The Western nations must not be the sole barometer by which Africa judges herself.

The Western nations must not be the sole barometer by which Africa judges herself.

The tumultuous events in Spain this weekend, and the silence of the EU, the UN, the USA, and most European governments (Belgium and Slovenia being the exception that have spoken up), shows the West will discard any rules that do not suit them.

The EU has stated the Catalonia matter is an internal Spanish matter for the Spanish to deal with. The British Foreign office have also released a similar statement. Majority of the limited ‘muted scolding’ is coming from opposition parties/opposition politicians in Europe.

HOWEVER, if the wide-spread crackdown in Catalonia had taken place in an African nation, the EU/UN/USA/Western Govts, would all be falling over themselves to scream – ‘Rule of law’, ‘Respect democracy’, ‘Illegal to try to stop a vote’, ‘Wicked to unleash the police against citizens’ etc etc.

They would be criticising that African nation, telling their nationals to leave as it is unsafe, threatening sanctions etc etc.

Please do not misunderstand. I am not knocking the West. The West has been a force for both good AND bad in Africa. However Africans must understand that whatever the West does, is mostly based on protecting and promoting its own interests.

Africa must look to itself for the answers to shape this continent into an economic and political powerhouse. We alone are our only ‘saviours’.

It is time our intellectuals, leaders of thought, writers, business titans, politicians, and ordinary citizens, begin formulating concrete ideals and ideas of what we want our individual African nations to be. ~ Bucky Hassan 2017

Advertisements

The Bad Apples in the State Governance

The President in his magnanimity and concern for the welfare of workers at state and local government levels, approved bail out money to states for the salaries of workers at those two levels, and specifically mentioned that the money should be channelled accordingly. State governors, a number of them, in their hard heartedness channelled the money in utter disobedience and without recourse to the welfare of the target population veered the allocated money to other things. Now they are shamelessly back demanding for further money. What sort of leaders are these people?
Yet they want to be regarded with semblance of being pro-people!
Rather than giving the state government, the Federal Government should demand the payment schedule of workers at state and local government levels and let the Federal system pay such directly to effect the clearance of the backlog of salaries and entitlements. Some people may not agree with this approach. And this may be strenuous and painstaking, but the people should be helped to get what is meant for them rather than giving money to these “Judas” called governors. Workers at state and local government levels have suffered enough in the hands of this bunch of bad managers to be allowed to continue to toy with the welfare of people.
Dr. Haroun Omeiza Isah

The Life of a Woman

The life of a woman
She bears pain than a man
She appears weak
But stronger than we think
She feels pain from a flow
A natural flow that she didn’t sow
A cramp painful than a stab from a knife
Yet she didn’t quit life
She feels pain during mating
Forget the joy, I’m not rating
For 9 months she carries a baby
Then gives birth and remain chubby
The pain of a woman in labor
More painful than a tumor
For year(s) she breast feed her progeny
With milk more comforting than the most calm symphony
Despite her pain
Her love is a gain
As a sister, she is the best
As a daughter, she is the sweetest
As a mother, she is beyond being best
In her hand, the world is held fit
Paradise lies in her feet
Regardless of any condition
She possesses the greatest power of intuition
She is the most special of God’s creation
She is a nation

©Abdulwaasiu A O
#BeDifferent

Here Are the New Members of the United Nations Security Council — TIME

(UNITED NATIONS) — Sweden and Kazakhstan won contested elections for coveted seats on the Security Council on Tuesday and the Netherlands and Italy ended a battle for another seat by agreeing to split the two-year term on the U.N.’s most powerful body. The U.N. General Assembly met to choose five new council members and it…

via Here Are the New Members of the United Nations Security Council — TIME

[MAN OF PEACE; REST IN PEACE] ADIEU MY DEAREST BROTHER

He is a friend, a brother, an ally. An agent of peace. I can’t still believe that our brother is gone. Life is indeed illusion. Words alone cannot express our taught and feelings. Though the song is ended but the melody lingers on.you will forever be remembered for your positive contributions to humanity. Your living love remains with us.                                      Life is indeed a phantasmagoria because in the long run we are all dead. Rest in peace my brother, friend, and mentor.     He is John Paul Ojoajogwu Usman [MAN OF PEACE, REST IN PEACE]                            ADIEU MY DEAREST BROTHER.

 

CYBER SECURITY, CYBER WARFARE,CYBER ATTACK, AND CYBER CRIME.

  1. CYBER SECURITY

This is defined as the maintenance and defense of information resources by addressing threats to information that are stored online i.e. by internetwork information systems.According to [1] Cyber security refers to the protection of everything that is potentially exposed to the Internet: our computers, smart phones and other devices; our personal information; our privacy; and our children.The Internet is an amazingly useful and versatile tool that has become indispensable for work, Education, personal entertainment, and staying connected with family and friends. Use it responsibly, while taking care to protect yourself and your data, and you will continue to find it a valuable resource

  1. CYBER WARFARE

This refers to conflict and attacks that are internetwork based in other to bring down a nation’s or organizational information systems such as networks and web sites so as to achieve some political or organizational goals. They are often motivated politically. It is a threat to lives of many nationals in the world because it enhances the stealing of confidential information and can cause a major disaster in online businesses and financial institutions. It also paves way for activities supported by military organizations with the purpose to threat the survival and well-being of society/foreign entity [2].

According to [3] “Cyber warfare refers to a massively coordinated digital assault on a government by another or by large groups of citizens” It is the action by a nation-state to penetrate another nation’s computers and networks for the purposes of causing damage or disruption. But it adds that “the term cyber warfare may also be used to describe attacks between corporations.

3.  CYBER ATTACK

Cyber-attack is an illegal attempt to harm someone’s computer system or the information it contains using the internet.[4]                                                                                                             Cyber-attack is intangible i.e they are crimes that occur in a virtual world. They are unlike the tangible wars that occur physically. Cyber-attack may be targeted. I.e. it may be targeted at specific persons, company or a nation. A successful attack will typically allow the attacker to gain access to the victim’s assets, allowing stealing of sensitive internal data and possibly cause disruption and denial of service in some cases. [5]

A typical example can be the actions of a jealous boyfriend spying on his girlfriend’s online activities by hacking into her social media accounts. Another example is a situation where an attacker exploits the vulnerabilities of an organization and attacks the organization by gaining an unauthorized access to their database server in which confidential documents or information is stored. Other examples of cyber-attack are listed below:

  • Mass mailing worms.
  • Trojans sent to various people via email.
  • Network attacks
  • Bypassing security mechanisms
  • Denial of Service (DOS) attacks
  • Distributed Denial of Service (DDOS) attacks

Though, the solutions to cyber-attack are not specific, this is because there are various ways through which an attack can be launched. But, some solutions are listed below:

  • Detect malware, communications and behaviour invisible to standard defense
  • Analyze the risk and characteristics of the attack and attacker
  • Adapt security automatically to provide protection
  • Respond using the insight needed to counter your specific attackers

 

  1. CYBER CRIME

A cybercrime is defined as an act involving the use of computers or other technologies to engage in criminal activity in a virtual setting such as the Internet. [6]

Cybercrimes share three elements:

  • Tools and techniques to perpetrate a crime
  • Approach or methodology for executing the criminal plan —known as a vector
  • Crime itself that is the end result of those plans and activities (a cybercrime is the main objective of the criminal’s activities)[7]

 

REFERENCES

[1] NJ Consumer Affairs. (2013) cyber security handbook [On-line]. Available: http://www.njconsumeraffairs.gov/News/Brochures/Cyber-Security-Handbook.pdf. [December 23, 2015]

[2] Isaca. (2014) cyber security fundamentals glossary [On-line] Available:http://www.isaca.org/knowledgecenter/documents/glossary/cybersecurity_fundamentals_glossary.pdf

[3] F. Schreier. (2015) dcaf horizon working paper no. 7 on cyber warfare. Available: http://www.dcaf.ch

[4] Cambridge Advanced Learners Online Dictionary. Available: http://dictionary.cambridge.org/dictionary/english/cyberattack.html [December 28, 2015]

[5] GFI white paper (2012) Targeted cyber-attacks. Available: http://www.gfi.com/whitepapers/cyber-attacks.pdf [january 3, 2016]

[6] Tommie Singleton et al.The top 5 cybercrimes. Amaerican Institute of CPAs. New York, 2013

[7] M. Dunk (2008) cloud security. Available :http://cloudsecurity.trendmicro.com/us/technology-innovation/cyber-security

 

TELECOMMUNICATION SCIENCE… A look at some antenna concepts in TCS301(wireless communications and antenna concepts).

Some Selected Calculation Questions and Solutions

 On TCS301 by A.A Otuoze

  1. Given a wireless access point with 150mW of output power connected through a 100 foot cable with 6dB of loss with a gain of 9dBi. A, calculate the transmit power. B, if 30dBm is given as a transmit power and 4dB loss. Find the Gain. C, what is the Equivalent Isotropically Radiated Power (EIRP) of the antenna?

Solutions

A, Power output (Po) =150mW, Loss=6dB, Gain=9dBi

Transmit power (Pt) = 10×log (Po)

Pt=10×log(150mW) = 21.76dBm.

B, to find the Gain at 30dBm transmit power we must first calculate the EIRP of the antenna because EIRP=transmit power-Loss+Gain=Pt-L+G

Therefore we have to find EIRP which is on question C

C, EIRP=Pt-L+G

EIRP= 21.76dBm-6dB+9dBi

EIRP=24.76dBm

B, if Pt=30dBm, Loss=4dB, Gain=?

From EIRP=Pt-L+G, we can express G=EIRP-Pt+L

G=24.76dBm-30dBm+4dB

G= -1.24dBi

  1. Given an access point with an output power of 100mW connected through a cable with a loss of 2dB to an antenna with gain of 11dBi. What is the EIRP in mW.

Soln

Power output (Po)=100mW, Loss (L)=2dBi, Gain (G)=11dBi, EIRP=?

EIRP=Pt-L+G where Pt=10×log (Po)

Pt=10×log (100mW) =20dBm

EIRP=20dBm-2dB+11dBi

EIRP=29dBm

EIRP in mW=10ˆ2.9mW

 

  1. An antenna receives 60mW from a transmitted power of 100mW of a wireless AP. Find the loss.

Pt=100mW, Po=60mW, Loss=Pt-Po

Pt=10*log(100mW)=20dBm

Po=10*log(60mW)=17.78dBm

Loss=20dBm-17.78dBm=2.22dBm

Loss in dB= 2.22-30=-27.78dB