Transcript Slide 1

By
at the
Information Technology Professionals’ Assembly of the
Computer Professionals (Registration Council of Nigeria)
on
7 June 2012
1
Source: Google Image
2
INTRODUCTION

The earliest recorded use
of information for the survival of
a nation is found in the work of
the Chinese philosopher Sun Zi.

Sun Zi referred to this as
‘foreknowledge’
and
in
contemporary times, it is called
‘intelligence’.

What
enables
an
intelligent
government
and
leadership to overcome others
and
achieve
extraordinary
accomplishment beyond
the
reach of ordinary men is
foreknowledge.
Source: Google Image
3
INTRODUCTION(CONT)
The provision of timely
and credible
intelligence, has helped
nations in maintaining
and enhancing relative
security by giving
forewarning of threats
that allows for timely
implementation of a
preventive policy or
strategy.
Source: Google Image
4
INTRODUCTION(CONT)

Credible
and
accurate
intelligence gathering is essential
to any country’s national security

These threats are now multidimensional because traditional
threats
such
as
intra-state
conflicts, proliferation of small
arms and light weapons, are aided
by the use of globalisation tools of
which ICT is the driver.

The handling and utilisation
of intelligence obtained from
various overt and covert sources
play a significant role in mitigating
issues affecting national security.
Source: Google Image
5
INTRODUCTION(CONT)

ICT provides the veritable
platform for development across
economic, security and other
sectors if well harnessed

With the ubiquity of
computer and telecommunications
technology, ICT has gained
widespread recognition in most
parts of the world.

These realities, underscore
the relevance of ICT within the
perspective of national intelligence
mechanism, particularly in the area
of national security.
Source: Google Image
6
During the Cold war, the CIA was always trying to
stay ahead of the KGB. They discovered KGB agents
in the US were hiring cars from a particular place
and staying in particular locations. The CIA also
hired the cars one per week, took them to their
technical department and fitted them with audiovisual devices that would never be detected.
Cameras and listening devices were also fitted
covertly in the KGB agent’s apartments.
7
AIM
To discuss the relevance of ICT
in intelligence gathering as it
pertains to national security in
Nigeria.
8
SCOPE

Conceptual clarifications.

Organisation of intelligence in Nigeria’s security
system.

Steps in compromising security.

ICT and information gathering techniques.

Challenges inhibiting ICT’s contribution to
intelligence gathering.

The way forward
9
CONCEPTUAL DEFINITIONS

Intelligence is conceived
to
mean
intellectual
skill,
reasoning,
imagination,
or
mental
ability
in
solving
problems.
INTELLIGENCE

Information relevant to a
government’s formulating and
implementing policy to further
national security interests and
deal with threats to those
interests
from
actual
or
potential adversaries.
Northrop Grumman Intel Gathering
Aircraft System

The actual and potential
threats to a country’s interests
can
emanate
either
from
internal or external sources.
Source: Google Image
10
CONCEPTUAL DEFINITIONS(CONT)

National security is the
preservation of a way of life
acceptable to the people and
compatible with the needs and
legitimate
aspirations
of
others. It includes freedom
from
military
attack
or
coercion,
freedom
from
internal
subversion
and
freedom from the erosion of
political, economic and social
values which are essential to
the quality of life.
NATIONAL SECURITY
Source: Google Image
11
CONCEPTUAL DEFINITIONS(CONT)

Aggregate
of
security
interests of all individuals,
communities
and
ethnic
groups…. the strengthening of
the Federal Republic of Nigeria,
to advance her interest and
objectives,
to
contain
instability,
control
crime,
eliminate corruption, enhance
genuine development, progress
and
growth,
improve
the
welfare and well being and
quality of the life of every
citizen.
Source: Google Image
12
CONCEPTUAL DEFINITIONS(CONT)
 ICT is the use of modern
technology to aid the capture,
processing, storage and retrieval,
and
communication
of
information whether in the form
of numerical data, text, sound or
image.
INFORMATION AND
COMMUNICATION
 The drivers of which are;
integrated
circuits,
advanced
TECHNOLOGY
computers and adaptive software,
fibre optics, cellular technology,
satellite and space technologies,
advanced
networks,
and
digitalization.

In intelligence parlance ICT
is seen as electronic tools that can
support intelligence process.
Source: Google Image
13
CONCEPTUAL DEFINITIONS(CONT)
 Intelligence is seen as a
product, an activity and an
organization, whose main
objective is to contribute to
national security policy in order to
achieve national objectives.
 ICT supports intelligence
activities such as collection,
analysis, communication,
dissemination and information
management as well as covert
actions like surveillance.
 If dependable intelligence is
available using ICT, it follows that
national security can reasonably be
enhanced.
Source: Google Image
14
ORGANISATION OF INTELLIGENCE
IN NIGERIA’S SECURITY SYSTEM
ORGANISATION OF INTELLIGENCE IN
NIGERIA’S SECURITY SYSTEM

The Nigerian Security
System comprises the primary
security institutions such as, the
Armed Forces of Nigeria (AFN),
Nigeria Police, the Department
of State Security and the
National Intelligence Agency.
 The intelligence management
structure and functions in the
country has the National
Security Adviser (NSA) as the
overall coordinator of the
National intelligence
management process.
Source: Google Image
16
ORGANISATION OF INTELLIGENCE IN
NIGERIA’S SECURITY SYSTEM(CONT)

The output of the
intelligence management
structure supports the
decision making process of the
National Security Council
(NSC) and the National
Defence Council (NDC) which
are the highest levels of
national security mechanism.
 The National Assembly’s
Security and Intelligence
committees are important
because they exercise
oversight functions on the
intelligence agencies.
Source: Google Image
17
American Cryptographers broke the Japanese Purple Code
after the disaster of Pearl Harbour. In May 1942 it enabled
them to gain revenge and turn the tide of war in the Pacific.
Admiral Chester Nimitz learned of a planned Japanese
invasion of an island codenamed “AF”. He was certain the
target was Midway, but just to make sure, he ordered the
commander there to radio HQ he was running short of water.
Three days later, Japanese radio traffic revealed water
shortage at their target “AF”. When the Japanese attacked
they suffered a shattering defeat.
18
19
STEPS IN COMPROMISING SECURITY

Critical groups literally mean
groups or something that have a
decisive importance in a country for
example the AFN and other security
agencies.

Negative critical groups also
known as Hostile Targets, are groups
that constitute threat to a nation.
Some of these include;
a.
Religious extremists – Boko
Haram, Taliban.
b.
Criminal gangs and Petty
Thieves.
c.
Kidnappers and Hostage
Takers.
d.
Terrorist Groups – Al-Qaida.
e. Sabotage Agents.
Source: Google Image
20
STEPS IN COMPROMISING SECURITY(CONT)

One cannot
discountenance the
activities of Hostile
Intelligence Services, that
is, those operating in
embassies in Nigeria
because they sometimes
support Domestic
Subversive Organisations.
 ICT must aid intelligence
gathering in this era of
globalisation or else we
will continue to live in
perpetual fear.
Source: Google Image
21
STEPS IN COMPROMISING SECURITY(CONT)
Surveillance.

If there is a specific target
that Hostile groups have chosen,
that target area will most likely be
observed during the planning phase
of their operation.
 Therefore, it is important to take
note of such things as someone
recording or monitoring activities,
drawing diagrams or annotating on
maps, the use of vision-enhancing
devices,
Electro-optical surveillance made
easier by ICT, allows images and
sound to be sent in real time to
controllers of the criminal group in
a remote place.
Source: Google Image
22
STEPS IN COMPROMISING SECURITY(CONT)
Elicitation.

Elicitation refers to attempts to
gain information about a place,
person, or operation

To gain knowledge about a
foreign staff residence, office,
critical infrastructure like a power
plant, oil & gas installations,
military installations and
ammunition depots.
 With help of the web, bombs and
other Improvised Explosive Devices
can be manufactured at relatively
cheap cost and they are difficult to
trace when deployed
Source: Google Image
23
STEPS IN COMPROMISING SECURITY(CONT)
Tests of Security.

This is usually conducted by
driving around the target,
moving into sensitive areas and
observing security or law
enforcement response.
 They may also try to
penetrate physical security
barriers or procedures in order
to assess strengths and
weaknesses.
 They may try to gain this
knowledge in order to make their
mission or scheme more
effective.
Source: Google Image
24
STEPS IN COMPROMISING SECURITY(CONT)
Acquiring Supplies.
 It may be a case where
someone is purchasing or
stealing explosives, weapons, or
ammunition and chemicals for
improvised home-made
explosive devices.
 It could also entail
acquisition of military uniforms,
medals, badges, as well as flight
passes, or even flight manuals.
 Possessing any of these
would make it easier for one to
gain entrance into secured or
usually prohibited areas.
Source: Google Image
25
STEPS IN COMPROMISING SECURITY(CONT)
Suspicious People

It may mean having
someone in a workplace,
building, neighbourhood,
or business establishment
that does not fit in because
of their demeanour, their
language usage or unusual
questions they ask.
Source: Google Image
26
STEPS IN COMPROMISING SECURITY(CONT)
Dry Runs.
 Before execution of final
operation or plan, a practice
session will be conducted to
work out the flaws and
unanticipated problems.

This activity could include
mapping out routes and
determining the timing of traffic
lights and flow.
 This stage is usually
considered the best time to
intercept and stop an attack.
Source: Google Image
27
STEPS IN COMPROMISING SECURITY(CONT)
Funding and Fundraising.
 In order to fund an attack,
terrorists seek financial resources
from Hostile Intelligence Services.
 Suspicious transactions
involving large cash payments,
deposits or withdrawals are
common signs of terrorist funding.
 There are telecommunications
issues which include tendency to
make an unusual large amount of
telephone calls, use of internet, use
of postal service, or use of ATM and
banking facilities.
Source: Google Image
28
Frank Bossard, an employee at the Ministry of
Aviation jailed for 21 years in London for passing
secrets to the Russians, was finally trapped by
minute electronic bleepers attached to sensitive files.
Bossard was already under suspicion, but MI5
needed evidence to take him to court. When he took
one of the bugged files out of the building, he was
trailed to a hotel room, and caught in the act of
photographing the aircraft secrets inside
29
ICT AND INFORMATION GATHERING
TECHNIQUES
 Through the use of
information gathered and
processed as intelligence; an
operation can be designed to
disrupt any impending threat
that could emanate as an
aftermath of the various
methods discussed above.
 A source is a person, thing
or activity from which
information is obtained; it
provides accurate and detailed
information concerning vital
issues or activities.
Source: Google Image
30
ICT AND INFORMATION GATHERING
TECHNIQUES(CONT)

Positive information
indicates an activity in
progress, identity of
organisation, target or
presence of suspect
equipment and activities of
critical groups.

Negative information
shows that either the suspect
has abandoned the previous
idea or taken another
deceptive approach or cause
of action.
Source: Google Image
31
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
 The Intelligence Cycle is the
process of converting information
requirements of a chief executive
or policy maker to actionable
Intelligence.
 Direction. This is the
determination of information
requirements or the chief
executives order.
 Collection. This involves
breaking request down into basic
information requirements and
tasking the collection agencies.
 Processing. ICT tools are used
to aid the analysis because of the
speed of processing and thus
enhance national security.
Source: Google Image
32
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
SOFTWARE TOOLS
 Vital information on
markets, competitors and
new products are now
actively being collected by
business organizations, to
enable them formulate
strategies to gain competitive
advantage.
 Intelligence in the
developing world depends
largely on overt methods, as
against covert methods to
collect Open-Source
Intelligence.
Source: Google Image
33
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
SOFTWARE TOOLS
 Tools are classified as specific
when they have been designed
commercially, or in-house,
purposely for application in one or
more stages in the intelligence
cycle.
 Data warehouse involves subjectoriented, integrated non-volatile
collection of data in support of
strategic management tasks. Data
mining applications are now being
used in counterterrorism.
 Online Analytical Processing is
software that aids online collection
and analysis of data for decisionmaking.
Source: Google Image
34
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
SOFTWARE TOOLS
 General tools refer to innovations
that can be adapted for intelligence
use, like the Internet.
 The Internet can be used directly
as a primary source of information
and or a secondary source by experts.
 It runs virtually all essential
utilities like telecommunications,
transport, financial, banking, health,
education, security and law
enforcement.
 The social networking applications
are vital means of intelligence
gathering.
Source: Google Image
35
Giorgio Rinaldi and his wife Angela Maria
used their skills as parachutists to spy for
Russia. The Italian skydivers travelled
throughout NATO countries giving aerobatic
displays, during rehearsals often
photographed secret missile sites or sensitive
airport installations.
36
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
HARDWARE TOOLS
 The predominant method
of collecting information is
surveillance.
 This includes keeping
suspected persons, premises
or vehicles under secret
observation for purpose of
identifying a suspect and
their contacts..
 With contemporary
security challenges, ICT tools
are becoming invaluable
Peugeot 3008 Spy Car
37
Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
HARDWARE TOOLS
 Covertly recording a
conversation may provide
important lead to times, dates and
locations of future events. .
 The same recording may also
provide names of parties involved
and, it is quite often possible to pick
up on the mood of those involved in
the conversation that has been
recorded.
 The sophisticated microphone
technology now enables recording
of conversations within a remote
distance of a voice recording device.
Source: Google Image
38
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
HARDWARE TOOLS
 Talking, texting, emailing,
video watching, game playing,
researching and shopping are
now being carried out on smart
phones.
 Smart phones, could enable
combatants to communicate
with one another in multiple
ways, watch airplane drone
video live in the field, quickly
go through maps, and share
intelligence reports, just to
name a few possible uses.
Source: Google Image
39
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
HARDWARE TOOLS
 GSM transmitter is usually
of the size of a cigarette packet
that can easily be concealed in
a room, office, vehicle or even
on a boat.
 Once fixed in position, it
could be activated by dialing its
secret number from any
telephone in the world and the
eavesdropper instantly hears
all the conversations in the
area
Source: Google Image
40
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
HARDWARE TOOLS
 These are video surveillance
cameras specifically designed on
the premise that video installations
are often prone to less than ideal
lighting and operating conditions.
 There are analogue and digital
cameras that operate with lens
separate from the camera circuitry
and specifically designed for covert
operation in restricted
environment.
 Some transmitters are specially
designed for telephone monitoring
and could transmit all calls from
telephone extensions.
Source: Google Image
41
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
HARDWARE TOOLS
 Pictures and Video tools
which are miniature in size and
easy to use include Tie, Pen,
Belt, Glasses and Wristwatches.
 These items are made with
inbuilt memory, undetectable
spy camera, USB port, LED
status indicator, continuous
recording and auto shut-off.
 They have in-built DVR
equipped with internal memory
which allows for long hours of
recording.
Source: Google Image
42
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
HARDWARE TOOLS
 An Echelon is the name
given to the massive
worldwide surveillance
system that is capable of
capturing and scanning every
telephone call, fax and email
sent anywhere in the world.
 An Echelon uses satellites,
ground receiving stations
and electronic intercepts that
enables them pick all
communications traffic sent
by satellite, cellular,
microwave and fibre optics
Source: Google Image
43
CHALLENGES INHIBITING ICT’S
CONTRIBUTION TO INTELLIGENCE
GATHERING
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO
INTELLIGENCE GATHERING
POOR INFRASTRUCTURE.
 There are inadequate
infrastructure both in
private sectors and
government parastatals
including the military.
 Lack of modern ICT
technologies for obtaining
intelligence in most of the
nation’s security agencies
impacts negatively on
national security.
Source: Google Image
45
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO
INTELLIGENCE GATEHRING(CONT)
POOR HUMAN CAPITAL
DEVELOPMENT
 ICT is knowledge-based
hence it could be difficult if
not impossible for the nation
to have effective development
in this sector without an active
and coordinated human
resource development.
 The nation lacks sufficient
post graduates in various field
of specialization related to
intelligence gathering.
Source: Google Image
46
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO
INTELLIGENCE GATEHRING(CONT)
Absence of National Electronic
Database
 The USA National
Counterterrorism Centre makes
use of 23 databases.
 Nigeria is yet to have the
required databases that can aid
national security.
 The Sim card registration
and the national ID-card project
would be useful when fully
implemented.
Source: Google Image
47
A KGB agent bugged the bed used by the
British Queen during her tour of West Germany
in 1965. Martin Margraf, who posed as a
freelance waiter, was working at the
Luxurious Petersburg Hotel, beside the Rhine
near Bonn, when the Queen and her husband
Prince Philip arrived. He concealed tiny
microphone behind the headboard of their bed
and retrieved it when they left.
48
THE WAY FORWARD
THE WAY FORWARD
PROVISION OF
INFRASTRUCTURE
 IGO in Nigeria suffers from
lack of infrastructure that is
typical of our nation.
 To take advantage of ICT,
government could provide
infrastructure such as constant
power supply and modern
telecommunication facilities
like fibre optics and wireless
technologies.
Source: Google Image
50
THE WAY FORWARD(CONT)
HUMAN CAPACITY DEVELOPMENT
 To ensure ICT penetration within
the intelligence gathering
organisations (IGO), the need to train
and re-train personnel becomes more
important..
 The agencies would need to develop
and upgrade their ICT personnel
development programmes.
 The IGO needs to create minimum
standards of competence and skills
especially in the technical and
military fields.
Source: Google Image
51
THE WAY FORWARD(CONT)
COORDINATION AND COOPERATION
 ICT has facilitated
interconnectivity amongst peoples,
government and organizations
through networking.
 This could be achieved through
the establishment of an intranet
connection and electronic database
to input commonly used data which
must be updated regularly for it to
be useful.
 The Computer Professionals
(Registration Council of Nigeria)
(CPN) must conduct extensive
requirement analysis before
embarking on any applications
development or procurement.
Source: Google Image
52
THE WAY FORWARD(CONT)
DEDICATED TELECOMMUNICATION
INFRASTRUCTURE
 In view of the inadequate
service delivery and insecurity
associated with the use of open
commercial telecommunication
lines, an IGO should have a
dedicated telecommunication
infrastructure..
 Dedicated telecommunications
would guarantee security of
information and enhance effective
gathering of intelligence.
Source: Google Image
53
CONCLUSION
CONCLUSION
54
RECOMMENDATION
CPN should collaborate with Intelligence
Gathering Organisations in Nigeria to
develop purpose-built software and
hardware system for intelligence gathering
55
THANK YOU FOR
YOUR KIND
ATTENTION
56
REFERENCES

Aina A.O, “Intelligence and National Development; Challenges to
Nigeria.” A research project submitted at National War College, AbujaNigeria. July 2003

Aminu Chindo, “Intelligence Management and Internal Security
Operations: Challenges and Prospects”, Research Project submitted to
National Defence College, Course 18 at National War College, Abuja 2010

Aris Pappas A and James J Simon Jr, “The Intelligence Community:
2001-2015”,
http://www.cia.gov/csi/studies/vol46no1/article05.html,
accessed on 10/12/2005 18:17

Bozeman AB, Strategic Intelligence & Statecraft, (Washington:
Brasseys, Inc.1992)

Buzan B, Peoples States and Fear: An Agenda for International Security
Studies in the Post Cold War Era (2nd Edition), (New York:
Harvester/Wheatsheat, 1999)

Bichi YM,” The challenges of Operations and Intelligence in a
Modernising Economic Environment: The Nigerian Perspective. (Unpublished
Paper Delivered at an in-House Seminar at Abuja, NHQS in July, 2004)
57
REFERENCES (CONT)

Boroffice RA, “National Space Programmes Challenges and
Prospect”, lecture delivered to participants of National Defence College
Course 16, 20 November 2007

Bruce Berkowitz D, and Allan Goodman E, Best Truth: Intelligence
in the Information Age, (London: Yale University Press, 2000)

Col Odunukwe BC, “Information and Communication Technology In
Nigeria: An Evaluation”, Research Project submitted to National Defence
College, Course 16 at National War College, Abuja 2005

Capt Okojie JO “Strategic intelligence and National Security In
Nigeria: Challenges and Prospects”, Research Project submitted to
National Defence College, Course 18 at National College College, Abuja
2010

Copley G, ‘Forging the Shield: Intelligence Management in the
Developing World,’ (New York, 1987)

Copeland TE, The Information Revolution and National Security,
(Carlisle: Strategic Studies Institute, 2000)
58
REFERENCES (CONT)

Chung LC and
Lok LF, A Caveat to Researchers on the
Implementation of Information Technology, (Hong Kong: Chinese
University Press, 1998)

“Creation of US NETCOMM”, Signal Magazine(US), 10/6/03

Dirk Vriens, “The Role of Information and Communication
Technology in Competitive Intelligence”, (Netherland: University of
Nijmegen, 2004)

Dokubo C, ”Statecraft Strategy and National Security” lecture
delivered at the National Defence College Abuja, to Participant of Course
16, on 2 October 2007

Eteng GB, “Striking a balance between Intelligence Gathering and
Enforcement,” (The TRIPLE S Magazine, Published by the SSS, No 2,
2006)

e-Shekels – Nationwide Survey of Internet Users, 2006
59
REFERENCES (CONT)

Gerald Kovacich L and William Boni C, High-Technology-Crime
Investigator’s Handbook: Working in the Global Information
Environment, (USA: Butterworth-Heinemann, 2000)

Grand Strategy for National Security, 2001

Gallie W, “Essentially Contested Concepts”, Processing of the
Aristotelian Society, Vol. 56, (1955-56)

Hamilton LG, “Challenges for Intelligence in American Democracy,”
(A paper Presented at International Spy Museum Exhibit opening,
Washington, USA, May 5, 2004)

Hadiza Mustapha, “Nigeria Intelligence Community and Challenges
of Information and Communication Technology”, Research Project
submitted to National Defence College, Course 14 at National War
College, Abuja 2006

Johns G, political Editor, The Telegraph, ‘How France helped us win
the Falklands war, by John Nott’ Published on 13th March, 2002
60