Negotiating with the Bandits and Endless Security Challenges in Katsina State, Nigeria (2019-2020)
DOI:
https://doi.org/10.21580/jsw.2021.5.1.7232Keywords:
negotiation, armed banditry, kidnapping, cattle rustling, security challengesAbstract
The activities of criminals have been on the rise and the security situation deteriorated after negotiations between the State Government and the criminals in Nigeria. This paper assesses the context of armed banditry, cattle rustling, and kidnappings in Katsina State. The researchers adopted a cross-sectional study design and explanatory research type. A field survey was conducted in Batsari town and two villages: Zamfarawa and Bakiyawa. In-Depth Interviews (IDI) were conducted with some residents of the villages and some armed bandits. A non-probability sampling and snowballing technique were adopted to sample the research participants for the interviews. The study found that the Katsina State Government has not understand fully the security challenge and hence identified the wrong leaders of the criminals for negotiation, this is because there are three categories of criminals in the areas. This incensed some of the groups of criminals to intensify their attacks, kidnapping, and the rustling of livestock.
Downloads
References
Abasa, Africano, Carolyn Halladay, and Florina Cristiana Matei. 2015. “Ungoverned Spaces and the Survival of Terrorist Groups in Africa: A Case Study of the Lord’s Resistance Army.” Naval Postgraduate School Monterey, California.
Adetula, Victor, Tim Murithi, and Stephen Buchanan-Clarke. 2018. Peace Nego¬tiations and Agreements in Africa – Why They Fail and How to Improve Them. Uppsala: The Nordic Africa Institute.
Anderlini, Sanam Naraghi. 2004. “Peace Nego¬tiations and Agreements.” Pp. 16–32 in Inclusive Security, Sustainable Peace: A Toolkit for Advocacy and Action (2) - Con¬flict Prevention, Resolution and Reconstruction. London: International Alert, The Initiative for Inclusive Security - Women Waging Peace.
Babbie, Earl R. 2013. The Basics of Social Research. Boston, MA: Cengage Learning.
Barltrop, Richard. 2008. “The Negotiation of Security Issues in the Burundi Peace Talks.” Centre for Humanitarian Dialogue, Country Study (1).
Brandt, Patrick T., Justin George, and Todd Sandler. 2016. “Why Concessions Should Not Be Made to Terrorist Kidnappers.” European Journal of Political Economy 44:41–52. doi: 10.1016/j.ejpoleco.2016.05.004.
Center for Security Studies. 2013. “Kidnapping for Ransom as a Source of Terrorism Financing.” CSS Analysis in Security Policy 141, 1–4.
Counter-Terrorism and Security Bill. 2014. Factsheet–Part 6 Clause 34–Kidnap and Ransom 1-2.
Cronin, Audrey Kurth. 2010. “When Should We Talk to Terrorists?” Special Report 240: 1-16. Retrieved (https://www.usip.org/publications/2010/05/when-should-we-talk-terrorists).
Cunningham, Kathleen Gallagher, and Katherine Sawyer. 2019. “Conflict Negotiations and Rebel Leader Selection.” Journal of Peace Research 56(5):619–34. doi: 10.1177/0022343319829689.
Dutton, Yvonne M. 2016. “Funding Terrorism: The Problem of Ransom Payments.” Digital USD - University of San Diego. Retrieved (https://digital.sandiego.edu/sdlr/vol53/iss2/4/).
Echeverría Jesús, Carlos. 2013. “Kidnappings as a Terrorist Instrument of AQIM and the MUJAO.” Paix et Securite Internationales (1):161–66. doi: 10.25267/Paix_secur_int.2013.i1.11.
Faure, Guy Olivier. 2008. “Negotiating with Terrorists: A Discrete Form of Diplomacy.” The Hague Journal of Diplomacy 3(2):179–200. doi: 10.1163/187119108X321512.
Felbab-brown, Vanda. 2020. Bargaining with the Devil to Avoid Hell? A Discussion Paper on Negotiations with Criminal Groups in Latin America and the Caribbean. Barcelona: Institute for Integrated Transitions.
Financial Action Task Force. 2011. “President’s Summary of Outcomes from the Expert’s Meeting on Corruption.” FATF 34.
Hansen, Susan. 2003. “High Net Worth Families, Kidnapping Risk.” Trusts & Estates 35.
Heger, Lindsay L., and Danielle F. Jung. 2017. “Negotiating with Rebels.” Journal of Conflict Resolution 61(6):1203–29. doi: 10.1177/0022002715603451.
Hofmann, Claudia. 2012. “Reasoning with Rebels. International NGOs’ Approaches to Engaging Armed Groups.” SWP Research Paper 1–28. Retrieved (https://www.swp-berlin.org/en/publication/ingos-approaches-to-engaging-armed-groups/).
Hyatt, Rodney, Lauren Fernandez, and John Rollins. 2016. “Granting Concessions and Paying Ransoms to Terrorists: A Policy Options Analysis of the U.S. Policy on Hostage Recovery.” Naval Postgraduate School Monterey, California.
International Institute for Applied Systems Analysis. 2009. “Negotiating with Terrorists: A Mediator’s Guide.” IIASA - Policy Brief 6:1–4. Retrieved (https://iiasa.ac.at/web/home/resources/publications/IIASAPolicyBriefs/pb06.html).
Meier, Anna. 2018. “Bargaining as a Process of Legitimation: A Theory of State–Terrorist Negotiations.” in ISA 2018.
Mellon, Christopher, Peter Bergen, and David Sterman. 2017. “To Pay Ransom or Not to Pay Ransom? An Examination of Western Hostage Policies.” International Security, January 8.
Munyua, David O. 2015. “Ungoverned Spaces and Armed Civil Conflicts: The Predicament of Developing Nations.” Naval Postgraduate School Monterey, California.
Peel, Michael. 2017. “Islamist Militant Piracy Troubles Philippines.” Financial Times. Retrieved (https://www.ft.com/content/0f23b6aa-eeb3-11e6-930f-061b01e23655).
Shortland, Anja, and Keatinge Tom. 2017. “Closing the Gap: Assessing Responses to Terrorist-Related Kidnap-for-Ransom.” RUSI Occasional Paper 1–32.
The Telegraph (UK). 2007. Byline: Massoud Ansari in Kila Abdullah, Pakistan. London: Telegraph.
Wanis-St. John, Anthony. 2008. “Peace Processes, Secret Negotiations and Civil Society: Dynamics of Inclusion and Exclusion.” International Negotiation 13(1):1–9. doi: 10.1163/138234008X297887.
Downloads
Published
Issue
Section
License
The copyright of the accepted article shall be assigned to the journal as the publisher of the journal. The intended copyright includes the right to publish the article in various forms (including reprints). The journal maintains the publishing rights to the published articles.
In line with the license, authors and any users (readers and other researchers) are allowed to share and adapt the material. In addition, the material must be given appropriate credit, provided with a link to the license, and indicated if changes were made. If authors remix, transform, or build upon the material, authors must distribute their contributions under the same license as the original.