Monday 5 December 2016

Terrorism - National Security Law

By Cynthia Mbugua LLB and Lujain Abbas LLB
Introduction
Terror" comes from the Latin  word terrere meaning "to frighten.“ It was first coined in the 1970’s to refer to the terror used during the French Revolution by the Revolutionaries against their opponents. The Jacobin party of Maxim lien Robespierre carried out a Reign of Terror involving mass executions by the guillotine. Although terrorism in this usage implies an act of violence by a state against its domestic enemies, since the 20th century the term has been applied most frequently to violence aimed, either directly or indirectly, at governments in an effort to influence policy or topple an existing regime.
Terrorism is the premeditated use or threat to use violence by individuals or subnational groups to obtain a political or social objective through the intimidation of a large audience beyond that of the immediate victims (Enders & Sandler, 2012) This EA region is vulnerable to terrorism because countries in the region experience: conflicts, weak governance, collapsed state institutions; porous borders the allowing extensive and uncontrolled movement of people and illegal weapons; increased extremist religious ideology and radicalisation of vulnerable groups. These factors generally coincide with poor socio-economic conditions and create fertile ground for the existence of terrorism.
Domestic Terrorism
This is the use of terrorist tactics by non-government actors in one country against citizens of own country. According to Enders, Sandler and Gaibulloev (2011) a terrorist incident is domestic if the perpetrators and the target are from, and in, the same country. Thus it has only consequences for the host country, and its institutions, people, property, and policies. In addition, there is no foreign sponsorship or involvement in a domestic terrorist event.
Transnational terrorism
A terrorist incident is transnational if:
· Through its victims, targets, supporters, or perpetrators, an incident concerns more than a single country.
· The nationality of the perpetrators differs from that of one or more of the victims. · The nationality of a victim differs from the venue country.
· Terrorists transit an international border to perpetrate their attack. · Terrorist attacks against foreign diplomats.
 · It is a terrorist event that commences in one country but ends in another. For instance, if a midair hijacking of a plane that leaves Athens bound for Cairo and is made to fly to Algiers. 14
· A terrorist attack targets an international organization or international peacekeepers.
Assessing the threat: The law of intelligence
Intelligence is  important in homeland defense and security. Our society is suspicious of intrusions on personal liberties. Mandated identity cards, restricted vehicle access and random searches of airline passengers are generally not well received. That makes it especially important to prevent terrorist attacks by interdicting the terrorists and their resources before they can reach their targets. The primary means of accomplishing this is through a combination of intelligence and law enforcement work.. In the past decade, the United States has helped bolster Kenya’s domestic security and military capacity, assisting in the development of the National Intelligence Service­—Kenya’s domestic and foreign intelligence service.
Criticisms have been mounting against NIS’s capacity to collect valuable information that would prevent possible terror attacks with Members of Parliament calling for reforms in the intelligence agency to boost its capacity to protect Kenyans. The lawmakers have expressed outrage at the security lapse that allowed the terrorists, among them foreigners, into the country smuggling in arms and holding the military in a standoff for four days during the Westgate attack. The NIS has been proved to be more concerned with political intelligence than security intelligence and therefore so long as corruption continues to thrive in the country, terrorists will attack Kenya


COUNTER-TERRORISM AND CRIMINAL JUSTICE
Q. What is Counter Terrorism?
·         These are the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt in response to terrorist threats and/or acts, both real and imputed.
Q. What is Criminal Justice?
·         This is the set of agencies and processes established by governments to control crime and impose penalties on those who violate laws.
·         In Kenya, the criminal-justice system consists of laws, the legislature, the courts, the police, and the prisons department
Q. What are the Approaches to counter terrorism?
1.      Coercive Counterterrorism
Coercive counterterrorism relies on the state’s monopoly on the use of violence, i.e., the exercise of hard power. Strict limits are placed on who can be subjected to state violence. These restrictions form the basis of the legitimacy bestowed upon the state by the rule of law, whether national or international.
Without legally mandated restrictions on the use of state violence, the exercise of violence by state agents such as the police or the military would itself be criminal, violating either domestic criminal law or international law. When state agents acting in the name of counterterrorism consistently contravene the rule of law or the laws of war with impunity, using their coercive powers in ways that create a reign of terror that is sanctioned by the state, then they have become state terrorists, mirroring the behaviour of the terrorists they are fighting.

2.      The Criminal Justice Model. A criminal justice approach treats acts of terrorism as crime. If one considers the most common terrorist tactics, such as kidnapping, assassination, bombing and armed attacks, the end result is usually the infliction of injury or loss of life or the destruction of property, all of which are universally proscribed in the criminal law of all nations.
Treating terrorism as ordinary crime—rather than as a special offence requiring special procedures or punishments—has a delegitimatizing effect on the terrorists. By criminalising the acts that terrorists commit, emphasis is placed on their criminal nature and not on their political or ideological motive.
All this changed after the attacks of 11 September 2001. Many Western countries created special terrorist offences after the 9/11 attacks: the US and Canada in 2001; Australia and Norway in 2002; Sweden in 2003. In many of these special offences, motive became a central element of the legal definition of terrorism. Offences have included committing terrorist acts or committing acts for terrorist purposes, as well as membership in a terrorist organisation and providing material support for terrorism, such as money, weapons or technical expertise, and recruitment. The creation of speech offences has also increased. UN Security Council Resolution 1624 (2005) calls for Member States to take steps aimed at prohibiting by law and preventing incitement to commit terrorist acts. The glorification of terrorism has become an offence in several countries, such as the UK and Spain.
The criminal justice model relies on a complex bureaucracy with strict rules of governance and many interacting institutions, with their own traditions, culture and language. It can be slow and ponderous, with appeals stretching the process out for years. For some, the model seems to favour the terrorist, especially over the victim. While the criminal justice model can achieve some important goals in terms of deterrence, retribution, education, incapacitation and rehabilitation, these benefits are largely dependent upon how the system is used, how fair it is seen to be used by others, and how committed individuals are to terrorist violence either as a means to other goals or as an end in itself.

3.      The War Model. The war model of counterterrorism treats terrorism as if it were an act of war or insurgency. Because wars are usually fought between states, countering terrorism within a war model implies that the terrorist group represents the equivalent of a state. Treating terrorism as war therefore tends to credit the terrorist with the status of equal partner in a zero-sum conflict. This is why many terrorist groups use the word ‘army’ in their names. Although the central element of the war model is the use of maximal force, designed to overpower the enemy, the conduct of war does not occur in a legal vacuum. The laws of war lay down rules for how wars should be fought and how noncombatants should be treated. The 1949 Geneva Conventions represent a kind of trade-off that legitimizes killing or detention without trial in time of war, as long as it is directed at overpowering an enemy combatant. The trade-off is that once a combatant is captured and disarmed, or gives up and abandons the fight, he must be accorded humane treatment, protection and care.
The term ‘illegal enemy combatant’ attempts to create an exception to this rule for combatants who use stealth and do not wear uniforms or insignia identifying them as enemy combatants, namely terrorists, guerrillas or insurgents. In a war model of counterterrorism, success tends to be defined in terms of victory or defeat. A ‘war on terror’ only ends when the terrorist enemy is defeated. If the struggle is a protracted one, even spanning generations, then counterterrorism efforts must be maintained as long as a state of war exists. This has led some to argue that we are engaged in a ‘long war’ or even a ‘never ending’ war with Islamist terrorism. This infinite vision of the war on terror has important policy implications, including constitutional ones.
The war model is considered quick, effective and ideally suited to the new kinds of threat posed by decentralized, ideologically driven terrorist networks whose adherents are not deterred by traditional criminal justice or contained by traditional military power. It places great value on the remarkable things that science and technology can achieve. Examples include remote sensing, satellite imagery, spy drones, missile technology, smart bombs and other sophisticated weaponry, as well as facial recognition and other biometrics. Some of the capabilities being discussed in recent years include ‘the need for ‘‘birth to death’’ tracking and identification of critical targets, whether they are people or things, anywhere in the world.’ The idea that a nation’s military can watch, listen, record and track anyone or anything anywhere in the world and strike at will with guided, pilotless attack planes or space-based weaponry is the ultimate individualised war model, designed to fight an atomised, dispersed enemy rather than the traditional hostile state or terrorist group. Since Barack Obama became President in 2008, the military dimensions of counterterrorism policy have expanded further to include a formally authorised system of intelligence-led drone strikes and targeted assassinations.
The war model carries a high risk of unintended consequences that can escalate violence, undermine the legitimacy of governments that use it, or pull governments along a dangerous path to anti-democratic governance. This does not mean, however, that the war model cannot be a useful and valuable tool in an overall counterterrorism strategy. As in just war theory, the use of force can be justified under certain strict conditions. It must be discriminate, proportionate, declared by a proper authority, used for a justifiable cause, with just intentions that outweigh the evil of the means used by the good of the ends sought, have a high probability of success, enjoy public support, and be used only as a last resort, when all other means have been pursued.

4.      Proactive Counterterrorism
Proactive counterterrorism aims to prevent terrorism before it happens. Through the merging of internal and external security, the mandates of domestic police, security intelligence agencies, and border and customs officials have all combined around the problem of tracking the movement of people, goods and money. Through intrusive techniques involving surveillance, wiretapping, eavesdropping and other means of spycraft, agents of all stripes have devoted their energies more and more to stopping terrorists before they act and thwarting terrorist plots before they develop too far. These trends have led to the emergence of a hybrid model of coercive counterterrorism that combines elements of both the criminal justice model and the war model.
The increased focus on proactive counterterrorism has important implications for a variety of institutions and policies. In the area of criminal justice, it means more proactive and intelligence-led policing, increasing use of sting operations and informers, more reliance on preventive detention, and early arrests to disrupt plots. In the area of intelligence, it means widening surveillance nets, the identification of dangerous classes of people, increased use of profiling, increasing focus on radicalisation to violence and counter-radicalisation, and increased focus on terrorist financing and fund-raising. In the area of criminal law, it means more speech offences, criminalising membership in organisations, and “material support for terrorism” offences aimed at fundraising, recruitment and training. In the military realm, it means more reliance on drones for surveillance and targeted killings, more intervention in failed and failing states to strike terrorist training camps and militant groups directly, such as the recent French intervention in Mali, and even pre-emptive war, such as the 2003 US invasion of Iraq.
A more proactive approach requires coordination and integration across a wide range of policy domains: criminal law, policing, intelligence, finance, border control, immigration and refugee policy, military strategy and tactics, diplomacy, development, and humanitarian intervention. As such, it places a greater demand on government to coordinate across previously distinct domains, jurisdictions and agencies, domestically, and across the increasingly blurry boundaries between domestic and foreign policy. This whole-of-government imperative can create tensions between intrinsically conflicting goals.

5.      The Intelligence Model. The intelligence function is an important element in any counterterrorist effort. In a proactive approach, it becomes central. In proactive policing and security intelligence, information is not gathered for evidentiary purposes but for intelligence purposes. The ultimate goal is not necessarily criminal prosecution. Instead, the goal of intelligence operations is to learn more about what the terrorist suspects are up to. The demands of information gathering can therefore conflict with those of criminal investigation and due process.
Proactive counterterrorism is therefore a double-edged sword. It can nip a burgeoning threat in the bud or destabilize a terrorist network enough so that its operatives cannot move from the planning stage and go operational. On the other hand, apprehending a terrorist operative can diminish opportunities for learning more about their connections with other terrorist or criminal networks.
The merging of national and societal security has led to massive surveillance of a wide category of individuals and detention without trial of citizens as well as resident aliens. Much of the post-September 11 debate surrounding counterterrorist efforts in the area of intelligence and surveillance relates to how wide the net should be cast and whether profiling of specific target groups is justified or acceptable.
Two opposing concerns underlie honest efforts to address both security concerns and concerns about democratic acceptability. On one hand, a fear of false negatives (failure to detect a threat) can lead to widening the surveillance net as much as possible, thereby running the risk of infringing upon civil liberties of those targeted and, ultimately, facilitating the commission of human rights violations by control agents. On the other hand, a fear of false positives (targeting innocent individuals, organisations or communities) can lead to the imposition of onerous judicial restrictions upon intelligence gathering, the creation of oversight committees with political agendas, and the creation of sunset clauses on anti-terrorism legislation that activate at inappropriate times, thereby running the risk of attenuating the effectiveness of intelligence gathering operations.
Both fears can be socially constructed or exaggerated by those with a stake in the outcome: politicians, policy-makers, law enforcement, media, communities at risk, private security companies and entrepreneurs.

6.      Persuasive Counterterrorism
Counterterrorism involves understanding and dealing with the ideas that underpin the use of terrorism in social and political life. This has ideological, political, social, cultural and religious aspects. Terrorists have constituencies which include followers, sympathisers, potential recruits, active or passive supporters, and state sponsors. Counterterrorists have constituencies which include state actors within government ministries, agencies and bureaucracies, including those of allies, as well as non-state actors within civil society and the private sector, such as victims’ groups, citizens, mass publics and the media, both domestic and international, and employers and employees within industries, private companies and corporations. Counterterrorism must deal with these wider audiences.
Counterterrorism, like terrorism, is inherently communicative. Propaganda, psychological warfare, “hearts and minds” campaigns, and the idea of providing incentives for terrorists to abandon violence and seek nonviolent paths instead all refer to this notion of counterterrorism as a form of communication, where different messages are conveyed to different audiences. Just as terrorist discourse and propaganda can blind followers and recruits to alternative pathways and options, so counterterrorism discourse and propaganda can blind citizenries and publics, as well as policy elites and the media, to alternative means of countering the terrorist threat.

7.      The Communication Model. All response options convey information of some sort to different audiences; they are expressive and symbolic as well as instrumental. The particular messages that are actually received by a particular audience may not be what the sender intended to convey. This lends an inherent complexity to counterterrorism and can lead to unintended consequences. It is therefore important to understand the different kinds of messages, audiences and communicative pathways involved in the complex web of terrorist-counterterrorist interaction.
In addressing terrorists’ constituencies, persuasive counterterrorism can try to promote desired perceptions among individual members of terrorist organisations, their sympathizers, and their foreign supporters, such as the message that terrorism is counterproductive and that other means are more useful to achieve their goals. Counter-narratives that foster cross-cultural and inter-ethnic understanding can undermine those aspects of terrorist propaganda and ideology that promulgate hatred and demonise particular groups of “enemies”.
The prevention of undesired perceptions among terrorists and their constituencies is another aspect of persuasive counterterrorism. Two of the most powerful beliefs that bind individual members to a terrorist group are the idea that once violence has been committed, you cannot go back, and the idea that the group is the only place where a sense of identity, belonging, importance or existential meaning can be achieved.
Laws that provide reduced sentences for cooperation with authorities or that offer amnesty for renouncing violence, coupled with official assurances that exit from the group is always possible and that those who cooperate and who renounce violence can be accepted back into society, could help to prevent certain individuals from remaining trapped in the self-contained world of the terrorist organisation. Psychological, material and economic concerns that make individuals vulnerable to recruitment can be addressed by creating alternative incentive structures for people to move away from embracing violence and terrorism. Talking to one’s enemies and their constituencies, though an anathema to many governments, can serve an important function in challenging and perhaps refuting undesired perceptions whose very existence can be missed in the absence of dialogue and exchange of views.[18] Counter-radicalisation efforts aimed at potential recruits and communities at risk, and deradicalisation efforts aimed at current or imprisoned members are central to preventing undesired perceptions and belief systems.
In addressing counterterrorists’ constituencies, a central element is the maintenance of public trust and confidence in government. Public education about the nature and extent of the terrorist threat, as well as the limits and feasibility of policy options, would help to promote public understanding both before and after a terrorist attack.
Promoting public awareness without fuelling insecurity, apathy or intolerance and hate is an essential element of such an approach. An explicit policy to downplay the impact of terrorism, while condemning the terrorism itself, could help to promote the idea that terrorism is unacceptable in democratic society while minimizing the risk of public calls, fuelled by insecurity and terror, for repressive measures that undermine the rule of law and individual freedoms. Incessant warnings by politicians and security experts about the dangers of radicalisation or the risk of terrorist attack can create a kind of learned helplessness in the face of seemingly inevitable catastrophe. As the rule of law and individual rights are increasingly whittled away in the name of increased security, many citizens simply accept the fact that their rights have to be sacrificed.
The challenge is to prevent the legitimation of terrorists and terrorism without resorting to censorship, intimidation or outright repression. The controversies surrounding Wikileaks, the trial and harsh punishment of Private Bradley Manning, and the Edgar Snowden case all suggest that transparency and accountability have become a casualty of the war on terror.

8.      Defensive Counterterrorism
Defensive counterterrorism assumes the inevitability of some kind of terrorist attack and prepares for it by affecting the variables that determine the nature of the attack and identity of its target. There are two basic approaches: preventing attacks and mitigating attacks. Prevention aims to minimise the risk of terrorist attack in certain places and at certain times. The second approach is to mitigate the impact of successful attacks.

9.      Prevention (before an attack)
The Preventive Model. There are three primary means of prevention: target hardening, critical infrastructure protection (CIP), and monitoring and regulating the flow of people, money, goods, and services. Target hardening aims to make potential targets less attractive or more difficult to attack. It has traditionally focused on important people (e.g., VIPs, government officials) and important places (e.g., government buildings, military bases) at particular times (e.g., major sporting events, international summits, special anniversaries). Making favoured targets less vulnerable to attack forces terrorists to innovate and to find alternatives, tying up resources and planning. This often leads to target substitution or a displacement to softer targets. The hope is that deterring attacks against obviously important targets can channel potential terrorists towards less damaging or less costly forms of attack.
Government and industry are often at odds over financing, training, effectiveness, technology, responsibility and timetables for implementation, and potential impacts on operations. Partnerships between government, industry and other stakeholders are therefore essential.
While opinions vary on what infrastructure is critical, the areas of energy, transportation, industry, communications, banking and urban living are widely recognised as key sectors that need to be protected. Potential targets include hydroelectric and nuclear facilities, oil and gas refineries and pipelines, telecommunications, banks, airports, railways and bridges, urban transport and shopping malls.
Most critical infrastructure is in the hands of the private sector. Government regulation is often weak or nonexistent and industry resistance to any attempts to strengthen security can be intense. Therefore, the most important part of critical infrastructure protection is to identify fruitful points of intervention where physical, structural or procedural changes can be made that reduce the likelihood of attack, and to share this information across government departments and agencies, across different levels of government, and with stakeholders in the private sector.
The third prong of the preventive model is to track the movement of people, money, goods and services in an effort to discover plots in the making and thwart them or to impede their preparation. Terrorists need food, shelter, training, weapons, explosives, safe houses, communications, travel documents, financing. When these are not available or difficult to acquire, the risk of terrorist attack drops. Border and passport control, customs and immigration, refugee determination, and the monitoring and regulation of the flow of people and goods in and out of a country, as well as within its borders, can help identify and track potential terrorists and the plots they devise. The regulation of banking and money transfers can impact terrorist financing, which in turn can make the implementation of terrorist attacks more difficult.
Illegal arms sales, weapons smuggling, theft of poorly guarded materials, corruption, and collusion to break sanctions or to circumvent tracking and monitoring efforts, or simply seeking profit at the expense of considering the impact of sales on future security, all constitute persistent impediments to reducing the likelihood that dangerous goods fall into terrorist hands. Terrorist groups often engage in auxiliary criminal activity to support their terrorist activities and the possibility that they could cooperate with transnational criminal organisations to procure weaponry or other materiel has long been a concern.

10.  Mitigation (Response to an attack)
The Natural Disaster Model. Moshe Dayan, Israeli Minister of Defence from 1967-1974, suggested that ‘terrorist incidents more closely resemble natural disasters than acts of war.’ Terrorist attacks do share many of the same elements as any natural disaster: dead and wounded people; damaged or destroyed infrastructure; uncertainty about what may happen next; people fleeing in panic or rushing to the scene to help; an urgent need for rescue workers, ambulances, transportation routes to hospitals; and intense media coverage that may interfere with rescue operations or create pressure on crisis managers and other authorities. Contingency planning, established chains of command and communication networks, stockpiles of emergency supplies, training of first responders, and strategies for dealing with victims, their families, and the media can be arranged in advance. Such an ‘all-hazards’ or ‘all-risks’ approach means that it can be more cost effective to prepare for a wide spectrum of risks.
The Public Health Model. Terrorism, particularly mass-casualty terrorism, has an impact on public health and the psychological well-being of citizens. As a result, public health, environmental safety and local emergency preparedness have all been incorporated into defensive counterterrorism. Strengthening public health systems would create an infrastructure that can respond efficiently and effectively to a whole range of threats, whether a disease like SARS or swine flu, an industrial accident, an environmental disaster, or an intentional release of a pathogen or explosion of a radiological, chemical or biological device.
11.  The Psychosocial Model. Interest in social and psychological defences and the development of citizen resilience in the face of terrorist threats has increased greatly in recent years. The terror in terrorism is most directly felt by those who fear terrorist attack themselves because of specific threats or because they belong to the same category as past victims. In the case of indiscriminate, mass terrorism, the terror is much more widespread. Add to that the power of television and the internet to bring images from far away into our homes, constantly barraging us with reports of terror strikes from around the world, and the psychological impact of terrorism can be quite invasive and pervasive. Doomsday predictions of new and frightening attacks can spread the terror even further. Chronic anxiety and stress about the threat of terrorism can be a serious problem in societies geared to expect that an attack is imminent or inevitable. It can even increase the risk of cardiovascular disease. Promoting citizen resilience means preparing people ahead of time and strengthening their capacity to cope with the stress, anxiety and fear that particular kinds of terrorist attack provoke. This can help to take the terror out of terrorism.

12.  Long-Term Counterterrorism
Long-term counterterrorism refers to initiatives that do not promise quick fixes, but play out in the long term. This includes the realm of ‘root causes’ and the more structural factors that can create a suitable climate for the promotion and use of terrorism. What are often assumed to be causes, for example, poverty, alienation, personality, discrimination, ideology, are often either facilitating factors, which are usually structural, or triggering factors, which are usually ideational in that they involve interpretations of an event, situation, or conflict. It is these interpretations that are then used to mobilise and recruit people to adopt terrorist violence. Radicalisation, mobilisation and recruitment processes become central to understanding how the terrorist option comes to be seen as the appropriate tool for achieving particular goals and how it is justified to those who are recruited and trained to carry it out.
Because structural factors usually change and evolve very slowly, action taken now may not have a clear and discernible impact until much later. Short-term successes can evolve into long-term failures, and vice-versa. The key to effective long-term counterterrorism is to focus on long-term strategies that can make choosing pathways to terrorism more difficult and less attractive. 
13.  The Human Security/Human Rights Model. The concept of human security reflects the view that international security cannot be achieved unless the peoples of the world are free from violent threats to their lives, their safety, or their rights. The focus of security is the individual, not the state. Promoting social and economic rights can reduce the inequities that fuel radicalisation and facilitate terrorist recruitment.           
The promotion of political and civil rights can clearly have an impact on the attractiveness of the terrorist option. By giving voice to disenfranchised or oppressed groups, other options are provided that make the terrorist option less compelling. In the short term, however, allowing excluded groups access to the political process can increase conflict and even violence. It is only when rights are fully entrenched and institutionalized, and applied uniformly to all societal groups, not just the majority, that the use of violence becomes counterproductive. This was made painfully clear by events in Tunisia, Egypt and Syria, where the early optimism of the Arab Spring has soured, thus giving new impetus to Al-Qaeda’s radical Islamist message that terrorism and violence, not democracy, is the only way to create an Islamic state.
A related challenge is the problem of anti-democratic political or religious movements and whether there are acceptable limits to the right to free expression, assembly and participation in political life: the balance between freedom of expression and freedom from expression.
Many international conventions on human rights single out education as a fundamental right and emphasize education as a vehicle for promoting democratic, pluralistic and anti-racist values. Education can help create a social and political environment that is sensitive to human rights and mutual understanding across cultures and civilizations. Teaching methods that foster an understanding of the interdependence of human beings and an appreciation of ethnic, linguistic, cultural, religious and historical diversity can contribute to reducing the fear and cultivated ignorance that lie at the root of much hatred and violence. Support for extremist and terrorist groups would become harder to sustain and recruitment would become more difficult.
Education can also inform people of injustices and inequities around the world. As they become exposed to the realities of our complex world, they often search for answers and solutions, and can be attracted to the simplistic explanations and solutions offered up by ideologues and fanatics. Many seek refuge in the past or in the rigid authoritarianism of political or religious dogma. This is why education must stimulate critical thinking as well as greater awareness of issues and facts. The ability to think for oneself and to research issues by collecting data from many sources is a good antidote to the propensity to succumb to ideological fads or exclusionary, racist theories. Many educated terrorists come from professions like engineering and medicine. Mohammed Atta, the leader of the 9/11 hijackers, for example, studied engineering in Cairo and pursued graduate studies in urban planning at a technical university in Hamburg. Few terrorists come from the humanities, where literature, history and philosophy promote critical thinking and self-awareness.
Q. What is the Effect of the Al Shabab attacks on Kenyan Soil?
Al-Shabab means The Youth in Arabic. It emerged as the radical youth wing of Somalia's now-defunct Union of Islamic Courts, which controlled Mogadishu in 2006, before being forced out by Ethiopian forces. The Ethiopian invasion of Somalia in December 2006 marked a watershed in the transformation, legitimation and radicalisation of Al-Shabab. First, it provided Al-Shabab with the opportunity to draw on deep-seated Somali hostility towards Ethiopia to recruit thousands of nationalist volunteers (Wise, 2011), as well as to legitimize its existence by discrediting the TFG and external actors like Ethiopia, Kenya, Djibouti and AMISOM, and also to mobilise public support for its armed rebellion, especially jihad. Consequently, ‘Al-Shabab emerged as the main source of armed resistance to the Ethiopian occupation and combined its jihadist rhetoric with Somali nationalism and anti-Ethiopian sentiment to win both passive and active support from many Somalis, including those who had been wary of its extremist Islamism’ Second, the invasion forced Al-Shabab to adopt an effective guerrilla-style operational strategy as a means of resisting Ethiopian advance into the South. Third, ‘by forcing the Islamic Courts Union leaders who had exerted a level of moderating influence on Al-Shabab to flee Somalia, the invasion allowed the group to become even more radical, while at the same time severing its ties to other Somali organisations’. Although the Ethiopian invasion succeeded in routing the ICU and pushing Al-Shabab to the south of the country, it failed to curb Islamic radicalism in Somalia; in fact, it was a primary factor in the ultra-radical turn of Al-Shabab, ‘transforming the group from a small, relatively unimportant part of a more moderate Islamic movement into the most powerful and radical armed faction in the country’ In January 2009, Ethiopia withdrew its troops from Somalia, replaced by the AMISOM comprising thousands of Ugandan and Burundian peacekeeping forces Since 2008, Al-Shabab has demonstrated that it has the operational capability to launch deadly attacks against outposts of the West and perceived enemies outside Somalia
In 2011, the Kenyan Government started an operation called “Operation Linda Nchi” meaning ‘Operation Protect the Nation.’ This came after the Al-Shabaab were blamed for a series of kidnappings of aid workers from refugee camps in North Eastern Kenya and some tourists from the coastal area of Lamu. The idea of the operation was aimed at pushing back the Al-Shabaab from southern Somalia and to weaken their operation. The presence of Al-Shabaab in the southern part of Somalia was a threat to the Kenya tourism industry. The operation to push back this terror group Al-Shabaab to keep Kenya safe was led by the Kenya Defence Forces (KDF).
Although the war against Al-Shabaab is being fought by the joint forces of Kenya, Uganda, Rwanda, Ethiopia, Burundi and Somalia, it seems that Kenya is paying the highest price in this war. In retaliation to Operation Linda Nchi, the Al-Shabaab has carried out a number of attacks in Kenya from 2011. The attacks aimed to force Kenya to withdraw her soldiers from Somalia where they are jointly fighting as part of the African Union Mission in Somalia.
This has therefore led to the following impacts;
i)                    Psychological Impact: Fear and Paranoia was experienced by a significant number of respondents and Kenya as a whole, exemplified by an increase in security checks in major buildings and during travel. Trauma was similarly an effect, with Post Traumatic Stress Disorder having been experienced by a number of people. Hatred and Islamophobia was another reaction.
ii)                  Economic impact: Terrorism in Kenya has affected the businesses of areas which have been frequently plagued by terrorism. Eastleigh is a good example. Tourism, a major foreign exchange earner for Kenya, has also been negatively impacted upon.
iii)                Political Impact: Locally, Kenya implemented the antiterrorism law, the Security Laws (Amendment) Act in 2014. Internationally, terrorism has had an impact on Kenya’s relation with the West with the government taking issue with the fact that western nations had issued travel advisories against Kenya.

No comments:

Post a Comment