Transcript Slide 1
By at the Information Technology Professionals’ Assembly of the Computer Professionals (Registration Council of Nigeria) on 7 June 2012 1 Source: Google Image 2 INTRODUCTION The earliest recorded use of information for the survival of a nation is found in the work of the Chinese philosopher Sun Zi. Sun Zi referred to this as ‘foreknowledge’ and in contemporary times, it is called ‘intelligence’. What enables an intelligent government and leadership to overcome others and achieve extraordinary accomplishment beyond the reach of ordinary men is foreknowledge. Source: Google Image 3 INTRODUCTION(CONT) The provision of timely and credible intelligence, has helped nations in maintaining and enhancing relative security by giving forewarning of threats that allows for timely implementation of a preventive policy or strategy. Source: Google Image 4 INTRODUCTION(CONT) Credible and accurate intelligence gathering is essential to any country’s national security These threats are now multidimensional because traditional threats such as intra-state conflicts, proliferation of small arms and light weapons, are aided by the use of globalisation tools of which ICT is the driver. The handling and utilisation of intelligence obtained from various overt and covert sources play a significant role in mitigating issues affecting national security. Source: Google Image 5 INTRODUCTION(CONT) ICT provides the veritable platform for development across economic, security and other sectors if well harnessed With the ubiquity of computer and telecommunications technology, ICT has gained widespread recognition in most parts of the world. These realities, underscore the relevance of ICT within the perspective of national intelligence mechanism, particularly in the area of national security. Source: Google Image 6 During the Cold war, the CIA was always trying to stay ahead of the KGB. They discovered KGB agents in the US were hiring cars from a particular place and staying in particular locations. The CIA also hired the cars one per week, took them to their technical department and fitted them with audiovisual devices that would never be detected. Cameras and listening devices were also fitted covertly in the KGB agent’s apartments. 7 AIM To discuss the relevance of ICT in intelligence gathering as it pertains to national security in Nigeria. 8 SCOPE Conceptual clarifications. Organisation of intelligence in Nigeria’s security system. Steps in compromising security. ICT and information gathering techniques. Challenges inhibiting ICT’s contribution to intelligence gathering. The way forward 9 CONCEPTUAL DEFINITIONS Intelligence is conceived to mean intellectual skill, reasoning, imagination, or mental ability in solving problems. INTELLIGENCE Information relevant to a government’s formulating and implementing policy to further national security interests and deal with threats to those interests from actual or potential adversaries. Northrop Grumman Intel Gathering Aircraft System The actual and potential threats to a country’s interests can emanate either from internal or external sources. Source: Google Image 10 CONCEPTUAL DEFINITIONS(CONT) National security is the preservation of a way of life acceptable to the people and compatible with the needs and legitimate aspirations of others. It includes freedom from military attack or coercion, freedom from internal subversion and freedom from the erosion of political, economic and social values which are essential to the quality of life. NATIONAL SECURITY Source: Google Image 11 CONCEPTUAL DEFINITIONS(CONT) Aggregate of security interests of all individuals, communities and ethnic groups…. the strengthening of the Federal Republic of Nigeria, to advance her interest and objectives, to contain instability, control crime, eliminate corruption, enhance genuine development, progress and growth, improve the welfare and well being and quality of the life of every citizen. Source: Google Image 12 CONCEPTUAL DEFINITIONS(CONT) ICT is the use of modern technology to aid the capture, processing, storage and retrieval, and communication of information whether in the form of numerical data, text, sound or image. INFORMATION AND COMMUNICATION The drivers of which are; integrated circuits, advanced TECHNOLOGY computers and adaptive software, fibre optics, cellular technology, satellite and space technologies, advanced networks, and digitalization. In intelligence parlance ICT is seen as electronic tools that can support intelligence process. Source: Google Image 13 CONCEPTUAL DEFINITIONS(CONT) Intelligence is seen as a product, an activity and an organization, whose main objective is to contribute to national security policy in order to achieve national objectives. ICT supports intelligence activities such as collection, analysis, communication, dissemination and information management as well as covert actions like surveillance. If dependable intelligence is available using ICT, it follows that national security can reasonably be enhanced. Source: Google Image 14 ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM The Nigerian Security System comprises the primary security institutions such as, the Armed Forces of Nigeria (AFN), Nigeria Police, the Department of State Security and the National Intelligence Agency. The intelligence management structure and functions in the country has the National Security Adviser (NSA) as the overall coordinator of the National intelligence management process. Source: Google Image 16 ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM(CONT) The output of the intelligence management structure supports the decision making process of the National Security Council (NSC) and the National Defence Council (NDC) which are the highest levels of national security mechanism. The National Assembly’s Security and Intelligence committees are important because they exercise oversight functions on the intelligence agencies. Source: Google Image 17 American Cryptographers broke the Japanese Purple Code after the disaster of Pearl Harbour. In May 1942 it enabled them to gain revenge and turn the tide of war in the Pacific. Admiral Chester Nimitz learned of a planned Japanese invasion of an island codenamed “AF”. He was certain the target was Midway, but just to make sure, he ordered the commander there to radio HQ he was running short of water. Three days later, Japanese radio traffic revealed water shortage at their target “AF”. When the Japanese attacked they suffered a shattering defeat. 18 19 STEPS IN COMPROMISING SECURITY Critical groups literally mean groups or something that have a decisive importance in a country for example the AFN and other security agencies. Negative critical groups also known as Hostile Targets, are groups that constitute threat to a nation. Some of these include; a. Religious extremists – Boko Haram, Taliban. b. Criminal gangs and Petty Thieves. c. Kidnappers and Hostage Takers. d. Terrorist Groups – Al-Qaida. e. Sabotage Agents. Source: Google Image 20 STEPS IN COMPROMISING SECURITY(CONT) One cannot discountenance the activities of Hostile Intelligence Services, that is, those operating in embassies in Nigeria because they sometimes support Domestic Subversive Organisations. ICT must aid intelligence gathering in this era of globalisation or else we will continue to live in perpetual fear. Source: Google Image 21 STEPS IN COMPROMISING SECURITY(CONT) Surveillance. If there is a specific target that Hostile groups have chosen, that target area will most likely be observed during the planning phase of their operation. Therefore, it is important to take note of such things as someone recording or monitoring activities, drawing diagrams or annotating on maps, the use of vision-enhancing devices, Electro-optical surveillance made easier by ICT, allows images and sound to be sent in real time to controllers of the criminal group in a remote place. Source: Google Image 22 STEPS IN COMPROMISING SECURITY(CONT) Elicitation. Elicitation refers to attempts to gain information about a place, person, or operation To gain knowledge about a foreign staff residence, office, critical infrastructure like a power plant, oil & gas installations, military installations and ammunition depots. With help of the web, bombs and other Improvised Explosive Devices can be manufactured at relatively cheap cost and they are difficult to trace when deployed Source: Google Image 23 STEPS IN COMPROMISING SECURITY(CONT) Tests of Security. This is usually conducted by driving around the target, moving into sensitive areas and observing security or law enforcement response. They may also try to penetrate physical security barriers or procedures in order to assess strengths and weaknesses. They may try to gain this knowledge in order to make their mission or scheme more effective. Source: Google Image 24 STEPS IN COMPROMISING SECURITY(CONT) Acquiring Supplies. It may be a case where someone is purchasing or stealing explosives, weapons, or ammunition and chemicals for improvised home-made explosive devices. It could also entail acquisition of military uniforms, medals, badges, as well as flight passes, or even flight manuals. Possessing any of these would make it easier for one to gain entrance into secured or usually prohibited areas. Source: Google Image 25 STEPS IN COMPROMISING SECURITY(CONT) Suspicious People It may mean having someone in a workplace, building, neighbourhood, or business establishment that does not fit in because of their demeanour, their language usage or unusual questions they ask. Source: Google Image 26 STEPS IN COMPROMISING SECURITY(CONT) Dry Runs. Before execution of final operation or plan, a practice session will be conducted to work out the flaws and unanticipated problems. This activity could include mapping out routes and determining the timing of traffic lights and flow. This stage is usually considered the best time to intercept and stop an attack. Source: Google Image 27 STEPS IN COMPROMISING SECURITY(CONT) Funding and Fundraising. In order to fund an attack, terrorists seek financial resources from Hostile Intelligence Services. Suspicious transactions involving large cash payments, deposits or withdrawals are common signs of terrorist funding. There are telecommunications issues which include tendency to make an unusual large amount of telephone calls, use of internet, use of postal service, or use of ATM and banking facilities. Source: Google Image 28 Frank Bossard, an employee at the Ministry of Aviation jailed for 21 years in London for passing secrets to the Russians, was finally trapped by minute electronic bleepers attached to sensitive files. Bossard was already under suspicion, but MI5 needed evidence to take him to court. When he took one of the bugged files out of the building, he was trailed to a hotel room, and caught in the act of photographing the aircraft secrets inside 29 ICT AND INFORMATION GATHERING TECHNIQUES Through the use of information gathered and processed as intelligence; an operation can be designed to disrupt any impending threat that could emanate as an aftermath of the various methods discussed above. A source is a person, thing or activity from which information is obtained; it provides accurate and detailed information concerning vital issues or activities. Source: Google Image 30 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) Positive information indicates an activity in progress, identity of organisation, target or presence of suspect equipment and activities of critical groups. Negative information shows that either the suspect has abandoned the previous idea or taken another deceptive approach or cause of action. Source: Google Image 31 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) The Intelligence Cycle is the process of converting information requirements of a chief executive or policy maker to actionable Intelligence. Direction. This is the determination of information requirements or the chief executives order. Collection. This involves breaking request down into basic information requirements and tasking the collection agencies. Processing. ICT tools are used to aid the analysis because of the speed of processing and thus enhance national security. Source: Google Image 32 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) SOFTWARE TOOLS Vital information on markets, competitors and new products are now actively being collected by business organizations, to enable them formulate strategies to gain competitive advantage. Intelligence in the developing world depends largely on overt methods, as against covert methods to collect Open-Source Intelligence. Source: Google Image 33 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) SOFTWARE TOOLS Tools are classified as specific when they have been designed commercially, or in-house, purposely for application in one or more stages in the intelligence cycle. Data warehouse involves subjectoriented, integrated non-volatile collection of data in support of strategic management tasks. Data mining applications are now being used in counterterrorism. Online Analytical Processing is software that aids online collection and analysis of data for decisionmaking. Source: Google Image 34 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) SOFTWARE TOOLS General tools refer to innovations that can be adapted for intelligence use, like the Internet. The Internet can be used directly as a primary source of information and or a secondary source by experts. It runs virtually all essential utilities like telecommunications, transport, financial, banking, health, education, security and law enforcement. The social networking applications are vital means of intelligence gathering. Source: Google Image 35 Giorgio Rinaldi and his wife Angela Maria used their skills as parachutists to spy for Russia. The Italian skydivers travelled throughout NATO countries giving aerobatic displays, during rehearsals often photographed secret missile sites or sensitive airport installations. 36 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) HARDWARE TOOLS The predominant method of collecting information is surveillance. This includes keeping suspected persons, premises or vehicles under secret observation for purpose of identifying a suspect and their contacts.. With contemporary security challenges, ICT tools are becoming invaluable Peugeot 3008 Spy Car 37 Source: Google Image ICT AND INFORMATION GATHERING TECHNIQUES(CONT) HARDWARE TOOLS Covertly recording a conversation may provide important lead to times, dates and locations of future events. . The same recording may also provide names of parties involved and, it is quite often possible to pick up on the mood of those involved in the conversation that has been recorded. The sophisticated microphone technology now enables recording of conversations within a remote distance of a voice recording device. Source: Google Image 38 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) HARDWARE TOOLS Talking, texting, emailing, video watching, game playing, researching and shopping are now being carried out on smart phones. Smart phones, could enable combatants to communicate with one another in multiple ways, watch airplane drone video live in the field, quickly go through maps, and share intelligence reports, just to name a few possible uses. Source: Google Image 39 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) HARDWARE TOOLS GSM transmitter is usually of the size of a cigarette packet that can easily be concealed in a room, office, vehicle or even on a boat. Once fixed in position, it could be activated by dialing its secret number from any telephone in the world and the eavesdropper instantly hears all the conversations in the area Source: Google Image 40 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) HARDWARE TOOLS These are video surveillance cameras specifically designed on the premise that video installations are often prone to less than ideal lighting and operating conditions. There are analogue and digital cameras that operate with lens separate from the camera circuitry and specifically designed for covert operation in restricted environment. Some transmitters are specially designed for telephone monitoring and could transmit all calls from telephone extensions. Source: Google Image 41 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) HARDWARE TOOLS Pictures and Video tools which are miniature in size and easy to use include Tie, Pen, Belt, Glasses and Wristwatches. These items are made with inbuilt memory, undetectable spy camera, USB port, LED status indicator, continuous recording and auto shut-off. They have in-built DVR equipped with internal memory which allows for long hours of recording. Source: Google Image 42 ICT AND INFORMATION GATHERING TECHNIQUES(CONT) HARDWARE TOOLS An Echelon is the name given to the massive worldwide surveillance system that is capable of capturing and scanning every telephone call, fax and email sent anywhere in the world. An Echelon uses satellites, ground receiving stations and electronic intercepts that enables them pick all communications traffic sent by satellite, cellular, microwave and fibre optics Source: Google Image 43 CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATHERING CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATHERING POOR INFRASTRUCTURE. There are inadequate infrastructure both in private sectors and government parastatals including the military. Lack of modern ICT technologies for obtaining intelligence in most of the nation’s security agencies impacts negatively on national security. Source: Google Image 45 CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT) POOR HUMAN CAPITAL DEVELOPMENT ICT is knowledge-based hence it could be difficult if not impossible for the nation to have effective development in this sector without an active and coordinated human resource development. The nation lacks sufficient post graduates in various field of specialization related to intelligence gathering. Source: Google Image 46 CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT) Absence of National Electronic Database The USA National Counterterrorism Centre makes use of 23 databases. Nigeria is yet to have the required databases that can aid national security. The Sim card registration and the national ID-card project would be useful when fully implemented. Source: Google Image 47 A KGB agent bugged the bed used by the British Queen during her tour of West Germany in 1965. Martin Margraf, who posed as a freelance waiter, was working at the Luxurious Petersburg Hotel, beside the Rhine near Bonn, when the Queen and her husband Prince Philip arrived. He concealed tiny microphone behind the headboard of their bed and retrieved it when they left. 48 THE WAY FORWARD THE WAY FORWARD PROVISION OF INFRASTRUCTURE IGO in Nigeria suffers from lack of infrastructure that is typical of our nation. To take advantage of ICT, government could provide infrastructure such as constant power supply and modern telecommunication facilities like fibre optics and wireless technologies. Source: Google Image 50 THE WAY FORWARD(CONT) HUMAN CAPACITY DEVELOPMENT To ensure ICT penetration within the intelligence gathering organisations (IGO), the need to train and re-train personnel becomes more important.. The agencies would need to develop and upgrade their ICT personnel development programmes. The IGO needs to create minimum standards of competence and skills especially in the technical and military fields. Source: Google Image 51 THE WAY FORWARD(CONT) COORDINATION AND COOPERATION ICT has facilitated interconnectivity amongst peoples, government and organizations through networking. This could be achieved through the establishment of an intranet connection and electronic database to input commonly used data which must be updated regularly for it to be useful. The Computer Professionals (Registration Council of Nigeria) (CPN) must conduct extensive requirement analysis before embarking on any applications development or procurement. Source: Google Image 52 THE WAY FORWARD(CONT) DEDICATED TELECOMMUNICATION INFRASTRUCTURE In view of the inadequate service delivery and insecurity associated with the use of open commercial telecommunication lines, an IGO should have a dedicated telecommunication infrastructure.. Dedicated telecommunications would guarantee security of information and enhance effective gathering of intelligence. Source: Google Image 53 CONCLUSION CONCLUSION 54 RECOMMENDATION CPN should collaborate with Intelligence Gathering Organisations in Nigeria to develop purpose-built software and hardware system for intelligence gathering 55 THANK YOU FOR YOUR KIND ATTENTION 56 REFERENCES Aina A.O, “Intelligence and National Development; Challenges to Nigeria.” A research project submitted at National War College, AbujaNigeria. July 2003 Aminu Chindo, “Intelligence Management and Internal Security Operations: Challenges and Prospects”, Research Project submitted to National Defence College, Course 18 at National War College, Abuja 2010 Aris Pappas A and James J Simon Jr, “The Intelligence Community: 2001-2015”, http://www.cia.gov/csi/studies/vol46no1/article05.html, accessed on 10/12/2005 18:17 Bozeman AB, Strategic Intelligence & Statecraft, (Washington: Brasseys, Inc.1992) Buzan B, Peoples States and Fear: An Agenda for International Security Studies in the Post Cold War Era (2nd Edition), (New York: Harvester/Wheatsheat, 1999) Bichi YM,” The challenges of Operations and Intelligence in a Modernising Economic Environment: The Nigerian Perspective. (Unpublished Paper Delivered at an in-House Seminar at Abuja, NHQS in July, 2004) 57 REFERENCES (CONT) Boroffice RA, “National Space Programmes Challenges and Prospect”, lecture delivered to participants of National Defence College Course 16, 20 November 2007 Bruce Berkowitz D, and Allan Goodman E, Best Truth: Intelligence in the Information Age, (London: Yale University Press, 2000) Col Odunukwe BC, “Information and Communication Technology In Nigeria: An Evaluation”, Research Project submitted to National Defence College, Course 16 at National War College, Abuja 2005 Capt Okojie JO “Strategic intelligence and National Security In Nigeria: Challenges and Prospects”, Research Project submitted to National Defence College, Course 18 at National College College, Abuja 2010 Copley G, ‘Forging the Shield: Intelligence Management in the Developing World,’ (New York, 1987) Copeland TE, The Information Revolution and National Security, (Carlisle: Strategic Studies Institute, 2000) 58 REFERENCES (CONT) Chung LC and Lok LF, A Caveat to Researchers on the Implementation of Information Technology, (Hong Kong: Chinese University Press, 1998) “Creation of US NETCOMM”, Signal Magazine(US), 10/6/03 Dirk Vriens, “The Role of Information and Communication Technology in Competitive Intelligence”, (Netherland: University of Nijmegen, 2004) Dokubo C, ”Statecraft Strategy and National Security” lecture delivered at the National Defence College Abuja, to Participant of Course 16, on 2 October 2007 Eteng GB, “Striking a balance between Intelligence Gathering and Enforcement,” (The TRIPLE S Magazine, Published by the SSS, No 2, 2006) e-Shekels – Nationwide Survey of Internet Users, 2006 59 REFERENCES (CONT) Gerald Kovacich L and William Boni C, High-Technology-Crime Investigator’s Handbook: Working in the Global Information Environment, (USA: Butterworth-Heinemann, 2000) Grand Strategy for National Security, 2001 Gallie W, “Essentially Contested Concepts”, Processing of the Aristotelian Society, Vol. 56, (1955-56) Hamilton LG, “Challenges for Intelligence in American Democracy,” (A paper Presented at International Spy Museum Exhibit opening, Washington, USA, May 5, 2004) Hadiza Mustapha, “Nigeria Intelligence Community and Challenges of Information and Communication Technology”, Research Project submitted to National Defence College, Course 14 at National War College, Abuja 2006 Johns G, political Editor, The Telegraph, ‘How France helped us win the Falklands war, by John Nott’ Published on 13th March, 2002 60