Professional Documents
Culture Documents
net/publication/327861566
CITATIONS READS
2 1,339
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Julius Adavize Adinoyi on 25 September 2018.
Abstract
Terror combat challenge terrorism spawns from the varying
conceptualization of terror, radicalization, civil liberty abuses,
weaknesses of terror-financing and sponsorship tracking,
shortfalls in terror combating expertise and technicalities. The
tremendousrise is instrumented by international sympathy
backlash, mobilization of resources to extremist reformers,
foreign policy backlash, marginalization of communities, and
implications of international human rights.Despite counterterror
efforts, Africa still need to address counter-terror leakages due to
the inefficienciesin internal democracies,and redress the adoption
of deep western cultures that infringe of existing African culture
and morals in order to cut the breeding of home grown terror.
1.0 Introduction
Terrorism is integral to many contemporary conflicts in form of a broader context of armed
violence; the introduction of new mechanisms of instilling fear on broader population other than
the victim creates the basis for the emergence of terrorism as a strategy which is usually used by
groups or States. Efforts to have been made in order to combat terrorism but there are a number
of challenges that imped those efforts. And thus this research investigates the challenge of
external factors on home-grown terrorism in Africa; specifically analyzing the challenge of
terrorism, the emergence of home-grown terror and effort of the Africa‟s counter-terrorism
architecture.
The study makes analysis through literary study by means of information acquired fromexisting
scholarlymaterials on terrorism and counter-terrorism.This research employsGame Theory–
explains how external factors, understood as control and intervention, enhances "human
insecurity" in the methodological chain from Middle East and North Africa down along the lines
of sub-Sahara Africa, and therefore endangers global security; –andRegime Theory–explains
how governments individually and collectively enjoin in economic and political cooperation to
counter-terrorism and ensure a secure global community(Richard 2005).The interconnectedness
of gametheory and regime theory will be shown in –that various actors plays escalation game of
a challenger in case of using terror as a means to change the status quo in order to create
favorable regime –and also counterterror responses played through de-escalation game to create
security regimes, economic cooperation regimes, financial and Anti Money Laundry (AML)
regimes. Also in terror situation regime of hostility of regime of concession is created in order to
counter terror (Little 2008).
1
2.0 The Challenge of Combating Terrorism
2.1Conceptualization of terror
The definition of terrorism forms the base of a challenge which hinders analysis of terrorism and
makes the conceptualization of terrorism controversial (Gibbs 1989); there are many varying
definitions due to political reasons usually in form of propaganda –calling terrorist freedom
fighters or vis-vasa.(Weinberg et al 2004)
Domestic terrorism is terror acts by groups confined within national boundaries and targets are
exclusive to non-nationals. Also state-terrorism falls in this category in cases where state-actors –
military, police etc. resort to terror means against its own nationals. While in international or
transnational terrorism, terror acts by same or linked groups are perpetuated across more than
one national boundary, thus non-nationals are often inclusively targeted and selected nationals
are targeted because of their link with the non-nationals. Also state-sponsored-terror is inclusive
as seen during the cold war where sovereign state sponsored individuals and groups in terror
acts. (Julius 2013)
However, according to the African Union (AU), terrorism is an act in violation of the
criminallaw of a state which may cause death or endanger lives and harm to the environment, all
intended to intimidate people, disrupt public services or create general insurrection in a state.The
AU further acknowledge the fact that the peoples struggle –including armed struggle carried out
in accordance with the principle of international law for the liberation from colonialism,
occupation, aggression and domination by foreign forces is not considered as terrorism.But
further states that Political, philosophical, ideological, racial, ethnic, religious or other motives
shall not be a justifiable defence against a terrorist act. (OAU 1999) The interpretation and
labelling by the media forms one of the arenas in which terrorism is conceptualized (Schmid
1988), and this gives media the power to influence the public‟s understanding of terrorism. The
public effect can either beStockholm syndrome –empathy and sympathy for the perpetrators; or
Mean world syndrome –views that the world is filled with violent people.
2.2Radicalization
Corruption, poverty, oppression, marginalization and religious extremism lead to radicalization
particularly among young people (Davis 2012) leading to terror flourishing in Africa due to
development problems (UN 2004). Those factors can also have a combined effect as seen in the
case of the Nigerian-Boko-haram and Somali-Alshababs, and usually awareness through
civilization and the use of media/internet have increased the spread of radicalism.
2
Religious extremism which contributes to the greater terror percentage in Africa usually
emanates from the predominant religions i.e. Christianity -38% of Africa‟s population (Religious
Population 2015) and Islam -53% of Africa‟s population (Muslim Population 2015). These
religions are not of origin from Africa, and thus themisconception of their beliefs which leads to
radicalization can be attributed to external factor that contributes to terrorism i.e. purported
religious extremists like Boko-haram in West Africa, Anti-Balaka in Central Africa Republic,
and Al-Shabaab and Lord‟s Resistance Army –whichhave since been forced into hiding in East
Africa.
The prison meant to be a correctional facility can in turn be a radicalization zone as most
terrorist are in the same confinement with other criminals. Also in general, prison effect may
contribute to radicalization due to harsh and restricted activities (ICRS 2010).
3
Figure 1 Impact of US Facilitated Terror in Libya
Weak anti-terror finance combat have also contributed to the spread of terror in African region –
classical example is the African leaders and official supporting terror groups for strategic
interest, for example Nigerian leaders in the case of Boko-haram (FATF 2013), and more often
the Anti-terrorFinance and Money Laundering (AML) regimes are inefficient to track secret or
covert terror sponsorship. For example, U.S sponsorship of rebels in Syria aided the finance and
stability of Islamic State of Iraq and Syria (ISIS) which controls part of Iraq and Syria (Global
Research 2015) –a group which Boko-haram pledged allegiance to i.e. literally receive orders
form and/or carry out attacks with the mandates of ISIS.
2.5 Expertise/technicalities
Despite the effort by African States in combating terror, there are still deficiencies in the area of
intelligence, for instance most of intelligence information (intel)are received from foreign intel
(RFI 2015, Washington Post2015) about impending attack and in most cases such intel are
generalized and thus makes it a difficult task to identify specifically the area of potential attack
(Al Jazeera America 2015). Among other challenges are weaknesses in institutionalized terror
related curricular not only in tertiary institutions but also at secondary/high school and primary
4
levels. Defensive and war counterterrorism machinery have hindered fight against terror –
particularly in the case of Nigeria where the military lacks proper equipment due to corruption
(FATF 2013) –also in cases where terror groups engage in cyber warfare and the State lacks the
capacity to shut down the terrorist internet access. For example in the Westgate attack where the
terrorist resulted into using twitter to play games with the public while the attack was still going
on, and same applies to the Boko-haram that record videos in the forest and post them on the
internet.
From the literature in the previous section external factors that result to the emergence of home-
grown terror can be drawn from international sympathy/empathy to reformers; mobilization
ofreformers; effects of foreign policies of non-African nation on African States; denial of
integration of integrating communities; and override of freedom.
5.0 Conclusion
The internationalization/globalization of Religion, media and culture are not boundary bond; and
the championing of certain country‟s strategic interest –e.g. proxy interests in war on terror
plays role in emergence of terror in Africa through the selected use ofweaponization which
spread through the terror networks, and psychological warfare though the strategic use of media
and conceptualization of terms of terror (Botha 2007)–information, disinformation, manipulation
of thepressand propaganda, thus directly or indirectly leading to terrorism influenced–internally
bydraconian rule, failed/weak state, nationalist or separatist movements, marginalization,
religion, poverty and corruption. (FATF) This recommends effective tracking of covert or proxy
financial supports to terror groups by foreign and national entities, strict implementation of
immigration laws to curb transnational migration of individuals who upon return to home
country strategies for home initiated terror attacks, instituted measures to reduce poverty and
corruption which breeds terrorism and also enhance technicalities and expertise involved in
countering terror by institutionalizing terror related curricula in all levels of the education stages
and further enhancing the capacities of intelligence units inorder to reduce over reliance on
foreign intelligence and to develop specification of intel on impending attacks.
6
Reference
Al Jazeera America.'Why Nigeria‟s Military Is Losing The Battle Against Boko Haram. Al
Jazeera America, January 13, 2015. Accessed March 6, 2015
Aronson, S. L. 2013. “Kenya and the Global War on Terror: Neglecting History and Geopolitics
in Approaches to Counterterrorism.”African Journal of Criminology and Justice
Studies, Vol.7, Issue 1&2 November. Accessed March 6, 2015
Botha, A. 2007. “Relationship between Africa and International Terrorism.” pp 2-5, 10-
12.Accessed March 6, 2015
Davis, C. 2012. “Anatomy: African Terrorism.” World Policy Journal. Vol. 29 Issue 4,
p16.Accessed March 6, 2015
FATF. 2013. “Terrorist Financing In West Africa: FATF Report October 2013”. Financial
Action Task Force.Accessed March 6, 2015
Gibbs, J. P. 1989. “Conceptualization of Terrorism.”American Sociological Review, Vol. 54,
Issue 3. (American Sociological Association (June): 329-340.Accessed March 6, 2015
Global Research. 2015. “Is Washington Financing Terrorism? Islamic State (ISIS) Mercenary
Admits Getting Funds From US.” Accessed March 6, 2015
HRW. 2007. “Get the Gun: Human Rights Violations by Uganda‟s National Army in Law
Enforcement Operations in Karamoja Region.”Accessed March 6, 2015
HRW. 2008. “All the Men Have Gone: War Crimes in Kenya‟s Mt. Elgon Conflict.”Accessed
March 6, 2015
HRW. 2008. “Collective Punishment: War Crimes and Crimes Against Humanity in the Ogaden
Area of Ethiopia‟s Somali Regional State.”Accessed March 6, 2015
HRW. 2010. “Welcome to Kenya: Police Abuse of Somali Refugees.” Accessed March 6, 2015
ICRS. 2010. “Prisons and Terrorism: Radicalisation and De-radicalisation in 15
Countries.”Accessed March 6, 2015
Julius, Adinoyi, A. 2013. "Terrorism, Landmine, Weapon of Mass Destruction, and
Counterinsurgency." Nairobi, Kenya: University of Nairobi, 2013. pp1-2 Accessed
March 6, 2015
McColl R. 2015. “Surviving the Kenya Bombing: norfolk hotel bombing 1980 Archives.”
Accessed March 6, 2015
Muslimpopulation. 2015. “Muslim Population Worldwide Data'. Accessed March 6, 2015
OAU. 1999. “OAU/AU convention on the Prevention and Combating of Terrorism (Algiers,
1999): Treaty on Cooperation among the States Members of the Commonwealth of
Independent States in Combating Terrorism.” pp 207-208 Accessed March 6, 2015
Oehme III, Chester G. 2008. “Terrorist, Insurgents and Criminals – Growing Nexus?.” Studies in
7
Conflict & Terrorism, Vol. 31, Issue 1, pp 80-93.Accessed March 6, 2015
Powell J., Lock J. 1996. “Natural Rights to Life, Liberty, and Property: The Freeman.”
Foundation for Economic Education.Accessed March 6, 2015
Religiouspopulation. 2015. “Religious Population Worldwide Data.” Accessed March 6, 2015
RFI. 2015. “Kenyan Security Called Into Question In Wake Of Garissa University Attack.”
Accessed March 6, 2015
Richard L. “International Regimes.” In The Globalization of World Politics-An Introduction to
International Relations, edited by Baylis, John and Steve Smith. Oxford University
Press, 2008 p301. Accessed March 6, 2015
Richard, Anne, C. 2005. “Fighting Terrorist Financing: Transatlantic Cooperation and
International Institutions.” Washington: The John Hopkins University.Accessed March
6, 2015
Schmid, A. P., Jongman A. 1988 “Political Terrorism: A New Guide to Actors, Authors,
Concepts, Data Bases, Theories, and Literature.” London: Transaction Publishers. p11.
Accessed March 6, 2015
Smith, G. 2012. “Jeremy Bentham‟s Attack on Natural Rights.”Accessed March 6, 2015
Socio-Economics History Blog. 2013. “The Geopolitical Reordering Of Africa: US Covert
Support To Al Qaeda In Northern Mali, France “Comes To The
Rescue.” Accessed March 6, 2015
UN. 2004. “Report of the High Level Panel on Threats, Challenges and Change.”Doc.A/59/565,
2 December.pp 45-46. Accessed March 6, 2015
Washington Post. 2014. “How Kenya Made Itself Vulnerable To Terror.” Accessed March 6,
2015
Weinberg, L., Pedahzur, A., Hirsch-Hoefler, S. 2004.“The Challenges of Conceptualizing
Terrorism.”Terrorism and Political Violence, Volume 16, Issue 4. p778. Accessed
March 6, 2015