiveness of the intelligence in support of security operations in Nigeria are

attributed to inadequate human and technical intelligence capabilities. These are

assumption based on public opinion of intelligence failure.

Recent events in Nigeria, which include; the Boko Haram onslaught and the recurrent

Jos–Plateau sectarian crises among others have thrown up arguments on the level and

quality of the intelligence support provided for national security (Ofongo, 2018). Within

the military that plays a leading role in operations, there are three schools of thought

amongst commanders.

In the first school of thought are some commanders whose opinion is that intelligence as

practiced in Nigeria is not real time and therefore does not add value to operations. A

second school of thought believes that intelligence management in Nigeria lacks

analytical skills and is therefore unable to predict events correctly. The third school of

thought believes that intelligence in operation are unreliable and therefore not needed.

The arguments on the need for intelligence or lack of it when critically dissected are

premised on the use of technology such as communication facilities, satellites, sensor

equipment and computers that are essential input to the production of intelligence. In

other words, it amplifies the fact that technology is not an end itself, but the means to

3
KHADIJAH ADENIKE FALABI (NOU167534194)

process and pass intelligence in support of the commander and the mission (IIogho,

2006).

The lack of real time intelligence and lack of analytical skills to predict incident

accurately before, during and after they occur as well as intelligence as a product being

unreliable during operations, are some of the issue that have created doubt in the quality

of intelligence available to military commanders. This has further created a dilemma

between military commanders and the intelligence staff on the necessity to rely on

intelligence as one of the determinants of success in operations.

It is the need for the resolution of these arguments that has aroused this researcher’s

interest in the matter. Thus this study sets out to find out the issues associated with how

intelligence gathering has mitigate insecurity in Nigeria with a view to ascertaining the

prospects and challenges of intelligence gathering in an emerging country like Nigeria.

1.2 STATEMENT OF THE PROBLEM

The challenges of insecurity in Nigeria are traceable to lapses in intelligence gathering

and proper utilization of same. There are several challenges combating intelligence

gathering among which are unwillingness of the public to share viable information with

the security agencies.

Lack of citizen’s involvement in state security management and their reluctance in

volunteering security information to law enforcement agencies remain part of the lapses

in critical security elements application (Phenson et al., 2014).

The proper employment and accurate designation of tasks for the intelligence agencies to

support security objectives remains a major challenge in confronting insecurity in the

4
KHADIJAH ADENIKE FALABI (NOU167534194)

country. Hence, lack of analytical skills and others denigrate the value of intelligence

product in security operation.

The inability of the government to rise promptly to intelligence information in their

disposal to combat insecurity is another problem. Intelligence report on the abduction of

the Chibok girls revealed the inadequate management of intelligence by the Goodluck

Jonathan administration which culminated in the abduction of the Chibok school girls and

the destruction of lives and properties following the campaign of terror visited on the

country by the dreaded Boko Haram insurgent group.

This study therefore seeks to provide answers to such questions as; What is the level of

intelligence gathering of NSCDC to support its operations in Nigeria? How effective is

intelligence gathered? What are the intelligence lapses in the operations of the corps in

Nigeria? What can be done to cover these lapses? Answers to these questions will provide

useful insights into the management of intelligence gathered by the NSCDC in supporting

its operations in Ipokia local government.

1.3 RESEARCH QUESTIONS

(i) What is the relationship between intelligence gathering and the operations of the

NSCDC in Ipokia local government?

(ii) What is the impact of intelligence gathering on the operations of NSCDC in

Ipokia local government?

(iii) What are the intelligence lapses in the security operations of NSCDC in Ipokia

local government?

(iv) What is the public opinion on the programme of the NSCDC in Ipokia

local government?

5
KHADIJAH ADENIKE FALABI (NOU167534194)

1.4 OBJECTIVES OF THE STUDY

The general objective of the study is to evaluate how intelligence gathering has impacted

on the NSCDC’s operations. The specific objectives are to:

(i) Identify the issues involved in the intelligence gathering in support of security

operations in Ipokia local government.

(ii) Examine the relationship between intelligence gathering and the operations of the

NSCDC Ipokia local government.

(iii) Examine the intelligence lapses in the operations of the NSCDC in Ipokia local

government.

(iv) Investigate public opinion on the programme of the NSCDC in Ipokia local

government.

1.5 RESEARCH HYPOTHESES

Hypothesis I

H0: There is no relationship between intelligence gathering and the operations of

NSCDC.

H1: There is a significant relationship between intelligence gathering and the

operations of NSCDC.

Hypothesis II

H0: Intelligence gathering does not have any impact on the operations of the NSCDC.

H1: Intelligence gathering has significant impact on the operations of the NSCDC.

6
KHADIJAH ADENIKE FALABI (NOU167534194)

1.6 SCOPE OF THE STUDY

This study set out to find out the challenges faced by NSCDC in intelligence gathering in

Ipokia local government and how effective the agency utilizes intelligence gathered to

tackle insecurity in the area. The motive behind this study is to proffer solutions to the

security challenges plaguing the intelligence gathering of this security agency.

1.7 DEFINITION OF TERMS

Intelligence gathering: An intelligence gathering network, in this study, refers to a

system through which information about a particular entity is collected for the benefit of

another through the use of more than one, inter-related source. Such information may be

gathered by a military intelligence, government intelligence, or commercial intelligence

network. The focus of this study is on the intelligence gathering of NSCDC in the Ipokia

local government area of Ogun State.

Operations: Operation means the actions and decisions of an organization which requires

the use of resources and assets and affect organization’s performance. Operations in this

study refers to the actions and decisions taken by the NSCDC from the intelligence it

gathered to counter security challenges.

NSCDC: This is an acronym for Nigeria Security and Civil Defence Corps, a paramilitary

entity that was created to tackle internal security challenges of Nigeria. The acronym

NSCDC is used in this study refers to this security outfit and any mention of the acronym

should be considered as representing the security agency.

7
KHADIJAH ADENIKE FALABI (NOU167534194)

CHAPTER TWO

LITERATURE REVIEW

2.1 INTELLIGENCE GATHERING

Intelligence is a relative rather than absolute term used to describe the process of

gathering, analyzing and making use of information (Jackson & Scott, 2004). Intelligence

has many meanings and it is in the context in which the term is used that it can be

understood.

However, intelligence gathering in this study is focused on issues related to national

security such as defence and internal security. It is the information most often provided to

decision makers to help guide future decision or actions. Examples of such actions are

outright war and Military Operation Other Than War (MOOTW) of which security

operation is one? In order to provide the necessary intelligence, nations establish and

maintain their intelligence organizations.

The structure of the intelligence organizations differs from one country to another, but

generally consists of the domestic and foreign intelligence. In the case of Nigeria, the

Department of State Service (DSS) and National Intelligence Agency (NIA) are the

domestic and foreign intelligence organization respectively.

There are also the three military service intelligence organizations which are the Defence

Intelligence Agency (DIA), the Directorate of Air intelligence (DIA) and the Directorate

of Navy intelligence (DNI) (Ngboawaji, 2013).

The role of intelligence in national security has increased in significance as a tool of state

policy. Thus, Micheal Herman thinks that intelligence is a form of state power in its own

right (Jackson & Scott, 2004). This concept of intelligence as a form of power is based on
8
KHADIJAH ADENIKE FALABI (NOU167534194)

the definition of power by Freedman (2005). Freedman defined power as the capacity to

produce effects that are more advantageous than would have been otherwise been

(Herman, 1996). This concept has not captured the basic processes involved in

intelligence production.

Conversely, Ferris (1998) has a different view and posited that intelligence is not a form

of power but a means to guide its use, whether as combat multiple or by helping one to

understand one’s environment and options. Thus, it relates to how to apply force or

leverage and against whom.

Furthermore, he believes that intelligence involved the collection and analysis of

information which allows the use of resource in the most effective way possible against

rivals who are doing the same. He therefore concluded that the knowledge (commonly

referred to as intelligence) derived from the information collected is for the purpose of

supporting an action, the concept dwelled more on the application and usage of

intelligence. Though it captures some aspects of intelligence process, it cannot satisfy the

requirement for this study (Ferris & Handel, 1995).

Lowenthal (2009) on his own part defines intelligence as “the process by which specific

types of information important to national security are requested, collected, analyzed and

provided to policymakers; the products of that process; the safe guarding of these

processes and this information by counter intelligence activities; and the carrying out

operations as requested by lawful authorities.”

The essential elements involved in the intelligence process are captured in the concept,

which are collection and analysis involved in the processing of information. It is the

analysis of raw information that leads to the finished product, which is intelligence.

9
KHADIJAH ADENIKE FALABI (NOU167534194)

Therefore, without analysis there cannot be intelligence. The term intelligence here also

refers to the organization that is primarily involved in the chain of activities in the

processing of Information. Beyond the organization level, intelligence is described in the

concept as a profession that carries out certain activities such as intelligence activities.

The tri-dimensional feature of this concept of intelligence provided a broad perspective in

dealing with every aspect of intelligence as it relates to military operations.

Intelligence gathering is an input resulting from information concerning domestic

environment or areas of operations that has been collected, processed, analyzed and the

safeguarding of the product and process which is provided to security policy makers to

guide decision or actions in support of operations (Flavius-Cristian & Andrea, 2013).

2.1.1 SECURITY OPERATIONS

According to Mroz (1991), security, “is the relative freedom from harmful threats,

security itself implies an absolute condition. Accordingly, something is either secure or

insecure” The nature of security defies pursuit of an agreed general definition.

However; security is underscored by the need to protect a nation against threats such as

espionage, sabotage and terrorism. It is not surprising that the ultimate pursuit of many

nations is the search for stability, peace and which are achieved through security

operations.

According to Adebayo (2008), security operations are all the activities, procedures,

actions taken or involved in the protection of lives and properties and provision of a

peaceful and stable environment for the daily conduct of lawful activities by individuals

and groups within the community. This concept gave a general format of security

operations. Furthermore, it captures the elements of proactive actions and procedures in

10
KHADIJAH ADENIKE FALABI (NOU167534194)
pre-empting threats (proactive security operations) to internal security.

11
KHADIJAH ADENIKE FALABI (NOU167534194)

However, it is silent on the specific type and activities to be taken in security operations

particularly when a state of insecurity has been established. Security is the deliberate

operations such as intelligence operations and cordon and search operation designed to

detect, and counter all forms of threats capable of creating insecurity within a section or

parts of a country in order that there is peaceful environment conducive for stable

governance (Githens & Hughbank, 2010).

Security has to do with the process connected with alleviation, assuaging any kind of

threat to man and his cherished values. It is such an important concept that every state,

organization and human person desire. This is why Afolabi (2014) asserts that security is

about freedom from threat and ability of state and society to maintain independent

identity and their functional integrity against forces of change, which they see as hostile,

while the button line is survival.

Generally, security is an elastic concept which view opinions in different fields and study

and its day to day activity of men. It is referring to safety from harm and danger which

may constitute threat to human existence. This is in consonance with perspective in

Imobighe (2003) when he affirms that security has to do with freedom from danger or

threat of a nation’s ability to protect and develop itself, promote it’s cherish values and

legitimate interest and enhance the well-being of its people.

Therefore, internal security could be seen as the freedom from or absence of those

tendencies which could undermine internal cohesion and the cooperate existence of a

country and its ability to maintain its vital institution for the promotion of its core values

and socio-political and economic objection as well as meet the legitimate operation of the

people.

12
KHADIJAH ADENIKE FALABI (NOU167534194)

The present challenge posed by armed robbers attacks, kidnappings, political

assassinations, trans-border crimes, espionage, smuggling, insurgency, oil bunkering and

incessant vandalization of public infrastructures in Nigeria require the effort of the

government, security outfits and entire Nigeria citizenry (Bodunde et al., 2014). Security

outfits include.

• The Nigeria Police Force

• Nigeria Security and Civil Defence Corps

• Nigeria Immigration Services

• Nigeria Prisons Services

• Nigeria Custom Services

• Federal Road Safety Corps

• Nigeria Fire Services

• Numerous registered private security organizations

Responsible Nigerians are now skeptical about the capability of our security outfits and

government of the day to curb ugly trends (Alemika, 2013).

The pre-eminent security outfits - the Nigeria Police have been incapacitated to subdue

the menace of criminality in Nigeria while the Nigeria Security and Civil Defence Corps

with the new armed squad men seem unfit to make an impact apart from their

humanitarian services. One may infer that internal security has attracted very little

attention among our leaders and academician.

The porosity of Nigeria borders and infiltration of weapons and ammunitions from

neighboring states account for the inefficiency of Nigeria Custom Service and

Immigration Service (Bodunde et al, 2014).

13
KHADIJAH ADENIKE FALABI (NOU167534194)

Bluntly speaking, activities of criminals are the major yardstick by which internal security

could be measured. One of the elements of a society is the presence of criminals who are

minority in number, but they are so toxic that they trouble the peaceful co-existence of the

society. It should be noted that if citizens are not secure, then the state is not secure.

Threats to internal security amount to the threats to National security (Bodunde et al,

2014).

The Nigeria Security and Civil Defence Corps (NSCDC) had been assigned to play

crucial roles in grassroots security system and nation building It has power to arrest with

warrant or without warrant, detain, investigate and institute legal proceedings against any

person who is reasonably suspected to have committed an offence, investigate and take

necessary step to forestall any planned act of terrorism and report same to appropriate

federal security agency among others (Abolurin 2011). The organization lacks adequate

manpower, modern technological equipment, adequate training and fund.

It is disheartening to state that most Nigerian do not know the constitutional responsibility

of the organization despite the availability of the offices and stations across states of

Nigeria Federation.

Amendment of the NSCDC Act 2007 empowered the organization to have arm squad. A

cursory look at armed men of this organization, one can infer that NSCDC is grappling

with lack of sufficient and modern firearms.

Trailing behind the foregoing, it is difficult for NSCDC to combat crime efficiently in the

country. Thus, a secured country is one that is able to protect and develop itself so that it

can promote its precious values, meet the needs of its citizenry and provide them with

safe atmosphere for self-improvement.

14
KHADIJAH ADENIKE FALABI (NOU167534194)

The advent of Boko Haram insurgency demands holistic approach and the need for

security agencies to synergize and share intelligence in the bid to curtail the prevailing

insecurity in the country (Salawu, 2010).

2.1.2 A BRIEF HISTORY OF NIGERIA SECURITY AND CIVIL DEFENCE

CORPS (NSCDC)

The Nigeria Security and Civil Defence Corps (NSCDC) is a Para-military agency of the

Federal Republic of Nigeria that is commissioned to provide measures against threat and

any form of attack or disaster against the nation and its citizenry. The Corps is statutorily

empowered by Act 2 of 2003 and amended by Act 6 of 4th June 2007.

The Corps is empowered to institute legal proceedings by or in the name of the Attorney

General of the Federation in accordance with provision of the constitution of the Federal

Republic of Nigeria against any person or persons suspected to have committed an

offence. It maintains an armed squad in order to bear fire arms among others to

strengthen the corps in the discharge of its statutory duties.

The Nigeria Security and Civil Defence was first introduced in May 1967 during the

Nigerian Civil War within the then Federal Capital Territory of Lagos for the purpose of

sensitization and protection of the civil populace. It was then known as Lagos Civil

Defence Committee. It later metamorphosed into the present-day Nigeria Security and

Civil Defence Corps in 1970.

On inception the Corps had the objective of carrying out some educational and

enlightenment campaigns in and around the Federal Capital Territory of Lagos to

sensitize members of the civil populace on enemy attacks and how to save them from

danger as most Nigerian living in and around Lagos territory had little or no knowledge

15
KHADIJAH ADENIKE FALABI (NOU167534194)
about war and its

16
KHADIJAH ADENIKE FALABI (NOU167534194)

implications. This was done through electronic and print media on how to guide

themselves during air raids, bomb attacks, identify bomb and how to dive into trenches

during bomb blast.

In 1984, the Corps was transformed into a National security outfit and the addition of

special functions by the Federal Government and on the 28th of June 2003, an Act to give

statutory backing to the NSCDC passed by the National Assembly was signed into law by

Chief Olusegun Obasanjo, GCFR, the former president and commander in chief of the

Armed Forces, Federal Republic of Nigeria.

These functions include: power to arrest with or without a warrant, detain, investigate and

institute legal proceedings by or in the name of the power of the Attorney General of the

Federation, monitor the activities of religious bodies and trade union, monitor, investigate

and take every necessary step to forestall any planned act of terrorism, provide

intelligence information to the ministry on matters relating to crime control generally,

riot, disorder etc. (Nigeria Security and Civil Defence Corps [NSCDC], 2014).

2.1.3 RELATIONSHIP BETWEEN INTELLIGENCE GATHERING AND

SECURITY OPERATIONS

Intelligence gathering is critical to operations success. It entails that extensive collection

processing, and analytical capabilities are fused together in the entire intelligence process

which would to ensure accurate and timely dissemination of intelligence.

Intelligence gathering thus ensures that intelligence requirement is met through the

visualization of the operational area as well as providing knowledge of the current

disposition and activities of an adversary security operation on the other hand help in

17
KHADIJAH ADENIKE FALABI (NOU167534194)

identifying and defeating imminent threats within the area of operations through counter

measures (Ngboawaji, 2013).

Intelligence gathering and security operations feed each other. This is because all

operation has intelligence component in that it also reports information. Effective security

operations produce information, which generates more intelligence.

Similarly, ineffective or inaccurate intelligence produce ineffective security operations

which produce opposite results. For instance, if intelligence is not provided on the

location, strength and capabilities of an adversary, such as experienced in the Niger Delta,

the success of the operation may be at higher cost to both human and equipment.

Therefore, intelligence gathering and security operations have a mutual but cause and

effect relationship (Handel, 1990).

2.1.4 INTELLIGENCE GATHERING AND THE NIGERIA’S SECURITY

CHALLENGE

Available evidence suggests that intelligence gathering activities in post-colonial Nigeria

took shape with the establishment of the Nigeria Security Organization (NSO) via Decree

No. 16 of 1976 (Idowu, 2008).

As it were, the Nigeria Security Organization was to combine the duties of the Federal

Bureau of Investigation (FBI) of the USA which involved counter intelligence activities

and the Central Intelligence Agency (CIA) (Hoffman, 2002). It was headed by a Director-

General who was also a member of the Supreme Military Council and the National

Security and Defence Council. However, as argued by Peters (1986), “the body not only

lacked intelligence specialist, but also lacked clearly defined goals”.

18
KHADIJAH ADENIKE FALABI (NOU167534194)

By 1984, a Directorate of Intelligence was set up in the office of the Chief of Staff. It had

four directors within three years of existence (Odezulu, 2008). Incidentally, within the

same period, the Defence intelligence Agency (DIA) was also set up within the office of

the Minister of Defence. Clearly, from the outset, it showed that a clash of interest was

inescapable and could therefore rob off on efficiency.

By 1986, Decree No. 19 (under Rtd. General Ibrahim Babagida Administration) formally

abolished the NSO and created the National Intelligence Agency (NIA) and the State

Security Service (SSS) (Adebayo, 2011). By virtue of the provisions of this decree, it

meant that the Intelligence Agency had become decentralized.

The State Security Service became saddled with the duty of prevention and detection

within Nigeria of any crime against internal security, protection and preservation of all

non- military classified matters concerning the internal security of Nigeria and such other

responsibilities affecting internal security within the country, including the Armed Forces

Ruling Council or the President, Commander-in-Chief of the Armed Forces as the case

may be, may deem necessary (Unumen, 2014).

Unfortunately, the security challenges that the country has faced since the dawn of the

Twenty-first Century, especially since the upsurge in the terrorist activities of the Boko

Haram sect since 2011, seem to give the impression that the intelligence branch of the

Armed Forces has gone to sleep. This is regrettable because the continuity of killings as

has been experienced in the recent past portends nothing positive hut grave danger to the

Nigeria nation-state.

19
KHADIJAH ADENIKE FALABI (NOU167534194)

Terrorism, no doubt, is a global threat to peace but government must fight it head-long

and this requires political will. Conflicts, where unchecked could lead to threat of

unimaginable dimension as happenings in other climes have shown.

In recent times, commentators on the increased menace of insurgency in the country have

warned against the likelihood of the division of the country, but the President of the

Federal Republic of Nigeria, Dr. Goodluck Ebele Jonathan, has consistently assured the

citizens that insurgency would be brought under control. However, it is important to draw

attention to the time-honoured saying that “Prevention is better than cure”.

This underscores the reason why effort should be more on how to check the act than

reliefs when destructions have been made (Takaya, 2001). In fact, from the analysis of

scholars, three levels of activities that could elicit war are: individual level in which there

is bad decisions by leaders, communication failure and misperceptions; the societal level

in which there is ethno-national challenges and the persistence of anarchy - all of which

are signs of danger ahead of a nation (Nwolise, 2005).

The case of the moribund Yugoslavia seems to fit into the aforesaid three levels of

analysis and thus offers a good lesson for Nigeria to learn from. After the collapse of

communism, Serbian leadership tried to maintain the country’s unity in the face of strong

separatist movements in Slovenia, Croatia and Bosnia-Herzegovina. Slobodan Milosevic

was propelled by Serb nationalism under President Tito.

Individual leaders particularly Serbian leader Slobodan Milosevic, were able to stoke in

the Serb masses, an ultra-nationalism that threatened other groups in the Yugoslav

federation (Sederberg, 2003). It is only hoped that the failure of intelligence agencies to

quickly check

20
KHADIJAH ADENIKE FALABI (NOU167534194)

the activities of insurgents does not plunge the country into similar experience because of

the history of past injustices that may be latent in peoples’ mind.

Mere compensation to victims of terrorist attacks cannot be the antidote to curtailing

insurgency. If it were so, then it means we have to compensate all such persons affected

from the period of independence. This, therefore, means our leaders must get to the root

of the problem and it is the position of this paper that the only way forward is to energize

and restructure our intelligence gathering network.

The importance of an efficient and effective intelligence gathering network cannot be

overemphasized (Idowu, 2008). First, it helps to keep record of events and thereby detect

the likelihood of dangers or indicators of crisis situation and forestall surprises. Second, it

provides vital information on movement, environment and capacities of target groups,

and above all, helps to identify insurgent groups and the need to apply requisite

surveillance and techniques to neutralize insurgent acts.

2.1.5 SECURITY CHALLENGES CONFRONTING NIGERIA STATE

Nigeria is presently faced by severe security challenges. Security outfits in the country

need to be re-energized to address the menace. Some of the security challenges are

discussed thus:

(i) Kidnapping and Hostage Taking

This commenced in the South-south region of Nigeria and it had cut across Niger-Delta

states. Kidnapping and hostage taking are notorious act in Oil rich Niger Delta. Agbode

(2011) argues that it has been used to address wanton neglect of their communities by

successive government. This is why Fayemi (2013) observed, for South-East, kidnapping

and hostage taking are now tools for settling personal and political scores.

21
KHADIJAH ADENIKE FALABI (NOU167534194)

Youths in the region utilized the tools to make huge amount of money as they call the

families of their victims to pay millions of naira for ransom. Politicians equally use it to

deal with their opponents and perceived enemies leaving citizens in fear. Many officials

of multinational oil companies in the region have been victims thereby portraying Nigeria

as no go and unsafe area.

(ii) Hired and Political Assassinations

This is another nefarious security challenge grappling Nigeria State. It is another

dimension to the security crisis that is stretching the country to its limit. A cursory look at

Nigeria democracy since 1999 reveals many unresolved high profile killings. To

exemplify, former Attorney-General and Minister of Justice, Chief Bola Ige was killed on

23rd December, 2002 in his home at Ibadan. This marks the first scenario after the rebirth

of democratic rule.

It is unfortunate that the government has failed to fish out the perpetrators. Dikko,

National Vice Chairman of Peoples Democratic Party [PDP] was murdered in cold blood

while travelling in 2004, Ayo Daramola and Engr. Funso Williams, PDP’s gubernatorial

aspirants in Ekiti and Lagos State were assassinated while Philip Olorunwipe, Kogi State

chairman of State Independent Electoral Commission was killed in 2004 (Nwanegbo &

Odigbo, 2013).

More so, Harry Marshall, the National Vice Chairman of All Nigeria Peoples Party

[ANPP] was also murdered, the former Nigerian Bar Association [NBA] chairman of

Onitsha in Anambra State, Barnabas Igwe, and his wife were gruesomely murdered on

1st September 2002.

22
KHADIJAH ADENIKE FALABI (NOU167534194)

Not quite long, a serving Senator Dantong Daylop and the majority leader of Plateau

House of Assembly, Honourable Gyand Filani were also murdered. Alemika (2013)

observes that wave of assassination is sweeping across the country and the perpetrators

have not been brought to book. Ahmed Pategi, a former PDP chairman of Kwara State

was killed in 2005 while Godwin Agboroko, a former editorial board chairman of This

Day Newspaper was also murdered in December.

From the foregoing, it could be observed that the situation has not been seriously

addressed and the Police has not been able to unmask the killers. Hence, assassination has

posed serious security challenge to successive Nigeria government as there are reports of

more cases of killings for rituals and money purpose.

(iii) Ethno-Religious Violence

Ethno-religious by this paper refers to a situation where relationship between members of

one ethnic or religion group, multiethnic or multi-religious society is characterized by

lack of cordiality, mutual suspicion, fear and a tendency towards violent confrontation

(Salawu, 2010).

Ethnic cum religion violence has always been a troublesome tension facing Nigeria

security. Northern Nigeria States and Plateau state in particular have become the hotbed

of ethnic and religious violence with regular report of maiming and killings of innocent

citizens which informed the emergency rule during Obasanjo led administration.

Religious intolerance has been identified as the prominent causes of ethno-religious crises

and the incidents has been noticeable in Nigeria times without number (Bodunde et al.,

2014).

23
KHADIJAH ADENIKE FALABI (NOU167534194)

Ethnic and religion connections now determine who gets what in Nigeria. Such crises

have occurred in other parts of the country like Shagamu (Ogun State), Lagos, Abia

among others. Salawu is of the opinion that a major cause of present day ethno-religious

conflict in Nigeria has to do with accusation and allegation of neglect, oppression,

dominations, exploitation, victimization, discrimination, marginalization and host of

others (Salawu, 2010).

In recent times, Nigeria National security had been threatening by a religious gang that

believed that western education and culture were forbidden – Boko Haram. This group

has killed many innocent citizens and even security operatives to the extent that Nigeria

Police could not manage the attack which necessitated the involvement of armed forces

which in turn have not be able to subdue the group’s excesses.

The factual fact is that activities of Boko Haram are now international affairs since

terrorist attack on any part of the world is a concern and threat to international

community (Nwanegbo & Odigbo, 2013).

(iv) Smuggling and Trans-Border Crimes

Another big security challenge threatening Nigeria is the smuggling and trans-border

crimes. Smuggling and circulation of contraband goods like small arms and light

weapons, human trafficking, drug trafficking lead to other threats to Nigeria internal

security.

Ngoa opines that these hinder the social and economic development of not only Nigeria

but the continent of Africa (Ngoa, 2012). Smuggling encourages proliferation of arms,

ammunition and compounded criminality in Nigeria.

24
KHADIJAH ADENIKE FALABI (NOU167534194)

Porosity of Nigeria borders instigate smuggling as Nigeria has over one thousand illegal

routes through which aliens from neighbouring country can trek into the country. This

equally informs the high rate of crime and public disorder in Nigeria.

The influx of non – Nigerians and illegal immigrants mixing up with the teaming

unemployed youths in Nigeria calls for Nigeria Immigration Service and Nigeria Custom

Service to double their effort in the course of discharging their statutory duties.

Some Nigeria borders are demarcated with drums and logs of woods which show the state

of our borders. In spite of joint patrol and task force at the borders, security personnel are

not enough to manage both regular and irregular route of entrance into Nigeria state

(Alemika, 2013).

(v) Political Violence

Political violence in Nigeria has aggravated to other aforementioned security challenges

in Nigeria. Political violence could be attached to over – enthusiasm and desperation by

political gladiators to win elections to public office by all means.

Since 1999 when Nigeria returns to civil rule, electoral violence appears to have

presumed a devilish dimension. This had given birth to political assassinations and other

threats to security (Iduh, 2011).

(vi) Armed Attack and Robbery

With the number of security formations put in place by Nigeria Government, there is no

fact to show any remarkable drop in the incidents of armed robbery. Thus, with the

increase in security outfits and private security organizations, cases of armed attack are

on the increase.

25
KHADIJAH ADENIKE FALABI (NOU167534194)

It seems Nigeria security agencies are helpless in the face of rising wave of criminality in

Nigeria. In 2011, in the first half of the year, about 5,000 cases of armed robbery were

recorded, 2700 arrested, 700 killed, 800 assorted weapons recovered from hoodlums

(Abolurin, 2011).

The fact above reveals the wave of the menace. In fact, annual report of National Bureau

of Statistics has proved the trend. The situation now is such that every Nigerians now

reside inside barricaded compound with personal security device or self-employed

guards. There are other challenges like subversion, sabotage and public infrastructure

vandalization and host of others.

This work is an important contribution to the role of intelligence gathering in supporting

security operations, counter insurgency and support peace operations. Thus, this study

will focus on intelligence gathering and security operations in Ipokia.

2.2 THEORETICAL FRAMEWORK

The theoretical framework selected for this study is the Structural Functional Theory. The

foundation for this theory, also called Structural Functionalism, was laid by Emile

Durkheim (Fisher, 2010). The theory focus on the assumption that the society is a single,

interconnected system, each element of which performs a specific function.

The analysis further explains activities in relation to the role they play in keeping a given

system in a proper working order and thus maintain its equilibrium, in other words, every

system is made up of subsystems or part which work for the maintenance of the system

(John, 2008).

According to Gabriel (2001), “a system is comprehensive in the sense that it includes all

the interactions-inputs as well as output”. Functional approach to structures within the

26
KHADIJAH ADENIKE FALABI (NOU167534194)

political system is therefore through their functions. These functions were classified into

input and output. Although the theory provides a comprehensive analytical tool for an

understanding of the role of institutions in a political system.

The theory has been criticized for being unable to account for social change. The theory

has been said to be teleological. In other words, it attempts to describe social institution

solely through their effects and does not explain causes of these effects.

Despite these criticisms, the theory still has significant relevance to the understanding of

the role, structure and functions of political institutions in political systems. The theory is

relevant to this study by virtue of its theoretical construct that emphasize on the analysis

of the functions of institutions.

By identifying and understanding the functions of these institutions in a political system,

it enables one to be able to understand the positive roles they play in the maintenance of

social order and control.

The theory will therefore give a better understanding of the role and function of the

intelligence arm of the state, in gathering relevant intelligence to assist the state in taking

informed decisions at both the strategic and operational levels with regards to the need to

undertake security operations in Nigeria.

2.3 EMPIRICAL STUDY/WORKS DONE BY DIFFERENT AUTHORS

Phenson et al. (2014), in a descriptive investigation to analyze the problems besetting

Nigerian state from harnessing the critical or essential elements of security in achieving

the nation’s stability and integration concluded that the Nigerian Government which has

the sole statutory mandate to manage state security has not effectively harnessed the

critical essentials of security to achieve the stability and integration of the country.

27
KHADIJAH ADENIKE FALABI (NOU167534194)

The work therefore recommends that Nigerian leaders should holistically address and

utilize the essential elements of security in ensuring the stability and integration of the

Nigerian Federation by effectively organizing, planning, funding, controlling, directing

and integrating technical elements with human, and material resources towards achieving

the stability and integration of the Nigerian state.

A quantitative study carried out by Ngboawaji (2013) to examine Nigeria’s grapple with

the problem of threats to her internal security revealed that intelligence management has

not impacted positively on security activities in Nigeria. This is because the impact of

intelligence has not been significant for many reasons.

The study further affirmed that the intelligence community lacked the requisite

technological platform to back security operations. The research identified some

challenges which include; lack of funding, lack of real time intelligence, lack of analytical

skill, lack of ICT facilities and absence of technical collection means.

To mitigate these challenges, the study suggested the need to ensure that the intelligence

management enterprise in Nigeria should be able to provide adequate funding to acquire

other technical collection systems to effectively support operations in the country.

Uchenna, et al. (2018) studied the impact of ICT on national security applying a

hypothetic deductive methodology (quantitative approach). The study researched the

security operations of the NSCDC and pointed at the crucial role ICT plays in the security

of any nation. The outcome of the research suggests from all indications, that ICT has

tremendous impacts on security and fight against cybercrime.

Oghi and Unumen (2014) examined the challenge of security in Nigeria in the twenty-

first century and the role that military intelligence can play in combating it.

28
KHADIJAH ADENIKE FALABI (NOU167534194)
Adopted the

29
KHADIJAH ADENIKE FALABI (NOU167534194)

historical method of analysis and interpretation of data the study opined that the failure of

military intelligence is largely responsible for the current state of quagmire of national

security in the country.

Consequently, the paper recommends a restructuring of Nigeria’s military intelligence to

make them more proactive and effective as well as collaboration with the locals in each

community as ways out of the current national security quagmire.

30
KHADIJAH ADENIKE FALABI (NOU167534194)

CHAPTER THREE

RESEARCH METHODOLOGY

3.1 INTRODUCTION

This chapter discusses the research methods used for data collection and analysis, the

framework and the underlying techniques and assumptions that were made in collecting

and analyzing the data for the study are provided, as well as information that explains

how the research was conducted.

3.2 RESEARCH DESIGN

The research design for the study is Survey Research Design. It will be conducted using

the Quantitative data adopted for the study, and the method involves the use of

questionnaire.

This study involves the collection of data through open-ended and closed-ended. The

closed-ended questions will be based on a customized Likert scale, and a customized

rating scale in the questionnaire.

The open-ended questions will discuss the views of selected participants for the questions

based on their understanding of the concepts under study. The quantitative approach will

support simple computations of data collected on various concepts that are researched.

3.3 RESEARCH INSTRUMENT

Questionnaire is the main instrument used in this research. The first part of the

questionnaire includes open-ended questions. Open ended questions will be useful for this

research because they will support the collection of data and give participants the

opportunity to express their opinions on different questions posed to them.

31
KHADIJAH ADENIKE FALABI (NOU167534194)

The questions will be based on the main research objectives and the research questions

which seek to establish the intelligence gathering efforts of the NSCDC and the ways

insecurity challenges are managed among other concepts. 30 NSCDC personnel will be

selected randomly to participate in this part of the questionnaire.

The second part of the questionnaire will have closed-ended questions, and these will

support the collection of statistical data on the issue under study. This part of the

questionnaire will have a Likert scale.

The Likert scale will require participants to choose answer options that best represent

their thoughts. The customized Likert scale will have five options including strongly

disagree, disagree, neutral, agree, and strongly agree. These options will outline the

extents to which participants agree or disagree with the statements that relate to the

intelligence gathering efforts of NSCDC.

The final part of the questionnaire will have a rating scale. The scale will represent: 1-

Low, 2-Medium, 3-High. The rating scale will have the different types of security

challenges faced in Ipokia local government for rating and these include: kidnapping,

ethnicity, religion, cyber-crime, cultism, armed robbery, raping, ritual killings and

lawlessness.

The questionnaire supports collecting extensive data at once. This constitutes the main

reason for its selection. It will allow the researcher to collect data with ease and within a

short time.

The closed-ended questionnaire will be administered to the members of public of Ipokia

local government, from 18 years and above, selected for the research. Descriptive

statistics, such as percentages and frequencies will be employed to measure the

demographic characteristics of the respondents.


32
KHADIJAH ADENIKE FALABI (NOU167534194)

3.4 POPULATION OF THE STUDY

There are two groups that will take part in the study. One of the groups that will take part

in the study comprises members of the public from 18 years and above, who are citizens

of Nigeria, who have lived most part of their lives in Ipokia local government and are still

residents thereof.

According to city-facts, the population of Ipokia local government in 2015 was 216,658.

Thus, the civilian sample respondents for this study will be extracted from this figure.

The sample will represent the male and female residents of the local government under

review aged 18 years and above.

The second group of participants will constitute personnel of NSCDC. The number of

officers selected for participation will be 30.

The participants will be required to have served in the NSCDC for at least 5 years and

with minimum rank of the Assistant Superintendent Officer Cadre in order for them to be

well positioned to give valued opinions about intelligence gathering and security

challenges in Nigeria.

3.5 SAMPLE SIZE SELECTION/SAMPLING TECHNIQUE

Sampling is the procedure for drawing sample from a population. The aim is to have an

understanding of some attributes of the entire population based on the sample

characteristics (Asika, 2009).

The 2015 population (216,658) of Ipokia local government is large, thus making the need

for sampling necessary. The sample is determined using the formula given below:

33
KHADIJAH ADENIKE FALABI (NOU167534194)

𝑁
𝑛=
1 + 𝑁(𝑒2)

Where: n = sample size

N = total population size

e = sample error/level of significance (0.05)

Thus, the sample size is computed as follow:

𝑛= 216,658
1 + 216,658(0.052)

216,658
𝑛=
542.645

𝑛 = 399.26

𝑛  399

The sample size shall be 399 respondents who represent the members of public of Ipokia

local government, Ogun State. In other words, 399 closed-ended questionnaires will be

administered to 399 members of public of the area under study.

In order to get the desired participants, random sampling will be used. Random sampling

was selected because it reduces bias. Random sampling will be conducted in order to

select participants from the lists that will be generated through call outs for volunteering

from the public.

For the open-ended questionnaire part, the researcher will find participants among the

NSCDC personnel and use those found to get referrals to more participants. All

volunteers will be enlisted after which random sampling will be used to select the desired

number (30) of participants for the research.

34
KHADIJAH ADENIKE FALABI (NOU167534194)

3.6 INSTRUMENTATION

After the participants are identified, they will be requested to provide their phone

numbers, and their email addresses. Email is cheap, and it uses less time.

The researcher will start the process of data collection in the research with the survey

questionnaires, which will be sent to the participants. The researcher will send all

questionnaires via the email addresses provided and phone calls will be made to each

participant to inform them that the questionnaires have been sent to them.

The questionnaires sent to the participants will have accompanied messages informing

them of the duration within which they should fill them up and send them back to the

researcher.

The same will also be communicated through the phone calls made to the participants.

They will be given two weeks to find time to fill in the questionnaire after which they will

send them back to the researcher.

The researcher will also review previous literature on intelligence gathering and security

challenges faced in Nigeria. The review will support a synthesis of information and an

analogy of information about the intelligence gathering programs of security agencies in

Nigeria.

Review of literature will focus on gathering information about the historical and current

manifestations of intelligence gathering and security challenges in the identified study

area and issues that influence it. This will reinforce first hand data that are collected for

the report.

35
KHADIJAH ADENIKE FALABI (NOU167534194)

3.7 DATA ANALYSIS

The first method of data analysis will be coding. Coding involves arranging information

into themes that are relevant to answering the research questions. The researcher will

utilize open coding, which will be used to ensure that there is adequate room for the

formation of new themes, throughout the data analysis process.

Open coding is flexible in that it allows researchers to analyze data with the possibility of

changing topics and adding new topics as they complete the analysis process. This data

analysis method will be used mainly to analyze the open-ended data that will be

collected.

The second method of data analysis will involve conducting simple computations of the

quantitative data that will be collected through the customized Likert scale, and the

customized rating scale in the questionnaire.

To derive useful meaning from the data, and examine the propositions of the study,

descriptive statistics, such as percentages and frequencies will be employed to measure

the demographic characteristics of the respondents and using the Statistical Package for

Social Sciences (SPSS) 21.0., Simple Regression and Pearson Product-Moment

Correlation will be used to test the formulated hypotheses.

3.8 LIMITATIONS OF THE STUDY

The researcher has attempted to come up with a research whose results are admissible and

applicable to the selected context, but even so, there are some limitations to the study.

The first limitation of the study lies in the selected participants.

The research will involve a total of 429 participants, and though the number is feasible

for the study, it limits the transferability of the results. The views they hold may not be

36
KHADIJAH ADENIKE FALABI (NOU167534194)
transferable to the whole Nigerian population.

37
KHADIJAH ADENIKE FALABI (NOU167534194)

The second limitation lies in the subjectivity that is related to open-ended data. Open-

ended data mainly involves the collection of opinionated information. The participants

may very well give opinions that do not necessarily represent what they truly think.

In other words, there is a chance that the data collected does not fully represent what the

participants think. There is also a chance of subjectivity with regard to data analysis

because this is another weakness of open-ended data.

These limitations, however, do not mean that the research should be dismissed. With

regard to the participants, there is always a limit to the extent to which the results of any

research can be transferred/are externally valid. In order to increase the chances of getting

objective responses, the researcher opted to use follow up interviews which will support

the collection of reinforcing data. Furthermore, the collection of quantitative data

counters the effect of subjectivity that may arise in the analysis of open-ended data.

38
KHADIJAH ADENIKE FALABI (NOU167534194)

CHAPTER FOUR

DATA PRESENTATION AND ANALYSIS

4.1 INTRODUCTION

This chapter is concerned with the detailed analysis of the data collected from the

questionnaire used for the study and the responses given to the questions designed for the

analysis. The objective of this chapter is to analyze, present and interpret the data

obtained with the aid of questionnaires and use them to answer the research questions

already stated in the previous chapters.

The data analysis is based on the returned questionnaires and responses gathered from the

field work. Specifically, three hundred and ninety-nine (399) copies of closed-ended

questionnaire were administered to members of the public of the area under study.

From the closed-ended questionnaires administered, three hundred and sixty-six 366,

representing ninety-two percent (92%), were completed and returned.

Also, thrirty (30) closed-ended questionnaires were administered to the personnel of the

NSCDC to gather their opinions about intelligence gathering efforts of the agency and the

challenges it faced in tackling insecurity in the Ipokia area of Ogun State. Personnel

questioned were from the rank of Assistance Superintendent Cadre and above.

39
KHADIJAH ADENIKE FALABI (NOU167534194)

4.1.1 RESPONSES FROM OPEN-ENDED QUESTIONNAIRES

ADMINISTERED TO THE NSCDC PERSONNEL

Personnel Ranking Number Percentage


Assistance Superintendent Cadre II (Level 8) 16 53.3

Assistant Superintendent Cadre I (Level 9) 6 20

Deputy Superintendent Cadre (Level 10) 4 13.3

Superintendent Cadre (Level 11) 3 10

Chief Superintendent (Level 12) 1 3.3

Total 30 100

Source: Field Survey, 2021

4.1.2 DATA PRESENTATION

 Understanding of Intelligence gathering and Insecurity

Data was collected on several concepts that are linked to the main research questions on

which the research is based. To establish a solid base for the findings, the researcher

sought to establish what the respondents understood ‘intelligence gathering’ and

‘insecurity’ to mean.

There were diverse opinions, but to a greater extent, the participants understood

intelligence gathering to mean procurement of adequate information, and insecurity to

mean the presence of threats, and the occurrence of events that threaten or take people’s

lives, and instill fear in them.

40
KHADIJAH ADENIKE FALABI (NOU167534194)

The question was open and therefore, the participants used it as an opportunity to give

examples of what they thought constituted intelligence gathering and insecurity. Their

descriptions of insecurity included certain words and phrases including “high chances of

harm to people and property”, “smuggling”, “oil bunkering”, “kidnapping”, “robbery”

among other phrases.

Out of all these, ‘smuggling’ and ‘oil bunkering’ were the most reoccurring answers

mentioned by the participants. Instances of kidnapping and cyber-crime were also

mentioned by the participants, in their understanding of insecurity.

Besides what may be termed as insecurity issues, some of the participants also mentioned

other aspects of insecurity such as touting and cultism which may have smaller magnitude

of effects.

 Causes of Insecurity

Part of the interview targeted what the participants thought were the causes of insecurity

in the area under study. One of the causes of insecurity that was highly mentioned by the

participants was poverty.

From the responses that were collected from the participants, it is clear that they thought

people engaged in activities that lead to insecurity because, it benefited them financially.

This was deduced from the statements which they made. For example, these statements

were extracted from their responses, they stated “people engaged in smuggling to make

money”, “since the government doesn’t care for the people of the area they have to learn

to survive”, “oil bunkering is a lucrative business due to the closeness to the nation’s

border”.

41
KHADIJAH ADENIKE FALABI (NOU167534194)

These statements among many more that were recorded allude to the causes of insecurity.

Moreover, some participants linked insecurity to unemployment, and this is explained

below.

There are those who stated that, there are too many youths who are unemployed and as

such, they turn to crime as an avenue to make money, and also, as part of spending idle

time.

These are some of the statements that were picked from their responses: “when intelligent

youths are unemployed they may decide to use their intelligence to plan and commit

crime”. These are some of the statements that clearly articulated the stated connection.

The participants also mentioned poor intelligence gathering to combat insecurity. The

participants mentioned poor management of security issues by the government. They

stated that the government has not strengthened the NSCDC enough to ensure proper

gathering of intelligence to foster peace and security in the area.

There are also, those who felt that the NSCDC is not internally structured, and therefore,

lack the ability to function appropriately. These are some of the statements that were

gotten from the collected responses. They stated that; “the government is not committed

to fighting criminals and ensuring the security of the people”, “some politicians fund oil

bunkers and smugglers to perpetrate these crimes”, “some government officials are

corrupt and they support activities that increase insecurity”, “the NSCDC does not have

the equipment to support their intelligence gathering operations”.

This alludes to the presence of poor structures that do not fully support enforcement of

the law and eradication of insecurity.

42
KHADIJAH ADENIKE FALABI (NOU167534194)

 Roles of NSCDC in ensuring security

The participants were asked to explain what they thought was the role of the NSCDC in

ensuring security. The respondents in this case outlined several things which they thought

the NSCDC should do to ensure security in the area under study. Some of the roles

extracted from the responses are stated as follow:

(i) Regular training of personnel to keep them up-to-date with intelligence

gathering processes

(ii) Cooperation between the NSCDC and the public in the prompt notification of

criminal activities and reporting insecurity cases they are privy to

(iii) Proper motivation of the NSCDC personnel to encourage them in their crime-

fighting activities

(iv) NSCDC officers should be committed to fighting crime and not give room to

corruption

(v) Provision of proper intelligence gathering instrument to aid the agency’s

operations

 Intelligence gathering effect on current security situation

Asked whether they believe intelligence gathering has any effect on the current situation

in the Ipokia, the respondents explained that the extreme crime that undermine security

agencies, especially NSCDC, is as a result of poor intelligence gathering.

Some claimed that only the Armed Forces which consist of the Army, the Navy and their

Air Force are given priority by government on intelligence gathering. They pointed out

that

43
KHADIJAH ADENIKE FALABI (NOU167534194)

the civil security agencies which are majorly tasked with the internal security are always

left out in the intelligence gathering efforts.

Most time, the military refuses to share intelligence with other civil security agencies

arguing that they are classified information.

 Challenges faced by the NSCDC in maintaining security

The participants were also asked what they thought were the major challenges faced by

the NSCDC in their fight against insecurity. The participants mentioned several

challenges, but the main responses were lack of equipment, poor training, and minimal

support from the public. Lack of equipment was the most reoccurring response cited by

the participants who are senior officer of the NSCDC.

They stated that sometimes the NSCDC are not well equipped with requisite knowledge

to analyze information in their possession about certain imminent crime, and this

undermine their ability to act proactively in tackling the crime.

In relation to lack of equipment, the security officers claimed that inadequate equipment

like communication gadget, information technology savvy personnel, inadequate service

vehicles and other security tools make the agency lag in its security operations.

Another challenge mentioned was that members of the public sometimes withhold crucial

information that could assist in fighting insecurity. They stated that members of the public

hold on to information about oil bunkering, smuggling, cyber-crime, and other criminal

acts. People do not always report suspicious activities until it is too late.

The security personnel expressed great concern on the ability of the NSCDC to tackle

current security challenges due to the reasons mentioned above and believe the

44
KHADIJAH ADENIKE FALABI (NOU167534194)
government

45
KHADIJAH ADENIKE FALABI (NOU167534194)

can improve the ability of the security agency with proper motivation, encouragement and

provision of necessary infrastructure required to combat insecurity in the area of study

and Nigeria as a whole.

They were confident that the security operations of the NSCDC will be highly enhanced

if all proper provisions are made to improve the intelligence gathering efforts of the

agency.

 What should be done to improve security

The participants stated many things, which they thought should be done, and these

include; equipping the NSCDC, recruiting more personnel, improving punishment

systems for criminals who pose security threats, promoting collaboration between the

NSCDC and the public, fighting corruption, improving the management of resources,

increasing job opportunities for the public, and reducing poverty level in the area.

 Does intelligence gathering effort of the NSCDC’s enhance its security

operations

Almost all of the NSCDC personnel questioned were confident that if provided proper

equipment and motivation and structure, the NSCDC will be better positioned to tackle

the internal insecurity and ensure adequate protection of the people and public property in

the locality.

46
KHADIJAH ADENIKE FALABI (NOU167534194)

4.2 RESPONSES FROM CLOSED-ENDED QUESTIONNAIRES

ADMINISTERED TO THE MEMBERS OF PUBLIC OF IPOKIA LOCAL

GOVERNMENT

4.2.1 DATA PRESENTATION

Table 1: Sex Distribution of Respondents

Frequency Percent Cumulative


Percent
Male 194 53.0 53.0
Valid Female 172 47.0 100.0
Total 366 100.0
Source: Field Survey, 2021

The table above shows that 53% of the respondents are male while 47% are female. This

indicates that there are more male respondents than female.

Table 2: Age Distribution of Respondents

Frequency Percent Cumulative


Percent
18-20 years 51 14 14
21-40 years 175 48 62
Valid 41-50 years 103 28 90
51-Above 37 10 100
Total 366 100
Source: Field Survey, 2021

47
KHADIJAH ADENIKE FALABI (NOU167534194)

The table above shows that 14% of the respondents are between 18 and 20 years of age,

48% are 21-40 years of age, 28% are 41-50 years while 10% are 51 years of age and

above. This shows that the sampled population is relatively young.

Table 3: Educational Qualification

Frequency Percent Cumulative


Percent
WASSCE/WAEC 92 25.4 25.4
NCE/OND 68 18.5 43.9
HND/BSc 130 35.4 79.2
Valid
MBA/MSc 45 12.3 91.5
Others 31 8.5 100.0
Total 366 100.0
Source: Field Survey, 2021

The table above shows that 25.4% of the respondents have WASSCE/WAEC

qualification, 18.5% have NCE/OND qualification, 35.4% possess HND/BSc degrees,

12.3% have MBA/MSc qualification, while 8.5% have other qualifications. This indicates

that the sample selected for this study is educated and able to answer the research

questions.

Table 4: Marital Status

Frequency Percent Cumulative


Percent
Single 139 38.0 38.0
Married 198 54.0 92.0
Valid
Divorced/Separated 29 8.0 100.0
Total 366 100.0
Source: Field Survey, 2021
48
KHADIJAH ADENIKE FALABI (NOU167534194)

The table above shows that 38% of the respondents are single, 54% are married while 8%

are divorced/separated. This indicates that there are more married respondents than single

and divorced respondents.

Table 5: The NSCDC is doing everything they can to overcome the

security challenges in Ipokia

Frequency Percent Cumulative


Percent
Disagree 110 30 30
Slightly Disagree 40 11 41
Neutral 84 23 64
Valid
Slightly Agree 73 20 84
Agree 59 16 100
Total 366 100
Source: Field Survey, 2021

From the table above, the higher proportion of the respondents do not agree to the

statement. This indicates people’s distrust in the ability of the security outfit to overcome

security challenges in the area.

Table 6: The security challenges in Ipokia have minimal influence on people’s


lives
Frequency Percent Cumulative
Percent
Disagree 267 73 73
Slightly Disagree 66 18 91
Valid
Slightly Agree 33 9 100
Total 366 100
Source: Field Survey, 2021

49
KHADIJAH ADENIKE FALABI (NOU167534194)

The table above shows that 73% of the respondents believe the security challenges in the

area adversely affect their livelihood. This shows that without adequate security the

people of the local government are living in fear of all forms of violence and open to

security risks that abound in the area.

Table 7: NSCDC personnel are well-trained and professionally address security

issues

Frequency Percent Cumulative


Percent
Disagree 260 71 71
Neutral 70 19 90
Valid
Agree 36 10 100
Total 366 100
Source: Field Survey, 2021

The table above shows that the majority of respondents representing 71% never agreed

that NSCDC personnel are well-trained to combat insecurity. They indicated that the

personnel do not address security issues professionally.

50
KHADIJAH ADENIKE FALABI (NOU167534194)

Table 8: The public is highly cooperative with the NSCDC in eliminating security

challenges in Ipokia

Frequency Percent Cumulative


Percent
Disagree 112 31 31
Slightly Disagree 42 11 42
Neutral 53 14 56
Valid
Slightly Agree 50 14 70
Agree 109 30 100
Total 366 100
Source: Field Survey, 2021

The table above shows very little difference between those that agreed and those that

disagreed with this statement. This shows that the respondents really did not take a clear

stand. The implication of this is that there should be more cooperation between the

NSCDC and the public over intelligence sharing between them.

Table 9: The NSCDC is not well equipped to tackle insecurity

Frequency Percent Cumulative


Percent
Disagree 29 8 8
Slightly Disagree 10 3 11
Neutral 10 3 14
Valid
Slightly Agree 150 41 55
Agree 167 45 100
Total 366 100
Source: Field Survey, 2021

51
KHADIJAH ADENIKE FALABI (NOU167534194)

The table above shows that a higher proportion of the respondents agree that the NSCDC

is not well equipped to tackle insecurity. The lack of adequate equipment to gather

intelligence will undermine the effectiveness of the NSCDC in their fight against

insecurity thus losing public trust.

Table 10: Information gathering is important to NSCDC’s operation.

Frequency Percent Cumulative


Percent
Disagree 51 14 14
Slightly Agree 18 5 19
Neutral 40 11 30
Valid
Slightly Agree 93 25 55
Agree 164 45 100
Total 366 100
Source: Field Survey, 2021

In the table 10 above the higher proportion of the respondents agree that information

gathering is important to the operation of the NSCDC.

Table 11: Combating insecurity can be achieved greatly with adequate intelligence

gathering.

Frequency Percent Cumulative


Percent
Disagree 50 14 14
Neutral 66 18 32
Valid
Agree 250 68 100
Total 366 100
Source: Field Survey, 2021

52
KHADIJAH ADENIKE FALABI (NOU167534194)

The table above shows that the majority of the respondents agree to the statement that

adequate intelligence gathering will make combating insecurity achievable by the

NSCDC. This means that the NSCDC will be more effective in tackling insecurity with

adequate intelligence.

Table 12: NSCDC’s expertise in intelligence utilization is a cause for concern.

Frequency Percent Cumulative


Percent
Disagree 100 27 27
Neutral 20 6 33
Valid
Agree 246 67 100
Total 366 100
Source: Field Survey, 2021

The table above shows 67% of the respondents agree that NSCDC’s expertise in

intelligence is a cause for concern. This is implying that the NSCDC personnel lack the

necessary knowledge to gather intelligence and effectively applied intelligence gathered.

Table 13: Improving intelligence gathering system would improve the

security situation in Ipokia

Frequency Percent Cumulative


Percent
Disagree 60 16 16
Neutral 40 11 27
Valid
Agree 266 73 100
Total 266 100
Source: Field Survey, 2021

53
KHADIJAH ADENIKE FALABI (NOU167534194)

The table above shows that the majority of the respondents agree that improving

intelligence gathering system would improve security situation. This implies that more

training is required for the NSCDC personnel to enhance their skills in intelligence

gathering.

Table 14: NSCDC personnel lack the requisite intelligence know-how to tackle

insecurity.

Frequency Percent Cumulative


Percent
Disagree 121 33 33
Slightly Disagree 20 6 39
Neutral 5 1 40
Valid
Slightly Agree 61 17 57
Agree 159 43 100
Total 366 100
Source: Field Survey, 2021

The table above shows that about 60% of the respondents believe that personnel of the

NSCDC lack the requisite intelligence know-how to tackle insecurity. This lack of know-

how will undermine the effectiveness of the NSCDC in their combat against insecurity.

4.3 TEST OF HYPOTHESES

4.3.1 TEST OF HYPOTHESIS I

H0: There is no relationship between intelligence gathering and the operations of

NSCDC.

54
KHADIJAH ADENIKE FALABI (NOU167534194)

H1: There is a significant relationship between intelligence gathering and the

operations of NSCDC.

Table 16: Descriptive Statistics

Intelligence NSCDC operations


Gathering
Pearson Correlation 1 .235**
Intelligence Gathering Sig. (2-tailed) .000
N 366 366
Pearson Correlation .235** 1
NSCDC operations Sig. (2-tailed) .000
N 366 366
**. Correlation is significant at the 0.01 level (2-tailed).

In table 16 above, the Pearson’s product moment correlation coefficient (0.235**)

suggests that there is a significant and positive relationship between the independent

variable: intelligence gathering and the dependent variable: NSCDC operations at 0.01

level of significance.

This outcome implies that improvement in intelligence gathering will enhance the

operations of the NSCDC in their fight against insecurity in the Ipokia area of Ogun

State. This positive relationship therefore suggests the rejection of the null hypothesis

which purported that there is no relationship between intelligence gathering and the

operations of NSCDC.

This rejection of the null hypothesis implies the acceptance of the alternative hypothesis

which support the claim that intelligence gathering has significant impact on the

operations of the Nigerian Security and Civil Defence Corps.

55
KHADIJAH ADENIKE FALABI (NOU167534194)

4.3.2 TEST OF HYPOTHESIS II

H0: Intelligence gathering does not have any impact on the operations of the NSCDC.

H1: Intelligence gathering has significant impact on the operations of the NSCDC.

Table 17a: Regression Analysis of Intelligence gathering and NSCDC’s operations

Model Summary

Model R R Square Adjusted R Square Std. Error of the Estimate

1 .381 .145 .143 .931

a. Predictor: (Constant), Intelligence gathering

b. Dependent Variable: NSCDC’s operations

Table 17b: Coefficients

Model Unstandardized Standardized T Sig.


Coefficients Coefficients
B Std. Error Beta
(Constant) 2.402 .190 12.611 .000
1 Intelligence
.361 .049 .381 7.426 .000
gathering
Dependent Variable: NSCDC’s operations p < 0.05

The results of the Regression Analysis of the relationship between the dependent

variable: intelligence gathering and the independent variable: NSCDC’s operations are

shown in table 17.

It can be inferred from the model that intelligence gathering has an impact on the

operations of the Nigerian Security and Civil Defence Corps. This is evidenced by the

0.361 parameter of intelligence gathering in the coefficient table 17b. Since p-value of

56
KHADIJAH ADENIKE FALABI (NOU167534194)
0.000 is less than the

57
KHADIJAH ADENIKE FALABI (NOU167534194)

decision criterion of 0.05, there is a statistically significant relationship between the

variables at 95 percent confidence level.

Therefore, the null hypothesis which purported that intelligence gathering does not have

any impact on the operations of the NSCDC is rejected.

Thus, the alternative hypothesis that intelligence gathering has significant impact on the

operations of the NSCDC is accepted.

4.4 INSECURITY CHALLENGES

Table 15: Findings from the rating scale

Security challenge LOW MEDIUM HIGH


1. Illegal oil bunkering 77 36 253
2. Smuggling 52 71 243
3. Ritual killing 66 130 170
4. Kidnapping 79 125 162
5. Cyber crime 72 145 149
6. Robbery 132 90 144
7. Touting 179 106 81
8. Cultism 201 109 56
9. Ethnicity 295 21 50
10. Religion 300 45 21

Source: Field Study, 2021

Table 15 above shows the ranking of the various security challenges in Nigeria. The

respondents were required to indicate the seriousness of each challenge listed in the

above, and the result shows that six of the challenges mentioned in the table ranked high

in the area under study.

58
KHADIJAH ADENIKE FALABI (NOU167534194)

The security challenges ranked highest are: Kidnapping, Cyber-crime, Robbery,

Smuggling, Ritual killings and Illegal oil bunkering.

Due to its closeness to the border, Ipokia has a high prevalence of illegal oil bunkering

and smuggling as supported by 253 (69%) and 243 (66%) out of the respondents

respectively. The other challenges also rated as highly prevalent by different percentages

of participants are: Ritual killings, 243 (66%), Kidnapping, 162 (44%), Cyber-crime, 149

(41%), and Robbery, 144 (39%). The other challenges, according to the respondents, pose

little threat to the local government of study.

59
KHADIJAH ADENIKE FALABI (NOU167534194)

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 SUMMARY

This study is centered on an in-depth examination and analysis of the issues and prospect

of intelligence gathering and security operations of the NSCDC in Ipokia local

government of Ogun State. The research work identifies the different ills associated with

intelligence gathering and security operations and their impact on the operational level.

The results of the research show that the study area has a multitude of security challenges

with which it grapples. While the questionnaire was limited to certain challenges

including; Oil bunkering, Smuggling, Kidnapping, Touting, Cybercrime and Corruption,

there were other challenges that were mentioned to include; robbery, cultism, and ritual

killing.

The findings of the study show a high prevalence of security challenges, because, no

single crime out of those outlined, was outlined by the participants as being non-

prevalent.

The study goes further to stress the need and ways to provide the NSCDC with adequate

support and security control or management so as to fend off all manners of crime which,

in the end, will have catastrophic consequences for security.

Each of the security challenges captured in the literature review was cited by the

participants as low, medium or high, and this is indicative of the need for comprehensive

plans to overcome the stated challenges.

Going by the discussion on different security challenges, it is clear that security


60
KHADIJAH ADENIKE FALABI (NOU167534194)
challenges in Ipokia local government are not being addressed optimally.

61
KHADIJAH ADENIKE FALABI (NOU167534194)

5.2 FINDINGS

The broad objective of the study was to evaluate how intelligence gathering could aid the

security operations of the NSCDC in Ipokia local government of Ogun State. The study

established that intelligence gathering was necessary for all operations of the NSCDC.

The study also revealed that the effectiveness of the intelligence gathering was

constrained by a number of factors; these include poor intelligence gathering to combat

insecurity, poor intelligence gathering infrastructure, poor structure within the NSCDC,

lack of cooperation by the public in the prompt alert over criminalities in the study area,

amongst others.

The ability of intelligence gathering to effectively support security operations of the

NSCDC was adversely affected by its inability to provide real intelligence as well as its

lack of analytical skills. The prospect of intelligence gathering effectively supporting

security operations would be dependent on it successfully enhancing intelligence

collection.

Also, finding from the study highlighted some security challenges that highly undermine

the security operations of the NSCDC. Out of the ones mentioned, Illegal oil bunkering,

Smuggling, Ritual killing, Kidnapping, Cyber-crime and Robbery were said to have high

rate of effect on the security operations of the NSCDC.

Other challenges like Touting, Religious violence, Ethnic clash and Religion recorded

low challenge rate on the agency’s security operations.

The study listed the roles of NSCDC in ensuring security in the study area to include:

cooperating with members of the public in the provision of prompt notification of

criminalities to the security agency; NSCDC’s commitment to crime fighting and


62
KHADIJAH ADENIKE FALABI (NOU167534194)
shunning

63
KHADIJAH ADENIKE FALABI (NOU167534194)

corruption; having adequate intelligence gathering expertise to support security

operations in the local government; regular training of NSCDC personnel to ensure they

are up-to- date with recent intelligence activities and tackle insecurity in a proactive way.

The public opinion on the activities of the NSCDC in the Ipokia area of Ogun State was

that of reservation. Findings from the study established the following based on the

responses of the public to the research questions:

- The majority of participants expressed distrust in the activities of the NSCDC in

overcoming the security challenges in Ipokia.

- Another finding showed that lack of job opportunity and high level of poverty in

Ipokia government played a significant role in insecurity in the area.

- There is palpable fear in the atmosphere, due to the high vulnerability level due to

the unchecked activities of the smugglers, oil bunkers, kidnappers and other

security risks in the area. The people claimed that this high security risks adversely

affected their livelihood.

- The public believed that the NSCDC lacks adequate infrastructure to tackle

insecurity in the local government under study.

- It was further suggested by the public that adequate infrastructure will highly

enhance the ability of the NSCDC and also improve the expertise of its personnel

in intelligence gathering. The current poor expertise of the personnel is a cause for

concern for the people of the local government.

- Furthermore, finding from the analysis established a positive relationship between

intelligence gathering and the operations of the NSCDC, implying that improving

intelligence gathering efforts of the security agency will improve the operation of

the NSCDC in their fight against insecurity in the study area.

64
KHADIJAH ADENIKE FALABI (NOU167534194)

5.3 RECOMMENDATION

Going by the findings of this study, the following recommendations are made:

 The NSCDC personnel require adequate training on the intelligence gathering

process so as to provide adequate security.

 The government should procure technical intelligence gathering equipment system

for the NSCDC to support the agency’s security operations.

 There was palpable fear in the environment which need to be alleviated by beefing

up the security operations of the NSCDC in the local government area. This

implies the proper provision of necessary motivation for the personnel of the

security agency to ensure their commitment to the fight against insecurity in the

study area.

 The government should engage the public in productive activities that will ensure

income generation to cater for themselves and their families. This will

significantly enable the people of the area to shun violence, insecurity activities

and crime.

 The public should also be encouraged to share information that are critical to the

successful security operations of NSCDC in the and to contain criminal activities.

Thus, the agency must build trust with the public and vice versa.

 Oil bunkering, kidnapping and smuggling are the major criminal activities that are

carried out in the study area due to its proximity to the nation’s border. From the

finding, the NSCDC is not well equipped to tackle these menaces. The agency

must invest in the regular training of its personnel and equip them with necessary

intelligence gathering tools to quickly and easily identify where criminalities are

being committed in order to nip them in the bud.

65
KHADIJAH ADENIKE FALABI (NOU167534194)

5.4 CONCLUSION

Consequently, in order for intelligence gathering to effectively aid security operations of

the NSCDC, the study found that the agency needs to adopt strategies that would ensure

the provision of real time intelligence and adequate analytical skills while the necessary

facilities, integrated communication system and technical intelligence collection systems

are to be put in place.

This would require a systematic approach of gradual procurement of the necessary

intelligence infrastructure through deliberate and dedicated budgetary allocation over a

period of time.

5.5 RECOMMENDATIONS FOR FURTHER STUDIES

This study does not cover all area to be evaluated regarding the intelligence gathering and

security challenges, mainly because it is still an ongoing challenge and new issues are

surfacing with limited literatures on them. As the situation develops, there will be a need

for additional research; hence this study proposes the use for further studies on:

 Security challenges in Nigeria.

 The Role of Security agents in ensuring security.

66
KHADIJAH ADENIKE FALABI (NOU167534194)

REFERENCE

Abolurin, A. (2011). Para-military agencies and the promotion of good governance for
national security in Nigeria, in Ade Abolurin [ed] Nigeria’s national security:
Issues and challenges. John Archers Publishers.

Adebayo, A. (2008). Managerial and operational skills for modern security practice.
Institute of Security of Nigeria.

Adebayo, F. (February, 2011). The world’s most dangerous places. Tell Weekly, 46.

Afolabi, M. B. (2014), “Internal security and Nigeria’s institutional security


infrastructure: A performance assessment of the Nigeria Security and Civil
Defence Corps”. An Unpublished Monograph.

Agbode P. A. U. (2011). Poverty, national resources and public policy in Nigeria. Jetta
Press Ltd.

Alemika, L. O. E (2013). Intelligence led policing and internal security: The imperative
to community partnership in National Security: Intelligence and Community
Partnership Approach. Lawlords Publications.

Asika, N. (2009). Research methodology in the behavioural science. Longman Nigeria Plc.

Bodunde, D. O., Ola, A. A. & Afolabi, M. B. (2014). Internal insecurity in Nigeria, the
irony of multiplicity of security outfits and security challenges. International
Journal of Research in Humanities, Arts and Literature, 2(5), 2347–4564.

City-facts (2015). Ipokia Population. https:// https://www.city-facts.com/ipokia

Enahoro, D. (2010). “National Security Strategy: Options”. Lecture delivered to the


National Defence College Course 18 Participants, Abuja, January.

Fayemi, K. (2013), “Towards a comprehensive National security strategy”. A paper


presented at Nigerian Institute of Policy and Strategic Studies [NIPSS], Kuru,
Plateau State, Nigeria.

Ferris, B. (1998). Security a new framework for analysis. Lynne Rienner Publishers.

67
KHADIJAH ADENIKE FALABI (NOU167534194)

Ferris, J., & Handel, M. (1995). Clausewitz, intelligence, uncertainty and the art of
command in Military operations. Intelligence and National Security 10(2), 1–58.

Fisher, J. R. (2010). System theory and structural functionalism. In John T. Ishiyama and
Mzrijke Breuning (2018). 21st Century Political Science: A reference book (ed).
Sage.

Flavius-Cristian, M., & Andreea, C. (2013). The role of intelligence in the fight against
terror. European Scientific Journal, 9(2), 1–11.

Freedman, L. (2005). A Theory of Battle or a Theory of War? The Journal of Strategic


Studies, 28(3), 425–435.

Gabriel, A. (2001). Modern political theory. Vikas Publishing House, PVT Limited.

Githens, D., & Hughbank, R. (2010). Intelligence and Its Role in Protecting Against
Terrorism. Journal of Strategic Security, 3(1), 31–38.

Handel, M. (1990). Intelligence and Military operations. Frank Cass and Company
Limited.

Herman, M. (1996). Intelligence power in peace and war. Cambridge Univ. Press.

Iduh, S. (2011). The challenges to peace in Nigeria. Journal of Vocational and Technical
Education, 3(8).

Idowu, A. O. (2008). “Meeting the challenges of low intensity conflicts in Nigeria: The
role of the National Intelligence Agency”. AFCSC.

Ilogho, A. (2006). “The Activities of Joint Task Force Operation Restore Hope”. Being
Brief for Chief of Defence Staff, Warri, September 6.

Imobighe, T. (2003). Nigeria’s defence and national security linkage. Heinemann


Educational Books Nigeria plc.

Jackson, P. & Scott, L. (2004). Understanding intelligence in the twenty first century.
Routledge.

68
KHADIJAH ADENIKE FALABI (NOU167534194)

Jackson, P. & Scott, L. (2004). Understanding Intelligence in the Twenty First Century.
Routledge.

John, R. (2005). Intelligence and strategy: selected essays. Routledge.

Lowenthal, M. M. (2000). From Secrets to Policy. CQ Press.

Lowenthal, M. M. (2009). From Secrets to Policy (4th Edition). CQ Press.

Mroz, J. E. (1991). Beyond security, private perceptions between Arabs and Israelis.
International Peace Academy.

Ngboawaji, D. N. (2013). An analysis of intelligence support to security operations in


Nigeria: A review of some Joint Task Force operations. Peace and Security
Review, 5(9), 1–23.

Ngoa, S. (2012). “The mass media and national security dilemma of balancing the
doctrine of the public to know and magnifying the propaganda of terrorist group”.
A Paper Presented at Abuja Summit.

NSCDC (2014). Information and Communication Technology Unit.


http://www.nscdc.gov.ng/index.php/unitss/ict.

Nwanegbo, C. J. & Odigbo, J. (2013). Security and national development in Nigeria: The
threat of Boko Haram. International Journal of Humanities and Social Sciences,
3(4).

Odezulu, I. N. (2008). “Crises Management”. Being a paper presented at Personnel


Training Scheme (PTS), Enugu.

Ofongo, O. A. (2018). Intelligence and management of Boko Haram terrorism in Nigeria


(Unpublished Master’s thesis). University of Manitoba, Canada.

Oghi, F. E. & Unumen, J. O. (2014). Military Intelligence and the Challenge of National
Security in Contemporary Nigeria. International Journal of Research in
Humanities and Social Studies, 1(2), 7–13.

Peters, J. (1986). Intelligence: its role and future in Nigeria’s external relations. Nigerian
Journal of International Affairs, 12(1 & 2), 152.

69
KHADIJAH ADENIKE FALABI (NOU167534194)

Phenson, U. A., Ojie, P. A., Esin, O. & Atai, A. J. (2014). Essential elements of security
and their applications in ensuring stability and integration of Nigeria. Journal of
Research & Method in Education, 4(4), 1–14.

Salawu, B. (2010). Ethno-religious conflicts in Nigeria: Casual analysis and proposal for
new management strategies. European Journal of Social Sciences, 13(3).

Sederberg, P. C. (2003). Global Terrorism: problems of challenge and response, in W.


Kegley (ed.), The new global terrorism: characteristics, causes and controls.
Prentice Hall.

Uchenna, C. P., Chukwuemeka, O. & Ckukwuka, O. (2018). The Impact of ICT on


National Security: A Case of Nigeria Security and Civil Defence Corps.
International and Public Affairs, 2(3), 48–61.

Ufot, A. P., Peter, A. O., John, O. E. & Aniette, J. A. (2014). Essential elements of
security and their applications in ensuring stability and integration of Nigeria.
IOSR Journal of Research & Method in Education, 4(4), 1–14.

Unumen, J. O. (2014). Boko Haram Movement in Nigeria and its implication for national
security, in U. M. Nwankwo, C. I. Anaere, J. M., O. A Ayuba, and L. Olurode
(eds.), Towards Peace, Security and Sustainable Development in Africa. IT
Educational Publishers.

70

You might also like