Functionality of Kenya Prisons Service in Managing Terrorist Prison Criminal Group Activities at Kamiti Maximum Prison, Nairobi Kenya

2021 ◽  
Vol 8 (2) ◽  
pp. 611-620
Author(s):  
Jane Waithira Kimani Kinyanzui

Prisons all over the world have become the ‘epicenter’ of terrorist groups' activities that include violent extremism, radicalization and recruitments into terrorist prison criminal groups. Although many scholars, especially in Kenya, have not scratched this area, the fact remains that prisons have become a center of terrorist recruitment, strengthening, interconnecting, organizing, and conducting terrorist actions with subjects outside of prison. This study, therefore, was designed to evaluate the Kenya Prisons Service's functionality in managing Terrorist Prison criminal group Activities at Kamiti Maximum Prison. Three objectives focused this study; to examine the nature of available Terrorist Prison Criminal Groups Management strategies at the institution; to identify the anti-Terrorist Prison Criminal Groups Management gaps, and finally, to identify activities associated with Terrorist Prison Criminal Groups at Kamiti Maximum Prison. The paper employed a descriptive research design and a hybrid methodology where qualitative and quantitative data were obtained. Results showed that the most embraced terrorist management techniques were separation/isolation as it allows for close supervision and use of risk assessment instruments amongst other measures. Results also showed that clandestine use of the internet while in prison was associated with the recruitment of other prisoners into terrorist groups, Islamist militant prison radicalization, and external influences. The study findings showed that the main ways to mitigate the Terrorist Prison Criminal Group activities in Kenya included creating employment opportunities for the youth, creating rehabilitation programs for terror convicts, and offering education to the public. Amongst other measures, this was perceived as mitigation to reduce terrorist groups. The study recommended judges and magistrates to only incarcerate the most serious criminals and prefer non-custodial sentences for petty offenders. This will better manage the radicalization of petty prisoners. Key words: Inmates, terrorist criminals, Prison, Isolation, Concentration, Separation.

Small Arms ◽  
2019 ◽  
pp. 144-163
Author(s):  
Mia Bloom

In several countries including Singapore, Saudi Arabia and Pakistan, rehabilitation programs dedicated specifically to children seek to reduce the risk that children rescued from terrorist groups may re-enter those groups upon release from detention. The capture or rescue of child militants poses exceptional social and legal challenges, and some extraordinary efforts are underway to help children reintegrate into the communities from which they were recruited or coerced into involvement. The chapter explores the various push and pull factors that are at the heart of the disengagement process, and will explore these especially in light of the core psychological dynamics at play in the initial involvement pathways.


Author(s):  
Arun Vishwanath

The ubiquitous use of the Internet has made it possible for terrorist groups to remotely foment attacks with little risk of capture. Among the newest forms of attacks is cyber hacking, which has seen increased use by terrorist groups for acts ranging from pinpointing targets for assassination to holding organisations hostage and embarrassing governments. In almost all these attacks, spear phishing is the vector used to gain access to a computer network – making it imperative that policymakers find ways to stop it. This chapter provides an overview of the different types of spear phishing attacks and the reasons they succeed. The chapter then provides an overview of the different strategies being used to combat it and their relative effectiveness. Drawing from the latest social science research and from initiatives that have worked around the world, the chapter culminates with six policy suggestions, which could significantly reduce the effectiveness of spear phishing and protect nations from a major cyber attack.


2003 ◽  
Vol 18 (2) ◽  
pp. 80-87 ◽  
Author(s):  
Gabriel Darío Paredes Zapata

AbstractColombia is a poor country that has been plagued by ongoing violence for more than 120 years. During the 1940s, subversive terrorist groups emerged in rural areas of the country when criminal groups came under the influence of Communism, and were later transformed into contemporary groups, such as the Ejercito de Liberacion Nacional (ELN) or National Liberation Army and Fuerzas Armadas Revolucionares de Colombia (FARC) or Revolutionary Armed Forces of Colombia). Paramilitary terrorist groups emerged in response to subversive groups and were later transformed into contemporary groups, such as the Autodefensas Unidas de Colombia (AUC) or United Self-Defense Forces of Colombia.Terrorism has placed an enormous burden on modern Colombia. From 1995 to 2002, 9,435 people were killed by terrorism-related events, of which 5,864 were killed by subversive terrorist activities and 3,571 were killed by paramilitary terrorist activities. In 2002, at least nineteen attacks produced 10 or more casualties, of which 18 were bombings. In 2002, terrorists killed at least 12 mayors, 71 legislators, and internally displaced 300,000 persons from their homes. Since terrorist groups in Colombia are typically supported by drug manufacturing and trafficking, it has been difficult at times to distinguish violence due to terrorism from violence due to illicit drug trafficking. Terrorism has also had a major adverse effect on the economy, with restricted travel, loss of economic resources, and lack of economic investment. In addition to political, military, and commercial targets, terrorists have specifically targeted healthcare infrastructure and personnel.At the national and local levels, much emergency planning and preparedness has taken place for terrorism-related events. The Centro Regulador de Urgencias (CRU) or Emergency Regulation Center in Bogota plays a major role in coordinating local prehospital and hospital emergency response in the capital city and the national level where necessary.


2019 ◽  
Vol 2 (1) ◽  
pp. 23
Author(s):  
Maria Hariyati Oktaviani ◽  
Muhamad Rofii

The implementation of supervising the head of a room in one hospital in Semarang has not been optimal due to the absence of a schedule, assessment instruments, guidance, documentation of supervision results, and standard operating procedures (SOP) supervision. Supervision activities are incidental in accordance with needs and have not been implemented in a structured and well-documented manner. The writing of this article aims to find out the description of the implementation of head supervision in a hospital in Semarang. This study uses descriptive research design. The subjects in this study were all heads of inpatient rooms. The object of this research is the implementation of the supervision of the head of the room according to the SOP and the results of documentation of the implementation of supervision. The instrument in this study used a draft sheet for evaluation of the superficial room leader evaluation. Shows that there is a change in the implementation of supervision based on the SOP before and after the dissemination of supervision is carried out to the head of the room. Documented supervision results can help the head of the room to see the extent of the ability of staff and can jointly improve capabilities, correct errors in improving the quality of nursing care services. The implementation of supervising the head of a room in one of the Semarang hospitals needs to be improved, especially in terms of post-supervision documentation, development of thematic supervision themes, and structured supervision scheduling.


2020 ◽  
Vol 1 (2) ◽  
pp. 165-178
Author(s):  
Fransiskus Seran Nuak ◽  
◽  
William Djani ◽  
Petrus Kase Kase ◽  
◽  
...  

Purpose: The purpose of this study is to analyze saving and loan business management strategy in Satu Hati Village-Owned Enterprises (BUMDes) In Naimana Village, Central Malaka Sub-District, Malaka District. Research methodology: This research used a descriptive research method with a qualitative approach. This research used purposive sampling technique. Results: The results of this study found that communication and cooperation are not good enough, there are no binding rules, and recording and bookkeeping are not in accordance with the borrower's deposit. Limitations: This research only analyzes Management Strategies for Savings and Loans at Satu Hati Village-Owned Enterprises (BUMDes) in Naimana Village, Central Malaka Sub-District, Malaka Regency. Contribution: This research becomes information for the development of Satu Hati Village-Owned Enterprises (BUMDes) so that this BUMDes can continue to grow. Keywords: Environmental observation, Management strategy, Savings and loans business, Strategy formulation, Village-Owned Enterprises (BUMDes)


2019 ◽  
Vol 15 (11) ◽  
pp. 105
Author(s):  
David Oladimeji Alao ◽  
Goodnews Osah ◽  
Eteete Michael Adam

The development of Information and Communication Technology (ICT) due to Internet connectivity has called to question the preparedness of nations to curb cyber terrorism and the effects on human security. Boko Haram emerged as one of the deadliest terrorist groups globally. The paper investigated the Nigeria’s efforts in checkmating cyber terrorism, the implication on human security and the inherent challenges associated. The paper employed descriptive research and qualitative method while secondary sources of data were adopted. The study found that cyber terrorism as employed by Boko Haram was deployed in raising fund, propaganda, coordinating operation, international collaboration, recruitment and training of its members. In addition, the Nigerian government has not given sufficient attention to war against cyber terrorism and this has complicated human security provisioning particularly in the North-East Nigeria. This study concluded that cyber terrorism has come to stay as long as development in ICT cannot exclude the terrorists and the prevalence of fear of attack and the destruction of lives and property facilitated by Internet have devastating effects on human security. This paper recommended the criminalization of terror attacks, adequate equipment of the security agencies and political will to tackle societal ills.


Author(s):  
Mariya Vyacheslavovna Talan ◽  
Ildar Rustamovich Begishev ◽  
Tatyana Gennadievna Zhukova ◽  
Diana Davlenovna Bersei ◽  
Regina Rustеmovna Musina ◽  
...  

The article discusses the criminal responsibility for illegally organizing migration, using a comparative documentary-based methodology. Constant changes in public life suggest the need to improve states' criminal policy in the field of establishing responsibility for organizing illegal migration, both nationally and internationally. An analysis of the provisions of international criminal law makes it possible to consider various legal approaches to the criminalization of acts in the field of migration. The document underpins the need to develop a unified approach to determining the characteristics of the crime in question, as it is transnational. It is concluded that, regardless of the different approaches of States to recognize illegal population migration, the organization of this illegal activity, in the presence of certain signs, should be recognized as a crime. At the same time, the organization of illegal migration is defined as the commission by a criminal group (association of criminal groups) of actions aimed at creating the conditions for the illegal movement of foreign nationals across the state border or their illegal presence in each country.


Author(s):  
Asif Salim ◽  
Holli Semetko ◽  
Sania Zehraa

Pakistan’s efforts against the terrorism has entirely changed the security landscape of Pakistan. Growing waves of extremism, militancy and sectarianism emerged as a fundamental threat to the security of the state as the aftermath of 9/11. Different terrorist groups gathered under the umbrella of al-Qaeda and posed grave security challenges to the state. Although, their doctrinal philosophy and aims were stridently at contrast, but security situation compelled them to jointly chalk out a common strategy. Moreover, militants’ splinter groups with new leadership find out new source of funding which denied the upper hand of the security vanguards on them. The current paper at the first stage supplies deep analysis of the birth of various militant groups and on the next stage discusses different Jihadi, sectarian, and criminal groups’ closed nexus and their modus operandi. The outcome of the discussion shows that the benefits of marriage of convenience between the security apparatus and radical militants were less, but the impact was generational.


2011 ◽  
pp. 352-361
Author(s):  
Matthew Warren ◽  
William Hutchinson

In the developed world, the influence of information systems can now be seen in most operational areas of business. A significant result of these advances is that organizations have become increasingly dependent upon the availability of systems and reliant upon the data that they hold. In recent years the Internet has grown from a solely military/academic network to one that can be used by business or individuals. In the years since the first WWW applications were developed, there has been an explosion in the global use of the Internet. With this growth has come an increasing usage of the medium by criminal and terrorist groups (Rathmell, 1997). The term terrorist or terrorism is a highly emotive term. Generally it is used to denote “revolutionaries who seek to use terror systematically to further their views or to govern a particular area” (Warren, 1998). ‘Cyber-terrorism’ is a different form of terrorism since physical systematic terror does not usually occur (although it can if it causes disruption to a critical system), but a widespread destruction of information resources can. The problem of defining the term ‘terrorist’ relates to the fact that a terrorist group could easily be perceived as a resistance group carrying out lawful or morally legitimate actions. In the context of the chapter the term cyber-terrorist/terrorism will refer to all terrorist/resistance groups in order to give a neutral perception of their activities and aims. Another new term related to the Information Society is ‘electronic commerce.’ The notion of ‘electronic commerce’ is proposed as a means of drawing together a wide range of business support services. It includes such elements as inter-organizational e-mail; on-line directories; trading support systems for commodities, products, customised products and custom-built goods and services; ordering and logistic support systems; settlement support systems; and management information and statistical reporting systems (Warren et al, 1999). Business around the world has become more of a target of cyber terrorism due to the fact that they are increasingly dependent upon information technology (Howard, 1997). Therefore there are many more high technology targets to prey upon. Increasingly in the future, businesses will use electronic commerce and on-line systems as a method of conducting trade. These on-line methods are very vulnerable to attacks. In a recent, informal survey of Australian IT managers (Hutchinson and Warren, 1999), 80% of replies said that their sites had never been attacked, 66% do not feel their competitors would attack their site, and 66% had no policy about dealing with an attack. This chapter will explain why and how cyber-terrorists attack these services. The aims of the chapter are to: • describe the background of cyber-terrorism; • describe what cyber-terrorism is; • describe the vulnerabilities of electronic commerce to cyber-terrorism; • discuss the future of electronic commerce and cyber-terrorism.


2011 ◽  
Vol 55 (2) ◽  
pp. 176-181
Author(s):  
Wendy Goff

This article explores the effects of cyberbullying in relation to a school's duty of care. By examining the impact of cyberbullying through an increasingly common scenario, it becomes apparent that the strategies for Australian schools in maintaining their duty of care may be unclear and uncommunicated. Findings suggest that Australian law in its current form has failed to keep up with the advances in technology and does not effectively deal with the problems surrounding cyberbullying, both within society and within our schools. Such findings suggest that this lack of direction within Australia could be potentially detrimental to the perceptions of the value and use of the internet both within Australian schools and within Australian households, and support the need for global unity in the development of risk management strategies to deal with this growing phenomenon.


Sign in / Sign up

Export Citation Format

Share Document