Tuesday 13 February 2018

Names of Nigerian Army Operations

Military historians say code names for military operations started during World War I between 1914 and 1918 but became widely used during World War II from 1939 to 1945.
Image result for Names of operations conducted by nigerian military
For instance, in Nazi Germany, the initial code name for the invasion of Russia was “Operation Fritz” but its leader, Adolf Hitler, didn’t like that name because it didn’t strike fear. He changed it to “Operation Barbarossa” after the Emperor of the Holy Roman Empire, Frederick I Barbarossa.
In modern times, many countries and military outfits still use code names for operations. Perhaps, the most popular code name in modern war history was the Gulf war after Iraq invaded Kuwait in the 1990s. At first, the build up to the war waged by a coalition led by the United States to ousted Iraqi forces was named “Operation Desert Shield” but the actual battle was code named “Operation Desert Storm.”
Indeed, code names are not meant to divulge the intention of military actions and that which cannot be easily decoded. The objective would be known. Invariably, the army provides code names that are very striking.
In Nigeria for instance, the military has over 10 simultaneous internal security operations and military exercises ongoing in the six-geopolitical zones of the country with various code names.
But, even before now, code names had been used in the country. For instance, the military officers who staged the coup of January 15, 1966 led by Major Chukwuma Kaduna Nzeogwu code named it “Operation Damisa.” This was mainly to cover up their clandestine activities that eventually led to the Nigerian civil war.
At that time, there were also “Operation Kura” believed to be targeted at eliminating certain chiefs, “Operation Zaki” to kill the remaining chiefs and “Operation Giwa” meant to carve the country into districts administered by Igbos.
Why code names
The Nigerian Army spokesman, Brigadier General Sani Usman, said code names of military operations are determined by the circumstances and peculiar traditions.  He said it sometimes include the topography of the locations where the exercise is to take place.
He added that there is no hard and fast rule on how the code names come about, but only that they are usually two words. According to him, the operations are backed by the constitution which foresaw the need for the military to assist civil enforcement agencies in the protection of lives and property.
However, a security expert, Kabir Adamu said internal security military operations are usually what he described as “displacement of security challenges”, a situation that meant while trying to solve one problem another is created. Adamu blamed the introduction of “operations” on  lack of confidence in other civil security agencies.
Current operations with code names
There are many military operations going on in the country aimed at checking various security challenges.  Some are: 
Operation Lafiya Dole: The operation was set up to counter terrorism and insurgency. It was later expanded to specialized operations including “Operation Crackdown”, “Operation Gama Aiki” and “Operation Safe Corridor.”
Operation Gama Aiki was launched to clear remnants of Boko Haram from northern part of Borno State and the border regions with Chad and Niger Republic. It is a joint operation with the Nigerian military and the regional Multinational Joint Task Force. In fact, Gama Aiki is targeted at terrorists fleeing “Operation Crackdown.”
Operation Python Dance II: This was launched about a year after Operation Python Dance I in the Southeast. It is said to be a field training exercise.
The army said it was designed to, if necessary, dovetail into real time activities such as anti-kidnapping drills, patrols, raids, cordon and search, check points, road blocks and show of force.
The exercise is multi-agency in nature and execution, as the police, Civil Defence Corps, State Security Service and Federal Road Safety Commission collaborate to ensure overall success of the exercise.  It is with the aim of checking anticipated rising wave of crimes usually prevalent during festive periods.
Operation Crocodile Smile II: This is an exercise which involves amphibious war games in the Niger Delta region and parts of Ogun State. It is also aimed at protecting the nation’s crude oil infrastructure.
Operation Tsera Teku: This operation was officially launched in Warri, Delta State in February this year to check piracy in the Niger Delta region.
The operation is expected to curtail pipeline vandalism, armed robbery and other offshore and around the creeks criminality. It is also aimed at protecting ships and oil and gas installations.
Operation Awatse: It started in July 2016 and was to dismantle the operational bases of pipeline vandals and militants in the coastal areas of Southwest Nigeria.
Operation Sharan Daji/ Operation Harbin Kunama II:  It was established in the Northwest to battle armed bandits, cattle rustlers and robbers operating particularly in Zamfara, Kaduna and fringes of Sokoto, Kebbi, Katsina and Kano states.
Operation Mesa: This operation has been a nationwide joint police-military security taskforce. It is called “Operation Yaki” in Kaduna State and “Operation Zenda” in Benue State.
Operation Safe Haven: It is stationed in Plateau State with areas of operation extending to Benue, Kogi, Nasarawa and Kwara states to quell ethno-religious conflicts and other criminal activities.
Operation Delta Safe: This was set up to replace Operation Pulo Shield. It is aimed at containing security challenges in the Niger Delta, especially protection of critical national assets and provision of security in the area.
Operation Ruwan Wuta II: The operation is a further crackdown on Boko Haram terrorists as part of efforts to decimate them and check their ability to freely operate in the country by the Nigerian Air Force (NAF). Air Force spokesman, Air Commodore Olatokunbo Adesanya, said the operation is an intensive day and night aerial bombardment designed to rain significant fire on freshly discovered hideouts of Boko Haram terrorists

No comments:

Post a Comment