MDIS Theses and Dissertations
Permanent URI for this community
Browse
Browsing MDIS Theses and Dissertations by Issue Date
Now showing 1 - 13 of 13
Results Per Page
Sort Options
- ItemBorder diplomacy and territorial disputes in the IGAD Region: a case study of Kenya(Strathmore University, 2020) Ndirangu, Josphat GitongaTerritorial disputes have serious ramifications on the national security of the State especially when not effectively addressed. Africa and the Horn of Africa are prone to border related conflicts owing to the colonial borders that were inherited upon independence and which do not reflect the ethnic and religious diversities that existed prior to colonization. This study investigated territorial threats in the Inter-Governmental Authority on Development region with special focus on Kenya. It also focused on specific border threats and how Kenya policy makers have responded to the threats using border diplomacy as the focal point. The study used a conceptual of analysis in order meet its goals and objectives. The study aimed at establishing if border diplomacy has been fully utilised to resolve existing territorial disputes that have faced Kenya. In doing so, both primary and secondary data was collected in the research. Interviews were conducted to gather primary data from key stakeholders in the field of border diplomacy and national security. Data collected was analysed using framework analysis. The study found out that territorial disputes present great security challenges to the national security of Kenya. These disputes are largely triggered by the trans-boundary resources with the underlying cause being the colonial legacy of borders drawing. Largely, Kenya has employed a mix of hard and soft approaches when dealing with territorial disputes. However, it was established that the country has not been aggressive enough in using diplomacy to resolve the current territorial disputes with Somalia and Uganda. The study recommends aggressive application of border diplomacy by Kenya in order to effectively address the territorial disputes that faces the country.
- ItemMulti-agency cooperation in combating terrorism in the aviation industry in Kenya(Strathmore University, 2020) Edna, Nyatichi OmwenoTerrorists’ acts against the civil aviation industry have remained sustained over a period of time. The devastating effects of a successful attack transcend the jurisdictions of many states, threatening their national and human security. The transnational nature of these attacks has led to states cooperating under the auspices of the International Civil Aviation Organization (ICAO) to come up with standard measures to address the same. The devastating effects of the 9/11 attacks led to a review of the existing legal and regulatory responses which were found to be largely reactional and ineffective. A new thinking was introduced which embraced responses that were proactive in nature and that encouraged a multi-layered security structure. Being a signatory to ICAO, Kenya has not only domesticated the new thinking but also operationalized it by establishing the Border Coordination and Operations Control Committee (BCOCC) - a multi agency working framework. This study sought to empirically examine Multi-Agency Cooperation (MAC) and its implications on aviation security in Kenya. It attempted to answer the question whether the adoption of multi-agency cooperation as an approach to security in Kenya’s aviation industry had enhanced aviation security in light of terrorist threats. The specific objectives were; to examine the evolution of the aviation industry and the terror threat within it; to analyze the evolution of the responses adopted to combat terrorism in the industry and to examine how the multi-agency cooperation strategy is functioning to enhance and facilitate effective counter terrorism strategies in Kenya’s aviation industry. Similarly, the study sought to establish the relationship between international aviation security law and domestic aviation security. It employed a descriptive case study methodology and largely used qualitative data supplemented by quantitative data collected from multiple sources namely; questionnaires, interviews, document reviews and observation methods. The study established that the improvement of the international civil aviation security program has consequently led to the improvement of Kenya’s aviation security system in combating terrorism. However, whereas the multi-agency adopted from the international system by the aviation security has played a significant role in enhancing and facilitating counterterrorism strategies; it faces legal and structural challenges that need to be addressed in order to strengthen it further.
- ItemCoordination in multi agency response to international terrorism in Kenya: a comparison of Dusit d2 and Westgate terror attacks(Strathmore University, 2020) Musoma, Albert LusiolaKenya has in the last decade been faced by a constant terror threat from al-Shabaab, ISIS and al Qaeda. This study sets out to assess responses to international terrorism in Kenya. It draws a comparison of the Dusit D2 and Westgate terror attacks. The study questions were as follows: Are there existing or lack thereof of multi-agency strategic policies on coordination in response to international terrorism in Kenya? Are there existing or lack thereof of structural and legal frameworks guiding multi-agency operations on countering international terrorism in Kenya? And what are the successes and failures borne out of having/not having multi-agency laws, policies, doctrines and strategies regarding terror response coordination? The study adopted mixed methods and exploratory research designs. The target population was all the members of the KDF SoFs, the NPS Recce squad, and ATPU Officers as well as policy level Military, Intelligence and Police Officers. The target population is estimated at 3400 personnel from which a sample of 97 was obtained. The used primary data collected from the respondents using mainly questionnaires and interviews as well as secondary data that was obtained from library-based research via books, e-books, journals, government publications, and published thesis, among other reputable academic publications. The data collected from questionnaires were analyzed using the Statistical Package for the Social Sciences (SPSS) version 24. The findings were presented in descriptive statistics, tables, graphs, charts and inferential statistics. On its part, data from interviews were analyzed thematically based on the objectives so as to establish the key themes and trends from which findings, conclusions, and recommendations were drawn. The study findings make it manifest that strategic multi-agency policy on coordination in response to terrorism in Kenya enhances coordination in response to international terrorism. In this light, the level to which Kenyan security agents are guided by well formulated and clear policies in their response affects the quality of their coordination to international terrorism and vice versa. Additionally, the existence of structural and legal frameworks guiding multi-agency operations on countering terrorism in Kenya had led to effective response through standardizations of operation guidelines, better sharing of information, joint training and exchange of best practices among the various responders. This was evidenced in the Dusit D2 Attack in which synchronization of operations showed better response to the attack by the various operational and tactical teams as compared to the Westgate Attack. The study recommends that: the multiagency response teams should constantly review their operation guidelines and standard operating procedures so as to deal with the ever-changing sophistication in terrorist attacks; the government should put in place ways aimed at checking disparities in capabilities and equipment among various tactical and intelligence teams in Kenya for uniform response to terrorism; there is need for multinational frameworks for undertaking financing and creation of joint information infrastructure for security agencies so as to reign in on international terrorism in the East African Region; there is need for mobile-based applications to enhance real-time information sharing among intelligence and tactical teams on terrorism-related issues during operations; E-policing and rapport with the community should be enhanced so as to enhance sharing of information between police officers and the community on terrorism-related issues and There should also be measures aimed at regulating the use of social media in response to terrorism.
- ItemThe Strategic aspects of Kenya’s Maritime Security (2008-2020)(Strathmore University, 2020) Charo, Alfred MwangoThe prospects and aspirations in Kenya’s maritime domain are today facing complex and highly dynamic traditional and non-traditional maritime security threats that portend a direct consequence to Kenya’s national security. The threats of terrorism and the upsurge of piracy in the Western Indian Ocean region led to the Kenyan government’s reaction to the maritime asymmetric threats. These reactions became the onset of Kenya’s significant engagement in maritime security issues. The adopted maritime responses were reactive in posture, which engendered the establishment and restructuring of several maritime security organizations and training to deal with the threats manifestation in Kenya’s maritime domain. However, the implementation of these maritime security frameworks and responses continue to face challenges, making them tend to be not so much effective in dealing with the maritime threats in Kenya’s maritime jurisdiction. This study responded to three research questions: Firstly, is how effective and capable are the current maritime security organizations and frameworks able to deal with the maritime security threats? Secondly, is how are the policies and strategies shaping the maritime threats in Kenya? Thirdly, is how best can the problem be addressed? Primary data was collected through key informant interviews with academics, maritime security experts and government officials; both retired and serving. Secondary data was also sourced from relevant publications and media reports. The data obtained were analyzed using content and thematic analysis techniques. The findings disclosed that numerous maritime security agencies in Kenya that faced several challenges; multifaceted transitional maritime threats, duplication of roles, limited resources, absence of common SOPs and limited cooperation among the maritime security agencies, which hindered the execution of their respective mandates. The study also came up with recommendations on how best the challenges could be addressed to effectively enhance maritime security in Kenya.
- ItemPolicies and strategies in Kenya’s response to the war on terror: a critical evaluation(Strathmore University, 2020) Kelly, Ruth MuleThis study is a critical evaluation of policies and strategies used in Kenya in response to war on terror. The study was guided by several objectives; a) Examine the policy and strategy making b) Evaluate the strategies and policies on the war on terror in Kenya c) Assess critically the strategies and policies used in war on terror. The study was guided by systems theory, that all things and events known to man are connected to and interface with one another. An event happening today is influenced from certain occasions previously and similarly, a few occasions that will occur later on will be influenced from the occasions of today. The study used a qualitative research design. A case study approach focusing responses on war against terror in Kenya was used. Qualitative data was obtained from use of surveys and key informant interviews. The target population was government agencies such as National Intelligence Service (NIS), Anti-Terrorism Police Unit (ATPU), National Police Service and Ministry of Interior and Defense. The study employed purposive sampling to identify respondents to participate in the study. The study used both primary and secondary data. Content analysis method were used in analyzing qualitative data. It was established that the three important strategies in the war on terror are defense policy, foreign policy and economic policy. The strategies included military, diplomatic and economic strategy. It was noted that Kenya relied heavily on both defense policies and military strategies. The military policy is not independent is mandated by the defense policy. The foreign policy is implemented through a diplomatic strategy. The study concludes that the Kenyan government, through the parliamentarians should make bills that recommend on the best policies and strategies to incorporate to reduce terror attacks in the country.
- ItemTerrorism as conflict in transition: a critical analysis of Counter Violent Extremism strategies in Kenya(Strathmore University, 2020) Gichira, Stephen GachokiThis thesis is informed by post 9/11 global security environment. It examines how Kenya has responded to terrorism threat from Al-Shabaab and the basis of its strategies. The study aimed at a critical analysis of Counter Violent Extremism (CVE) strategies in Kenya. The specific objectives were to discuss the philosophy of Global War on Terror, investigate terrorism as a conflict in transition, examine CVE in War on Terror, and explore responses to terrorism in Kenya. To achieve this objective, the study posed research question on basis of CVE strategies in Kenya, and whether they can succeed if mediated by use of force. The study reflects on a framework of analysis which framed Global War on Terror as the independent variable influencing national security strategies by states. Accordingly, the central assumption of the study is that contemporary national security strategies by states are informed by global WoT framework. Methodologically, the study collected primary and secondary data. Primary data was collected through personal interviews from respondents in the field of Counter Terrorism and CVE. Secondary data was collected through documentary analysis of literature on CVE in Kenya. Data collected was analyzed through narrative and content analysis. Analysis and interpretation of data collected established that CVE strategies in Kenya are facing challenges which are related to how they are captured from the premise of the global War on Terror framework. The study recommends that the philosophy of War on Terror in framing CVE strategies, is not applicable locally. It is shrouded with narratives that perceive the problem as an external rather than internal problem. CVE strategies in Kenya need to be homegrown, flexible and customized to local contexts to capture the transitional character of terrorism conflict with greater impact.
- ItemIntelligence aspects of big data analytics for Kenya national security(Strathmore University, 2020-11) Njoroge, Ann WangechiIn the age of rapid technological advancement, the range of threats to national security have evolved, becoming more complex and diverse, while the duty of the government remains that of securing its country. With the exponential rise in amount of structured, semi-structured and unstructured data generated every day, big data has become a core competence for the government which is linked to national security and the operations of the intelligence community. Big data provides intelligence organizations the opportunity to increase their investigative capabilities to combat threats to national security by enabling them to collect, analyze and disseminate information at a pace which could not be as effective in the traditional era. Governments will however be faced with the challenge of developing new capabilities to exploit and manage big data, which will require a rigorous review of the existing intelligence models and processes. The aim of this study is to examine the scope of applicability of big data and analytics in the functioning of the intelligence community, with a focus on the intelligence cycle. It also looks at the ethical and technical issues that limit the use of big data and analytics for national security. An exploratory research design was used to provide insight from the national security organs and intelligence community in Kenya on the applicability of Big Data and Analytics for national security. The study established that big data and analytics have a statistically significant effect on the intelligence cycle and national security organizations should embrace this new technology since it provides a lot of actionable insights. Based on this study it is recommended that the government enact more legislation to help develop an efficient and effective policy infrastructure for the various stakeholders in the intelligence community.
- ItemComparative analysis of intelligence oversight mechanisms in East African Community [EAC] states(Strathmore University, 2020-12) Isaiah, Otieno Omburo;National security intelligence agencies across East Africa have undergone many reforms from the period of decolonization, during and after the Cold War, the eras of state rebuilding in some of the post conflict states and in the current age of heightened counterterrorism campaigns. National security sector reforms in the East African Community (EAC) have largely been dependent on national socio-political circumstances. However, there are also several overarching factors which have informed national security intelligence reforms which include the drive towards making the agencies more accountable in the EAC. Despite various reforms, intelligence oversight mechanisms in the EAC are either partly or not being implemented at all. The EAC states have also undertaken several steps towards intelligence collaboration especially with the persistent threat of international terrorism. Consequently, the necessity for effective and legitimate intelligence collection among the states in such relationships has become a pertinent question in intelligence collaboration. Part of the bumpy ride towards opening up of national intelligence services for scrutiny in EAC is the perennial question of regime security especially in the postconflict states in the region. This study comparatively assesses different intelligence oversight regimes in the EAC states and attendant issues arising out various oversight mechanisms which are currently being implemented in the region. The study adopted a descriptive case study methodology exploiting qualitative primary and secondary data to evaluate intelligence oversight regimes in the region. The study examined universal intelligence oversight mechanisms and practices, the forms of the intelligence community in the EAC states and assessed the post-independent intelligence oversight mechanisms in the region. The study established that different EAC states have statutorily established executive, parliamentary and judicial oversight mechanisms for their national intelligence services. However, there are contextual differences in terms of the actual practice of intelligence oversight across the EAC. These differences in intelligence oversight regimes across the region are influenced by factors including political and intelligence cultures in the EAC states.
- ItemAn Analysis of the role of the police service in counterterrorism operations in Kenya(Strathmore University, 2021) Waringa, James NjorogeThis study explored the role of the Kenya Police Service in counterterrorism operations, specifically examining and analyzing the factors underlying the continued terrorism attacks in Kenya despite various counterterrorism measures by the government. It equally examined and analyzed the effects of intra and inter-institutional coordination and intelligence sharing constraints on police counterterrorism operations in Kenya. Using quasi-experimental research designs, the study examined the place of strategic intelligence and coordination issues in respect of counterterrorism operations by the Kenya Police. Kenya continues to suffer terrorist attacks associated with the Al Qaeda and its affiliate networks in the region, particularly the Al Shabab group, which is mainly domiciled in Somalia. These attacks have left hundreds of people dead and scores injured, especially following Kenya’s military intervention in Somalia beginning in October 2011. Operationalizing the variant of Contingency Theory, the study argues that the continuity of terror attacks is a function of Al Shabab’s ability to protect and deny internal security agencies access to their operational intelligence. It equally argues that the inability of the police to counter terror attacks is a function of absence of enhanced intra and inter institutional coordination and cooperation in intelligence sharing. This study finds that there is a lapse of coordination and cooperation in information sharing within and among the state's national security agencies. Consequently, this study gives recommendations for a pragmatic counterterrorism strategy for the National Police Service in Kenya.
- ItemNational security implications of human trafficking and migrant smuggling in Kenya (2009-2019)(Strathmore University, 2021) Nzioka, Peter SamsonUsing the Rational Choice Variant of Gary Becker as its conceptual tool of analysis, this study sets out to; firstly examine and analyze factors underlying the increase in human trafficking and migrant smuggling in Kenya. Secondly, to examine and analyze the implications of human trafficking and migrant smuggling on Kenya’s National Security. And thirdly, to proffer research-based policy alternatives to address the same. A descriptive research design consisting of both qualitative and quantitative approaches are converged to operationalize this study. The study was done in Kenya with the focus being five entry/exit points for migrants namely JKIA, Busia, Lungalunga, Moyale, and Namanga. The choice of these points of entry/exit was guided by Kenya’s categorization as a source, transit hub, and destination point for trafficked and smuggled persons. To obtain the sample size, a purposive sampling technique was employed to identify participants for this study. A sample size of 120 security personnel was used. Both primary and secondary data was collected using a set of questionnaire and interview schedule respectively. Quantitative data was analyzed by the use of descriptive statistics such as percentages and frequencies, while content analysis was used in analyzing qualitative data. This was done by centralizing the analysis around certain themes. The study contends that the increase in human trafficking and migrant smuggling is a function of the convergence of various negative and positive interests of human traffickers, migrant smugglers, and their victims. These convergences also underpin national security threats resident in multiple security sectors. This study recommends that; a review of the legal framework on human trafficking and migrant smuggling to make these crimes capital offences should be done; a specialized Anti-human trafficking and Migrant Smuggling Unit within the Multi-Agency framework tasked with the enforcement and implementation of counter-trafficking policies and regulations be established; security surveillance and patrols at the points of entry and exit should be intensified; reporting of cases of human trafficking and migrant smuggling be made easier by providing toll-free anonymous call numbers; anti-corruption mechanisms at points of entry and exit be integrated; regular training of government officials on the morphing nature of human trafficking and migrant smuggling trends be carried out; and, vulnerable persons in the society should be empowered through equitable distribution of wealth and creation of sustainable employment opportunities to alleviate poverty.
- ItemA Critical analysis of the National intelligence community in the war on terrorism in Kenya(Strathmore University, 2021) Ainea, Judy MarebeThere have been concerted efforts by the National intelligence community to fight terrorism in Kenya in the wake of rampant terrorist attacks. This study sets out to critically analyses the role of the intelligence community in the war on terrorism in Kenya. Its objectives are to examine the effectiveness of the intelligence community to combat terrorism in Kenya; establish the causes of intelligence community failures in the fight against terrorism in Kenya and; suggest ways in which the efficacy of intelligence community in Kenya can be enhanced. Based on the rational choice theory, this study adopts the exploratory and descriptive research designs. The target population is the personnel employed in the security agencies intelligence agencies and intelligence communities: Kenya defense Forces (KDF), Kenya Police services, military intelligence services and national intelligence services in Kenya estimated at 400 persons. Out of these, a sample of 90 persons were obtained proportionately using the purposive sampling technique. Both primary and secondary data collection techniques were employed. Questionnaires and interviews were used to collect primary data. Additionally, relevant secondary data was obtained from reports, journals and books among publications. Quantitative and qualitative techniques were used in data analysis. In this regard, the data collected from questionnaires were subjected to descriptive and inferential statistics. This was done through the help of the Statistical Package for the Social Sciences (SPSS) version 24. The findings were presented in charts and tables. Conversely, qualitative data analysis was guided by Miles and Huberman’s framework of thematic analysis. The method suggests the use of four critical steps intended for extracting meanings from data collected from participants. The findings show that there were improvements in intelligence gathering in Kenya. However, the efficiency with which the intelligence community operated was challenged by poor coordination mechanisms. Bureaucracies also challenged information dissemination within the counterterrorism agencies and organizations. There were limitations related to missed or delayed signals. Lack of sufficient numbers of intelligence personnel also limited the efficiency of the intelligence community. Corruption also created security vulnerabilities since it lead to compromise of intelligence operations. Poor interagency cooperation has also limited the capacity of the intelligence community. Poor regional and international policy frameworks mean that joint counterterrorism initiatives could not be implemented effectively. Inadequate financing and training also limited the responsiveness of the intelligence community to the dynamism of terrorism. The challenge of training has also negatively impacted on the intelligence end product which has as a result compromised counterterrorism operations. Challenges related to local legislation means that the intelligence community operated in a vacuum. Several recommendations were made. These include: regular training to of the intelligence community; strengthening cooperation with regional and international intelligence organizations; enacting facilitative laws to limit legal constraints; implementing interagency cooperation strategies; ensuring adequate financing; deploying enough personnel and establishing a terrorism research department.
- ItemThe Dynamics of private security provisioning in homeland security in Kenya(Strathmore University, 2021) Mauti, Jared NyakambiUsing Robert Dahl’s Pluralism theory, this study responds to three questions; how does proliferation of private security entities and consequent relational dynamics affect homeland security provisioning in Kenya? What are the legal implications inherent in this proliferation? How should the regulatory design and framework of private security provisioning fit into the realm of homeland security architecture? It sets out three objectives; examine and analyze the impact of proliferation of private security entities on security provisioning in Kenya, examine and analyze existing policy and legal frameworks and its implications in private security provisioning, and proffer research-based regulatory framework for private security entities in homeland security architecture. The study uses a qualitative approach to data collection and analysis. Using a combination of both primary data, through questionnaires and interview schedules, and secondary data involving content analysis of various publications, the study contends that the crisis of security provisioning is a function of uncoordinated proliferation of private security providers exacerbated by unresolved gaps and weaknesses underpinning the regulatory framework. The study therefore recommends for the development of a written National Security Policy to coordinate and anchor security provisioning Policies and resultant legal frameworks to operationalize private security provisioning in Kenya.
- ItemThe Enforcement aspects of combating money laundering in Kenya(Strathmore University, 2021) Chelimo, Fredrick SuterOver time the rule of law has been formulated and used to regulate human conduct including discouraging the commission of crime. The purpose of the study is therefore to assess law enforcement aspects of combating money laundering in Kenya. This was done by exploring the regulatory and institutional mechanisms as key enforcement variables. Essentially, it is the mandate of the enforcement agencies to ensure that anti-money laundering (AML) policy is implemented. In spite of this, it still remains difficult to quantify the effectiveness, costs, consequences and challenges of enforcing AML regulations. The study is based on three objectives which are to establish the effects of anti-money laundering legal frameworks, anti-money laundering preventive measures, institutional capacities, and international coordination on combating money laundering in Kenya. To achieve these objectives, the study used descriptive study design and questionnaires to collect data from a sample size of hundred and five (105) employees working in the five purposively identified lead AML enforcement agencies within Nairobi City County. Eighty-eight targeted respondents managed to return filled questionnaires; leading to a response rate was 83.8%. Four institutions dealing with AML combined constituted the sample frame of the study. The study utilized stratified sampling to attain representation from three cadres of employees, that is, the management, supervisory and junior employees. Both descriptive and inferential statistics were used. Equally, Qualitative data was analyzed using content analysis and results presented in themes and prose format. Quantitative data was analyzed using SPSS for both inferential and descriptive statistics, and presented through charts, figures and tables for ease of understanding. The results indicate that the four variables of Money laundering framework, Anti-money laundering preventive measures, Institutional capacity, and international cooperation were associated with a 58.0% positive change in the state of combating money laundering in Kenya. Further, the four independent variables were significant predictors of combating money laundering in Kenya. Changes in money laundering framework (p-value of 0.034), anti-money laundering preventive measures (p-value of 0.014), and institutional capacity (p-value of 0.001) and, international cooperation (p-value of 0.00) were significant predictors of the state of combating money laundering in Kenya. Recommendations were that the government needed to strengthen regulation and enforcement mechanism of combating money laundering in Kenya. Secondly, there is a need to craft a clear coordination framework free of bureaucratic inconveniences to enable harmonious working relationship among the government bodies responsible for the implementation of the AML policy in Kenya. Thirdly, policymakers need to enact a policy that provide for specific incentives that can cheer up FI and the DNFIB to effectively make STRs and SARs as envisaged. Other recommendations are expounded in the study.