Dynamics hindering efficiency of social media intelligence in countering criminality in Kenya
Keywords:
social media intelligence, traditional collection methods, criminality, organised crimes, terrorism, government security agencies, social media platforms, bureaucracies, virtual realmsAbstract
Social media sites provide a haven for criminals. This threatens national security, hence the need for effective counter strategies. Despite the criminals' shifting to social media platforms, government security agencies remain slow in adopting emerging technologies and rely more on traditional intelligence collection methods, which fall short of capturing what occurs in the virtual world. The foregoing informed this research study on the dynamics hindering the efficiency of social media intelligence in countering criminality in Kenya. The objective was to determine the challenges that affect the efficiency of social media intelligence in countering online crimes in Kenya. The research applied technology acceptance theory to expound on the utilisation of social media platforms by criminals and subsequent challenges of counter-measures by government security agencies. The study applied a descriptive research design targeting government security agencies dealing with online countering of organised crimes and terrorism. The study established that existing challenges include criminal use of fake identities, secure applications, inadequate technical support and skills, weak legal frameworks, existing social media corporation bureaucracies, identification problems in virtual realms and technological adoption challenges. In conclusion, social media threats are cross-cutting and the emergence of many social media applications requires government security agencies to utilise all sources of information to mitigate strategic surprises. As a result, the research recommends enhancing the capabilities and capacity building of online investigation officers; investing more in research and innovation; enhancing information sharing and collaboration among key stakeholders; and formulating stringent measures.
References
Almadhoor, L., Alserhani, F., & Humayun, M. (2021). Social Media and Cybercrimes. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), 2972–2981. https://turcomat.org/index.php/turkbilmat/article/view/4947
Amber, J. (2023). Cyberattack in Kenya impacts online government platforms. Cyber Magazine. https://cybermagazine.com/application-security/cyberattack-in-kenya-impacts-online-government-platforms
Ates, A. (2020). Current Challenges and Trends in Intelligence. Güvenlik Bilimleri Dergisi, 9(1), 177–204. https://doi.org/10.28956/gbd.736153
Barnea, A. (2019). Big data and counterintelligence in Western countries. International Journal of Intelligence and Counterintelligence, 32(3), 433–447. https://doi.org/10.1080/08850607.2019.1605804
Bartlett, J., & Reynolds, L. (2015). Social media intelligence capabilities for counter-terrorism. State of the Art 2015, 1–97.
Claudia, J. (2021). Use of the Internet, other cyber and digital platforms as well as digital devices to support and commit acts of terrorism in Eastern Africa. United Nations Offi ce on Drugs and Crime, 1–36.
Cox, K., Marcellino, W., Bellasio, J., Ward, A., Galai, K., Meranto, S., & Paoli, G. P. (2018). Social media in Africa: A double-edged sword for security and development. United Nations Development Programme (UNDP).
Creswell, J. W. (2014). Research Design-Qualitative, Quantitative and Mixed Methods Approaches (V. Knight, J. Young, K. Koscielak, B. Bauhaus, & M. Markanich (eds.); 4th ed.). SAGE Publications Ltd.
Dahlman, C. (2007). Technology, globalization, and international competitiveness: Challenges for developing countries. In O’Connor and M Kjöllerström (Ed.), Industrial Development for the 21st Century (Hyderabad: Orient Longman, Zed Books, and United Nations), 29–83. http://books.google.com/books?hl=en&lr=&id=DQGy1e9dv_YC&oi=fnd&pg=PA29&dq=Technology+,+globalization+,+and+international+competitiveness+:+Challenges+for+developing+countries&ots=RnSF1-vXf4&sig=JrefsCx8cPkyqOUlfK3KAHzRu8g
Davies, G. (2020). Shining a light on policing of the Dark Web: An analysis of UK investigatory powers. Journal of Criminal Law, 84(5), 407–426. https://doi.org/10.1177/0022018320952557
Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems: Theory and results. Massachusetts Institute of Technology. https://doi.org/10.1126/science.146.3652.1648
Dencik, L., Hintz, A., & Carey, Z. (2018). Prediction, pre-emption, and limits to dissent: Social media and big data use for policing protests in the United Kingdom. New Media and Society, 20(4), 1433–1450. https://doi.org/10.1177/1461444817697722
Farzindar, A., & Inkpen, D. (2015). Natural language processing for social media. Synthesis Lectures on Human Language Technologies. https://doi.org/10.2200/S00659ED1V01Y201508HLT030
Finklea, K. (2017). Dark Web. Congressional Research Service. https://doi.org/10.4018/978-1-7998-5567-5.ch024
Grizāne, A., Isupova, M., & Vorteil, V. (2022). Social media monitoring tools: An in-depth look. NATO Strategic Communications Centre of Excellence. http://blog.namics.com/2010/05/social-media-monitoring-tools2.html
Gundechahuan, P., & Liu, H. (2014). Mining social media: A brief introduction. Informs Tutorials in Operations Research 2012., November 2018, 1–17. https://pubsonline.informs.org/doi/10.1287/educ.1120.0105
Hossain, M. S. (2018). Social media and terrorism: Threats and challenges to the modern era. South Asian Survey, 22(2), 136–155. https://doi.org/10.1177/0971523117753280
Johnson. (2010). The Oxford Handbook of National Security Intelligence. Oxford University Press, Inc198 Madison Avenue, New York, New York 10016 www.oup.com.
Kimutai, J. K. (2014). Social media and national security threats: A case study of Kenya. In [Masters Thesis, University of Nairobi].
Kothari, C. R. (2011). Research Methodology Methods and Techniques. New Age International, New Delhi. https://doi.org/10.4236/ajibm.2014.412080
Kumar, R. (2022). Social Media a Tool for Terror. National Security Law & Policy. https://jnslp.com/2022/09/16/social-media-a-tool-for-terror/
Liaropoulos, A. N. (2013). The challenges of social media for the Intelligence Community. Journal of Mediterranean and Balkan Intelligence, 1(1), 5–14. https://www.researchgate.net
Maltego. (2022). Understanding the different types of Intelligence Collection Disciplines. https://www.maltego.com
Mary, S., Usha, S., Bobby, Syiemlieh, P., & Mary Khongsit, G. (2015). Phishing is an analysis of the types, causes, preventive measures, and case studies. Computer Engineering. https://www.iosrjournals.org
Mbithi, J. V. (2022). Impact of Social Media on National Security in Kenya. In Post Graduate Diploma Project from the University of Nairobi.
Montasari, R. (2022). Artificial Intelligence and National Security. In Artificial Intelligence and National Security. https://doi.org/10.1007/978-3-03106709-9
Mugenda, O. M., & Mugenda, A. G. (2019). Research Methods: Quantitative, Qualitative & Mixed Methods Approaches (Third). Centre for Innovative Leadership & Governance.
NAAG. (2019). Overcoming Hurdles to Secure Evidence from Social Media Companies in Cybercrime Investigations and Prosecutions - National Association of Attorneys General. National Association of Attorneys General. https://www.naag.org/attorney-general-journal/overcominghurdles-to-secure-evidence-from-social-media-companies-in-cybercrime-investigations-and-prosecutions/
Nadeem, S., & Mohamed, F. (2017). Ransomware-Threats, Vulnerabilities And Recommendations. International Journal of Scientifi c & Technology Research, 6(06), 307–309.
Njoroge, A. W. (2020). Intelligence aspects of big data analytics for Kenya’s national security.
Odhiambo, E., Maito, T., Kassilly, J., Chelumo, S., Onkware, K., & Oboka, W. (2013). Al-Shabaab terrorists propaganda and the Kenya government response. International Journal of Humanities and Social Science, 3(7), 125–131. https://www.scirp.org
Olasya, D. P. (2018). Assessing the impacts of social media on national security in Kenya. The University of Nairobi.
Omand, D., Bartlett, J., & Miller, C. (2012). Introducing social media intelligence (SOCMINT). Intelligence and National Security, 27(6), 801–823. https://doi.org/10.1080/02684527.2012.716965
Ombati, C. (2022). 10 social media users were arrested for impersonating senior officials. https://www.the-star.co.ke/news/2022-11-04-10-social-mediausers-arrested-for-impersonating-senior-officials
Pantucci, R. (2020). A View from the CT Foxhole: Jonathan Evans, Former Director General, MI5. CTC Sentinel, 13(3), 9–15. www.ctc.usma.edu/sentinel/
Ravitch, S., & Carl, N. (2021). Conceptual Frameworks in Research. Qualitative Research: Bridging the Conceptual, Theoretical, and Methodological, 32–61.
Saleous, H., Ismail, M., AlDaajeh, S. H., Madathil, N., Alrabaee, S., Choo, K. K. R., & Al-Qirim, N. (2023). COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities. Digital Communications and Networks, 9(1), 211–222. https://doi.org/10.1016/j.dcan.2022.06.005
Smith, M. A., Shneiderman, B., Milic-Frayling, N., Rodrigues, E. M., Barash, V., Dunne, C., Capone, T., Adam, P., & Gleave, E. (2015). Social media analysing networks with NodeXL . Reputation Management: The Key to Successful Public Relations and Corporate Communication, 126–152. https://doi.org/10.4324/9781315879987-12
Stegen, J. I. (2019). Social Media Intelligence (SOCMINT) within the South African context: A theoretical and strategic framework for the national security environment Prof A Duvenhage Co-promoter: Prof MN Wiggill. May.
Taherdoost, H. (2018). A review of technology acceptance and adoption models and theories. Procedia Manufacturing, 22, 960–967. https://doi.org/10.1016/j.promfg.2018.03.137
Tariq, R. S., & Irshad, S. (2018). Identity Theft and Social Media. IJCSNS International Journal of Computer Science and Network Security, 18(1), 43. https://www.researchgate.net/publication/323185128
Thukral, P., & Kainya, V. (2022). How social media infl uence crimes. Indian Journal of Law and Legal Research, IV(II).
UNICRI, & UNCCT. (2021). Countering Terrorism Online with Artifi cial Intelligence. An Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia.
Weimann, G. (2018). Science & Technology Terrorist Migration to Social Media. Georgetown University Press, 16(1), 180–187.
Weimann, G., & Vellante, A. (2021). The Dead Drops Of Online Terrorism: How Jihadists Use Anonymous Online Platforms. Perspectives on Terrorism, 15(4), 39–53.
Yamane, T. (1967). Statistics: An Introductory Analysis, 2nd Edition, New York: Harper and Row.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 The Eastern Africa Journal of Policy and Strategy

This work is licensed under a Creative Commons Attribution 4.0 International License.
The East African Journal of Policy and Strategy is a publication of the Global Centre for Policy and Strategy (GLOCEPS). Our content is disseminated on Open Access Terms.
