Author
Reference
Benard.,
L., (2015): Security tactics for Kenyan University
Students. Intel
Fire Group of Companies Blog. Nairobi, Kenya.
Security tactics for Kenyan University Students
Since the Garissa University College
attack by terrorist on 2 April 2015 questions have been raised on the students’
ability to defend themselves in the face of the atrocity. Some students have
even suggested to be given special training during holidays on how to defend themselves
during emergencies. This brings to fore the need for students to acquire
knowledge on basic security tactics that could help deter and or minimize the
impact of a terror attack. Social media in Kenya have also been averse with
comments on why the students in their numbers could not overpower the five
terrorists. These conversations only confirms that the students’ population
lacks these skills and this write-up seeks to help Kenyan students in best way
possible to deter and defend themselves during terror attack.
These are the commonly suggesting defense strategies and tactics:
1. Counter Threat Strategy
Commonly referred to, in security
circles, as turning the tables on the
terrorists and is one of the most commonly employed strategies in terror
situation. Generally it is better not struggle with a terrorist, especially if
you are untrained, but if the threat as in the Garissa University College
attack necessitates the student protecting themselves, then physical force as a defense strategy is advised. In any case you are wondering, physical force defense here means you defend yourself with anything and everything that come
your way. If in the class then the chairs, tables and or any item would do and
if in the hostels then find anything you can throw at the terrorist. It is a
risky affair but if you are faced with no choices and this comes to the last
one then embrace it as only one of you will survive or both you go down and in
any case the latter would have saved many lives and you will be a hero.
It is said that most terrorist only have
one vision of how their attack was planned and its execution and when some
action disrupts this vision then these terrorist tend not to have a fall back
plan. To overcome a threat however how much you hide from the terrorists it is
important to take into account what they will do next to prepare in advance for
a counter strategy.
2. The Average Student Defense Strategy
It is known that the best defense
strategy is one that is localized against grassroots terrorism as these usually
require grassroots solutions. Grassroots solutions in this case will come from
the students themselves and their community at large. The students in a way
must fend for solutions that enhance their existence in times of threat and
eminent danger. In this error of technology many online social groups have been
formed by the same students for socialization mainly, but the students can
focus on forming social group that any student can join and get real time
security alert within their respective institutions.
We refer to this strategy as the average
student defense strategy as it focuses on where an average student will be
easily found, that is the social media. These include the Facebook, twitter,
instagram, and many others. A student might not be in all of them but in at
least one and additional campaign to join a social media tool for security
updates within the university will be a motivation enough for any of the
students to double tap. Again, the word average because as we are aware there
are some students from poor families that do not have the luxury of phones and
those other expensive gadgets, the assumption here is that these students at
least will have friends who are technology savvy.
3. Reviving Kamkunjis’ in
Universities
Kenyan universities either through their
administrations or the student organization should consider the prospects of
forming an informal meeting sessions commonly referred to as Kamkunji where all updates are given.
This may not only be about security but also on other matters with far reaching
effects and impact on the student life. For those who have passed through any college
or university where the selection of the student leaders is done through an
open democratic process of election then Kamkunji
is not a new term and one would tell you how much information one gains from
the informal grouping of one student candidate against the opposing group.
Again this only happens during the
electioneering period and since information is dispense at the highest rate
amongst the students, the slightest information on violence from either of the
side is an intel usually known by the opposing side. Students sharing information
at this very high level can be reciprocated through the Kamkunjis to maintain the tempo during non-election periods. Security
starts with the students and initiatives by the students for the students serves
as better strategies.
4. Implementing Ushahidi.com
According to their website Ushahidi.com,
Ushahidi makes smart decisions with a data management system that rapidly
collects data from the crowd and visualizes what happened, when and where.
Ushahidi was deployed in the Kenya 2013 general elections to enable citizens,
civil society, election observers, law enforcement agencies and humanitarian
response agencies to monitor election incidents in real-time and actions taken
where necessary.
This initiative is a belief that can
also be deployed in Kenyan university and institutions of learning as one of
the most powerful strategy in combating terror through data collection in
multiple data streams that allows information collection via text messages,
email, twitter and web-forms. This can be used as one way of gathering
intelligence among the institutions and relaying to the various authorities for
actions before the threat actually initializes. This according to Ushahidi.com is done through data
analysis from the multiple data streams but even the better news is that the Ushahidi team can work with the
institutions in developing technologies that suite their specific need.
5. Believe in the Word
It is important to note that most
academic research do not recognize praying as one of the strategies of
defeating a terrorist but in Ephesians 6: 10 – 20, the fight is against evil
and the verse urges the Christian that the fight is against the forces and
authorities and against rulers of darkness and powers in the spiritual world
and urges all to put on all the armour that God gives in prayer. Research and
reports have also shown that the Muslim faith does not encourage evil but
belief in their most high.
From the scripts above therefore, it is
evident that whatever your faith there is always strength in prayer and how
strong you are will definitely determine how you win the war. Most people will
reject this strategy in times of danger but psychologies will prove it right
that in times of danger your faith makes you strong and enables you make right
decisions motivated by the belief to win the war against evil deeds.
In conclusion, Kenyan universities are
now faced with a new face of evil in the society and it is only prudent for the
students to wake up to the fact that security is an initiative of the students
supported the university administration. The university will implement the
external security strategies but the real strategic strength lies in the
students themselves embracing secure cultures within the institution.
The Author is a Research Generalist in Projects Management Specializing
in Safety Service Delivery
No comments:
Post a Comment