Security Intelligence Framework for Suicide Bombers Identification in a Crowd

Terrorism is the aggression unjustly carried out by individuals, groups, or states against human beings. It includes the form of unjustly terrifying, harming, threatening, and killing of people in the target area. In effect, this evil is perpetrated by some groups that believe in the use of such tactics as a means of advancing their cause. These acts are always caused by foreign terrorists whose identities and where about are not always known. Therefore there is need for an individual to identify these terrorists while in a crowd. This will be achieved by developing a security intelligent model for easy identification of a suicide bomber. The research involved document analysis and interview protocol with the security experts within Ondo and Ekiti State, Nigeria to determine the constructs for identifying the suicide bombers. Their responses were documented and audio recorded for transcription purposes. The sample for this phase of the study was obtained from among the senior security personnel until a saturation stage were reached. And the findings from them were analyzed thematically. The questionnaires were developed from the output of the thematic analysis and the result was analyzed using Rasch model which were used to determine the validity of the responses concerning the constructs. The results from the findings will form the model that can guide an individual to identify suicide bombers while in a crowd. It is hoped that the outcome of the study will increase the body of knowledge on security and contribute significantly to safety measures in avoiding suicide bombers’ menace.


Background to the Study
Suicide bombing has been one of the major threat to Nigerian for the past decade which involved series of attacks by Nigerian terror organization called Boko haram which made use of bombs explosion for their nefarious activities (Nalajala et al., 2016). The first bomb explosion occurred in Nigeria in 1986 when a letter bomb was sent to Dele Giwa in his house (Oluwasanmi, 2016). Nothing of such was heard until 2014 when series of blast occurred on the UN headquarter in Abuja that claimed many lives and destroyed lots of properties (BBC News, September 3 rd , 2014). These incidence has been occurring since then at different places such as market, place of worship, bus stop and campuses most especially where many people are involved (Pethő-Kiss, 2020). The new forms of bomb are more sophisticated and dangerous, which make use of mobile phones that permits terrorists to initiate a bomb immediately (Vanimireddy & Kumari, 2012).
Indeed, the worldwide manifestation of terrorism has been evident in Africa especially, Nigeria. The terrorist's methods of operations includes: the use of improvised explosive devices, targeted assassinations, ambushes, drive-by shootings, suicide bombings, and kidnappings (Kingdom et al., 2015). Since its advent, the sectarian insurgency has wrecked immense havoc in the country, especially by using explosives and firearms with the gruesome intention to murder (Okoli & Chukwuma, 2014). It is perpetrated by groups who believe in the use of violets as a means of advancing their cause. This is carried out by individuals, groups or states against human beings. It includes forms of unjustly terrifying, harming, threatening, and killing of people and banditry. It also includes any violent act or threat carried out as part of individual or collective criminal plan aimed at terrifying or harming people or endangering their lives, freedom or security.
These acts are planned and perpetrated by collections of loosely organized people that operate in shadow networks that are difficult to define and identify to perform their nefarious activities without being challenged (Ezeah, 2015). They move freely throughout the world, hide when necessary and exploit safe harbors proffered by rogue entities (Ezeah, 2015). It has been observed that the terrorists operate freely in Nigeria and when caught, they are unpunished because of the support given by their sponsors. Hence there is need for a Region proposal Convolution Neural Network that can detect suicide bombers most especially while in a crowd for security enhancement.

Suicide Bombing Activities in Nigeria
The suicide bombing activities includes: Bodo bombings on 9/12/16 that killed 57 people and injured 177 civilian, 15/8/2017-A woman bomber blew herself up and killed 27 others at a market in the village of Konduga near Maiduguri. Mubi bombing on 21/11/2017, 50 people were killed in a suicide attack in the northern part of Nigeria caused by militants. Suicide bomber trooped into funeral gathering to lunch an explosion that claimed 37lives on 18/2/2015. On 23/3/2020, 70 Nigerian soldiers were killed, many were wounded while some were kidnapped by the terrorists in an ambush near a village in Yobe State, Nigeria. 30 killed at crowded mosque when 2female suicide bombers blew themselves (Umar, 2015). Just to mention a few from the lists of their activities to confirm that Nigerian need to be more cautioned while in a gathering or in a crowded area.

Aim of the Paper
The main focused of this paper is to develop a model for identifying a suicide bomber in a crowd. Specifically: i.
The study seeks to explore the variables for identifying suicide bombers and ii.
To develop an intelligence framework for suicide bombers identification in a crowd.

Literature Review
Pethő-Kiss (2020) identified specific security challenges that Christian communities face as a result of book haram insurgent and suggested that a security measures that can help in detecting the bomb materials should be carried out, he did not mention how the terrorist can be identified. (Glackin et al., (2020) used swabs and an optical sensor element to collect and detect trace explosive residues from improvised explosive device, this research emphasized on what should be done after the deed has been done Samberg et al (2020) designed and built a smart device that can efficiently protect the crowded area and environment from the bomb fragments to safe people from more injured before the arrival of bomb squad in to the site of occurrence. The researchers' addresses the fragment after the deed to avoid more injured but did not talk about how to avoid the occurrence. Glackin et al (2020)

SUICIDE BOMBING ACTIVITIES IN NIGERIA
non-explosive. From the literature reviewed no researcher has worked on the variables for identified suicide bombers using rasch model, which call for this study.

Methodology
The population for the study is made up of security officers within Ondo and Ekiti state. The purposive sampling technique was used for the qualitative with a theoretical saturation of 7 participants which includes 2army, 3chief security officers, 1 PPRO and 1 ASP. The thematic analysis was used for the qualitative phase of the study. Since the current study is seeking to establish the variables for identifying suicide bombers in a crowd. The Partial Credit Model (PCM) in Rasch Measurement Model version 3.74.0 was used to obtain the consensus of the experts. Loose cloth or out of sync with the weather, suspect social position or location. Emotion: inappropriate emotional state, eyes focused and vigilant, does not respond to authoritative command or direct salutation from a distance. May appear to be in trance. Actions, critical observant, intelligent aids, vigilant, silence and authoritarian speech. Common among Muslim, difficult to identify, it requires intelligent training, their body language, mode of dressing use of hijab, use of alimajeris boys, and use of technology. Dressing code, by putting on bigger dress than themselves, very sad because they know death is approaching, doesn't move closer to people, and touches his body intermittently. Nervous in appearance, be focus and steering, looking for a way to blend, doesn't listen to authority, can be praying by whispering to himself, buying things without collecting change, walking towards a target object.

Conclusion
Since the security of civilian is not grantee by the government of the day in Nigeria especially, it is of necessity for an individual to be security conscious. Therefore following the identifiable variables as identified by the security experts in the state as gathered by this researcher, it will greatly be of help to an individual most especially while in a crowd to identify the suicide bombers before carry out their nefarious activities. The study had been able to extend the body of work in security studies and proffers a pragmatic solution to evading the menace of the suicide bombers in a crowded environment. The study is significant to the government, academics, businesses, entrepreneurs and the general public especially on variables that deserve attention.