WeCreativez WhatsApp Support
Welcome to Projects Ng Support
if you need help simply reply to this message, we are online and ready to help.

WEAPONS TECHNOLOGY AND INTERNAL SECURITY PROVISIONING IN NIGERIA

About This Project

Download the complete Political science topic and material (chapter 1-5) titled WEAPONS TECHNOLOGY AND INTERNAL SECURITY PROVISIONING IN NIGERIA here on PROJECTS.ng. See below for the abstract, table of contents, list of figures, list of tables, list of appendices, list of abbreviations and chapter one. Click the DOWNLOAD NOW button to get the complete project work instantly.

 

PROJECT TOPIC AND MATERIAL ON WEAPONS TECHNOLOGY AND INTERNAL SECURITY PROVISIONING IN NIGERIA

The Project File Details

  • Name: WEAPONS TECHNOLOGY AND INTERNAL SECURITY PROVISIONING IN NIGERIA
  • Type: PDF and MS Word (DOC)
  • Size: [4683KB]
  • Length: [327] Pages

 

ABSTRACT

The re-emergence of civilian rule in Nigeria in May 1999 was accompanied by increasing internal security (IS) challenges which have been limiting internal security provisioning (ISP) in Nigeria.  Some of the IS challenges include armed robbery, kidnapping, oil bunkering, ethno-religious conflicts, and terrorism.  These crimes have been mostly aided by small arms and light weapons (SALW).  It was perceived that while much attention is focussed on external sources, internal sourcing of SALW, through clandestine acquisition and application of weapons technology (WT), couples with inadequate regulation of local fabrication and circulation of SALW to aid rising IS challenges in Nigeria.  The study therefore investigated the contribution of applied WT to ISP in Nigeria, focussing on the former Eastern Region of Nigeria.

 

The study adopted triangulation design. The target population for investigation was 10,224,161 people (based on 2006 National Population Census) drawn from five selected states of the former Eastern Region of Nigeria, who were within the age range of 20 to 79 years. Purposive sampling technique was adopted to select five of the states (Abia, Akwa Ibom, Anambra, Imo, and Rivers) because of prevalence of the investigated problem.  The sample size of 2,800 respondents was determined, using purposive sampling. In-depth interviews and focus group discussions were adopted for collecting qualitative data. A validated questionnaire was used to collect quantitative data. Cronbach’s alpha reliability coefficients for the constructs in the questionnaire were: WT (0.727) and ISP (0.604). The response rate was 66.5%.  The quantitative data were analysed using descriptive and inferential statistics while the qualitative data were content-analysed.

 

Findings from quantitative data revealed that illegal local fabrication of weapons significantly contributed to weapons proliferation in Nigeria (R2=0.022, p˂0.05) and WT significantly affected ISP in Nigeria (R2=0.010, p˂0.05).  Findings from qualitative data revealed that the government and people of Nigeria possessed assorted WT, acquired through collaboration with foreign weapons industries, reverse engineering, and mentorship, and applied in fabricating high-grade weapons.  People of different social statuses were engaged in illicit fabrication of weapons.  Illicit fabrication and racketeering of SALW were male-dominated; the IS condition of Nigeria tangibly determined who got involved in the acts.  The government applied multiple strategies like legal prohibition, arrest, prosecution, and punishment of convicts to regulate WT and weapons, but has often precluded identifying with, co-opting, and upgrading local fabricators of weapons in Nigeria.

 

The study concluded that illegal possession and application of WT constituted a high-risk factor to ISP in Nigeria.  The study recommended improved regulation of WT and SALW for improvement of ISP in Nigeria. Investigation for regulation of WT and weapons should include every category of people in the society, with emphases on the male gender. In addition to the strategies applied for regulating WT in the country, the government should consider careful identification and co-option of the local fabricators of weapons, upgrading their operational platforms through training and equipment, and employing them for improvement of Nigeria’s local technology base and armament supplies.

 

Keywords:     Internal security, Internal security management, Internal security provisioning, Security, Weapons technology

Word Count: 486

TABLE OF CONTENTS

Content                                                                                                                               Page

 

Title Page                                                                                                                                                              i

Certification                                                                                                                                                    ii

Dedication                                                                                                                                                          iii

Acknowledgments                                                                                                                                          iv

Abstract                                                                                                                                                           vi

Table of Contents                                                                                                                                       vii

List of Tables                                                                                                                                      x

List of Figures                                                                                                                                    xiii

Acronyms                                                                                                                                            xiv

Appendices                                                                                                                                                 xvii

 

CHAPTER ONE: INTRODUCTION                                                                                1

1.1          Background to the Study                                                                                                                1

1.2          Statement of the Problem                                                                                                           4

1.3          Objective of the Study                                                                                                  5

1.4          Research Questions                                                                                                                        5

1.5          Hypotheses                                                                                                                                        6

1.6          Justification for the Study                                                                                                              6

1.7          Scope of the Study                                                                                                                          7

1.8          Operational Definition of Terms                                                                                                  9

1.9          Research Report Outline                                                                                                              10

 

CHAPTER TWO: REVIEW OF LITERATURE                                        11

2.1          Introduction                                                                                                                                       11

2.2          Conceptual Model                                                                                                                           11

2.3          Internal Security (IS) of Eastern Nigeria and the Nigerian State               40

2.4          Causes of Internal Insecurity in Nigeria                                                                  68

 

Content                                                                                                                               Page

 

2.5          National Government’s Mechanisms of Internal Security

Provisioning (ISP) and Internal Security Management (ISM)                         72

2.6          The Citizenry’s Means of Internal Security Provisioning (ISP) and

Internal Security Management (ISM)                                                                                109

2.7          Theoretical Framework                                                                                           115

2.8          Gaps in Literature                                                                                                                      133

 

CHAPTER THREE: OVERVIEW OF WEAPONS

TECHNOLOGY (WT) AND PROLIFERATION OF

SMALL ARMS AND LIGHT WEAPONS (SALW)

IN NIGERIA                                                                                                           136

3.1          Introduction                                                                                                                                136

3.2          Weapons Technology in Pre-independence Nigeria                                                  136

3.3          Weapons Technology in Post-independence Nigeria                                                142

3.4          Evidences of Progress in Weapons’ Technology Development and

Circulation in the Post-civil-war Years                                                               150

3.5          Modes of Acquisition, Circulation, and Application of Weapons

Technology in Nigeria                                                                                              154

3.6          Implications of Advancement of Weapons Technology and

Proliferation of Small Arms and Light Weapons (SALW) for Internal

Security (IS) in Nigeria                                                                                             158

 

CHAPTER FOUR: METHODOLOGY                                                                   164

4.1          Introduction                                                                                                                       164

4.2          Research Design                                                                                                               164

4.3          Population                                                                                                                                   165

4.4          Samplesize and sampling Technique                                                                                166

4.5          Instrumentation                                                                                                                        170

4.6          Reliability and Validity of Instrument                                                                170

4.7          Data Collection Procedure                                                                                                    172

Content                                                                                                                               Page

 

4.8          Method of Data Analysis                                                                                                       176

4.9          Ethical Considerations                                                                                             179

4.10        Limitations of the Research Methodology                                                            182

 

CHAPTER FIVE: DATA ANALYSIS, RESULTS, AND

DISCUSSION OFFINDINGS                                                                                      183

5.1          Introduction                                                                                                                                183

5.2          Data Presentation                                                                                                                    183

5.3          Analysis of Field Data                                                                                              209

5.4          Discussion of Findings                                                                                             226

 

CHAPTER SIX: SUMMARY, CONCLUSION, AND

RECOMMENDATIONS                                                                                                238

6.1          Introduction                                                                                                                                238

6.2          Summary                                                                                                                                      238

6.3          Conclusion                                                                                                                                   245

6.4          Recommendations                                                                                                                   246

6.5          Contribution to Knowledge                                                                                                  249

6.6          Suggestions for Further Research                                                                                      251

6.7          Limitation of the Study                                                                                           251

 

REFERENCES                                                                                                                                        254

 

APPENDICES                                                                                                                                        278

LIST OF TABLES

 

Table                                                                                                                         Page

 

2.1       Post-independence Evidences of the Use of IS-Ops in ISM in Nigeria        25

2.2       2006 to 2008 Annual Estimates of Rates of Occurrence of Homicides

and Suicides in Nigeria                                                                                   42

2.3       Statistics of Occurrence of Armed Robbery, Kidnapping and other

Related Crimes in Nigeria, 2000 to 2008                                                       59

2.4       Various Attacks by the Boko Haram Sect, 2009-2012                                  60

2.5       Crime rates in Nigeria, June 2006 to September 2015                                    66

2.6       Some of Nigerian Government’s International Involvements in

Support of Limitation of Proliferation of SALW in its Fourth Republic       79

2.7       Penalties against Contravention of the Provisions of Nigerian

Firearms Act                                                                                                 102

3.1       Some Cases of Arrested Illegal Local Arms Producers across Nigeria,

2006 – 2011                                                                                                  148

3.2       Craft-produced Guns in Awka                                                                     154

3.3       Types of Weapons Technology in Nigeria, their Grades, and Products      163

4.1       Study and Target Populations of the States in the Area of Study               166

4.2       State-based Geographical Sampling Frame of the Study                             166

4.3       Town and Village based Geographical Sampling Frame of the Study        167

4.4       Sampling frame for human elements of the target population                      169

4.5       Field Data for Test of Reliability                                                                  324

4.6       Model Table for Presenting Statistics of Rate of Return of Questionnaire  177

5.1       Combined Rate of Return of Copies of the Distributed Questionnaire        184

5.2       Rate of Return of Valid Questionnaire Copies and Characteristics

of the Respondents among the Internal Security Agencies of the States

in the Area of Study                                                                                     186

5.3       Rate of Return of Valid Questionnaire Copies and Characteristicsofthe

Respondents among the Locals of the States in the Area of Study              187

5.4       Combined Bio Data on Age, Education, and Duration of Residence

of the Research Participants in their Various Localities                               188

Table                                                                                                                         Page

 

5.5       The Types of WT and Weapons that Exist in theArea of Study                  285

5.6       How the Available WT and Weapons are Acquired, Circulated, and

Used in the Area of Study                                                                            287

5.7       Traits/Peculiarities of the Local Craft-fabricators of Weapons in the

Area of Study                                                                                               292

5.8       Effects of Circulation of WT and Weapons on the State of IS in

the Area of Study                                                                                         294

5.9       How Nigerian Government Regulates Acquisition and Use of WTand

Weapons within the Country                                                                        296

5.10     Challenges of Controlling the Circulation of Weapons and WT

alongside Their Effects on Public Safety in the Area of Study                   299

5.11     How the Identifiable Interplay(s) between Circulation of Weapons and

WT can be Managed to Stem their Deleterious Consequences on the IS

of the Area of Study                                                                                     304

5.12     The Types of WT and Weapons that Exist in the Area of Study                 309

5.13     How the Available WT and Weapons are Acquired, Circulated, and

Used in the Area of Study                                                                            311

5.14     Traits/Peculiarities of the Local Craft-fabricators of Weapons in

the Area of Study                                                                                         314

5.15     Effects of Circulation of WT and Weapons on the State of IS inthe

Area of Study                                                                                               315

5.16     How Nigerian Government Regulates Acquisition and Use of WT and

Weapons within the Country                                                                        316

5.17     Challenges of Controlling the Circulation of Weapons and WT

alongside Their Effects on Public Safety in the Area of Study                   318

5.18     How the Identifiable Interplay(s) between Circulation of Weapons and

WT can be Managed to Stem their Deleterious Consequences on the IS

of the Area of Study                                                                                     320

5.19     Data on the Types of WT and Weapons that Exist in theArea of Study     199

5.20     Data on How the Available WT and Weapons are Acquired, Circulated,

and Used in the Area of Study                                                                     200

 

Table                                                                                                                         Page

 

5.21     Data on the Traits or Peculiarities of the Local Craft-fabricators of

Weapons in the Area of Study                                                                     200

5.22     Data on the Effects of Circulation of WT and Weapons on the State of IS

in the Area of Study                                                                                     201

5.23     Data on How Nigerian Government Regulates Acquisition and Use of

WT and Weapons within the Country                                                          201

5.24     Data on the Challenges of Controlling the Circulation of WT and

Weaponsalongside their Effects on Public Safety in the Area of Study     202

5.25     Data on How the Identifiable Interplays between Circulation of WT

and Weapons can be Managed to Stem their Deleterious Consequences

on the IS of the Area of Study                                                                     203

5.26     Comprehensive Data from the Valid Questionnaire Copies Retrieved

from the Field                                                                                               322

5.27     Summary of the Tests of the Contribution of Illegal Local Craft-

Production of Weapons to Proliferation of Weapons in Nigeria                  225

5.28     Summary of the Tests of the Effects of WT on ISP in Nigeria                    226

 

 

LIST OF FIGURES

 

Figure                                                                                                                                    Page

 

2.1       Crime fatalities per state in 2016                                                                                66

2.2       Crime rates in Nigeria (homicides per 100,000 inhabitants, June 2006 and

31st June 2011)                                                                                                            68

 

 

APPENDICES

 

Appendix

I               Informed Consent Form

II             Interview Guide

III            Questionnaire for the Study

IV            The Types of WT and Weapons that Exist in the Area of Study

V             How the Available WT and Weapons are Acquired, Circulated, and Used in the Area of Study

VI            Traits/Peculiarities of the Local Craft-fabricators of Weapons in the Area of Study

VII          Effects of Circulation of WT and Weapons on the State of IS in the Area of Study

VIII         How Nigerian Government Regulates Acquisition and Use of WT and Weapons within the Country

IX            Challenges of Controlling the Circulation of Weapons and WT alongside their Effects on Public Safety in the Area of Study

X             How the Identifiable Interplay(s) between Circulation of Weapons and WT can be Managed to Stem their Deleterious Consequences on the IS of the Area of Study

XI            The Types of WT and Weapons that Exist in the Area of Study

XII           How the Available WT and Weapons are Acquired, Circulated, and Used in the Area of Study

XIII         Traits/Peculiarities of the Local Craft-fabricators of Weapons in the Area of Study

XIV         Effects of Circulation of WT and Weapons on the State of IS in the Area of Study

XV          How Nigerian Government Regulates Acquisition and Use of WT and Weapons within the Country

XVI         Challenges of Controlling the Circulation of Weapons and WT alongside Their Effects on Public Safety in the Area of Study

 

 

Appendix

 

XVII        How the Identifiable Interplay(s) between Circulation of Weapons and WT can be Managed to Stem their Deleterious Consequences on the IS of the Area of Study

XVIII      Comprehensive Data from the Valid Questionnaire Copies Retrieved from the Field

XIX         Field Data for Test of Reliability

XX           Relics of the Products of the Biafran War Machine, 1967 – 1970

 

CHAPTER ONE

INTRODUCTION

 

1.1       Background to the Study

Technical know-how for construction of weapons, either by means of handcrafting or through industrial production, is the most significant cause of massive availability and proliferation of small arms and light weapons (SALW) in the world.  The latter inversely correlates with internal security (IS) of most countries.  As weapons technologies (WTs) increase in sophistication and circulation, so do the production and circulation of SALW and their ammunitions to and fro “legitimate” and “illegitimate” handlers.  Thus, development, improvement, dispersal, and use of WTs have remained double-edged swords: The resultant weapons often simultaneously provide security and insecurity, across human societies.  As weapons are used to protect lives and properties, and to ensure safe environments for people to live and function in, so are they sometimes used to destabilize the society, making it unsafe for human habitation and functionality.  The people in possession of WTs and their products at any time often strongly determine the roles that WTs and weapons play in the society: While “legitimate” possessors may use them to protect the society and its elements, “illegitimate” possessors often use them to cause havoc in the society (Okafor, Okeke & Aniche, 2012; Chuma-Okoro, 2011).

Since the earliest incidence of WTs and crafting in human societies, weapons (especially SALW) have often been handled by “legitimate” and “illegitimate” users.  All efforts made by state authorities to regulate possession and use of WTs and weapons have often been tangibly undermined.  In some societies, circulation of WTs and weapons has been very minimal while in many others, it has been very severe (Edeko, 2011; Small Arms Survey, 2007).  With only a few countries (including but not limited to Britain, China, and France) being able to reasonably control indiscriminate circulation of WTs and weapons, only the said few have been able to achieve relative IS and peace that is reasonable; such countries mainly include the developed countries of the world.  The developing countries like most of the Asian and African countries often face lots of violent internal conflicts and crises emanating from inadequate regulation of WTs and weapons (Edeko, 2011; Abdel-Fatau, 2004).

In this era of highly globalised world, the Internet and the associated social media have often been used to circumvent the regulation of WTs more than ever before.  Massive transmission of information through the Internet and the social media have unduly enhanced circulation of WTs thereby preventing them from being exclusive preserves of the military industry and government security agencies.  With the Internet, any technical enthusiast can now easily access blueprints of weapons building or related resource documents.  In addition to that, interested person(s) can receive technical supports from many online sources.  With these factors in place, local craftsmen now have the opportunity of improving on their skills of craft-production of weapons.  Also, opportunities now exist for them to try out newer methods of fabrication of their regular and ‘newer’ weapons.  Consequently, interested craftsmen everywhere in the world have either learnt, or developed their already acquired, art of weapons fabrication and have been producing SALW for various reasons and purposes (Onuoha, 2006 cited in Edeko, 2011).  This situation has progressively contributed to geometric rise in IS challenges, which have often been underreported, for many countries (Small Arms Survey, 2007).

The types of weapons most frequently used to destabilize IS of many societies are not those originally known as weapons of mass destruction – nuclear and atomic bombs, biological and chemical weapons.  Rather the most destructive weapons since the demise of the Cold War have been the SALW.  This is because of the relative ease with which they can be produced, moved or carried, proliferated, and operated (Nte, 2011; Obuoforibo, 2010; UN Document A/52/228, 27 August, 1997).  Proliferations of these weapons sourced through trade, local crafting, reverse engineering, theft, renting, and all sorts of illegal supplies, have been on the rise.  The rapid and unwanted circulation of SALW has reached alarming rates in many Third World countries, especially since the end of the Cold War.  Thus, there have been rising cases of internal insecurity in the developing parts of the world since the collapse of the Soviet Union (1989 to 1991).  The countries worst hit by the said phenomena have been the badly divided societies which are faulted along ethnic, religious, economic, and political cleavages like Nigeria.

In spite of the fact that SALW do not necessarily cause conflicts, their massive availability promotes fresh engagement in and or sustenance of existing violent contentions.  They have been the tools for executing various kinds of violent crimes – armed robbery, political assassination, kidnapping or abduction, prison violation, petroleum pipeline vandalism, oil theft (bunkering), and intimidation of all kinds.  They have also served well in intergroup clashes like intra- and inter- ethnic conflicts in which violence is perceived to be necessary for successful intimidation and defeat of opponents (Religions for Peace, African Council of Religious Leaders, 2010).

All of the above IS challenges have been experienced and are still on-going in contemporary Nigeria.  In Nigeria, especially since the end of military rule in 1999, there has been increasing rates of weapons-related violence with attendant speculation of high rising circulation of SALW within the country.  These occurrences have been attributed to many factors like opportunistic venting of bottled-up vexations of the military era by various groups in Nigeria (Egbefo & Salihu, 2014; Albert, 2012), corruption of government officials (Orikpe, 2013; Adebakin and Raimi, 2012), and use of extreme violence by the government to quell internal crises (Adekunle, 2013; Babatunde; 2010; Omotola, 2010).  Other alleged causes include selfish attitudes of national politicians (Adebakin and Raimi, 2012; Kasali, 2011; Hazen & Horner, 2007); poor handling of sensitive conflict phenomena (Azinge, 2013; Thom-Otuya, 2009); fear and the need for personal and group security within the citizenry (Hazen and Horner; 2007); and ethnic, religious, and political intolerances (Dode, 2012; Sen, 1999).  Whatever the causes may have been, the incidence of the various forms of violent acts in Nigeria has been rising from strength to strength and from simplistic occurrences to very complex forms.  So, lives and property have been unprotected with stability unguaranteed in the country.  Internal security of Nigeria has been so threatened that the apparatuses of the state currently seem to be incapable of providing public safety for Nigeria and its citizenry.

As a corollary to the foregoing, then, one aspect of the national interests in which the Nigerian State has often failed to achieve its goals is in providing sustainable IS for its citizenry.  The worst experience with this national inability was the Nigerian Civil War, taking into account the various pre-1967 massacres and the worsening incidence of the war (1967 to 1970).  Being that proliferation and illegal use of SALW have been aiding IS challenges in Nigeria, this study sought to explore the contributions of WT to proliferation of SALW and the observed IS situations of Nigeria in order to contribute to making the country a safer society.

1.2       Statement of the Problem

The  re-emergence of civilian rule in Nigeria in May 1999, after about 30 intermittent years of military rule, was accompanied by a situation of ever increasing IS challenges which have been limiting internal security provisioning (ISP) in the country (Ogbuzor, 2011; Alozieuwa, 2010; Allen & Okeke-Uzodike, 2010; Ishaku, 2009).  Some of the IS challenges have included incessant crimes like armed robbery, kidnapping, oil bunkering, ethno-religious clashes, ethnic militia cum government clashes, politically motivated killings, government ordered genocide, indiscriminate murder of unarmed civilians by state security agents, proliferation of SALW, and acts of terrorism.

Interestingly, these IS problems have been highly aided by proliferation and indiscriminate use of SALW.  So, part of the efforts needed to limit IS challenges in the country include the need to discover and regulate the sources and circuits of SALW flow in Nigeria.  Consequently, many scholars (including Albert, 2014; Okeke & Oji, 2014; Bassey, 2012; Edeko, 2011; Badmus, 2010; Obuoforibo, 2010; Thom-Otuya, 2009; Harzen & Horner, 2007; Onuoha, 2006; Ikelegbe, 2005) have found that SALW are acquired through importation, illegal sales and renting by some unscrupulous citizens and IS agents, and various forms of loss to criminals.  Although these scholars also attest, in various degrees, to the existence of functional WTs in Nigeria serving as alternative sources of SALW used in crimes in the country, they often suggest that the consequent crafted weapons are highly inferior and infinitesimally circulated, and thus inconsequential to IS problems in Nigeria.  This latter perception seems to have usually diverted IS attention away from the possibility of viable alternative internal sourcing of weapons for limiting ISP in Nigeria.  Thus, the likely threat posed by local sourcing of weapons has often been underexposed, underestimated, and under emphasised.

Considering the recurrently intensifying incidence of violence in the country, it is evident that if the acquisition and application of WTs in Nigeria is further ignored, they can so much influence SALW-related violence as to bring the country into self-destruction.  Therefore, the problematic of this study was to critically interrogate the contributions of applied WTs in framing the conditions of ISP in Nigeria, with attempts to discover possible means of stemming the tide of multiple IS challenges, focusing on experiences from the former Eastern Region of Nigeria.

1.3       Objective of the Study

The main objective of the study is to explore the contribution of weapons technology (WT) to internal security provisioning (ISP) in Nigeria.  The specific objectives are to:

  1. determine the types, modes of acquisition, circulation, and use of available WT and weapons in the area of study;
  2. probe the traits or peculiarities of the local craft-fabricators of SALW in the area of study;
  3. investigate the effects of circulation of WT and weapons on the state of internal security in the area of study;
  4. explore the challenges of controlling the circulation of WT and weapons alongside their effects on the internal security of the area of study;
  5. examine Nigerian Government’s strategies of regulating weapons and WT within the country and
  6. deduce possible means of stemming the deleterious consequences of circulation of WT and weapons on the internal security of the area of study.

 

1.4       Research Questions

This research made use of seven queries as follows:

  1. What types of WT and weapons exist in the area of study?
  2. How are the available WT and weapons acquired, circulated, and used in the area of study?
  3. What are the traits or peculiarities of the local craft-fabricators of weapons in the area of study?
  4. What are the effects of circulation of WT and weapons on the state of internal security in the area of study?
  5. How does the Nigerian Government regulate acquisition and use of WT and weapons within the country?
  6. What are the challenges of controlling the circulation of weapons and WT alongside their effects on public safety in the area of study?
  7. How can the identifiable interplay(s) between circulation of weapons and WT be managed to stem their deleterious consequences on the internal security of the area of study?

 

1.5       Hypotheses

Ho1:      Illegal local craft-production of weapons does not significantly contribute to weapons proliferation in Nigeria;

Ho2:      WT does not have significant adverse effect on ISP in Nigeria.

 

1.5.1    Assumptions

Ao1:      Contemporary WT does not exist in Nigeria;

Ao2:      Competitively high-grade weapons are not locally crafted in Nigeria;

Ao3:      There are no motivating factors for acquisition of WT in Nigeria;

Ao4:      ISP and ISM in Nigeria are inadequate;

 

1.6       Justification for the Study

Contributing to remediation or, at least, containment of certain pressing IS challenges in Nigeria made this proposed study a worthwhile endeavour.  Part of the justification of this research is that it sought to contribute to possible limitation of the destructiveness and recurrence of the arms-related crises experienced in Nigeria.  The study was to achieve this target through additional fact-finding that could equip the national government, the security agencies, and the entire citizenry of Nigeria to handle the evolving IS challenges better.  For instance, some of the reviewed extant literature (including Onyeozili, 2005; Nwanolue & Iwuoha, 2012) made direct or indirect mention of the existence of WT in Nigeria and acknowledged that the said technology is used to fabricate weapons in Nigeria, making use of either crude or refined methods or both.  But these authors did not consider the question of how WTs are either acquired or spread in Nigeria.  Neither did they provide tangible information on how the illegal and legal craft-productions take place.  Moreover, without much concern, they mainly asserted the inferiority of locally produced weapons without much empirical verification.  Many of the authors did not explore the motivations for local production of weapons.  They merely acknowledged its existence, and mostly from secondary literature.  Thus, part of the significance of the study is that it provided fact-based information on how WT used in local craft production of weapons in Nigeria is being sourced and spread; the reality of the acclaimed inferiority of locally fabricated weapons, and the factors that encourage people to get involved in it.

The study contributed to extant knowledge in the area of the roles played by WT in framing the IS condition of Nigeria.  Many of the available literature on proliferation of weapons and its effects on IS in Nigeria (including Albert, 2014; Bassey, 2012; Badmus, 2010) did not try to explore the role of WT in determining the extent of proliferation of weapons and the state of IS in Nigeria.  In addition, many of the existing resource materials were composed from secondary sources, adapting a few concrete data from other previously existing literature, and thereby being more of rehashes of existing knowledge.  The study, therefore, went into more concrete research for current evidences on the technology behind local production of weapons, and to test the continuing relevance of the said extant literature.

 

1.7       Scope of the Study

Internal security (IS) issues in Nigeria cannot be adequately covered in a single research work.  Therefore, the research was limited to the following areas of concern, as evident in the statement of problem.

 

1.7.1    The Content/Subject Scope of the Study

The content or subject scope of the study consisted of issues relating to availability, acquisition, and use of weapons’ technology for local craft production of weapons in Nigeria alongside their effects on IS of the country.  This incorporated investigations into: The types of WT and weapons that exist in the area of study; the modes of acquisition, circulation, and application of WT in the area of study; the traits or peculiarities of the local craft-fabricators of weapons in the area of study; the possible relationships among application of WT in weapons building, proliferation of SALW, and the IS of Nigeria; factors that motivate people to quest for weapons in Nigeria; the challenges of controlling circulation of WT and weapons alongside their effects on public safety in the area of study; the national government’s mode of regulation of WT and weapons in Nigeria; and how the identifiable interplay(s) between circulation of WT and weapons could be managed to stem their deleterious consequences on the IS of the area of study.  Also, the study reviewed the IS situation of Nigeria with emphasis on the former Eastern Region of Nigeria, alongside the identifiable factors that condition the IS situation of the country.

 

1.7.2    The Periodic Scope of the Study

The periodic or time scope of the study is 1967 to 2016 (49 years).  This time frame was justified as follows.  The most radical application of WT in craft production of assorted types of weapons in Nigeria occurred between 1967 and 1970 when the Nigerian Civil War occurred.  The three years period (1967-1970) is a historical landmark of the highest display of technical and technological ingenuity in fabrication of weapons by Nigerian locals.  It was also the period of Nigeria’s greatest IS crisis with terrible losses of lives and property.  From 1970 to 1999, there was relatively infrequent occurrence of weapons related conflicts and violence within the country, but the IS challenges were not eliminated.  Moreover, from the inception of Nigeria’s Fourth Republic in 1999 to 2016, there were rising cases and frequency of arms-related violent conflicts in Nigeria.  In the face of the teeming IS challenges, the Nigerian Government seemed to be incapacitated, especially for the types and enormousness of weapons used in the contentions, even against the Nigeria State.  Consequently, emphasis was laid on the period from 1999 to 2016 (17 years), after reviewing the said periods of 1967-1970 and 1970-1999.

 

1.7.3    The Geographical Scope of the Study

The geographical scope of this study is the former Eastern Region of Nigeria, which currently consists of nine states: Abia, Akwa Ibom, Anambra, Bayelsa, Cross River, Ebonyi, Enugu, Imo, and Rivers states.  The principle of maximisation which was suggested by Morse and Field (1996) was applied in selecting the setting of the study.  Thus, the location for this study was determined by reason of the high degree of intensity of manifestation of the investigated phenomena of circulation of WT, SALW, and degenerating IS, and the prerogative of the researcher after due pre-field investigations.

At this juncture, it is important to state that it was better not to consider location of the study based on geopolitical zones.  This is because the area with the highest historical landmark of ingenuity of craft production of weapons and use of the same in conflict has been split into two.  This split, by reason of creation and grouping of states with similar ethnic groups, history, and culture into the same zones, caused the area of study to fall within two geopolitical zones, the Southeast and South-south geopolitical zones, which incorporate locations outside the former Eastern Region.  So, the best way to cartographically capture the setting of the study with limited stress was to consider the original geographical area known as the former Eastern Region of Nigeria.

 

1.8       Operational Definition of Terms

Armoury; herein refers to a place where weapons are made or kept or both.  In addition, it is a place where soldiers are trained, especially on use of weapons.

Internal Security (IS); refers to public safety.  That is the extent of security or safety within the internal environment of a society or country.  It is mainly concerned with assurance of protection from threats emanating from the internal environment.

Internal Security Management (ISM); is a concept that refers to the act of ensuring that existing public safety in a society is not displaced by any serious internally generated threat.  It has to do with management of security threats to ensure stability of public safety within a country or section of it.

Internal Security Provisioning (ISP); refers to the numerous plans, establishments, and actions put in place to ensure that public safety is provided in the internal environment of a society.

Security; is the concept used to describe extent of protection from harm or threat of it.  In this research, it is used to describe the extent of protection of people’s lives, their properties, and significant concerns, in relation to assuring their development and progress as individuals or groups.  Protection in this regard consists of providing for and maintaining factors and situations that support people’s development and progress in the society.  The opposite of these situations is herein referred to as insecurity.

Weapons’ Technology; herein refers to the technical knowhow required to produce weapons of any kind.  The concept incorporates the assorted industrial skills and methods; non-industrial methods of weapons fabrication with hand tools and limited machinery, including but not limited to the traditional processes (craft-production); and the skills for pirating weapons without permission from the maker (reverse engineering).

 

1.9       Research Report Outline

The outline of the research report consists of six chapters.  The first made a general introduction and description of the entire study.  The second chapter reviewed available scholarly literature which were relevant to the investigated phenomena.  The third chapter highlighted the incidence and advancement of WT and proliferation of SALW in Nigeria.  The fourth chapter explained the methodology that was applied for effective execution of the research.  The fifth chapter consists of the presentation of field data, their analyses, and discussion.  Finally, the sixth chapter presented the summary, conclusion, and policy statements that were drawn from the outcomes of the research.

 

Project Price:

3,000.00

Project Categories:

Category Tags , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Disclaimer

All project works, files and documents posted on this website, projects.ng are the property/copyright of their respective owners. They are for research reference/guidance purposes only and the works are crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a guidance purpose only and not copy the work word for word (verbatim). Projects.ng is a repository of research works just like academia.edu, researchgate.net, scribd.com, docsity.com, coursehero and many other platforms where users upload works. The paid subscription on projects.ng is a means by which the website is maintained to support Open Education. If you see your work posted here, and you want it to be removed/credited, please call us on +2348159154070 or send us a mail together with the web address link to the work, to [email protected] We will reply to and honor every request. Please notice it may take up to 24 – 48 hours to process your request.