The Failed State-Organized Crime-Terrorism Nexus: The cases of Boko Haram and Al- Qaeda in the...

40
The Failed State-Organized Crime-Terrorism Nexus: The cases of Boko Haram and Al- Qaeda in the Islamic Maghreb Lord Akporh Sowah Department of Political Science, University of Alberta, 10-16 Henry Marshall Tory Building, T6G 2H4. Canada or 184-10333 121 St. Nw, Edmonton, AB T5N 1L1, Canada. E-mail: [email protected]. Tel: 780-265-5493. Abstract The West African region has raised controversies on the international political platform. As organized crimes create security threats globally, the collaboration between terrorists and organized criminality make the situation worse. Several authors present theories explaining why terrorism takes place, as well as why terrorists collaborate with criminals in carrying out certain activities. These theories explain the crime-terror nexus between organized criminality and terrorism. This paper discusses the issue of failed state, and Transnational Organized Crime in the terrorism nexus. The theories discussed in the paper include the structural causes; diffusion of terrorism; terrorism can creep through the boundaries of neighboring countries, and crime-terror intersections; the collaboration between terrorists and criminals to carry out coordinated attacks. Further, the paper addresses the possible modalities of convergence between terrorism and organized criminality by drawing from confluence; when terrorist activities are similar to those of organized criminality (kidnapping, theft, forgery, drug trafficking, and extortion for protection), transformation or hybrid blending, and cooperation with criminal gangs. The paper cites Boko Haram and Al-Qaeda in the Islamic Maghreb (AQIM) as notable cases that provide meaning for all the three modalities of convergence. Finally, the paper concludes by highlighting some key policy recommendations and overall concluding remarks. Introduction Brief Overview Multiple security threats and dilemmas continue to draw challenges for several West African countries (Abrahms, 2008). Globally, organized crime and terrorism are two forms of crime that poses major threats to human security. In most cases, transnational organized crime impedes economic, social, democratic, and cultural developments on a global level, with 1

Transcript of The Failed State-Organized Crime-Terrorism Nexus: The cases of Boko Haram and Al- Qaeda in the...

The Failed State-Organized Crime-Terrorism Nexus: The cases of Boko Haram and Al-Qaeda in the Islamic Maghreb

Lord Akporh Sowah

Department of Political Science, University of Alberta, 10-16 Henry Marshall Tory Building, T6G 2H4. Canada or 184-10333 121 St. Nw, Edmonton, AB T5N 1L1, Canada. E-mail:

[email protected]. Tel: 780-265-5493.

Abstract

The West African region has raised controversies on the international political platform. As organized crimes create security threats globally, the collaboration between terrorists and organized criminality make the situation worse. Several authors present theories explaining why terrorism takes place, as well as why terrorists collaborate with criminals in carrying out certain activities. These theories explain the crime-terror nexus between organized criminality and terrorism. This paper discusses the issue of failed state, and Transnational Organized Crime in the terrorism nexus. The theories discussed in the paper include the structural causes; diffusion of terrorism; terrorism can creep through the boundaries of neighboring countries, and crime-terror intersections; the collaboration between terrorists and criminals to carry out coordinated attacks. Further, the paper addresses the possible modalities of convergence between terrorism and organized criminality by drawing from confluence; when terrorist activities are similar to those of organized criminality (kidnapping, theft, forgery, drug trafficking, and extortion for protection), transformation or hybrid blending, and cooperation with criminal gangs. The paper cites Boko Haram and Al-Qaeda in the Islamic Maghreb (AQIM) as notable cases that provide meaning for all the three modalities of convergence. Finally, the paper concludes by highlighting some key policy recommendations and overall concluding remarks.

Introduction

Brief Overview

Multiple security threats and dilemmas continue to draw challenges for several West

African countries (Abrahms, 2008). Globally, organized crime and terrorism are two forms of

crime that poses major threats to human security. In most cases, transnational organized crime

impedes economic, social, democratic, and cultural developments on a global level, with ! 1

disproportionate influence on developing ‘fragile’ states. With global threats and international

security, fragile states are struggling to fulfill the fundamental political, social, economic, and

security functions that account for a sovereign statehood. The state functions include: (a)

preservation of monopoly regarding the use of armed force, (b) maintaining legitimate and

effective accountable government institutions to protect the rights of its citizens, (c) creating a

regulatory and legal environment suitable for the private sector’s activities, and (d) meeting the

population’s social welfare needs. The basic assumptions concerning sovereignty and statehood

are absent in several West African countries, which creates an opportunistic partnership between

extremist groups, terrorists, and other aspects of state apparatuses (Angjeli, 2003). As a

consequent, the challenges and threats arising from transnational organized crime in Africa as a

whole, and particularly West Africa, are enormous due to the high presence of fragile countries

acting as potential breeding areas for criminal activities. Transnational organized crime in West

Africa takes the form of certain activities including diamond smuggling, human trafficking,

cigarette smuggling, forgery, trafficking in firearms, and illegal manufacture of firearms, armed

robbery, and oil smuggling.

Organized Crimes and Terrorism

The intersection of terrorism and organized crime takes different forms. First, the

alliances between terrorist and criminal groups, or secondly, through direct engagement by

terrorists in crime and criminals in terrorist activities. One of the strongest links in organized

crime-terrorism nexus is crime as the funding source for terrorism (Barnett, 2013). Decline or

failure for states to sponsor terrorist organizations after the Cold War, and additional measures to

! 2

curb terrorism financing have pushed terrorist organizations to seek new sources of funding. At

the same time, the ever-increasing mobility, rapid innovations in communications and

globalization of world markets have created new opportunities for massive profits through illicit

deals. Currently, statistics places the total illicit trade’s volume at between 7% and 10% of the

world’s economy, with the production and trafficking of drugs remaining the market leader.

Crime-for-cash by extreme terrorist groups is not new (Barnett, 2014). However, experts raise

questions as to whether long-term strategic alliances, given the fundamental differences in

motives and aims, could be the long-lasting solutions to these unruly activities. In the real sense,

terrorists pursue a political agenda; while on the other hand, criminals do not intend to change

the political status quo (unless it threatens their working environment), but to push their profits to

the maximum. Arguably, decentralizing terrorist organizations leads to autonomous cells, which

facilitate cooperation and ideologies of terrorist leaders avoiding association with criminal

groups. Nevertheless, it is the belief of experts that criminal groups and terrorists create in-house

capacities for terror/crime than opting for alliances with organizations that are already operating

in those realms (Berrebi, 2012).

Failed States and Terrorism

Several phenomena lead to the subsumed ‘failed state’ label. Critics insist that rankings

and indexes based on aggregated scores regarding different areas of state performance (e.g.

governance, security, service delivery, and economics) pool states that have disparate features.

Additionally, experts have also noted the urgency to differentiate between the willingness, and

ability of the government in delivering these mandates (Cox, 2004). West Africa countries top

! 3

the rankings of the failed-state category as they face substantially different challenges; from

illegitimate governments to the total lack of state authority or post-conflict recovery to current

civil strife. Other factors influencing the territory’s conduciveness to the presence of terrorism

include availability of income sources, adequacy of operational access and infrastructure,

favorable social and demographic characteristics, and invisibility (e.g. the ability to blend into

the entire population).

Organized Crime and Failed States

Some factors such as adequacy of infrastructure and invisibility are relevant for organized

crimes, but business opportunities (including the global market) play the overriding

considerations (Crenshaw, 1987). Linking organized crime to a specific location is somewhat

misleading since illicit streams flow through a series of countries (usually ends in rich countries

whose consumers are the main profit providers). Nevertheless, geographies of the illicit flows

prove that failed states can act as excellent environments for specific organized crimes, but not

all. The porous borders and weak state structures are relevant for trafficking of human beings and

drugs or smuggling of minerals. On the other hand, cyber-crime requires more reliable

infrastructure.

While there is a clear correlation between failed states and organized crime, the direction

of causality remains questionable. According to Crenshaw (1981), sharing of illicit streams in the

overall economy is larger than in the rich states; this means that profits from illicit activities are

larger than government budgets and salaries; government officials are more susceptible to

corruption. The state-structure infiltration by organized crime groups, as well as the corruption

! 4

by political elites, the law enforcement, the judiciary, and other large governmental bodies

protect organized crime from persecution, and thus securing the future influence—definitely to

preserve the perfect working conditions for these groups (Crenshaw, 1987). With such intrusion

of unimaginable measures, there are chances of post-conflict or weak states that prevent the

establishment of a stable governance structure. These measures also undermine international

stabilization and efforts to build states through peace and crisis-response operations.

Crime-Terror Nexus

Crime-Terror nexus is a concept that refers to grouping two different actors that have

distinct identities, methods, and tools, which can also go overly rigid for practical purposes

(Eastman, 2002). Following the United Nations Convention on Transnational Organized Crime, a

group must have the following characteristics to perform organized crime. (a) must consist of at

least three people in collaboration, (b) the members must gather for a considerable or indefinite

period, (c) must be convicts or suspects in serious criminal offences, and (d) must have

objectives in pursuing profit and power. Terrorism is conducting premeditated violence and

threats of violence from the members of an organized group whose intention is attempting to

influence political behavior. The notion on terrorism differs from other political violence, that is,

different from ‘paramilitary’, which consists of groups that maintain violent capacities, and yet

not part of the state and private enterprises responsible for provision of various services.

The nature difference between both groups (political for terrorists, more entrepreneurial

for criminals) is the basis for skepticism, as stated in Gurr (1968), and Forest (2012), which has

raised serious scholarly debates. The immediate post-Cold War influence provides both players

! 5

with more access to financial global markets and technological advancements, as well as with

increased civil wars and weak states. Although traditionally different, the rise in transnational

level of organized crimes of the 1990s, and the ever-changing nature of terrorist activities are the

major contributors to the blurred difference between criminal and politically motivated violence.

Such evanescence of the traditional limits is the current predominant character of the nexus

(Hassan, 1996). It includes one side of the flexible interactions between separate entities, and

another side of multilayered implications, which can cultivate on a regional and global level.

This paper seeks to address “The Failed State-Transnational Organized Crime-Terrorism

Nexus” by basing its arguments on the cases of the “Boko Haram” and “Al-Qaeda” in the

Islamic Maghreb. The theoretical review of the paper will include the concepts of failed states,

terrorism, and transnational organized crime. The theories in this paper include the structural

causes, diffusion of terrorism, and crime-terror intersections. The paper will also provide the

arguments for the possible modalities of convergence drawing on scholarly and documentary

evidence, as well as the contexts perpetuating them. The notable cases of convergence will

include Boko Haram and the Al-Qaeda in the Islamic Maghreb (AQIM). Finally, the paper will

address several counter measures or policy recommendations coupled with a precise conclusion.

Part 1: Theoretical Review/Conceptual Explanations

Structural Causes

In 1981, Martha Crenshaw pointed out a theoretical approach to comprehending the

causes of terrorism. Believing that terrorists are rational individuals, Crenshaw (1981) suggested

that terrorism activities rise in an environment with dissatisfied and discontented minority groups

! 6

who lack opportunities for participating in political matters. West African states consisted of

many different religions and ethnicities. Additionally, democracy is a fragile issue in the region,

with countless instances of political power consolidated in the power of one entity. Through such

trends, it is easy to find dissatisfied political, religious, and ethnic minorities. Crenshaw

reinforces her arguments by offering terrorism as a rational strategy for people whose wish is to

challenge the authority of the state, especially since it appears as a relatively inexpensive choice

(Heyman & Mickolus, 1980). Nevertheless, she further explains that analysts could never have

anticipated the rise of Boko Haram of Nigeria as a violent threat to the nation’s wellbeing.

Although, changing the structure of the government with Jonathan Goodluck’s sudden

presidency has been cited as a potential account for reviving the Boko Haram sect; several other

West African countries have maintained consistent behavior on their political status for the past

twenty years.

The other common account for the rising trend of terrorism is economic deprivation. For

example, Ted Gurr (1968) in “A causal Model of Strife” links economic disparity with the

predisposition of the individuals to fall back on violent political actions. On the contrary, studies

such as the ones by Makarenko (2004) demonstrate that these links between terrorism and

economic development are weak. Considerably, the evidence is conflicting, and thus

inconclusive. In his book on “Africa and the War on Terrorism,” Ridley (2008) mentions the

general explanations regarding the emergence of terrorism. Several other contributors to that

academic volume cite external and internal indices as potential reasons for the rise of terror in the

West African region: highly corrupted states that are unable to govern effectively, a Wahhabi

focus on historical African successions, authoritative regimes, etc…

! 7

To be specific, Ted Dagne believes there are internal indicators illustrating why the

continent will play a big role on the war-on-terror menace. Dagne emphasizes that official

corruption and abject poverty make many African states very attractive destinations for terrorist

groups (Heyman & Mickolus, 1980). This is a possible explanation that the list for causes of

terrorism in West Africa is very long. A blend of these causes could exist in the region, but with

disparate intensity in varying times and places. Forest (2012) alludes to some of the challenges

on Boko Haram, which creates a complex security territory in Nigeria. These challenges include

radical Islam and high unemployment, which have continuously challenged the state’s authority

on combating opposition. However, none of these factors would answer completely or directly

the causal effects of extreme terrorism in these regions.

Embarking on a more regional approach, Ridley (2008) indicates that West African

dynamics are in a way that internal threats override external ones. This means that West Africa’s

territory risks developing terrorist activities as a response to the internal pressure regarding

‘failed’ states, and increased extremism amongst the Muslim population compared to the

perforation of exogenous terrorist organizations from elsewhere. All these notable causes lie

under the structural category, which posits the causes of terrorist activities emanate from the

environment, and the cultural, economic, political, and social structures of the society (Heyman

& Mickolus, 1980).

Other scholars argue that terrorist groups can win over members for causes that are not

political. For instance, Abrahms (2008) refutes Crenshaw’s (1981) framework, which asserts that

terrorists are rational individuals who attack the innocent for political ends. Contrarily, Abrahms

(2008) finds out that terrorist actor s participate in these organizations not to accomplish their

! 8

official goals, but to undergo social solidarity with other actors. To Ross’s (1993) model, it

happens that the most important fulfillment is ‘condition of communion’ and ‘sense of solidarity’

present in the social collectivity. With recognized despaired youth and high unemployment, it is

possible that the levels of terrorist activities in West Africa’s region experiences high

membership rates. Barnett’s (2013) model emphasizes on the fact that these organizations will

try to survive regardless of whether their actions compromise official goals. Crenshaw (1981)

further discusses that understanding the basic internal organizational processes followed by

terrorists is very crucial for policy because their activities do not necessarily reflect ideological

values. By learning the trends used by these authors, it is true that the bond on social networks

greatly affects the participation in terrorism, as well as their survival, success, and flexibility of

their organizations. For the West African community, these arguments carry a lot of weight since

tribal and family ties are of great value.

Diffusion of Terrorism

Other bodies of literature emphasize the chances of external penetration by terrorists into

a new region. For instance, Crenshaw and Midlarsky (1997) emphasize on the contagion

processes. In one country, terrorists’ activities lead to imitation of the same activities in another

country, and emergence of terrorists from experience of the existing groups in the neighboring

countries. Thus, a simple mechanism of diffusion explains terrorism in West African states,

especially after 2001 (9/11). Additionally, globalization assists diffusion of terrorism. Humphrey

(2004) argues that the three major processes have introduced dilemma in Africa. The three

processes include (a) decline in globalization benefits accruing in Africa, (b) globalization of

! 9

Islam, and (c) dissemination of information across the entire continent. They insist on the

importance of globalization in Islam, as well access to increased technology, which they connect

to transporting such ideas (Ross, 1993). These arguments are not only plausible, but also

illustrate their claims by indicating that globalization facilitates spread of Al-Qaeda activities in

West Africa. They also insist there were known Al-Qaeda operatives in Nigeria and Niger

regions before 2001. They point out that Al-Qaeda’s historical financial ties link to terror

financing networks in Liberia, Sierra Leone, and the Democratic Republic of Congo.

In contrast, Heyman and Mickolous (1980) caution against over-relying on this argument

and emphasize that many no-contagious channels can factor the spread of terrorism. So far, this

section has described the socio-economic, political, and religious causes of terrorism.

Nevertheless, none of the possible arguments stands out above each other. Simply put, many of

the arguments apply to the West African case. Demonstrating indigenous causes is somewhat

difficult for the West African region. While it is probable that people in West Africa starting

fusing into terrorism because of an affiliation with the desire or the message for membership

within specific communities. A quick survey by Nigeria-US (2010) reveals that terrorism in West

African countries attracts vast sums of funding. This leads to the connection between terrorist

organizations masterminding political and criminal operations.

The relationship is not new within the scope of academic scholarship. Actually, Shelley

and Picarelli (2002) claims that there is an existence of a conceptual framework where one can

study terrorism as a crime since in many occurrences, terrorists participate in activities whose

motives of crime are political, but the act itself is viewed as criminal. A perfect example is the

kidnapping operations on the Western targets carried out by AQIM and other terrorists groups in

! 10

West African countries and the Sahel. However, not every financial industry whereby Boko

Haram and AQIM become involved is necessarily political. For example, Boko Haram is

connected to bank robberies in major Nigerian cities, which makes these activities purely

criminal.

Crime-Terror Intersections

While debates are still on regarding the level of cooperation between terrorist

organizations and criminal groups, it is agreed upon that progressively terrorists and their

affiliates rely on criminal enterprises to fund their operations. Shelley and Picarelli (2005)

connect terrorists and criminal organizations through their many similarities. They note that both

the groups are rational actors, produce victims, use similar tactics (kidnapping and

assassinations), and both groups are criminalized through ruling and always stand in opposition

to the state. In addition, both groups operate secretly, although sometimes publicly in friendly

territories. Thus, the available literature regarding organized crime will assist in understanding

the operations of terrorist groups in the financial arena.

Berrebi (2012) agrees that terrorism and organized crime are connected. Terrorism

financing and money laundering could be seen as distinctive activities as they vary in the way

their actors wish to utilize their financial gizmo to disguise their money, but the author further

claims that the difference is useless since the issue is to point out the processing of illegal funds

to reach the organizations beneath the funds. Further, he refers to mutual benefits arising from

convergent interests (Cox, 2004). The author clearly points out that, criminal organizations

benefit from the terrorists’ ability and guerilla organizations to create damage, while the latter,

! 11

however, benefit from the financing, which criminal activities obtain from them. The author also

mentions the fact that accumulating huge amounts of wealth is a challenge to the stability of the

state.

Schmid (1996) further provides a framework for analyzing those terrorist organizations

whose financial benefits are criminal: if terrorist organizations can undergo serious analysis like

the criminal organizations, we can assume that the two have similar behaviors. If it is generally

agreed upon that criminals focus on profit, then we can conclude that terrorists engage in profit-

making crime. Hassan (1996) references Boko Haram’s extensive finances, which are tied to

criminal activities in Nigerian Diaspora members. If there is a logical study on the Boko Haram

of Nigeria, then what would be the implications thereafter? Moreover, such questions are too big

a theoretical leap, as some terrorist funding experts disagree vehemently with the premise that

terrorist and criminal organizations qualify for the same classification.

The debate thus materializes between the two schools of thought: the traditional category

of scholars, and the upcoming literature on the new overlook of Transnational Organized Crime.

The former class argues that although criminal and terrorist organizations can lie on the same

spectrum, their respective grounds are at opposite extremities with each other (Heyman &

Mickolus, 1980). Contrarily, the latter class argues that underground organizations are

progressively merging criminal activities with terrorism, and thus the changing nature of the

threat the two poses to states.

Arguing on a different ground, Wilson (2009) distinguishes between criminal and

terrorist organizations using their motives. The author argues that at the heart of a criminal group

is the preoccupation with profit generation and maximization, while terrorist organizations are

! 12

interested in bringing political changes. In his view, it would be biased to analyze the two groups

in the same manner. Ridley (2008) adds to the difference between the different views of the

groups on motivation by claiming criminals partaking organized crime focus on pure profits, and

seek optimal business environments. According to Ridley, organized crime is not interested in

destruction of the state. On the contrary, terrorists challenge the state directly—by either regime

destruction or attempting political inclusion or competing with the state through their own social

services. In addition, Ridley further states that terrorist organizations are much less

discriminating concerning those victimized by their activities as compared to organized crime.

Napoleoni (2004) on “The New Economy of Terror” agrees with the distinction between

these two groups. She furthers her argument by articulating that both organizations view money

on different perspectives. The author claims that criminal organizations operate their activities

similarly to private corporations, with profit accumulation as the ultimate goal (Abrahms, 2008).

Contrastingly, terrorist organizations’ interest is in money disbursement, other than laundering; to

them, money is not to be accumulated, rather spread within their network to support their

operations. As such, criminal activities, as well as legitimate businesses and illegal profits

represent just one of the ways used by terrorists to finance themselves.

John Picarelli and Louis Shelley of the “Transnational Crime and Corruption Center”

look into the concept of criminal for operating costs, separate funding sources, and non-criminal

sources for their operational activities. For terrorists, their operational funds for their missions

less likely come from criminal activities for the fear of jumbling operational nodes with criminal

activities, which may bring the unwanted attention of law enforcement, thereby jeopardizing

their missions. Other obstacles and challenges facing terrorist organizations engagements in

! 13

criminal activities include skill levels required for participation; greater skills have high

probabilities of exposure to intelligence agencies and law enforcement authorities (Angjeli,

2003). In addition, collaboration with less committed financiers could endanger their

organizations. Picarelli further argues that this could bring double tragedy; raising the funds

through criminal actions could not only raise the attention of the law enforcement authorities, but

also bring increased risk to their cause. Following a more hierarchical structure, the probable

vulnerabilities may affect them both ways. From the terrorists’ perspective, a less ideological

committed contributor may not care about the source of the money, and thus be less bothered by

taking part in theft, drug trafficking, or even prostitution. Still, from the terrorists’ perspective,

the financiers can take part in the “dirty work” while the leadership continues with their

ideologically pure persona (Barnett, 2013).

The importance connected to religious beliefs leads to the crime-terror nexus. There is no

single organized crime formed around the adherence of ideological doctrines, while groups such

as Al-Qaeda and Boko Haram are essentially based on religious motivations. Actually, both these

groups have discredited the corruption of secular leaders (Barnett, 2014). Thus, there is difficulty

in the arrangement between benefiting from financial operations and maintaining ideological

credibility.

Part II: Possible Modalities of Convergence

Overview

Since the Cold War ended, the rising trend of transnational organized crime

organizations, as well as the changing nature of terrorist organizations is the source of new

! 14

opportunities to withstand their common enemies by collaborating. Makarenko (2004) and

Dishman (2005) point out that the crime-terror continuum is convergence. The crime-terror

nexus convergence means that the two groups arrive at one status with terrorists and organized

crime groups becoming same or very similar with convergence of their beliefs and views

(Heyman & Mickolus, 1980). Makarenko (2004) presents that terrorist and criminal

organizations could converge into single entities that originally display characteristics of both

groups concurrently, but with the potential to transfigure into entities at opposite sides of the

continuum. Therefore, transformation occurs to such an extent that the ultimate motivations and

aims of the organizations change.

Nevertheless, there is no evidence proving that political and criminal groups have

converged into single entities with similar motives, ideologies, and views of failure and success.

Tactical association between the two groups has occurred frequently because of their

contemporary consistent interests, although strategic alliances have happened occasionally base

on their long-term goals. As different ideological beliefs and aims of these two entities are

obvious (no conflicts between the two), the realities make it very hard for the two groups to

preserve long-time cooperation or even combine into single entities (Hassan, 1996). However,

the terrorist or criminal group would alter itself into one entity that has features of both groups.

According to Ridley (2008), it is clear that state authorities cannot judge terrorist organizations

or criminal groups by their cover. Criminal groups can display political motivations or adopt

terror techniques to obtain a political advantage or use terrorism to control financial institutions,

natural resources, and subsequently gain political power of the state (Makarenko, 2004).

Consequently, terrorists may focus their attention increasingly on criminal activities that they

! 15

solely maintain a public faced, although underneath, they have altered into a different kind of a

group with a different end game.

Modalities of Convergence

Various expositions are on the consideration of convergence between transnational

organized crime and terrorism, or between terrorism and organized crime. For some time, most

scholarly accounts make use of the two opposing hypotheses. For the first hypothesis, the

convergence of organized criminality and terrorism is a little less than a “contra natura” option.

Utilizing the second hypothesis, this one deals with spontaneity, and a quasi-natural tendency.

Works favoring the first position seek the justification of their theoretical approach, and the

other, the similarities between the two (Ross, 1993). Contrastingly, the critics of convergence

hypotheses only underline the prejudices represented by the trends involved, as well as the

differences distinguishing terrorist groups from organized crimes. However, the evidence from

several decades of research concerning the two phenomena goes beyond the specific type, which

shows two main conclusions.

First, the convergence between organized criminality and terrorism is neither natural nor

against nature. The first hypothesis considering this found empirical confirmation in several

cases. Thus, convergence is not questionable and comparable (Sanderson, 2004). However, the

opposing examples are significant and numerous, which makes it hard to maintain any idea

regarding a generalized trend towards convergence. On the contrary, and in the form if a

secondary conclusion, there are positive convergence cases that do not follow same patterns,

although they make it possible to pinpoint various alternative modalities.

! 16

Confluence (Involvement in other Criminal Activities)

Using appropriation methods, this could be called convergence, and it deals with the

simplest form of the discipline. This type of convergence occurs when terrorist organizations

participate in activities that are similar to organized crimes (Shelley & Picarelli, 2002). Simply

put, this is criminal involvement of a different nature, whose aim is meeting financing or

logistical needs. The following categories indicate specific examples and crimes against

humanity that terrorist organizations commit as the larger part of the global terrorist sphere:

Drug Trafficking: This has been done in two ways: Large-scale by Taliban, Al-Qaeda,

and other jihadist groups; on small-scale by specific members of these larger groups. In all the

cases, their participation in the drug business needs a complete form of convergence (assistance

from professional drug traffickers).

Other illegal trade: following some information, the beginning of last decade saw Al-

Qaeda make use of the black market for gold and other precious stones in order to obtain funds,

launder profits from illegal sources, and convert the cash into objects that kept the value, and

thus easy to transport. Another significant product under trafficking by the jihadists is tobacco.

AQIM’s involvement includes smuggling cigarettes.

Theft: Once more, there is proof of theft in major Nigerian cities by Boko Haram, and

Al-Qaeda operatives throughout the world. These organizations commit robberies in major banks

as a means to obtain the funds required to carry out deadly terrorist attacks. These attacks lead to

hundreds, if not thousands of victims. The perpetrators use robberies as one means of financing.

Forging of Documents; Forgery covers the logistical requirements of terrorist

organizations; this means they work with criminals, who have vast experience as forgers. This

! 17

was the situation with Ahmed Ressam of the Algerian SGPC. He tried to smuggle explosives into

the U.S. to carry out an attack at Los Angeles International Airport in 1999. The individual’s plan

was developed by the Al-Qaeda using falsified documents.

Kidnappings: leaving aside matters of illegal capture and holding people to force them on

political concessions, kidnapping for extortion constitutes a series of financing terrorism, both

global and local. The AQIM joined with the kidnapping business at the break of the last decade,

which is widely known, but by no means is it unique. It is also less interesting to note that Abu

Sayaff, a Philippine-based terrorist organization close to Al-Qaeda, became involved in the

recent kidnappings and ransom demands. The Boko Haram have also have also followed suit and

exploited huge amounts of funds from their kidnapped victims.

Extortion for Protection: the use of threats and intimidation, as the means to collect

regular amounts of money, dates back to the old criminal galleries. For instance, threats and

aggression with the intent to extort money from different businesspeople is now a general

practice amongst terrorist groups.

Transformation or Hybrid Blending (From Terrorism to Organized Crime)

When terrorists involve themselves in illegal businesses, operations, and numerous

revenue lines, there arises the possibility of the terrorists to raise the values attributed to their

illegal practices up to the point of an economic motivation, which is a characteristic of organized

crime (Sanderson, 2004). The change occurs on two levels: the groups evolves towards a hybrid

formation (halfway between organized criminality and terrorism), and transforming the terrorist

network into a criminal organization with the root cause of accumulating economic profits.

! 18

According to Shelley and Picarelli (2005), the second level maintains the original ideological

facade, which makes it very hard to distinguish the cases from the previous ones.

Cooperation with criminal organizations and gangs

There are two classes and different levels in the ways used by organized crime groups

and terrorist to organize their work together (Eastman, 2002; Forest, 2012). One level takes place

when criminals decide to support terrorists because of religious or ideological reasons. This

option is less than abstract with a few empirical illustrations. The second form stems from purely

practical interests, which contains economic or material exchange (Gurr, 1968). Buying

explosives, weapons, and false documents from the criminals plays as a resource for terrorists to

utilize what they lack, as well as seize opportunities to obtain these products. Different reports

validate that various militants of the Al-Qaeda maintained contacts with Eastern European and

Russian criminal organizations. Their aim was to buy chemical, biological, and nuclear material,

although it seems that criminals end up cheating terrorists in their transactions. An example is the

role of the Al-Qaeda in the Balkan region in the 1990s. The Al-Qaeda logistical support came

from Albanian criminal organizations, which in turn collaborated with the Kosovo Liberation

Army (Heyman & Mickolus, 1980). Leaving aside the favorable scenarios between the terrorist-

criminals contracts, the collaboration for pragmatic reasons is not frequent. In most cases, there

are limited, sporadic, and particular exchanges, which are determined by the need to an urgent

resolution. Overall, there comes a time in which the initial correlation gives rise to creating

associations that last longer.

! 19

Critical Scenarios for Convergence

Similar to any other criminal practice, organized crime and terrorism depend on each

other in their context. Not all the circumstances and settings foster them or make them possible

to the same extent. Furthermore, each setting and its time may modulate the development, and

thus generating specific, varied expressions and patterns. The same applies about the

convergence between the two threats (Nigeria-US, 2010). The probabilities in this context can

also change according to the circumstances. However, not all circumstances can favor organized

crime and terrorism with equal measures, while some just facilitate the two settings.

One common type of a facilitating scenario is the relation to the environments that are

crime producing. Such environments include jails, large towns and cities, deprived

neighborhoods, or the enclaves of borders. However, others span across a wider geographical

area: from a large portion to a multinational region. With the second type, there are affinities to

the highest levels between organized crimes and global terrorism. This connection is evident in

the activities of AQIM in the ungovernable Sahelian region and Boko Haram in Nigeria’s poorly

developed North.

Main Features of Convergence

Despite the fact that organized criminals and terrorist organizations spanning across

different borders with different geographical settings, it is clear that the two groups share some

problems and characteristics, which are not accidental but repeated (Makarenko, 2004). These

features include multi-frontier and porous border, state fragility, and weaknesses, ethical and

tribal heterogeneity, and lack of institutional legitimacy, a lot of corruption, armed conflicts, and

! 20

critical or underdeveloped economic situations. A combination of these characteristics

contributes towards fostering the relationship between the two threats, organized crime, and

terrorism. In so doing, the combination extends the motivations that inspire them in both

opportunities and capacities, which make them possible. Legitimacy problems arise due to the

established political order, tribal and ethnic tensions, which sometimes act as catalysts for armed

conflicts (more so those that arise from foreign military interventions, or those that involve the

presence of foreign troops). This feature extends the reasons for practicing terrorism.

The problems of provisioning and food come from poor government, underdevelopment,

and from armed conflicts along with other limitations and economic crises (Sanderson, 2004).

All these problems engender the appearance of illegal markets, which risk exposure because of

the criminal gangs and terrorist organizations. Additionally, the options for the development of

these illegal markets are numerous thanks to corruption, porous borders, and the issues of trust

between tribal sentiments and solidarity commitments. On the last note, the extreme examples

are in the scenarios where institutions are unable to operate, which extends to the state losing its

performance capacity for the most basic functions. This way, it enables criminals and terrorists to

act and interact with complete impunity.

Forms of Collaboration

Incorporation in the Production Chains for Illegal Markets

The jihadist involvement in drug trafficking and other unlawful trades is possible because

of their dominance in these territories where the drugs pass through or come from (Makarenko,

2004). However, this type of control is only profitable if it converts to an ongoing economic

! 21

partnership, with other several groups in the business. For instance, in order to make the most

profitable business out of drugs, Al-Qaeda operatives in Pakistan and Afghanistan create a

commercial relationship between them and growers, corrupt government officials, men of war, as

well as professional traffickers (Ridley, 2008).

Tactical Alliances

This is another form of collaboration, whose course consists of collaboration agreements

and alliances with groups of professional criminals. A perfect example is the MOJWA

(Movement for the Oneness and Jihad in West Africa) jihadist organization formed in 2011

(Nigeria-US, 2010). This group was a result of combining militants from AQIM and local

criminal elements. These organizations struggle to survive, expand their reach, and develop

sophisticated tactics and skills by seeking external assistance for specific, one-time services. The

common motivations for the terrorist and criminal organizations collaborate with each other in

favor of financial viability, personal protection, logistical support, geographical growth, support

of exclusive criminal activities, and introducing third parties to facilitate their organizational

goals (Ross, 1993). However, such collaborations involve great risk to both partners; successful

alliances, or potential sources of competition, distrust, and opportunities for exploiting

vulnerabilities. These vulnerabilities can lead to detection, as well as disruption of both

organizations. The tactical alliances could also introduce attention from the authorities,

compromised internal security, and ideological resistance towards illicit endeavors such as

kidnapping, drug trafficking, and fraud. Several observers of the crime-terror syndicates indicate

! 22

these disincentives are the major reasons why the core leadership of these groups, such as AQIM

and Boko Haram, face major challenges in their dealings (Sanderson, 2004).

Sub-contracting of Criminal Services

This collaboration involves hiring know criminal contractors to perform certain duties

and services to economize their efforts, or simply avoid risks. In some occasions, AQIM has paid

organized criminality assailants to kidnap some hostages for them (Shelley & Picarelli, 2005).

However, hiring these criminals keeps the terrorists under the radar of law-enforcement

authorities as they plan to carry out major attacks. On the other hand, criminal groups face

serious risks of unwanted attention from the authorities, heightened vulnerability of their

organizations, and risks of infiltrations (Shelley & Picarelli, 2002). During the contracts, the

criminal groups are in control of the lucrative revenue streams. However, criminal groups may

opt to avoid collaborating with terrorists if such contracts would disrupt the relationship between

the criminals and corrupt government officials. These officials are willing to facilitate crime, but

not risk carrying out terrorist-related ones.

Opportunistic Transactions

Finally, terrorists can take advantage of certain opportunities of collaboration offers from

criminal gangs or through unexpected events. To ensure that the groups remain undetected by the

authorities, they organize themselves in small groups (Eastman, 2002). Both groups reduce their

vulnerability by using front organizations in advancing their aims. The groups provide certain

services where the government has not provided the basic services such as health, education, and

! 23

social networks. These networks are parallel to the public institutions, but these are their

maneuvers to focus on a larger target. They prefer to cover their illegal activities with genuine

businesses. When performing their transactions, the authorities are diverted to thinking that the

deals are genuine when they are not. The technique allows the criminals and terrorists to launder

illicit profits by making it hard to stigmatize their criminal behavior.

Part III: Boko Haram and AQIM’s Convergence

Report from Consultancy Africa

Boko Haram’s growth in capability, coordination, and confidence has ties with other

extremist groups, which has led to analysts considering the influence of other extremist groups

on the escalation of attacks. A specifically concerning relationship is the one between AQIM and

Boko Haram. AQIM is a regional terrorist and criminal network that operates in North Africa,

particularly the Sahel region. In April 2014, there were bombings of a bus station, and the

abduction of at least 200 schoolgirls in the northeastern region of Nigeria, which seemed to

testify a convergence of the Boko Hara and the modus operandi of AQIM (Nigeria-US, 2014).

There is sufficient evidence showing that Boko Haram has had pertinent relations with

AQIM for the past three years, but the exact nature of the issue is subject to controversy. In

November 2011, Abu Qaqa, the official spokesperson of Boko Haram states that they were

together with Al-Qaeda. He added that Al-Qaeda was helping them promote the cause of Islam,

just as they were doing. Thus, Al-Qaeda helped them in their struggle. AQIM is believed to have

conducted training sessions for Boko Haram members, and that the two organizations may have

likely had joint operations in Mali. There is also the possibility that Boko Haram’s aptness to

! 24

conduct coordinated and sophisticated attacks could be the influence of AQIM, as well as Boko

Haram’s proficiency in deploying improvised explosive devices (Nigeria-US, 2014).

Additionally, there are speculations that Boko Haram may have obtained weapons from the

former Libyan suppliers through AQIM. At the same time, the increasing trend of kidnappings by

Boko Haram of foreign citizens, which began when a large number of Boko Haram members

returned to Borno after the Intervention of the French Military in January 2013; this may be an

indication of AQIM’s influence.

Comparative Analysis of AQIM and Boko Haram

Strategies and Techniques

When taking an in-depth comparative analysis of Boko Haram’s connection to the

mainstream of terrorist nexus on a global political arena, it is clear that the locally based terror

organization has more than just connections with the Al-Qaeda, which is an international terror

bracket on the global political landscape. Such a comparative analysis stems from their common

techniques in operations and strategies (Forest, 2012). Additionally, the analysis explores the

nature of operations by both groups, and comparing these operations with the modalities of

convergence. Despite the fact that Boko Haram is a locally based group compared to Al-Qaeda’s

international standards, the fundamental driving mechanism for the common features emanates

from the ideological vanguard, which characterizes the two groups; one group is purely based on

religious factors driven towards saving Islam by all measures. The following are fundamental

techniques and strategies of the two groups. The commonalities between the two groups include

! 25

bombings (suicide bombing, car bombing, airplane bombing), kidnapping (demand for ransom,

demand for political shift), and arson (setting schools and churches on fire).

Crenshaw (1981) suggested that democracy is a fragile issue within the region since it

experiences countless instances of political power. Boko Haram through the help of AQIM

makes the issue of failed state worse. In the modalities of convergence presented by Makarenko,

the kidnappings, arson, and bombings indicate confluence, which occurs when terrorist

organizations participate in activities that are similar to organized crime. With the ideological

component linking or binding Boko Hara to AQIM, this is no historical accident to discover a

common approach in techniques and strategies between the two organizations. Generally, the two

groups have used bombings, targeted assassinations, and coordinated arson attacks against

common enemies. Severally, the operations of the two groups are connected to car and suicide

bombings. In order to undermine the West African region, the Al-Qaeda has used a series of car

bombings between 2008 and 2012. The same case applies for Boko Haram. In 2011, Boko

Haram used car bombings to attack the United Nations’ compound based in Abuja (Forest,

2012). The other incident is the St. Andrew Military Protestant Church based in Jaji barracks of

Kaduna state. As AQIM continues to unleash a series of suicide bombings to hit known targets in

Mali, and the Maghreb region, the Boko Haram also unleash strings of bombings on Nigerian

checkpoints, as well as churches. Using the theory of confluence, it accounts for one terrorist

organization coordinating with a professional criminal group. In this instance, Boko Haram is not

entirely a terrorist group; their coordination with AQIM to carry out terrorist activities disguised

as criminal activities. While AQIM’s interests are purely political, it is also clear that Boko

Haram’s interests are profit related (Nigeria-US, 2014).

! 26

The use of kidnapping is the other fundamental strategy for Boko Haram and Al-Qaeda.

Over the years, both Boko Haram and Al-Qaeda carried out kidnappings demanding for ransoms,

either in the form of political policy shifts or money demands. The Associated Press (2012) notes

that the terrorists are under pressure of money sources, and this have turned to kidnapping for

ransom to compensate the dwindling cash reserves. The AQIM have long used kidnapping of

tourists and diplomats, collecting more than $80 million since the beginning of 2008. For the

first time, Boko Haram have applied the same kidnappings and demanding ransoms to release all

or execute the kidnapped French citizens. According to Nigerian government reports, the Islamist

extremist group was given more than $3m before releasing the French family of seven. The

French led military operations against Al-Qaeda and its affiliates, including AQIM in Northern

Mali following Boko Haram’s receipt of the ransom, which brought light to the contested strong

linkages between the two. In a press release by AQIM’s spokesperson, they said the kidnapping

was to stop the French military intervention in Northern Mali, where their troops were fight in

collaboration with Malian soldiers against Islamic extremist, as well as religious groups (Forest,

2012).

Using the modalities of convergence, this is a clear indication of hybrid blending or

transformation. Kidnapping is illegal, leave alone when kidnapping for ransom demands. AQIM

used Boko Haram to carry out the attacks, and requesting ransoms to replenish their diminishing

finances. The terrorist attributes are connected to their illegal practices, which appears as

organized crime. As noted by Makarenko (2004), the change occurs on two levels, between

criminality and terrorism. In this case, AQIM and Boko Haram carry out criminal activities, but

their goal is not purely economic, rather carrying out criminal activities to supplement their

! 27

terrorism goals and targets. According to the transformation theory, it is very hard to differentiate

the cases from the previous one, that is, it is very hard to distinguish between AQIM and Boko

Haram’s terrorism intentions from those of organized crime.

Additionally, both groups use arson attacks as another fundamental tool. Arguably, even

though AQIM has not used arson in the past, their main host Al-Qaeda has called on the Muslims

in the West to use fire attacks on the U.S. The issues published in a magazine suggest that Al-

Qaeda gave the instructions to ignite a firebomb, a strategy that teaches members how to ignite

an ember bomb in forests. The group recommended Montana because of its rapid population

growth, especially in the wooded areas. Following the same vein, Boko Haram has set churches,

homes, and schools on fire in Northern Nigeria. For instance, in December 2011, the militants of

Boko Haram launched a series of arson attacks on schools, and churches, including the First

Baptist Church in Maiduguri, Borno State, and the St. Theresa Catholic Church at Madala, Suleja

(Nigeria-US, 2010).

A Comparison of Operations

Al-Qaeda in the Islamic Maghreb (AQIM) and Boko Haram have carried out a series of

similar operations including Attacks, targeted assassinations, assaulting security installations, and

assaulting symbols of the Western Culture. While both groups are operating in different parts of

the globe, and sometimes the same place through the affiliations, there is reason to connect the

two in all aspects. Apart from having a common ideological component, the two have carried out

operations with similar economic, social, political implications on the global war on terror

(Makarenko, 2004). First, they have carried out large-scale operations that create global

! 28

attention. For example, AQIM has attacked Mali and other parts of West Africa. On the other

hand, Boko Haram attacked the UN compounds on August 2011, and the police headquarters in

Abuja. In the operations, the nature of their attacks has a lasting impact on economic, social, and

political landscape. The attacks shape the global comprehension of transnational organized crime

and terrorism as the most daunting challenges of security of neo-life (Forest, 2012).

The similarity of the targeted assassinations gives the framework of the connection

between the two groups. When the two groups emerged on the watch list of the international

counter-terrorism bodies, they had embarked on targeted assassinations of prominent political,

religious, and community leaders who were sympathetic and supportive of the international

effort in combating global terrorism. AQIM and Boko Haram assassinated outspoken leaders

who did not approve violence being in line with Islamic teachings. One of the assassinated

leaders includes Seikh Ja’afar Mahmoud in 2007. In other aspects, the groups have conducted

tactical operations against police stations, security checkpoints, and military outposts. With

intensified operations, the two groups have concomitantly unleashed a reign of terror on security

installations in several facets (Forest, 2012). The groups have conducted tactical insurgency

operations at local, national, and international levels.

Finally, both groups have conducted a series of attacks denouncing the western culture

and all the ideological bonding of its form. The groups share common views of the western

culture being a fundamental threat to Islam, churches, business centers, and schools emerged as

their targets over the years (Sanderson, 2004). The Al-Qaeda has ceased thousands of schools in

the Maghreb region, while Boko Haram has led widespread attacks on churches and schools in

! 29

their opposition to western education. The two continue to make affiliations in indisputable ways

standing for similar ideologies and ideological horizons.

Comparison of Linkages and Affiliations

After carefully examining the linkages and affiliations of the Boko Haram to the

mainstream AQIM, it is quite evident that the techniques and strategies of the local groups to the

extremist groups create links to external actors (Makarenko, 2004). These linkages and

affiliations are in the form of alliances, association, metamorphosis, and convergence. In Boko

Haram’s case, its association with AQIM falls in the framework of a coalition, brotherhood,

merger, or a partnership in the quest to propel their agenda of pursuing their objectives. Despite

AQIM operating in Somalia and Northern Mali, Boko Haram is no exception to Al-Qaeda’s

historical progress, which destabilizes the African continent (Ridley, 2008).

Furthermore, the vulnerability of Africa to porous border, weak institutions, and above all

poverty makes the threats of terrorism real across Africa’s political discourse. For instance,

Libya’s comparatively easy infiltration of distant and near neighbors in association with weak

authority in public finance and governance, irresistible internal conflicts, as well as porous

borders underlines the vulnerability of Africa’s states, and its political movements against the

destabilizing forces (Nigeria-US, 2010). The role of the Salafist Group of Algeria, which took the

name AQIM in simmering domestic unrests and violence in Northern Mali, and the Niger region,

provides evidence of the historical advancement of the Al-Qaeda and terrorism in the Sub-

Saharan political platform. The track record of Al-Qaeda and its collaboration with organized

groups goes back in history to its coalitions with FARC (Revolution Armed Forces of Colombia)

! 30

and AQIM. This was evident following the apprehension of the three Malian nationals linked to

FARC and AQIM. The cases confirm the much-anticipated connections between Al-Qaeda to the

local terrorist organizations such as Boko Haram (Forest, 2012).

Additionally, since mainstream terrorist groups such as Al-Qaeda needs cooperative

organized groups and safe havens, they move from one place to another, launching attacks after

attacks in the search for ransom money to supplement their budgets. With the U.S. leading efforts

to decapitate Al-Qaeda leadership by destroying its safe havens in the Sub-Saharan region, the

increased number of terrorists in Africa is largely connected to Al-Qaeda’s attempts to open a

new global front (Makarenko, 2004). Arguably, the endeavors to impose Islamic Law in West

Africa falls along the extremists’ attempts to attack the region, which is not limited to vast oil

sources, but governance and cultural factors, as well as an array of education as outlined in the

fundamental ideology of Book Haram. Regardless of the efforts by the extremist groups, West

Africa is full of ideological extremist groups, which provide the raw materials for the likes of Al-

Qaeda. Most of the key players that ferment Al-Qaeda’s agenda in Sudan, Algeria, Nigeria, and

Libya are present in Northern Nigeria (Sanderson, 2004).

The linkages between AQIM and Boko Haram may take the form of assistance, mutual

support, or joint action geared towards fulfilling historically and traditionally defined missions

across the global political arena. The assistance is usually in the form of economic resources, and

further training to the militants (Eastman, 2002). According to studies by the United Nations

Office on Drugs and Crime (UNODC, 2010), the survey involved 40 groups in 16 countries and

showed that 35 percent of terrorist cases involved levels of cooperation between TOC groups,

and major terrorist organizations outside the countries. The forms of collaboration, such as

! 31

tactical alliances are clear where the AQIM collaborates with Boko Haram to carry out major

professional crimes.

Part IV: Conclusion and Policy Recommendations

Conclusion

There is a lack of definite conclusion on how terrorism and crime converge. Between

1999 and 2009, distinguished academicians such as Levi Dishman, Fijnaut, Makarenko, Shelly,

and Sanderson came up with a model of crime terror nexus. Specific purpose and the particular

changing surroundings is seen as the determining factor in the mutuality between criminal and

political groups, both tactically and strategically. Stable-state contacts are the reason why

transactional organized crime groups such as the Hong Kong Triads and Silican Mafia do not

conspire with terror groups. Crippling the government is the only way that traditional groups and

terrorists can work together in aid of their survival; the recently formed crime actors with no

long-established financial strategies and long-time ideological beliefs and thereby would be open

to cooperating with terrorists to survive in the short-run. The new actors are mainly succeeding

in ungovernable areas. Due to the distinctness in ideological, practical, and political ways of

operation, the two groups are likely to transform themselves rather than cooperate with other

groups. In some instances, organized crime and terror groups cooperate in tactics and strategies

to achieve a common goal. The two groups however may find it challenging to maintain their

cooperation due to differing targets, goals, and motivations. They therefore only cooperate

tactically and strategically since there is no evidence showing the coming together of the two

groups to form one showing traits of the two entities. Makarenko sees common convergence of

! 32

causes as the reason why alliances between organized crime and terrorism have become rampant.

According to Shelly (2005), the reason for increased cooperation between the two groups is the

presence of regions within which crime groups and terrorist’s crisscross such as the presence of

chaos, conflict and in regions with the largest shadow economies. Ridley (2005) adds that the

cooperation between organized crime and terrorism depends on the state with those falling or

experiencing economic transition more susceptible since they are less risky to cooperation and

linkage between the two groups. Sanderson adds that crime and terror is made up of a

combination of criminal activities, terrorism, and a corrupt state, which is proving a challenge to

the West African governments and global interests. There is need to respond to crime and terror

since its increasingly becoming formidable. These states should therefore come up with effective

strategies through application of counter-terrorism and anti-crime policies since illegal

transformations are hard to judge by cover.

Policy Recommendations

Different agencies at national and international level should focus on information

exchange and copying successful practices to counter crime and terror. The solution to these

problems may lie with the government and international organizations being more responsive

and active than terrorists and organized crime groups.

The first step should see the opening of a government office with Hausa-speaking

diplomats in the North to reduce political corruption and correct social vacuums. These together

with social grievances allow social groups to move in and fill the gaps. Phasing out the indigene

system, which may involve alteration of the Nigerian constitution, may go a long way in building

! 33

transparency and trust with the population. Trust rebuilding may also be achieved through

protection of the rights of the minority without interfering with the rights of the majority. These

strategies will lead to cooperation between the government and the local administration, which is

vital in rebuilding fighting crime. The implementation of an open approach of eliminating

corruption and discrete approach of monitoring money laundering and criminal fund raising will

aid in strengthening financial monitoring systems. This combined with monitoring and

promotion of larger Sufi movements by the West African governments, which is by nature highly

low key, will prove beneficial. The latter should be considered being transformed into an actual

government affiliate denying them their security component henceforth limiting its gang

activities. All these are useful strategies in directing the state towards conflict mediation and

resolution.

Diversification of the economy to move away from its dependence on petroleum, which

provokes violence through jealousy and variance should be top of the agenda. These can be

achieved through strategies developed by Economic officers and development experts. A

manufacturing sector in the north should be created to seek development. This should prove an

attractive undertaking to the majority of the population who earn less than a dollar per day

through employment creation, it would also prove an upgrade from the current economy which

is based on crafts while also providing a natural transition, the industry would also attract

foreign cooperation due to the improved security in the region. The governments should use a

more comprehensive approach to eliminate violence and improve security in the region, which

would go a long way in restoring trust of the population to the authorities. The application of

violent approaches only leads to greater conflicts in the northern region. Fair arrests and the

! 34

subsequent trials through even application of the rule of law must be implemented. The problem

may be worsened by the inadequacy to train, fund and deploy law enforcement, security and

intelligence systems by the governments with a uniform command, control and liaison

connections. The US forces should train elite federal forces who should in turn train elite local

officers to curb the traveling of Boko Haram members in between states.

Law enforcement officers should be supplied with the appropriate intelligence both

human and technical in order to provide for aggressive but discrete tactical operations. The

military and Homeland Security should work together in controlling Nigeria’s, as well as the

entire West Africa’s porous borders to curb the security issues brought about by the Hausa ethno-

linguistic groups and Sahel-based migrants. The military should provide border patrol services,

which they are better equipped for while the internal security systems should provide document

identification and tracking services to the population. The indigene system should be replaced by

a national identification system, which would lead to provision for the security need and

reduction of sectarian tensions. All this requires oversight and guidance from the United States.

In situations where AQIM and Boko haram criss-cross sovereign borders, special joint operations

between nations in the region is required the nation should also share intelligence information.

According to Sage (2011), the success in defeating AQIM lies in the newly created Trans-

Saharan Counter-Terrorism Partnership (TSCTP), which is the coming together of 10 nations,

Nigeria and countries in the Sahel included. He argues that the partnership to target Boko haram

is required. The expansion of the US training partnership such as the Joint Combined Exchange

and Training in order to remain discrete and reduce visibility thereby avoiding a possible

negative reaction from the general population should be undertaken. Intelligence information

! 35

should provide a basis for targeting leadership nodes and decree of explosives without disturbing

the peace of the population, which is the overall target in the fight against terrorism. The

intelligence information should also establish the connection between Boko Haram and Al-

Qaeda affiliates. The collection of information should involve human networks in coordination

with technical and open source collection to target social media and text messaging which is the

medium through which violence is coordinated. The involvement of Muslims in government

operations, as well as providing a fair political stake should move the violence away from them.

Despite stability, violent eruptions are a common phenomenon. However, much of this acts as an

indicator of stability outbursts, which are historically normal in the region. Social education and

advanced measures should be taken to minimize violence at a lower cost. There is the possibility

of Boko haram becoming an international group linking geographically with AQIM. This creates

a host of problems involving U.S. and other major nations’ passport holders living in different

terrain from that of Sahel or the Horn of Africa. With the increasing threat posed by Boko

Haram, the world may experience economic retreat caused by consternation of world oil prices.

Al-Qaeda has succeeded in creating economic consternation in the western world; it has also

outlined its objectives in Africa with Nigeria’s petroleum infrastructure in the delta region being

the main target. It may be ill advised to dismiss Boko Haram as an Al-Qaeda affiliate now,

although prolusions have been made and conditions not granted. Boko Haram lugs all the AL

Qaeda traits making it potentially its entity. It has gained global hallmarks as evidenced in its

attacks on the UN headquarters and it is geographically located between Al-shabab and AQIM,

making it a good fit, it has the capability to strike Nigeria petroleum infrastructure and provide

U.S. passports, which is in line with Al-Qaeda objectives in Africa. The fact that Nigeria is a Sufi

! 36

nation is not enough to banish the group. With examples of Al-Qaeda in Iraq, Al-Qaeda in the

Islamic Maghreb and Al-Shabab, there is evidence of tactical collusion developed over a period.

This process maybe a method of security or business negotiation but the baseline is that Boko

haram is part of that process. Whatever the case the U.S. and Western governments should take

appropriate action to destroy Boko Haram, which will go a long way in the development of

Nigeria, the Sahelian region and the world at large.

! 37

References

Abrahms, M. (2008). What Terrorists Really Want: Terrorist Motives and Counterterrorism

Strategy. International Security, 32(4), 78-105. doi:10.1162/isec.2008.32.4.78

Angjeli, A. (2003). The Challenge of Terrorism and Organized Crime. Mediterranean Quarterly,

14(3), 34-40. doi:10.1215/10474552-14-3-34

Associated Press. (2012). “Terrorists kidnapping for ransom increases,” May 04. http://

www.foxnews.com/world/2012/05/04/terrorist-kidnappings-for-ransom-increase/

(Retrieved December 13, 2014).

Barnett, D. (2013). Senior IRGC official killed in Syria 'was no less than Mughniyah' - The Long

War Journal. Longwarjournal.org. Retrieved 20 December 2014, from http://

www.longwarjournal.org/archives/2013/02/senior_irgc_official.php

Barnett, D. (2014). Iran-backed terror cell exposed in Nigeria - Threat Matrix.

Longwarjournal.org. Retrieved 20 December 2014, from http://www.longwarjournal.org/

threat-matrix/archives/2013/02/iran-backed_cell_exposed_in_ni.php

Berrebi, C. (2012). Evidence About The Link Between Education, Poverty and Terrorism Among

Palestinians. SSRN Journal. doi:10.2139/ssrn.487467

Cox, R. (2004). Beyond empire and terror: critical reflections on the political economy of world

order. New Political Economy, 9(3), 307-323. doi:10.1080/1356346042000257778

Crenshaw, M. (1981). The Causes of Terrorism. Comparative Politics, 13(4), 379. doi:

10.2307/421717

! 38

Crenshaw, M. (1987). Theories of terrorism: Instrumental and organizational approaches.

Journal Of Strategic Studies, 10(4), 13-31. doi:10.1080/01402398708437313

Dishman, C. (2005). The leaderless nexus: When crime and terror converge. Studies in Conflict

& Terrorism, 28(3), 237-252.

Eastman, P. (2002). Speakers Decry ‘Tobacco Terrorism’ Marketing to Minorities, Third World.

Oncology Times, 24(4), 40-43. doi:10.1097/01.cot.0000285550.83483.79

Forest, J. (2012). Criminals and Terrorists: An Introduction to the Special Issue. Terrorism And

Political Violence, 24(2), 171-179. doi:10.1080/09546553.2011.646829

Gurr, T. (1968). A Causal Model of Civil Strife: A Comparative Analysis Using New Indices. The

American Political Science Review, 62(4), 1104. doi:10.2307/1953907

Hassan, M. (1996). The Nexus Between Democracy and Stability: The Case of Southeast Asia.

Contemporary Southeast Asia, 18(2), 163-174. doi:10.1355/cs18-2c

Heyman, E., & Mickolus, E. (1980). Observations on "Why Violence Spreads". International

Studies Quarterly, 24(2), 299. doi:10.2307/2600203

Humphrey, M. (2004). Postmodern wars: Terrorism, the therapeutic state and public safety. In

First International Sources of Insecurity Conference, The (p. 10). RMIT Publishing.

Makarenko, T. (2004). The Crime-Terror Continuum: Tracing the Interplay between

Transnational Organised Crime and Terrorism. Global Crime, 6(1), 129-145. doi:

10.1080/1744057042000297025

NIGERIA-US: Al-Qaeda Backed Bomber. (2010). Africa Research Bulletin: Political, Social

And Cultural Series, 46(12), 18238B-18239A. doi:10.1111/j.1467-825x.2010.03046.x

! 39

Ridley, N. (2008). Organized Crime, Money Laundering,and Terrorism. Policing, 2(1), 28-35.

doi:10.1093/police/pan006

Ross, J. (1993). Structural Causes of Oppositional Political Terrorism: Towards a Causal Model.

Journal Of Peace Research, 30(3), 317-329. doi:10.1177/0022343393030003006

Sage, A.L. (2011, July). The evolving threat of Al Qaeda in the Islamic Maghreb. In Strategic

Forum (No.268, p.1). National Defense University.

Sanderson, T. (2004). Transnational Terror and Organized Crime: Blurring the Lines. SAIS

Review, 24(1), 49-61. doi:10.1353/sais.2004.0020

Shelley, L., & Picarelli, J. (2002). Methods Not Motives: Implications of the Convergence of

International Organized Crime and Terrorism. Police Practice And Research, 3(4),

305-318. doi:10.1080/1561426022000032079

Shelley, L., & Picarelli, J. (2005). Methods and motives: Exploring links between transnational

organized crime and international terrorism. Trends In Organized Crime, 9(2), 52-67. doi:

10.1007/s12117-005-1024-x

Wilson, K. (2009). Terrorism and Tobacco--How Cigarette Smuggling Finances Jihad and

Insurgency Worldwide. The Cutting Edge, 29.

! 40