Media sources reported that on September 22, 2018, members of the Islamic terrorist group Allied Democratic Forces (ADF), operating in Uganda and the Democratic Republic of the Congo attacked the town of Beni in the Kivu region, leaving at least 12 people dead.

The group has been staging attacks from bases in Uganda and the DRC since the late 1990’s, and while it has shelved its original goal of creating an Islamic state, it continues exerting its influence by intimidating local communities.

The ADF is only one of a series of Islamist networks operating in central Africa. In total, there are is an unspecified number of terrorist groups within the continent likely numbering in the tens—if not hundreds. These include groups like Boko Haram and ISIS that have successfully overrun state-run armies in Libya, Nigeria, Chad and Cameroon.

The danger presented by these groups to all facets of life for the citizens of these countries can’t be overemphasized. It extends to all facets of life from economic prosperity to personal safety. Outside of the spread of deadly viruses, it’s by far the biggest threat to the people of Africa today.

TAR’s Public Safety Concept

As population growth and immigration make urban centers more crowded than ever before and as conflicting cultural and national groups find themselves living side-by-side, the need for advanced technology for protecting citizens in times of crisis becomes a critical requirement.  Creating a “Safe City” that integrates different types of intelligence gathering allows security services to make the shift from responding to events after they’ve occurred to anticipating and deterring them ahead of time.

TAR’s advanced security and cyber intelligence platform offers government institutions and security personnel an integrated intelligence platform that greatly simplifies the task of carrying out criminal and terror-based investigations. This integrated solutions suit processes and analyses large amounts of data from multiple sources providing investigators increased efficiency.

SafeZone Target Profiler

Law Enforcement officials often require an enormous amount of information to connect the dots in high profile investigations. The Target Profiler solution generates highly accurate, reliable profiling data from social networks and web apps without the need for arrest warrants or access to telecom and social media databases which are often difficult to acquire. Its advanced anonymization mechanism allows operators to go undetected while tracking dangerous criminals.

The Target Profiler is flexible enough to meet different types of security departments’ specific needs whether these be determining the identity of a wanted criminal or discovering the social connections of a potential terrorist. Needless to say, this type of information can make a big difference, allowing security forces to identify threats and prevent them from materializing instead of having to deal with the outcome of mass catastrophes.


Without a physical barrier, how can you secure a border?

Intelligent mobile border control systems combined with fixed protection posts provide a flexible and dynamic approach to border security, offering maximum security in areas where physical barriers are not possible or preferred.   Border security is a crucial issue in many countries, particularly those with porous or disputed borders. While

How AI is changing border protection

AI technology will enhance border security, improve efficiency, and streamline operations   Artificial intelligence (AI) is revolutionising border protection. Over the past few years, many countries have invested heavily in AI technology to enhance border security, improve efficiency, and streamline operations. Enhancing border surveillance is one of the ways AI

Why offshore oil and gas platforms need to be protected?

From Norway to Mexico, from Israel to India and Nigeria, securing offshore platforms and pipelines has become a major concern The oil and gas industry is rapidly becoming one of the most attractive targets of terrorism and maritime piracy. The supply chains from wells and offshore platforms to pipelines, refineries

What makes EEZ protection so important?

When a country cannot protect its EEZ, it quickly loses control over its maritime assets What is the EEZ? As prescribed by the 1982 United Nations Convention on the Law of the Sea, there is an exclusive economic zone (EEZ) in the ocean where a sovereign state has special rights