Professional Documents
Culture Documents
_____________________________________________________________________
Department of Arts
MOGADISHU – SOMALIA
March 2022
APPROVAL PAGE
This Thesis has been written with my guidance and supervision and thus recommends
submission for further consideration.
Yours Sincerely
Name
Title
Signature Date…/……/……/
i
DECLARATION
I hereby declare that this Thesis entitled Role of Intelligence work for the control of crime
organized in Somalia. It's my original work and to the best of our knowledge, it has never been
presented in any other institution for any academic award. I also declare that any secondary
information used has been duly acknowledged in this dissertation
ii
DEDICATION
First, I would like to dedicate this research to Allah and our beloved parents who give Us
the greatest love, mercy, support, encouragement, nourishment, happiness, Protection from
harmful things to our, teaching, and all great appreciation to us.
iii
ACKNOWLEDGMENT
First of All, Thanks Belonged to Allah who enabled us The Completion of This Thesis. I
would like to State my Gratefulness and Genuine Thanks to who has given us useful comments
and guidance throughout our research writing.
Second, I would like to give special thanks to my beloved parents, brothers, and sisters,
who encouraged us to attend this educational academic level, which we have attained, and their
efforts to our future as wholly and I would like to thank my deep sense of gratitude to everyone,
who contributed to our thesis project development process through encouragement, technical
support and much more cooperation and for being helpful to the finishing of this project.
Third, I would like to thank my dear Supervisor: Dr. Shantae‘ Coppock,for his professional
guidance, follow up and great support, useful comments, Remarks and engagement through the
learning process of this thesis.
I would like to thank everyone, who supported and encouraged us to Start and complete
this degree, including my lecturers and administration of Accord University
iv
LIST OF TABLES
Table 4.1.1. What is your Age?
Table 4.1.2. What is your gender?
Table 4.1.3. What is your marital status?
Table 4.1.4. What is your education level?
Table 4.1.5. What is your occupation ?
Table 4.2.1. Intelligence is the backbone of law enforcement as a strategic tool for preventing crime in
order to identify suspects, detect crime, direct operational activities, protect the weak, locate the missing,
and apprehend offenders.
Table 4.2.2. Intelligence gives law enforcement officials the information to analyze and select the most
suitable criminal risks.
Table 4.2.3. Intelligence helps people avoid wasting time and effort on unrelated tasks.
Table 4.2.4. Whether it's before or after a terrorist attack, intelligence is essential in preventing terrorist
attacks from happening and helping law enforcement officials catch suspects.
Table 4.2.5. The targeting of available resources and the identification of information gaps made possible
by intelligence analysis help investigations by sharpening their focus.
Table 4.2.6. Criminal intelligence analysis helps law enforcement agencies create a pro-active approach to
fighting crime.
Table 4.2.7. Law enforcement agencies respond to investigate and prevent crime.
Table 4.2.8. Law enforcement organizations are in charge of enforcing laws, maintaining peace, and
protecting public safety.
Table 4.2.9. Community policing is a technique for reducing crime that strives to be more effective.
Table 4.2.10. Fighting against organized crime is high on the political agenda of the present government.
Table 4.2.11. The police and security forces place a strong priority on combating organized crime.
Table 4.2.12. Terrorism directly affects human rights, with consequences for the enjoyment of the right to
life.
Table 4.2.13. Challenge the ideology that underlies terrorism and those who support it in order to reduce
its capacity.
Table 4.2.14. Detecting explosives and other types of weaponry it is one of the most successful tactics for
preventing terrorist attacks.
Table 4.2.15. Preventing vulnerable people from becoming involved in terrorism by providing them with
the right guidance and encouragement
v
LIST OF FIGURES
Figure 1.8. Conceptual Frame work
Figure4.1.1. What is your Age?
Figure4.1.2. What is your gender?
Figure4.1.3. What is your marital status?
Figure4.1.4. What is your education level?
Figure4.1.5. What is your occupation ?
Figure4.2.1. Intelligence is the backbone of law enforcement as a strategic tool for preventing crime in
order to identify suspects, detect crime, direct operational activities, protect the weak, locate the missing,
and apprehend offenders.
Figure4.2.2. Intelligence gives law enforcement officials the information to analyze and select the most
suitable criminal risks.
Figure4.2.3. Intelligence helps people avoid wasting time and effort on unrelated tasks.
Figure4.2.4. Whether it's before or after a terrorist attack, intelligence is essential in preventing terrorist
attacks from happening and helping law enforcement officials catch suspects.
Figure4.2.5. The targeting of available resources and the identification of information gaps made possible
by intelligence analysis help investigations by sharpening their focus.
Figure4.2.6. Criminal intelligence analysis helps law enforcement agencies create a pro-active approach
to fighting crime.
Figure4.2.7. Law enforcement agencies respond to investigate and prevent crime.
Figure4.2.8. Law enforcement organizations are in charge of enforcing laws, maintaining peace, and
protecting public safety.
Figure4.2.9. Community policing is a technique for reducing crime that strives to be more effective.
Figure4.2.10. Fighting against organized crime is high on the political agenda of the present government.
Figure4.2.11. The police and security forces place a strong priority on combating organized crime.
Figure4.2.12. Terrorism directly affects human rights, with consequences for the enjoyment of the right to
life.
Figure4.2.13. Challenge the ideology that underlies terrorism and those who support it in order to reduce
its capacity.
Figure4.2.14. Detecting explosives and other types of weaponry it is one of the most successful tactics for
preventing terrorist attacks.
Figure4.2.15. Do you agree that increasing the rate of investments in rural areas would help to reduce
poverty?
vi
CONTENTS
APPROVAL PAGE ........................................................................................................................... i
DECLARATION .............................................................................................................................. ii
DEDICATION ................................................................................................................................. iii
ACKNOWLEDGMENT.................................................................................................................. iv
LIST OF TABLES ............................................................................................................................ v
LIST OF FIGURES ......................................................................................................................... vi
CONTENTS.................................................................................................................................... vii
Abstract ............................................................................................................................................ ix
CHAPTER ONE ........................................................................................................................... 1
INTRODUCTION ........................................................................................................................ 1
1.0. INTRODUCTION ................................................................................................................ 1
1.1. THE STUDY'S BACKGROUND ............................................................................................. 1
1.2. STATEMENT OF THE STUDY'S PROBLEM. ....................................................................... 8
1.3. THE STUDY'S OBJECTIVE .................................................................................................. 10
1.3.1. General Objectives of the Study ........................................................................................... 10
1.3.2. Specific Objectives of the Study ........................................................................................... 10
1.4. RESEARCH QUESTION OF THE STUDY ........................................................................... 10
1.5. THE STUDY'S SCOPE ........................................................................................................... 11
1.5.1. The Study's Content Scope ................................................................................................... 11
1.5.2. The Geographical Scope of the Study ................................................................................... 11
1.5.3 Duration of the Research........................................................................................................ 11
1.6. THE STUDY'S IMPORTANCE .............................................................................................. 11
1.7. OPERATIONAL DEFINITION .............................................................................................. 12
1.8. CONCEPTUAL FRAME ........................................................................................................ 13
CHAPTER TWO ........................................................................................................................ 14
LITERATURE REVIEW .......................................................................................................... 14
2.1. THE TOURISM AND INTELLIGENCE CONCEPT ............................................................ 14
2.2. INTEGRATED INTELLIGENCE AND CRIME ANALYSIS ............................................... 16
2.3. TERRORISM PREVENTION AND VIOLENT EXTREMIS ................................................ 19
2.4. ROLE OF LAW ENFORCEMENT IN THE CONTROL OF CRIMES ................................. 21
2.5. THE ROLE OF FOREIGN OPERATIONS IN SOMALI TERRORISM GROUPS .............. 30
2.6. THE ROLE OF FOREIGN TERRORISM ON SOCIAL DEVELOPMENT .......................... 33
CHAPTER THREE .................................................................................................................... 37
METHODOLOGY ..................................................................................................................... 37
3.0. INTRODUCTION ................................................................................................................... 37
3.1. RESEARCH STRATEGY ....................................................................................................... 37
3.2. POPULATION BEING STUDIED ......................................................................................... 37
3.4. STUDY AREA ........................................................................................................................ 37
3.5. SAMPLE SIZE ........................................................................................................................ 38
3.6. SAMPLE PROCEDURE ......................................................................................................... 38
3.7. RESEARCH INSTRUMENT .................................................................................................. 38
3.8. DATA GATHERING PROCEDURE ..................................................................................... 39
3.9. DATA EXAMINATION ......................................................................................................... 39
3.10 CRITERIA FOR INCLUSION AND EXCLUSION .............................................................. 39
3.10.1. Criteria for Inclusion ........................................................................................................... 39
3.10.2. Criteria for Exclusion .......................................................................................................... 39
3.11 QUALITY ASSURANCE ...................................................................................................... 39
vii
3.12 Ethical Consideration .............................................................................................................. 40
CHAPTER FOUR ...................................................................................................................... 41
RESULT & DISCUSSION......................................................................................................... 41
4.0. INTRODUCTION ................................................................................................................... 41
4.1. DEMOGRAPHIC DATA ........................................................................................................ 41
4.2. Section two: Role of Intelligence work for the control of crime organized in Somalia ........... 47
4.3. Result and Discussion .............................................................................................................. 62
CHAPTER FIVE ........................................................................................................................ 67
CONCLUSION AND RECOMMENDATION ........................................................................ 67
5.1. INTRODUCTION .............................................................................................................. 67
5.2. CONCLUSION OF THE STUDY ...................................................................................... 67
5.3. RECOMENDATIONS........................................................................................................ 72
APPENDIX .................................................................................................................................. 73
REFERENCES ............................................................................................................................... 73
QUASTIONAIRE ........................................................................................................................... 76
Budget Frame Work ........................................................................................................................ 80
viii
Abstract
In methodology of the study, I used descriptive in design. Also, it was also quantitative and
cross sectional in nature the target population of our Research was the political experts, security
experts, intelligence experts, students, and members of society, the sample size of our study was
80 respondents. Closed questionnaire was used to collect research data. Respondents were
briefed about the study and its objective. The content of the questionnaire was explained for
them and was also requested to answer the questions as honest as possible.
As a result, the first objective which to determine the effectiveness of law enforcement in
the Criminal Investigation Division control of crime organized in Somalia the researcher found
that the majority of the respondent 48 (60%) were Agreed that community policing is a
technique for reducing crime that strives to be more effective while the minority of the
respondent 32 (40%) were Neutral. Also most of the respondent 64 (80%) were Agreed that the
police and security forces place a strong priority on combating organized crime., it followed by
11 (13.8%) were Neutral while the minority of the respondents 5 (6.3%) were Dis-agreed. Even
ix
all the respondents 80 (100%) were Agreed that fighting against organized crime is high on the
political agenda of the present government. It also most of the respondents 77 (96.3%) were
Agreed that the criminal intelligence analysis helps law enforcement agencies create a pro-active
approach to fighting crime, while the minority of the respondent 3 (3.8%) were Neutral.
Although all the respondents 80 (100%) were Agreed that Law enforcement agencies respond to
investigate and prevent crime.
The second objective of our research was to investigate the role of enforcement National
Intelligence control of crime organized in Somalia, so we found that most of the respondents 74
(92.5%) were Agreed that Intelligence is the backbone of law enforcement as a strategic tool for
preventing crime in order to identify suspects, detect crime, direct operational activities, protect
the weak, locate the missing, and apprehend offenders, while the minority of the respondents 6
(7.5%) were Neutral. Even the majority of the respondent 63 (78.8%) were Agreed that
Intelligence gives law enforcement officials the information to analyze and select the most
suitable criminal risks while the minority of the respondent 17 (21.3%) were Neutral. It also
most of the respondent 72 (90%) were Agreed Whether it's before or after a terrorist attack,
intelligence is essential in preventing terrorist attacks from happening and helping law
enforcement officials catch suspects, while the minority of the respondent 8 (10%) were Neutral.
Also most of the respondent 75 (93.8%) were Agreed that law enforcement organizations are in
charge of enforcing laws, maintaining peace, and protecting public safety, while the minority of
the respondent 5 (6.3%) were Dis-agreed
The third objective of our research was to explain the role of National Intelligence for the
prevention strategies of terrorist attacks in Somalia, and researchers found that the most of the
respondent 60 (75%) were Agreed that Intelligence helps people avoid wasting time and effort
on unrelated tasks, it followed by 13 (16.3%) were Neutral, while the minority of the respondent
7 (8.8%) were Dis-agreed. Also most of the respondents 57 (71.3%) were Agreed that the
targeting of available resources and the identification of information gaps made possible by
intelligence analysis help investigations by sharpening their focus, while the minority of the
respondent 23 (28.8%) were Neutral. Even all the respondents 80 (100%) were Agreed that
Terrorism directly affects human rights, with consequences for the enjoyment of the right to life.
It also the majority of the respondent 39 (48.8%) were Agreed that Challenge the ideology that
underlies terrorism and those who support it in order to reduce its capacity, it followed by 30
x
(37.5%) were Neutral while the minority of the respondent 11 (13.8 %) were Dis-agreed.
Although most of respondent 43 (53.8%) were Agreed Detecting explosives and other types of
weaponry it is one of the most successful tactics for preventing terrorist attacks, it followed by
30 (37.5%) were Neutral while the minority of the respondent 7 (8.8%) were Dis-agreed. The
majority of the respondent 53 (66.3%) were Agreed that Preventing vulnerable people from
becoming involved in terrorism by providing them with the right guidance and encouragement, it
followed by 19 (23.8%) while the minority of the respondents 8 (10%) were Neutral some
others were Dis-agreed
Based on the findings of the study, the following are strongly recommended to improve the
following actions:
The intelligence analysis group must strengthen the investigations by targeting available
Special investigative techniques should be developed to help with organized crime investigations.
The government must fight corruption through its organized crime investigation operations.
To reduce the prevalence of organized crime, the law must be strictly enforced.
The state police must be strengthened to prevent terrorism and organized crime because they play
critical roles.
xi
CHAPTER ONE
INTRODUCTION
1.0. INTRODUCTION
This chapter describes the following sections: background of the study; the
problem statement of the study; the purpose of the study; objectives of the study;
research questions; the significance of the study; justification of the study; the
scope of the study; operational definitions of the study; and the conceptual
framework of the study.
1
its members to avoid institutional persecution, as well as an efficient division of
labor. All of this, combined with transnationalization, creates a slew of problems
for the agencies and institutions in charge of criminal prosecution. In their search
for better and more efficient self-protection, criminal organizations have opted to
relocate to those countries with the most favorable characteristics to accomplish
their aims. States with more lax legal systems, more permeable immigration laws,
and underdeveloped or outdated criminal policies have been the favorite
candidates (Mingardi, 2007).
2
criminal culture allows us to infer a set of measures, both preventive and reactive,
of a varied nature. A wide range of actions are being used by criminal
organizations to protect themselves from being investigated (counterintelligence).
To that effect, criminal organizations carry out informative poisoning
(disinformation) and even bait with the use of "honeypots" to test and measure the
response of the state security agencies and the Intelligence Services. By using
these strategies they can detect the extent of the surveillance and monitoring that
their members are being subjected to. Not in vain, criminal organizations carry
out different activities destined to cancel out infiltration attempts by the security
agencies (counterintelligence), and they try to hinder any attempts by the state to
gain a deeper knowledge and understanding of these organizations. At the same
time, they devise ploys to gain information about the political, economic, or
security spheres that will allow them to exploit them at their convenience,
permeating public and private institutions. In that respect, it is important to
highlight how these organizations have used the transformations that have
occurred in the field of new technologies (Martens, 1987).
3
information) into cells with varying degrees of autonomy, the knowledge and
decision-making processes both at the organizational and functional levels are
reserved for the most senior level of the leadership, thus hindering any infiltration
measures. In addition to structural factors, collaboration among organizations and
the outsourcing of specific tasks complicate understanding of the criminal
phenomenon. The recourse to individuals (facilitators) or structures that do not
strictly belong to the organization at certain stages of the criminal cycle is due to
the specialization of the service offered. They provide financial, economic,
technical, logistical, commercial, and legal services, as well as extensive
experience in risk control, enabling them to increase both the safety of the
operations and the benefits gained from them (Martens, 1987).
4
maintenance of public order. We must overcome this anachronistic view. The
institutional systems that act against crime have traditionally been based on
reaction and not anticipation. Following this approach, the objective of policing
has always been to report crime and not its potential existence, ensuring the
enforcement of criminal laws by repressing offenders. However, reality requires a
change of view in the fight against crime, focusing not on the conduct and the
investigation and arrest of the perpetrators but on the assessment and management
of the threat of crime, which in itself is a behavior factor or element that can lead
to damage and criminal liability, but by definition has not yet caused such damage
(Moreno, 2009).
This reality creates tension in the structures and police procedures because
both the penal system and the police system were originally conceived as
instruments of reactive action before criminal damage had been perpetrated. If the
security forces' traditional reactive orientation has allowed for a strategically-
oriented model based on response capability against crime, several factors are
currently influencing police efforts toward a model of prospective strategy in
which the effort is focused not on the reaction to the commission of a crime but
on anticipating and taking measures to prevent such events from occurring.
Having lost the initiative to address the proliferation of organized crime in its
early stages, now that there's a will to react to its consolidation and expansion, it
turns out that, against a backdrop of a multi-faceted and ever-evolving security
scenario, state bureaucracies remain largely constrained by stagnant functional
frameworks. Security agencies have become fossilized against criminality that
exploits the advantages provided by globalization, asymmetric conflict, and its
lack of ethical or moral restrictions. This "functional ballast", added to the state's
own territorial and jurisdictional limitations, has hindered the institutional
response so far, conferring an advantage to organized crime. Consistent with this
5
descriptive framework, the need to address an ever more sophisticated form of
crime should stimulate a strong commitment toward specialization and
diversification (Levi, 1998).
Police intelligence is developed by and for the provision of policing and its
purpose is to provide the decision-maker, be it a police officer or a politician, with
informed knowledge for better management of police resources and to maximize
their preventive, proactive, and also reactive capabilities to strengthen the
protection of public order, social peace, and the preservation of coexistence
(public safety). In my opinion, the turning point that breaks the common
identification between both has taken place in the last decades. As shown in the
preceding paragraphs, in which I address briefly and concisely the
transformations that have taken place in the current criminal scenario, the
phenomenon of organized crime has acquired unusual importance to date,
requiring an intelligence typology that not only covers roughly part of the
functions of police intelligence but its specificity (specialization) leads to more
extensive requirements given the increasing complexity inherent to the organized
crime itself. Not surprisingly, the police themselves have experienced this process
of specialization, developing specific units to fight against organized crime. These
units even have, in some cases, subspecialties in terms of geographical areas,
types of crime, or other circumstances of police interest. It is in this context that
we must locate the blossoming of criminal intelligence, divided almost from its
origin from what was considered policing, strictly speaking, and characterized by
a set of features among which we can include similarities and dissimilarities in
comparison to police intelligence. (Cope et al., 2009).
6
agencies, services, or units dedicated to it. Equally, the untenable, indissoluble,
interweaving of criminal intelligence into the sphere of policing as if an
intelligence service, the Armed Forces, or a private company versed in the field of
security, could not develop, apply, and circumscribe intelligence on the
phenomenon of organized crime, that is, criminal intelligence. This prefabricated
link can only be sustained by another one of the greatest misconceptions that hang
over criminal intelligence: that its ultimate goal can only be the arrest of criminals
(offenders) and, therefore, inevitably, their prosecution. Criminal intelligence, by
definition, is not abrogated to a particular entity but, depending on circumstances
(administrative and political), it may well be housed in intelligence, either in
police units, customs, prisons or even in military organizations. In this regard, one
can emphasize that the cross-sectional nature of the organized crime itself makes
the attribution of powers and competencies to a service or another by their
competence in the exterior or interior area of security lack any sort of sense.
Given the transnationalization of organized crime, the traditional distinction
between internal and external security loses its functionality, rapidly blurring the
boundaries when we refer to the activities run by criminal organizations. Criminal
intelligence operates equally at both poles of security. However, based on the
theoretical distribution of security powers among different state actors, internal
security has traditionally gone to the police forces, while the armed forces have
been responsible for external security. The theory, however, doesn't always
conform to reality (Mingardi, 2007).
7
knowledge pools and information requirements; the collectors get the required
information and they incorporate it into the shared repository of information about
the target; analysts extract usable intelligence and supply the users; and they, in
turn, can add their contributions about the target to the repository or insert new
information needs. Because the perspective that is focused on the intelligence
target is more interactive, it allows for better handling of complex problems like
organized crime, specific criminal markets, or activities. The key to success lies in
advancing two complementary and simultaneous lines of inquiry: understanding a
phenomenon while interacting with it through interventions that affect them
directly or modify its environment. That is the combination of criminal
intelligence with neutralization operations of police (criminal investigation) or
military nature, which disrupts the activities of organized crime under the prism
of target-focused intelligence. This represents a complex task, at least for now
(Martens, 1987).
8
appropriate plans and understated objectives, allowing us to acquire a deep
understanding of the etiology of crime and its phenomenology. Also, a good
criminal intelligence product not only establishes the current situation of the
phenomenon but also provides explanations for the existence of this phenomenon
and establishes possible developments or trends, defining possible or probable
scenarios. It also defines the viable alternatives to redirect the situation in the
most favorable way towards its eradication and control and establishes the
eventual social and economic costs resulting from the application of such
measures. Similarly, criminal intelligence stands out as an ideal tool for
developing security strategies to reorganize the procedures and instruments
available to governments to tackle crime and to help redefine the objectives in the
fight against organized crime: It establishes policies and plans to implement and
help reach the targets; to identify and understand the elements and factors
favoring the emergence and expansion of organized crime; pays attention to the
appearance of signs and the evolution of risk indicators to achieve early detection
before they materialize; and the discovery and identification of anything that
might represent a chance of success for organized crime (Strang, 2014).
9
advancing toward where we want it to go or simply advancing from where we can
manage it. The key does not lie in considering what we would like criminal
intelligence to be; rather, it lies in determining how far we want to exploit its
usefulness to seriously determine its future uses (Leong, 2016).
10
1.5. THE STUDY'S SCOPE
The time scope of the study will be the period from August 2022 up to
February 2023.
11
1.7. OPERATIONAL DEFINITION
Security refers to all the measures that are taken to protect a place or to ensure that only
people with permission enter or leave it.
Security strategies: a document prepared periodically that outlines the major security
concerns of a country or organization and outlines plans to deal with them.
Violent extremism describes the beliefs and actions of people who support or use
violence to achieve ideological, religious, or political goals. This includes terrorism,
other forms of politically motivated violence, and some forms of communal
violence. All forms of violent extremism, no matter what their motivation, seek
change through fear and intimidation rather than constructive democratic processes.
12
1.8. CONCEPTUAL FRAME
DV
IV
Law enforcement
13
CHAPTER TWO
LITERATURE REVIEW
2.1. INTRODUCTION
This chapter presents different kinds of literature related to determining the role of
intelligence work in the control of crime organized in Somalia. This literature has been
retrieved from various books, articles, journals, and studies related to the same problem at
hand. The literature will specifically focus on the concept of countering and preventing
terrorism, law enforcement, organized crime control, and terrorist attack prevention
strategies attacks.
14
Terrorists may invoke a wide range of political, philosophical, ideological,
racial, ethnic, religious, or other reasons to justify their actions. The OSCE (stands
for the Organization for Security and Co-operation in Europe) member states
categorically reject the association of terrorism with any "race," "nationality," or
religion. The OSCE member states categorically reject the association of
terrorism with any "race," "nationality," or religion. Misconceived policies and
actions targeting particular religious or belief communities can lead to increased
VERLT (Violent extremism and radicalization that lead to terrorism) through the
combined effect of injustice, stigmatization, and alienation. For example,
simplistic associations of items of dress or cultural manifestations with terrorism
(Gaibulloev & Sandler,2008).
The intelligence cycle is initiated by a clear task for the sake of developing
concrete intelligence products. The criminal intelligence process, however, is
conducted on several different levels and is often not limited to the intelligence
15
cycle. In addition to the cycle highlighted, there might be a need for a wider and
more constant process of strategically assessing intelligence requirements. This
ongoing assessment identifies extant and emerging threats and intelligence gaps
and is carried out per strategic priorities, policies, and goals. This process requires
a well-functioning and structured intelligence organization and Standard
Operating Procedures (SOPs) that enable the intelligence cycle to be fed with
information and that define the expected result of the cycle and its follow-up. The
strategic assessment of intelligence requirements as well as the criminal
intelligence cycle feed into the strategic planning process of a country, reflecting
national, regional, and local strategic priorities (Sternberg, 1997).
16
Criminal intelligence, as it is commonly operationalized, can provide
decision-makers and police chiefs with a snapshot of criminality and criminal
behavior. Crime analysis can provide police leaders with an understanding of
crime patterns and trends. Without this understanding of both crime patterns and
criminal behavior, people who have to make decisions that affect the safety and
security of communities will not have access to the vital, synthesized information
essential to good planning and strategy. For example, an intelligence unit may
have good information about a local group of offenders dealing with
methamphetamine. However, crime, However, crime analysis suggests that the
key problems in the area are vehicle crime and heroin. With a more complete
picture of the local criminal environment, the police executive can make a better
decision about the best use of resources for these competing priorities.
Alternatively, crime analysis might identify an area of a town where drug arrests
have increased. The intelligence officer for the drug unit can fill in the picture
with a description of a drug dealer who lives in that area and who has recently
been released from prison. Knowledge of individuals and offender behavior can
improve understanding of crime patterns and vice versa (Khan, 2012).
17
crime report and data collection system early on. A well-designed and well-
managed crime reporting system would provide a basis for the host state
authorities to obtain information on the occurrence of various types of crime,
enabling the police leadership to allocate resources more efficiently. Such a
system would also help the United Nations to assess the effectiveness of capacity-
building initiatives (Ratcliffe, 2007).
While analysts must ensure that sufficient data is collected to cover all
aspects of the topic(s) to be analyzed, they must also avoid data overload and the
collection of unnecessary or inadequate information. While analysts must ensure
that sufficient data is collected to cover all aspects of the topic(s) to be analyzed,
they must also avoid data overload and the collection of unnecessary or
inadequate information. The key to this phase is the intelligence staff's knowledge
of the existence, relevance, accessibility, and reliability of all sources and
agencies that are selected for a particular collection task, as well as knowledge of
any legal limitations and authorization requirements that apply to the use of
different types of information sources. Knowledge of and access to internal and
18
external data and information sources and awareness of potential limitations and
requirements are prerequisites for effective collection and intelligence analysis
(GJI & USA, 2005).
Interaction between the police and the public can provide an important
source of information for the intelligence process and guide the actions of the
police, both at the local and national levels. Members of the public can be
encouraged to share with the police their concerns in terms of personal and
community safety, exchange their perceptions of a specific crime issue, and report
any suspicious activity. Confidential mechanisms, such as anonymous telephone
lines, should be provided so that people may remain anonymous. However, efforts
in this regard should not exaggerate the nature of the danger or associate it with
particular groups, as it may be counterproductive and result in excessive reporting
about individuals belonging to certain groups and create distrust among
communities (Akram,2021).
19
followers. Tackling violent extremism as part of development interventions
reflects a broader international shift toward terrorism prevention and efforts to
address the environment that allows extremists to spread their ideologies and
recruit followers. While combating violent extremism through education is a
relatively new concept in international discourse, it has been piloted through
many national and international programs and policies (Silva, 2017).
On August 7, 2014, the U.S. began limited airstrikes against the Islamic
State in Iraq and the Levant (ISIL) militants who were threatening the Kurdish
capital of Erbil. Erbil. The airstrikes were intended to support Kurdish military
forces and to protect U.S. diplomats, military advisors, and civilians. In a brutal
response, ISIL beheaded captured American photojournalist James Foley, posting
a gruesome propaganda video on the internet with a warning of further revenge if
U.S. airstrikes continued. U.S. Defense Secretary Chuck Hagel characterized ISIL
as a long-term threat that would require a long-term strategy to combat it. The
emergence of extremist actors with violent political agendas, advanced weapons
and communications capabilities, religious or ideologically-based interests, long-
term strategies, and the willingness to confront powerful states through terrorism
20
and other asymmetric means and methods continues to threaten U.S. national
interests (Vinson, 2015).
21
cooperation, law enforcement agencies from different countries may cooperate or
coordinate on an informal level; in contrast, the same is true for intelligence
agencies. According to Bayer (2014), the benefit of informal cooperation is in the
joint interest of detaining criminals and in police being equally distanced from
major policymakers, foreign affairs officials, and intelligence personnel forming
the official liaison policies at the senior level (Dinev, 2014).
22
data and information (intelligence) from all levels, in compliance with national
legislation, international human rights standards, and OSCE commitments.
Intelligence-led policing (ILP) was developed as a response to these growing
challenges by inspiring and facilitating a proactive policing approach,
complementing the traditional, reactive policing model. It has proved to be an
effective tool to address organized crime, make better use of resources, and
identify and address priority tasks in a targeted manner. The proactive and future-
oriented approach of ILP facilitates crime prevention, reduction, disruption, and
dismantling. The key to the ILP approach is the systematic gathering and analysis
of information and data relevant to the prevention, reduction, and dismantling of
crime, followed by the development of intelligence reports. On this basis,
informed and forward-looking policy-making and managerial decisions can be
made and resources allocated to address the most pressing security concerns,
threats, crime types, and criminals. ILP has further proved to be an effective and
sustainable tool for countering terrorism and VERLT (Fafchamps & Moser,
2003).
23
in transnational crime activities as a source of organizational funding. It is no
surprise, then, those terrorist organizations are major players on the TOC (Theory
of Constraints) scene. However, policymakers and police leaders should have
realistic expectations about the results that community policing can deliver in
response to what is often a low-incidence, highly complex, and multidimensional
problem. Community policing cannot function as a stand-alone tool to prevent
terrorism and counter VERLT. It should be embedded in a comprehensive,
coherent, and human rights-compliant strategy to combat terrorism in all its forms
and manifestations and tackle conditions that are conducive (Dinev, 2014).
24
justice systems (Gaines & Kappeler, 2014).
Human rights norms are set out in international legal instruments and
standards such as binding treaties like the International Covenant on Civil and
Political Rights (ICCPR) and the Council of Europe Convention for the Protection
of Human Rights and Fundamental Freedoms. To give effect to the rights outlined
in these treaties, states must put in place a legal and institutional framework for
the realization of human rights at the domestic level. Within this framework, it is
among the main duties of the police to protect individuals from acts that
compromise their human rights, including those resulting from crime and
25
terrorism, and to respect these rights. In combating and preventing crime, the
police must operate within domestic law and international standards. As a
proactive form of policing, ILP must also be firmly grounded in the human rights
framework. It should increase the protection of the individual's rights and
freedoms and must be carried out in a manner that fully respects human rights,
which is in line with key principles of democratic policing (La Vigne, 2016).
Apart from the police and intelligence services, timely criminal intelligence
is also important for prosecutors in the performance of their duties. The
prosecution services usually rely on receiving analytical products from other
agencies. The investigations of organized crime groups operating in multiple
countries may naturally involve the use of modern surveillance techniques, assets,
26
or undercover officers. The dangers related to infiltrating and maintaining status
and reputation in transnational organized crime groups, as well as the ethical and
moral considerations, could cause the prevalence of SIGINT methods, including
interception of communication traffic going through satellites. Conversely,
Dandurand (2021) asserts that no international investigation can be launched
without the establishment of proper international cooperation among the
concerned entities. Conversely, Dandurand (2021) asserts that no international
investigation can be launched without the establishment of proper international
cooperation among the concerned entities. The antithesis is possible in cases of
covert or clandestine operations, sometimes through the utilization of paramilitary
units against highly armed and tactically sophisticated organized crime or terrorist
groups. Nonetheless, analogous actions carry legal and political risks that may
ensue in a diplomatic confrontation (Breitel, 1959).
27
intelligence agencies, the collection of intelligence on transnational organized
crime groups necessitates international cooperation. Compounding on the role of
international cooperation, the work of Wippl (2014) presents the idea of creating
an Intelligence Interpol for sharing international intelligence. The author asserts
that foreign intelligence services have more reasons to cooperate in the
operational field than their domestic counterparts (Dinev, 2014).
Analyses and policy reviews that substantiate the value of CVE programs
come from many respectable sources, each validating the need for law
enforcement to establish lines of communication and build trust in all
communities, especially diverse populations. The RAND Corporation, known for
contributing policy and meaningful national and international research, has
studied programs, published literature, and assessed case studies of the
Department of Homeland Security and its local partners. A recent 2018 study
from RAND, Practical Terrorism Prevention, was assembled by researchers with
specialized expertise in terrorism prevention policy and examines the current
status of CVE programs. Its findings reveal the importance of synthesizing police
activities with community input while developing and involving non-
governmental organizations and CVE practitioners from the state and local levels.
Progress has been made in the CVE field when partnerships are valued and
dedicated teams work together. The study also highlights the goal of effective
CVE policy, characterized as community-driven intervention programs and
strategies that aim to reduce the threat of localized acts of terrorism. The approach
is uncommon and represents a shift from traditional criminal investigative
methods of surveillance, arrest, and prosecution. Local-level community teams in
Minneapolis and Colorado, for example, are steering adolescents away from
negative influences and potential recruitment for political extremism (Wyckoff,
2020).
28
The Los Angeles Police Department and the New York City Police
Department are leading law enforcement agencies that embrace targeted violence
prevention through community policing in distinctive and dissimilar styles. A
close analysis of their community policing and targeted violence systems shed
light on the question of how police departments introduce and institutionalize
CVE and targeted violence prevention within the community policing model. A
comprehensive literature review regarding community policing strategies
generally demonstrates the synergy between the police and community members
when they work together toward safer communities. Not readily apparent,
however, are the specific internal and external modifications of the community
policing model when introducing and institutionalizing CVE. The comparative
research model helps to answer these questions and provides an opportunity to
identify (1) the strategies most needed to create CVE programs within the
community and (2) what kind of internal and external changes are needed by local
police to develop successful CVE programs (Breitel, 1960).
American police have their hands full when investigating serious crimes,
and despite professional-grade criminal investigations and contemporary
investigative techniques, most violent crimes go unsolved. Each year, American
law enforcement agencies voluntarily report hate crime data to the Department of
Justice for record-keeping purposes.. However, only 12% of U.S. law
enforcement agencies report that hate-motivated crimes occur within their
jurisdictions. With many crimes of the hate left undocumented, law enforcement
is left with no information upon which to base an investigation or intervention.
Over 90 American cities with populations greater than 100,000 reported to the
FBI that zero hate crimes occurred within their jurisdictions in a one-year
timeframe. FBI data on hate crimes is difficult to quantify, making it nearly
impossible to understand the true rates of these crimes in the country. Making
29
matters worse, hate crime statutes are inconsistent from state to state, and some
states have no hate crime ordinances whatsoever. Annual statistics about hate
crimes are submitted voluntarily to the FBI by police agencies around the country,
and for some states, only a small percentage of law enforcement agencies choose
to share data (Wyckoff, 2020).
30
ideologies, as well as from those whose attacks are not ideologically driven.
Domestic threat actors often plan and carry out their acts of violence alone and
with the little apparent warning, in ways that limit the effectiveness of traditional
law enforcement investigation and disruption methods. We must confront these
evolving challenges by building on existing best practices developed against
foreign terrorist threats, identifying promising new approaches, and developing a
strategic vision that provides a more holistic approach to preventing terrorism and
targeted violence that originates here at home. In an age of online radicalization,
violent extremism, and disparate threats, we must not only combat foreign
enemies attempting to strike us from abroad but also those enemies, both foreign
and domestic, who seek to incite violence among our youth and disaffected,
encouraging them to strike at the heart of our nation and attack the unity of our
vibrant, diverse American society (GJI & USA, 2005).
In January 2020, Somalia briefly made U.S. media headlines when three
U.S. security personnel (one service member and two department of defense
contractors) were killed in an attack by al-Shabaab on the Manda Bay naval base
in Kenya. This was the latest in a long string of al-Shabaab attacks, which
included a laptop bomb on a flight leaving Mogadishu in February 2016, a
massive truck bomb in central Mogadishu in October 2017, and attacks on
Nairobi's DusitD2 hotel in January 2019, as well as the US base at Baledogle in
September of that year. In a statement to the US Senate Armed Services
Committee shortly after the Manda Bay attack, General Townsend described al-
Shabaab as the largest and most kinetically active al-Qa'ida network in the world
and as being the most dangerous to U.S. interests today (Williams, 2020).
Apart from the number of airstrikes, U.S. policy on Somalia has been
broadly consistent in its strategic aims across several administrations. Since the
early 2000s, Washington has sought to help stabilize Somalia by working with a
31
variety of local and international partners, including Ethiopia, Uganda, Kenya, the
African Union (AU), the UN the European Union (EU), and various Somali
forces. Since the early 2000s, Washington has sought to help stabilize Somalia by
working with a variety of local and international partners, including Ethiopia,
Uganda, Kenya, the African Union (AU), the UN, the European Union (EU), and
various Somali forces. The plan has been to achieve U.S. national objectives by
building an effective set of Somali state institutions, including local security
forces, and using U.S. military power to help contain and degrade al-Shabaab.
However, this strategic goal has been frustrated by Washington's understandable
reluctance to pour large amounts of resources into Somalia's fragmented and
notoriously corrupt political system (Williams, 2020).
The National Criminal Intelligence Sharing Plan supports policies that will
protect the privacy and constitutional rights while not hindering the intelligence
process. When agencies are reviewing or formulating their policies, it may be
helpful to view the intelligence process as a series of discretionary decisions. At
each step, a decision must be made, usually involving a choice among several
possible alternatives. Consider, for example, how a criminal intelligence unit
might respond to an unsolicited, anonymous tip alleging that a particular
individual is engaged in criminal activity. Should the unit query various police
records systems to learn more about the suspect should they query commercial or
other public record databases? Should they conduct surveillance of the suspect or
should they disseminate the information to other law enforcement agencies to
learn more about the person? What kinds of additional records are created when
these actions are taken? And then, after those actions are taken, additional
decisions must be made regarding what to include, what to exclude, and how
much, if any, to store about the suspect in the criminal intelligence files.
Violations of privacy and constitutional rights may potentially occur when
32
choices are selected from these various alternatives. To be effective, a policy that
addresses the protection of individual privacy and constitutional rights should
attempt to eliminate unnecessary discretion in the decision-making process, guide
the necessary discretion, and continually audit the process to ensure conformance
with the policy goals (GJI & USA, 2005).
33
fore. Lethal anthrax spores were found to have contaminated mail, causing several
deaths. At the same time, awareness of the number of other sources of threats
increased. Concerns were raised about the vulnerability of critical infrastructure
(power plants, nuclear facilities, chemical factories, dams, bridges, pipelines, and
water supply). The threat of mega-terrorism has rose and colleagues, 2017).
In recent years, some major terrorist attacks in EU member states have put
the fight against homegrown and international terrorism at the top of the agendas
of European policymakers. This paper analyzes the costs of terrorism in the
European Union from both a theoretical and empirical perspective to evaluate
counter-terrorism policies by comparing their costs and benefits. Two important
policy implications can be derived from our exercise. First, individuals'
behavioral predispositions typically result in a biased perception of the risk of
terrorism, leading to too high a demand for counter-terrorism measures relative to
what the objective probability of terrorist events suggests. This results in a
tendency to favor repressive measures over preventive measures against terrorism.
Second, uncoordinated European policies against terrorism have the potential to
undermine the effectiveness of counter-terrorism measures. If there is a
justification for the existence of the European Union (which an increasing number
of populist parties in Europe seem to doubt), then it is to provide supranational
answers to coordination failure in European counter-terrorism policies (Krieger &
Meierrieks, 2019).
Terrorism can potentially affect economic growth in the short run through
some channels. Such attacks can increase uncertainty, which limits investments
and diverts foreign direct investment. For developing countries, foreign direct
investment is an important source of savings to fund investment. Terrorism
campaigns lead to government expenditures on defensive actions to strengthen
targets and proactive measures to capture terrorists and their assets. This increased
34
government spending on security can crowd out more growth-enhancing public
and private investments. Public investment in the form of social overhead capital
(e.g., canals, highways, and bridges) is especially important to bolster growth in
developing countries. Terrorism also hinders growth by raising the cost of doing
business in terms of higher wages, larger insurance premiums, and greater
security expenditures. These higher costs result in reduced profits and, thus,
smaller returns on investment. Terrorist attacks can also destroy infrastructure,
thereby leading to business disruptions. The Irish Republican Army attacks on
London's financial district at the Baltic Exchange (10 April 1992) and
Bishopsgate (24 April 1993) resulted in £800 million and £350 million in direct
damage, respectively. The July 7, 2005 attacks on the London transport system
resulted in over £1 billion in damage. Finally, terrorism can impact some key
industries—the airline, tourism, and export sectors—which can reduce gross
domestic product (GDP) and growth (Krieger & Meierrieks, 2019).
Following the attacks, primary insurers and reinsurers have hiked their
premiums and curtailed or dropped altogether coverage for terrorism-related risk.
The hikes in insurance premiums have hit several industries. The strongest impact
has been on aviation, but other sectors, including transportation, construction,
tourism, and energy generation, have also been affected. Overall, commercial
property and liability insurance rates are estimated to have increased by 30% on
average, with target structures such as chemical and power plants and iconic
office buildings seeing steeper increases. This should be viewed in the context of
a sharp decline in premium rates in the 1990s, which has only begun to reverse in
the case of reinsurance in 2000. This should be viewed in the context of a sharp
drop in premium rates in the 1990s, which had only recently begun to reverse in
the case of reinsurance. Even with the projected hikes, reinsurance rates should
remain well below the peaks reached in 1993, especially given the enhanced
35
competition in the industry, which limits the scope for further rate increases (Rose
et al., 2017).
36
CHAPTER THREE
METHODOLOGY
3.0. INTRODUCTION
This chapter will focus on the research design, research population, and
research instruments to be used for data gathering. It also will discuss the data
gathering procedure, data analysis, and ethical considerations as well as the
expected limitations of the study.
37
3.5. SAMPLE SIZE
A sample is part of the target (accessible) population that will be
procedurally selected to present it. The sample will consist of 80 participants.
participants. The sample size consisted of 80 to determine the best sample size for
the population, and the sample size for this study will be 80 respondents.
n = 400
1+400(0.1)2
=80
38
3.8. DATA GATHERING PROCEDURE
The respondents will be briefed about the study and will be asked to sign
the Informed Consent Form. Secondly, the respondents will be asked to answer
completely and not to leave any part of the questionnaire unanswered. The
researchers and assistants will emphasize the retrieval of the questionnaires within
five days from the date of distribution. Finally, the data gathered will be
organized, encoded into the computer, and statistically analyzed using the
Statistical Package for Social Scientists (SPSS) version 20.
The study will target the role of Intelligence work for the control of crime
organized in Somalia. Also, political experts, security experts, intelligence experts,
academics, and members of society
The exclusion from the study will be anyone who does not live in Somalia
and does not have any role in the study.
39
are supposed to measure and the data collected accurately represents the
respondent‗s opinions. To ensure validity, a pre-test will be conducted and the
questionnaire will be given to five research experts who will judge the relevance
of the questions to the objectives. Then, a content validity index, or CVI, will be
calculated. A pre-test will be done before the data collection to ensure the validity
of the questionnaire. Five questionnaires will be distributed to five research
experts who will be asked to vote on the validity of the tool. Then, the content
validity index will also be calculated. For the questionnaire to be accepted as
valid, the average CVI should be 70% or above (Amin,2005).
40
CHAPTER FOUR
4.0. INTRODUCTION
This chapter presents results, discussion and its interpretation. The data
study and interpretation was based on the research questions as well as research
objectives, the demonstration is divided in to two parts. The first part presents the
respondents profile or demographic information, while the second part deals with
analysis, interpretation and presentation of the research questions and objectives.
Below are the data presentations and analysis of research findings. The analysis,
interpretation and presentation of the data collected were accordance with the
main purpose of the study ―Role of Intelligence work for the control of crime
organized in Somalia. The analysis and presentation of the data was based on
research objectives and questions
41
Table 4.1.1.. What is your age of the respondent?
Frequency Percent Valid Percent Cumulative Percent
According to this table the majority of our respondent 35 (43.8%) were 40 50, followed by
25 (31.3%) were 29-38 of our respondents, also it followed by 11 (13.8%) were 18-28 of
our respondents while the minority of our respondent 9 (11.3%) were Above 50.
42
Table 4.1.2. What is your gender of the respondent?
Frequency Percent Valid Percent Cumulative Percent
Based on this table most of the respondent 69 (86.3%) were Male while the
minority of the respondent 11 (13.8%) were Female
43
Table 4.1.3. What is your marital status of the respondent?
Frequency Percent Valid Percent Cumulative Percent
According to this table the majority of the respondent 57 (71.3%) were married,
while the minority of the respondent 23 (28.8%) were single.
44
Table 4.1.4. What is your education level of the respondent?
Frequency Percent Valid Percent Cumulative
Percent
High School Degree 15 18.8 18.8 18.8
Bachelor Degree 30 37.5 37.5 56.3
Valid Master Degree 26 32.5 32.5 88.8
Others 9 11.3 11.3 100.0
Total 80 100.0 100.0
According to this table on the above 4.1.4. The most respondents 30 (37.5%) were
Bachelor degree, followed by 26 (32.5%) were Master, also it followed by 15
(18.8%) were high school level while 9 (11.3%) were others
45
Table 4.1.5. What is your occupation of the respondent?
Frequency Percent Valid Percent Cumulative Percent
46
4.2. Section two: Role of Intelligence work for the control of crime
organized in Somalia
Table 4.2.1. Intelligence is the backbone of law enforcement as a strategic tool for preventing
crime in order to identify suspects, detect crime, direct operational activities, protect the
weak, locate the missing, and apprehend offenders.
This table shows that most of the respondents 74 (92.5%) were Agreed that
Intelligence is the backbone of law enforcement as a strategic tool for preventing
crime in order to identify suspects, detect crime, direct operational activities,
protect the weak, locate the missing, and apprehend offenders, while the minority
of the respondents 6 (7.5%) were Neutral
Figure 4.2.1.Intelligence is the backbone of law enforcement as a strategic tool for preventing crime
in order to identify suspects, detect crime, direct operational activities, protect the weak, locate the
missing, and apprehend offenders.
47
Table 4.2.2. Intelligence gives law enforcement officials the information to analyze and select
the most suitable criminal risks.
Frequency Percent Valid Percent Cumulative Percent
Based on this table the majority of the respondent 63 (78.8%) were Agreed that
Intelligence gives law enforcement officials the information to analyze and select
the most suitable criminal risks while the minority of the respondent 17 (21.3%)
were Neutral
Figure 4.2.2.Intelligence gives law enforcement officials the information to analyze and select
the most suitable criminal risks.
48
Table 4.2.3 Intelligence helps people avoid wasting time and effort on unrelated tasks.
Frequency Percent Valid Percent Cumulative Percent
According to this table most of the respondent 60 (75%) were Agreed that
Intelligence helps people avoid wasting time and effort on unrelated tasks, it
followed by 13 (16.3%) were Neutral, while the minority of the respondent 7
(8.8%) were Dis-agreed
Figure 4.2.3.Intelligence helps people avoid wasting time and effort on unrelated tasks.
49
Table 4.2.4. Whether it's before or after a terrorist attack, intelligence is essential in
preventing terrorist attacks from happening and helping law enforcement officials catch
suspects.
Frequency Percent Valid Percent Cumulative Percent
Table 4.2.4. Shows that the majority of the respondent 72 (90%) were Agreed
Whether it's before or after a terrorist attack, intelligence is essential in preventing
terrorist attacks from happening and helping law enforcement officials catch
suspects, while the minority of the respondent 8 (10%) were Neutral.
50
Table 4.2.5. The targeting of available resources and the identification of information gaps
made possible by intelligence analysis help investigations by sharpening their focus.
This table shows that the most of the respondents 57 (71.3%) were Agreed that
the targeting of available resources and the identification of information gaps
made possible by intelligence analysis help investigations by sharpening their
focus, while the minority of the respondent 23 (28.8%) were Neutral
Figure 4.2.5.The targeting of available resources and the identification of information gaps
made possible by intelligence analysis help investigations by sharpening their focus.
51
Table 4.2.6. Criminal intelligence analysis helps law enforcement agencies create a pro-
active approach to fighting crime.
Frequency Percent Valid Percent Cumulative Percent
This table shows that most of the respondents 77 (96.3%) were Agreed that the
criminal intelligence analysis helps law enforcement agencies create a pro-active
approach to fighting crime, while the minority of the respondent 3 (3.8%) were
Neutral
Figure 4.2.6.Criminal intelligence analysis helps law enforcement agencies create a pro-
active approach to fighting crime.
52
Table 4.2.7. Law enforcement agencies respond to investigate and prevent crime.
Based on this table all the respondents 80 (100%) were Agreed that Law
enforcement agencies respond to investigate and prevent crime.
53
Table 4.2.8. Law enforcement organizations are in charge of enforcing laws, maintaining
peace, and protecting public safety.
According to this table most of the respondent 75 (93.8%) were Agreed that law
enforcement organizations are in charge of enforcing laws, maintaining peace,
and protecting public safety, while the minority of the respondent 5 (6.3%) were
Dis-agreed
54
Table 4.2.9. Community policing is a technique for reducing crime that strives to be
more effective.
Frequency Percent Valid Percent Cumulative Percent
Table 4.2.9.. Shows that the majority of the respondent 48 (60%) were Agreed
that community policing is a technique for reducing crime that strives to be more
effective while the minority of the respondent 32 (40%) were Neutral.
Figure 4.2.9.Community policing is a technique for reducing crime that strives to be more
effective.
55
Table 4.2.10. Fighting against organized crime is high on the political agenda of the
present government.
Frequency Percent Valid Percent Cumulative Percent
According to this table all the respondents 80 (100%) were Agreed that fighting
against organized crime is high on the political agenda of the present government.
Figure 4.2.10.Fighting against organized crime is high on the political agenda of the
present government.
56
Table 4.2.11. The police and security forces place a strong priority on combating
organized crime.
Frequency Percent Valid Percent Cumulative Percent
This table Indicates that the majority of the respondent 64 (80%) were Agreed
that the police and security forces place a strong priority on combating organized
crime., it followed by 11 (13.8%) were Neutral while the minority of the
respondents 5 (6.3%) were Dis-agreed
Figure 4.2.11.The police and security forces place a strong priority on combating
organized crime.
57
Table 4.2.12. Terrorism directly affects human rights, with consequences for the
enjoyment of the right to life.
Frequency Percent Valid Percent Cumulative Percent
According to this table all the respondents 80 (100%) were Agreed that Terrorism
directly affects human rights, with consequences for the enjoyment of the right to
life.
58
Table 4.2.13. Challenge the ideology that underlies terrorism and those who support it in
order to reduce its capacity.
Frequency Percent Valid Percent Cumulative Percent
Based on this table the majority of the respondent 39 (48.8%) were Agreed that
Challenge the ideology that underlies terrorism and those who support it in order
to reduce its capacity, it followed by 30 (37.5%) were Neutral while the minority
of the respondent 11 (13.8 %) were Dis-agreed
Figure 4.2.13.Challenge the ideology that underlies terrorism and those who
support it in order to reduce its capacity
59
Table 4.2.14. Detecting explosives and other types of weaponry it is one of the most
successful tactics for preventing terrorist attacks.
Frequency Percent Valid Percent Cumulative Percent
Table 4.2.14. Shows that the most of respondent 43 (53.8%) were Agreed
Detecting explosives and other types of weaponry it is one of the most successful
tactics for preventing terrorist attacks, it followed by 30 (37.5%) were Neutral
while the minority of the respondent 7 (8.8%) were Dis-agreed.
60
Table 4.2.15. Preventing vulnerable people from becoming involved in terrorism by
providing them with the right guidance and encouragement
Frequency Percent Valid Percent Cumulative Percent
This table Indicates that the majority of the respondent 53 (66.3%) were Agreed
that Preventing vulnerable people from becoming involved in terrorism by
providing them with the right guidance and encouragement, it followed by 19
(23.8%) while the minority of the respondents 8 (10%) were Neutral some others
were Dis-agreed
61
4.3. Result and Discussion
The main findings of this study, after data analysis and interpretation, allow
researchers Role of Intelligence work for the control of crime organized in
Somalia.
62
analysis helps law enforcement agencies create a pro-active approach to fighting
crime, while the minority of the respondent 3 (3.8%) were Neutral. Although all
the respondents 80 (100%) were Agreed that Law enforcement agencies respond
to investigate and prevent crime.
63
strategy commonly referred to as ―stop and frisk, which conflates the two legally
separate actions of stopping and frisking individuals into one combined tactic.
This intensive, place- and people-based use of police stop, question, frisk, and
search powers has sparked widespread debate on its legality and fairness, as
evidenced by protests, lawsuits, and media coverage on the topic, especially in
New York City (Gaines& Kappeler, 2014)
64
criminal behavior, people who have to make decisions that affect the safety and
security of communities will not have access to the vital, synthesized information
essential to good planning and strategy. For example, an intelligence unit may
have good information about a local group of offenders dealing in
methamphetamine. Crime analysis, however, suggests that the key problems in
the area are vehicle crime and heroin. With a more complete picture of the local
criminal environment, the police executive can make a better decision about the
best use of resources for these competing priorities. Alternatively, crime analysis
might identify an area of a town where drug arrests have increased. The
intelligence officer for the drug unit can fill in the picture with a description of a
drug dealer who lives in that area and who has recently been released from prison.
Knowledge of individuals and offender behavior can improve understanding of
crime patterns and vice versa (Khan, 2012)
The third objective of our research was to explain the role of National
Intelligence for the prevention strategies of terrorist attacks in Somalia, and
researchers found that the most of the respondent 60 (75%) were Agreed that
Intelligence helps people avoid wasting time and effort on unrelated tasks, it
followed by 13 (16.3%) were Neutral, while the minority of the respondent 7
(8.8%) were Dis-agreed. Also most of the respondents 57 (71.3%) were Agreed
that the targeting of available resources and the identification of information gaps
made possible by intelligence analysis help investigations by sharpening their
focus, while the minority of the respondent 23 (28.8%) were Neutral. Even all the
respondents 80 (100%) were Agreed that Terrorism directly affects human rights,
with consequences for the enjoyment of the right to life. It also the majority of the
respondent 39 (48.8%) were Agreed that Challenge the ideology that underlies
terrorism and those who support it in order to reduce its capacity, it followed by
30 (37.5%) were Neutral while the minority of the respondent 11 (13.8 %) were
65
Dis-agreed. Although most of respondent 43 (53.8%) were Agreed Detecting
explosives and other types of weaponry it is one of the most successful tactics for
preventing terrorist attacks, it followed by 30 (37.5%) were Neutral while the
minority of the respondent 7 (8.8%) were Dis-agreed. The majority of the
respondent 53 (66.3%) were Agreed that Preventing vulnerable people from
becoming involved in terrorism by providing them with the right guidance and
encouragement, it followed by 19 (23.8%) while the minority of the respondents
8 (10%) were Neutral some others were Dis-agreed
Terror and terrorism can lead to a substantial loss for the economy of the
country. These losses are mainly due to uncertainties brought about by the
confidence lost with terrorism and transferring a significant portion of the
country‗s resources to military expenditure. On the other hand, terrorist can also
target directly key sectors of economics. These results suggest that the purpose of
terrorism, which aims to achieve political and economic demands of the
illegitimate way, is a clear indication of the government to intimidate and create
fear and horror in the society. In other words, the purposes of terrorism reach a
political goal by creating a pressure on political authority and digesting public
interest through violence (Çinar, 2017)
66
CHAPTER FIVE
5.1. INTRODUCTION
After collecting data through questionnaire survey, the data were analyzed.
The results are discussed in the following subsections. This chapter was discuss
the findings of the study as presented in chapter four.
decision makers and police chiefs with a snapshot of criminality and criminal
crime patterns and trends. Without this understanding of both crime patterns and
criminal behavior, people who have to make decisions that affect the safety and
security of communities will not have access to the vital, synthesized information
essential to good planning and strategy. For example, an intelligence unit may
the area are vehicle crime and heroin. With a more complete picture of the local
67
criminal environment, the police executive can make a better decision about the
best use of resources for these competing priorities. Alternatively, crime analysis
might identify an area of a town where drug arrests have increased. The
intelligence officer for the drug unit can fill in the picture with a description of a
drug dealer who lives in that area and who has recently been released from prison.
Apart from the police and intelligence services, timely criminal intelligence
as the ethical and moral considerations, could cause the prevalence of SIGINT
68
covert or clandestine operations, sometimes through the utilization of paramilitary
units against highly armed and tactically sophisticated organized crime or terrorist
groups. Nonetheless, analogous actions carry legal and political risks that may
quantitative and cross sectional in nature the target population of our Research
was the political experts, security experts, intelligence experts, students, and
members of society, the sample size of our study was 80 respondents. Closed
questionnaire was used to collect research data. Respondents were briefed about
the study and its objective. The content of the questionnaire was explained for
them and was also requested to answer the questions as honest as possible.
Somalia the researcher found that the majority of the respondent 48 (60%) were
Agreed that community policing is a technique for reducing crime that strives to
be more effective while the minority of the respondent 32 (40%) were Neutral.
Also most of the respondent 64 (80%) were Agreed that the police and security
(13.8%) were Neutral while the minority of the respondents 5 (6.3%) were Dis-
agreed. Even all the respondents 80 (100%) were Agreed that fighting against
69
organized crime is high on the political agenda of the present government. It also
most of the respondents 77 (96.3%) were Agreed that the criminal intelligence
crime, while the minority of the respondent 3 (3.8%) were Neutral. Although all
the respondents 80 (100%) were Agreed that Law enforcement agencies respond
found that most of the respondents 74 (92.5%) were Agreed that Intelligence is
the backbone of law enforcement as a strategic tool for preventing crime in order
to identify suspects, detect crime, direct operational activities, protect the weak,
locate the missing, and apprehend offenders, while the minority of the
(78.8%) were Agreed that Intelligence gives law enforcement officials the
information to analyze and select the most suitable criminal risks while the
respondent 72 (90%) were Agreed Whether it's before or after a terrorist attack,
law enforcement officials catch suspects, while the minority of the respondent 8
(10%) were Neutral. Also most of the respondent 75 (93.8%) were Agreed that
70
peace, and protecting public safety, while the minority of the respondent 5 (6.3%)
were Dis-agreed
The third objective of our research was to explain the role of National
researchers found that the most of the respondent 60 (75%) were Agreed that
Intelligence helps people avoid wasting time and effort on unrelated tasks, it
(8.8%) were Dis-agreed. Also most of the respondents 57 (71.3%) were Agreed
that the targeting of available resources and the identification of information gaps
focus, while the minority of the respondent 23 (28.8%) were Neutral. Even all the
respondents 80 (100%) were Agreed that Terrorism directly affects human rights,
with consequences for the enjoyment of the right to life. It also the majority of the
respondent 39 (48.8%) were Agreed that Challenge the ideology that underlies
terrorism and those who support it in order to reduce its capacity, it followed by
30 (37.5%) were Neutral while the minority of the respondent 11 (13.8 %) were
explosives and other types of weaponry it is one of the most successful tactics for
71
becoming involved in terrorism by providing them with the right guidance and
5.3. RECOMENDATIONS
Based on the findings of the study, the following are strongly recommended
to improve the following actions:
crime investigations.
The government must fight corruption through its organized crime investigation
operations.
To reduce the prevalence of organized crime, the law must be strictly enforced.
The state police must be strengthened to prevent terrorism and organized crime
72
APPENDIX
REFERENCES
Akram, Q., Afzal, F., & Siddique, A. (2021). Terrorism and Counter Terrorism in
Africa: A Case Study of Boko Haram and Al-Qaeda in Nigeria. Pakistan Journal
of International Affairs, 4(3).
Çinar, M. (2017). The effects of terrorism on economic growth: Panel data approach.
Zbornik radova Ekonomskog fakulteta u Rijeci: časopis za ekonomsku teoriju i
praksu, 35(1), 97-131.
Fafchamps, M., & Moser, C. (2003). Crime, isolation and law enforcement. Journal of
African economies, 12(4), 625-671.
Gaibulloev, K., & Sandler, T. (2008). The impact of terrorism and conflicts on growth
in Asia, 1970–2004.
73
Gottschalk, P. (2009). Policing organized crime: intelligence strategy implementation.
Crc Press.
Innes, M., Fielding, N., & Cope, N. (2005). ‗The Appliance of Science?‘ The Theory
and Practice of Crime Intelligence Analysis. British journal of criminology, 45(1),
39-57.
Khan, Z., Ludlow, D., McClatchey, R., & Anjum, A. (2012). An architecture for
integrated intelligence in urban management using cloud computing. Journal of
Cloud Computing: Advances, Systems and Applications, 1(1), 1-14.
Krieger, T., & Meierrieks, D. (2019). The economic consequences of terrorism for the
European Union. Published as: Krieger, Tim, 87-108.
La Vigne, N. G., Lachman, P., Rao, S., & Matthews, A. (2016). Stop and frisk:
Balancing crime control with community relations.
Levi, M. (1998). Perspectives on organised crime: an overview. How. J. Crim. Just., 37,
335.
Mingardi, G. (2007). The role of Intelligence work in the control of Organized Crime.
estudos avançados, 21, 51-69..
74
Ratcliffe, J. H. (2010). Intelligence-led policing: Anticipating risk and influencing
action. Intelligence, 1(1), 1-12.
Rose, A., Avetisyan, M., Rosoff, H., Burns, W. J., Slovic, P., & Chan, O. (2017). The
role of behavioral responses in the total economic consequences of terrorist
attacks on US air travel targets. Risk analysis, 37(7), 1403-1418.
Sternberg, R. J. (1997). The concept of intelligence and its role in lifelong learning and
success. American psychologist, 52(10), 1030.
75
QUASTIONAIRE
Dear Respondents
You are kindly requested to sacrifice a few minutes of your valuable time
and fill up this questionnaire. This research is for academic purpose and any
information you give wasbe treated with us most confidentiality. Thank you for
your participation.
D) Above 50 ( )
76
2. What is your gender?
A) Male. ( ) B) Female ( )
A) Single ( ) B) Married ( )
77
Part Two: Please Tick (√) The One Which Represents Your Opinion In
These Statements By Using These Terms Of Scale:
1. Agree 2. Neutral 4. Disagree
2. Intelligence gives law enforcement officials the information to analyze and select the
most suitable criminal risks.
3. Intelligence helps people avoid wasting time and effort on unrelated tasks.
5. The targeting of available resources and the identification of information gaps made
possible by intelligence analysis help investigations by sharpening their focus.
78
8. Law enforcement organizations are in charge of enforcing laws, maintaining peace,
and protecting public safety.
10. Fighting against organized crime is high on the political agenda of the present
government.
11. The police and security forces place a strong priority on combating organized crime.
12. Terrorism directly affects human rights, with consequences for the enjoyment of the
right to life.
13. Challenge the ideology that underlies terrorism and those who support it in order to
reduce its capacity.
14. Detecting explosives and other types of weaponry it is one of the most successful
tactics for preventing terrorist attacks.
79
Budget Frame Work
Tasks Costs
$ 40
Materials.
$50
Transportation
Network $35
Total $150
80