Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

CHAPTER ONE

1.0. INTRODUCTION
In the past few years, it became obvious that there exists close connections
between ICT and national security, which plays an important role in securing
the necessary level of national safety and defense of the nation (Snow, 1987).
The notion ‘’ Security’’ is defined as status of defense of the life-important
interests of the personality, the society and the state against internal and
external dangers. When defining the security problem the traditional notion ‘’
state security’’ is expanded taking into account not only the state interests, but
also those of the person and the society and some non-military threats-
economic, information etc. are included as a destabilizing
factor(Albatros,1998). ICT is very important to the national security. It is a
bridge between the present day and the future.
Nigeria is experiencing rapid transformation and population growth. Security
and insecurity are hot topics both in relation to these dynamics of change to the
risks violence and instability pose for the process of regional integration,
growth and poverty reduction.
Nigeria is experiencing rapid transformation and population growth. Security
and insecurity are hot topics both in relation to these dynamics
of change to the risks violence and instability pose for the process of regional
integration, growth and poverty reduction.
1.1. BACKGROUND OF THE STUDY
I CT (Information and Communication Technology) is a widely defined term
that has several meanings across different sectors. Though, essentially, it is used
as an umbrella term to refer to the use of communication devices (such as radio
and cellular devices, satellite devices and channels, computers, amongst others)
and utilities (programs) to manage information (acquisition, dissemination,
processing, storage and retrieval).

1
Thus, ICT has consistently been proven a powerful double-edged sword with a
capability for both overwhelming good and devastating evil, all depending on
the skills and values of the user(s) in harnessing its powers in either or both
directions. There is general agreement among historians that insecurity have
been the core cause of bloodshed in Nigeria and the world at large.
Information is the fact about a person, group, event, situation, company, country
(Adelekan ,2008). Communication is the process of passing information from
one person or group to one another. When the communication process makes
use of devices and systems which transmit electronic or optical signals over
long distances, it is more appropriately referred to as telecommunications. The
methods and devices used in gathering information and communicating it are all
included in the ICT. The ICT process has changed social relationships between
mankind for the better, so it is applicable to security. These definitions therefore
encompass the full range of ICT from Radio, T.V to telephones, computers and
the internet. Heeks (1999) in his own contribution defined ICTs as electronic
devices for computing, processing, storing and communicating information. He
categorized these devices into; digital information (which comprises of
computer hardware, Software and networks) and intermediate technology
(which is based on analogue information waves like radio, T.V and telephones).
Okpara (2004) sees ICT as the science of extracting, collating, storing,
processing, utilizing and disseminating data. In simple term, such technology
involves the use of data processor, facsimile machines, high speed modern
printing machines, computer software, high resolution monitors and various
storage facilities.
1.2 SCOPE OF THE STUDY
The essence of this research work is to primarily study the role of Information
Technology as a medium of solving National Security Challenge. The research
intends to focus on Nigeria’s security situation.

2
1.3 AIM AND OBJECTIVES OF THE STUDY
The aim of this Study is to determine how National Security can be achieved
through Information Technology and to determine the relationship between
Information Technology and National Security.
The Objectives of this research are
1. To find out the various ways in which Information Technology can impact
positively on National Security
2. To find out reasons why Information Technology has not been able to help in
achieving full National Security in Nigeria
1.4 DEFINITION OF TERMS
1. SECURITY: is freedom from, or resilience against, potential harm (or
other unwanted coercive change) caused by others.
2. NATIONAL SECURITY: is the security of a nation state, including its
citizens, economy, and institutions, which is regarded as a duty of
government.
3. DEFENSE: has to do with protecting something or fighting against an
opponent.
4. MILITANT: favoring confrontational or violent methods in support of a
political or social cause.
5. INSURGENCES: an act of rebellion; insurrection; revolt.
6. SECURITY PERSONNEL: is a person employed by a public or private
party to protect the employing party’s assets (property, people,
equipment, money, etc.) from a variety of hazards (such as waste,
damaged property, unsafe worker behavior, criminal activity such as
theft, etc.) by enforcing preventative measures.
7. FIREWALL: Part of a computer system that is designed to prevent
people from getting information without authority
8. INTERNET: international network, connecting other networks and
computer together

3
9. SABOTAGE: Act of deliberate damage to equipment
10.CYBERSPACE: the imaginary place where electronic messages exist
while they are being sent between computers

4
CHAPTER TWO
2.0 LITERATURE REVIEW
We shall clarify some concepts and review some literature with regards to
developing the Topic in Nigeria:
a) National Security
National security is the ability to preserve the nation’s physical integrity and
territory; to maintain its economic relations with the rest of the world on
reasonable terms; to preserve its nature, institution, and governance from
disruption from outside; and to control its boarders (Harold 1983).
b) Information technology
Information and Communication Technology is defined as technology that will
facilitate communication and the processing and transition of information by
electronic means (Adelekan, 2008).
According Bamiro (2011) defined ICT as the use of electronic devices for
sending-out, storing and receiving information. Information and
communications technology is an umbrella that involves any communication
application or device, encompassing; television, radio, satellite systems, cellular
phones, computer hardware and software.
c) Nigeria Security Challenges
National security is important not only to the government, but to the nation as a
whole. National security serves many purposes. First of all, the armed forces are
a very important aspect of national security. The Federal Republic of Nigeria
has a very strong military to help ensure that the nation stays safe and the
citizens well secured, however Nigeria's security concerns and threat
perceptions emanated from many quarters, these includes the threat of sects like
Boko Haram, high level of unemployed youths, Militant from the oil rich Niger
delta, ritual killings and kidnappings, the high rate of inequality, influx of illegal
migrants from the neighboring countries, emergence of political and regional

5
thugs, and the collapse of the justice system . In addition, when threats are
directed at the country there is an attempt to keep these threats isolated.
National security is also concerned with emergency preparedness among many
other things.
In 2010, United State of America listed Nigeria among countries that are prone
to terrorism. This followed a failed attempt by a 23 year old Nigerian Umar
Farouk Abdul mutalab to blow up a commercial plane at Detroit Michigan.
Though the Nigerian government protested by saying “Abdul mutalab’s
behavior is not reflective of Nigeria and should not be used as a yardstick to
judge all Nigerians.” It must clear to the Nigerian government today that
terrorism, the want on criminal acts of kidnapping, hostage taking, bomb blast
and various crises in different locations in the country are signals of insecurity
which can lead to anarchy if not addressed and arrested. Terrorism is the most
alarming criminal acts and the major challenge of the government and the
Nigerian people. It is noted that: Between January to August 2011, over 50
attacks have been launched on the police, military and individuals including
several assassinations by Boko Haram.
These attacks have exposed the weakness in the Nigerian security. The Nigerian
security forces in their present state do not appear to be in a position to defeat
the terrorist and kidnappers. Between 1999 and 2005, it was noted that Nigeria
witnessed over 90 violent ethno – religious communal political conflicts of
varying intensities and magnitude.
The central pillar of Nigerian national security policy includes safe guarding the
sovereign, independence and territorial integrity of the Nation. The other
guiding principles of the security policy are African unity and independence,
non-intervention in the internal affairs of other states, and regional economic
development and security cooperation. The Subordinate goals included military
self-sufficiency and regional leadership. In pursuing these goals, Nigeria has
been very diplomatic and flexible, but it employed coercive methods or

6
measured force when necessary. The country has been an active participant in
the United Nations (UN), the African Union (AU), and ECOWAS.
d) Information Technology and National Security
Information technology (IT), as defined by the Information Technology
Association of America (ITAA), is "the study, design, development,
implementation, support or management of computer-based information
systems, particularly software applications and computer hardware." IT deals
with the use of electronic computers and computer software to convert, store,
protect process, transmit, and securely retrieve information. Today, the term
information has ballooned to encompass many aspects of computing and
technology, and the term has become very recognizable.
Specifically, IT will help enable the nation to identify potential threats, share
information more readily, includes authentication, availability, containment,
detection and identification, privacy, recovery, and new security models);
Information fusion (Information fusion includes research in data and text
mining, data integration, language technologies, image and video processing,
and evidence combination), and critical infrastructure-based as recommended
by a National Research Council Committee on Science and Technology for
Countering Terrorism in the USA.
e) Some Security Challenges in Nigeria
• Poverty and unemployment
• Insurgences – Bokoharam, militants, religious or ethnic wars
• Insecurity of lives – kidnapping, armed robbery, ritual killings
• Corruption – Rigging of election, fake licenses, etc.
• Theft – Oil pipeline, public funds or piracy
• Information security – defacing government websites, theft of critical data,
Denial of Service attacks
• Insider threats - Moles within security agencies, disgruntled employees
• Over-reliance on foreign technology

7
• Inadequate regulations: e.g. cyber security and the most recent
• Farmers/Herdsmen clashes
f) Emerging Opportunities for Security Management
The integration of information technology and emergency management presents
significant opportunities for innovation in the way to assess, manage, and
respond to security challenges. Most technologies today are increasingly
mobile, highly integrated, and inherently flexible. From social networking sites
to geospatial imaging, the society today can take advantage of emerging tools to
address critical security needs.
g) GPS Technology
GPS-enabled devices can also help citizens signal for help when emergency
situations arise. For example cell phones with Rave Guardian software, can
activate a timer on their device when they would like surveillance from the
police.
h) Social Networking Tools
To reach members of the society who are constantly connected to the Web and
actively creating and sharing content in their own time, security agencies
should be turning to familiar social networking tools to share news and
strategies for community security. Social networking sites like Facebook and
MySpace will usually allow communities to create pages that store information
about security plans, emergency procedures, and community events. The
widespread popularity of networks like YouTube can create
Opportunities for security agencies to educate through quick, entertaining
videos and podcasts, these can easily be shared and stored. Members of the
society are encouraged to become “friends” with security agents on Facebook
and MySpace; this can create an alternate pathway for pushing information to
the wider community. Facebook and MySpace Allow members of the
community to add their own commentary through “on the scene” reporting,
sharing messages with security agents.

8
i) Virtual Emergency Operations Centers
Physical emergency-operation centers (EOCs) can be used as a hub of
community response in times of emergency. Communities can consider
supplementing physical locations with virtual EOCs; these can coordinate
response teams across geographic areas. It is noted that a virtual EOC
dashboard can store and integrate unit response plans, incident reports, and
operational reports from a variety of community agencies. A single user can
access the virtual EOC to send communications through various channels to
relevant players. In cases when the physical communities are unreachable or
unsafe, the virtual EOC provides a safe and accessible alternative to coordinate
groups across the wider community
j) Intelligent Monitoring
Important buildings and business areas in Nigeria must turn to using new
advances in intelligent monitoring, from biometrics and speech-recognition
software to intelligent video and swipe-card access to such buildings. These
must be done by striking a balance between security and openness, personal
freedoms and reasonable expectations of privacy must be maintained.
k) Data Mining and Database Tracking
One of the most frequent barriers to effective emergency management generally
is a lack of communication between security agencies. Greater communication
might include sharing case studies that showcase best practices or offering open
solutions to the society needs on security issues. The government must
encourage information sharing and open dialogue between all the security
agencies in the society. For example all personnel in the agencies must have e-
mail addresses and subscribe to a discussion group where they can chat and
share ideas real time online.

9
CHAPTER THREE
3.0 DISCUSSION
3.1 ACTORS IN THE SECURITY SYSTEMS
Security system requires a wide range of actors and their roles, responsibilities
and actions must be defined in a way that is compatible with the establishment
of sound democratic governance, principles, transparency, and the rule of laws.
The following are the actors in the security system of a nation:
Core security actors: Armed forces, Police, Paramilitary forces, presidential
guards, military and civilian intelligence and security services, custom
authorities, civil defence etc.
1. Security management and oversight bodies: Executives institutions of
national government, national security advisory bodies, legislature and
legislative select committees, ministries of defence, internal affairs, foreign
affairs, traditional authorities and local authorities, financial management
bodies such as ministries, budget offices, financial audit and planning units
and chief security officers e.g civilian review boards, public complaints
commissions.

2. Justice and law enforcement institutions: Judiciary, justice ministries,


prisons, criminal investigation and prosecution services, human rights
commissions, customary and traditional justice systems.
3. Non statutory security forces: Private security companies, political party
militias, private armies and body guards units (Snow, 1987).
3.2 MEASURES TO MAINTAIN NATIONAL SECURITY
Measures taken to maintain national security includes:
d) Using diplomacy to rally allies and isolate threats.
e) Marshaling economic power to facilitate or compel cooperation.
f) Maintaining effective armed forces.

10
g) Implementing civil defence and emergency preparedness measures
including anti-terrorism legislation.
h) Ensuring the resilience and redundancy of critical infrastructure.
i) Using intelligence services to detect and defeat or avoid threats and
espionage, and to protect classified information.
j) Using counterintelligence services or secret police to protect the nation
from national threats.
3.3 ICT AS A MEDUIM OF SOLVING NATIONAL SECURITY
i. The pervasiveness of ICT has brought about rapid technological,
social, political and economic transformation, which eventuated in a
network society organized around ICT (Yusuf, 2005).
ii. It provides real opportunities for security personnels.
iii. It strengthens and provides opportunities for connection among the
countries of the world.
iv. ICT provides opportunities for security personnel’s to communicate
one another through e-mail, SMS, radio phone .etc. so as to provide
information concerning security situation in the country.
v. It also provides quicker and easier access to more extensive current
information that can be used to carry out security operations.
vi. It provides security operatives with a steady avenue for the
dissemination of security reports and findings.
3.4 PROBLEMS OF INFORMATION AND COMMUNICATION
TECHNOLOGY AND NATIONAL SECURITY
i. Problem of higher education/economy: Educational institutions help
to develop the economy of a nation through various researches and
human development. For example US is the most powerful nation in
the world today because its economy is the greatest and this made
possible through the contribution of various colleges and universities.

11
ii. Poor funding and utilization of ICT equipment: The problem of
poor funding and bad utilization of fund can be seen in the light of
government and NGO’s not providing adequate money to purchase
necessary equipment and gadget needed to pursue security.
iii. Poor governance and corruption: Our leaders have not being able to
do anything on the high level of corruption in the country and this is
affecting ICT and security in the country particularly the present day
government have not being able to do much in internet fraud.
iv. Unpatriotic conducts of security personnel: Most of our security
personnel are not devoted to their assignment due to poor
incentives/motivation.
v. Divided loyalty among security personnel: Loyalty to the nation is
being eroded from some of the security personnel.
• Poor and erratic power supply: The epileptic and sinusoidal nature of the
power supply has being a great and concurrent problem affecting the ICT
usage for national security.
• Inadequate competent manpower: Competent manpower in the country
are not enough to handle ICT. Also, some drift out of the country in search
of greener pasture in overseas countries have negatively affected ICT usage
and operations in the country.
• Poor infrastructural development: The nature of the infrastructure e.g
road, railway, and air etc. are nothing to write home about and this does not
create room for ICT development as a tool for security.

12
CHAPTER FOUR
4.0 SUMMARY, CONCLUSION AND RECCOMMENDATION
4.1 SUMMARY
To adequately address Nigerian security challenges, modern intelligence
gathering devices must be acquired and deployed by security services, like the
police, the SSS, the Army, the Navy, the Air Force and other Para - military .
Surveillance system that can monitor most sensitive equipment and public
places must be put in place. Real time communication systems that will enable
information sharing must be installed.
Adequate scanning of imported goods using modern scanners that can detect
weapons and other materials used in making bombs and explosives must be put
in place. There is need for adequate border patrol and use of GIS and
surveillance equipment to monitor people and weapon proliferations. There is
need to ensure the loyalty of security agents because lack of loyalty can cause
the leak of security information to agents of destabilization in the Country.
4.2 RECOMMENDATIONS
The under listed are the recommendations which may help in the use of ICT for
national security:
i. Government should look into the improvement of higher education
and economy.
ii. Government should pay more attention to the funding of ICT so
that it can be of greater help as tools in monitoring security system.
iii. Our leaders should exhibit good moral character in their
governance and eradicate corruption in the society. They should foster a
democratic political order, buttressed by physical safety and economic
growth, which helps to protect and empower people.
iv. Power sector should be adequately funded so that the supply of
power will be useful for the operation of ICT so that it will be easier for
the security stakeholders to perform their civic duties.

13
v. The people saddled with the responsibilities of ICT usage should
be sent to conferences, workshops and seminars when the need arises to
update their knowledge about the current issues on ICT.
4.3 CONCLUSION
Information technology has led to successful practices in Nigeria. The
information technology has being able to provide information which is
abundant. Though the use of ICT and internet are available in large numbers
than ever before and they have positively impacted on security and made it
more worthwhile and efficient.
In order to improve on the use of ICT in national security, the government
should encourage the development of information technology in Nigeria.
However, the recommendations proffered in this paper if strictly adhered to by
the government might be a way of boosting the exposition of ICT as a tool to
salvage the country from internal and external aggression. Nigeria should
therefore, quicken the pace of development and embrace technology as a re-
engineering strategy to bring about security revolution in Nigeria.

14
REFERENCES
Adelekan, B.A. (2008). Comprehensive Basic Technology for junior
secondary schools Bk 2, Lagos: Literamed Publications Nig Ltd.
Pp 2-5
Albatros, S. (1998). Alternatives of the policy of security of Republic of
Bulgeria under the Conditions Democratic transition (ed.
G.Genev). Bulgeria.
Aliyu, Z.T (2007) Board of Information and Communication Technology
(ICT) in Teacher Education on studies in Education: Theory and
practice. Alvari Communication Ltd. Jimeta- Yola.pp 30-35
Arokoyo,T.(2005). ICTs Application in Agricultural Extension Services
Delivery, Agricultural Extension Society of Nigeria.(1)13-14
Bamiro, O.A,(2011). Mastery of Technology for Junior School
Certificates Examination. Ibadan: Evans Publishers. Pp 343-347
Okpara, F.O.(2004). Modern Information Technology and the Re-
engineering Business Organizations in Nigeria. Knowledge
Review, PP 122-119
Oxford Advanced Learners Dictionary (2005). U.K: Oxford problems
University Press Snow, D.M (1987). National Security:
Enduring of US defence policy. St. Martins Press.N.Y
Yusuf M. (2005). Information and Communication Technology and
Education: Analysing the Nigerian National Policy for Information
Technology, International Education, Journal, 54(5) pp 316-321

15

You might also like