A fresh wave of attacks across states is renewing conversations about Nigeria’s security strategy, including a recent incident…A fresh wave of attacks across states is renewing conversations about Nigeria’s security strategy, including a recent incident…

How the Nigerian govt can fight banditry and abductions with Internet of Things – IoT expert explains

A fresh wave of attacks across states is renewing conversations about Nigeria’s security strategy, including a recent incident in Ijiba, Kogi State, where a pastor, his wife and several others were abducted. Appearing on the Arise Morning Show, Professor Celestine Iwendi, head of the Centre of Intelligence of Things at the University of Greater Manchester, said the country must rethink its security model.

He pointed out that calls for a state of emergency on insecurity have been delayed for too long and said traditional methods are no longer enough. He explained that both frontline officers and civilians are facing more danger, while helpful technology is not being used enough.

“We can use drones, dog technology and IoT systems to reduce casualties. These tools can detect threats long before officers get there,” he said.

Professor Iwendi further argued that Nigeria needs to deploy drones, dog-based surveillance, and locally structured commando units that understand the terrain. He emphasised that foreign military assistance is expensive and unsustainable, adding that communities should be equipped to defend themselves within regulated structures.

Celestine Iwendi Web Size v2Professor Celestine Iwendi, head of the Centre of Intelligence of Things at the University of Greater Manchester
Building a modern security backbone

The professor said the foundation of any technological approach is reliable data. He explained that without clear information on movement patterns, routes, threats and rescue pathways, advanced tools like AI and IoT cannot function effectively.

He added that AI systems rely on datasets that Nigeria has not fully developed, making it difficult to track armed groups or respond quickly to abductions. He recalled his own previous work on pipeline security, noting that many projects fail because data is either unavailable, uncollected, or compromised.

“AI is about data. Without data, nothing works. If we know where people move, where threats come from, and where groups hide, AI can target, rescue, or neutralize them,” he added.

Read also: Nigeria to launch 4 satellites for surveillance over rising insecurity

Professor Iwendi said Nigeria must also retrain parts of its military for gorilla-style operations, especially in forests and rural corridors where armed groups operate. He noted that improved training, combined with real-time intelligence tools, would significantly reduce casualties among soldiers and civilians.

Security Awareness Key For Individuals to Tackle Banking Fraud in Africa
The pressure points Nigeria must confront

The professor warned that the emerging global conflict zone is no longer centred on borders but on data. He said that once hostile groups know where people live, worship and move, targeting becomes easier. Without strong data protection, intelligence leaks also become a risk.

He added that communities lack structured defence support, making many villages vulnerable before reinforcements arrive. He argued that better use of locally recruited commandos could close this gap, since they understand the forests and escape routes.

Professor Iwendi also stressed that IoT-based monitoring of highways, bridges and remote areas can help security agencies detect unusual activity early. He noted that consistent collaboration between state governments, private partners and universities is needed to fund and sustain these systems.

“With IoT sensors monitoring highways, pipelines, and remote corridors, security agencies can detect unusual activity in real time,” Professor Iwendi said. “It allows us to see threats before they escalate and respond faster, saving lives and protecting communities.”

How delay in data uploads by government institutions affect the economy

Key steps he outlined include:

• Deploying drones for surveillance and rapid response

• Creating regulated local commando units familiar with the terrain

• Building comprehensive national datasets for AI-driven tracking

• Using IoT sensors on highways, pipelines and remote corridors

• Retraining troops in gorilla-style operations

• Strengthening data protection and telecom-based intelligence filters

He concluded by saying that data-driven systems can save lives and give security agencies a stronger advantage against armed groups.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

How ZKP’s Daily Presale Auction Is Creating a New Standard for 1,000x Returns

How ZKP’s Daily Presale Auction Is Creating a New Standard for 1,000x Returns

The post How ZKP’s Daily Presale Auction Is Creating a New Standard for 1,000x Returns appeared on BitcoinEthereumNews.com. Disclaimer: This article is a sponsored
Share
BitcoinEthereumNews2026/01/16 09:02
NGP Token Crashes 88% After $2M Oracle Hack

NGP Token Crashes 88% After $2M Oracle Hack

The post NGP Token Crashes 88% After $2M Oracle Hack appeared on BitcoinEthereumNews.com. Key Notes The attacker stole ~$2 million worth of ETH from the New Gold Protocol on Sept.18. The exploit involved a flash loan that successfully manipulated the price oracle enabling the attacker to bypass security checks in the smart contract. The NGP token is down 88% as the attacker obfuscates their funds through Tornado Cash. New Gold Protocol, a DeFi staking project, lost around 443.8 Ethereum ETH $4 599 24h volatility: 2.2% Market cap: $555.19 B Vol. 24h: $42.83 B , valued at $2 million, in an exploit on Sept 18. The attack caused the project’s native NGP token to crash by 88%, wiping out most of its market value in less than an hour. The incident was flagged by multiple blockchain security firms, including PeckShield and Blockaid. Both firms confirmed the amount stolen and tracked the movement of the funds. Blockaid’s analysis identified the specific vulnerability that the attacker used. 🚨 Community Alert: Blockaid’s exploit detection system identified multiple malicious transactions targeting the NGP token on BSC. Roughly $2M has been drained. ↓ We’re monitoring in real time and will share updates below pic.twitter.com/efxXma0REQ — Blockaid (@blockaid_) September 17, 2025 Flash Loan Attack Manipulated Price Oracle According to the Blockaid report, the hack was a price oracle manipulation attack. The protocol’s smart contract had a critical flaw; it determined the NGP token’s price by looking at the asset reserves in a single Uniswap liquidity pool. This method is insecure because a single pool’s price can be easily manipulated. The attacker used a flash loan to borrow a large amount of assets. A flash loan consists of a series of transactions that borrow and return a loan within the same transaction. They used these assets to temporarily skew the reserves in the liquidity pool, tricking the protocol into thinking the…
Share
BitcoinEthereumNews2025/09/18 19:04
Lighter drops 14% after losing $2 support – More pain ahead for LIT?

Lighter drops 14% after losing $2 support – More pain ahead for LIT?

The post Lighter drops 14% after losing $2 support – More pain ahead for LIT? appeared on BitcoinEthereumNews.com. Since it touched a high of $4.5, Lighter has
Share
BitcoinEthereumNews2026/01/16 08:46