StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Solutions for Kenya - Assignment Example

Cite this document
Summary
The paper "Security Solutions for Kenya" highlights that the use of technological means such as satellite surveillance will enable the country to maintain a bird’s eye view on the activities of their opponents without necessarily endangering the lives of their troops on the ground…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Security Solutions for Kenya
Read Text Preview

Extract of sample "Security Solutions for Kenya"

Security Solutions for Kenya Security has become a major concern for Kenya since the rising of terrorist factions in their neighboring countries such as Somalia which have managed to leak their activities into the border (MacFarlane & Khong, 2006). If the country is to maintain their positive growth rate a number of solutions will have to be implemented so as to deal with the menace of threatening forces that have held the wellbeing of the individuals in these areas hostage leading to a reduction in their quality of life (Hastings, 2012). These solutions however cannot be handled by the country alone and the international community will have to chip in if they are to be successful in this endeavor. The resulting aim will be beneficial to all involved as a safer country will lead to a more prosperous environment which will allow for an increase in the co operation of countries and organizations in sectors such as business and other areas of international concerns (Hastings, 2012). The first step in ensuring that the security threat is efficiently dealt with is the creation of new policies that will enable Kenya and the cooperating countries to meet this menace head on. There are a number of policies that can be implemented that will assist in the achievement of this goal, they include: Military Support The main security threat facing the country consists of militants based in neighboring countries who happen to have armed forces at their disposal and use this resource to cause havoc in the areas that they wish to control (Prabhakaran, 2008). These areas includes places such as the countries borders where they have attempted to take control of the region so as to enhance their control and hold over the areas that they wish to take charge of. A number of incidences have occurred as a result of this such as the kidnapping of individuals who work in these areas who they hold for ransom or in worse case scenarios even execute to put a point across (MacFarlane & Khong, 2006). The armed forces of these factions have proved to be difficult to handle and the additional support of countries such as the United States and the United Kingdom will enable the country to have the man power to deal with this problem efficiently. Military support in this case will consist of the sending of troops to these areas to support the local military in their attempt to gain back control of the regions that have been most affected by the invasion of these terrorist armed forces. The additional provision of extra men will increase the country’s ability to fight back where necessary especially in the areas that have been suffering frequent attacks form these militants and will enhance the probability of victory during battles (Prabhakaran, 2008). The troops will also provide extra man power for activities such as border control that will allow them to cover the areas that are patrolled more efficiently and without the exhaustion of the resources at the country’s disposal. Military support can also include the sending of weapons that will allow the country to fight these attacks more efficiently and hopefully in the process discourage the militants from attempting to wage war on the soldiers that have been sent to these regions (Prabhakaran, 2008). It should be noted that the individuals kidnapped from this region are not always of Kenyan origin and some are expatriates who happen to be working in the area at that point in time thus this support will not only be for the protection of the Kenyan people alone but also the citizens of other international areas who operate in this region. Access Control This can be described as the restrictive control of regions of concern that will make it difficult for unauthorized people to enter these areas (Prabhakaran, 2008). Access control can also refer to restrictive prohibitions of other items such as Visas that allow entry into the country without a stern background check to confirm that the individual in question does not harbor any ill will that may be the reason for their attempt to gain entry. This can be done through the help of various policy makers who can come up with legislatures that will make it difficult for people to gain entry in and out of the country through regions that are considered to be of risk such as the Somali border (MacFarlane & Khong, 2006). Access control can be done through the construction of various infrastructures such as roads that have multiple checkpoints along the way to ensure that no one attempts to smuggle items such as weapons of even people into the country with an aim of causing harm (Prabhakaran, 2008). The construction of fences along the borders will also prove to be a success in the achievement of this aim as it will ensure that those wishing to enter the country cannot do so at any point along the border and thus will have to go through the paths that have been set for them. These fences will also make it easier for those patrolling the border to recognize any penetration that may have occurred as they will be able to check the fences to determine whether they have been tampered with and thus notice any need for concern. Network Security Policies These policies will mainly deal with issues involving computer networks that the militants may try to access in a bid to gain information that they can use to their advantage (Norman, 2007). This is especially important during this time of technology advancements as wars are now no longer solely fought on the physical realm but involve more advanced tactics that allow one to attack an area of importance through the mere click of the button. The network security will also involve the protection of sensitive areas such as programs of national importance that for example may be used to attack resources such as electricity which is controlled via online activities (Gollmann, 2011). The protection of such programs are especially important since they cannot be protected physically through the posting of guards to watch over them thus making them an attractive target for those who would like to cause maximum damage with minimum risk to their armies. The achievement of these network protections can be done through a number of means such as the introduction of stronger protection software for these programs that ensure that they cannot be accessed remotely by an external force (Gollmann, 2011). This can include the use of stronger passwords and foreign detection programs. The United States have advanced further compared to Kenya in such areas and thus the use of their programs will be best suited for such activities. Network security can also be attained through the control of the individuals who have access to such programs (Norman, 2007). This is to say that the fewer people with the ability to access these areas the better as it ensures that the militants do not have a number of options at their disposal while attempting to gain control of such networks. It will also make it easier for one to monitor who has gained entry into a network in terms of when and where so as to notice any irregularities that may have occurred. Technological Support This can be considered one of the more important contributions that the international community can make in the fight against terrorism and the protection of Kenya against such adversaries. The advancements of technology have introduced a number of new systems and strategies that can be used in the field of war and thus it is essential that the country is able to have access to these new developments to enhance their efficiency in the war against terrorism (Norman, 2007). This includes areas such as monitoring where the help of the United States and European allies will come in handy with regard to issues such as surveillance systems as they are far more advanced in these areas with comparison to Kenya. The use of technological means such as satellite surveillance will enable the country to maintain a bird’s eye view on the activities of their opponents without necessarily endangering the lives of their troops on the ground. This will allow them to collect information on the militants that will enable them to be better prepared for any incidences that may take place. The issue of satellite surveillance can considered to be a sensitive subject as countries may not be willing to hand over the access of such systems to external parties (Norman, 2007). It is suggested that instead of doing so, those involved would simply work in coordination with the Kenyan military in terms of keeping them updated on the movements of the militants and any other issue that may be of concern in the war. That way the country is able to take advantage of the systems available to these countries for the greater good while the owners do not have to worry about ceding control of their technological resources. References Gollmann, D. 2011. Computer Security, 3rd ed, Wiley Publishing, New Jersey. Hastings, D. A. 2012. The Human Security Index: An Update and a New Release, HumanSecurityIndex.org Documentation Report V.1.1. MacFarlane, S. Neil & Yuen Foong Khong. 2006. S. Neil, MacFarlane; Yuen Foong Khong. eds. Human security and the UN: a critical history. United Nations intellectual history project (illustrated ed.), Indiana University Press, Indiana. Norman, T. L. 2007. "Integrated Security Systems Design" Butterworth/Heinenmann. Prabhakaran, P. 2008. National Security: Imperatives And Challenges, Tata McGraw-Hill, New Delhi. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Policy paper (stating the solutions to improve the security in Kenya Assignment”, n.d.)
Policy paper (stating the solutions to improve the security in Kenya Assignment. Retrieved from https://studentshare.org/history/1468421-policy-paper-stating-the-solutions-to-improve-the
(Policy Paper (stating the Solutions to Improve the Security in Kenya Assignment)
Policy Paper (stating the Solutions to Improve the Security in Kenya Assignment. https://studentshare.org/history/1468421-policy-paper-stating-the-solutions-to-improve-the.
“Policy Paper (stating the Solutions to Improve the Security in Kenya Assignment”, n.d. https://studentshare.org/history/1468421-policy-paper-stating-the-solutions-to-improve-the.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Solutions for Kenya

The Impact of a Pandemic (SARS) on Tourism

The swine flu has also crossed the national borders of Mexico and entered into various other countries, like US, Canada, China, kenya, India, etc.... For that, it will consider kenya.... This paper, however, will focus on only one particular country apart from Mexico to look into the effect of swine flu and possible solutions.... First, as a measure of prevention, the government, airport authorities, local, national as well as international health organizations implemented various types of security checks on the airports....
5 Pages (1250 words) Essay

Terrorism and Human Rights in Kenya

Research Proposal on Terrorism and Human Rights in kenya 1.... Background and Problem Statement Human Rights in kenya have gone through a lot of evolution over the years.... The kenya National Commission on Human Rights (2011) reports with reference to the new constitutional dispensation however that Kenyans “have all embraced one another in not only endorsing the new draft constitution but also in appreciating that we are still one country and we should do everything to ensure its prosperous perpetuity....
7 Pages (1750 words) Dissertation

International Refugee Law

The aim of this paper is to provide an analysis of the international laws relating to refugees and In this regard the paper is divided into two sections with the first section dealing with the internationally recognized rights of refugees and the second section providing for the context of Somali refugees in kenya and their right to stay out of refugee camps.... is important to the progress in any country and where such security is threatened it is the obligation of the country to take measures to ensure the protection of its interests....
18 Pages (4500 words) Essay

Post Colonial Intervention in Somalia

The essay "Post Colonial Intervention in Somalia" will present the various interventions into Somalia by various countries as well as various international organizations in order to explore the successes and the failures that have resulted in the conflict not ending despite the interventions.... ...
15 Pages (3750 words) Essay

Post Colonial Intervention in Somalia

The author of this paper claims that Somalia is one of the countries in the world that had experienced violent conflict as well as instability since 1991.... The civil war as well the endured conflict as from 2008 to 2011 has made Somalia be among the top states in the world associated with failure....
14 Pages (3500 words) Research Paper

Violence After the General Elections in Kenya

This case study "Violence After the General Elections in kenya" provides a comprehensive outlook of conflicts and conflict resolution, with emphasis on kenya's experience with post-poll violence in 2007/2008.... 1992-2007 is the period that offers a critical insight into kenya's struggle with electoral violence....
8 Pages (2000 words) Case Study

Features of World Policies

This coursework "Features of World Policies" describes unemployment in kenya and the US, causes of unemployment, consequences, and hardships, solutions to this problem, a lesson from kenya to the U.... kenya is a country considered to be the heartland of eastern Africa; compared to the sizes to Texas State in the United States it is slightly smaller.... Despite kenya enjoying one of the best climates, having the fastest growing economy in the world and the ever-growing telecommunication and banking sectors largely due to their iconic mobile money transfer, M-Pesa, the citizen, are still faced with hardship in the country....
8 Pages (2000 words) Coursework

Food Security in Kenya

The paper "Food Security in kenya" highlights that the problems seem to range from unreliable climatic conditions, mismanagement in the agricultural sector, poor infrastructure, to the increasing population.... This is informed by the fact that kenya in 2009 was declared one of the world's most dangerous locations in terms of hunger.... The paper has offered possible solutions to the problem of food security.... owever, the question of why Keya still faces problems of food security still remains a mystery to people....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us