DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 6875

Cybersecurity for Lawyers and Law Firms: Tackling Cyber Risks and Data Breaches

2

Cyber-attacks and data breaches have become a thing of concern to every individual and organization. With more data being stored online, the threat that cybercriminals pose has never been greater. We wake up every day reading newspaper headlines or seeing and hearing news about data breaches around the world. It can happen to anyone and any type of organization. These data breaches are occurring at an increasingly alarming rate with most victims blissfully ignorant about a breach. It is safe to conclude that these data breaches cut across every sector and;

The Nigerian legal sector is also not left out from the prying eyes of cybercriminals. Nigerian law firms are a vital component of Nigerian businesses, having in their control and possession personal, business-sensitive, and commercially-sensitive information[1]. This makes them an attractive target for cybercriminals. As lawyers, we should not be misled into believing that data breaches are only a problem for others and not law firms. More dangerous is the belief that your law firm is well protected from any forms of data breaches, or that it is a concern for the top tier law firms in Nigeria. Small law firms and solo lawyers are also becoming constantly vulnerable to all forms of data breaches. Lawyers operating small law practices and solo lawyers should not take comfort in the illusion that they are too small to be victims of cyber-attacks. It-won’t-happen-to-me mentality is overly misguided. If DLA Piper[2], a multinational firm that has touted its expertise in cybersecurity, was hit by NonPetya, and as reported by ABA Journal[3] of 6 major law firms that have been hit by cyber-attacks, you or your law firm could be next.

Why Are Law Firms The New Target by Cyber-Criminals?

It is no news that the vast majority of Nigerian lawyers and law firms are not highly sophisticated in the use of technology. This makes it easy for hackers to have unauthorized access to clients’ sensitive information. The following reasons are why law firms have now become a suitable target and treasure trove for hackers:

  1.   Nearly every industry in the country, large and small, works or has something to do with a law firm in at least one capacity or the other. In doing so, Nigerian law firms have in their custody and control, sensitive and valuable client information. Essentially, today’s law firms have become a vault of sensitive and valuable information such as:
  • Client’s intellectual property such as trade secret, copyright, and information regarding prospective business deals;
  • Litigation tactics and strategy;
  • Clients confidential business information;
  • Attorney-client privileged legally privileged information and communications;
  • Clients personally identifiable information (PII);
  • Clients financial details and account access information;
  • Clients personal health information;
  • Corporate financial reports;
  • Proprietary software code;
  • Emails and other communications with clients.

All the above-listed information are incredibly valuable on the black market.

  1.   Secondly, Nigerian law firms and its lawyers are ill-prepared as far as facing these evolving threats are concerned. Despite growing cyber-security threats, majority of law firms and lawyers still lack the proper and requisite awareness, knowledge, policies, procedures, and precautions to establish a proper individual or organizational cyber hygiene and defense.

Why Is Cyber Security So Important And Why Should Lawyers And Law Firms Be Concerned?

According to a 2016 report by Symantec, the threat of email hacking and malware is growing. Between 2014 and 2015, the amount of new malware grew from 317 million to 431 million. Crypto-ransomware attacks rose from 269,000 to 362,000. Web attacks also grew in the same timeframe from 493,000 per day to 1.1 million per day[4].

Therefore, the need for Nigerian law firms to pay more attention tocybersecurity is perhaps even more vital than boosting profitability and expanding clientele. With law firms in control and possession of clients’ sensitive and valuable information, they have an arduous task to keep this information safe and secured from unauthorized access. The law firm’s cyber hygiene forms part of the big picture when it comes to providing excellent, efficient service and peace of mind to clients. The risk of a cyber-attack should not be ignored because there are no expectations that these trends will reverse anytime soon[5]. Law firms will need to take proactive action to ensure that they protect their clients and themselves as much as possible by taking a number of steps to protect their firms and their client database.

If law firms are not able to safeguard the sensitive and valuable information in their custody, control, and possession, they are definitely leaving their doors open for possible cyber-attacks. And when this happens, not only will the firm’s reputation be damaged, such law firm or lawyer could also face legal action for not putting in place reasonable steps to prevent the data breach resulting in clients’ sensitive and valuable data ending up in wrong hands. The core of the law firm’s business, integrity and livelihood will also be negatively impacted; downtime and billable hours will be lost; files will be lost, destroyed, or otherwise corrupted; a huge amount of money will be spent on recovering from the data breach; and the lawyer might lose his or her practice license.

What Kind Of Threats Do Law Firms Face?

Having shown above why Nigerian law firms are targets of cybercriminals, it is vital that the legal community have a good idea about the various shapes the cybersecurity risks and threats they face take. These cybersecurity risks and threats are constantly evolving in the global landscape. However the shape they take, any of these threats can cause irreparable damage to a law firm. Some of the threats faced by law firms are:

  • Malware or malicious software: this is hostile or intrusive software which is employed by cyber-criminals to compromise information systems and network. These include viruses, worms, Trojan horse, ransomware, spyware, adware, scareware, and other variants of malicious software programs. Malware can take the form of executable code, script, active content and other variations of software.
  • Ransomware: This type of malware locks down a computer and threatens to shut down the system unless a ransom is paid. This is what infected the DLA Piper system in June 2017[6].
  • Virus: A virus uses code written with the express intention of replicating itself. A virus attempts to spread from one electronic device to another electronic device by attaching itself to a host program[7]. 
  • Worms: Worm uses self-propagating malicious code that can automatically distribute itself from one computer to another through network connections[8].
  • Trojan horse: This is a program that appears useful or harmless but which contains hidden code designed to exploit or damage the system on which it runs. This type of malware discretely creates backdoors which allow hackers or other malware to enter your system[9].
  • Spyware: Just as the name suggests, spyware is software used to spy on you. This includes recording your keystrokes to learn your passwords or secretly using your camera to watch you[10].
  • Phishing attacks: This is an attempt to obtain sensitive information or gain unauthorized access to client information or funds by masquerading as a trustworthy source via email[11].
  • Website Vulnerabilities: Cybercriminals continue to take advantage of vulnerabilities in legitimate websites to infect users, as website administrators fail to secure their websites. Nearly 75 percent of all legitimate websites have unpatched vulnerabilities[12].

Apart from the targeted and specialized attack mentioned above, data breach of law firm’s confidential and sensitive information can also occur through other means such as:

  • Insider threat in the form of a negligent or rouge staff or lawyer who has complete access to the firm’s sensitive and valuable information. Such rogue might sell, misuse or manhandle vital information obtained through this means;
  • External threats: This could be in form of competitors or a foreign government interested in disrupting the law firm’s legal operations, steal information or who are interested in espionage;
  • Loss of an unsecured laptop or mobile device;
  • Visiting questionable websites;
  • Communications over unsecured and public networks;
  • Downloading unapproved software onto the law firm’s computer network or onto a mobile device, which connects to a repository of confidential firm information;
  • Security issues with third-party providers and cloud system;
  • Hacktivists;
  • Weak or non-existent password management being weak or non-existent;
  • Use of outdated technology e.g. Microsoft Windows XP.
Source: Purplesec Cyber Security

Ethical and Legal Responsibilities of Lawyers and Law Firms

Lawyers can no longer afford to treat cybersecurity as an afterthought. Rather than being reactive, lawyers must learn to be more proactive.  Lawyers have an ethical and professional obligation to ensure that clients’ sensitive and valuable information is protected from unauthorized access. The ethical standards for ensuring lawyers and law firms protect and maintain the confidentiality of clients’ information is provided in Rule 14(1) and 19(1) & (4) of the Rules of Professional Conduct for lawyers 2007[13]. It states as follows:

19(1) Except as provided under sub-rule (3) of this rule, all oral or written communications made by a client to his lawyer in the normal course of professional employment are privileged.

  (4) A lawyer shall exercise reasonable care to prevent his employees’ associates and other services are utilized by him from disclosing or using confidences or secret of a client, but a lawyer may reveal the information allowed by sub-rule (3) through his employee.

A close reading of the above rules shows that a lawyer must act competently in protecting the confidentiality of its client’s information. A lawyer’s duties of confidentiality and competence require that he or she takes appropriate steps in ensuring that the use of technology in conjunction with client’s representation is not subject to undue risk or unauthorized disclosure.

What Can Law Firms Do?

Now that we are aware that cyber-criminals are interested in having access to the sensitive and valuable data law firms have in its possession and control, we have the responsibility of combating these threats. Here are a few recommended mechanisms or actions which can be applied in combating cyber breaches in Nigerian law firms:

  • Employer and Employee Awareness Training, and Education: Cybersecurity awareness training and education help firms’ staff and lawyers understand the ethical and professional responsibilities they have in ensuring data protection .They also need to be vigilant. These training should be conducted periodically and should be mandatory for all. (It is within the human nature the possibility of reverting to our old habits that may put data security at risk.)
  • Keeping Hardware and Software up to Date: It is important to update the law firm’s hardware and ensure it is running on the latest software version. These updates keep your network and devices safe from vulnerabilities. 
  • Encryption of all portable devices and valuable data: They say encryption is the acid test of seriousness. All hardware’s including mobile devices that contain the firm’s valuable data and confidential information should be encrypted every time data is transmitted into or outside of the firm. Ensure that lawyers and other staff do not leave workstations unattended without locking devices. 
  • Password Policy and Multi-factor authentication: Firms should have a policy that mandates lawyers and other staff to change passwords after a certain period of time and such password should contain characterizations consisting of numbers, letters, and special characters. Lawyers and other staff should be encouraged to use at least a two-factor authentication password.
  • Law firms must have up-to-date and clearly written cybersecurity policies and backup procedure: Law Firm’s cybersecurity policies should be documented, accessible, understood and implemented by all employees. These policies should be reviewed, maintained and revised on a periodic basis and should be updated at least once annually to stay on top of technology best practices. Some of these policies are incidence response, computer use, password policies, backup procedures etc.
  • Conduct regular vulnerability and penetration testing: This determines the weakness in the law firm’s application (software), infrastructure (hardware) and people in order to ensure that the controls and policies put in place are implemented and effective. Vulnerability and penetration testing should be done on an annual basis.
  • Have a cyber-liability insurance policy: A proper cybersecurity insurance policy should include reimbursement for investigation, business loss, required notification and credit monitoring to clients, legal expenses, cost of extortion and cover human error where possible.
  • Hiring the right cybersecurity personnel: Have a cybersecurity personnel who will be responsible for establishing and maintaining a comprehensive cybersecurity vision and strategy for your law firm. They will to enforce policy formulation and implementation. This will help ensure that valuable assets, technologies, and systems are adequately protected.

Conclusion

Cyber threats are real and growing daily. For many Nigerian lawyers, law firms (big or small), or solo lawyers, cyber security is always an afterthought, and that’s if we even have the time to bother about it. More attention is often directed at bringing in new clients and skyrocketing the law firm’s profits margin. We still practice the habit of carrying sensitive information on insecure thumb drives, using unencrypted email on the insecure electronic device, and using unsecured shared networks. This is highly risky and not consistent with the legal client’s best interest.

It’s about time we started implementing sound cybersecurity and data security practices as an essential business practice for our law firms. Protecting client data as well as the firm’s data should be top priority for law firms of all sizes. Whether we like it or not, we are by the very nature of our profession bestowed with the obligation of safeguarding our clients’ sensitive and valuable information. Law firms that chose to ignore this and fail to devote the right attention and proper resources to protect their client’s sensitive and valuable information do so at their own peril.

Yes, we were not trained in school to be aware of the evolving cybersecurity threats and data breaches. Notwithstanding, there is a growing need for us to educate ourselves about these evolving threats. This can only be achieved by making a conscious effort to educate ourselves and our colleagues about these threats and data breaches, and how we can stay protected. We also need to create plans in case of emergencies since there is no way we can perform legal tasks or provide legal services without using one form of technology or another or at least collecting personal data from their clients.

The bottom line is, if cyber-attacks are not going anywhere anytime soon—and they are not—then lawyers and law firms should also do away with their notoriously outdated, conservative and slow-to-change behavior towards cybersecurity hygiene. Beef up your security measures. Educate your employees, and communicate and report any cyber-attacks that do occur to keep everyone aware. It is legal.

 

REFERENCES

1.   Mosadoluwa Adeleke, Cyber Security: A Critical Need for Law Firms in a Digital Age. https://www.lawyard.ng/cyber-security-a-critical-need-for-law-firms-in-a-digital-age-by-mosadoluwa-adeleke/ Retrieved February 9, 2019.

2.   DLA Piper statement on malware attack. https://www.dlapiper.com/de/germany/news/2017/06/dla-piper   malware-statement. Retrieved February 9, 2019.

3.   Julie Sobowale, 6 Major Law Firm Hack in Recent Hinstroy. www.abajournal.com/magazine/article/law_firm_hacking_historyReterive 10, 2019

4.   Symantec Internet Security Threat Report Volume 21, April 2016, https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf. Retrieved February 9, 2019.

5.   Natasha Turak, The next 9/11 will be a cyberattack, security expert warns, https://www.cnbc.com/2018/06/01/the-next-911-will-be-a-cyberattack-security-expert-warns.html. Retrieved February 9, 2019

6.   Barney Thompson, DLA Piper still struggling with Petyacyber-attack, https://www.ft.com/content/1b5f863a-624c-11e7-91a7-502f7ee26895. Retrieved February 9, 2019.

7.   TLP White, An Introduction to Malware. https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/An-introduction-to-malware.pdf Retrieved February 9, 2019.

8.   https://us.norton.com/internetsecurity-malware-what-is-a-computer-worm.html. Retrieved February 9, 2019.

9.   Kunkun Wang, Xiaoyu Chen, YeshengXu. A Brief Study of Trojan. https://cdn.ttgtmedia.com/searchSecurity/downloads/Malware_Ch06.pdf  Retrieved February 9, 2019.

10.              Daniel Jonasson, Johan Sigholm, What is Spyware. https://pdfs.semanticscholar.org/5779/5aaa5fbbd931b21ab7c11b83b6e305ce35cd.pdf  Retrieved February 9, 2019.

11.              National Cyber Security Centre. Phishing Attacks: Defending your organisation. https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/Phishing%20Attacks%20-%20Defending%20Your%20Organisation.pdf  Retrieved February 9, 2019.

12.              S. Zanero Ph.D. Student, Politecnico di Milano T.U. CTO & Co-Founder, Secure Network S.r.l. Automatic Detection of Web Application Security Flaws. https://www.blackhat.com/presentations/bh-europe-05/bh-eu-05-zanero.pdf Retrieved February 9, 2019.

13.              Rules of Professional Conduct for Lawyers 2007.  Rule 14(1) & 19(1) & (4)


[1]DLA Piper statement on malware attack. https://www.dlapiper.com/de/germany/news/2017/06/dla-piper   malware-statement. Retrieved February 9, 2019

Julie Sobowale, 6 Major Law Firm Hack in Recent Hinstroy. www.abajournal.com/magazine/article/law_firm_hacking_historyReterive 10, 2019

[2]Symantec Internet Security Threat Report Volume 21, April 2016, https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf. Retrieved February 9, 2019

[3]Natasha Turak, The next 9/11 will be a cyberattack, security expert warns, https://www.cnbc.com/2018/06/01/the-next-911-will-be-a-cyberattack-security-expert-warns.html. Retrieved February 9, 2019.

[4]Natasha Turak, The next 9/11 will be a cyberattack, security expert warns, https://www.cnbc.com/2018/06/01/the-next-911-will-be-a-cyberattack-security-expert-warns.html. Retrieved February 9, 2019.

[5] Barney Thompson, DLA Piper still struggling with Petyacyber-attack, https://www.ft.com/content/1b5f863a-624c-11e7-91a7-502f7ee26895. Retrieved February 9, 2019.

[6] TLP White, An Introduction to Malware. https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/An-introduction-to-malware.pdf Retrieved February 9, 2019.

[7]https://us.norton.com/internetsecurity-malware-what-is-a-computer-worm.html. Retrieved February 9, 2019.

[8]Kunkun Wang, Xiaoyu Chen, YeshengXu. A Brief Study of Trojan. https://cdn.ttgtmedia.com/searchSecurity/downloads/Malware_Ch06.pdf  Retrieved February 9, 2019.

[9]Daniel Jonasson, Johan Sigholm, What is Spyware. https://pdfs.semanticscholar.org/5779/5aaa5fbbd931b21ab7c11b83b6e305ce35cd.pdf  Retrieved February 9, 2019.

[10] National Cyber Security Centre. Phishing Attacks: Defending your organisation. https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/Phishing%20Attacks%20-%20Defending%20Your%20Organisation.pdf  Retrieved February 9, 2019.

[12] Zanero Ph.D. Student, Politecnico di Milano T.U. CTO & Co-Founder, Secure Network S.r.l. Automatic Detection of Web Application Security Flaws. https://www.blackhat.com/presentations/bh-europe-05/bh-eu-05-zanero.pdf Retrieved February 9, 2019.

[11] Rules of Professional Conduct for Lawyers 2007.  Rule 14(1) & 19(1) & (4)

Business Model Innovation for Agribusiness

1

By Nicholas Alifa

I have heard times without number that agriculture has the potential to boost the African economy.  I really do not agree with that school of thought. In Africa, agriculture precedes any other vocation. Apart from the fact that it is a cultural heritage passed down to us by our ancestors, agriculture is a major source of income, accounting for 65% of the total labour force and occupies 32% of the total GDP in Sub Sahara Africa according to African Development Bank.

If agriculture has the magical power to change the African economic narrative as we claim, it should have done that a long time ago.

The potential of African economy does not lie in agriculture but in agribusiness. It is business that grows the economy and that is exactly what is lacking or given little attention in the African agri-food sector. This truth has been discovered by the new generation of food and agricultural stakeholders in Africa and several attempts are being made by both the public and private sector players to change this narrative.

However, like any other business, the success of agribusinesses does not just lie in quality food and agricultural product or services but also in its business model. The business model in its simplest terms describes how an organization creates, delivers and captures values to its users. Many players in the Agri-food sector see themselves as just producers and suppliers rather than contractors, suppliers and product developers. As a result, they seem not to pay attention to building a scalable business model which is the bedrock of every successful business.

Business model (source: Forbes)

African agriculture entrepreneurs will have to deliver and capture values in innovative and cost-efficient ways to be able to meet the existing global challenges, emerging opportunities and changing consumer tastes. This is where Business Model Innovation (BMI) has its role.

According to Harvard Business Review, Business Model Innovation is “about delivering existing products that are produced by existing technologies to existing markets”.  It neither requires new technology nor the creation of a new market.  BMI in the agri-food sector has the potential to re-invent the African food systems and releases its potential of contributing significantly to the continent’s economic development. Furthermore, taking business model innovation seriously can set an agri-food company apart as it will position her to meet the constantly dynamic consumer demand and stand out of the competitors. Business Model Innovation often involves changes invisible to the outside world, thus it can bring advantages that are hard to copy.

Any food and agriculture business that must compete globally and grow sustainability need to have an excellent business model, and constantly re-invent the system through consistent business model innovation.


We are providing an opportunity to help businesses build a sustainable business model. Only 20 slots are available. You can contact us on +2348167303461 if you are interested.

George Weah Must Score Economic Goals for Liberia

0

Goalkeepers hated him. Defenders despised him as he made many look simple. His wizardry was unbounded. He was a legend in a land where you needed to be twice better to get half praise. George Weah was one of his generation’s finest footballers. He scored many goals – beautiful ones.

But King George has failed to score for Liberia recently. The football-turned-politician is the President of Liberia. His government has been accused of being clueless, political ineptitude and even corruption. In short, he has scored many own-goals – poverty and youth unemployment are up.

It would be an understatement to say that ordinary Liberians are disappointed with Weah’s performance. The footballing legend – who is the only African to ever win FIFA’s coveted World Player of the Year award, as well as the first-ever footballer to become a head of state – became President in January 2018 after campaigning to revive the economy, create jobs for the hundreds of thousands of young adults that make up his electoral base and, as he put it, to ensure that “public resources do not end up in the pockets of government officials”.

But rather than tackling the issues on which he and his Coalition for Democratic Change (CDC) were elected, critics charge, the government is going out of its way to maintain the status quo that prevailed under the previous government of Ellen Johnson Sirleaf, who also made history as Liberia and Africa’s first-ever female President. Incidentally, Sirleaf is a former World Bank functionary whose disastrous economic legacy after two Presidential terms belied her so-called technocratic pedigree.

It is getting to half-time in his Presidency. He needs a new strategy. King George must score economic goals, urgently. He must win this important game of his call: “Now that Mr. Weah has scored the most important goal of his life, the Liberian presidency, he has work to do. The Liberian people need to score their own collective goal: wellbeing and prosperity. It is left to Mr. Weah to build a winning team by strengthening the national offense and “defense” with a solid national economic team.”

LinkedIn Comment on Feed

You campaign in poetry and then – govern in prose.

Most times when politicians or new recruits into the world of politics reel out what they will do, when voted into power, the first thing that comes to my head is: do they even understand what they are saying? The same way most people read aloud, without making sense of what they are reading.

The problem is that when you build false hope, telling people things that have no relationship with reality, if they believe you, then you are likely to be haunted as long as you are in power. All your ineptitude and incompetence will become so visible such that even idiots can perceive them.

Whenever anyone seeking office tells you, I will do this and that, without following it up with the ‘how’, if you believe him/her, then you need help.

Why is it so difficult to tell the people the truth while campaigning and when in power? Because people don’t believe what is true, so deceit is the name of the game.

King George never had the intellectual rigour or excellence of the soul to be president, to believe otherwise means you never paid attention from the beginning of the whole melodrama.

Nigeria’s Big Challenge: Curbing Crude Oil Theft

0

By Ackilis Charles

Curbing crude oil theft ‘a war that must be won collectively to save our future’.

Nigeria is the sixth largest oil producing country in the world with a capacity of 2.5 million barrels per day (bpd) and potentially the largest petroleum sector in Africa.

The sector is plagued with complex but interwoven challenges spanning across insecurity, regulatory, political and socio-economic exigencies. Of all these, crude oil theft has been one arduous problem with its impact being felt across the length and breadth of the country and thus, should be made a national priority.

Crude oil theft is a global epidemic that has bedeviled a lot of oil producing countries and hence, an aspect of global terrorism not just native to Nigeria. Unfortunately for us over here, we seem to be worse hit, as according to data gotten from oilprice.com, Nigeria in 2014 was ranked ahead of Mexico, Iraq, Russia and Indonesia on an index of top five countries mostly plagued by oil theft.

Crude oil theft evolved into a cottage industry in the early 2000’s, creating huge socio-economic problems and with global oil price rising above $100 per barrel, the illicit albeit booming enterprise reached its climax between 2011 – 2014. In 2016, reports suggest about N3.8 trillion losses were recorded by the international oil corporations (IOC’s) and government due to crude oil theft, pipeline vandalism and sabotage.

Therefore, crude oil theft poses a significant threat to the socio-economic stability of communities, states, and countries in which the menace is prevalent. Hence, a commiserate advocacy campaign is needed to heighten the level of consciousness of the host indigenous communities where this illicit business is being carried out.

Poverty, high rate of unemployment, poor governance, wide spread corruption in the system, neglect by the government and some IOC on environmental safety and effects of resource extraction in oil bearing communities has been argued by some as the driving factors and rationale behind involvement in crude oil theft.

Pipeline saboteurs bold enough to speak to the camera see their actions as economically rational, politically necessary, morally defensible and socially productive. They describe illegal oil bunkering as an entrepreneurial, free market response to local economic dysfunction, socioeconomic pressures, chronic fuel and energy shortages in the region and government’s failure to deliver basic public services.

As much as some of these listed inadequacies might be true, resorting to hydrocarbon theft is equivalent to trying to solve a problem with a problem, which is unacceptable in any sane society as anarchy can never be a solution to injustice. Instead it begets other vices that could have negative effects on the country.

There are several categories of crude oil theft in existence. Three of the most common are as follows;

  • Small scale pipeline tapping/well head theft
  • Large scale illegal bunkering
  • Over lifting/under declaration at export terminals

While the three types are not mutually exclusive, they however do have different sources, actors, markets and revenue streams. Some findings have highlighted the complicity and increased cooperation between militant elements, state actors, oil companies in some of these categories of theft, as there have been little deterrence from enforcement agencies.

Crude oil theft albeit lucrative comes with immeasurable environment and social degradation, economic and security instability, health hazards, destruction of energy infrastructure resulting in huge resources being expended on repairs, investor apathy and hence low developmental prospects.

Statistics of the volume of crude lost to theft and its direct bearing on the communities and general polity has been difficult to access, as the sectors dealing is shrouded in secrecy and thus unavailability of synchronized data that could be deemed reliable. Nevertheless, anecdotal evidences were used to arrive at estimates of the impact and effect of this hydra headed national conundrum.

Assessment by Nigeria Natural Resource Center (NNRC) reported that losses due to crude theft and pipeline infractions as of the first quarter of 2108 averages at about 300,000 bpd with about 200,000 potentially stolen while the remainder is lost to shut-ins from pipeline damage, downtime and differed productions.

The impact of such losses is enormous and translates to severe revenue shortage for the federal government with estimate putting it at around N995.2 billion per annum. This estimate is greater than the combined allocations for health and education in the 2018 budget. Environmental damage, security cost and loss of investment as a consequence of crude theft was estimated at around $55 billion over the last decade.

Owing to the combination of negative downturn in global crude prices and low production output (majorly due to resource theft and vandalism), national debt levels did soar as the country had to borrow to finance budget deficit due to revenue shortfall against budget projections.

With limited education and refining expertise, refining operations by locals involved in oil bunkering do contribute to large scale environmental damage as this is done in the creeks with no proper channels for waste disposal, hence polluting the delta, burning down plants life and so on. In addition, products from their artisanal firewood refineries are deemed to be substandard by state authorities and occasionally destroyed.

In situations where stolen crude was not refined locally for communal consumption or sales, the proceeds from this blacklisted but thriving enterprise could be a key source of funding to militants and other armed groups who trade them for ammunitions, thus, threatening the security and political stability of those regions.

IOC’s over the years have fallen short of international best practices stipulated to ensure minimal environmental degradation. This has somewhat led to oil spillage and seepages destroying vast kilometers of lands, farms, polluting the waters and thus, killing off the source to feeding and livelihood of the indigenes of the host communities. Also, gas flaring which has been a tradition for most of these IOC’s has been found to have negative effect on the atmosphere.

Efforts to curb this epidemic and address it root cause(s) and not just the symptoms have in most cases been poorly conceived, unsustainable and inadequately implemented. At federal level, government response to crude theft have been usually reactionary instead of precautionary.

In addition, weak government institutions and lack of political will to call some of the ailing IOC’s to order was highlighted when a Dutch appeal court seated at the Hague ruled that Shell could be held liable for oil spills in Nigeria despite the firms claim that it was caused by sabotage.

Sequel to a media chat by New Nigeria Foundation (NNF), a non-governmental organisation (NGO) championing an advocacy program against crude oil theft, participants present unanimously agreed that the media, elites and influential state actors have a very important role to play in curbing oil theft, as this is a war that must be won collectively in order to secure our future.

Information is a powerful tool when properly harnessed. This should be used to attract the attention of stakeholders (government, oil corporations, middlemen in the oil and gas value chain and indigenes of oil bearing communities) to the devastating effect of this illicit albeit booming business down south and the need to not embark or continue in sabotaging the economy of the nation and also endangering their lives.

The media do play an important role in forming public opinion and thus should be used as an avenue to educate the youths, our mothers and the elderly against either engaging in oil bunkering or shielding the perpetrators because of communal sentiment or angst against the government. Also, locals should be educated on the impact and effects of crude theft on their health, environment and posterity, as it could take decades to clean up and reclaim vast kilometers of land or water made and still being made inhabitable.

Detailed investigation anchored by both public and private media bodies, NGO’s and other interested data mining corporations should be embarked on, as it could help bring to the fore, the scale and depth of crude theft/illegal bunkering in the petroleum upstream and downstream sectors.

Also, the media should write, report and expose corruption in the petroleum and maritime sectors as those charged with the obligation to police and guard against some of these illicit activities are somewhat complicit and supposedly aiding or abating these economic saboteurs for personal/communal gains.

The media should provide an alternative platform to the voiceless in host communities suffering environmental hazards plus other costs that comes with petroleum exploitative activities. Majority of local inhabitants live in penury despite the huge amount of resources being lifted from there and this they attribute to neglect by the authorities.

Well lettered countrymen, elites in the bracket of community, state and federal ambassadorial positions, veterans and elder statesmen should engage the government and bodies responsible for the welfare, safety and security of these host communities on the need to govern better, initiate people friendly policies, purge itself of corruption, adequately man and secure our waters and pipelines.

Government at the federal level should also engage in bilateral agreements with neighbouring countries where stolen crude sales could be made in order to block supply channels and make crude theft less lucrative for persistent criminal elements.

Charles Maduabueke, BSc in geology and mining, wrote from Lagos.

Understanding The Anchors To Great Success: Your brand, Your Integrity, Your Promise

0

By Adebola Alabi

A promise is a commitment to do or not do something. People of high integrity keep their promises. As a manufacturer, your promise is to deliver quality products on time within schedule in a cost-effective manner. As a service provider, your promise to your customer is to provide top notch services that will keep your customer engaged and happy. As an employee, your promise to your employer is to add value to the company and in return your employer commits to paying for your time at the end of each month.

As a father, when you promise to take your son to a school night game, he expects you to keep your commitments. Healthy relationships are built upon foundation of promises of loyalty, trustworthiness, and show of love by both couples. If you are a credit card user or if you have a loan with a bank, to maintain your integrity with your financial institution, you must keep your promise of paying your loans as at when due.

Every year politicians all over the world also make promises to their citizens, they pledge to create more jobs, build infrastructures, deliver access to great healthcare, and make life a little bit better for the people. The ones that kept their promises are often rewarded with another term in the office and they are held in high esteem in the society after their time of service. Companies that keep their promises of providing high quality products and excellent customer services are rewarded with loyal customers and more business opportunities. Parents that keep their promises are well respected and loved by their children. Borrowers that keep their promise get rewarded with high FICO score and lower interest rate when they go to bank to apply for loans. Relationships where husbands and wives keep to their commitment last longer with both couples living together happily.

Our world today is filled with many broken promises. Politicians no longer care to honor their oath of office, they look after their own interest rather than those of the citizens. Marriages are crashing just as soon as they get started, forever ever after is becoming a tale in a world that is less caring about the affairs of others. Employees are no longer loyal to their employers, they jump from one company to another, because they do not feel that their employers care about their future in the company. Companies will lower quality and customer satisfaction just to make extra profits. Broken promises also imply lack of trust among people in our society.  It is crucial to restore trust, integrity, and honor so that the interdependent relationship among people in the society can continue to thrive to the benefits of humans.

Change begins with you. Are you keeping all your promises and commitments? Are you a person of integrity? If not, here are some things you should know about keeping promises so that you can build your brand:

  1. Under promise, over deliver: Most people over promise and then under deliver. I believe it is better to under promise and over deliver, this is a better way to manage people’s expectations. Most of the time, in order to get what we want, we are tempted to oversell or exaggerate what we can do and we soon realize that we are not able to deliver on our promises when given the opportunity. Politicians will typically promise heaven on earth only to get to office and then realize that there are no enough resources to provide what they had promised. Job seekers will portray themselves as fountain of knowledge during interview and some will be a big disappointment to the employer after they hired the candidate. The right approach is to know your capacity, understand the requirement and make your promise based on the information.
  1. Step up and stretch: It is likely possible to find yourself in over your head. You told the interviewer you can do what you know that you have little knowledge about. You have promised your customer to deliver their products on a certain date, but your production line has been plagued by various quality issues. The electorates are waiting on the politician to deliver his momentous promises and nothing seems to be going in the right direction. It is time to step up and stretch. You should work harder, learn as fast as possible and grow beyond your previous limitations to match up your promises. That way, you will be able to restore trust and confidence in you.
  1. Fess up and take responsibility: You suddenly realized that you have over promised, the right thing to do is to own up and take responsibility. Go to that customer explain why he should expect delays. Go to your constituents and tell the reality of governing, show them that you are responsible, show them the progress that you are making, explain your challenges to them and let them know that you are ultimately responsible for delivering the promises.

Closing Thoughts

Your reputation is your brand. It is your duty and mission to guard and protect it jealously. One awesome way of ensuring that you protect your reputation is by making sure you keep your promises both in your personal and professional life. To make sure that you have a stellar reputation and brand, you must be a trustworthy person with high integrity, a person whose promises is his/her bond.