Saturday, April 25, 2015

Security defense strategies and tactics for Kenyan University Students



Author Reference
Benard., L., (2015): Security tactics for Kenyan University Students. Intel Fire Group of Companies Blog. Nairobi, Kenya.

Security tactics for Kenyan University Students
Since the Garissa University College attack by terrorist on 2 April 2015 questions have been raised on the students’ ability to defend themselves in the face of the atrocity. Some students have even suggested to be given special training during holidays on how to defend themselves during emergencies. This brings to fore the need for students to acquire knowledge on basic security tactics that could help deter and or minimize the impact of a terror attack. Social media in Kenya have also been averse with comments on why the students in their numbers could not overpower the five terrorists. These conversations only confirms that the students’ population lacks these skills and this write-up seeks to help Kenyan students in best way possible to deter and defend themselves during terror attack.

These are the commonly suggesting defense strategies and tactics:

1. Counter Threat Strategy
 
Commonly referred to, in security circles, as turning the tables on the terrorists and is one of the most commonly employed strategies in terror situation. Generally it is better not struggle with a terrorist, especially if you are untrained, but if the threat as in the Garissa University College attack necessitates the student protecting themselves, then physical force as a defense strategy is advised. In any case you are wondering, physical force defense here means you defend yourself with anything and everything that come your way. If in the class then the chairs, tables and or any item would do and if in the hostels then find anything you can throw at the terrorist. It is a risky affair but if you are faced with no choices and this comes to the last one then embrace it as only one of you will survive or both you go down and in any case the latter would have saved many lives and you will be a hero.

It is said that most terrorist only have one vision of how their attack was planned and its execution and when some action disrupts this vision then these terrorist tend not to have a fall back plan. To overcome a threat however how much you hide from the terrorists it is important to take into account what they will do next to prepare in advance for a counter strategy.

2. The Average Student Defense Strategy
It is known that the best defense strategy is one that is localized against grassroots terrorism as these usually require grassroots solutions. Grassroots solutions in this case will come from the students themselves and their community at large. The students in a way must fend for solutions that enhance their existence in times of threat and eminent danger. In this error of technology many online social groups have been formed by the same students for socialization mainly, but the students can focus on forming social group that any student can join and get real time security alert within their respective institutions.

We refer to this strategy as the average student defense strategy as it focuses on where an average student will be easily found, that is the social media. These include the Facebook, twitter, instagram, and many others. A student might not be in all of them but in at least one and additional campaign to join a social media tool for security updates within the university will be a motivation enough for any of the students to double tap. Again, the word average because as we are aware there are some students from poor families that do not have the luxury of phones and those other expensive gadgets, the assumption here is that these students at least will have friends who are technology savvy. 

3. Reviving Kamkunjis’ in Universities
Kenyan universities either through their administrations or the student organization should consider the prospects of forming an informal meeting sessions commonly referred to as Kamkunji where all updates are given. This may not only be about security but also on other matters with far reaching effects and impact on the student life. For those who have passed through any college or university where the selection of the student leaders is done through an open democratic process of election then Kamkunji is not a new term and one would tell you how much information one gains from the informal grouping of one student candidate against the opposing group.

Again this only happens during the electioneering period and since information is dispense at the highest rate amongst the students, the slightest information on violence from either of the side is an intel usually known by the opposing side. Students sharing information at this very high level can be reciprocated through the Kamkunjis to maintain the tempo during non-election periods. Security starts with the students and initiatives by the students for the students serves as better strategies.

4. Implementing Ushahidi.com
According to their website Ushahidi.com, Ushahidi makes smart decisions with a data management system that rapidly collects data from the crowd and visualizes what happened, when and where. Ushahidi was deployed in the Kenya 2013 general elections to enable citizens, civil society, election observers, law enforcement agencies and humanitarian response agencies to monitor election incidents in real-time and actions taken where necessary.

This initiative is a belief that can also be deployed in Kenyan university and institutions of learning as one of the most powerful strategy in combating terror through data collection in multiple data streams that allows information collection via text messages, email, twitter and web-forms. This can be used as one way of gathering intelligence among the institutions and relaying to the various authorities for actions before the threat actually initializes. This according to Ushahidi.com is done through data analysis from the multiple data streams but even the better news is that the Ushahidi team can work with the institutions in developing technologies that suite their specific need.

5. Believe in the Word
It is important to note that most academic research do not recognize praying as one of the strategies of defeating a terrorist but in Ephesians 6: 10 – 20, the fight is against evil and the verse urges the Christian that the fight is against the forces and authorities and against rulers of darkness and powers in the spiritual world and urges all to put on all the armour that God gives in prayer. Research and reports have also shown that the Muslim faith does not encourage evil but belief in their most high.

From the scripts above therefore, it is evident that whatever your faith there is always strength in prayer and how strong you are will definitely determine how you win the war. Most people will reject this strategy in times of danger but psychologies will prove it right that in times of danger your faith makes you strong and enables you make right decisions motivated by the belief to win the war against evil deeds.

In conclusion, Kenyan universities are now faced with a new face of evil in the society and it is only prudent for the students to wake up to the fact that security is an initiative of the students supported the university administration. The university will implement the external security strategies but the real strategic strength lies in the students themselves embracing secure cultures within the institution.
 

The Author is a Research Generalist in Projects Management Specializing in Safety Service Delivery