Headlines
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages,pictures,Videos and news.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.
  • Check Google Images for AuthThe Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • It is a heinous crime and punishable offence to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.

More Details

Intelligence in the Age of Globalization in Africa

By Saron Messembe Obia

The globalization era has changed the narrative of defense intelligence, with the emergence of a highly interconnected global economy, reshaping international alliances and the incorporation of new technologies. This interconnectivity offers new opportunities, and has also led to new security challenges, such as; regional instability, resulting from jihadist tendencies, migration, and resource capture, which requires new ‘grand strategy’. The complexity of modern warfare and civil- military relations, equally requires a recast of intelligence priorities, strategies, and methods necessary to meet the sociology of crimes in the 21st century.

Intelligence in the early 19th Century was limited, as the Army usually neglected or did not adequately exploit strategic information relating to potential menace. The American War of 1812 reconfigured the U.S military machine, with the creation of a unit of topographic engineers to reconnoiter and map positions and routes in support of military operations by the War Department.  However, security parameters have changed, with evolution of technology and entry in to the ‘counter terrorism game’ by geostrategist, following the asymmetric nature of modern war, which appeals for intelligence professionals to consider a security environment marked by regional, economic, resource, and ideological competition.

Miniaturization of technology is increasingly penetrating the developing world. While opportunities are many, the interconnection of systems via the Internet also raises the risk of cyber-attack, cyberterrorism and drone attacks against national security apparatus. Security and counterintelligence professionals need to partner with scientific, and commercial persons to continuously deny an adversary’s ability to acquire and use such cyber capabilities. Equally, the development of new micro-electromechanical machines which offers defense applications, super-automation capabilities, and artificial intelligence are necessary to enhance military operations and advance information analysis.

The menace pose by insurgencies and terrorist groups in some African nations and international organizations continue to moderate panel discussions at international milieu, United Nations Security Council and African Union Peace and Security Council. For example, in the Horn of Africa and Sahel region, the asymmetric war between states and organizations like Al Shabaab and Boko-Haram, has led to reconfiguration of military machine of some states in these regions. 

The effects of globalization era and the transition towards modern warfare have reshaped the locus of security dynamics in some Africa countries, which requires strategic transformation of intelligence agency in bid to counter terrorist activities. some of these engagements must be focus but not limited to; ensuring that most security officers gain insight on intelligence and defense in order to take accurate decisions, ensuring defense intelligence is available to the broader military machine under any condition or circumstance; to explore concepts, technologies, and strategies to address customer requirements and emerging menace; and, to enable us to counter terrorist networks from acquiring and exploiting technologies of the battle space. 

Rethink of  intelligence in Africa 

Social scientists like Alvin and Heidi Toffler, posed that, the Age of Information is upon us, logically succeeding such grand epochs as the Age of Agronomy and the Age of Industrialization. Artificial intelligence is a major drive coordinating security activities, which have created new global security menace. Though military intelligence officers were pioneers to embraced of the Age of Information throughout the 20th century, several security challenges keep emerging. Information is capital for military operations, as such, officers devise better patterns to exploit, collect, analyze and disseminate intelligence. Terrorist groups like Al Shabaab, which derive several counter intelligence measures against national and regional security organizations, warrants intelligence-minded officers to inventively ushered in to the age of technological evolution, and as well develop resourcefulness to send out early warning signals. More so, technological evolution, particularly the use of drones, help limit military casualties in terrorist zones. 

Historically, intelligence agencies have encountered several challenges in this crucial function. Virtually all have suffered severe security breach, like the 9/11 events in the United States of America and the continuous attack on France by religious extremist. Some of these challenges emerge from inadequate vetting measures, poor community policing, access to suitable targets and corruption. 

Counterintelligence

Counterintelligence narrative is related of the protection states, and organizations, from the activities of hostile individuals, terrorist organizations and foreign intelligence services, to restrict access to classified documents or data of state industries. Counterintelligence should not be limited to military department, but extend to strategic organizations to support operations at the national level, as well as overseas for African nations to properly stand as sovereign states.

Historically, intelligence agencies have encountered several challenges in this crucial function. Virtually all have suffered severe security breach, like the 9/11 events in the United States of America and the continuous attack on France by religious extremist. Some of these challenges emerge from inadequate vetting measures, poor community policing, access to suitable targets and corruption. 

Intelligence operate in two dimensions, either offensive and defensive missions. Offensive mission, the entity attempts to exploit agents within foreign intelligence services to ascertain eminent operations against the state; monitor the activities of known or suspected agents of foreign intelligence services; and analyze potential operations to determine suitable targets and modus operandi of foreign intelligence services. On the contrary, the defensive mission focuses on investigation of cases of suspected espionage and prepare analyses for government and industry concerning the foreign intelligence menace. However, its necessary to note that, counterintelligence is an integral part of the entire intelligence process. As such, agencies that engage in intelligence collection, whether through human or technical means, must constantly review their strategy. 

Information Warfare

With the evolution of technology in the world, information is prime factor for every nation. “Information warfare” refers to activities undertaken by state, national or transnational actors to access electronic systems in other countries in order to obtain data from the systems, manipulating or fabricating the data, or through security breach, as well as secure activities from hostile hackers. Most African intelligence agencies have been victim of information warfare, which necessitates the reinforcement of agencies with cyber security experts, analyst and hackers, who understand the dynamics of information systems and information systems technology. An example, is Ioannis Mantzikos (2013), academic discussion on the cyber-attack on the Nigerian Secret Service Department.

Moreover, most African states infrastructure as well as corporate organizations are interconnected to automated information and control systems. Many of these systems are vulnerable to computer-based disruption, manipulation, or corruption by hostile individuals, groups, or nations. For example, most software use in Cameroon are 90% vulnerable, according to the National Agency for Information and Communication Technologies.

The protection of information in most African countries is still challenging, because of inadequate expertise or technicians working for governmental structure, with duty to protect computer networks in the public and private sector from electronic attack. Ethical hackers are now than ever needed by intelligence agency in order to limit security breach and caccess to classified files by transnational actors. For example, collecting information about “information warfare” menace posed by other countries or by terrorist group like Al Shabaab to Somalia. However, a legitimate mission for the Intelligence agency to counter the efforts of the group. 

Intelligence and power

With the fragmentation of states and proliferation of rebel groups and terrorist activities in Africa, intelligence have been politicized. Drawing from the attack of the Westgate Mall in Kenya, which the government intelligence revealed as a major spot for Al Shabaab action during a briefing, on 21 September 2012, event still took place. The intelligence equally exposed on similar attacks like that which struck Mumbai in late 2008, “Where the operatives storm into a building with guns and grenades and probably hold hostages.” On 26 September 2013, Kenyan newspapers cited a leaked National Intelligence Service (NIS) report which revealed that the NIS had briefed ministers in January 2013 and again at the beginning of September, about terrorist plans to launch simultaneous terrorist attacks in Nairobi and Mombasa around September. 

More so, 32 pages intelligence file leak, obtained by Al Jazeera, suggested five senior officials including the secretaries of interior, defence, foreign affairs, and chief of defense forces were aware of imminent threats. The senior officials were briefed on the “noticeable rise in the level of threat” starting on 13 September, eight days before the Westgate mall attack. Several security analysts told Al Jazeera that institutional rivalry and unclear command lines within Kenyan security agencies were reasons behind the failure to foil the Westgate strike. It was equally said that, Kenyan intelligence service had become politicized and appeared to be more focus on neutralizing political opponents, rather than protecting the country from internal and external aggression. The mall attack and its aftermath deepened Kenya’s ethnic and political divisions, in a country long considered as an icon of stability in a region plagued with jihadist tendencies.

The world has moved from law to war, back to law and now to war. The aftermaths of the second world war saw the emergence of the globalization period, marked with electronic warfare and electronic intelligence. With the introduction of a range of electronic breakthroughs, foremost among them the use of long-range radio signals, or radar, to guide planes and ships to their destinations, as well as the use of ‘flying birds’ or drone for counter intelligence and counter terrorism. All these electronic devices have in one way or the order help limit military casualties with modern warfare. It is necessary for nations to encourage and promote robust cyber countermeasures and awareness across the defense infrastructure and review scientific and technological advances made in academia and industry that enable rapid processing, vetting, and analysis of large volumes of data, information tagging, archival, and retrieval. The focus of intelligence enterprise in African nations must be upgraded to provide national, military and civilian leaders information sufficient to fully enable their anticipation, knowledge, understanding, management and when possible, mitigation of global security challenges. 

References

Ahmed, H. (2016) Cities under Siege: Mass Casualty Urban Terrorism Assaults. S. Rajaratnam School of International Studies (RSIS) on 5 May 2016.

“Al-Yaqin Media Center Releases Analysis of Mumbai Attacks,” Open Source CenterGMP20090209386004, 6 January 2009,https://www.opensource.gov/portal/server.pt/gateway/PTARGS_0_0_200_240_1019_43/h

Ewen MacAskill, “How French intelligence agencies failed before the Paris attacks,”The Guardian, 19 November 2015,http://www.theguardian.com/world/2015/nov/19/howfrench-intelligence-agencies-failed-before-the-paris-attacks

Sebastian Rotella, James Glanz, and David Sanger, “In 2008 Mumbai Attacks, Piles of Spy Data, but Uncompleted Puzzle,” New York Times, 21 December 2014, http://www.nytimes.com/2014/12/22/world/asia/in-2008-mumbai-a

William Rosenau, “Every room is a new battle:” The lessons of modern urban warfare,” Studies in Conflict and Terrorism, Vol. 20, No. 4 (1997),pp. 373-374.

(The Author is the Editor of crimeandmoreworld.com)

US Political History:Some of the Most Bizarre Moments

The turn up to the 2024 United States presidential election has been full of twists and turns,but believe it or not,some of the most bizarre events in American election history have happened. America has seen everything, from imprisoned politicians to election chaos.
Read More

As Aid Access Blocked,Community Soup Kitchens Feed Sudan’s Starving

With little help from the international community, those in need are being fed by community-funded soup kitchens in war-torn Omdurman, the most populated city in Sudan. As one part of Sudan faces famine for the first time in seven years, the United States and other countries have urged the warring sides to grant humanitarian organizations unfettered access.
Read More
RSS Error: WP HTTP Error: A valid URL was not provided.

Related Article

In Post-Hasina Bangladesh,Awami League Faces Uncertain…

With its leaders in jail or fleeing from justice, the party that led Bangladesh to independence and ...
October 29, 2024

In Rare Appeal, Tibetan Calls for…

A Tibetan from Sichuan province has made a rare public appeal on Chinese social media, calling on au ...
October 21, 2024

Real Estate Prices Skyrocket as Yangon…

Myanmar’s civil war is driving up housing demand in Yangon, causing rents to skyrocket as people d ...
October 20, 2024

Young Female Tibetan Cricketer Breaks into…

Jetsun Narbu, 19, aims to join the national team while highlighting her Tibetan heritage. By Dechen ...
October 11, 2024

Bangladesh Finds Infamous ‘Secret’ Detention Center…

A new Bangladesh inquiry commission said Thursday it had found an infamous “secret” detention ce ...
October 5, 2024

Tibetan Monk Jailed for 18 Months…

A Tibetan monk has been sentenced to over 18 months in prison on charges of sharing a speech by Tibe ...
September 25, 2024

Other Article

Video Report

The Lessons of War:Survival Classes Introduced…

In order to educate students lifetime lessons on survival and patriotism, Ukrainian schools have int ...
November 2, 2024
Video Report

Cybercrime in Nigeria:Inside a “hustle kingdom”

In West Africa, particularly in Ghana and Nigeria, there is a rise in informal academies known as "h ...
November 1, 2024
Video Report

Weather Damage and Arson Attacks Are…

Election officials in the Pacific Northwest states of Washington and Oregon, where ballot box arson ...
Pick of the Day

UN Security Council Meets on Threats…

Adedeji Ebo, Director and Deputy to the High Representative of the United Nations Office for Disarma ...
October 31, 2024
Video Report

US Political History:Some of the Most…

The turn up to the 2024 United States presidential election has been full of twists and turns,but be ...
Pick of the Day

UN Security Council Hears Report on…

Marko Đurić, Minister for Foreign Affairs of the Republic of Serbia, addresses the United Nations ...
October 30, 2024

[wp-rss-aggregator feeds="crime-more-world"]
Top