<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Tahoma;
panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
{font-family:Verdana;
panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
{font-family:Times;
panose-1:2 2 6 3 5 4 5 2 3 4;}
@font-face
{font-family:"Book Antiqua";
panose-1:2 4 6 2 5 3 5 3 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Book Antiqua","serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p
{mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman","serif";}
span.yshortcuts
{mso-style-name:yshortcuts;}
span.apple-style-span
{mso-style-name:apple-style-span;}
span.EmailStyle20
{mso-style-type:personal-reply;
font-family:"Calibri","sans-serif";
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='font-family:"Calibri","sans-serif";color:#1F497D'>The question of course is….are we lacking the ICT solutions or are we NOT using them….<o:p></o:p></span></p><p class=MsoNormal><span style='font-family:"Calibri","sans-serif";color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='font-family:"Calibri","sans-serif";color:#1F497D'>Case in point - a blogger Robert Alai has become very popular with the westgate incident just by using ICT solutions to gather information and share it almost realtime – now many citizens are trusting his tweets more than the official police/ministry tweets.<o:p></o:p></span></p><p class=MsoNormal><span style='font-family:"Calibri","sans-serif";color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='font-family:"Calibri","sans-serif";color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='font-family:"Calibri","sans-serif";color:#1F497D'><o:p> </o:p></span></p><div><div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'> kictanet [mailto:kictanet-bounces+bkioko=bernsoft.com@lists.kictanet.or.ke] <b>On Behalf Of </b>Matunda Nyanchama<br><b>Sent:</b> Tuesday, September 24, 2013 11:51 AM<br><b>To:</b> bkioko@bernsoft.com<br><b>Cc:</b> KICTAnet ICT Policy Discussions<br><b>Subject:</b> Re: [kictanet] Have we failed the nation yet again?<o:p></o:p></span></p></div></div><p class=MsoNormal><o:p> </o:p></p><div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>Friends<o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'> <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>Methinks ICT could really, really help in such a situation as happened in Westgate Mall, specifically with respect to preparedness. I am not privy to tools our intelligence and security organizations are using so this is not passing judgement. That said, for intelligence gathering, analysis, investigation, etc. ICT can really help.<o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'> <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>Example: if we have a suspect and the person's phone number, we can do a whole lot with this: trace relationships from call data and how tightly coupled (some tools measure the volume of calls between entities as a measure of this) those relationships are. We can monitor, from the same data, their call locations and roaming habits. And each call they make could be a point of investigation perhaps leading to other suspects. Such information can be used to disrupt their networks and activities. <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'> <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>Almost all public facilities have CCTV data. One asks whether anyone ever reviews this information for anything suspicious. My guess is this: the killers must have been at the mall some time earlier in a reconnaissance mission where they possibly mapped the place as part of their plan of attack. CCTV images, I believe could potentially show such suspicious activity despite the volume of people that frequent the mall. (BTW: many malls use such images to thwart pilfering and shoplifting; they could flag unusual activity as well if those that manage the service know what to look for.)<o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'> <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>There is more: how much does the security for the mall share with state agencies such as the police/CID, NSIS, etc.? The need for seamless integration of information sharing, analysis and action is extremely pertinent. And I think ICT tools, applications and infrastructure can be core to this as part of preparedness.<o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'> <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>After the post election violence a commission suggested better use of ICT to gather, collate, analyze and act on information. I am not sure that the security agencies went out there seeking/designing a coherent plan that could avail information for their strategic decision-making. What seems to have taken centre-stage is CCTV, which is only a component of a continuum .... <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'> <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>ICT can enable security agencies deploy their services more effectively and efficiently. Take urban and rural crime, the nature of those crimes and solutions thereof. It is possible that the kind of tactics you engage in either of those scenarios would be different. By gathering information and using that information appropriately one can be more particular/precise with an attach plan.<o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'> <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>As we mourn the dead, let's try and learn from that experience and how we could have done better. The crime may be in our failure to learn from this experience for better action/response tomorrow.<o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'> <o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'>Shukrani.<o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:10.0pt;font-family:"Times","serif";color:black'>----------------------------------------------------------------------------------------------<br>Matunda Nyanchama, PhD, CISSP; <a href="mailto:mnyanchama@aganoconsulting.com">mnyanchama@aganoconsulting.com</a><br>Agano Consulting Inc.; </span><span style='font-size:10.0pt;font-family:"Verdana","sans-serif";color:black'><a href="http://www.aganoconsulting.com/" target="_blank"><span style='font-family:"Times","serif"'>http://www.aganoconsulting.com/</span></a>; Twitter: <a href="http://twitter.com/#%21/nmatunda" target="_blank"><span class=yshortcuts><span style='color:#366388'>nmatunda; </span></span></a>Skype: okiambe</span><span style='font-size:10.0pt;font-family:"Times","serif";color:black'><br>----------------------------------------------------------------------------------------------</span><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'><o:p></o:p></span></p></div><div><p class=MsoNormal><span style='font-size:10.0pt;font-family:"Times","serif";color:black'>Manage your ICT risks! We are the experts you need! The trusted partners you deserve!</span><span style='font-size:14.0pt;font-family:"Times","serif";color:black'><o:p></o:p></span></p></div><div><p class=MsoNormal style='background:white'><span style='font-size:10.0pt;font-family:"Times","serif";color:black'>Call: <b>+1-888-587-1150 (Canada) +254-20-267-0743 (Kenya) </b>or <span class=MsoHyperlink><b>info@aganoconsulting.com</b></span></span><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'><o:p></o:p></span></p></div><div><p class=MsoNormal><b><span style='font-family:"Times","serif";color:blue'>Licensed by Communications Commission of Kenya (CCK)</span></b><span style='font-size:14.0pt;font-family:"Times","serif";color:blue'><o:p></o:p></span></p></div><div><p class=MsoNormal><i><span style='font-size:10.0pt;font-family:"Times","serif";color:blue'> ----------------------------------------------------------------------------------------------<o:p></o:p></span></i></p></div><div><div><p class=MsoNormal style='background:white'><span style='font-size:10.0pt;font-family:"Times","serif";color:black'>"The best revenge is massive success" - Frank Sinatra<o:p></o:p></span></p></div><p class=MsoNormal style='background:white'><span style='font-size:14.0pt;font-family:"Times","serif";color:black'>-----------------------------------------------------------------------------------------------<br></span><span style='font-size:7.5pt;font-family:"Times","serif";color:black'>This e-mail, including attachments, may be privileged and may contain confidential or proprietary information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.</span><span style='font-size:14.0pt;font-family:"Verdana","sans-serif";color:black'><o:p></o:p></span></p></div></div></div></body></html>