VANGUARD IT PARLIAMENT: SOFTWARE DATABASE AND NATIONAL SECURITY (2)

By NBF News

By Chris Uwaje
The reality today translates to the fact that it should be abundantly clear to us, that the era and long-addicted habit of physically and blindly chasing the containers and cargo packages at all our import terminals and air/land boarders and throwing away the content of the manifest documents that represent the knowledge-base and real world inside the containers, must be over by now.

The fact that 'Kid Google' utilizes 2.3million Megawatts to run its global knowledge business compared to Nigeria's dream for generating 10,000 Megawatts by 2015, or a reality that Microsoft has earned more money in 25years of its operation - than what General Motors has netted in 100 years, should be a wakeup call to Nigeria!

Today, Information Technology (IT) is undoubtedly the world's fastest growing body of knowledge for sustainable development and national survivability. At the centre of these very complex processes is Software Infrastructure, capacity and capability which determines the equilibrium for national security, peace, growth, creation of wealth and for business continuity of nations at all levels.

Overcoming barriers
Overcoming the barriers to mapping scientific data into the relational database models or developing useful new abstractions for scientific data and processing models are seen as necessities to allow nations scale through their critical challenges of nation building. Industrial systems typically require high availability, even during loading and backup. These systems are often integrated into essential business processes.

The last few decades have witnessed an exponential and multifaceted growth of technology at all critical levels of development. This growth has not only affected many fields of economic and cultural endeavour but various new/applied fields have emerged leading to significant changes into lifestyles and human behavior.

From security perspective impact of technologies has become an important premise of study. Global lessons now challenge us to take a macro view of impact of technology on security in evaluating, engaging and finding solutions to the Nigerian problem.

This macro analysis of some recent conflicts such as the Gulf War (1993), Kosovo conflict, the 9/11 episode, the US invasion of Iraq and Afghanistan and indeed, the Stuxnet weaponized cyber-worm-bomb have clearly demonstrated the relevance of technology for engaging Cyber security and fighting Terrorism.

Various modern day tools of war fighting are driven by technology and that makes technology an important theme in the study of international security. The impacts of science and technology on international security environment are all-encompassing.

Technology is instrumental in influencing the 'concept of war-waging' in the minds of both the political and military leadership for many centuries but it appears that in the present scenario, it has almost become over-arching.

Presently many emerging technologies are being talked about which have major relevance for militaries. Modern day wars are not always envisaged to be fought only on the battleground.

21st century defence preparedness involves demonstration of technological strength, knowhow and display of technologies via various industry and military exercises, conducting 'tests' of new technologies, weapons, weapon delivery platforms for the purposes of the expression of the knowhow and power and  also, building up of an effective deterrence mechanism.

In short, there is and exists a distinct multi-dimensional inter-relation between security and technology.

Technology and national security
Technology has always played a significant role in national security and defence. But, there is a subtle difference in the development of technology vis-à-vis State Security Domain. Both the developed and few developing nations, have understood the relevance of technology from national security perspective and are making investments in various fields of technologies that have both short and long term security relevance.

Such technologies are commonly known as Strategic Technologies. The current focus is on space and near-space technologies, networks, and close-in and standoff sensor technologies.

As an inclusive solutions pathway, our Satellites maybe found extremely important for the purposes of intelligence gathering. Particularly the remote sensing satellite, which will be a significant tool for the purposes of reconnaissance and imagery intelligence.

Specific satellites are found playing a significant role towards gaining intelligence. Satellites are useful for the purposes of electronic intelligence (ELINT), signals intelligence (SIGINT), communication intelligence (COMINT), and radar intelligence (RADINT).

Finally, Security clearly and directly related to financial transactions and movement database. Over the years, all those acts of financial recklessness and cyber-carelessness have consequently subsumed our human abilities to meditate, predict and see into the future.

The resultant effect is that we have built a monumental unsecured technology environment of cyberweb patched by layers of uninformed, crisis-propelled and greedy human minds.

This scenario has established and left us in heavily morally indebted, decadent and techno-beclouded society, where gross fixation of oral data has enveloped our development mind-set and thrown us into a centrifugal dance of irrelevant regional divide, contaminated and addictive religious adventure, orchestrated tribal hate, world record in conspicuous consumption greed and unforgiving smiling-face pretence model of wasteful life!

The national security issue under discussion is all encompassing; it is not just about technology or the ability of the NSA to deliver commensurate solutions, but indeed about our value system, the sociological, philosophical and psychological content and factors of our society - a sycophant of 40 decades?

Now that our moral centre-of-gravity can no longer hold, there is urgent need to develop an effective database strategy to filter the new revelations of the half-truths and full-lie sources and causes of our current situation.

The NSA is very informed, high-technology converted and to a great extent, sincere on the compounded nature of the national crisis, open to new ideas and should be assisted to establish the required National Security Information Pyramids of Technology-driven database to evaluate the e-security pathways with capability to respond promptly at the nanosecond call.

CONCLUDED