Expert Commentary

Somalia: Change Coming?

January 10, 2016 | Abukar Arman
 

Since Somalia’s independence in 1960, its relationship with the U.S. has been—for lack of a better metaphor—on a roller coaster that travels up and down dangerous steeps and performs sudden inversions that turn everything upside down. In other words, due to lack of formal and sustainable policy toward Somalia, the U.S. has contributed to creating the thrill-seekers’ paradise by setting aside diplomacy and soft engagement to chase terrorists. For the past decade or so, counterterrorism has been the name of the game, as both Somalia and the U.S. struggle to reshuffle their allies and redefine their strategic interests.

In 2006, in partnership with the most ruthless warlords in Somalia, the CIA funded a covert campaign that ultimately backfired on the George W. Bush Administration. In Operation Dung Beetle, the CIA commissioned cold-blooded warlords to help decapitate Islamic Courts—a coalition of clan-based “sharia courts” formed to fill the vacuum created by anarchy and provide semblance of law and order. This was followed by U.S. support for the Ethiopian invasion and occupation (2007-2009). In 2010, the U.S. then rolled out yet another self-defeating policy, known as dual-track.

This latter policy was seen as a rebranded version of Ethiopia’s “engage all actors on the ground” policy, even those engaged in a zero-sum campaign against the Somali government—so long as they are willing to fight al-Shabaab. These successive foreign policy fiascos have overshadowed the generous humanitarian assistance and security contribution that U.S. has been making.

Though it flies in the face of conventional wisdom, U.S. foreign policy toward Somalia is still fixated on counterterrorism and relies heavily on “militarized diplomacy” delivered by remote-controlled aerial bombers, which routinely create more enemies than the number of extremists they kill. With every periodical drone attacks, al-Shabaab gains priceless propaganda ammunitions and recruitment appeal.

Why Somalia Makes A Sound Investment

The importance of the Indian Ocean region cannot be underestimated. It is where global commerce, energy politics, extremism, natural resources, and geopolitical interests intersect. Across the Indian Ocean and the Red Sea, the Horn of Africa stands as “the new frontier for the world's energy industry,” because it is regarded within the oil and gas industry as having huge untapped potential. And Somalia, with its untapped oil, gas, uranium, other mineral resources, and protracted instability, is the microcosm of the region.

Somalia is in need of a strategic partner willing to pressure the neighboring tag-team that is holding her in a deadly headlock—Ethiopia and Kenya—to step aside; to weigh in and put economic pressure on key actors in order to engage in genuine, Somali-led reconciliation; and to help rebuild the national army and security apparatus that can keep al-Shabaab at bay.

Similarly, standing on geopolitical thin ice, the U.S. is desperate to maintain its presence in the Indian Ocean and the Horn of Africa. This is especially important now that China has outmaneuvered the U.S. in Djibouti, and the U.S. is losing its maritime strategic advantage or geopolitical edge, while being leveraged against the massive debt it owes to China.

Meanwhile, in addition to long-term natural resource contracts, China has completed major infrastructure related projects in various African countries—multibillion dollar projects of oil pipelines, railway connections, ports, etc. China’s ever-increasing investment in Africa is over $200 billion. On the other hand, both the U.S. and U.K. have their names associated with lords of instant gratification and exploitation. In order to place this critical relationship back on track, the process must be driven by a clear official policy of mutual interest implemented by the highest diplomatic office.         

Prospect of Sustainable Stabilization

By default or design, the current stabilization model only perpetuates Somalia’s dependency on external actors and makes any attempt to reclaim state sovereignty mere political rhetoric. 

Though it initially played a positive role, the African Union Mission in Somalia (AMISOM) has become a serious liability to the stabilization of Somalia and has severely undermined its sovereignty. Meanwhile, Ethiopia’s foreign policy toward Somalia is bearing fruits for Ethiopia. The Somali landscape remains littered with para-states that are perpetually hostile toward one another and are helplessly exposed to exploitation.

In the past decade, since the fall of the Islamic Courts and the subsequent foreign intervention, no serious attempt has been made to rebuild a competent, adequately equipped, and paid national army to neutralize al-Shabaab and restore law and order. The main contributing factors are a clan-based, dysfunctional government that talks about genuine reconciliation, but does nothing; and an international community that outsourced its mandate to Ethiopia and the latter’s exploitation of its fiduciary responsibility for zero-sum gain.

This is really where al-Shabaab, a profoundly despised movement, gets its fuel of support. The incompetence of successive clan-based governments failed to reconcile the nation, provide essential public services, and protect national assets, and they are heavily under Ethiopia’s command. Like other militant groups, al-Shabaab effectively exploits public disappointments and grievances, especially in remote towns and villages where the Somali government has merely a symbolic or no presence at all. The grievance that poses the most dangerous threat is the armed soldiers, whose salaries are squandered by corrupt officials and AMISOM bureaucracy. Against that back drop, it is hardly surprising to learn that a number of the Somali Armed Forces are situationally compelled to work for whomever will help them feed themselves and their families, whether it is private security companies, Ethiopia, or al-Shabaab.          

By and large, the government is seen as a bunch of charlatans, who sold their souls and nation to Ethiopia, and the country’s natural resources for personal gain.  

Change Is Near

In August 2016, the current government’s term ends and a new government is expected to be elected. For any new government to succeed, its leadership must possess the vision for a modern Somali state that does not grant political legitimacy to clans whose very nature is to promote exclusive rights and perpetual zero-sum strife against other clans. Political legitimacy comes from the people—individual citizens.

More importantly, the new leadership must have the will to transform the current dysfunctional political order by putting reconciliation on the top of its priority list. This, in turn, would become the foundation for a genuine constitution that enshrines citizenship rights and responsibilities, rather than the prevalent zero-sum clan rights. Without this, no new Somali government could claim national legitimacy or mandate. And without such legitimacy, any discourse or investment on security, good governance, and development would be an exercise in futility, at best.

Despite the generous praise that President Barack Obama offered Ethiopia during his visit, Ethiopia’s strategic interest in Somalia is on a collision course with that of the U.S. Ethiopia wants a divided Somalia along clan and sub-clan lines, and the U.S. wants to deal with an official state, and therefore wants to see a united Somalia.

Meanwhile, many Somalis perceive the Intergovernmental Authority for Development (IGAD), which micromanages security and political process in Somalia, as representing the interests of Ethiopia rather than Somalia. Under Ethiopia/IGAD de facto trusteeship, al-Shabaab expanded in number and became a more potent transnational threat, and Somalia became divided into a number of mini-states with half a dozen cardboard presidents who are hostile toward one another.

Clearly, the current arrangement must be wholly transformed for a safer Somalia to emerge, a sustainable U.S.-Somalia strategic partnership to materialize, and old oil exploration contracts to be reclaimed. 

The Author is Abukar Arman

Abukar Arman is the former Somalia Special Envoy to the United States. He is an international affairs analyst who writes for Foreign Policy Association.

Learn more about The Cipher's Network here

Next Steps in U.S.-Cuba Relations
Strengthening U.S. Cyber Defenses
Russia Sanctions: The New Normal
Corruption in China: The Party’s Over
Change in the Kingdom: Three Big Shifts
Managing Information & Risk in the Digital Age
Endgame in Afghanistan
The Convergence of Crime and Terror
Strengthening the Public-Private Partnership
The Billion Dollar Spy: An Interview with Author David Hoffman
The New Battlefield
North Africa: Instability Increasing
The Kidnapping Capital of the World
Homegrown Terror in the Age of ISIS
The Refugee Crisis: Europe on the Brink
The Future of Mexican Oil
Cracks in the System
Embassy Security Three Years After Benghazi
Fourteen Years Later
Can Congress Solve the Cybersecurity Problem?
Arctic Game Changer?
Where They Stand on National Security
The First 100 Days
Worthy of Fleming: Anthony Horowitz's "Trigger Mortis"
At the Crossroads
Eye in the Sky
Rough Road Ahead for Rousseff
Leveling the Playing Field: Tech Access in China
The Dead Drop
Top of Mind for Chief Security Officers
Protecting Your Business
The Future of Oil
Chinese Expansion in Latin America
American Involvement in Syria
The Future of Geospatial Intelligence
The Umbrella Movement: One Year Later
Ebola: An End in Sight?
The Pakistan Problem
The Dead Drop
The Encryption Debate
Going Dark
The US-Mexico Relationship
The Rise of Mobile Technology in Africa
The Dead Drop
Construction Boom in the Gulf
Cybersecurity: The Human Factor
Beijing and the South China Sea
Will Peace Talks Succeed in Colombia?
Social Media and Terrorism
The Rise of Israel’s Tech Sector
Securing the Border
Red Sun Rising
The Dead Drop
Adopting the Iran Deal
Stability on the Peninsula
Crime in South Africa
Combatting Terrorist Financing
The Dead Drop
Recovering from a Cyber Attack
Stability in South Asia
Veterans Day
Israel’s Wave of Violence
The Dead Drop
Protecting Critical Infrastructure
ISIS on the March
The Paris Attacks
Rethinking U.S. Security Assistance
The War on Terror 2.0
Putting Mali in Context
Will Russia Ever Change?
Will Canada Pull Back?
Understanding Putin’s Popularity
Chinese Expansion in Africa
Terrorism Finance and Wildlife Poaching
Illicit Trafficking in Latin America
Climate Change and Security
Preventing Another San Bernardino
Supply Chain Security
Negotiating a New Safe Harbor Agreement
The Battle for Yemen
Foreign Tech Access in China
The Dead Drop
Offensive Cyber Operations
Travel Security in the Age of ISIS
Iran: A Rising Cyber Power?
The Future of Cybersecurity
The Arab Spring Five Years Later
Preparing Today’s Military for Tomorrow’s Wars
Cybersecurity for Small and Medium-Sized Enterprises
Maritime Security in the Gulf of Guinea
Improving Aviation Security
The Dead Drop
Terrorism in 2016
Cybersecurity in 2016
The World in 2016: Opportunities and Risks
China in 2016
Russia in 2016
Moscow’s Cyber Buildup
The China-India Relationship
Russian Influence in Latin America
The Future of Homegrown Terrorism
Stability in Sub-Saharan Africa
Protecting Your Digital Identity
Elections in Taiwan: A Turning Point?
The Caliphate of Crime
Biotechnology’s Dark Side
Rethinking U.S. Strategy Toward China
The Evolution of Weapons of Mass Destruction
A New Era in US-Iranian Relations?
Will Information Sharing Improve Cybersecurity?
Evaluating China's New Silk Road
Tech in Latin America: Opportunities and Challenges
The Destruction of Libyan Oil
Ransomware: Protecting Yourself from Cyber Extortion
The US and India: Strengthening Security Cooperation
Security and Stability in Afghanistan
Combatting the Al Shabaab Threat
Sports Security: Protecting Your Venue
Israel’s Arab Alliance: A Counter to ISIS and Iran?
The End of U.S. Space Supremacy
The Caucasus: Instability Increasing
Stabilizing Iraq
The Trans-Pacific Partnership: Deepening U.S. Commitment to Asia
Securing Industrial Control Systems
The Battle for Ukraine
Defeating Boko Haram
Jordan: The Indispensable Ally
China’s Military Modernization
The Cybersecurity Skills Shortage
Solving Mexico’s Violence Problem
The Northern Triangle: The Most Violent Region in the World
The Future of the Middle East
Terrorism in the World’s Largest Muslim Country
The Rise of Quantum Computing
Europe’s Terrorism Problem
Stability in the East China Sea
The Rise of Counter-Drone Technology
The ISIS WMD Threat
Healthcare and the Cyber Threat
Security in the Indo-Pacific: Australia’s New Role
Countering ISIS' Message
Containing the ISIS Cancer
Security, Privacy, and the Fight Over Encryption
Taking Aim at Smart Guns
Losing Patience with North Korea
The Difficult Road Ahead for Colombia
The Taliban Resurgence
ISIS: The New Face of Global Jihad?
Connecting with Latin America
Russia and China: Mutually Assured Detachment
The Scourge of Terrorism
The Security Challenge of Terror
European Unity in the Face of Crises
Developing Enhanced Cybersecurity Systems
Pakistan: Friend and Foe?
Egypt’s Economy on the Brink
Tehran’s Balancing Act
Russia Makes Moves in the Middle East
Kenya’s Battle with al-Shabaab
Missile Defense in the Korean Peninsula
Are America's Ports Secure?
The Human Factor Behind the Panama Papers Leak
Russian Military Modernization
APTs: The Boogeymen of Cybersecurity
Vietnam: Guns and Butter
Syria: Power-sharing, Partitioning, and the Fight Against ISIS
Turbulence in Turkey
The U.S. and the Philippines: Shoulder to Shoulder in the South China Sea
The Darker Side of the Internet of Things
Cybersecurity Challenges in Asia
Taliban on the Offensive
Quagmire in Yemen
Cocaine and Conflict in Colombia
The Cloud: Nebulous, but Nimble
Censorship in China
An Emerging Crime-Terror Nexus in Europe
IRGC: Iran's Power Player
Latin America: The New Frontier for Cyber Attacks
The Hydra and the Snake: The Death of Osama Bin Laden
Nuclear Deterrence and Assurance in East Asia
Vehicle Cybersecurity: Running in Place
What Drives ISIS
Tensions Simmer in the South China Sea
Managing the Mobile Phone Malware Threat
Leaving the Oil Spigot Open
Burundi: A Path Toward Civil War?
The Value of Special Operations Forces
ISIS in the Balkans
The Tech Must Flow
North Korea’s Party Congress: What was all the fuss about?
Argentina: A Smoother Ride
Libya: Obama’s “Worst Mistake”
Tsai Ing-Wen’s Balancing Act
The North Korea Workers’ Party Congress and Kim Jong-un’s Legitimacy
Flying the Unfriendly Skies: Airline Security
Nuclear Standoff in South Asia
How to Read Riyadh
Even in Defeat, Austria’s Far-right Emulates Populist Growth in Europe
More Effective, Less Secure: The Cyber-Threat to Medical Devices
A New Era in the U.S.-Japan Security Partnership
Passing the Torch to the Next Generation of Saudi Leaders
U.S. Military Aid to Egypt Continues Despite Democratic Struggle
How Secure are Radiological Materials?
Roadblocks on the Path to Normality in Iran
Caracas in Crisis
Algeria: Exporting Stability
The Push for Kurdish Independence
U.S. and China: Strategic Cooperation at Arm’s Length
City Life: Living Smarter, Not Harder
Homegrown Terror in Orlando
A Rough Patch in U.S.-Saudi Relations
Japan’s “Abenomics”
A Tale of Two Bears: The DNC Hack
The Origins of Brexit
The Chinese Communist Party Under Xi Jinping
The Arctic: Technology and Infrastructure on Earth and in Space
Jordan: Stability Amidst Chaos
Exporting Jihad: Bosnia and Kosovo
Changing World Order: The Effects of Brexit
Navigating Uncharted Waters
Iraq after ISIS: Divide it or Fix it?
Terrorism in Istanbul: Severe Implications
North Korea as a Cyber Threat
One If By Air, Two If By Sea: Unmanned Surface Vehicles
The FBI’s Intelligence Mission
Does NATO Need a New Ideology?
Philippines v. China: Laying Down the Law of the Sea
Is Turkey Returning to a Policy of “Zero Problems?”
Federal Cybersecurity One Year After the OPM Breach
NATO: Weathering the Storms
The Rise of the Fringe: A Threat to Democracy?
Hezbollah's Many Faces
Trans-Pacific Trade Deal Remains in Limbo
The Aftermath of the Nice Attack: Is ISIS’ “Prestige” on the Rise?
Crossing the Line: A Failed Coup in Turkey
France’s Vulnerabilities in a Changing Terror Landscape
The Problem with Proxies
Water Security in South Asia: Running Dry and Running Out of Options
The Clash over Social Media Data