My opinion on using Blockchain Technology in Africa's Counter Terrorism campaign.steemCreated with Sketch.

in #life7 years ago

Africa seems to be the groomimg ground of terrorist in recent years.Taking north-Eastern Nigeria's vile Insurgency - Boko Haram as case study.

Combating terrorism using Blockchain Technologies

Anti-Terrorism Respond Squad on alert

MOST AFFECTED REGION


The north Eastern part of Nigeria,Cameroon,Niger Republic,Chad and some other west African countries have paid the insurgency price while Isis and Al-qeeda claim to be the back bone of both Boko-Haram and the Somali pirate.The UN envoy to Nigeria once said;

Boko haram: a real threat to International and National security - A UN delegate to the North Eastern Nigeria describing Boko Haram.

  • Has the safety agencies handled the state of affairs well?
  • What has left incorrect with the plan in use?
  • In what way should Western Authority react to these terrorist Sects? These are the questions in the mind of the media and the masses.

THE EFFECT

Northeastern Nigerian Refugee camp

5.1 million Nigerians risk starvation in 2017, UN says according to their analysis.

POSSIBLE SOLUTION

Blockchain technology can be very successful in combating this menace.African Leaders should forge an alliance to wipe out this faceless demons simply;

1.....Using Blockchain Technology to Facilitate Anti-Money Laundering Efforts
2......Blockchain for registering of Business

Companies involved in terror financing can be investigated by law enforcement from suspected front , and the very first places to look are corporate registries.

3.....Designing a decentralized communication networks , while also keeping a certain level of transparency
4.....Digital forensics

The common perception of counter-terrorism involves a team of investigators scouring a terrorist safe-house, looking for physical evidence of planning, training materials, and address books listing names of accomplices. Now consider how broadly this effort spreads when looking for evidence on a confiscated laptop or smartphone, or clues scattered across one’s digital footprint.

5.....Blockchain ledger

A group of Spain-based hackers decided to create a blockchain ledger to solve the refugee problem. The ledger was proposed to the EU authorities and would incorporate data on each migrant, including health profile, family relations, place of residence, etc.

This blockchain-based ledger would allow authorities to regulate refugee number in each particular region,control the refugee inflow, and see their histories. It is also hoped that this would stop the terrorists disguised as refugees from entering the European Union.

Blockchain designed tracking on travelers around the World

6......Blockchain based system for global digital registration of travlers

Another advantage of the Blockchain technology in counter terrorism is the possibility of tracing a person’s movements across the globe i.e suicide bombers can't travel to another country to commit their havoc on innocents citizens.

Thus, SITA is developing a blockchain-based system for global digital registration of airline passengers and travelers all around the world.

“SITA’s innovative research imagines travelers creating a verifiable “token” on their smart phones which contains biometric and other personal data. In this vision of future travel, no matter where in the world you go any authority can simply scan your face and scan your device to verify you are an authorized traveler. This can be done without all these agencies ever controlling or storing your biometric details.......SITA's media director says.

7.....Advanced data analysis

All counter-terrorism analysts begin their day by surfing through results of search queries they have constructed for open-source and classified databases. To get results, they first have to tell the search engines what they’re looking for, like a bloodhound sniffing the scent of a suspect. But a kind of advanced machine learning called topological data analysis involves computers identifying patterns that can’t be discerned through traditional algorithms. Imagine a situation where an analyst opens up his or her inbox to find results from topological analysis, where their computer is more like Sherlock Holmes than a bloodhound dog. Instead of relying on the analyst feeding the search engine clues, the software learns from the data to discover hidden relationships which may prompt investigators to connect new dots.

Ex CIA explaining how Countries can Counter Terrorism.

Before peace,there is always war.This war is upon us and no where to run.
So we Africans Steemian and the entire Steem Universe must unite to combat this menace with all the available resources and Techs.

And with God,we shall overcome.




Upvote,Resteem and follow up on this post Steemites,Bless you all as you do this!

Image sources
http://www.rmmagazine.com/
http://www.sita.aero/imagevault/
https://i2.wp.com/media.premiumtimesng.com/
https://s3.eu-central-1.amazonaws.com/

Sort:  

Hello @oluwoleolaide
This is a very informative and thoroughly researched post. Well done.
Looking to see more posts like this in the future.

Resteemed.

@ogochukwu

Thanks brother,will keep the community posted

Coin Marketplace

STEEM 0.23
TRX 0.12
JST 0.029
BTC 66099.02
ETH 3560.98
USDT 1.00
SBD 3.16