<html><body><div style="color:#000; background-color:#fff; font-family:verdana, helvetica, sans-serif;font-size:14pt"><div><span>Friends</span></div><div><span></span> </div><div><span>Methinks ICT could really, really help in such a situation as happened in Westgate Mall, specifically with respect to preparedness. I am not privy to tools our intelligence and security organizations are using so this is not passing judgement. That said, for intelligence gathering, analysis, investigation, etc. ICT can really help.</span></div><div><span></span> </div><div><span>Example: if we have a suspect and the person's phone number, we can do a whole lot with this: trace relationships from call data and how tightly coupled (some tools measure the volume of calls between entities as a measure of this) those relationships are. We can monitor, from the same data, their call locations and roaming habits. And each call they make could be a point of
investigation perhaps leading to other suspects. Such information can be used to disrupt their networks and activities. </span></div><div><span></span> </div><div><span>Almost all public facilities have CCTV data. One asks whether anyone ever reviews this information for anything suspicious. My guess is this: the killers must have been at the mall some time earlier in a reconnaissance mission where they possibly mapped the place as part of their plan of attack. CCTV images, I believe could potentially show such suspicious activity despite the volume of people that frequent the mall. (BTW: many malls use such images to thwart pilfering and shoplifting; they could flag unusual activity as well if those that manage the service know what to look for.)</span></div><div><span></span> </div><div><span>There is more: how much does the security for the mall share with state agencies such as the police/CID, NSIS, etc.? The need for
seamless integration of information sharing, analysis and action is extremely pertinent. And I think ICT tools, applications and infrastructure can be core to this as part of preparedness.</span></div><div><span></span> </div><div><span>After the post election violence a commission suggested better use of ICT to gather, collate, analyze and act on information. I am not sure that the security agencies went out there seeking/designing a coherent plan that could avail information for their strategic decision-making. What seems to have taken centre-stage is CCTV, which is only a component of a continuum .... </span></div><div><span></span> </div><div><span>ICT can enable security agencies deploy their services more effectively and efficiently. Take urban and rural crime, the nature of those crimes and solutions thereof. It is possible that the kind of tactics you engage in either of those scenarios would be different. By gathering
information and using that information appropriately one can be more particular/precise with an attach plan.</span></div><div><span></span> </div><div><span>As we mourn the dead, let's try and learn from that experience and how we could have done better. The crime may be in our failure to learn from this experience for better action/response tomorrow.</span></div><div><span></span> </div><div><span>Shukrani.</span></div><div><font size="2"><span style="font-family: times, serif;">----------------------------------------------------------------------------------------------</span><br style="font-family: times, serif;"></font><font size="2"><span style="font-family: times, serif;">Matunda Nyanchama, PhD, CISSP; mnyanchama@aganoconsulting.com</span><br style="font-family: times, serif;"><span style="font-family: times, serif;">Agano Consulting Inc.; </span><a style="font-family: times, serif;" href="http://www.aganoconsulting.com/"
target="_blank" rel="nofollow">http://www.aganoconsulting.com/</a>; </font><font class="Apple-style-span" size="2">Twitter: <a href="http://twitter.com/#%21/nmatunda" target="_blank" rel="nofollow"><span class="yshortcuts" id="lw_1298476732_5" style="color: rgb(54, 99, 136);">nmatunda; </span></a></font><font class="Apple-style-span" size="2"><span style="text-decoration: underline;"></span>Skype: okiambe</font><font size="2"><span class="Apple-style-span" style="color: rgb(0, 0, 0); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2;"><span class="Apple-style-span" style="font-family: verdana, helvetica, sans-serif; font-size: 11px;"></span></span><br style="font-family: times, serif;"><span style="font-family: times,
serif;">----------------------------------------------------------------------------------------------</span></font></div><div style="color: rgb(0, 0, 0); font-family: times, serif; font-style: normal; background-color: transparent;"><span style="font-family: times, serif;"><font size="2">Manage your ICT risks</font></span><span style="line-height: 1.22; font-family: times, serif; font-size: 10pt;">! We are the experts you need! The trusted partners you deserve!</span></div><div><span style="font-family: times, serif;"><span style="font-size: 10pt;">Call: <span style="font-weight: bold;">+1-888-587-1150 (Canada) +254-20-267-0743 (Kenya) </span>or <a href="" rel="nofollow"><span style="font-weight: bold;">info@aganoconsulting.com</span></a></span></span></div><div style="color: rgb(0, 0, 255); font-family: times, serif; background-color: transparent;"><span style="line-height: 16px; font-size: 16px; font-weight: bold;">Licensed by Communications
Commission of Kenya (CCK)</span></div><div style="color: rgb(0, 0, 255); font-family: times, serif; font-size: 13px; font-style: italic; background-color: transparent;"><span style="font-family: times, serif;"><span style="font-size: 10pt;"><span style="font-style: italic;"> </span></span></span><span style="font-family: times, serif;">----------------------------------------------------------------------------------------------</span><span style="font-family: times, serif; font-style: italic;"></span><span lang="EN-CA" style="font-family: times, serif;"></span></div><style>filtered {font-family:"Book Antiqua";}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in 0in 0.0001pt;font-size:11pt;font-family:"Book Antiqua";}p {margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman";}filtered {margin:1in 1.25in;}div.Section1 {}</style><div><span style="font-family: times, serif; font-size: 13px;"><div class="MsoPlainText">"The best
revenge is massive success" - Frank Sinatra<span style="font-style: italic;"></span></div></span><span style="font-family: times, serif;">-----------------------------------------------------------------------------------------------</span><br style="font-family: times, serif;"><font size="1" style="font-family: times, serif;">This e-mail, including attachments, may be privileged and may contain confidential or proprietary information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.</font><br></div><style><!--filtered {font-family:"Book Antiqua";panose-1:2 4 6 2 5 3 5 3 3 4;}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Book
Antiqua";}p {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:"Times New Roman";}filtered {margin:1.0in 1.25in 1.0in 1.25in;}div.Section1 {}--></style></div></body></html>