Silencing Boko Haram: Mobile Phone Blackout and Counterinsurgency in Nigeria’s Northeast region
DOI:
https://doi.org/10.5334/sta.eyKeywords:
Boko Haram, Nigeria, ICTsAbstract
In the summer of 2013, the Nigerian military, as part of its counterinsurgency operations against Boko Haram insurgents, shut down GSM mobile telephony in three northeast states – Adamawa, Borno and Yobe. This article explores the rationale, impact and citizens’ opinion of the mobile phone blackout. It draws on focus group discussions with local opinion leaders and in-depth personal interviews with military and security insiders, as well as data of Boko Haram incidences before, during and after the blackout from military sources and conflict databases. It argues that, although the mobile phone shutdown was ‘successful’ from a military- tactical point of view, it angered citizens and engendered negative opinions toward the state and new emergency policies. While citizens developed various coping and circumventing strategies, Boko Haram evolved from an open network model of insurgency to a closed centralized system, shifting the center of its operations to the Sambisa Forest. This fundamentally changed the dynamics of the conflict. The shutdown demonstrated, among others, that while ICTs serve various desirable purposes for developing states, they will be jettisoned when their use challenges the state’s legitimacy and raison d'être, but not without consequences.
Published
Issue
Section
Categories
License
Copyright (c) 2015 The Author(s)

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).