Skip to main content

The fear of MOJAO is the beginning of wisdom.



Currently, two terrorist groups exist in Nigeria — Boko Haram and Jama’atu Ansarul Muslimina fi Biladis Sudan.
Well, another terror group is silently creeping into the country , Movement for Oneness and Jihad in West Africa,  MOJAO
Reports shows that there are fears in security circles that MOJAO may infiltrate the country due to the porous nature of Nigeria’s borders.
Minister of Interior, Mr. Abba Moro, had last week said there were 1,497 illegal routes into the country.
MOJAO, a splinter group of the international terror group, al-Qaeda, is after military operatives and facilities of countries that are complementing France’s efforts in quelling terrorists’ insurgency in Mali.
Besides Niger, Nigeria, Chad and Bukina Faso are involved in military operations in Mali.
On Thursday, the Jihadist group claimed responsibility for a twin suicide bombing attack at the Nigerian/Nigerien border.
No fewer than 26, mostly Nigerien soldiers, were killed and about 30 injured, in the multiple attacks.
MOJAO spokesman, Abu Walid Sahraoui, said the attacks were targeted at “the enemies of Islam.”
“We attacked Niger Republic because of its co-operation with France in the war against Sharia,” he added.
A highly placed security official told one of our correspondents that the group had been in existence since 2011.
According to the official, who pleaded anonymity because he was not authorised to speak on the subject.
He said, “We now have to prevent them from infiltrating Nigeria; we have enough Boko Haram challenges. Don’t forget that members of Boko Haram, who were dislodged from Sambisa Games Reserve and other camps in Borno State fled to neigbouring states and the Niger Republic.  So many of them from Abadan, Malam Fatori and other villages, are now refugees in Difa, Niger Republic. They can decide to pitch tents with MOJAO.
“MOJAO has attacked barracks in Niger, which is similar to what Boko Haram does in Nigeria. This new group may want to do the same in here majorly because we are also involved in the Malian operation — which is one of their grievances.
“They are also likely to target our soldiers at the border.”
“The public is implored to be vigilant and ensure that they report all suspicious movements or activities to security agencies promptly.”
President Goodluck Jonathan had on May 14, 2013, during a national broadcast, declared a state of emergency in Borno, Yobe and Adamawa states.
This was in response to the activities of suspected terrorists in North-Eastern part of Nigeria.
Some sections of Nigeria’s border with Niger pass through Yobe and Borno states.
Meanwhile, Adamawa State has begun the registration of residents of communities in its domain as a precautionary step against infiltration by  militants fleeing military  bombardment in Borno State.

A military source in the state said, “Adamawa State through the emirate council has introduced a house-to-house count of people in the state. This is to enable all wards leaders to know the exact number of persons per household and to check infiltrators in Borno.” 
The source, who pleaded anonymity, added that suspected Boko Haram members, who had fled northern Borno, were regrouping at Zumo area of Song Local Government Area of Adamawa State.
The area is believed to have a difficult topography comprising mountains, rocks, and thick forest that extends to the country’s northern border with Cameroon.

“What they are doing is to encourage the people to open registers, either in writing or using indigenous methods, to keep track of residents of a given area.
“You know, counter-insurgency cannot succeed without security winning the hearts and minds of the people. With this method, the people will know one another better and will be able to account for members of the community, in case they go out and do not return.”

Comments

Popular posts from this blog

10 Important Cybersecurity Practices for your Business

  10 Important Cybersecurity Practices for your Business 1. EDUCATION  It’s much easier to prevent a hack than it is to recover from a hack. Once your company’s sensitive data is stolen through a ransomware attack, recovering it is often a long and arduous process. Teaching employees about basic security, personal cybersecurity, and the prevalence of cyber threats goes a long way in stopping ransomware attacks before they can really do damage. Your employees should understand that they might be targets of malicious actors, eager to exploit any entry they can find in your company. The average cost of a cyberattack is 3.86 million and the cumulative total for global cybercrime is expected to cost $6 trillion. If you don’t pay to train your employees about cybersecurity best practices eventually you may end up paying more in the long run. High quality and free trainings for your employees are available from several government resources including Department of Homeland S...
Top 20 Most Asked Third Party Risk Questions for Vendors  These questions help organizations assess the overall risk posed by third-party vendors, covering critical areas like data protection, regulatory compliance, and incident response. Here’s a list of the Top 20 Most Asked Third-Party Risk Management (TPRM) Questions for Vendors in TPRM questionnaires: 1. What types of sensitive data do you handle for our organization? Vendors should clarify the types of data they collect, process, or store, such as personal information, financial data, or intellectual property. 2. How do you protect data at rest and in transit? This question probes into the encryption methods, protocols, and security controls in place for safeguarding data during storage and transmission. 3. Do you have a formal Information Security Program in place? Vendors should describe their overall cybersecurity framework, including policies, procedures, and governance. 4. How do you manage user access to our data and s...

Nearly 500,000 workers are needed in cybersecurity roles around the country

The push to work from home during the coronavirus pandemic is straining cybersecurity professionals around the country tasked with ensuring workers are able to not only work efficiently from remote locations — but to do so safely. This rapid shift is a tall order for an industry that was already in need of skilled professionals long before the pandemic took hold.  Cybersecurity workers were taken off some or all of their typical security duties to assist with other IT-related tasks, including equipping mobile workforces, according to an April survey from global nonprofit (ISC)2, the largest association of certified cybersecurity professionals. The survey of 256 cyber pros found nearly half were re-tasked and that a quarter said cybersecurity incidents increased since the transition to remote work, with some seeing as many as double the number of incidents. Separate data from another nonprofit cybersecurity group, the Information Systems Security Association, found a 63% increase in...