Search Blog / Web

Custom Search

Saturday, July 27, 2013

Security challenges: What can ICT do?

The Punch - Nigeria's Most Widely Read Newspaper
Breaking News, information and opinion in Nigeria 
Security challenges: What can ICT do?
Jul 27th 2013, 23:00, by oayodele

In the last two years or so, Nigeria has been faced with severe security challenges that have threatened the soul of the nation.  Places of worship have been desecrated; homes, media houses, national and international institutions have been torched; and lives have been wasted, the recent being the murder of 29 harmless school children in Yobe State.

 Like all Nigerians, I'm worried too. Therefore, this week, I will highlight what ICT can do to help deal with the security challenges the nation is grappling with.

 ICT has made living and work a lot easier. Security experts say it is possible to see through security breaches and nip them in the bud with ICT-enabled gadgets and software before they blossom.

 Here are some ways that ICT-based technologies can assist security agencies in achieving more efficiency and effectiveness in their operations.

 Surveillance: Surveillance is a deliberate system of keeping a close watch on the behaviours or activities of persons, groups, organisations and institutions suspected of doing something illegal or warehousing information capable of causing a breach of security by government's security agencies.

 This could be done electronically with Closed Circuit Television cameras or interception of electronically transmitted information (such as Internet traffic or phone calls) or by means of low-technology methods such as human intelligence agents and postal interception.

 Other means include: surveillance cameras, social network analysis, biometric surveillance, data mining and profiling, corporate surveillance, satellite imagery, radio-frequency identification and geo-location devices to mount surveillance on suspected targets.

 Intelligence Gathering: Intelligence gathering helps security agencies to keep tabs on the activities of suspected groups, organisations or persons likely to breach the peace. Today, such ICT tools as the internet, mobile telephony system, social media networks and the media have become veritable platforms for intelligence gathering efforts of our security agencies, so long as they observe the ethics of using these technologies for intelligence gathering purposes.

 Communication: Intercepting communication between terror groups and enhancing intelligence sharing and other collaborative measures between security agencies is now absolutely possible through ICT. We now have electronic devices and gadgets with in-built unique identification numbers that makes them electronically traceable regardless of location. So it's no longer impossible to track communication devices or gadgets used by criminal gangs or groups.

 Financing: ICT is a vital tool for tracking, tracing and investigating suspected financial transactions funnelled to criminal activities. With the recent introduction of cash-less society, transactions will be done on electronic platforms where suspicious cash movements can be identified and questioned. This would go a long way in curbing the financing of activities that constitute a threat to national security because no terrorist group or gang can operate without funding.

 Coordination: Security agencies can minimise duplication of efforts, guard against the mishandling of information as well as enhance information sharing among them for a better management of our national security through ICT. This involves pulling the nation's data into a coordinated and centralised database as a proactive means of combating insecurity.

 In his paper titled: Information Communication Technology and National Security in Nigeria, the Director-General, Nigeria Governors' Forum Secretariat, A.B Okauru, suggested the development of a Central Intelligence Unit or Counter Terrorism Unit with a robust, dynamic, vibrant and updated central database for the country.

 According to him, the centralised database should contain every data and details of the nation.  An example is the conversion of the National Identification Card into an electronic form as well as making all the identification (drivers' licence, SIM card registration, National ID etc.) into a single digital electronic form and uploaded on a central database.

 Identification: In advanced countries of the world, birth and death registration, in addition to unifying various identification initiatives, plays significant roles in national security, especially when combined with DNA, facial recognition and finger printing technologies which operate on platforms provided by ICT. That is why it is easier in those climes to easily track down criminals.

 Public enlightenment: Recently, a church unveiled its e-portal system that computerised membership registration and other ancillary services. Managers of this e-portal send regular precautionary SMS alerts that assist members to be at alert and take precautionary measures. Sensitisation and advocacy on security enlightenment issues using ICT-driven solutions, therefore, can play significant roles in tackling insecurity in the country.

 I am aware that a lot of seminars and conferences have been held on security issue on many occasions in Nigeria. This is good, but I think that it is time to 'walk the talk' because the recent killing of school children in Yobe State tells one story – the perpetrators are not done yet. In fact, they are becoming deadlier and more sophisticated by the day.

 Reports show that the United States and some countries in Europe, Asia, Middle East and even in Africa are taking proactive steps at checkmating threats to their national security by latching onto revolutions in ICT. Besides its speed, technology-driven surveillance and intelligence gathering cost less in terms of men and logistics. That is why terrorists' attacks in the magnitude of 9/11 may never happen again.

Our government, therefore, needs to do more than talking by acting now.

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Related Posts Plugin for WordPress, Blogger...