STRENGTHENING INTELLIGENCE GATHERING AND SHARING IN REDUCING TERROR RELATED ACTS IN KENYA

SIMON MWANGI WANDERI, DR. SUSAN MWANGI (PhD), DR. JOSEPH WASONGA (PhD)

Abstract


This study explored appropriate measures for strengthening Intelligence Gathering & Sharing in reducing terror related acts in Kenya. The research covered diverse categories of informants from various institutions and agencies cross cut by intelligence gathering and sharing in Kenya. These included: security officers from the national police service, members of civil society organizations working in areas of security and human rights, academicians and members of the public. Government officers, members of community policing department and former police reservists were also included. Exploratory research design was applied.  Primary data was collected using open and close-ended questionnaires and interview guide. Data analysis done through mixed analysis method while quantitative data was analyzed through descriptive statistics. Qualitative data was analysed through content analysis. The findings revealed that TT has morphed overtime in terms of actors, motives and targets. Initial TT attacks in the country were indirect attacks on U.S and Israel interest but most subsequent attacks were direct targets to Kenya. The study found that diverse security reforms that have been implemented in the country since independence which have helped to improve IG & S. Major improvements were highlighted to have been streamlined in technology used, training and the information shared. Among the different forms of intelligence, human intelligence and signals intelligence were found to have played the greatest role in containing TT. The study concluded that the question of intelligence being effective or ineffective in curbing transnational terrorism is dependent on the reaction of all security agencies who receive it. The study recommended that the ability of terrorists to morph should be met with equal efforts by security forces changing their strategies in gathering and sharing information on terrorism from members of the public. There is need for interagency cooperation in sharing intelligence. Both domestic and foreign agencies involved in intelligence sharing should work together to boost their confidence with each other to enhance their readiness and commitment to share security intelligence.

Key terms: Transnational Terrorism, Reforms, Counter Terrorism Strategy, Information Sharing

CITATION:  Wanderi, S. M., Mwangi , S. & Wasonga, J. (2022). Strengthening intelligence gathering and sharing in reducing terror related acts in Kenya. The Strategic Journal of Business & Change Management, 9 (1), 389 – 417.


Full Text:

PDF

References


Adam, A. B. (2015). GSU (General Service Unit-Kenya) Recce Squad Company – Elite Reconnaissance Combat Unit. Strategic Intelligence. Retrieved from: https://intelligencebriefs.com/kenya-gsu-general-service-unit-recce-squad-company-elite-reconnaissance-combat-unit/ (Accessed 20 January 2021).

Adams, N., Nordhaus, T. & Shellenberger, M. (2011). Counterterrorism Since 9/11: Evaluating the Efficacy of Controversial Tactics. Oakland, CA: BreakThrough Institute

Adan, H. H. (2005). Combating transnational terrorism in Kenya (Unpublished Master’s Thesis). U.S. Army Command and General Staff College, Kansas, U. S. Available at: https://apps.dtic.mil/sti/pdfs/ADA436675.pdf

Addamah, S. (2012). Central Africa: Great Lakes Countries Upgrade Intelligence Sharing Cooperation. Medafrica Times, 26 June. Retrieved from: http://medafricatimes.com/329-central-africa-great-lakes-countries-upgrade-intelligence-sharing-cooperation.html

Africa, S. & Kwadjo, J. (2009). Changing Dynamics of Intelligence in Africa. GFN-SSR.

African Union (2004). Protocol to the OAU Convention on the Prevention and Combating of Terrorism. Retrieved from: https://au.int/en/treaties

African Union (2018). Peace and Security Council (PSC). Retrieved from: https://au.int/en/organs/psc

Agbala, A., & Pulkol, D. (2009). The General Performance and System of Intelligence Bodies in the Great Lakes Region. In Africa, S. and Kwadjo, J. (Eds.), Changing Dynamics of Intelligence in Africa. GFN-SSR.

Albert, E. (2015). The Shanghai Cooperation Organization. Council on Foreign Relations, 14 October. Retrieved from: https://www.cfr.org/backgrounder/shanghai-cooperation-organization

Alda, E. & Sala, J. L. (2014). Links between terrorism, organized crime and crime: The case of the Sahel region. Stability: International Journal of Security & Development, 3(1/27), 1-9.

Aldrich, R. J. (2003). Dangerous liaison: Post-September 11 intelligence alliances. Harvard International Review, XXIV(3).

Alex, P. (2004). Schmid, Frameworks for conceptualizing terrorism. Terrorism and Political Violence, 16(2), 117-125.

Amnesty International, (1990). Kenya: Silencing Opposition to One Party Rule. Retrieved from: https://www.amnesty.org/download/Documents/200000/afr320281990en.pdf

Amnesty International, Kenya (2004). Memorandum to the Kenyan Government on the Suppression of Terrorism Bill 2003. Retrieved from: https://www.refworld.org/docid/42ae982c0.html (Accessed 21 January 2021).

Andrews, W. & Lindeman, T. (2013). $52.6 Billion: The Black Budget. Washington Post, 29 August. http://www.washingtonpost.com/wp-srv/special/national/black-budget/

Ankomah, B. (2014). How Africa can beat terrorism. NewAfrican, June 25. Available at: http://newafricanmagazine.com/africa-can-beat-terrorism/

Ansaaku, G. (2017). Towards a more effective regional counter-terrorism cooperation in Africa. 2017 Policy Brief Series. Fox International Fellowship. Available at: https://foxfellowship.yale.edu/sites/default/files/files/ansaaku%2C%20final%20PB.pdf

Anthony, M. C., Emmers, R., Acharya, A. (2006). Understanding the Dynamics of Securitizing Non-Traditional Security. In Non-Traditional Security in Asia: Dilemmas in Securitization. Hampsire: Ashgate Publishing.

Aronson, S. L. (2013). Kenya and the global war on terror: Neglecting history and geopolitics in approaches to counterterrorism. African Journal of Criminology and Justice Studies [AJCJS], 7(1&2), 24 – 34

Asongu, S. A. & Biekpe, N. (2017). Globalization and Terror in Africa. AGDI Working Paper No. WP/17/053. Retrieved from: https://mpra.ub.uni-muenchen.de/85056/1/MPRA_paper_85056.pdf

Atellah, J. (2019, March 4). The aftermath of terror attacks in Kenya since 1975. The Elephant. Retrieved from: https://www.theelephant.info/data-stories/2019/03/04/an-aftermath-of-terror-attacks-in-kenya-since-1975/

Awan, I. & Blakemore, B. (Eds.). (2016). Policing Cyber Hate, Cyber Threats and Cyber Terrorism. London: Routledge.

Bacon, T. (2014). Alliance hubs focal points in the international terrorist landscape. Perspectives on Terrorism, 8(4), 4-26

Badurdeen, F. A. & Goldsmith, P. (2018). Initiatives and perceptions to counter violent extremism in the Coastal region of Kenya. Journal For Deradicalization, Fall (16), 70-102.

Badurdeen, F. A. (2016). Al-Shabaab Terrorist Recruitment in Kenya: Contributions from the Social Movement Theory. Paper presented at the 24th International Congress of Political Science, Social Movement Approaches Panel, Adam Mickiwicz University, Poznan, Poland, 23-28 July, 2016.

Badurdeen, F. A. (2012). Youth Radicalization in the Coast Province of Kenya. Africa Peace and Conflict Journal, 5(1), 53-64.

Ball, N. (2010). The evolution of security sector reform agenda. In Sedra, M. (Ed.), The Future of Security Sector Reform. Ontario: Canada, CIGI (29-44).

Barger , D. G. (2005). Toward a Revolution in Intelligence Affairs. Santa Monica, CA: RAND Corporation

Baylis, J. & Smith, S. (Eds.). (2017). The Globalization of World Politics: An Introduction to International Relations. Oxford: Oxford University Press.

Belkin, A. & Schofer, E. (2003). Toward a structural understanding of coup risk. Journal of Conflict Resolution, 47(5), 594–620.

Bellaby, R. W. (2014). The Ethics of Intelligence: A New Framework. London: Routledge.

Bendix, D. & Ruth, S. (2008). Security sector reform in Africa: The promise and the practice of a new donor approach. Nairobi: African Centre for the Constructive Resolution of Disputes (ACCORD).

Bernholz, P. (2006). International political system, supreme values and terrorism. Public Choice, 128, 221– 231.

Best, R. A. & Cumming, A. (2007). Open Source Intelligence (OSINT): Issues for Congress. CRS Report. Retrieved from: https://www.fas.org/sgp/crs/intel/RL34270.pdf

Best, R. A. (2011). Intelligence Information: Need-to-Know vs. Need-to-Share. Congressional Research Service Report

Black, M. & Alhenaki, O. (2015). Business as usual: The Egyptian–U.S. intelligence relationship. Global Security and Intelligence Studies, 1(1), 14-30.

Boinett, W. (2009). The Origins of the Intelligence System of Kenya. Africa, S. & Kwadjo, J. (Eds.). Changing Dynamics of Intelligence in Africa. GFN- SSR (pp. 15-40).

Botha, A. (2013). Assessing the vulnerability of Kenyan youths to radicalisation and extremism. Institute for Security Studies Papers, (245), 1-28.

Botha, A. (2014). Radicalisation in Kenya. Recruitment to al-Shabaab and the Mombasa Republican Council. Institute for Security Studies Papers, 265, 28.

Brandon, H. (2003). Transformation and Reconciliation. In John, D. & Roger, M. (eds.). Contemporary Peacemaking: Conflict, Violence and Peace Processes. Great Britain: Palgrave MacMillan Ltd.

Bruce, G. (2013). Definition of terrorism social and political effects. Journal of Military and Veterans’ Health, 21(2), 26-30.

Bruneau, T. C. (2008). Democracy and effectiveness: Adapting intelligence for the fight against terrorism. International Journal of Intelligence and Counter Intelligence, 21(3), 448 – 460

Buzan, B., Weaver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis. Boulder: Lynne Rienner Publishers.

CA/34/1. Circular letter from the PS Ministry of Home Affairs G.S.K. Boit to all PSC and DSC. 21st May 1975. KNA Security and intelligence correspondence 1962-1979.

CA/44/24 KNA. Letter to the D.C. Wundanyi – Taita Taveta from SB Officer. 09th December 1970.

Carsten, P. (2012 March). Al Quaida attacks in Europe since 2011. The Telegraph. Retrieved from: http://www.telegraph.co.uk/news/worldn ews/al-qaeda/9157929/Al-Qaedaattacks-in-Europe-since-September11.html

Carter, D. L., & Carter, J. G. (2009). The intelligence fusion process for state, local and tribal law enforcement. Criminal Justice and Behavior, 36(12), 1323–1339

Catano, V. & Gauger, J. (2017). Information Fusion: Intelligence Centers and Intelligence Analysis. In I. Goldenberg, J. Soeters and W.H. Dean (eds.), Advanced Sciences and Technologies for Security Applications: Information Sharing in Military Operations. Ottawa: Springer

Chalk, P. & Rosenau, W. (2004). Confronting the “Enemy Within” Security Intelligence, the Police, and Counterterrorism in Four Democracies. Santa Monica, CA: RAND

Chau, D. C. (2007). Political Warfare in Sub-Saharan Africa: U.S. Capabilities and Chinese Operations in Ethiopia, Kenya, Nigeria, and South Africa. Strategic Studies Institute, U. S. Army War College. Available at: https://www.jstor.org/stable/resrep11582?seq=1#metadata_info_tab_contents

Chehade, G. (2007). Listing Hezbollah as “Terrorist” serves North American Imperialism. Retrieved from: http://www.zcommunications.org/listing-hezbollah-asterrorist-serves-north-american-imperialism-by-ghada-chehade

Chenoweth, E. (2013). Terrorism and democracy. Annual Review of Political Science, 16, 355-378.

Chitiyo, K. (2009). The case for security sector reform in Zimbambwe. Londom: Royal United Services Institute.

Chome, N. (2016). Violent Extremism and Clan Dynamics in Kenya. Peaceworks no. 123. Washington, DC: United States Institute of Peace

Chumba, C., Okoth, P. G., & Were, D. (2016). Effectiveness of border surveillance strategies in the management of transnational terrorism in Kenya and Somalia. International Journal of Political Science (IJPS), 2(2), 39-53.

Clark, R. M. (2013). Intelligence Analysis (4th ed.). Los Angeles: Sage Publications.

Cogan, C. C. & May, E. R. (2006). The Congo, 1960–1963: Weighing worst choices. In Ernest R. May and Philip D. Zelikow (ed.), Dealing with Dictators: Dilemmas of U.S. Diplomacy and Intelligence Analysis, 1945–1990. Cambridge, MA: MIT Press (56–60).

Connable, B. (2012). Military Intelligence Fusion for Complex Operations: A New Paradigm. Arlington, VA: Rand Corporation.

Corfield, F. D. (1960). Historical survey of the origins and growth of Mau Mau. Cambridge: Cambridge University Press. Available at: https://doi.org/10.2307/1158108

Cornall, R. & Black, R. (2011). Independent Review of the Intelligence Community Report. Canberra: Dept. of the Prime Minister and Cabinet. Retrieved from: http://www.dpmc.gov.au/publications/iric/docs/2011-iric-report.pdf

Cossyleon, J. E. (2019). Community policing. In Orum, A. (ed.), The Wiley Blackwell Encyclopedia of Urban and Regional Studies. Chicago: John Wiley & Sons Ltd.

Costello, J. (2016). Chinese Intelligence Agencies: Reform and Future. Proceedings of the One Hundred Fourteenth Congress (Second Session) of U.S.-China Economic and Security Review Commission. Washington, D.C.: U.S.-China Economic and Security Review Commission

Dailey, J. (2017). The intelligence club: A comparative look at Five Eyes. Journal of Political Science and Public Affairs, 5(2), 1-8.

David, G. (2015). RECCE Squad Commandos Training in Kenya. Strategic Intelligence. Retrieved from: https://intelligencebriefs.com/recce-squad-commandos-training-in-kenya/ (Accessed 20 January 2021).

Dehez, D. (2010). Intelligence services in Sub-Saharan Africa: Making security sector reform work. ASPJ Africa & Francophonie, 2010 (3/4), 57-63.

Demeke, M. A. & Gebru, S. G. (2014). The role of regional economic communities in fighting terrorism in Africa: the case of Inter-Governmental Authority on Development (IGAD). European Scientific Journal, 2(Special edition), 216-229

Den Boer, M. (2015). Counter-terrorism, security and intelligence in the EU: Governance challenges for collection, exchange and analysis. Intelligence and National Security, 30(2-3), 401- 413

Devine, P. (2011). A critical analysis of the role of religion in fuelling or healing conflict. Tangaza Journal of Theology Mission, (1), 52-69.

Devine, P. (2017). Radicalisation and extremism in Eastern Africa: Dynamics and drivers. Journal of Mediation and Applied Conflict Analysis, 4(2), 1-34.

Directorate of Criminal Investigations (2015). History of CID. Available at: http://www.cid.go.ke/index.php/aboutus/background-of-cid.html

Doyle, M. & Recchia, S. (2011). Liberalism in international relations. In Badie, B., Schlosser, D. and Morlino, L. (eds.), International Encyclopedia of Political Science. Los Angeles: Sage.

Doyle, M. (1997). Ways of war and peace: Realism, liberalism and socialism. New York: W. W. Norton.

Dunne, T. (2009). Liberalism, international terrorism, and democratic wars (Vol. 23). Los Angeles: SAGE Publications.

Duyvesteyn, I. (2007). The Role of History and Continuity in Terrorism Research. In M. Ranstorp (Ed.), Mapping Terrorism Research: State of the Art, Gaps and Future Direction (pp. 51-75). Oxon: Routledge.

Emerald Publishing (2021). How to use secondary data and archival material. Retrieved from: https://www.emeraldgrouppublishing.com/how-to/research/data-analysis/use-secondary-data-and-archival-material (Accessed 19 August 2021).

Emmers, R. (2004). Non-Traditional Security in the Asia-Pacific: The Dynamics of Securitization. Singapore: Eastern Universities Press.

Enders, W. & Sandler, T. (2012). The Political Economy of Terrorism (2nd ed.). New York: Cambridge University Press

Enders, W., Sandler, T., & Gaibulloev, K. (2011). Domestic versus transnational terrorism: Data, decomposition, and dynamics. Journal of Peace Research, 48(3), 319–337

Fischer, R. J., Halibozek, E. P. & Walters, D. C. (2019). Selected security threats of the 21st century. In, Introduction to security (10th ed.). Elsevier Inc. Retrieved from: https://www.sciencedirect.com/topics/social-sciences/espionage (Accessed on 10th June 2020).

Flavius-Cristian, M. & Andreea, C. M. (2013). The role of intelligence in the fight against terror, European Scientific Journal, 9(2), 1-11

Forcese, C. (2011). Spies without borders: International law and intelligence collection. Journal of National Security Law & Policy, 5(179), 179-210

Freeman, L. (2013). Nelson Mandela, the honorary Canadian. The Globe and Mail. Retrieved from: https://www.theglobeandmail.com/news/world/nelson-mandela/nelson-mandela-the-honorary-canadian/article548188/ (Accessed 28 January 2021).

Frontex, (2016). Africa-Frontex Intelligence Community Joint Report. Warsaw: Frontex

Fukuyama, F. (1992). The end of History and the last man. New York: MacMillan Inc.

Fulgence, N. (2015). War on terrorism in Africa: A challenge for regional integration and cooperation organizations in Eastern and Western Africa. Journal of Political Sciences & Public Affairs, SI (007), 1-11.

Gall, M. D., Gall, J. P., & Borg, W. R. (2007). Educational Research (8th Ed.). Boston: Pearson Education, Inc.

Gentry, J. A. (2015). Has the ODNI improved U.S. intelligence analysis? International Journal of Intelligence and CounterIntelligence, 28(4), 637-661.

Gill, C., Weisburd, D., Telep, C. W., Vitter, Z. & Bennett, T. (2014). Community-oriented policing to reduce crime, disorder and fear and increase satisfaction and legitimacy among citizens: A systematic review. Journal of Experimental Criminology, 10(1), 399-428.

Gill, P. (2009). Security intelligence and human rights: Illuminating the “heart of darkness”? Intelligence and National Security, 24(1), 78-102.

Gill, P. (2010). Theories of Intelligence. Retrieved from: https://www.researchgate.net/publication/290750454_Theories_of_Intelligence (Accessed 29 September 2020).

Gisesa, N. (2020, August 31). Revealed: Secret GSU team that neutralises terrorists. Nation. Retrieved from: https://nation.africa/kenya/news/revealed-secret-gsu-team-that-neutralises-terrorists-1928248.

Githens-Mazer, J. (2008). Causes of Jihadi terrorism: Beyond paintballing and social exclusion. Criminal Justice Matters, 73 (1), 26-28.

Githinji, P. (2017). Corruption in the Kenya police force and impacts on Kenyan security: investigating the need for police reforms. Air War College, Air University. Retrieved from: https://apps.dtic.mil/dtic/tr/fulltext/u2/1042018.pdf (Accessed on 05th June 2020).

Goin, J. (2015, April). Nkaissery admits intelligence was ignored in Garissa attack. Capital News. Retrieved from: https://www.capitalfm.co.ke/news/2015/04/nkaissery-admits-intelligence-was-ignored-in-garissa-attack-2/

Gordon, M. (2004). The United States and Israel: Double standards, favoritism, and unconditional support. In J. L. Kincheloe & S.R. Steinberg (Eds.), The Miseducation of the West: How Schools and Media Distort Our Understanding of the Islamic World (pp.103-116). London: Praeger.

Graff, C. (2010). Poverty, development and violent extremism in weak states. Washington D.C: Brookings Institute.

Graue, T. M., Hildie, R. E. & Weatherby, G. A. (2016). Women in modern policing. Journal of Social Sciences and Humanities, 2(3), 51-62.

Grimland, M., Apter, A., & Kerkhof, A. (2006). The phenomenon of suicide bombing: A review of psychological and nonpsychological factors. Crisis, 27(3), 107-118.

Grothaus, N. (2018). Types of Terrorism. Hand of Reason Blog. http://handofreason.com/2011/featured/types-of-terrorism

Guest, G., Bunce, A. & Johnson, L. (2006). How many interviews are enough? An experiment with data saturation and variability. Field Methods, 18(1), 59-82.

Hanggi, H. (2004). Conceptualizing Security Sector Reform and Reconstruction. In Bryden, A. & Hanggi, H. (Eds.). Reform and Reconstruction of Security Sector. Munster, Germany: LIT Verlag (pp. 3-18).

Headayetullah, M., & Pradhan, G. K. (2010). Interoperability, trust based information sharing protocol and security: Digital government key issues. International Journal of Computer Science and Information Technology, 2(3), 72-91

Hendrickson, D. (2010). Security Sector Transformation in Africa. In Bryden, A. & Fummi, O. (2010) (Eds). Security Sector Transformation in Africa. Geneva: Centre for the Democratic Control of ARMED Forces (DCAF).

Hermsmeyer, G. A. (2010). Institutionalizing security sector reform: Options for the U. S. government. Washington D. C.: United States Institute of Peace

Hoffman, B. (2004). Brutal interrogation techniques may be necessary to gather valuable intelligence. In L. Gerdes (ed.), Espionage and Intelligence Gathering. San Diego: Greenhaven Press, p.31.

Hoffman, B. (2006). Inside terrorism. Columbia University Press

Hoffman, B. (2006). Inside terrorism. New York: Columbia University Press.

Holmern G. & van Deventer, F. (2014). Inclusive Approaches to Community Policing and CVE (Special Report 352). United States Institute of Peace

Hsieh, H.F., & Shannon, S.E. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277-1288.

Hughbank, R. J. & Githens, D. (2010). Intelligence and its role in protecting against terrorism. Journal of Strategic Security, 3(1), 31-38

Hutchful, E. (2009). ‘Preface’. In S. Africa & J. Kwadjo, (eds), Changing Intelligence Dynamics in Africa. Global Facilitation Network-Security Sector Reforms (4-5).

Ibrahim, M. (2010). Somalia and global terrorism: A growing connection? Journal of Contemporary African studies, 28(3), 283-295.

Institute for Economics & Peace, (2017). Global Terrorism Index report 2017: Measuring and Understanding the Impact of Terrorism. Sydney: Institute for Economics & Peace.

International Crisis Group. (2014). Kenya: Al Shabaab closer to home. Africa Briefing No. 102. Brussels: International Crisis Group.

Johansen, I. (2015). Special Operations Forces – a Weapon of Choice for Future Operations? In Norheim-Martinsen, P. M. and Nyhamar, T. (eds.), International Military Operations in the 21st Century: Global Trends and the Future of Intervention. New York: Routledge

Jones, J. M. (2010). Is Ethical Intelligence a Contradiction in Terms? In J. Goldman (eds.) Ethics of Spying: A Reader for the Intelligence Professional. Portland, USA: Scarecrow Press

Jonyo, F. & Buchere P. B. (2011). The changing nature of security and intelligence in Africa: A theoretical perspective, challenges, and reforms. Nairobi: Azinger Limited.

Kamau, W. C. (2006). Kenya & the war on terrorism. Review of African Political Economy, 107, 133–141.

Kant, I. (1795). Perpetual Peace. In H. Reiss (ed.) Kant’s Political Writings (trans. 1991). Cambridge: Cambridge University Press, 93–130.

Karanja, S. (2011). An Analysis of Militant-Radical Terrorism and Counter Terrorism Measures in Kenya, 1985-2010 (Unpublished Master Dissertation). University of Nairobi, Institute of Diplomacy, and International Studies, Nairobi.

Karmon, E. (2002). The role of intelligence in counter-terrorism. The Korean Journal of Defense Analysis, XIV(1), 119-139

Karume, N. (2009). Beyond Expectations. From Charcoal to Gold. Nairobi, Kenya: African Books Collective.

Kawira, S. (2014). Police Reforms in Kenya: Case of National Police Service Commission (Unpublished Master Thesis). University of Nairobi, Nairobi.

Keohane, R. O. (2012). Twenty years of institutional liberalism. International Relations, 26(2), 125–38.

Khosrokhavar, F. (2014). Radicalisation. Paris: Éditions de la Maison des sciences de l’homme.

Kiarie, L. & Mogambi, H. (2017). Media and conflict: An analysis of print media coverage of terrorism in Kenya. American International Journal of Social Science, 6(1), 45-64

Kiraly, D. (2014). A Social Constructivist Approach to Translator Education: Empowerment from Theory to Practice. New York: Routledge.

Kivoi, D. & Mbae, C. (2013). The Achilles‘ heel of police reforms in Kenya. Social Sciences, 2(6), 189-194.

Klein, A. (2017). Negative spaces: Terrorist attempts to erase cultural history and the critical media coverage. Media, War & Conflict, 17(5), 706-726.

Knight, A. (2007). Jihad and Cross-Cultural Media: Osama Bin Laden as Reported in the Asian Press. Pacific Journalism Review, 13(2), 155-174.

Korab-Karpowicz, W. J. (2017). Political Realism in International Relations. In Stanford Encyclopedia of Philosophy. Stanford, CA: The Metaphysics Research Lab.

Kratochwil, F. (1991). Rules, Norms, and Decisions: On the Conditions of Practical and Legal Reasoning in International Relations and Domestic Affairs. Cambridge: Cambridge University Press.

Kwesi, G. W. (2012). The National Security Strategy of the United States of America. Washington DC: Executive Office of the President.

LaFree, G., & Dugan, L. (2015). How has Criminology Contributed to the Study of Terrorism since 9/11? Terrorism and Counterterrorism Today, 6(11), pp. 1-23.

Lind, J., Mutahi, P. & Oosterom, M. (2017). Killing a mosquito with a hammer: Al-Shabaab violence and state security responses in Kenya. Peacebuilding, 5(2), 118-135.

Lowenthal, M. M. (2016). Intelligence: From Secrets to Policy (4th ed.). Washington, D.C.: CQ Press.

Loza, W. (2007). The Psychology of Extremism and Terrorism: A Middle-Eastern Perspective. Aggression and Violent Behavior, 12, 141-155.

Lucheli, I. (2013, June 15). Reprieve for the 47 County Commissioners. The Standard. Available at: https://www.standardmedia.co.ke/politics/article/2000086013/reprieve-for-the-47-county-commissioners

Lyman, P. (2009). The War on Terrorism in Africa. In Harbeson, J., & Rothchild, D. (Eds.). Africa in World Politics: Reforming Political Order. Michigan, University of Michigan: Westview Press.

MacAskill, E. (2015 November). How French intelligence agencies failed before the Paris attacks. The Guardian. Retrieved from: http://www.theguardian.com/world/2015 /nov/19/how-french-intelligenceagencies-failed-before-the-paris-attacks.html

Manson, K. (2013, November 18). Fresh details of Nairobi mall terror plot emerge. Financial Times. Available at: https://www.ft.com/content/1984bfb4-5068-11e3-9f0d-00144feabdc0

Martin, G. (2004). The New Era of Terrorism. Thousand Oaks, CA: Sage Publications

Martin, S. (2016). Spying in a Transparent World: Ethics and Intelligence in the 21st Century. Geneva: Geneva Centre for Security Policy (GCSP).

Matseketsa, B. & Mapolisa, T. (2013). The effects of terrorism on international peace and security and educational systems in Africa and beyond- a new millennium perspective. International Journal of Advanced Research, 1(8), 694-710.

Mazrui, A., Njogu, K. & Goldsmith, P. (2018). Countering violent extremism in Kenya: Between the rule of law and the quest for security. Nairobi: Twaweza Communications Ltd.

McGill, A. S. & Gray, D. H. (2012). Challenges to international counterterrorism intelligence sharing. Global Security Studies, 3(3), 76 – 86

McGregor, L. (2009). Kenya and counter-terrorism: A time for change. London: Redress/Reprieve

McGruddy, J. (2013). Multilateral intelligence collaboration and international oversight. Journal of Strategic Security, 6(3 Suppl.), 214-220.

McLuhan, M. (2016). Without communication, terrorism would not exist. In A Handbook on Reporting Terrorism. Nairobi: International Media Support and the Media Council of Kenya.

Michael, W. (1990). The communitarian critique of liberalism. Political Theory, 18(1), 6-23.

Mogire, E., & Agade, K. M. (2011). Counter-terrorism in Kenya. Journal of Contemporary African Studies, 29(4), 473-491.

Mohochi, S. M. (2011). Preventive Counter Terrorism Action: Case Study of Kenya (April 15, 2011). Retrieved from: https://ssrn.com/abstract=1898930

Moller, B. (2007). Security sector reform and the fight against terrorism. Copenhagen, Denmark Danish Institute for International Studies, DIIS. Available at: http://subweb.diis.dk/graphics/Publications/Reports%202007/RP_2007-12web.pdf.

Monaghan, J., & Walby, K. (2012). Making up “terror identities”: Security intelligence, Canada’s integrated threat assessment centre and social movement suppression. Policing and Society: An International Journal of Research and Policy, 22(2), 133–151

Moravej, K., & Diaz, G. (2007). Critical issues in contemporary counter-intelligence. UNISCI Discussion Papers, No 13 (Enero / January 2007), 53-70

Morton, S. M., Bandara, D. K., Robinson, E. M., & Carr, P. E. (2012). In the 21st Century, what is an acceptable response rate? Australian and New Zealand Journal of Public Health, 36(2), 106-108.

Mugenda, O. M., & Mugenda, A. G. (2003). Research methods: Qualitative and Quantitative Approaches. Nairobi: Acts Press.

Muhula, R. (2007). Kenya and the Global War on Terrorism: Searching for a New Role in a New War. In Davis, J. (eds.), Africa and the War on Terrorism. Burlington, VT: Ashgate.

Mukinda, (2015, April). Shame of Slow Response in 15-hour Campus Terror. Daily Nation. Retrieved from: https://www.nation.co.ke/news/Shame-of-slow-response-in-15-hour-campus-terror/1056-2676432-1yvecm/index.html

Munton, D. (2009). Intelligence cooperation meets international studies theory: Explaining Canadian operations in Castro’s Cuba. Intelligence and National Security, 24(1), 126.

Muraya, J. (2017, April). Kenya, Netherlands sign pact to counter violent extremism. Capital News, 13. Retrieved from: https://www.capitalfm.co.ke/news/2017/04/kenya-netherlands-sign-pact-to-counter-violent-extremism/

Muriuki, G. A. (1974). A history of the Kikuyu; 1500-1900. Nairobi: Oxford University Press.

Musa, T. (2010). Intelligence cooperation practices in the 21st century: Towards a culture of sharing. Washington, D.C.: IOS Press.

Mutave, N. M. (2005). Terrorism: Challenges facing Kenya’s national security and national responses to terrorism, 1981-2003 (Masters Thesis). University of Nairobi, Nairobi. Available at: http://erepository.uonbi.ac.ke/handle/11295/19590

Mutua, M. & Munuhe, M. (2013, September 28). National Intelligence Service report warned of Nairobi terror attacks. The Standard. Available at: https://test.standardmedia.co.ke/kenya/article/2000094429/leaked-nis-document-details-terrorist-plots-of-attack

Mwagiru, M. (2008). Africa in International Security Agenda Setting. In Mwagiru, M. (Ed.). Human Security: Setting the Agenda for the Horn of Africa. Nairobi, Africa Peace Forum.

Mwazighe, C. L. (2012). Legal responses to terrorism: Case study of the republic of Kenya (Unpublished Master Thesis). Naval Postgraduate School, Monterey, California. Available at: https://core.ac.uk/download/pdf/36720706.pdf

Mwere, D. (2017 September). Kenya: Terror groups pose biggest threat to Kenya’s security – NIS. Daily Nation. Retrieved from: http://allafrica.com/stories/201709200081.html

Myerson, R. B. (1991). Game Theory: Analysis of Conflict. Cambridge: Harvard University Press.

Mythen, G. & Walklate, S. (2006). Criminology and terrorism. British Journal of Criminology, 46, 379-398.

Nasser-Eddine, M., Garnham, B., Agostino, K., & Caluya, G. (2011). Countering Violent Extremism (CVE) Literature Review. Edinburgh, South Australia: Counter Terrorism and Security Technology Centre – Defence Science and Technology Organisation

Nathan, L. (2012). Intelligence Transparency, Secrecy, and Oversight in a Democracy. In H. Born and A. Wills (eds), Overseeing Intelligence Services: A Toolkit.

Nation (2009). The Dark Legacy. Nairobi: Nation Media Group. Retrieved from: https://nation.africa/kenya/news/the-dark-legacy--603970 (Accessed on 18 September 2020).

National Counterterrorism Centre (2016). About National Counterterrorism Centre. Retrieved from: http://www.counterterrorism.go.ke/about-us/ (Accessed on 06 June 2020).

National Police Service (2017). Community policing information booklet. Available at: http://www.nationalpolice.go.ke/downloads/%20category/20-nps-community-policing-information-booklet.html.

Ndeda, M. A. J. (2006). Secret Servants: A History of Intelligence and Espionage in Kenya, 1887-1999. Unpublished Report Submitted to the National Security and Intelligence Service of Kenya on 30th January 2006. Department of History, Archeology and Political Studies, Kenyatta University.

Neumann, P. R. (2013). The trouble with radicalization. International Affairs, 89(4), 873-893

Nicander, L. D. (2011). Understanding intelligence community innovation in the post-9/11 world. International Journal of Intelligence and CounterIntelligence, 24(3), 534-568.

Nisbett, R. E. (2010). Intelligence and how to get it: Why schools and cultures count. Contemporary Sociology, 39(1), 391-396.

Njoku, C. G., Okeniyi, O. O., Ayara, N. N. & Akoth, C. O. (2018). Terrorism in Africa: Mapping the Nigeria and Kenya situation. International Journal of Development and Sustainability, 7(3), 993-1014.

Nkala, O. (2015). Kenya Gets US Funds for Counterterror War. DefenseNews. Retrieved from: https://www.defensenews.com/global/mideast-africa/2015/08/06/kenya-gets-us-funds-for-counterterror-war/ (Accessed 21 January 2020).

Nolte, W. (2009). Ethics and intelligence. Joint Force Quarterly: JFQ, 54(1), 22-29

Nte, N. D. (2011). The use and ‘ab-use’ of intelligence in a transitional democracy: evidence from Nigeria. International Journal of Human Sciences, 8(1), 984-1018

Nutchey, D., & Cooper, T. (2016). Operationalising Constructivist Theory using Popper’s Three Worlds. In Proceedings of the 40th Conference of the International Group for the Psychology of Mathematics Education (Vol. 3, pp. 371-378). PME.

Nyongesa, M. (2017). Are land disputes responsible for terrorism in Kenya? Evidence from Mpeketoni attacks. Journal of African Democracy and Development, 1(2), 33-51.

Ochieng,’ A. O. (2016). Security Sector Reforms and their Implication in Fighting against Terrorism in Kenya (1998-2015). Masters Thesis. Kenyatta University, Nairobi.

Ochieng’, W. R. (1995). Structural and Political Changes. In Ochieng’ W. R. & Ogot, B. A. (eds.), Decolonization and Independence in Kenya, 1940-1993. Nairobi: EAEP

Ogada, M. (2017). Emerging Developments in Countering Violent Extremism and Counter terrorism in Kenya. Nairobi: Centre for Human Rights and Policy Studies.

Okoro, O. I. & Oluka, N. L. (2019). Weapons of mass destruction and modern terrorism: Implications for global security. Asian Social Science, 15(3), 1-13.

Okumu, W. (2008). Gaps and Challenges in Preventing and Combating Terrorism in East Africa. In Okumu, W. & Botha, A. (Eds.), Understanding Terrorism in Africa: Building Bridges and Overcoming Gaps. Institute of Security Studies, Pretoria (Pp. 62-70).

Oluwafemi, B. D., Balogun, N. O. & Layefa, G. T. (2019). Intelligence sharing: The challenges among the Nigerian security agencies and government. Global Scientific Journals, 7(6), 536-547.

Ombati, (2019, January). How the Terrorists were Neutralised by the Special Squads. The Standard Digital. Retrieved from: https://www.standardmedia.co.ke/article/2001309685/how-special-forces-planned-to-crush-terrorists

Ombati, C. (2010, September 8). 300 new spies will soon be in your midst. The Standard. Available at: https://www.standardmedia.co.ke/business/article/2000017897/300-new-spies-will-soon-be-in-your-midst

Onuf, N. G. (1989). World of our Making: Rules and Rule in Social Theory and International Relations. Columbia, SC: University of South Carolina Press.

Onwuegbuzie, A. J., & Combs, J. P. (2010). Emergent data analysis techniques in mixed methods research: A synthesis. In A. Tashakkori & C. Teddlie (Eds.), Handbook of Mixed Methods in Social and Behavioral Research (2nd ed., pp. 397-430). Thousand Oaks, CA: Sage.

Organization for Security and Cooperation in Europe (2017). OSCE guidebook: Intelligence-led policing (TNTD/ SPMU Publication Series Vol. 13). Vienna: OSCE Secretariat.

Organization of African Union (1999). OAU Convention on the Prevention and Combating of Terrorism. Retrieved from: https://au.int/en/treaties.

Osaherumwen, I. S. (2017). International terrorism: The influence of social media in perspective. World Wide Journal of Multidisciplinary Research and Development, 3(10), 86-91.

Osse, A. (2014). Police reform in Kenya: a process of ‘meddling through’. Policing and Society, 26(8). Available at: https://doi.org/10.1080/10439463.2014.993631

Otiso, K. (2009). Kenya in the crosshairs of global terrorism: Fighting terrorism at the periphery. Kenya Studies Review, 1(1), 107-132.

Paine, T. (1776). Common Sense (trans. 1986). London: Penguin Books.

Pape, R. (2005). Dying to win: The strategic logic of suicide terrorism. New York: Random House.

Pillar, P. R. (2017). Terrorism and current challenges for intelligence. The Georgetown Security Studies Review, Special Issue: What the New Administration Needs to Know About Terrorism and Counterterrorism, 108-111

Piquero, E. L., Tibbetts, S. G. & Blakenship, M. B. (2005). The role of deferential association and techniques of neutralization in explaining corporate crime. Deviant Behavior, 26, 159–88.

Pitcher, M. A. & Askew, K. M. (2006). African socialisms and post-socialisms. Africa, 76(1), 1–14.

Pitcher, M. A. & Askew, K. M. (2006). African Socialisms and Postsocialisms. Africa, 76(1), 1–14

Pitts, D. E. (2015). New Destinations of Islamic Fundamental Terrorism: The Rise of Al Shabaab. Master’s Thesis. University of Tennessee. Retrieved from: https://trace.tennessee.edu/utk_gradthes/3499 (Accessed on 30th May 2020).

Pleschinger, S. (2006). Allied against terror: Transatlantic intelligence cooperation. Yale Journal of International Affairs, 1(1), 55-67

Ploch, L. (2010). Countering Terrorism in East Africa: The US Response. New York: Congressional Research Service, Library of Congress.

Pollock, J. (2008). Ethical Dilemmas and Decisions in Criminal justice (6 ed.). KY: Wadsworth Publishing.

Powell, J. (2014). A historical view of intelligence gathering: From the Kryptia to the CIA (Part 1). Retrieved from: https://sofrep.com/news/obscure-intelligence-agents-agencies-part-1/

Prevention of Terrorism Act No. 30 of 2012 (Revised Edition 2019). Nairobi: The National Council for Law Reporting.

PSCU, (2013). Uhuru Kenyatta supports ‘Nyumba Kumi’ initiative. Nation. Available at: https://nation.africa/kenya/news/uhuru-kenyatta-supports-nyumba-kumi-initiative-902806

Ratcliffe, J. (2008). Intelligence – led policing. Cullompton, Devon: Willan Publishing.

Ratcliffe, J. H. (2016). Intelligence‐led policing (2nd Ed.). London: Routledge.

Republic of Kenya (2014). The Security Laws (Amendment) Act, 2014. Kenya Gazette Supplement No. 167 (Acts No. 19). Nairobi: The Government Printer.

Republic of Kenya (2015). Draft guidelines for implementation of community policing-Nyumba Kumi: Usalama wa Msingi. Nairobi: Government Printer.

Republic of Kenya, (2012). The National Intelligence Service Act No. 28 of 2012. Nairobi: The National Council for Law Reporting

Reuters (2019, January 31st). Dusit bomber's journey offers cautionary tale of intelligence failures. Standard Digital. Retrieved from: https://www.standardmedia.co.ke/article/2001311515/dusit-bomber-s-journey-offers-cautionary-tale-of-intelligence-failures

Reveron, D. S. (2008). Counterterrorism and intelligence cooperation. Journal of Global Change and Governance, 1(3). 13.

Reveron, D. S. (2008). Counterterrorism and intelligence cooperation. Journal of Global Change and Governance, 1, 3-13.

Richelson, J. (1990). The calculus of intelligence cooperation. International Journal of Intelligence and Counterintelligence, 4(3), 315.

Rickards, C. (2016). What are the barriers to gathering and sharing organised crime intelligence: An Australian perspective. The European Review of Organised Crime, 3(1), 78-104.

Romney, A., Batchelder, W. & Weller, S. (1986). Culture as consensus: A theory of culture and informant accuracy. American Anthropologist, 88, 313–38.

Rosand, E. (2006). The UN-Led multilateral institutional response to jihadist terrorism: is a global counterterrorism body needed? Journal of Conflict and Security Law, 11(3), 399-427

Rosand, E., Millar, A., & Ipe, J. (2009). Enhancing Counterterrorism Cooperation in Eastern Africa. African Security Review, 18(2), 93–106

Rosand, E., Millar, A., Ipe, J., & Healey M. (2008). The UN Global Counter-Terrorism Strategy and Regional and Sub-regional Bodies: Strengthening a Critical Partnership. New York: Center on Global Counterterrorism Cooperation.

Ruteere, M. & Pommerolle, M. (2003). Democratizing security or decentralization of repression? The ambiguities in community policing in Kenya. African Affairs, 102, 587-604.

Rydberg, J. & Terrill, W. (2010). The effect of higher education on police behavior. Police Quarterly, 13(1), 92-120.

Rydberg, J., Nalla, M. & Mesko, G. (2012). The perceived value of a college education in police work in Slovenia. Journal of Criminal Justice and Security, 12(14), 408- 423.

Sabala, K. (2008). Towards a Regional Security Architecture for the Horn of Africa: A Framework Analysis. In Mwagiru, M. (Ed.). Human Security: Setting the Agenda for the Horn of Africa. Nairobi: Africa Peace Forum.

Saferworld (2008). Implementing Community-Based Policing in Kenya. Saferworld. Available at: https://www.saferworld.org.uk/resources/publications/306-implementing-community-based-policing-in-kenya

Saine, A. (2008). The Gambia’s elected autocrat poverty, peripherality, and political instability, 1994– 2006. Armed Forces and Society, 34(3), 450– 73.

Sandler, T. & Arce. M. (2003). Terrorism & Game Theory. Simulation & Gaming, 34(3), 321–342.

Sandler, T. & Arce. M. (2005). Counterterrorism: A game-theoretic analysis. The Journal of Conflict Resolution, 49(2), 183–200.

Sandler, T. (2014). The analytical study of terrorism: Taking stock. Journal of Peace Research, 51(2), 257-271.

Sandler, T. (2015). Terrorism and counterterrorism: An overview. Oxford Economic Papers, 10(3), 1–20

Saunders, M., Lewis, P., & Thornhill, A. (2009).Research Methods for Business Students (5th ed.). London: Prentice Hall.

Schmid, A. P. (2011). Handbook of Terrorism Research. London: Routledge.

Schneckener, U. (2009). States at Risk: Zur Analyse fragiler Staatlichkeit. In Stabilität and Scheitern (ed.), States at Risk. Nomos: Baden-Baden.

Sedra, M. (2010). Introduction: the future of security sector reform. In Sedra, M. (Ed.), The Future of Security Sector Reform. Ontario, Canada: The Centre for International Governance Innovation (CIGI) (pp. 17-28).

Shabibi, N. (2020, August 28). The militarisation of US/Africa policy: How the CIA came to lead deadly counter-terrorism operations in Kenya. Declassified UK. Retrieved from: https://www.dailymaverick.co.za/article/2020-08-28-the-militarisation-of-us-africa-policy-how-the-cia-came-to-lead-deadly-counter-terrorism-operations-in-kenya/

Shaffer, R. (2019). Following in footsteps: The transformation of Kenya’s intelligence services since the colonial era. Studies in Intelligence, 63(1), 23-40.

Sheila, R. (1986, May). In Kenya, increasing signs of unrest. The New York Times. Retrieved from: https://www.nytimes.com/1986/05/19/world/in-kenya-increasing-signs-of-unrest.html

Sherman, J. (2010). The “Global War on Terrorism” And Its Implications for Us Security Sector Reform Support. In Sedra, M. (Ed.). The Future of Security Sector Reform. Canada, Centre for International Governance Innovation. (Pp. 59-73).

Shinn, D. H. (2007). Al-Qaeda in East Africa and the Horn. Journal of Conflict Studies, 27(1), 39-48.

Sirrs, O. L. (2010). The Egyptian Intelligence Service: A History of the Mukhabarat. 1910-2009. New York: Routledge.

Smith, J. (2004). Revelations of the British Colonial Policy in Nigeria. London: British archives.

Standard Team (2012, July 6). County Commissioners in office despite ruling. The Standard. Available at: https://www.standardmedia.co.ke/politics/article/2000061275/county-commissioners-in-office-despite-ruling

Steele, R. D. (2010). Fixing the white house and national intelligence. International Journal of Intelligence and CounterIntelligence, 23(2), 353–73.

Steinmetz, K. F. (2012). WikiLeaks and realpolitik. Journal of Theoretical and Philosophical Criminology, 4(1), 14-52.

Stephane, L. (2003). The difficulties and dilemmas of international intelligence cooperation. International Journal of Intelligence and CounterIntelligence, 16(4), 534, 537.

Svendsen, D. (2009). Connecting intelligence and theory: Intelligence liaison and international relations. Intelligence and National Security, 24(5), 716.

Swart, H. (2016). Communications Surveillance by the South African Intelligence Services. Johannesburg: University of Johannesburg.

The National Intelligence Service Act, 2012. Available at: https://www.nis.go.ke/downloads/THE%20NATIONAL%20INTELLIGENCE%20SERVICE%20ACT,%202012.pdf (Accessed 26 September 2020).

Throup, D. W. (2012). Kenya’s intervention in Somalia. Center for Strategic & International Studies. Retrieved from: https://www.csis.org/analysis/kenya%E2%80%99s-intervention-somalia (Accessed on 06 June 2020).

Thucydides (trans. Rex Warner, 1972). History of the Peloponnesian War. Harmondsworth: Penguin Books.

United Nations (2008). Securing peace and development: The role of UN in supporting security reforms. U. N. General Assembly: Security Council.

United Nations (2012). The United Nations security sector reform perspective. New York: United Nations Department of Peace keeping Operations.

United States Department of State Publication, (2017). Country Reports on Terrorism 2016. Washington D.C.: United States Department of State Publication, Bureau of Counterterrorism.

UNODC (2013). Transnational Organized Crime in West Africa: A Threat Assessment. Retrieved from: http://www.unodc.org/documents/data-and-analysis/tocta/West_Africa_ TOCTA_2013.EN.pdf

Van Metre, L. (2016). Community Resilience to Violent Extremism in Kenya. Peaceworks no. 122. Washington, DC: United States Institute of Peace

Wairgu, F., Kamenju, J. & Singo, M. (2004). Private Security in Kenya. Nairobi: Security Research and Information Center.

Waki Report (2008). Waki Report. Kenya National Commission on Human Rights. Available at: http://www.knchr.org/Portals/0/Reports/Waki_Report.pdf

Walker, T. & Morton, J. (2005). Re-Assessing the “power of power politics” thesis: Is realism still dominant? International Studies Review, 7(2), 341–56.

Walsh, J. I. (2008). Intelligence sharing for counter-insurgency. Defense & Security Analysis, 24(3), 281–301

Walsh, J. I. (2010). The International Politics of Intelligence Sharing. New York: Columbia University Press

Walsh, J. I. (2010). The International Politics of Intelligence Sharing. New York: Columbia University Press

Walsh, P. F. (2015). Building better intelligence frameworks through effective governance. International Journal of Intelligence and Counter Intelligence, 28(1), 123142.

Weisburd, D. L. & Eck, J. E. (2004). What can police do to reduce crime, disorder, and fear? Annals of the American Academy of Political and Social Science, 593(1), 42–65.

Wensik, W., Warmenhoven, Haasnoot, Wesselink, R., Van Ginkel, B., Wittendorp, S., Paulussen, C., Douma, W., Boutin, B., Güven, O., & Rijken, T. (2017). The European Union’s Policies on Counter-Terrorism: Relevance, Coherence and Effectiveness. Brussels: European Parliament

Wesonga, R. (1982). Babukusu pre-colonial military organization: Some aspects of the cultural history of the people of Bungoma District. A paper of a symposium held in Bungoma town, 3rd – 5th December 1982.

Whitfield, C. L. (2012). Intelligence fusion paradigm: Understanding complex operational environments implementing the institutional analysis and development framework. Police Practice and Research, 13(1), 184–200.

Williams, P. D. (2018, January). To Withdraw or not to Withdraw? Reflections on Kenya’s Military Operations in Somalia. The Elephant. Retrieved from: https://www.theelephant.info/features/2018/01/18/to-withdraw-or-not-to-withdraw-reflections-on-kenyas-military-operations-in-somalia/

Wippl, J. W. (2012). Intelligence exchange through InterIntel. International Journal of Intelligence and CounterIntelligence, 25(11), 6-15.

Woldemichael, W. (2006). International terrorism in East Africa: The case of Kenya. Ethiopian Journal of the Social Sciences and Humanities, IV(1), 33-53.

WorldAtlas, (2017). Worst Terrorist Attacks in World History. Available at: https://www.worldatlas.com/articles/worst-terrorist-attacks-in-history.html

Wulf, H. (2004). Security Sector Reform in developing and transitional countries. Berghof: Berghof Research center for constructive conflict management.

Younas, J. (2015). Does globalization mitigate the adverse effects of terrorism on growth? Oxford Economic Papers, 67(1), 133–156.

Zabyelina, Y. (2009). Transnational organized crime in international relations. Central European Journal of International and Security Studies, 7(2), 11-22.

Zwede, B. (1998). The Military and Militarism in Africa: The Case of Ethiopia. In Hutchful, E. and Bathily, A. (ed.), The Military and Militarism in Africa, Dakar: Codesria, 258–63.




DOI: http://dx.doi.org/10.61426/sjbcm.v9i1.2192

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

PAST ISSUES:
20242023202220212020201920182017201620152014
Vol 11, No 2 [2024]Vol 10, No 4 [2023]Vol 9, No 4 [2022]Vol 8, No 4 [2021]Vol 7, No 4 [2020]Vol 6, No 4 [2019]Vol 5, No 4 [2018]Vol 4, No 4 [2017]Vol 3, No 4 [2016]Vol 2, No 2 [2015]Vol 1, No 2 [2014]
 Vol 11, No 1 [2024] Vol 10, No 3 [2023] Vol 9, No 3 [2022]Vol 8, No 3 [2021]Vol 7, No 3 [2020]Vol 6, No 3 [2019]Vol 5, No 3 [2019]Vol 4, No 3 [2017]Vol 3, No 3 [2016]Vol 2, No 1 [2015]Vol 1, No 1 [2014]
  Vol 10, No 2 [2023] Vol 9, No 2 [2022]Vol 8, No 2 [2021]Vol 7, No 2 [2020]Vol 6, No 2 [2019]Vol 5, No 2 [2018]Vol 4, No 2 [2017]Vol 3, No 2 [2016]  
  Vol 10, No 1 [2023] Vol 9, No 1 [2022]  Vol 8, No 1 [2021]Vol 7, No 1 [2020]Vol 6, No 1 [2019]Vol 5, No 1 [2018]Vol 4, No 1 [2017]Vol 3, No 1 [2016]   


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.