National Security of any nation is the epitome of development and prosperity. The term evolved from simpler definitions that emphasized freedom from military threat and from political coercion. A nation has security when it has the ability to preserve the nation’s physical integrity and territory, to maintain its economic relations with the rest of the world on reasonable terms, to preserve its nature, institutions and governance against disruption from outside; and control its borders. The study examined the impacts of using Multi Agency Command Centre Strategy on National security at Isebania trans-border, Migori County, Kenya. The study employed Decision Theory. Survey design was utilized which involved collection of data on a number of variables. Target population comprised of 980 persons (800 business persons, 70 village elders, 60 border Officers, 43 Police Officers, 6 Chiefs and 1 Assistant county commissioner (ACCs). The study considered a 30% of each category of sample population and therefore, the sample size for the study was 294 (240 business men and women, 21 village elders, 18 border officers, 12 police officers and 2 chiefs, 1 ACC). Interviews, Questionnaires, and Focus group discussion tools were used to collect data from the respondents. Data was analyzed by use of Statistical Package for Social Sciences (SPSS) version 27. The result was presented in form of graphs. Findings revealed that Multi-Agency Command Centre as a strategy views border security with a bird’s eye view, as used by Foucault where in our case multi-agency command center as both security planning and a coordination tool where all the relevant leaders in an emergency gather under one chair to plan, execute and pool resources and harness synergies as evidenced by this research as the public view it. This does not mean that the tool is ineffective by virtue of the fact that the public is not knowledgeable, but its ineffectiveness is demonstrated by evidence that National Intelligence Service does not detect and curb crime. Therefore, the study recommends that training needs to be enhanced more, especially on trust leaders about Multi-Agency Command Centre and competencies instilled on how to lead and better harness the synergies of all participating agencies as per their specialization. There is dire need to deploy more intelligence personnel at the borders to improve effectiveness of securing our borders.
Cite this paper
Kithii, N. N. and Odhiambo, E. O. S. (2023). Impacts of Using Multi Agency Command Centre Strategy on National Security at Isebania Trans-Border, Migori County, Kenya. Open Access Library Journal, 10, e566. doi: http://dx.doi.org/10.4236/oalib.1110566.
Amoore, L. and De Goede, M. (2005) Governance, Risks and Dataveillance in the War on Terror. Crime, Law and Social Change, 43, 149-173.
https://doi.org/10.1007/s10611-005-1717-8
Hindesss, B. (2000) Divide and Govern: Governmental Aspects of the Modern States Systems. In: Ericson, R. and Stehr, N., Eds., Governing Modern Societies, University of Toronto, Toronto, 118-140.
https://doi.org/10.3138/9781442675452-008
Predd, J., Willis, H., Setodji, C. and Stelzner, A. (2012) Using Pattern Analysis and Systematic Randomness to Allocate U.S. Border Security Resources.
https://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1211.pdf
Gutierrez, E., Juett, J. and Kiekintveld, C. (2013) Generating Effective Patrol Strategies to Enhance U.S. Border Security. Journal of Strategic Security, 6, 152-159.
https://doi.org/10.5038/1944-0472.6.3S.16
Cote-Boucher, K. (2008) The Diffuse Border: Intelligence-Sharing, Control and Confinement along Canada’s Smart Border. Surveillance and Society, 5, 142-165.
https://doi.org/10.24908/ss.v5i2.3432
Pollock, K. (2013) Review of Persistent Lessons Identified Relating to Inter-Operability from Emergencies and Major Incidents since 1986. Emergency Planning College Occasional Papers 6. Emergency Planning College, York.
Rosand, E. (2006) The UN-Led Multilateral Institutional Response to Jihadist Terrorism: Is a Global Counterterrorism Body Needed? Journal of Conflict and Security Law, 11, 399-427. https://doi.org/10.1093/jcsl/krl026
Onkware, K., Odhiambo, E.S.O. and Ntabo, O.M. (2010) Counter-Terrorism strategies by Kenya against Somalia Terrorism. Egerton Journal of Humanities, Social Sciences & Education, 1X, 99-109.
Rosenblum, M.R., Bjelopera, J.P. and Fiklea, K.M. (2013) Border Security: Understanding Threats at U.S. Borders. Congressional Research Service, Washington DC, 1-30.
Odhiambo, E.O.S., Kassilly, J., Maito, T.L., Onkware, K., Oboka, W.A. and Otipi, N.H. (2013) The Reprisal Attacks By Al-Shabaab against Kenya. Journal of Defense Resources Management, 4, 53-64.
https://www.proquest.com/docview/1492205128
Nduti, D.M. and Odhiambo, E.O.S. (2020) Mechanisms of Curbing Smuggling of Food Commodities from Uganda into Busia Town, Kenya. International Journal of Research and Innovation in Social Science (IJRISS), 4, 122-137.
https://www.rsisinternational.org/journals/ijriss/digital-library/volume-iv-issue-xi
Wakhungu, J.P., Okoth, G.P. and Odhiambo, E.O.S. (2020) Challenges and Opportunities Constraining and Enhancing Kenya and Tanzania Participation in the EAC Econo-Political Integration Process. Open Journal of Political Science, 11, 134-154.
https://doi.org/10.4236/ojps.2021.111009
FEMA (2008) Introduction to the Incident Command System, ICS-100 for Higher Education Student Manual.
https://www.amazon.com/100-HE-Introduction-Incident-Command-Education/dp/1539953963
House, A., Power, N. and Alison, L. (2013) A Systematic Review of the Potential Hurdles of Interoperability to the Emergency Services in Major Incidents: Recommendations for Solutions and Alternatives. Cognition, Technology & Work, 16, 319-335. https://doi.org/10.1007/s10111-013-0259-6
Bharosa, N., Lee, J. and Janssen, M. (2010) Challenges and Obstacles in Showing and Coordinating information during Multi-Agency Disaster Response: Proposition from Field Exercises. Information Systems Frontier, 12, 49-65.
https://doi.org/10.1007/s10796-009-9174-z
Lichsestein, B., Bien, M., Marion, R., Seers, A., Orton, D. and Craigs, S. (2006) Complexity Leadership Theory: An Interactive Perspective on Leading in Complex Adaptive Systems. University of Nebraska-Lincoln, Lincoln.
Comfort, L.K. (2002) Managing Intergovernmental Responses to Terrorism and Other Extreme Events. Publius: The Journal of Federalism, 32, 29-50.
https://doi.org/10.1093/oxfordjournals.pubjof.a004970
Allison, L., Power, N. and Allen, D. (2014) Critical Incident Decision Making: Evidence Review, N8 Research Partnership.
https://www.n8research.org.uk/media/CriticalIncidents_EvidenceReview_References.pdf
Brehmer, B. (1994) Same Notes on Psychological Research Related to Risk. In: Brehmer, B. and Sahlin, N.-E., Eds., Future Risks and Risk Management. Technology, Risk, and Society, Vol. 9, Springer, Dordrecht, 79-91.
https://doi.org/10.1007/978-94-015-8388-6_4
Das, T.K. and Teng, B.-S. (2004) The Risk Based View of Trust: A Conceptual Framework. Journal of Business and Psychology, 19, 85-116.
https://doi.org/10.1023/B:JOBU.0000040274.23551.1b
Hohmann, H. (2008) Agreeing and Implementing the Doha Round of the WTO. Cambridge University Press, Cambridge.
https://doi.org/10.1017/CBO9780511674549
Truel, C. (2010) A Short Guide to Customs Risk. Routledge, Taylor & Francis Group.
https://www.routledge.com/A-Short-Guide-to-Customs-Risk/Truel/p/book/9781409404521
Sokolova, A. (2017) Challenges with Features of Customs Clearance at the Russian-Finnish Border a Case of GW Europe. KYAMK University of Applied Sciences, kotka.
Department of Immigration and Multicultural Affairs (2006) 2005 Access and Equity Annual Report: Progress in Implementing the Charter of Public Service in a Culturally Diverse Society.
https://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22publications%2Ftabledpapers%2FHSTP010825_2004-07%22;src1=sm1
Odgers, M. and Brennan, P. (2014) Implementation of an IATA/ICAO/WCO PNRGOV EDI Message Processing System. WCO IT Conference 2014-Brisbane. https://na.eventscloud.com/file_uploads/86d49ce95953d6a3d1e0b18d3c8baf17_D2TT2michqelodgers-PeterBrennan.pdf
Wasike, S. and Odhiambo, E.O.S. (2016) A Critique of the Usefulness of Theories in Explaining Socio-Political Phenomenon. Asian Journal of Basic and Applied Sciences, 3, 29-33.
Smith, S. (1986) Theories of Foreign Policy: An Historic Overview. Review of International Studies, 12, 13-29. https://doi.org/10.1017/S026021050011410X
Isaac, S. and Michael, W.B. (1997) Handbook in Research and Evaluation: A Collection of Principles, Methods, and Strategies Useful in the Planning, Design, and Evaluation of Studies in Education and the Behavioral Sciences. 3rd Edition, Educational and Industrial Testing Services, San Diego.
Kraemer, K.L. (1991) The Information Systems Research Challenge: Survey Research Methods. Harvard University Graduate School of Business Administration United States.
Kriecjce, R.V. and Morgan, D.W. (1970) Determining Sample Size for Research Activities. Educational and Psychological Measurement, 30, 607-610.
https://doi.org/10.1177/001316447003000308
Kithii, N.N. and Odhiambo, E.O.S. (2021) Impacts of Using Multi Agency Command Centre Strategy on National Security at Isebania Trans – Border surveillance Strategies on National Securityat Isebania, Migori County, Kenya. Unpublished Thesis
Juma, P.W. and Odhiambo, E.O.S. (2021) Geo-Political Factors Influencing Kenya and Tanzania Foreign Policy Behaviour since 1967. Journal of Defense Resources Management, 12, 75-98. http://www.jodrm.eu/currentissue.html
Odhiambo, E.O.S., Kassilly, J., Maito, L.T., Onkware, K. and Oboka, W.A. (2012) Kenya’s Constitution and Child Trafficking as a Security Threat. Journal of Defense Resources Management, 3, 75-88. http://journal.dresmara.ro/