Headlines
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • Propagandist journalists are seen as the true journalists by autocratic rulers and populist leaders worldwide, as they serve as the government's cheerleaders.
  • Globally, populist and nationalist leaders passed draconian laws to punish journalists under the guise of "fake news" or "not in the national interest."
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages and news.
  • Check Google Images for Authenticity. The Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • It is a horrible crime to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.

More Details

Social media Policing in Akwa Ibom State: The case of Iniobong Hiny Umoren

By Saron Messembe Obia

Akwa Ibom State Map, Nigeria

The technological era has changed the approach to public and private policing, as security officers are yet to adapt to the advantages of the services offered. Nonetheless, the innovation has led to structural reorganization, budget orientation in order to redefine traditional approaches to policing (Fyfe et al. 2013). Policing criminal acts are no longer limited to law enforcement agencies, as community or individuals now engage in the quest for evidence based, support with intelligence and reconfigured police structures in some countries (Den Boer, 2014). Police is gradually supplemented by a mosaic of security and safety service providers, networks and partnerships (Hoogenboom 2010), in order to resolve security challenges of old bureaucratic and centralized forms of governance.

With focus on emerging security menace, policing should become more of learning and problem oriented and community cooperation to combat such crimes. That is, policing strategy assists in addressing various security issues that concern different communities and need not be police-centric but interactive. It should be based on the information of the various security needs and utilize the analysis of the underlying mechanisms behind the security issues (Pawson and Tilley 1997). 

Drawing from the research and innovation project on community policing in Europe, termed the Unity Project, was to strengthen cooperation between the police and stakeholders to improve the safety and security of communities and citizens. The agenda of the Unity project was to conceptualize community policing, and adapt to local context, thereby analyzing contemporary conditions, in solving certain security challenges undermining the livelihood of communities and citizens.  The project had six core elements for Community policing which can be implemented in Akwa Ibom state, which are trust and confidence, information sharing and communication, addressing local issues, cooperation between the local population and police in problem solving, accountability, and proactive policing. One of the major issue which inter-relates with emerging security challenges in Akwa Ibom, is the need to incorporate technology (precisely social media policing) to help community policing method.

The globalization era has exposed how influence of social media, and how it can be used as a policing tool for both citizens and law enforcement in Nigeria. Police authority must introduce policy on the use of social media in law enforcement and crime investigation, check misuse and as well reconfigure policing methods in Nigeria. However, the necessity for the legislator to review The Police Act, in order to entrench social media best practices, for proper police-citizen engagement via social media. This will help improve the relationship between the police and the community.

Crime and violence have been increasing in many parts of Sub-Saharan Africa among unemployed young people. The causes are not farfetched as studies have associated rising youth unemployment to increase of violent crime in Nigeria. The accelerating level of prostitution, rape, and terrorism are attributed to the incidence of unemployment. Growth has not been in line with the aspirations of the people and has not been driven by higher productivity. Unemployment in Akwa Ibom and other states in Nigeria has led to frustration of educated youths, thus the rise of serial killers, terrorist groups and rapist in most states in the country.  

Hiny Umoren case

Iniobong “Hiny” Umoren, age 26 years became the most followed person on Twitter On Friday April 29, as from 1 PM, after a friend (Umoh Uduak) sent a red notice on Twitter following a job interview in Uyo, Akwa Ibom State, she had to attend. Iniobong “Hiny” Umoren case became the subject of a desperate nationwide search led by Nigerian Twitter users. A university graduate, orphan and wait for entry in the National Youth Service Corps (NYSC) program, was in search for job for survival. Instead of a job interview and hope for survival, she would actually encounter on that day what would become one of the most shocking stories of contemporary Nigeria. She would later be found dead, after been raped, murdered and then buried in a shallow grave. Social media policing campaign was adopted to uncover the identity of a primary suspect Frank Uduak Ezekiel Akpan, who was also arrested.

Hiny’s Victimization

Drawing from an investigation by NewsWireNGR Investigation, on April 29, at around 1:17PM, Frank Akpan had Hiny Umoren on phone, to brief her on the where the interview was to be held. Shortly after his discussion with Hiny, he equally rang a certain Blessing Godwin at 1:21 PM, which may have been the next victim of the same job interview.

Though technology is a vector for social development and connects the world, several security menace are posed by this innovational dynamic, with software, which help to locate any device connected to a network, and identify an individual using any android device. Hiny’s case gave a new perception on how social networking site can be exploited in criminal investigation, through social engineering, it was revealed that Hiny Umoren called Frank Akpan at 3:38PM, when the latter was already in the criminal parameter. However, before her ordeal, Hiny through a two-second WhatsApp voice note alerted a friend, and a red flag was put up, appealing for Akwa Ibom youth community on social networking sites, particularly on Twitter, to trace the phone number of Hiny, and help track the gang engaged in her ordeal. 

 After the criminal ‘game’, Frank Akpan, contacted an unknown number (+2348122386922), which Truecallers does not reveal any details. The comprite must have been operating with a non-internet-enabled feature phone (a so-called ‘burner’ phone) or the counterpart did it intentional to avoid digital footprints linked to that number. Nonetheless, the search for Hiny led to a Twitter hashtag #FindHinyUmoren which rapidly uncovered Frank Akpan’s identity, which he tried to swirl the community with sentimental stories and also trying to connect with the unknown number with no digital footprint. Seemingly, Frank Akpan was trying to mitigate the incident with his contacts after the social media policing strategy was adopted to expose their entire business operation at risk, trade of human beings and parts.  

However, it was only on April 30, 2021, that Frank Akpan was flagged as a criminal and enemy on social media. His link to Hiny Umoren’s disappearance is a public issue, which needs a rethink of social media policing in Akwa Ibom state, Nigeria. In just a few minutes his identity was revealed (name and picture) on social media, and in a city like Uyo, it was easy to be rendered jungle justice, because of the unity and love of Nigerian youths for their fellow. As it is always said, there is no perfect crime, the link between Frank and Kufre Effiong are yet to be exposed. 

Profiling the suspect of Hiny’s ordeal

Frank Uduak Ezekiel Akpan.

Social media offers several opportunities to the community, and individuals, either link to their job, for e-commerce or criminal activities. It’s a strategic tool for vetting and community policing for most European countries. Though some people create fake profiles, with other persons photos, cloned phone numbers, send friend request to profile individuals or stars in other to swirl or extort money from others and through their device they can be tracked. Considered to be a primary suspect of Hiny’s Umoren murder, Frank Akpan neglected the dynamics of tech industry and the emergence of software which helps to locate, trace phone number, and reveal the identity of an individual. 

The arrest of Frank begins late in the afternoon on April 29, from a tweet from Umoh (Hiny Umoren’s friend) which identifies the owner of the Airtel number +2348127530092 as the person who invited Hiny for a supposed interview. The application Truecaller will reveal the name ‘Ezekiel Akpan’ and occupation tag ‘Political.’ This application reveals the identity of an individual and occupation gathered from several social networking sites including Facebook profile information and analysis of the individual’s Facebook friend networks, as to provide significant data.

After discovering himself under instant national scrutiny following Umoh’s tweet, Akpan then attempts to swell the public with the Facebook post below. In so doing, he provides concret evidence, by confirming that the telephone number in question is actually his, and that “Uduak Frank Akpan” and “Ezekiel Akpan” are the same person. Below is the post of Akpan on Twitter

Good afternoon All.Please kindly forwarded this message to anybody that knows her, I was contacting her yesterday to her concerning a job opportunity, as at the time she called me she was at ibiaku junction, the call went off so I called back several times. After several efforts, I couldn’t reach her. Below here is her name and phone number, Iniubong Umoren 08081295920. This is also her cousins name gotten from Facebook/ Godsluv Udoikop. Please help me pass this message to find her or her family members. Please I am not holding her hostage nor do I know her anything about her whereabouts. My phone has been off because I’ve been getting threatening messages due to the misunderstanding. Shortly thereafter, he deactivates his Facebook profile and seemingly goes silent until the Akwa Ibom State Police Command issues a statement 3 days later, confirming his arrest and effectively pronouncing him guilty of the crime as a sole suspect.

Source: A NewsWireNGR Investigation

Frank Akpan was declared a serial rapist and considered a single actor by the police. Though unsubstantiated social media propaganda which cannot stand in court, for compelling evidence from Akpan’s crime scene, Hiny was just an unfortunate victim under the most heartbreaking circumstances. 

However, it’s argued that Akpan collaborated with a senior Niger Delta civil service worker, called Kufre Efflong. With the aid of social networking, an address was obtained, where both men met. Plot 58, G Unit, Ewet Housing Estate, is the base of the Uyo branch office of a medical NGO called the Center for Clinical Care and Research (CCCR Nigeria). One of the major trend which cybercriminals and individuals engaged in human trafficking is the operate ghost NGOS.  A scan of news stories since 2017 on “CCCR Nigeria” and “Center for Clinical Care and Research Nigeria” reveals nothing of this is a ghost NGO.

Moreover, one of Akpan’s call was traced back to Kufre Effiong, 24 hours after raping and murdering Hiny Umoren, refer to the address Uyo branch office at 58, G Unit, Ewet Housing Estate. Following the convoluted house numbering system in Uyo, the property labeled as 58, G Unit, Ewet Housing Estate is also recognized on most digital maps as Plot S.9, Unit G, Ewet Housing Estate. That address is also home to Davok Suites, a renowned upmarket hotel in Uyo visited by profile guests from neighboring countries.

Policing with information and communication technology

The development of technological communication tools such as computers, personal device assistance (PDA) and telephones have changed policing strategies around the world as all conversations made via a GSM telephone line is recoverable by mobile service providers, which by law cannot be tampered with or erased and when it concerns issues relating to human security. The traceability  by a service provider reveals the following elements: the date and time the interaction was initiated; the type of interaction (voice or SMS); the length of the interaction; the number initiating the interaction; the number receiving the interaction and the location of the closest cell towers to both parties. 

Frank Akpan’s case exposed the love and unity of Nigerians for their fellow, all security patterns were put in place to track the lone wolf. Though browsing over network history of an individual warrants law enforcement authorization, friends engaged in social engineering to prove to the world and local community who the criminal was. However, exploiting a unique location code written in this format: MCC (Mobile Country Code)-MNC (Mobile Network Code)-LAC (LocationArea Code)-CelllD and appealing to Nigeria’s mobile country code 621, and its 4 largest network providers MTN, GIO, Airtel and 9Mobile, with respective MNCs 30, 50, 20 and 60. From this data, Frank Akpan was revealed as community menace, serial killer and rapist, from his call log.

Particularity or causes of deviant behavior in Akwa Ibom

With the over increasing population in Nigeria, unemployment remains a strategic problem for the large number of university graduates, searching to engage in the public and private sector of each state (Awogbenle and Iwuamadi, 2010). Despite its riches from the oil economy, employment in Nigeria is actually a major challenge, and couple with emerging security challenges; Boko Haram, Biafra aspirations and the extension of ISIS- ISWAP in the country. Though resources have not been effectively utilized in order to yield maximum economic benefits. The ever increasing population, appeals of creation of industries to endorse youth’s skills and avoid unemployment and rise of youth recruitment in militia groups. 

More so, school curricula needs an upgrade as to focus on professional training and not theories. According to Anyadike et al (2012), most Nigerian graduate are not employable because of curricula, and some do not possess the skills required by employers. A ministry for medium and small seize industries is necessary to reconfigure and adopt economic policy measures for both formal and informal sectors. 

Furthermore, most youths focus on university certificates and vocational training is neglected, which is a major aspect for youth unemployment in Nigeria. drawing from statistics revealed by Manning and Junankar in 1998, on the total number of graduates in Nigeria, was 73,339 in 1986/1987 which rose to 131,016 in 1996/1997, contemporary Nigeria is faced with several challenges, and one of the major menace to national security is unemployment. Anyadike et al (2012) concluded that, the economy does not have the capacity to absorb all unemployed graduates because over 800 industries and 37 factories were closed down in 2009 alone.

Nigeria can gain inspiration from the Unity project, in order to address the needs of communities and citizens, exploit various resources, partners and channels (social networking sites) to police emerging crimes. Problem solving process in Nigeria, and Akwa Ibom in particular, requires police and stakeholders to put forward a Unique Value Proposition of Community Policing. By identifying main Communication and Contacting Channels; could be various types of ICT tools, such as platforms usable by PCs or smartphones, but also the traditional approach, such as community meetings. 

No nation can emerge in an atmosphere of insecurity; terrorism, cybercrime occultism and ethno-religious incentives. The Nigerian government must provide policies and laws which will help dynamise the economic and social wellbeing of its citizens and deter criminality. Authorities and entrepreneurs should appeal for vocational training and specialization in a particular domain, which can help create industries to better exploit the resources the country has. Also, youths should be given the right skills, because frustration is a major reason for aggression and violent crimes.

(The Author is the Editor of crimeandmoreworld.com)

Reference

  1. Anyadike Nkechi, Emeh Ikechukwu EJ and Ukah Finian Okechukwu (2012). Entrepreneurship development and employment generation in Nigeria: Problems and prospects. Journal of Education and General Studies Vol. 1(4) pp. 088-102.
  2. Fyfe, N., Terpstra, J., & Tops, P. (2013). Centralizing forces? Comparative perspectives on contemporary police reforms in northern and Western Europe. Hague: Eleven.
  3. G. Leventakis, M. R. Haberfeld (eds.), Societal Implications of Community-Oriented Policing and Technology, SpringerBriefs in Criminology,https://doi.org/10.1007/978-3-319-89297-9_1
  4. Hoogenboom, B. (2010). The governance of policing and security − Ironies, myths and paradoxes. Basingstoke: Palgrave MacMillan.
  5. Pawson, R., & Tilley, N. (1997). Realistic evaluation. London: Sage.
  6. UNITY Project, HORIZON 2020, https://www.unity-project.eu/. 

Related Article

Burn Victims in Bangladesh Suffer Doubly…

Three people severely burned in an explosion at a shop in Bangladesh earlier this week had to be tak ...
April 19, 2024

Ethnic Army Intercepts Junta Offensive on…

An ethnic armed group intercepted a junta retaliation near the Thai-Myanmar border on Thursday, acco ...
April 18, 2024

Myanmar Border Guards, Soldiers and Civilians…

Nearly four dozen members of the Burmese junta-affiliated Border Guard Police and soldiers have fled ...

Myanmar Junta Releases Thousands of Prisoners…

Myanmar prisons nationwide released over 3,000 prisoners on Wednesday, according to junta-controlled ...
April 17, 2024

Junta Shelling, Airstrikes Kill 25 Rohingyas…

At least 25 ethnic Rohingya civilians were killed and thousands forced to flee their homes amid junt ...
April 16, 2024

Wildfire Destroys Prized Mushrooms, Income Source…

A recent wildfire in a Tibetan-populated area of China’s Sichuan province ravaged vast swathes of ...
April 13, 2024

Other Article

News & Views

Burn Victims in Bangladesh Suffer Doubly…

Three people severely burned in an explosion at a shop in Bangladesh earlier this week had to be tak ...
April 19, 2024
Pick of the Day

UN Security Council Meets to Discuss…

Permanent Representative of Israel,Gilad Erdan to the United Nations, addresses the UN Security Coun ...
April 18, 2024
News & Views

Ethnic Army Intercepts Junta Offensive on…

An ethnic armed group intercepted a junta retaliation near the Thai-Myanmar border on Thursday, acco ...
Video Report

Russian Shelling of Ukraine’s Zaporizhzhia Dam…

Ukraine's largest hydroelectric dam suffered severe damage from Russian shelling in late March. For ...
News & Views

Myanmar Border Guards, Soldiers and Civilians…

Nearly four dozen members of the Burmese junta-affiliated Border Guard Police and soldiers have fled ...
Pick of the Day

[wp-rss-aggregator feeds="crime-more-world"]
Top

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies"> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Close