Countering International Terrorism by the Military in Africa: a Case Study of the Kenya Defense Forces”

Countering International Terrorism by the Military in Africa: a Case Study of the Kenya Defense Forces”

UNIVERSITY OF NAIROBI INSTITUTE OF DIPLOMACY AND INTERNATIONAL STUDIES COUNTERING INTERNATIONAL TERRORISM BY THE MILITARY IN AFRICA: A CASE STUDY OF THE KENYA DEFENCE FORCES BY MOSES LELAMISO LERIARI R50/35334/2019 SUPERVISOR DR. S O HANDA A RESEARCH PROJECT SUBMITTED IN PARTIAL FULFILMENT FOR THE DEGREE OF MASTERS OF ARTS IN INTERNATIONAL STUDIES, UNIVERSITY OF NAIROBI. NOVEMBER 2020 DECLARATION I declare that this research project is my original work and to the best of my knowledge it has not been submitted for any award of Diploma or degree in any other university/learning institution. Signature……………………………………Date………………………………… MOSES LELAMISO LERIARI R50/35334/2019 Supervisor This research project has been submitted with my approval as the University of Nairobi supervisor Signature…………………………………….Date………………………………….. DR S O HANDA LECTURER, INSTITUTE OF DIPLOMACY AND INTERNATIONAL STUDIES, UNIVERSITY OF NAIROBI. ii DEDICATION I dedicate this research project to my family. Without their assistance and patience, production of this academic work would have been hard if not impossible. They endured my long absence throughout this long journey of being away while seeking knowledge. iii ACKNOWLEDGEMENT I wish to start by expressing my profound gratitude to the Almighty God for protection and guidance during the course. This study would not have been successfully completed without the help, guidance, cooperation and contribution of my Supervisor, Dr S O Handa. I wish to sincerely acknowledge his effort and invaluable support that he accorded me during the development of this study. His guidance enabled me to complete this project in good time. I also appreciate my family and friends for the assistance during this academic journey. Special thanks also go to NDC-Kenya and the faculty for the consistent advice and material support. Finally, a special thanks to the participants of course twenty-two (The Think Tank) of 2019/2020. The shared knowledge and diverse experiences from the participants made the course interesting. iv TABLE OF CONTENT DECLARATION……...………………………………………………………………ii DEDICATION ............................................................................................................. iii ACKNOWLEDGEMENT…………………………………………………………....iv TABLE OF CONTENT ................................................................................................. v LIST OF ACRONYMS AND ABBREVIATIONS ...................................................... x Abstract…. .................................................................................................................... xi CHAPTER ONE .......................................................................................................... 1 INTRODUCTION........................................................................................................ 1 1.1 Introduction .............................................................................................................. 1 1.2 Background to the Study .......................................................................................... 1 1.3 Statement of the Problem ......................................................................................... 4 1.4.1 Main Objective .............................................................................................. 5 1.4.2 Specific Objectives ........................................................................................ 5 1.5 Research Questions .................................................................................................. 6 1.6 Literature Review..................................................................................................... 6 1.6.1 Use of the Military Intervention in Countering International Terrorism inAfrica…………………………………………………………………………...9 1.6.2 The Kenya Defense Forces in countering international terrorism in Kenya…. ............................................................................................................... 14 1.6.3 Challenges of Military Interventions in Countering International Terrorism .............................................................................................................. 16 1.7 Scope and Limitation ............................................................................................. 19 1.8 Justification of the Study ....................................................................................... 19 1.8.1 Academic Justification ........................................................................................ 19 1.8.2 Policy Justification .............................................................................................. 20 1.9 Theoretical Framework .......................................................................................... 21 1.10 Hypotheses ........................................................................................................... 21 1.11 Research Methodology ........................................................................................ 22 v CHAPTER TWO ....................................................................................................... 26 USE OF THE MILITARY TO COUNTER INTERNATIONAL TERRORISM IN AFRICA................................................................................................................. 26 2.0 Introduction ............................................................................................................ 26 2.2.1 Diplomatic Engagement......................................................................... 29 2.2.2 Information Sharing ............................................................................... 30 2.2.3 Media Reporting .................................................................................... 31 2.2.4 Economic Sanctions ............................................................................... 31 2.2.5 State Collaborations and Cooperation ................................................... 32 2.2.6 Intelligence Sharing ............................................................................... 32 2.2.7 International Organizations .................................................................... 33 2.4.2 Decisive Effect and Degrading Capability ........................................... 35 2.4.3 Equipment and Resources ...................................................................... 36 2.4.5 Retaliation Force .................................................................................... 37 2.4.6 Military Intelligence............................................................................... 38 2.4.7 International Practice ............................................................................. 39 2.4.8 Modus Operandi..................................................................................... 40 2.4.9 Reliability and Dependency ................................................................... 40 2.4.10 Military Operational Reach .................................................................... 41 2.6 Chapter Summary ............................................................................................. 47 CHAPTER THREE ................................................................................................... 49 EFFECT OF THE KENYA DEFENCE FORCES IN COUNTERING INTERNATIONAL TERRORISM .......................................................................... 49 3.1 Introduction ............................................................................................................ 49 3.2 Military Intervention .............................................................................................. 49 3.3 KDF involvement in countering terrorism in Kenya ............................................. 50 3.4.2 Operation Linda Boni Forest ................................................................. 53 vi 3.5.3 Degrading the Enemy .................................................................................. 56 3.5.4 Intelligence, Surveillance and Reconnaissance ..................................... 57 3.5.5 Cooperation with Allied States and Defense Forces.............................. 58 3.5.6 Deterrence of threats .................................................................................... 59 3.5.7 Pacification of Liberated Areas ............................................................. 60 3.5.8 Cyber Security Operations ........................................................................... 60 3.5.9 De-radicalization/Anti-radicalization .......................................................... 62 3.5.10. Security Operations and Sensitizations .................................................... 63 3.5.11Civil Military Cooperation (CIMIC) to Share Information on Terrorism .. 63 3.7 Chapter Summary .................................................................................................. 67 CHAPTER FOUR ...................................................................................................... 68 DATA PRESENTATION AND ANALYSIS ........................................................... 68 4.1 Introduction ............................................................................................................ 68 4.2 Demographics Information ............................................................................... 68 4.2.1Gender of respondents .................................................................................. 68 4.2.2 Service ........................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    121 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us