Kidnappings in Kenya Report

Total Page:16

File Type:pdf, Size:1020Kb

Kidnappings in Kenya Report ` NATIONAL CRIME RESEARCH CENTRE EMERGING CRIMES: THE CASE OF KIDNAPPINGS IN KENYA ` NATIONAL CRIME RESEARCH CENTRE EMERGING CRIMES: THE CASE OF KIDNAPPINGS IN KENYA COPY RIGHT Copyright© 2017 by National Crime Research Centre Nairobi; Printed in Kenya Part of this publication may be copied for use in research and education purposes provided that the source is acknowledged. This publication may not be produced for other purposes without prior permission from the National Crime Research Centre ii TABLE OF CONTENTS Page COPY RIGHT ------------------------------------------------------------------------------------------- ii TABLE OF CONTENTS ----------------------------------------------------------------------------- iii LIST OF TABLES -------------------------------------------------------------------------------------- vi LIST OF FIGURES------------------------------------------------------------------------------------ vii ACKNOWLEDGEMENTS --------------------------------------------------------------------------- xi EXPLANATORY NOTES TO TERMS USED IN THE STUDY -------------------------- xii EXECUTIVE SUMMARY--------------------------------------------------------------------------- xv ABBREVIATIONS AND ACRONYMS ---------------------------------------------------------- xx CHAPTER ONE: INTRODUCTION--------------------------------------------------------------- 1 1.1 Background of the Study-------------------------------------------------------------------------- 1 1.1.1General context of kidnappings ---------------------------------------------------------------- 1 1.1.2 Global trends in kidnappings ------------------------------------------------------------------ 4 1.1.3 Regional trends in kidnappings --------------------------------------------------------------- 6 1.1.4 Kidnappings in Kenya--------------------------------------------------------------------------- 7 1.2 Problem Statement -------------------------------------------------------------------------------- 10 1.3 Objectives of the Study --------------------------------------------------------------------------- 11 1.3.1 General objective -------------------------------------------------------------------------------- 11 1.3.2 Specific objectives ------------------------------------------------------------------------------- 11 The specific objectives of the study were: --------------------------------------------------------- 11 1.4 Justification of the study ------------------------------------------------------------------------- 11 1.5 Assumptions of the Study ------------------------------------------------------------------------ 12 1.6 Scope of the Study --------------------------------------------------------------------------------- 12 1.7 Theoretical Framework of the Study ---------------------------------------------------------- 12 1.7.1 Differential Opportunity Theory------------------------------------------------------------- 12 1.7.2 Social Control Theory -------------------------------------------------------------------------- 13 1.7.3 Rational Choice Theory ------------------------------------------------------------------------ 15 CHAPTER TWO: STUDY METHODOLOGY------------------------------------------------- 16 2.1 Introduction----------------------------------------------------------------------------------------- 16 2.2 Research Design------------------------------------------------------------------------------------ 16 2.3 Methods and Tools for Data Collection ------------------------------------------------------- 18 2.3.1 Data collection methods ------------------------------------------------------------------------ 18 2.3.2 Data collection tools ----------------------------------------------------------------------------- 18 2.4 Data Collection and Management-------------------------------------------------------------- 19 2.5 Methods of Data Analysis ------------------------------------------------------------------------ 19 2.6 Ethical Considerations---------------------------------------------------------------------------- 19 CHAPTER THREE: RESULTS AND DISCUSSIONS---------------------------------------- 21 3.1 Introduction----------------------------------------------------------------------------------------- 21 3.2 Socio-demographic characteristics of Respondents ---------------------------------------- 21 3.3 Prevalence and Typology of Kidnappings ---------------------------------------------------- 23 3.3.1 Perceptions of kidnapping as a major security problem-------------------------------- 23 3.3.2 Occurrence of the crime of kidnapping----------------------------------------------------- 24 3.3.2.1 Primary data ----------------------------------------------------------------------------------- 24 iii 3.3.2.2 Secondary data --------------------------------------------------------------------------------- 25 3.4 Profiles of Victims and Kidnappers ------------------------------------------------------------ 34 3.4.1 Profiles of victims of kidnappings ------------------------------------------------------------ 34 3.4.1.1 Socio-economic characteristics of victims ------------------------------------------------ 34 3.4.1.2 Categories of victims of kidnappings ------------------------------------------------------ 37 3.4.2 Profiles of kidnappers -------------------------------------------------------------------------- 39 3.4.2.1 Socio-economic characteristics of kidnappers ------------------------------------------ 39 3.4.2.2 Categories of kidnappers -------------------------------------------------------------------- 41 3.4.2.3 Perpetrators of kidnappings ---------------------------------------------------------------- 44 3.5 Modes of Executing Kidnappings -------------------------------------------------------------- 46 3.5.1 Single and Group Execution of kidnappings ---------------------------------------------- 46 3.5.2 Use of illegal arms and weapons in kidnappings ------------------------------------------ 48 3.5.3 Ways used to kidnap victims ------------------------------------------------------------------ 51 3.5.4 Periods when kidnappings take place ------------------------------------------------------- 54 3.6 Motives and Factors Encouraging Kidnappings -------------------------------------------- 54 3.6.1 Motives for kidnappings in Kenya ----------------------------------------------------------- 54 3.6.2 Factors encouraging kidnappings in Kenya ----------------------------------------------- 58 3.7 Treatment, Conditions and Coping Mechanisms of Victims ----------------------------- 63 3.7.1 Treatment and conditions victims encounter ---------------------------------------------- 63 3.7.2 Victims’ coping mechanisms ------------------------------------------------------------------ 66 3.8 Effects of the Crime of Kidnap ----------------------------------------------------------------- 67 3.9 The Role of the Community in Kidnappings ------------------------------------------------ 71 3.9.1 Community participation in increased cases of kidnappings -------------------------- 71 3.9.2 Community participation in addressing kidnappings ----------------------------------- 73 3.9.3 Best ways of community participation in addressing kidnappings ------------------- 76 3.10 Existing Interventions to Address Kidnappings ------------------------------------------- 79 3.10.1 Organizations attempting to address kidnappings ------------------------------------- 79 3.10.2 Interventions and their effectiveness in addressing kidnappings -------------------- 83 3.10.2.1 Interventions ---------------------------------------------------------------------------------- 83 3.10.2.2 Effectiveness of interventions ------------------------------------------------------------- 86 3.10.3 Government’s role in containing kidnappings ------------------------------------------- 86 3.10.4 Best practices in preventing and combating kidnappings ----------------------------- 92 3.11 Challenges Faced in Addressing Kidnappings --------------------------------------------- 94 3.11.1 Challenges faced in preventing and combating kidnappings ------------------------- 94 3.11.2 Respondents’ suggestions on possible solutions to challenges faced ---------------- 99 CHAPTER FOUR: SUMMARY OF FINDINGS, CONCLUSION AND---------------- 110 RECOMMENDATIONS --------------------------------------------------------------------------- 110 4.1 Introduction --------------------------------------------------------------------------------------- 110 4.2 Summary of Major Findings ------------------------------------------------------------------ 110 4.2.1 Prevalence of the crime of kidnap by type ----------------------------------------------- 110 4.2.2 Motives and factors encouraging kidnappings ------------------------------------------ 110 4.2.3 Main victims and perpetrators of kidnappings ----------------------------------------- 111 4.2.4 Modes of executing kidnappings ----------------------------------------------------------- 111 4.2.5 Effects of the crime of kidnapping --------------------------------------------------------- 111 iv 4.2.6 Role of the community in kidnappings ---------------------------------------------------- 111 4.2.7 Existing interventions and their effectiveness in addressing kidnappings -------- 112 4.2.8 Challenges faced in preventing and combating kidnappings and possible solutions……………………………………………………………………………………112 4.3 Conclusions ---------------------------------------------------------------------------------------- 112 4.4 Recommendations
Recommended publications
  • A Case of Twitter Data in Kenya
    A FRAMEWORK FOR PROFILING CRIME REPORTED USING SOCIAL MEDIA – A CASE OF TWITTER DATA IN KENYA BY GIDEON K. SUMBEIYWO A Project Report Submitted to the School of Science and Technology in Partial Fulfillment of the Requirement for the Degree of Master of Science in Information Systems and Technology UNITED STATES INTERNATIONAL UNIVERSITY – AFRICA SUMMER 2018 1 STUDENT’S DECLARATION I, the undersigned, declare that this is my original work and has not been submitted to any other college, institution or university other than the United States International University – Africa in Nairobi for academic credit. Signed: ________________________ Date: _________________ Gideon Kipkorir Sumbeiywo (ID No 620128) This project has been presented for examination with my approval as the appointed supervisor. Signed: ________________________ Date: _________________ Dr. Leah Mutanu Signed: ________________________ Date: _________________ Dean, School of Science and Technology 2 COPYRIGHT All rights reserved; No part of this work may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without express written authorization from the writer. Gideon Kipkorir Sumbeiywo © 2018 3 ABSTRACT Crime profiling helps law enforcement agencies understand, tackle and sometimes predict the next move by criminals. This can be achieved by monitoring and studying patterns and trends that have occurred in the past and continue to occur in the present. Social media platforms such as Facebook, Google Plus, Instagram, Reddit and in this case Twitter, have created platforms where people share views, opinions and emotions all the while influencing and informing others. This research set out with four objectives that would enable it to be successful in coming up with a framework for profiling.
    [Show full text]
  • Global Kidnap for Ransom Report
    GLOBAL SUMMARY FOCUS ARTICLE STABILISATION IN THE HORN OF AFRICA July 2020 REPORT WWW.CONSTELLIS.COM July 2020 REPORT TABLE OF EXECUTIVE SUMMARY CONTENTS SUMMARY This issue of Constellis’ Kidnap for Ransom the geopolitical tensions surrounding the eastern GLOBAL OVERVIEW .....................................................................................................03 Insight Report covers global kidnapping incidents giant. While several countries are attempting to and trends for the months of May, June and July bolster their defences, a number of cyberattacks Americas ......................................................................................................................03 2020. The information is derived from multi-source traced to China have already occurred, including analysis of kidnap for ransom activity and where attacks against governments, businesses and Europe ..........................................................................................................................05 known, the outcome or resolution of the events. The critical infrastructure. With relations not showing any Middle East ..................................................................................................................07 report covers current kidnap for ransom hotspots signs of improvement, no let-up in malicious Chinese at regional, national and provincial levels, with a cyber activity is anticipated in the near future. Africa ............................................................................................................................09
    [Show full text]
  • 16. Humanities-Challenges of Hostage-Taking and Kidnapping
    IMPACT: International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL) ISSN(E): 2321-8878; ISSN(P): 2347-4564 Vol. 2, Issue 6, Jun 2014, 131-142 © Impact Journals CHALLENGES OF HOSTAGE-TAKING AND KIDNAPPING IN THE SOUTH EASTERN NIGERIA PROTUS NATHAN UZORMA 1 & JOHN NWANEGBO-BEN 2 1University of Uyo, Akwa Ibom, Nigeria 2Federal University of Technology, Owerri, Imo State, Nigeria ABSTRACT Before now, hostage-taking and kidnapping have existed in varied forms and for varied reasons in Nigeria. But they were not known to be among the business ventures Nigerians are known for. However today, they have become a big industry and a steady source of income for many, particularly in the South-East. The duo crimes thrive almost in the entire neighbourhood in this region and the adjoining states. Many residents know the traders, where they operate, but watch helplessly as the culture of the area seems to consider any criminal venture that yields wealth to their citizens as “business,” especially if the criminal operates in areas far from home. What are the reasons behind this illicit business? Why and how are they flourishing in this region? Who are the perpetrators of the crime? What are their effects in the country? What is the Nigeria Police Force doing about it? These and many more form the fulcrum of this discussion. KEYWORDS: Peculiar Crime, Kidnapping, National Agencies INTRODUCTION The Phenomenon of Hostage-Taking and Kidnapping Hostage taking and Kidnapping are among the terrorising crimes in Nigeria. They are mostly common in the southern part of the country (South-South, South-East and South-West).
    [Show full text]
  • Mombasa County Crime and Violence Report
    MOMBASA COUNTY CRIME AND VIOLENCE RAPID ASSESSMENT MOMBASA COUNTY CRIME AND VIOLENCE RAPID ASSESSMENT Cover photo credit: Andrea Albini | Creative Commons 3.0 Design and copy editing: Laura C. Johnson II Contents Foreword .................................................v Acknowledgements .........................................vi Acronyms ................................................vii 1 Introduction .............................................1 Crime and Violence Prevention in Kenya ...............................3 Crime and Violence Prevention Training ...............................4 County-Level Crime and Violence Prevention ..........................4 Framework for Analysis .............................................7 Goals of the Rapid Assessment ......................................9 Methodology . .9 2 Background: Crime and Violence Trends in Kenya ............13 Boda-Boda-Related Crime and Violence .............................14 Alcohol and Drug Abuse ...........................................14 Sexual and Gender-Based Violence ..................................16 Violence against Children ..........................................16 Radicalization and Recruitment into Violent Extremism ..................17 3 Rapid Assessment of Mombasa County .....................19 Overview of County ...............................................19 Cross-Cutting Drivers of Crime and Violence ..........................20 Dynamics of Crime and Violence ....................................23 Security Interventions .............................................40
    [Show full text]
  • Tiger Kidnapping Endorsement
    Crisis Solution (Corporate) 2.0 Endorsement TIGER KIDNAPPING It is agreed that: 1. The policy is amended by adding the following schedule: Tiger Kidnapping Schedule Tiger Kidnapping Limits of Liability (all amounts specified are for each single Tiger Kidnapping): 1. Tiger Kidnapping Overall Limit of Liability: USD [ ] 2. Ransom: USD [ ] 3. Legal Liability Loss: USD [ ] 4. Additional Expenses: USD [ ] 5. (a) Death or Disability Benefits: USD [ ] (b) Death or Disability Benefits Maximum Benefit Sum: USD [ ] 6. Crisis Consultants fees and expenses: unlimited 2. Insurance Cover 1, Ransom, is amended by adding the following: The Insurer shall also reimburse the Policyholder for Ransom surrendered by an Insured as a result of a Tiger Kidnapping which commences during the Policy Period and within the Territory. 3. In Section 2, Definitions, the definition of Insured Event is amended by adding the following: For the purposes of Insurance Cover 1.1 (Ransom), Insurance Cover 1.3 (Crisis Consultant Response), Insurance Cover 1.7 (Legal Liability), Insurance Cover 1.8 (Additional Expenses) and Insurance Cover 1.9 (Death or Disability Benefit), Insured Event also means a Tiger Kidnapping. For the purposes of all the other Insurance Covers, Insured Event does not include a Tiger Kidnapping. A result of this is that, as well as cover with regard to Tiger Kidnappings being afforded under Insurance Cover 1.1 (Ransom), cover with regard to Tiger Kidnappings is afforded under Insurance Cover 1.3 (Crisis Consultant Response), Insurance Cover 1.7 (Legal Liability), Insurance Cover 1.8 (Additional Expenses) and Insurance Cover 1.9 (Death or Disability Benefit).
    [Show full text]
  • Countering Wildlife Trafficking Through Kenya’S Seaports a Rapid Seizure Analysis
    February 2020 COUNTERING WILDLIFE TRAFFICKING THROUGH KENYA’S SEAPORTS A RAPID SEIZURE ANALYSIS Willow Outhwaite Leanne Little JOINT REPORT Countering wildlife trafficking in KENYA’S SEAPORTS TRAFFIC is a leading non-governmental organisation working globally on trade in wild animals and plants in the context of both biodiversity conservation and sustainable development. Reproduction of material appearing in this report requires written permission from the publisher. This report was made possible with support from the American people delivered through the U.S. Agency for International Development (USAID) through the Wildlife Trafficking Response, Assessment, and Priority Setting (Wildlife TRAPS) project implemented by TRAFFIC in collaboration with IUCN, and the UNDP-GEF Project “Reducing Maritime Trafficking of Wildlife between Africa and Asia” as part of the GEF-financed, World Bank-led Global Wildlife Program. The contents are the responsibility of TRAFFIC and do not necessarily reflect the opinion of USAID, the U.S. Government or UNDP. Published by: TRAFFIC International, Cambridge, United Kingdom. © TRAFFIC 2020. Copyright of material published in this report is vested in TRAFFIC. ISBN no: 978-1-911646-20-4 UK Registered Charity No. 1076722 Design by Marcus Cornthwaite 2 TRAFFIC REPORT : COUNTERING WILDLIFE TRAFFICKING THROUGH KENYA’S SEAPORTS table of contents page 1 INTRODUCTION Executive summary Introduction Workshop objectives page 2 FRAMING THE ISSUE Kenya’s Wildlife Wildlife Trafficking and the Transport Sector Infrastructure
    [Show full text]
  • From Monopoly to Oligopoly of Violence
    from Monopoly to Oligopoly of Violence i from Monopoly to Oligopoly of Violence From Monopoly to Oligopoly of Violence Exploration of a Four-Point Hypothesis Regarding Organised and Organic Militia in Kenya Mutahi Ngunyi, PhD Musambayi Katumanga, PhD i from Monopoly to Oligopoly of Violence From Monopoly to Oligopoly: Exploration of a Four-Point Hypothesis Regarding Organized and Organic Militia in Kenya Copyright © 2014 All rights reserved. No part of this publication may be reproduced, distributed or transmitted in any form or by any means, including photocopying, recording or other electronic or mechanical methods, without the prior written permission of the author, except in the case of brief quotations embodied in critical reviews and certain other non-commercial uses permitted by copyright law. Disclaimer: All material contained reflects the views of the authors and do not necessarily reflect the views of the UNDP or of the United Nations, or of the Government of Kenya. Published by: UNDP ISBN 978-9966-078-445 ii from Monopoly to Oligopoly of Violence DEDICATION; Dedicated to the memory of Prof. George Saitoti former minister for Internal Security under whose watch this study was commissioned. iii from Monopoly to Oligopoly of Violence ACKNOWLEDGEMENT On behalf of the authors, editors and all those involved, the UNDP Kenya and the National Steering Committee on Peace Building and Conflict Management (NSC), we would like to acknowledge the valuable inputs of the former Ministry of State for Provincial Administration and Internal Security under the leadership of the late Minister, Hon. (Prof.) George Saitoti, the Permanent Secretaries Mr. Francis T.
    [Show full text]
  • The ICC Trial of Kenya's Deputy President
    The ICC Trial of Kenya’s Deputy President Questions and Answers September 2013 1. What is the case against Ruto and Sang about? What crimes are they charged with? William Ruto and Joshua arap Sang are charged with the crimes against humanity of murder, forcible transfer of population or deportation, and persecution, stemming from their alleged involvement in an attack on perceived supporters of former President Mwai Kibaki’s Party of National Unity (PNU). According to the International Criminal Court (ICC) prosecution, perpetrators destroyed houses and businesses identified as belonging to members of Kikuyu, Kamba, and Kisii ethnic groups thought to be PNU supporters, killing over two hundred people and injuring over a thousand more and forcing hundreds of thousands to flee. Five specific incidents occurring between late December 2007 and mid-January 2008 in Kenya’s Rift Valley form the basis for the charges. The prosecutor contends that Ruto along with others, and supported by Sang, worked for up to a year before the election to create a network to carry out the plan, and that this network was activated when the election results in favor of Kibaki were announced. The goals of the plan, the prosecutor alleges, were to punish and expel from the Rift Valley people perceived to support the PNU, and to gain power in the province. Ruto at the time was a member of parliament and a senior member of the Orange Democratic Movement (ODM), the party of Kibaki’s principal challenger, Raila Odinga. Sang was a radio host on the Eldoret-based Kass FM.
    [Show full text]
  • Wildlife Protection and Trafficking Assessment in Kenya: Drivers And
    WILDLIFE PROTECTION AND REPORT TRAFFICKING ASSESSMENT IN KENYA Drivers and trends of transnational wildlife crime in Kenya and LWVUROHDVDWUDQVLWSRLQWIRUWUDIÀFNHGVSHFLHVLQ(DVW$IULFD MAY 2016 Sam Weru TRAFFIC REPORT TRAFFIC, the wild life trade monitoring net work, is the leading non-governmental organization working globally on trade in wild animals and plants in the context of both biodiversity conservation and sustainable development. TRAFFIC is a strategic alliance of WWF and IUCN. This publication was made possible through the support provided by the Office of Forestry and Biodiversity, Bureau for Economic Growth, Education and Environment, U.S. Agency for International Development, under the terms of award number AID-AID-EGEE-IO-13-00002. The opinions expressed in this publication are those of the author and do not necessarily reflect the view of the U.S. Agency for International Development. The designations of geographical entities in this publication, and the presentation of the material, do not imply the expression of any opinion whatsoever on the part of TRAFFIC or its supporting organizations concerning the legal status of any country, territory, or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. The views of the authors expressed in this publication are those of the writers and do not necessarily reflect those of TRAFFIC, WWF or IUCN. Published by TRAFFIC, David Attenborough Building, Pembroke Street, Cambridge CB2 3QZ, UK. © TRAFFIC 2016. Copyright of material published in this report is vested in TRAFFIC. ISBN no: 978-1-85850-386-8 UK Registered Charity No. 1076722 Suggested citation: Weru, S. (2016). Wildlife protection and trafficking assessment in Kenya: Drivers and trends of transnational wildlife crime in Kenya and its role as a transit point for trafficked species in East Africa.
    [Show full text]
  • Hostage-Taking: Motives, Resolution, Coping and Effects David A
    Advances in psychiatric treatment (2010), vol. 16, 176–183 doi: 10.1192/apt.bp.108.005991 ARTICLE Hostage-taking: motives, resolution, coping and effects David A. Alexander & Susan Klein David A. Alexander is Professor Definition of Mental Health, and Director of SUMMARY the Aberdeen Centre for Trauma Taking hostages has a long history as a method, with ‘Hostage-taking’ is a lay term and refers to the Research at The Robert Gordon variable effectiveness, of securing concessions detention of an individual, against their will and University, Aberdeen. He also from individuals, organisations and governments. without legal authority, for a particular motive. acts as a police consultant and lectures at the Scottish Police More recently, it has become a popular tactic among In the UK, there is no crime of hostage-taking. College on hostage negotiation terrorist organisations. Although the resilience The relevant criminal offences are ‘kidnapping’ and crisis management. Susan of individuals should never be underestimated, (in English law) and ‘abduction’ (in Scottish law). Klein is reader in trauma research there is evidence that being taken hostage can For convenience, the generic, non-legal term of at the Aberdeen Centre for Trauma have enduring effects, particularly on children. ‘hostage-taking’ will be used throughout this Research. Individuals vary in how they cope with such an Correspondence Professor David article. A. Alexander, Aberdeen Centre experience, both during and subsequent to it. The for Trauma Research, Faculty of literature demonstrates that the research base is Health and Social Care, The Robert limited, and many important questions remain to be Motives Gordon University, Garthdee Road, answered.
    [Show full text]
  • What's Inside
    WHY AIG What’s Inside Crisis Solution Click here For full pdf features, please view in Adobe Acrobat. index Click here How it Works Core Insurance Covers Crisis Solution In the face of evolving global security threats, we provide Cover Extensions support for businesses and individuals through insurance and risk consultancy expertise – to keep your business in business and your people safe and secure. Other Stand-Alone There are two clear reasons to buy a Crisis Solution policy: Products Crisis Solution Insurance Risk Consultancy We cover the costs arising from a We also provide our customers broad range of threats that may with world class crisis consultants, Response Consultants impact your people, business, guaranteeing immediate expert brand or reputation. Some types of support wherever you are and crisis are covered automatically as whatever the circumstances. This part of your core coverage, others guide summarises the support Additional Extras are optional. This guide outlines the you can expect from AIG and types of crisis we respond to and our panel of carefully selected the coverage provided. consultant partners. This booklet outlines some of the coverage options available under Crisis Solution. Please refer to your insurance broker or the policy wording and schedule for further details of cover and terms and conditions. how it works What’s Inside Crisis Solution: How it Works We provide Crisis Solution insurance on a per event basis. This allows our clients to use the insurance multiple times through different crisis events. We aim to provide broad coverage, extending cover to all your salaried employees and temporary employees, including consultants and contractors if required.
    [Show full text]
  • Rational Choice Theory of Crime: Punishment Implications for Kidnapping in Nigeria
    Practicum Psychologia 6, 43-52 ©The Author(s) 2016 http://unizikpsychologia.org/ ISSN: 2006-6640 Rational Choice Theory of Crime: Punishment Implications For Kidnapping In Nigeria Chukwuemeka A. F. Okoye, Chiamaka O. Joe-Akunne, Bernard C. Chine Department of Psychology,Faculty of Social Sciences, Nnamdi Azikiwe University, Awka. Abstract This paper examined the position of the Rational Choice Theory vis-à-vis the commission of crime such as Kidnapping and how best to control it through the application of stiffer punishments. The authors approached this vexed issue by exploring the concept of Kidnapping and its categories. The paper also discussed theoretical approaches to the phenomenon of Kidnapping in Nigeria. The authors also aligned themselves with the position of the Rational Choice Theory by advocating for more proactive punishment regimen as a panacea to the phenomenon of Kidnapping in Nigeria. The paper therefore, recommended among others for confiscation and destruction of all properties accruing from this ignoble act of kidnapping in order to deter further commission of such crimes. Keywords: Rational choice, theory, punishment, Crime, Kidnapping. Introduction Background To The Paper The Rational choice theories of crime strongly argued that criminals have very strong prior intent to commit the act. In the opinion of these theorists, man is a reasoning actor who weighs means and ends, cost and benefits, and makes a rational choice. (Cornish and Clarke, 1986). The position of the rational theorists assumed that crime is a purposive behaviour designed to meet the offender’s common place needs for such things as money, status, sex and excitement, and that meeting these needs involves the making of decisions and choices (Clarke, 1997).
    [Show full text]