• VIP PROTECTION
    VIP PROTECTION

    The Minister of Education, The Executive  Secretary NUC, The Vice Chancellor FUOYE, The Registrar FUOYE and the Senior Security Officer


    FUOYE during the First Matriculation Ceremony of the Institution

  • IIPS CONFERENCE
    IIPS CONFERENCE

    The Senior Security Officer of FUOYE with other University Security Chiefs at International Institute of Professional Security (IIPS) Conference at Abuja

  • BOMB FLASK
    BOMB FLASK

    Bomb presented in a food flask form. Be Security conscious, be vigilant!

  • BOMB COMPONENTS
    BOMB COMPONENTS

    Bomb components on display

Have knowledge of Security

Have knowledge of SecurityTHE ROLE OF INTELLIGENCE GATHERING AND INFORMATION PROCESSING IN SECURITY POLICY IMPLEMENTATION

People regularly mention intelligence in the in the news or as they discuss amongst themselves. However, most of them are not conversant or even know its nature and role in National Security, industrial Security, Law enforcement or Security policy formulation, implementation.

Its indispensability touches areas like national security, defence, foreign policy, business activity, law enforcement etc. in Law enforcement, intelligence function helps to guide investigative activities; just as it is imperative in assets protection, executive protection and general industrial security operations. This is by analyzing crime trends and activities that threaten the protection or general security of the Institution.

The effectiveness of any Institution Security Services depends largely on the number of its sources of information, the more diverse the sources of information, the better the position of the Security Unit in gathering intelligence report, verifying and comparing the validity and reliability. Security operation can never take place without a sound intelligence. Any decision, policy formulation and implementation short of sound intelligence is doomed for failure.

Information

Information according to Advanced Learners Dictionary means fact told, heard or discovered about somebody/something or knowledge acquired in respect of something or someone. Information therefore comprises facts, knowledge or news, as an item of knowledge may be factual or hearsay. It can come from any sources and may be collected at a random or systematically, over a long period of time by a number of people. In order to be effective for intelligence purpose, information must be collated accurately and systematically and be properly analysed, recorded, evaluated and interpreted. It is subsequently transferred or converted to intelligence after it has undergone the forging mental processes. It is finally disseminated as intelligence.

Intelligence

It may be defined as the substance made out of information. In other words, information may or may not carry intelligence hence, intelligence is regarded as the product resulting from the collection, evaluation, analysis, integration and interpretation of all available information concerning a target or pertinent issue which is of security significance. Target such as campus cult groups, examination fraud gang, production of fake result and illegal academic transcript on campus, sponsorship of campus violence and other social vices.

 

Attributes of Intelligence

It is important to highlight the attributes which useful information intelligence should possess.

  1. Accuracy: It must be useful, accurate, embracing all relevance facts and detail.
  2. Relevance: It must be relevant to the subject in issue of facts, relevant to the target under surveillance.
  3. Timely: It must come at the time it is needed to forestall or counter perceived threats to internal security of life and property
  4. Factual: It must be tested and its accuracy validated
  5. Reliability: It must provide material evidence of its reliability
  6. Source Utilization: To avoid underutilization of sources of information, such as informants, contacts, etc., they should be systematically exploit by adequate planning based on thorough knowledge of their capabilities and vulnerabilities. Where technical information is required, efforts must be made to recruit sources with technical knowledge and who has access to the information or data.
  7. Objectivity: Objectivity must never be compromised. Intelligence must resist preconception and temptation to distort information at any stage of information processing.
  8. Accessibility: Intelligence is a product of information through collection, collation, evaluation, integration, interpretation, and dissemination. Comparison is indispensable in the process; hence, both must be easily accessible. They should be stored in such a way that they are easily retrievable. Intelligence must be timely to meet policy formulation, operational plans, security operation or policy execution or implementation. Timeliness is central to the usefulness of intelligence.
  9. Security of Sources of Information: Every source of information must not be compromised. It should be protected from exposure. Unnecessary dissemination of information or intelligence may endanger sources or agency. Agency may also loose that channel of information.
  10. Review: Intelligence forecast must be reviewed constantly taking cognizance of new information. Effect review where necessary.

Latest News

Open Positions

Featured Articles

Copyright © 2020. Security Unit. Designed by ICT Directorate