T. Adeyinka, M. Lawal, O. Akinrinde, Remi Kasali Alatis
{"title":"Nigeria’s Development Trajectory, Security Conundrum and the State-Citizens Relations","authors":"T. Adeyinka, M. Lawal, O. Akinrinde, Remi Kasali Alatis","doi":"10.53477/2284-9378-24-13","DOIUrl":"https://doi.org/10.53477/2284-9378-24-13","url":null,"abstract":"Crime represents a profound threat to societal well-being, generating misery and disorder. Understanding its nature, causes, patterns, and consequences is vital for its effective prevention and control. In Nigeria, the past two decades have witnessed a steady rise in criminal activities, straining resources and impeding national development. Relying on the Social Contract thesis, this study examines how the preponderance of criminality and insecurity has systematically hindered Nigeria’s developmental aspirations. In this study, we contend that the state’s primary duty is to safeguard citizens and their property, as espoused by the social contract theory. However, the relentless wAve of criminality in the last two decades in Nigeria has greatly undermined the social agreement between the Nigerian state and its citizens. This is in addition to the diversion of resources from other state’s responsibilities to the security of the citizenry and the defence of the state. The implication of this situation, as revealed in this study, is the general hampering of the comprehensive national progress and prosperity of the Nigerian state. In this regard, we, therefore, recommend the imperativeness of a communal approach towards tackling the spate of security challenges in Nigeria whilst also recognizing that safeguarding the society remains a collective responsibility of both the Nigerian state and its citizenry. By fostering a culture of security amongst all, the Nigerian state and its citizenry can address the pervasive triggers and impact of crime whilst building a safer and prosperous future for all.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"85 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140728996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Adeyinka, M. Lawal, O. Akinrinde, Remi Kasali Alatis
{"title":"Crime Reporting Patterns and Frequencies in Print Media in Post-COVID Nigeria: A Security Approach","authors":"T. Adeyinka, M. Lawal, O. Akinrinde, Remi Kasali Alatis","doi":"10.53477/2284-9378-24-08","DOIUrl":"https://doi.org/10.53477/2284-9378-24-08","url":null,"abstract":"This study systematically delves into the intricacies of crime reporting by mass media in post-COVID Nigeria, shedding light on its profound impact and intensity. Through meticulous archival methods, historical editions of The Guardian and Punch newspapers were analyzed over three years. The findings highlight a notable emphasis on crimes against individuals, such as murder and assault, compared to other categories like financial and drug-related crimes. Over 4,093 crime incidents were reported, with crimes against persons dominating in 2021 and 2022. The study underscores the need for nuanced crime reporting and advocates for substantive engagement through editorials and analyses. By fostering awareness and discourse, print media can play a pivotal role in shaping public understanding of crime dynamics and promoting societal well-being.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"10 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140730141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The theory of the regional security complex — Case study, the riparian states of the Black Sea","authors":"Adrian Ghenade, Elena Onu","doi":"10.53477/2284-9378-24-14","DOIUrl":"https://doi.org/10.53477/2284-9378-24-14","url":null,"abstract":"Known in Antiquity as the Pontus Euxinus, the Black Sea has been the bridge between European and Eastern civilizations since ancient times. Possessing a multi-varied mosaic of cultures, the Black Sea area has facilitated over the centuries, both the development of commercial and political relations and the maintenance and production of conflicts, being like the Sword of Damocles. Located at the intersection of three security zones (Euro-Atlantic, Russian, and Eastern), the Black Sea is currently a vulnerable space in terms of security. Heir to Byzantine culture, most of the riparian states have a complicated internal and external policy, being caught between the idealism of the Western world and the realism of the Eastern European space. At the same time, the revisionism of the Russian Federation and Turkey in terms of foreign policy will also mean a change in the dynamics of the relations between the states bordering the Black Sea, which could result either in its return to the status of a Russian lake or in a division of the spheres of influence between the Russian Federation and Turkey. In this sense, in order to analyze the future security dynamics of the riparian states, we used the theory of the regional security complex, which we consider very appropriate in our study of the Black Sea region.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"47 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140729756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vinko Žnidaršič, Velibor Pavlović, Aleksandar Varga
{"title":"Modeling rifle section reconnaissance patrol formation","authors":"Vinko Žnidaršič, Velibor Pavlović, Aleksandar Varga","doi":"10.53477/2284-9378-24-07","DOIUrl":"https://doi.org/10.53477/2284-9378-24-07","url":null,"abstract":"The successful execution of reconnaissance patrols by rifle section commanders hinges on their ability to adeptly organize their soldiers into effective formations. These formations must ensure both the safety and efficacy of the soldiers and the mission at hand. Inefficient utilization of human and material resources within rifle sections assuming the role of reconnaissance patrols can detrimentally impact the combat readiness of higher echelon units. This paper aims to explore the optimization of rifle section organizational structures by aligning them with regulations and effectively balancing capabilities with requirements. By comparing prescribed protocols in the Serbian Armed Forces with commanders’ practical insights and utilizing scientific methodologies to evaluate various scenarios, this research endeavors to distill one or several generalized rifle section reconnaissance formations applicable across a spectrum of situations.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"279 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140730295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The need for an integrated model of smart warfare","authors":"Matei Blănaru","doi":"10.53477/2284-9378-24-03","DOIUrl":"https://doi.org/10.53477/2284-9378-24-03","url":null,"abstract":"Unfortunately, the war in Ukraine and many other events or processes taking place all over the world show us that perhaps there can be no smart peace unless we are ready to fight a smart war. Both against conventional or unconventional enemies, both regarding symmetrical or asymmetrical warfare. And if we are beginning to see our society in terms of smart governance, smart education, smart economy or smart people, which means we see it in terms of smart peace and smart society, then there is definitely the need to see war and conflict in an integrated, compact vision of smart war. We use observation to point out how a large series of contemporary events and processes, starting from cybersecurity issues, aerial, terrestrial, or maritime drones, electronic warfare equipment meant to counter these drones, propaganda, and disinformation easily spread through rapid smart means of worldwide mass communication, and of course, Artificial Intelligence, microprocessors, or fledgling space warfare where satellites can be used to attack rival satellites, need to be addressed in an inclusive, integrated conceptual approach of smart warfare focused on the future and not as separate events or developments patched up upon conventional warfare equipment or thinking. We need to understand that “smartness” is all about peace, but all about war as well, if we want a smart peace to last or if we want to be able to defend it, as Romania has a definitely defensive strategy. We are building a smart peace, but we have to prepare for a smart war as well.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"133 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140731371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disinformation Dynamics Unveiling the Impact of Echo Chambers in Shaping Online Public Opinion","authors":"Ștefania-Elena Stoica","doi":"10.53477/2284-9378-24-09","DOIUrl":"https://doi.org/10.53477/2284-9378-24-09","url":null,"abstract":"The proliferation of misinformation and the emergence of echo chambers in the online environment pose significant challenges to modern democracies, directly impacting public opinion and social behaviors. This study focuses on the analysis of a Facebook group centered around a prominent Romanian political figure, boasting 93,800 members and averaging ten daily posts. Using advanced machine learning and AI-based hate speech detection, the study uncovers systematic echo chamber construction and the amplification of misinformation. The findings emphasize the influence of online echo chambers on public opinion and underscore the need to maintain information integrity in the media landscape and communication. This research has important implications for scholars, policymakers, and media practitioners, indicating the critical need to address the challenges posed by misinformation and echo chambers in the online environment.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"74 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140732046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fitful Path: Nigeria’s Faltering Counterterrorism Operation against the Boko Haram in the Northeast","authors":"Luqman Saka","doi":"10.53477/2284-9378-23-51","DOIUrl":"https://doi.org/10.53477/2284-9378-23-51","url":null,"abstract":"Nigeria’s security environment continues to be tense, tenuous and fluid. From all indications and yardsticks of policy planning and implementation, the country’s security architecture seems to be unraveling. As the nation’s security establishments confront multiple security crises especially in Northern Nigeria, their policy and operational reactions continue to be reactive. While the Boko Haram insurgency rages, a decade after the commencement of military operations against the group, military successes in the Northeast are at best modest. Following a decade of commitment of military resources including billions of dollars deployed to the procurement of armament and military hardware, expansion of forces’ strength and creation of special operation formations, one can ask why have the military operations continued to falter and security architecture unravel? The study was anchored on the qualitative research approach and sourced data from published and openly available official documents, scientific publications and newspapers articles, reports, opinion pieces and commentaries. Making use of this open-sourced information, this study explains faltering military operations and Nigeria’s worsening security environment to the failure of security planning, poor civil-military relations including lack of depth in intelligence agencies penetration of local communities across Northern Nigeria, rivalry among the three arms of the Nigerian Armed Forces, persistency of the poor culture of intelligence information sharing and lack of synergy and poor coordination among Nigeria’s security establishments. This study recommends that more attention need to be paid to intelligence gathering, synergy and coordination among the security establishments in the bids to enhance the prospects of Nigeria’s counter-terrorism operation and other military engagements across the country.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"231 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140504708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Essential approaches to combat the use of drones. Specific elements of the armed conflict in Ukraine","authors":"Gheorghe Minculete, Veronica Păstae","doi":"10.53477/2284-9378-23-58","DOIUrl":"https://doi.org/10.53477/2284-9378-23-58","url":null,"abstract":"Although used many years ago, by multinational allied forces acting in coalition in Iraq and Afghanistan, combat drones known as “unmanned aircraft systems” (UAS), “unmanned aerial vehicles” (UAV)”, “unmanned combat aerial vehicles” (UCAV) or “remotely piloted vehicles” (RPV) represent a formidable weapon both for NATO states and for the forces fighting in Ukraine. Considering their essential characteristics, dimensions, load capacity, speed, range, flexibility, ease of operation and low costs, these means of combat come with huge advantages in achieving the operational objectives of combatant structures - regardless of the category they belong to. Thus, the present study includes a theoretical approach that can actually be implemented in the military operational realm, because it includes details and essential references to combat drones designed, produced and used by belligerent and non-belligerent states in connection with the armed conflict taking place on Ukrainian territory. Starting from the objective of the study, a series of important directions resulted for strengthening the actual potential of the joint and tactical forces to be used in national and multinational context within the North Atlantic Alliance, against the aggressive force of an adversary state.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140504253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The terrorist threat to critical infrastructure from the perspective of criminal risk","authors":"Sorina-Denisa Potcovaru","doi":"10.53477/2284-9378-23-62","DOIUrl":"https://doi.org/10.53477/2284-9378-23-62","url":null,"abstract":"The field of critical infrastructure protection emerged as part of the fight against terrorism. Although a transition to an all-hazards approach has taken place, terrorism remains a significant threat to entities providing essential services. The relief of the legislative framework provides a nuanced understanding of the interrelationship between the constructs of critical infrastructure and terrorism, conceptualizing the latter in the context of criminal risk. By criminalizing acts of terrorism, the legislator intends to protect social values, including those values dependent on the functioning of critical infrastructure. Moreover, exemplification through case law contributes to identifying vulnerabilities and facilitates scenario building based on criminal risks.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"5 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140504444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Repressing the Voice, Increasing the Noise: The Imperative for Negotiation as a Panacea to Security Crisis in the South East, Nigeria (PART I)","authors":"Victor Chukwugekwu Ebonine","doi":"10.53477/2284-9378-23-60","DOIUrl":"https://doi.org/10.53477/2284-9378-23-60","url":null,"abstract":"This article is divided into two parts: Part I and II. This part I discusses the provenance of insecurity in Nigeria, the theories explaining its emergence and the birth of militant groups in the region. Though there is no part of Nigeria that is immune to infectious insecurity, the case of South East is more worrisome. The security crisis in the region has been worsened by the intractable and complex secessionist agitation that started immediately after Nigeria’s independence. Common theories for explaining the situation have been long-term political marginalization of the region, state fragility to manage diversities and bad governance from the Igbo political elites. The conclusion of this part, therefore, is that insecurity in the South East Nigeria can be analyzed from these theories.","PeriodicalId":516822,"journal":{"name":"BULLETIN OF \"CAROL I\" NATIONAL DEFENCE UNIVERSITY","volume":"1 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140503842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}