The threat of cyberwarfare is a growing fear among all intelligence communities. “In June 2009 the U.S. Cyber Command was created and in July of 2011 Deputy Secretary of Defense William J. Lynn III announced that as a matter of doctrine, cyberspace will be treated as an operational domain similar to land, air, sea, and space” (Colarik & Janczewski, 2012, 35). Cyber warfare is conducted by infiltrating the country’s computer networks to cause damage and/or disruption to various infrastructures. This could be as minimal as spying on another nation or as in-depth as implementing acts of sabotage directed towards specific targets such as military operations or the power grid. The threat of cyber warfare is not specific to one country. This is a potential threat that effects each country across the globe.
China is a dominant power within the global arena and is consistently evolving with potential threats especially cyber technology. Chinese colonels Liang and Xiangsui claimed advanced technology gave the country’s adversaries a significant advantage, and proposed that China ‘build the weapons to fit the fight. Recently, the Chinese People’s Liberation Army (PLA) confirmed the existence of its Online Blue Army (Colarik, &Janczewski, 2012, 35). China’s fear of the impact and devastation that can be caused by the internet has forced them to implement strict policies governing the freedom and use of the internet within the country and creating strong security measures against infiltration by outside sources.
In 2014, China implemented the Central Internet Security and Informatization Leading Group to oversee all internet security. “This leading group is to deepen reform, protect national security, safeguard national interests, and promote the development of information technology. The group will have complete authority over online activities, including economic, political, cultural, social, and military” (Iasiello, 2017, 5). This group disseminates and monitors all information found on the web to ensure that there are no security breaches and the people are not in violation of the law.
In 2015, China drafted a national cybersecurity law.“The chief goals of its 2015 draft national cybersecurity law are (1) ensure cybersecurity, (2) safeguard cyberspace sovereignty, national security, and the public interest, (3) protect the legitimate rights and interests of citizens, legal persons and other organizations, and (4) promote the healthy development of economic and social information” (Kolton, 2017, 126). Whereas the United States promotes a free internet, China’s main focus is on establishing an internet that is secure from all potential threats both external and internal.
In 2016, China passed the “Cyber Security Law” that focused on the security of the internet and information systems and extended the ability of the government to oversee the information that was being shared to determine if it was done within accordance of their strict cyber security laws. This law helps the government to monitor any potential breaches of security by outside or internal sources. By implementing a stronger grasp of control over the internet, the government is able to reduce the potential of an attack or intrusion. Within this law, government agencies would be able to implement more guidelines for network security within industries to include energy, transport, military, defense, and many more (Iasiello, 2017, 6).These restrictions increase the control of the government over cybersecurity but also limits the freedoms of its citizens to explore the internet.
China has created new training for its military to be prepared against potential cyber warfare attacks. It has “developed detailed procedures for internet warfare, including software for network scanning, obtaining passwords and breaking codes, and stealing data; information-paralyzing software, information-blocking software, information-deception software, and other malware; and software for effecting counter-measures” (Ball, 2011, 84). It has also increased its number of training facilities to focus only on network attacks on cyber infrastructure and defense operations. The amount of money China is investing in facilities and training of military personal increases its ability to remain secure within this global threat of cyber warfare. One fear for China is its dependence on Western technology. “China’s capabilities in cyber operations and emerging technologies such as artificial intelligence are becoming more sophisticated, the country still depends largely on Western technology. Beijing is hoping to break that dependency through the Made in China 2025 plan” (Bey, 2018, 33). This is a mutual fear for both the US and China as they both rely on each other’s manufacturers with the fear that they will implement a trojan horse to intervene.
Like China, Russia has increased its abilities in combating the potential threat of cyber warfare. However, Russia has taken a different approach to this threat by going on the offensive. Russia has focused on non-linear warfare within the cyber world, which is defined as “the collection of plans and policies that comprise the state’s deliberate effort to harness political, military, diplomatic, and economic tools together to advance that state’s national interest. Grand strategy is the art of reconciling ends and means” (Schnauffer, 2017, 22). To assert its dominance in the global arena, Russia has been utilizing its own forms of cyber attacks to collect information and become a dominant cyber power.
Russia began its experiments with cyber warfare in 2007 in the clash with Estonia. This was done to determine its cyber capabilities as well as create a stronger resilience against future attacks. “Russia’s cyber experiment effectively shut down day-to-day online operations in Estonia’s cyber infrastructure for weeks, from news outlets to government institutions” (Shuya, 2018, 4). After this successful movement, Russia began to expand its focus to Georgia and Ukraine in 2008 and then in 2015, to offset local initiatives there which it considered to be against Russian national security interests. Russia has “developed multiple capabilities for information warfare, such as computer network operations, electronic warfare, psychological operations, deception activities, and the weaponization of social media, to enhance its influence campaigns” (Ajir& Valliant, 2018, 75). Russia has had a strong focus on using the tool of propaganda to disseminate key information to its citizens with the hope that they will abide by it as the real truth.
Russia’s investment into technology and the freedom of speech allotted by the West has made the West not only extremely vulnerable to Russia, but also has expanded the reach of the Russia globally. Ajir and Valliant (2018) highlight several key points of the Russian strategy:
Direct lies for the purpose of disinformation both of the domestic population and foreign societies; Concealing critically important information; Burying valuable information in a mass of information dross; Simplification, confirmation, and repetition (inculcation); Terminological substitution: use of concepts and terms whose meaning is unclear or has undergone qualitative change, which makes it harder to form a true picture of events, Introducing taboos on specific forms of information or categories of news; Image recognition: known politicians or celebrities can take part in political actions to order, thus exerting influence on the worldview of their followers; Providing negative information, which is more readily accepted by the audience than positive.
This approach allows the Russian government to remain in control of information that is filtered to its citizens. The restriction of freedom reduces the capability of deciphering fact from fiction.
Russia has also taken a defensive approach to cyber warfare by implementing strict laws that govern the use of the internet. The agency Roskomnadzor scans the internet for activity that is deemed illegal and detrimental to the Russian government. It has also implemented new laws to regulate internet activity. “The laws which came into force in November 2012 provided provisions for criminalizing slander, requiring nonprofits receiving funding from abroad to declare themselves “foreign agents,” and provide additional financial information and a final law sanctioning the blocking of websites featuring content that “could threaten children’s lives, health, and development” (Cross, 2013, 14). Many have deemed these laws as means to censor the internet, but the Russian government argues it is for the protection of its citizens.
An opposite example of failing to employ measures to protect the country from a potential cyber warfare attack is Mexico. The main focus for Mexico has been on drug cartels and eliminating internal threats within their own government. Mexico has begun to implement its own version of cybersecurity due to its substantial growth in cyber-attacks over the years. However, its overall success has been limited due to a lack of understanding and outdated systems. “Incidents in cyberspace pose a challenge to Mexico due to a lack of institutional structures and there is a need to strengthen capabilities since it does not have any specialized government or public sector agencies certified under internationally recognized standard” (Kobek, 2017, 8). Without the establishment of a specific agency dedicated to cybersecurity, Mexico will continue to struggle against cyber warfare threats. Mexico must implement new security measures that are applicable to all main threats beyond the drug cartels.
Currently, the government presence in Mexico is focused solely on actionable and tangible threats. There must be a reform to its current laws for “the armed forces require a law that reframes and modernizes the concepts of public safety, internal security, and national defense; clarifies the role, conditions, terms, and limits of the armed forces’ engagement; and establishes mechanisms to hold them accountable” (Payan& Correa-Cabrera, 2016, 3). The lack of accountability and oversight by the government to control key aspects, such as the military, and impose a stronger presence in the more demanding field of cybersecurity opens up the potential for a catastrophic event to occur within Mexico.
China and Russia are prime examples of how strict policy governance of the internet will help to reduce the potential threat of an attack. They are micromanaging every aspect of the internet from restricting specific websites (social media) or establishing specific agencies to monitor and analyze all information that is being viewed from all sources. “With the United States and European democracies at one end and China and Russia at another, states disagree sharply over such issues as whether international laws of war and self-defense should apply to cyber-attacks, the right to block information from citizens, and the roles that private or quasi-private actors should play in Internet governance” (Forsyth, 2013, 94). The failure of this policy is the restriction of freedoms to citizens. As stated above, one of Russia’s main focuses is promoting propaganda that is anti-west and pro-Russia. The control over the internet does not allow their citizens to research the truth or have global interaction. This increases the risk of upheavals among the people, especially as technology continues to improve and loopholes are found to circumvent existing policies and hidden content is exposed.
Another approach to cybersecurity is seen with the actions of NATO. It is focusing on improving its relationships with private security companies and “developing a Cyber Rapid Reaction Team (RRT)19 to protect its critical infrastructure, much like U.S. Cyber Command’s Cyber Protection Teams (CPTs)” (Ilves et al, 2016, 130). One downside to this approach is NATO is only able to apply defensive measures. It does not have the ability to implement an offensive attack. Creating a partnership with private companies provides it greater access and resources to potential cyber threats. Private companies have more funds available to pursue a stronger cyber security defense. A recommendation would be to create a joint European Union, United States, and NATO partnership against cyber warfare. Each has its own strengths that can be applied to a joint force against one common threat. A stronger partnership among key global powers will help to create a multifaceted approach to the threat of cyber warfare. The end goal of cyber warfare is the same for each country targeted. There is no specific adversary, but rather the substantial disruption or sabotage of key infrastructure.
Although facing intense criticism and skepticism, it would be beneficial for the US, China, and Russia to form a partnership against cyber warfare. As each country is already connected via their technology companies, they are each a global power that encompasses a vast majority of the world. A collaboration of information and resources would provide a stronger protection amongst common non-state threats. However, the chief obstacle is the ability to trust each country to act within the realm of security, instead of using it as an opportunity to gain substantial access to an inside look of the country. Since the US often accuses China and Russia of being the biggest state perpetrators of cyber actions, this criticism may be near impossible to overcome, despite the possible advantages. According to the World Economic Forum, the table below lists the top countries best prepared against cyber-attacks.
The United States is ranked number one with a significant margin above Canada. China and Russia who have implemented a very strict cyber security policy are not listed within the top 20. This is determined by the Global Cybersecurity Index, a partnership between private industries and international organizations that analyze all aspects of cybersecurity. This argues that the approach by countries such as China and Russia is geared more to the control over its citizens rather than executing a strong cybersecurity policy focused on legitimate external threats. Although, the table above does show that the United States is ranked number one in being able to protect the nation from potential cyber threats, it is only ranked at 82.4% effective. Russia and China have employed a different approach to cyber security that could be utilized to increase the overall effectiveness globally if each side was able to work together towards common threats. Ideally, such partnership would not only create new channels of connection and collaboration between adversaries, but would also set the stage for the more heavy-handed and restrictive policies of China and Russia to be loosened to the benefit of its citizens’ virtual freedom.
Omani national security and the kind of political and military cooperation with the United States
Historical documentary evidence suggests that the United States has always had a strategic partner in the region. Oman is undoubtedly the closest Iranian southern neighbor to the Persian Gulf, with its common cultural and religious roots with the land of Iran. But it should be noted that the effects of convergence between the United States and Oman have an impact on Iran’s national security. Also, after the US Secretary of State Visits Oman and his visit to Sultan Qaboos and the Pompeo positions in Amman, the question is: How much is Oman to do with US sanctions against Iran?
Oman has a geographical isolation in the Arabian Peninsula. The country has only a frontier from its western region, and the three UAE, Saudi Arabia and Yemen are neighbors. On the other hand, the majority of the Abbasid religion of this country has led to its religious isolation in the Islamic world, and Wahhabism has entered into conflict with the followers of this religion several times since its inception, and still considers the abbots from the divergent difference of the Islamic world, And excuses.
Oman is relatively weak in the economic field, dependent on oil and the outside world. However, the Omani dealings with the United States are not high, and most of it is in the military arms sector. The demographic structure of this country, in particular the population of about 5% Shiite, who has a lot of strength and wealth, with the Baluchis, who have traveled to Oman many years before Iran, actually created a situation and the Omani government will not be in a relationship with Iran. If this issue is analyzed along with the influence of Wahhabism on the Omani population, it will be more important if it is to be analyzed.
It should be borne in mind that the Sunnis in Amman claim that they are the majority of the citizens of this country. Oman considers the Gulf Cooperation Council to be important in the framework of this cooperation, in addition to external problems, to prevent Arab aggression, the Omani are well aware of the history of Saudi Arabia’s deployment to its neighboring countries, and therefore the balance Power will not be pleasing to Saudi Arabia. Oman, which seeks to reduce dependence on oil and economic diversification in its 2020 and 2040 prospects, avoids any kind of conflict and conflict in the region, because the arrival of capital, tourists and goods, and services and manpower require security in this country. And stability in the region. They are working to strengthen Qatar in the Gulf Cooperation Council and are working with the United States to provide their own resources in the region, and because strengthening Qatar and removing Saudi and Qatari hostilities are in the interest of the country and necessary to curb Saudi Arabia. Greetings from the United States.
But the question is whether Oman can adopt an independent policy at the level of engagement with global powers such as the United States?
In August 2010, Oman and Iran signed a security agreement; of course, it cannot be said that the relations between Tehran and Muscat are generally without problems and is a full-fledged relationship; for example, the Oman navy does not participate in Iranian military maneuvers while Which is in the military maneuvers of the Gulf states, the United States, India and Pakistan. Oman has given America’s military partner its ports and bases. It has shown its willingness to participate in the US missile defense shield, which is aimed at creating security against Iran’s threat to the countries of the region.
From the point of view of Oman, the military conflict between the United States and Iran has a huge geopolitical and economic risk. To reduce this danger, the Omani government has acted as a bridge between Tehran and the West; that is why the Oman kingdom, unlike Saudi Arabia and some countries of the Cooperation Council, Which wants Iran to lose its position in the region, does not want Iran to be attacked by the military and tries to increase the capacity of Iran in the region by means of a synergy.
The geographic proximity of Iran and Oman in the Strait of Hormuz, Oman’s geographical remoteness from the Arab world, and the geopolitical and geopolitical importance of the Strait of Hormuz, Iran and Oman, have required good relations. Accordingly, and despite the fact that Oman has always had close ties with the United States, this has not had any effect on Iran’s friendly relations with the country. In fact, the different Muscat approach to the Tehran Cooperation Council has had a dramatic impact and has effectively reduced the influence of Riyadh on the smaller member states of the Council for the purpose of convergence, and undermined West’s efforts to isolate Tehran.
It should now be seen that in spite of important approaching variables such as geographic continuity, geopolitical situation in the region, oil, the need for stability in the region, and … the main causes of the security scene in the region.
In the past, in the context of security-related security with national power, there was a belief that with increasing military power security would increase, and with the number of military forces and equipment representing the power and security of each country, but now beliefs have changed and should be noted. National security is not a unilateral process that can only be increased by increasing its military power, but has a broad and comprehensive concept.
It is possible to maintain the national security of each political unit by increasing national power and balancing its constituent elements, and increasing one of these factors, if not accompanied by an increase in other factors, could threaten national security. In this regard, today, national security has taken a cross-border dimension; in other words, it is not just inside the border. Of course, security is not military power, so sometimes increased military strength reduces security and insecurity.
The Omanian kingdom has a different look at the position of the Gulf Cooperation Council on the issue of convergence; on the one hand, it contributes to economic issues within the framework of the Persian Gulf Cooperation Council, but on the other hand, in foreign policy and disputes between the Persian Gulf Cooperation Council Persian countries has not entered and has been trying to play a role in the Persian Gulf Cooperation Council by assuming the role of the Hammer of Equilibrium. However, now it seems that, despite the differences between Saudi Arabia and Qatar, it is not very willing to remain in the Gulf Cooperation Council. This approach may lead to a gap in the Gulf Cooperation Council, and will split countries into two different blocks. In this regard, Muscat tries to maintain its impartiality in the internal conflicts of this council as well as the differences between Iran and Arab countries, while playing a positive role.
Now the kingdom of Oman is not willing to pay for the rest of the world; therefore, in view of Muscat, Egypt’s entry into the Gulf Cooperation Union is very dangerous. On the other hand, the Omani kingdom does not differ much with other countries, but it is not pleasing to Saudi policies (which are trying to dictate their policies to other Gulf States). The country has repeatedly objected to Saudi apparent interference in foreign policy of the Gulf Cooperation Council, and if the situation continues, it is foreseeable that the Gulf Cooperation Council will collapse in the future, and even Qatar, along with the Oman kingdom, will cooperate with the Co-operation Council Gulf exits and form an alliance with Lebanon, Iraq and Syria. In contrast, Bahrain, UAE, Egypt, Saudi Arabia and Kuwait are on the other.
In the future, Muscat tries to maintain its impartiality and, in its relations with the United States, the European Union, Saudi Arabia, and …, continues its policies and tries to play a positive role in resolving regional crises, as The meetings of Iran and the Western countries over the past years with Oman’s administration show that the king wants to mediate Iran’s relations with the West.
Tension in the Gulf: Not just maritime powder kegs
A recent interview in which Baloch National Movement chairman Khalil Baloch legitimized recent militant attacks on Iranian, Chinese and Pakistani targets is remarkable less for what he said and more for the fact that his remarks were published by a Saudi newspaper.
Speaking to Riyadh Daily, the English language sister of one of Saudi Arabia’s foremost newspapers, Al Riyadh, Mr. Baloch’s legitimization in the kingdom’s tightly controlled media constituted one more suggestion that Saudi Arabia may be tacitly supporting militants in Balochistan, a troubled Pakistani province that borders on Iran and is a crown jewel of China’s infrastructure and energy-driven Belt and Road initiative.
Riyadh Daily interviewed Mr. Baloch against the backdrop of heightened tensions between the United States and Iran that many fear could escalate into military conflict, past indications of Saudi support for religious militants in Balochistan, and suggestions that countries like the United States, Saudi Arabia and the United Arab Emirates are united in their opposition to Iran but differ on what outcome they want maximum pressure on the Islamic republic to produce.
The interview followed publication in 2017 by a Riyadh-based think tank with ties to Saudi crown prince Mohammed bin Salman of a call by a Baloch nationalist for support for an insurgency in the Baloch-populated Iranian province that borders Pakistan and is home to the crucial Indian-backed port of Chabahar on the Arabian Sea.
It also juxtaposes with Pakistani anti-Shiite, anti-Iranian militants who operate madrassahs along the Iranian-Pakistani border reporting stepped up Saudi funding. The monies are believed to come in part from Saudi nationals of Baloch descent, but the militants suggest the funding has at least tacit government approval.
Balochistan has witnessed multiple attacks on its Hazara Shiite minority as well as in May on a highly secured luxury hotel frequented by Chinese nationals in the Chinese-backed Baloch port city of Gwadar and a convoy of Chinese engineers as well as the Chinese consulate in Karachi. Militants killed 14 people in April in an assault on an Iranian revolutionary guards convoy and exploded in December a car bomb in Chabahar.
Saudi Arabia is also suspected of supporting the Mujahedeen-e-Khalq, a controversial Iranian exile group that seeks the fall of the Iranian regime and enjoys support of senior Western politicians and former officials as well as US national security advisor John Bolton prior to his appointment and ex-Saudi intelligence chief Prince Turki al-Faisal.
For now, tacit Saudi support for Baloch militants is likely to be more about putting potential building blocks in place rather than the result of a firm decision to wage a low-intensity proxy war.
“The recent escalation in militant attacks is a direct reaction to Pakistan army’s growing atrocities in Balochistan and China’s relentless plunder of Baloch resources,” Mr. Baloch said.
Asserting that the Pakistani part of Balochistan has been occupied by Pakistan since 1948, Mr. Baloch insisted that the “Baloch nation is resisting against this forced accession. This insurgency is the continuation of that.”
The alleged Saudi support coupled with plans for a US$10 billion Saudi investment in a refinery in Gwadar and a Baloch mine has sparked discussion in Beijing about the viability of China’s US$45 billion plus stake in the region’s security and stability.
Iranian officials see a pattern of foreign support for insurgents not only in Balochistan but also among Iran’s Kurdish, Arab and Azeri minorities. Their suspicions are fuelled by statements by Mr. Bolton prior to his appointment calling for support of insurgencies and Prince Mohammed’s vow that any battle between the Middle East’s two major rivals would be fought in Iran rather than Saudi Arabia.
Complicating the situation along Iran’s borders is the fact that like in the waters of the Gulf where naval assets are eyeing one another, it doesn’t take much for the situation to escalate out of control. That is particularly the case with Iran having shifted tactics from strategic patience to responding to perceived escalation with an escalation of its own.
Iran moreover has been preparing for a potential covert war waged by Saudi Arabia and possibly US-backed ethnic insurgent groups as well as the possibility of a direct military confrontation with the United States by building a network of underground military facilities along its borders with Pakistan and Iraq, according to Seyed Mohammad Marandi, an Iranian academic who frequently argues the Tehran government’s position in international media.
Iran recently released a video showcasing an underground bunker that houses its missile arsenal.
In a further heightening of tension, Iran’s Revolutionary Guards attacked on Friday Iranian armed opposition groups in the Kurdistan region of Iraq with drones and missiles. Iranian artillery separately shelled villages in a region populated not only by armed anti-Iranian and anti-Turkish Kurdish groups but also smugglers.
The strikes followed the killing of three Iranian revolutionary guards. A spokesman for the Democratic Party of Iranian Kurdistan (PDKI) denied responsibility for their deaths.
The risk of escalation is enhanced by the fact that while the United States, Saudi Arabia, Iran and Israel agree on the principle of maximum pressure, they do not necessarily see eye to eye on what the end goal is.
While US President Donald J. Trump appears to want to force Iran back to the negotiating table, Israel and Mr. Bolton are believed to advocate gunning for regime change ignoring the risk that the effort could produce a government that is even less palatable to them.
That outcome would suit Saudi Arabia that does not want to see a regime emerge that would be embraced by Western nations and allowed to return to the international fold unfettered by sanctions.
A palatable government would turn Iran into a Middle Eastern powerhouse with a competitive edge vis a vis Saudi Arabia and complicate the kingdom’s ambition to become a major natural gas player and sustain its regional leadership role.
Writing in the Pakistan Security Report 2018, journalist Muhammad Akbar Notezai warned: “The more Pakistan slips into the Saudi orbit, the more its relations with Iran will worsen… If their borders remain troubled, anyone can fish in the troubled water.”
Boko Haram and Frustration- Aggression Theory: A Potential Explanation
In the context of Boko Haram, it is vital to identify how Boko Haram resorted to extreme violent behavior. One theory that provides an understanding of such violent behavior is Frustration-Aggression Theory. This “holds that a group’s relative disadvantage in relation to others, which may be manifested in income inequality or hierarchical class, results in frustration which breeds grievance and aggression” (Iyekepolo, 2213). In the case of Boko Haram, this theory can arguably describe how frustration over Western education led to an increase in its aggressive behavior.
To understand Frustration-Aggression Theory further there must be comprehension on the term “frustration.” Frustration, as described by Berkowitz, is “an unpleasant, aversive stimulus which evokes negative affect by automatically eliciting cognitions that are associated with aggressive tendencies.” This view of frustration can provide insight into group motivations to justify acts of aggression. Recognizing these two important aspects of Frustration-Aggression Theory provides not only a background into Boko Haram,but a broad look into future potential attacks.
Application of Frustration-Aggression Theory
This research applies key aspects of frustration and aggression. First, the act of frustration defined as “blocking someone from gaining an expected gratification” (Dill and Anderson, 360). Second, aggression which is defined as “any behavior which is intended to injure the individual to whom it is directed” (Dill and Anderson, 360). These key aspects of Frustration-Aggression Theory provide in-depth knowledge into the decision-making process utilized by Boko Haram.
Boko Haram continues to feed off the economic conditions and frustrations of the Nigerian people. “The situation of poverty in Nigeria and Somalia, where Boko Haram [and Al Shabab] started, is worsened by the day-to-day paradox of mass poverty in the face of rich human and mineral resources.” (Ani and Ojakorotu, 12) This economic decline only fuels Boko Haram’s legitimacy and power. Not only does this fuel its status among African nations, it also increases the frustration of the Nigerian people against not only Boko Haram but the Nigerian government overall.
The level of poverty pervading the region also proved to be a factor in mobilizing the Boko Haram insurgency, as Mohammed Yusuf, the sect’s leader spoke regularly about it; arguing for devout Muslims to ‘migrate from the morally bankrupt society to a secluded place and establish an ideal Islamic society devoid of political corruption and moral deprivation (Iyekekepolo, 2215).
The economic conditions in which the many of the Nigerian people are still living became the foundational grounds for Boko Haram’s rise. The hardship the Nigerian government and its people have faced bred political corruption and moral deprivation. (Iyekekpolo, 2215)This continuous frustration from current economic conditions has also created more insight into Boko Haram’s increased aggression. Solomon Ayegba states this corruption is at the expense of the Nigerian people, which has resulted in the Boko Haram insurgency. (2015)
Boko Haram continued to gain legitimacy throughout Nigeria and neighboring states, which only increased the frustrations of citizens across West Africa. “The poor development status of Nigeria no doubt breeds an atmosphere of frustrated expectations and foster widespread indignation on the part of those that are trapped in the vortex circle of abject poverty.” (Mbasua, Musa and Fada, 96) Those imprisoned by Boko Haram’s terror are left more vulnerable to continued social and economic chaos. As the chaos continues to manifest, it leaves Nigeria not only socially and economically vulnerable but opens the gateway for political vulnerability.
Boko Haram was able to politically corrupt the Nigerian government by gaining a position of power. “A known senior member of Boko Haram, Late BojuFoi, was actually appointed a commissioner by former Governor Ali Modu Sheriff.” (Vaaseh, 407) The people of Nigeria now had more to fear than the current economic and social conditions. Political figures were now making promises to Boko Haram to provide support to “facilitate the actualization of their ideology.” (Vaaseh, 409)
The increased frustration of Boko Haram only led to more acts of violence. However, the target of Boko Haram’s aggression now turned more toward Nigerian security forces. Vaaseh explains “the inability of the politicians to keep to their promise of monthly salaries to the members angered them and the insurgents reacted severely by attacking security agents.” Boko Haram has used these political conditions to spread its ideology but has also capitalized off the lack of education throughout Nigeria proper. “In contemporary Nigeria, most, if not all, of the existing militant organizations are made up of a large percentage of uneducated and unemployed people who express frustration by the existing unbalanced structure of governance in the Nigerian federation.” (Vaaseh, 406)In an attempt to deal with these frustrations, Nigeria decided to form an organization called the Odua People’s Congress (OPC). However, the efforts to mitigate these frustrations ended in violent actions to pursue the organization’s objectives. Perhaps this is mere coincidence, but it more likely provides insight into the validity of Frustration-Aggression Theory and political/social violence within Nigeria.
There are many different manifestations of terrorism that emerge due to religious and ideological beliefs. In this form of extreme behavior, Boko Haram has been able to convince some of Nigerian society that the government is to blame for the overall social instability. “A number of them also blame the Nigerian Federal Government for poverty in the Northeast, thereby popularizing the idea that Boko Haram represents a symbol of the North’s struggle against political and economic marginalization.” (Ani and Ojakorotu, 20) This frustration has not only bred inequality amongst regional Nigerians but also deep psychological frustrations.
As the people continue to experience the economic and political frustrations of Boko Haram, they also experience their own psychological frustrations. Boko Haram has created a society in which people live in fear. “The populace had been deprived of their means of livelihood and this has become frustrating, resulting in aggression.” (Iyekekpolo, 2215) The people do not have the political and economic stability to combat Boko Haram. A vicious spiraling down cycle continues.
Boko Haram continues to launch attacks to intimidate the government and its citizens. The people of Nigeria attempt to live a normal life. However, the second and third order effects of Boko Haram’s terror impact daily living. “On 16 June 2011, the police headquarters in the capital Abuja was bombed, leading to a city-wide curfew.” (Elden, 416) This curfew was established to protect the Nigerian people and allow Nigerian forces to combat Boko Haram’s attacks. So, while Nigeria continues to strive for peace, education, and hope, the methods used can sometimes also become social chains that bind and constrain them.
Evaluation of Frustration-Aggression Theory
Frustration-Aggression Theory has been applied to explain the behaviors of foreign policymakers and those experiencing the violent attacks of Boko Haram. First, applying the Frustration-Aggression Theory framework, it can be hypothesized that foreign policymakers will be less likely to resort to violence towards Boko Haram. Therefore, not able to rely on external positive interference, Nigerians may also resort to alternative means to stop the spread of Islamic extremism due to their justified frustration with Boko Haram’s behavior and no formal governmental success in hindering it.
There are limitations to Frustration-Aggression Theory to consider, such as not all frustration breeds aggression. This study is also limited to evaluating extreme cases of frustration (i.e. corruption, terrorism). This theory is only used to evaluate Boko Haram and those influenced by the insurgency. Further application of this theory would research how Boko Haram perceives Western education as a threat to religious beliefs. Examination would include how Boko Haram exploits religious beliefs to gain sympathy to recruit members. Frustration-Aggression Theory could utilize the underlying frustration of religious intolerance and perceived colonization by the West to breed aggression.
Frustration-Aggression Theory provides knowledge and insight into the decision-making process of Boko Haram but also political members and citizens of Nigeria. Furthermore, it is imperative to recognize how Boko Haram knew such violent tactics would work. Understanding the efficacy of terrorism tactics can arguably shed light on producing new insights and new counter-measures that might lessen extremism on the ground and provide everyday Nigerians more of a fighting chance to create a stable and secure life amidst the chaos.
Kleptocracy Under Democracy
Power comes with dire consequences if it is misemployed. Great minds orchestrate a great nation but a corrupt mind razes...
A New Boost for Fiscal Federalism in Nepal
The World Bank has renewed support to the Government of Nepal to strengthen the country’s efforts towards fiscal federalism and...
Iraq corruption menaces both average citizens and outside investors
While Iraqi forces are still undertaking the slow, grueling effort to defeat the last vestiges of the Islamic State (IS),...
How to measure blockchain’s value in four steps
To help organizations identify the value of blockchain technology and build a corresponding business case, the World Economic Forum, the...
IRENA and RES4Africa Partner to Accelerate Renewables in Africa
IRENA and the RES4Africa Foundation have agreed to cooperate to increase the speed of renewable energy development in Africa in...
Ursula von der Leyen presents her vision to MEPs
In a debate with MEPs, Ursula von der Leyen outlined her vision as Commission President. MEPs will vote on her...
Military Modernization of ASEAN States: The New Agenda
The discourse about the international security and defense affairs have always been impregnated with the dynamics of security dilemma. Even...
Intelligence3 days ago
Tension in the Gulf: Not just maritime powder kegs
Middle East1 day ago
Turkey Will Get a Chunk of Syria: An Advantage of Being in NATO
Travel & Leisure3 days ago
10 Instagram Worthy Spots in Kuala Lumpur
Intelligence2 days ago
Omani national security and the kind of political and military cooperation with the United States
EU Politics2 days ago
Parliament decides on new Commission President
Newsdesk2 days ago
Academic Seminar Europe Goes Silk Road through Armenia Took Place in Yerevan
East Asia2 days ago
Ecology and productivity in today’s China
Middle East2 days ago
Where is the end of Iran Nuclear Crisis?