<html><body><div style="color:#000; background-color:#fff; font-family:arial, helvetica, sans-serif;font-size:12pt"><div style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span>Friends</span></div><div style="font-family: 'Times New Roman'; font-size: 16px; color: rgb(0, 0, 0); background-color: transparent; font-style: normal;"><span><br></span></div><div style="font-family: 'Times New Roman'; font-size: 16px; color: rgb(0, 0, 0); background-color: transparent; font-style: normal;">National Task Force on Police Reforms (created following the post-election violence of 2008) was presented with various views and made certain recommendations. I have included below some views and recommendations pertaining to technology.</div><div style="font-family: 'Times New Roman'; font-size: 16px; color: rgb(0, 0, 0); background-color: transparent; font-style: normal;"><br></div><div style="background-color: transparent;">May be the Kenyan Police have
 a roadmap towards effective use of ICTs. For example what would be priority: automating the occurrence book (and use of intelligent data mining to design effective/efficient solutions), HR, Finance, etc or CCTV? </div><div style="background-color: transparent;"><br></div><div style="background-color: transparent;">On our part, we did prepare an unsolicited proposal in which we suggested a diligent approach to technology needs for policing, which would result in prioritization. We later learnt that the priority they had was acquiring CCTV, an idea we felt was being pushed by CCTV vendors rather than security priorities.</div><div style="background-color: transparent;"><br></div><div style="background-color: transparent; color: rgb(0, 0, 0); font-size: 16px; font-family: 'Times New Roman'; font-style: normal;">NB: Kshs 8.5 billion? I hope someone has a good rationale. </div><div style="background-color:
 transparent;"><br></div><div style="background-color: transparent; color: rgb(0, 0, 0); font-size: 16px; font-family: 'Times New Roman'; font-style: normal;">Here are the police views according to the report</div><div style="background-color: transparent;"><div class="MsoNormal" style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;
margin-left:18.0pt;text-align:justify;text-indent:-18.0pt;line-height:130%;
mso-list:l0 level1 lfo1;tab-stops:list 0cm"><!--[if !supportLists]--><i><span lang="EN-US" style="line-height: 130%; font-family: Verdana, sans-serif;">a)<span style="font-style: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">   </span></span></i><!--[endif]--><i><span lang="EN-US" style="line-height: 130%; font-family: Verdana, sans-serif;">Communication
equipment within the police, particularly in rural areas, were found to be
either absent, non-functional, or poor and outdated. This directly undermines
the ability by members to access <b>telephones,
mobile phones or internet facilities</b> to enable them to undertake their
normal policing functions. Police investigators routinely use their personal
mobile phones for official purposes, as they have no access to police
communication systems. The Task Force was also informed that some criminals
have superior communication equipment to that of the police, which enables them
to intercept police communications. <o:p></o:p></span></i></div>

<div style="background-color: transparent;"><i style="line-height: 130%; text-align: justify; text-indent: -18pt; background-color: transparent;"><span lang="EN-US" style="line-height: 130%; font-family: Verdana, sans-serif;">b)<span style="font-style: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">   </span></span></i><i style="line-height: 130%; text-align: justify; text-indent: -18pt; background-color: transparent;"><span lang="EN-US" style="line-height: 130%; font-family: Verdana, sans-serif;">The
investigative function of the police has been weakened by inadequate crime
intelligence, <b>lack of modern technology</b>,
reduced operational autonomy of the CID, transfer practices, and a re-active ‘fire
fighting’ approach to policing.</span></i><span style="background-color: transparent;"> </span><br></div><div style="color: rgb(0, 0, 0); font-family: 'Times New Roman'; font-size: 16px; font-style: normal;"><br></div></div><div style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"></div><div style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"> <span style="font-family: Verdana, sans-serif; line-height: 130%; text-align: justify;">The Task Force noted that:</span></div>

<div class="MsoNormal" style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;
margin-left:18.0pt;text-align:justify;text-indent:-18.0pt;line-height:130%;
mso-list:l0 level1 lfo1;tab-stops:list 0cm"><!--[if !supportLists]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif";mso-fareast-font-family:
Verdana;mso-bidi-font-family:Verdana">a)<span style="font-style: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">   </span></span></i><!--[endif]--><b><i><span lang="EN-US" style="mso-bidi-font-size:11.0pt;line-height:130%;font-family:"Verdana","sans-serif"">Information
and Communication Technology (ICT): </span></i></b><i><span lang="EN-US" style="mso-bidi-font-size:11.0pt;line-height:130%;
font-family:"Verdana","sans-serif"">The police services lack the basic ICT
knowledge and skills, equipment and infrastructure. The lack of an effective
electronic network and communication system, which connects police stations,
undermines the ability of the police to use simple and cheap communication
systems for policing purposes. The police are further not able to key in and
preserve crucial information and data that would ordinarily help them not only
track criminals but also to inform them on crime patterns or trends as well as
assisting in case management.  <a name="_Toc243915479" href=""></a><a name="_Toc243914087" href=""></a><a name="_Toc243752869" href=""></a><a name="_Toc243752219" href=""></a><a name="_Toc243612624" href=""></a><a name="_Toc243612151" href=""><o:p></o:p></a></span></i></div>

<div class="MsoNormal" style="margin-top:0cm;margin-right:0cm;margin-bottom:6.0pt;
margin-left:18.0pt;text-align:justify;text-indent:-18.0pt;line-height:130%;
mso-list:l0 level1 lfo1;tab-stops:list 0cm"><!--[if !supportLists]--><i><span lang="EN-US" style="mso-bidi-font-size:11.0pt;line-height:130%;
font-family:"Verdana","sans-serif";mso-fareast-font-family:Verdana;mso-bidi-font-family:
Verdana">b)<span style="font-style: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">  
</span></span></i><!--[endif]--><b><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif"">Cyber crime</span></i></b><b><i><span lang="EN-US" style="mso-bidi-font-size:11.0pt;line-height:130%;font-family:"Verdana","sans-serif"">:
</span></i></b><i><span lang="EN-US" style="mso-bidi-font-size:11.0pt;line-height:130%;font-family:"Verdana","sans-serif"">This
Task Force noted the increase in the use of information technology in the
commission of crimes including complex frauds, computer hacking, credit cards
scams, spreading of computer viruses, facilitation of human trafficking and
child pornography using internet. It was clear that most police officers lack
the most basic I.C.T. knowledge. <o:p></o:p></span></i></div><div style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><div class="Ubodytext" style="margin-bottom:6.0pt;line-height:130%"><span style="font-size:11.0pt;line-height:130%;mso-ansi-language:EN-CA">The Task
Force recommended, <i>inter alia</i>,<o:p></o:p></span></div>

<div class="MsoNormalCxSpFirst" style="margin-top:0cm;margin-right:0cm;margin-bottom:
6.0pt;margin-left:17.0pt;mso-add-space:auto;text-align:justify;text-indent:
-17.0pt;line-height:130%;mso-list:l0 level1 lfo1;tab-stops:list 17.0pt"><!--[if !supportLists]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif";mso-fareast-font-family:
Verdana;mso-bidi-font-family:Verdana">(a)</span></i><!--[endif]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif"">That the tooling,
logistical and technological capacity of the police services be reviewed to
establish the exact needs and specification in order to bring policing to
international standards. Consideration should be given to prioritizing
Communication and information technology and transportation.<o:p></o:p></span></i></div>

<div class="MsoNormalCxSpMiddle" style="margin-top:0cm;margin-right:0cm;margin-bottom:
6.0pt;margin-left:17.0pt;mso-add-space:auto;text-align:justify;text-indent:
-17.0pt;line-height:130%;mso-list:l0 level1 lfo1;tab-stops:list 17.0pt"><!--[if !supportLists]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif";mso-fareast-font-family:
Verdana;mso-bidi-font-family:Verdana">(b)</span></i><!--[endif]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif"">That the use of
CCTV cameras as a policing component particularly in major cities and our
highways be incorporated in the National Policing Plan. The police should
coordinate with the private sector to maximize and synchronize the use of CCTV
to combat crime.<o:p></o:p></span></i></div>

<div class="MsoNormalCxSpMiddle" style="margin-top:0cm;margin-right:0cm;margin-bottom:
6.0pt;margin-left:17.0pt;mso-add-space:auto;text-align:justify;text-indent:
-17.0pt;line-height:130%;mso-list:l0 level1 lfo1;tab-stops:list 17.0pt"><!--[if !supportLists]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif";mso-fareast-font-family:
Verdana;mso-bidi-font-family:Verdana">(c)<span style="font-style: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';"> </span></span></i><!--[endif]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif""> Legislation needs to be developed to make
electronic, audio-visual, computer data and photographic evidence to be
admissible in court.  <o:p></o:p></span></i></div>

<div class="MsoNormalCxSpMiddle" style="margin-top:0cm;margin-right:0cm;margin-bottom:
6.0pt;margin-left:17.0pt;mso-add-space:auto;text-align:justify;text-indent:
-17.0pt;line-height:130%;mso-list:l0 level1 lfo1;tab-stops:list 17.0pt"><!--[if !supportLists]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif";mso-fareast-font-family:
Verdana;mso-bidi-font-family:Verdana">(d)</span></i><!--[endif]--><i><span lang="EN-US" style="mso-bidi-font-size:
11.0pt;line-height:130%;font-family:"Verdana","sans-serif"">That the capacity
of Forensic Science Service Department (FSSD) be enhanced within the
Directorate of Criminal Investigations to be staffed by civilian experts to
enable the police concentrate on their core duties.<o:p></o:p></span></i></div></div><div style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><font size="2"><span style="font-family: times, serif;">----------------------------------------------------------------------------------------------</span><br style="font-family: times, serif;"></font><font size="2"><span style="font-family: times, serif;">Matunda Nyanchama, PhD, CISSP; mnyanchama@aganoconsulting.com</span><br style="font-family: times, serif;"><span style="font-family: times, serif;">Agano Consulting Inc.;  </span><a rel="nofollow" style="font-family: times, serif;" target="_blank" href="http://www.aganoconsulting.com/">www.aganoconsulting.com</a>; </font><font class="Apple-style-span" size="2">Twitter: <a rel="nofollow" target="_blank" href="http://twitter.com/#%21/nmatunda"><span class="yshortcuts" id="lw_1298476732_5" style="color:rgb(54, 99, 136);">nmatunda; 
 </span></a></font><font class="Apple-style-span" size="2"><span style="text-decoration:underline;"></span>Skype: okiambe</font><font size="2"><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; font-size: medium; font-family: 'Book Antiqua';"><span class="Apple-style-span" style="font-size: 11px; font-family: verdana, helvetica, sans-serif;"></span></span><br style="font-family: times, serif;"><span style="font-family: times, serif;">----------------------------------------------------------------------------------------------</span><span style="font-style: italic; font-family: times, serif;"></span><span style="font-family: times, serif;" lang="EN-CA"></span></font></div><style><!--filtered {font-family:"Book
 Antiqua";panose-1:2 4 6 2 5 3 5 3 3 4;}p.MsoNormal, li.MsoNormal, div.MsoNormal  {margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Book Antiqua";}p  {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:"Times New Roman";}filtered {margin:1.0in 1.25in 1.0in 1.25in;}div.Section1  {}--></style><div style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: times, serif;"><span style="font-size:10pt;">Be prepared for ICT security failures & know how to respond when they happen! <br>Call: <span style="font-weight:bold;">+1-888-587-1150 </span>or <a rel="nofollow" href=""><span style="font-weight:bold;">info@aganoconsulting.com</span></a><br><span style="font-style:italic;"> </span></span></span><span style="font-family: times, serif;">----------------------------------------------------------------------------------------------</span><span style="font-style: italic; font-family: times,
 serif;"></span><span style="font-family: times, serif;" lang="EN-CA"></span></div><style>filtered {font-family:"Book Antiqua";}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in 0in 0.0001pt;font-size:11pt;font-family:"Book Antiqua";}p {margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman";}filtered {margin:1in 1.25in;}div.Section1 {}</style><div style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: times, serif; font-size: 13px;"><div class="MsoPlainText">"The best revenge is massive success" - Frank Sinatra<span style="font-style:italic;"></span></div></span><span style="font-family: times, serif;">-----------------------------------------------------------------------------------------------</span><br style="font-family: times, serif;"><font style="font-family: times, serif;" size="1">This e-mail, including attachments, may be privileged and may contain confidential or proprietary
 information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.</font><br></div></div></body></html>