Dynamics hindering efficiency of social media intelligence in countering criminality in Kenya

Authors

  • Mutai Kiplagat The Global Centre for Policy and Strategy Author
  • Juliet Kamau Author
  • Irene Mukiri Mwingirwa Kenyatta University Author

Keywords:

social media intelligence, traditional collection methods, criminality, organised crimes, terrorism, government security agencies, social media platforms, bureaucracies, virtual realms

Abstract

Social media sites provide a haven for criminals. This threatens national security, hence the need for effective counter strategies. Despite the criminals' shifting to social media platforms, government security agencies remain slow in adopting emerging technologies and rely more on traditional intelligence collection methods, which fall short of capturing what occurs in the virtual world. The foregoing informed this research study on the dynamics hindering the efficiency of social media intelligence in countering criminality in Kenya. The objective was to determine the challenges that affect the efficiency of social media intelligence in countering online crimes in Kenya. The research applied technology acceptance theory to expound on the utilisation of social media platforms by criminals and subsequent challenges of counter-measures by government security agencies. The study applied a descriptive research design targeting government security agencies dealing with online countering of organised crimes and terrorism. The study established that existing challenges include criminal use of fake identities, secure applications, inadequate technical support and skills, weak legal frameworks, existing social media corporation bureaucracies, identification problems in virtual realms and technological adoption challenges. In conclusion, social media threats are cross-cutting and the emergence of many social media applications requires government security agencies to utilise all sources of information to mitigate strategic surprises. As a result, the research recommends enhancing the capabilities and capacity building of online investigation officers; investing more in research and innovation; enhancing information sharing and collaboration among key stakeholders; and formulating stringent measures.

Author Biographies

  • Mutai Kiplagat, The Global Centre for Policy and Strategy

    Mutai Kiplagat is a Research Associate at the Global Centre for Policy and Strategy, Kenya. He holds an MA in Strategic Studies from the National Defense University – Kenya, and a BEng in Mechanical and Production Engineering from Moi University, Kenya. His research focuses on threats and opportunities emanating from the intersection of emerging technologies, geopolitical dynamics, and conflicts in the Horn of Africa.

  • Juliet Kamau

    Dr. Juliet Kamau is an independent security consultant with over 15 years of experience. She holds a PhD and a BA from the United States International University-Africa, as well as an MA in International Political Economy from the University of Warwick in the UK. Her academic interests lie in Salafi-Jihadism, counterterrorism, Preventing/Countering Violent Extremism (P/CVE), and the emerging collusion between organised criminal gangs and jihadists along the Kenyan coast.

  • Irene Mukiri Mwingirwa, Kenyatta University

    Dr. Irene Mukiri Mwingirwa is an education and research specialist with over 15 years of experience in academia. She holds a Master’s degree and a Doctoral degree in Mathematics Education from Kenyatta University, with a research focus on technology and mathematics. Her other research areas of interest include the nexus between technology and security, data analytics, and using technology as a problem-solving agent.

References

Almadhoor, L., Alserhani, F., & Humayun, M. (2021). Social Media and Cybercrimes. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2972–2981. https://turcomat.org/index.php/turkbilmat/article/view/4947

Amber, J. (2023). Cyberattack in Kenya impacts online government platforms. Cyber Magazine. https://cybermagazine.com/application-security/cyberattack-in-kenya-impacts-online-government-platforms

Ates, A. (2020). Current Challenges and Trends in Intelligence. Güvenlik Bilimleri Dergisi, 9(1), 177–204. https://doi.org/10.28956/gbd.736153

Barnea, A. (2019). Big data and counterintelligence in Western countries. International Journal of Intelligence and Counterintelligence, 32(3), 433–447. https://doi.org/10.1080/08850607.2019.1605804

Bartlett, J., & Reynolds, L. (2015). Social media intelligence capabilities for counter-terrorism. State of the Art 2015, 1–97.

Claudia, J. (2021). Use of the Internet, other cyber and digital platforms as well as digital devices to support and commit acts of terrorism in Eastern Africa. United Nations Offi ce on Drugs and Crime, 1–36.

Cox, K., Marcellino, W., Bellasio, J., Ward, A., Galai, K., Meranto, S., & Paoli, G. P. (2018). Social media in Africa: A double-edged sword for security and development. United Nations Development Programme (UNDP).

Creswell, J. W. (2014). Research Design-Qualitative, Quantitative and Mixed Methods Approaches (V. Knight, J. Young, K. Koscielak, B. Bauhaus, & M. Markanich (eds.); 4th ed.). SAGE Publications Ltd.

Dahlman, C. (2007). Technology, globalization, and international competitiveness: Challenges for developing countries. In O’Connor and M Kjöllerström (Ed.), Industrial Development for the 21st Century (Hyderabad: Orient Longman, Zed Books, and United Nations), 29–83. http://books.google.com/books?hl=en&lr=&id=DQGy1e9dv_YC&oi=fnd&pg=PA29&dq=Technology+,+globalization+,+and+international+competitiveness+:+Challenges+for+developing+countries&ots=RnSF1-vXf4&sig=JrefsCx8cPkyqOUlfK3KAHzRu8g

Davies, G. (2020). Shining a light on policing of the Dark Web: An analysis of UK investigatory powers. Journal of Criminal Law, 84(5), 407–426. https://doi.org/10.1177/0022018320952557

Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. Massachusetts Institute of Technology. https://doi.org/10.1126/science.146.3652.1648

Dencik, L., Hintz, A., & Carey, Z. (2018). Prediction, pre-emption, and limits to dissent: Social media and big data use for policing protests in the United Kingdom. New Media and Society, 20(4), 1433–1450. https://doi.org/10.1177/1461444817697722

Farzindar, A., & Inkpen, D. (2015). Natural language processing for social media. Synthesis Lectures on Human Language Technologies. https://doi.org/10.2200/S00659ED1V01Y201508HLT030

Finklea, K. (2017). Dark Web. Congressional Research Service. https://doi.org/10.4018/978-1-7998-5567-5.ch024

Grizāne, A., Isupova, M., & Vorteil, V. (2022). Social media monitoring tools: An in-depth look. NATO Strategic Communications Centre of Excellence. http://blog.namics.com/2010/05/social-media-monitoring-tools2.html

Gundechahuan, P., & Liu, H. (2014). Mining social media: A brief introduction. Informs Tutorials in Operations Research 2012., November 2018, 1–17. https://pubsonline.informs.org/doi/10.1287/educ.1120.0105

Hossain, M. S. (2018). Social media and terrorism: Threats and challenges to the modern era. South Asian Survey, 22(2), 136–155. https://doi.org/10.1177/0971523117753280

Johnson. (2010). The Oxford Handbook of National Security Intelligence. Oxford University Press, Inc198 Madison Avenue, New York, New York 10016 www.oup.com.

Kimutai, J. K. (2014). Social media and national security threats: A case study of Kenya. In [Masters Thesis, University of Nairobi].

Kothari, C. R. (2011). Research Methodology Methods and Techniques. New Age International, New Delhi. https://doi.org/10.4236/ajibm.2014.412080

Kumar, R. (2022). Social Media a Tool for Terror. National Security Law & Policy. https://jnslp.com/2022/09/16/social-media-a-tool-for-terror/

Liaropoulos, A. N. (2013). The challenges of social media for the Intelligence Community. Journal of Mediterranean and Balkan Intelligence, 1(1), 5–14. https://www.researchgate.net

Maltego. (2022). Understanding the different types of Intelligence Collection Disciplines. https://www.maltego.com

Mary, S., Usha, S., Bobby, Syiemlieh, P., & Mary Khongsit, G. (2015). Phishing is an analysis of the types, causes, preventive measures, and case studies. Computer Engineering. https://www.iosrjournals.org

Mbithi, J. V. (2022). Impact of Social Media on National Security in Kenya. In Post Graduate Diploma Project from the University of Nairobi.

Montasari, R. (2022). Artificial Intelligence and National Security. In Artificial Intelligence and National Security. https://doi.org/10.1007/978-3-03106709-9

Mugenda, O. M., & Mugenda, A. G. (2019). Research Methods: Quantitative, Qualitative & Mixed Methods Approaches (Third). Centre for Innovative Leadership & Governance.

NAAG. (2019). Overcoming Hurdles to Secure Evidence from Social Media Companies in Cybercrime Investigations and Prosecutions - National Association of Attorneys General. National Association of Attorneys General. https://www.naag.org/attorney-general-journal/overcominghurdles-to-secure-evidence-from-social-media-companies-in-cybercrime-investigations-and-prosecutions/

Nadeem, S., & Mohamed, F. (2017). Ransomware-Threats, Vulnerabilities And Recommendations. International Journal of Scientifi c & Technology Research, 6(06), 307–309.

Njoroge, A. W. (2020). Intelligence aspects of big data analytics for Kenya’s national security.

Odhiambo, E., Maito, T., Kassilly, J., Chelumo, S., Onkware, K., & Oboka, W. (2013). Al-Shabaab terrorists propaganda and the Kenya government response. International Journal of Humanities and Social Science, 3(7), 125–131. https://www.scirp.org

Olasya, D. P. (2018). Assessing the impacts of social media on national security in Kenya. The University of Nairobi.

Omand, D., Bartlett, J., & Miller, C. (2012). Introducing social media intelligence (SOCMINT). Intelligence and National Security, 27(6), 801–823. https://doi.org/10.1080/02684527.2012.716965

Ombati, C. (2022). 10 social media users were arrested for impersonating senior officials. https://www.the-star.co.ke/news/2022-11-04-10-social-mediausers-arrested-for-impersonating-senior-officials

Pantucci, R. (2020). A View from the CT Foxhole: Jonathan Evans, Former Director General, MI5. CTC Sentinel, 13(3), 9–15. www.ctc.usma.edu/sentinel/

Ravitch, S., & Carl, N. (2021). Conceptual Frameworks in Research. Qualitative Research: Bridging the Conceptual, Theoretical, and Methodological, 32–61.

Saleous, H., Ismail, M., AlDaajeh, S. H., Madathil, N., Alrabaee, S., Choo, K. K. R., & Al-Qirim, N. (2023). COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. Digital Communications and Networks, 9(1), 211–222. https://doi.org/10.1016/j.dcan.2022.06.005

Smith, M. A., Shneiderman, B., Milic-Frayling, N., Rodrigues, E. M., Barash, V., Dunne, C., Capone, T., Adam, P., & Gleave, E. (2015). Social media analysing networks with NodeXL . Reputation Management: The Key to Successful Public Relations and Corporate Communication, 126–152. https://doi.org/10.4324/9781315879987-12

Stegen, J. I. (2019). Social Media Intelligence (SOCMINT) within the South African context: A theoretical and strategic framework for the national security environment Prof A Duvenhage Co-promoter: Prof MN Wiggill. May.

Taherdoost, H. (2018). A review of technology acceptance and adoption models and theories. Procedia Manufacturing, 22, 960–967. https://doi.org/10.1016/j.promfg.2018.03.137

Tariq, R. S., & Irshad, S. (2018). Identity Theft and Social Media. IJCSNS International Journal of Computer Science and Network Security, 18(1), 43. https://www.researchgate.net/publication/323185128

Thukral, P., & Kainya, V. (2022). How social media infl uence crimes. Indian Journal of Law and Legal Research, IV(II).

UNICRI, & UNCCT. (2021). Countering Terrorism Online with Artifi cial Intelligence. An Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia.

Weimann, G. (2018). Science & Technology Terrorist Migration to Social Media. Georgetown University Press, 16(1), 180–187.

Weimann, G., & Vellante, A. (2021). The Dead Drops Of Online Terrorism: How Jihadists Use Anonymous Online Platforms. Perspectives on Terrorism, 15(4), 39–53.

Yamane, T. (1967). Statistics: An Introductory Analysis, 2nd Edition, New York: Harper and Row.

Downloads

Published

2025-02-05

Issue

Section

Articles

How to Cite

Dynamics hindering efficiency of social media intelligence in countering criminality in Kenya. (2025). The Eastern Africa Journal of Policy and Strategy, 1(1), 67-87. https://press.gloceps.org/index.php/eajps/article/view/9

Similar Articles

1-10 of 17

You may also start an advanced similarity search for this article.