The Development of the J9: An Operational Level Directorate for Stability and Security Operations for the Military

2007 ◽  
Author(s):  
Richard C. Sheffe
2020 ◽  
pp. 123-153
Author(s):  
Muhammad Maigari Abdullahi ◽  
Usman Ahmad Karofi ◽  
Uthman Abdullahi Abdul-Quadir ◽  
Ibrahim Arafat

This article identifies different operational codenames adopted by the Nigerian military in special domestic operations from 1966-2019 and examined whether the operations were executed in line with the codenames. In Nigeria, the military has an established tradition of codenaming special operations, in both internal and foreign missions. Since 1966, the Nigerian military has been involved in internal security management and codenamed all the operations using both English and local language names. The aftermath of the first military coup d'état on 15th January 1966, was the beginning of military involvement in domestic security operations in addition to their constitutional responsibility of defending the territorial integrity of the country. The Effect Perspective (TEP) is adopted as the theoretical framework which gives proper nuance to the study. Methodologically, data were elicited through in-depth interviews. The findings explain why several military operations have failed to achieve the objectives of their codenames. It concludes that there is no correlation between the operational codenames and their outcomes of special military operations in Nigeria because the desired results of restoring peace have not been achieved within the specific time frame given when they were launched. The paper concludes that the majority of special military operations launched in Nigeria failed below expectations and unable to restore peace in their country in line with the operational codenames as a result of factors identified in the study.


2020 ◽  
pp. 247-270
Author(s):  
Brian Holden Reid

This chapter details how the year 1864 allowed William T. Sherman to operate for the first time not as a subordinate commander but as director of a series of armies in the field. His contribution to overall Union strategy would be significant and thus he began to exercise command at the level military analysts currently refer to as the operational level of war. Such a level links tactics and methods of fighting with strategy, in the overall scheme. It defines the manner in which armies organize in discrete campaigns and seek to fulfill the object of strategy by winning victories. Sherman’s performance overall needs to be considered by taking all aspects into account. As he began to work at the higher levels of the military art, he began to change the way in which people think and talk about war, and he propounded an individual philosophy of war. The higher he progressed, the more Sherman could not avoid confronting the harsh realities of political life, for his campaigns increasingly had an impact not just on American political discourse but indeed in 1864 on the outcome of the presidential election. Sherman expressed clear-cut political views and expounded them perhaps too forcefully. This complex mix worked as a catalyst in developing his ideas about war and his ability to put them into practice.


2020 ◽  
Vol 26 (3) ◽  
pp. 39-42
Author(s):  
Mihaela Anamaria Bostan-Pop ◽  
Romana Oancea

AbstractConsidering that the level of cyber threats is constantly increasing, a necessary demand emerges from organizations and corporations worldwide to protect their networks against possible cyber-attacks. In the future all malicious actions that occur in cyberspace will continue to alter the way we approach the security of an entire network. The article presents the most stringent need concerning the technical specialization of future officers, highlighting the knowledge entailed in order to better understand the complexity of a mission that takes place in virtual space. Undoubtedly, modern battlefield incorporates a virtual component where nearly all weapons systems rely upon information and communication technologies in order to connect and achieve operational level. The demand for future cyber defence specialists in the military domain reached a high level all over the world, and there will be a challenging process to be able to create a highly skilled workforce to fight against a large scale of malicious activities that have impact upon the national security system.


Author(s):  
R.J. May

Before Papua New Guinea’s independence in 1975, its military consisted of a Pacific Island Regiment under the Australian Army’s Northern Command. In preparation for independence, there was considerable debate over whether the independent country should have a military force. Provision was made for the Papua New Guinea Defence Force (PNGDF) in the constitution, with a strong emphasis on the supremacy of the civilian authority. In the first decade of independence, the PNGDF was called out to assist police in internal security operations, but the priority of its role in internal security was not officially recognized until 1991. The deployment of the PNGDF to Bougainville to assist police in operations against what became the separatist Bougainville Revolutionary Army involved a heavy commitment of troops to a long-running conflict and was marked by a number of confrontations between the military and political leaders. This culminated in the Sandline affair, in which the PNGDF commander stepped in to terminate a contract between the government and the military consultants Sandline International and called on the prime minister to resign (but did not attempt to take over the government). After the Sandline affair and with the Bougainville Peace Agreement, relations between government and military improved, but several incidents involving PNGDF personnel led Prime Minister Morauta to speak of a “culture of instability” within the PNGDF and to invite a review by a Commonwealth Eminent Persons Group. Confrontations between the military and government, however, have consistently stopped short of attempted coup. The most plausible explanation for this may lie in the localized, competitive, and fractious nature of political power in Papua New Guinea, the absence of a dominant ethnic group, and the difficulties that even a legitimate, elected government has in maintaining law and order and service delivery across the country.


2020 ◽  
Vol 47 (1) ◽  
pp. 177-200
Author(s):  
Segun Joshua ◽  
Daniel Gberevbie ◽  
Kester Onor

Since independence on October 1, 1960, Nigeria has been a victim, at one time or the other, of intra-ethnic, inter-ethnic, religious, and communal conflicts which have undermined the human security of her citizens. Nigeria’s corporate existence had also been threatened by 3 years (1967–1970) civil war which impacted negatively on the well-being of its people. In addition, the inability of the Nigerian Police to cope with the magnitude of the surge of violence in recent years has brought about the idea of involving the military, a core component of traditional security apparatus to deal with internal insecurity. This article is anchored on human security paradigm with reliance on secondary data to analyze the operations of the Nigerian Military in counterviolence campaigns between 1999 and 2017. This article points out that the involvement of the military in internal security has worsened the problem of insecurity due to the military’s unprofessional approach and, at times, deliberate targeting the civilian populace which it is supposed to protect. It, therefore, recommends among others, the need for the Federal Government of Nigeria to urgently review the role of the armed forces in addressing internal security situations in a way that will bring about respect for the rule of engagement in internal security operations and adherence to global best practices.


2014 ◽  
Vol 18 (3-4) ◽  
pp. 236-255 ◽  
Author(s):  
Keokam Kraisoraphong ◽  
Brendan Howe

This paper traces experiences of the Royal Thai Armed Forces in un peacekeeping missions. A relatively small troop contributor at first, Thailand later took a high-profile role in the un operations in East Timor during 1999–2005, and has continued since then to support several un peacekeeping forces. The paper first discusses the rationales, development, and current status of Thailand’s contributions. It then goes on to explore how, and to what extent, tasks and duties assigned under the un peacekeeping framework to the dispatched forces, as well as experiences and lessons the Thai armed forces gained from their participation in missions, contribute to the diffusion of norms and the development of functional competencies relating to peacekeeping and human security protection within the Thai military. The paper finds that while the dispatched forces received invaluable benefits in terms of prestige, economic rewards and learning experiences from the peacekeeping operations under the un command, including approaches to humanitarian assistance during the time of acute conflict and monitoring human rights violations, the human security norm underlying these functional competencies has yet to be fully internalized by the military as an institution. Yet, there are some areas, especially in civil-military affairs where competencies developed from the internal security operations and international peacekeeping operations can be mutually reinforcing.


2021 ◽  
Vol 38 (1) ◽  
pp. 132-136
Author(s):  
U. Yahaya ◽  
M. Akram ◽  
R.I. Abdullahi ◽  
B.O. Adaaja ◽  
G. Otiwa ◽  
...  

The knowledge of biotechnology plays an important role in the development of biological weapons. Biological weapons are considered an attractive factor in war for several reasons: ease of manufacture, low cost, confirmed injury, increased number of victims, large losses incurred by other countries. Biological weapons detection methods are among the most important means of military defense. Biological sensors are used in early detection of weapons. Biotechnology is of paramount importance in all fields of medicine, engineering, agriculture, industry, as well as military life. The key applications of biotechnology in the military are in the areas of sensor systems and systems for protection from espionage. Among the most important countries that have applied knowledge of bioweapons technology into their security system are the USA and China. Despite the enormous advantages of biotechnology, it has negative effects in biological weapon production. Therefore, the near future will witness a tremendous boom in biotechnology. DNA profiling also plays an important role in detection of crime. The overall aim of the review is to emphasize the importance of biotechnology towards solving bioterrorism and other forms of security challenges in an environment.


Significance Increased gas production has encouraged Egyptian firms to seek out new partnerships. The main developers of Israel's Leviathan and Tamar gas fields and an Egyptian firm are finalising a scheme to buy a majority stake in the company that owns the controversial pipeline connecting Israel and Egypt. The purchase, expected to be completed within the coming weeks, would unlock a 15-billion-dollar deal to export Israeli gas to Egypt over ten years and move Egypt one step closer to becoming a regional energy hub. Impacts The gas deal and recent energy liberalisation measures will further concentrate power in the hands of the military-backed government. International firms looking to capitalise on lucrative gas opportunities will share profits with military-led authorities. The partnership will strengthen ties between Egypt and Israel, which are already cooperating on security operations in the Sinai Peninsula. The government will control any popular opposition to the deal.


Subject Bukele and congress. Significance Salvadoran troops on February 9 occupied the Legislative Assembly at the invitation of President Nayib Bukele. The occupation was intended as a high-profile stunt to pressure legislators into approving Bukele’s request for extra security funding. In reality, it revived memories of the country’s brutal civil war, sparking domestic and international criticism, undermining Bukele’s domestic and international image and probably bringing his honeymoon period to an abrupt end. Impacts The military is now less likely to take part in large-scale security operations given concerns raised by its visible presence. Bukele’s new anti-corruption body is set to receive less funding and powers via congressional grant. Bukele will maintain his antagonistic stance ahead of the 2021 elections, where he hopes to boost his party’s legislative presence.


Sign in / Sign up

Export Citation Format

Share Document