Nigeria -U.S cooperation on counterinsurgency: a critical examination of the structures and dimensions of U.S technical aid to Nigeria

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Terrorism and measures to countering it has been a major challenge to the country worst hit by the menace. The attention of the international community has focused on countering extremism in the North-East region of Nigeria ever since. This paper evaluates the Nigeria- US cooperation on counterinsurgency with emphasis on the structures and dimensions of the latter’s technical aid to the former. The paper also highlights the importance of collaboration and cooperation with other countries to contain insurgency, albeit concerted efforts from both parties. However, the paper was apt to point that technical aid of whatever variant is insufficient and barely enough to decimate insurgency as such, more often than not progress in such cooperative relations is always at the whims and caprices of the donor or giver nation. It recommends that, a country’s pursuit of a robust counterterrorism strategy must have some local panache interlaced with external input.



  • Keywords

    Nigeria-US Cooperation; Counterinsurgency; Examination of the Structures and Dimensions; US Technical Aid.

  • References

      [1] Azam, J. & Delacroix, A. (2006), Aid and the Development Fight Against Terrorism. Review of Development Economics, 10 (2), 330 – 374.

      [2] Azam, J. & Thelan, V. (2010): Foreign Aid versus Military Intervention in the War on Terror. Journal of Conflict Resolution, 54 (2), 237 – 261.

      [3] BandyoPabhya, S. Sandler & Younas, J. (2009), Foreign Aid as Counter-Terrorism Policy, St. Louis: Federal Reserve Bank Press.

      [4] Bapat, N. (2005), Insurgency and the Opening of Peace Processes, Journal of Peace Research, 42, 699 – 717.

      [5] Boese, W. (2007), U.S Pakistani Arms Pipelines Stays Open, Arms Control Today. Retrieved from on the 20th of August 2013.

      [6] Brzezinski, Z. (1997): Interview with Dr. Zbegniew Brzezinski, Retrieved from

      [7] Bueno De-Mesquita, B. & Smith, A. (2007), Foreign Aid and Policy Concessions, Journal of Conflict Resolution, 5 (2), 251 – 284.

      [8] Bush, G. (2003), President Bush Releases Combating Terrorism, Retrieved from

      [9] Cordesman, A. (2010), International Cooperation in Counterterrorism: Redefining the Threat and the Requirement. London: Centre for Strategic and International Studies.

      [10] Country Reports on Terrorism (2008): Terror Attack in Northern Nigeria, Retrieved from

      [11] Cronin, A. (2009), Ending Terrorism: Lessons for Policy Makers from the Decline and Demise of Terrorism Groups. London: Routledge.

      [12] Fearon, J. & Laitan, D. (2003), Ethnicity, Insurgency and Civil War, America Political Science Reviews, 97 (1), 75 – 90.

      [13] Friedman, A. (1993), Spider’s Web: The Secret History of how the White House Illegally Armed Iraq. Baritan Books, 3, 24 – 26.

      [14] Haas, R. (2010): We are not winning. It’s not worth it. Newsweek, 18, 45 – 57.

      [15] Hegre, H. & Nicholas, S. (2004), Sensitivity Analysis on Civil War Onset, Journal of Conflict Resolution, 50 (4), 508 – 535.

      [16] Hirvonen, P. (2005), Stingy Samaritans, Why Recent Increases in Development Aid Fail to Help the Poor. Global Policy Forum, 2, 67 – 82.

      [17] History Commons (2007), 1986 – 1992: CIA and British Recruit and Train Militants Worldwide to Help Fight Afghan War. Retrieved from

      [18] Jones, S. & Libicki, M. (2008), How Terrorist Groups and Lessons for Countering Al-Qaeda.

      [19] Joseph, R. (2014), Nigeria Pathways: Forward Stability, Security, and Democratic Development, Africa Plus, 2, 68 – 78.

      [20] Kruegar, A. &Maleckova, J. (2003), Education, Poverty and Terrorism: Is There a Causal Connection? Journal of Economic Perspective, 17 (4), 119 – 144.

      [21] Lake, D.A. (1999), Entangling Relations: America Foreign Policy in its Century, Princeton: Princeton University Press.

      [22] Lantigua-Williams, J. (2012), Nigeria’s Stability, Critical to U.S. Retrieved from

      [23] Long, D. (2008), Countering Asymmetrical Warfare in the 21st Century: A Grand Strategic Vision.

      [24] Macleod, H. (2009), Al-Qaeda: U.S Support to Attack. Retrieved from

      [25] Meehan (2012): Global Terrorism and Peace, Retrieved from

      [26] Mudasiru, S.O. (2011), Understanding the Dimensions of the New Face of Terror: A Political Economy of Africa Terrorist Group. Journal of Constitutional Development, 11(4), 34 – 110.

      [27] Okemi, M.E. (2013), Boko Haram: A Religious Sect or Terrorist Organization, Lagos: Macmillian.

      [28] Opalo, K. (2014), American Military’s Expansion to the Continent Poses Significant Challenges to Democratization Domestic Security. Retrieved from

      [29] Schudel, C. (2008), Corruption and Bilateral Aid: A Dyadic Approach. Journal of Conflict Resolution, 52 (4), 507 – 526.

      [30] Shah, A. (2014): Foreign Aid for Development Assistance, Retrieved from

      [31] Stohl, R. (2008), Questionable Reward: Arms Sales and the War on Terrorism. London: Prentice Hall.

      [32] Svesson, J. (2000), Foreign Aid and Rent-Nation, Economics, 51 (2), 437 – 461.

      [33] The Guardian (2013): Challenges of Terrorism in Nigeria, Retrieved from

      [34] The Nation (2015): Counterterrorism in Nigeria, Prospect and Challenge. Retrieved from

      [35] Woodward, B. (2010), Obama Wars, New York: Simon and Schuster.

      [36] Yusuf, H.O. (2011), Rule of Law and Politics of Anti-Corruption Reform in a Post-Authoritarian State – The Case of Nigeria. King’s Law Journals, 3, 45 – 62.

  • The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

    If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

    Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.




Article ID: 30426
DOI: 10.14419/jsc.v2i1.30426

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.