source: google image
DESCRIPTION
INTELLIGENCE GATHERING AND NATIONAL SECURITY: USING INFORMATION TECHNOLOGY TO COMBAT NATIONAL SECURITY CHALLENGES By Air Commodore IA Odun-Ayo psc (+) fdc (+) MSc NPOM at the Information Technology Professionals’ Assembly of the Computer Professionals (Registration Council of Nigeria) on - PowerPoint PPT PresentationTRANSCRIPT
11
Source: Google Image 22
INTRODUCTION The earliest recorded use of information for the survival of a nation is found in the work of the Chinese philosopher Sun Zi.
Sun Zi referred to this as ‘foreknowledge’ and in contemporary times, it is called ‘intelligence’.
What enables an intelligent government and leadership to overcome others and achieve extraordinary accomplishment beyond the reach of ordinary men is foreknowledge.
Source: Google Image 33
INTRODUCTION(CONT)The provision of timely and credible intelligence, has helped nations in maintaining and enhancing relative security by giving forewarning of threats that allows for timely implementation of a preventive policy or strategy.
Source: Google Image 44
INTRODUCTION(CONT) Credible and accurate intelligence gathering is essential to any country’s national security
These threats are now multi-dimensional because traditional threats such as intra-state conflicts, proliferation of small arms and light weapons, are aided by the use of globalisation tools of which ICT is the driver.
The handling and utilisation of intelligence obtained from various overt and covert sources play a significant role in mitigating issues affecting national security.
Source: Google Image 55
ICT provides the veritable platform for development across economic, security and other sectors if well harnessed
With the ubiquity of computer and telecommunications technology, ICT has gained widespread recognition in most parts of the world.
These realities, underscore the relevance of ICT within the perspective of national intelligence mechanism, particularly in the area of national security.
INTRODUCTION(CONT)
Source: Google Image 66
77
During the Cold war, the CIA was always
trying to stay ahead of the KGB. They
discovered KGB agents in the US were
hiring cars from a particular place and
staying in particular locations. The CIA
also hired the cars one per week, took them
to their technical department and fitted
them with audio-visual devices that would
never be detected. Cameras and listening
devices were also fitted covertly in the KGB
agent’s apartments.
AIM
To discuss the relevance of
ICT in intelligence
gathering as it pertains to
national security in Nigeria.
88
SCOPE Conceptual clarifications.
Organisation of intelligence in Nigeria’s security system.
Steps in compromising security.
ICT and information gathering techniques.
Challenges inhibiting ICT’s contribution to intelligence gathering.
The way forward
99
CONCEPTUAL DEFINITIONS Intelligence is conceived to mean intellectual skill, reasoning, imagination, or mental ability in solving problems.
Information relevant to a government’s formulating and implementing policy to further national security interests and deal with threats to those interests from actual or potential adversaries.
The actual and potential threats to a country’s interests can emanate either from internal or external sources.
Northrop Grumman Intel Gathering Aircraft System
Source: Google Image 1010
INTELLIGENCE
National security is the preservation of a way of life acceptable to the people and compatible with the needs and legitimate aspirations of others. It includes freedom from military attack or coercion, freedom from internal subversion and freedom from the erosion of political, economic and social values which are essential to the quality of life.
CONCEPTUAL DEFINITIONS(CONT)
Source: Google Image 1111
NATIONAL SECURITY
Aggregate of security interests of all individuals, communities and ethnic groups…. the strengthening of the Federal Republic of Nigeria, to advance her interest and objectives, to contain instability, control crime, eliminate corruption, enhance genuine development, progress and growth, improve the welfare and well being and quality of the life of every citizen.
CONCEPTUAL DEFINITIONS(CONT)
Source: Google Image 1212
ICT is the use of modern technology to aid the capture, processing, storage and retrieval, and communication of information whether in the form of numerical data, text, sound or image.
The drivers of which are; integrated circuits, advanced computers and adaptive software, fibre optics, cellular technology, satellite and space technologies, advanced networks, and digitalization.
In intelligence parlance ICT is seen as electronic tools that can support intelligence process.
CONCEPTUAL DEFINITIONS(CONT)
Source: Google Image 1313
INFORMATION AND COMMUNICATION
TECHNOLOGY
Intelligence is seen as a product, an activity and an organization, whose main objective is to contribute to national security policy in order to achieve national objectives.
ICT supports intelligence activities such as collection, analysis, communication, dissemination and information management as well as covert actions like surveillance.
If dependable intelligence is available using ICT, it follows that national security can reasonably be enhanced.
CONCEPTUAL DEFINITIONS(CONT)
Source: Google Image 1414
ORGANISATION OF INTELLIGENCE IN NIGERIA’S
SECURITY SYSTEM
ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM
The Nigerian Security System comprises the primary security institutions such as, the Armed Forces of Nigeria (AFN), Nigeria Police, the Department of State Security and the National Intelligence Agency.
The intelligence management structure and functions in the country has the National Security Adviser (NSA) as the overall coordinator of the National intelligence management process.
Source: Google Image 1616
The output of the intelligence management structure supports the decision making process of the National Security Council (NSC) and the National Defence Council (NDC) which are the highest levels of national security mechanism.
ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM(CONT)
Source: Google Image 1717
The National Assembly’s Security and Intelligence committees are important because they exercise oversight functions on the intelligence agencies.
1818
American Cryptographers broke the
Japanese Purple Code after the disaster of
Pearl Harbour. In May 1942 it enabled them
to gain revenge and turn the tide of war in
the Pacific. Admiral Chester Nimitz learned
of a planned Japanese invasion of an island
codenamed “AF”. He was certain the target
was Midway, but just to make sure, he
ordered the commander there to radio HQ
he was running short of water. Three days
later, Japanese radio traffic revealed water
shortage at their target “AF”. When the
Japanese attacked they suffered a
shattering defeat.
1919
STEPS IN COMPROMISING SECURITY Critical groups literally mean groups or something that have a decisive importance in a country for example the AFN and other security agencies.
Negative critical groups also known as Hostile Targets, are groups that constitute threat to a nation. Some of these include; a. Religious extremists – Boko Haram, Taliban.b. Criminal gangs and Petty Thieves.c. Kidnappers and Hostage Takers.d. Terrorist Groups – Al-Qaida.e.Sabotage Agents. Source: Google Image 2020
One cannot discountenance the activities of Hostile Intelligence Services, that is, those operating in embassies in Nigeria because they sometimes support Domestic Subversive Organisations.
ICT must aid intelligence gathering in this era of globalisation or else we will continue to live in perpetual fear.
STEPS IN COMPROMISING SECURITY(CONT)
Source: Google Image 2121
Surveillance. If there is a specific target that Hostile groups have chosen, that target area will most likely be observed during the planning phase of their operation.
Therefore, it is important to take note of such things as someone recording or monitoring activities, drawing diagrams or annotating on maps, the use of vision-enhancing devices,
Electro-optical surveillance made easier by ICT, allows images and sound to be sent in real time to controllers of the criminal group in a remote place.
STEPS IN COMPROMISING SECURITY(CONT)
Source: Google Image 2222
Elicitation.
Elicitation refers to attempts to gain information about a place, person, or operation
To gain knowledge about a foreign staff residence, office, critical infrastructure like a power plant, oil & gas installations, military installations and ammunition depots.
With help of the web, bombs and other Improvised Explosive Devices can be manufactured at relatively cheap cost and they are difficult to trace when deployed
STEPS IN COMPROMISING SECURITY(CONT)
Source: Google Image 2323
Tests of Security. This is usually conducted by driving around the target, moving into sensitive areas and observing security or law enforcement response.
They may also try to penetrate physical security barriers or procedures in order to assess strengths and weaknesses.
They may try to gain this knowledge in order to make their mission or scheme more effective.
STEPS IN COMPROMISING SECURITY(CONT)
Source: Google Image 2424
Acquiring Supplies. It may be a case where someone is purchasing or stealing explosives, weapons, or ammunition and chemicals for improvised home-made explosive devices.
It could also entail acquisition of military uniforms, medals, badges, as well as flight passes, or even flight manuals.
Possessing any of these would make it easier for one to gain entrance into secured or usually prohibited areas.
STEPS IN COMPROMISING SECURITY(CONT)
Source: Google Image 2525
Suspicious People It may mean having someone in a workplace, building, neighbourhood, or business establishment that does not fit in because of their demeanour, their language usage or unusual questions they ask.
STEPS IN COMPROMISING SECURITY(CONT)
Source: Google Image 2626
Dry Runs. Before execution of final operation or plan, a practice session will be conducted to work out the flaws and unanticipated problems.
This activity could include mapping out routes and determining the timing of traffic lights and flow.
This stage is usually considered the best time to intercept and stop an attack.
STEPS IN COMPROMISING SECURITY(CONT)
Source: Google Image 2727
Funding and Fundraising. In order to fund an attack, terrorists seek financial resources from Hostile Intelligence Services.
Suspicious transactions involving large cash payments, deposits or withdrawals are common signs of terrorist funding.
There are telecommunications issues which include tendency to make an unusual large amount of telephone calls, use of internet, use of postal service, or use of ATM and banking facilities.
STEPS IN COMPROMISING SECURITY(CONT)
Source: Google Image 2828
2929
Frank Bossard, an employee at the Ministry of Aviation jailed for 21 years in London for passing secrets to the Russians, was finally trapped by minute electronic bleepers attached to sensitive files. Bossard was already under suspicion, but MI5 needed evidence to take him to court. When he took one of the bugged files out of the building, he was trailed to a hotel room, and caught in the act of photographing the aircraft secrets inside
ICT AND INFORMATION GATHERING TECHNIQUES
Through the use of information gathered and processed as intelligence; an operation can be designed to disrupt any impending threat that could emanate as an aftermath of the various methods discussed above.
A source is a person, thing or activity from which information is obtained; it provides accurate and detailed information concerning vital issues or activities.
Source: Google Image 3030
Positive information indicates an activity in progress, identity of organisation, target or presence of suspect equipment and activities of critical groups.
Negative information shows that either the suspect has abandoned the previous idea or taken another deceptive approach or cause of action.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 3131
The Intelligence Cycle is the process of converting information requirements of a chief executiveor policy maker to actionable Intelligence.
Direction. This is the determination of information requirements or the chief executives order.
Collection. This involves breaking request down into basic information requirements and tasking the collection agencies.
Processing. ICT tools are used to aid the analysis because of the speed of processing and thus enhance national security.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 3232
SOFTWARE TOOLS
Vital information on markets, competitors and new products are now actively being collected by business organizations, to enable them formulate strategies to gain competitive advantage.
Intelligence in the developing world depends largely on overt methods, as against covert methods to collect Open-Source Intelligence.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 3333
SOFTWARE TOOLS
Tools are classified as specific when they have been designed commercially, or in-house, purposely for application in one or more stages in the intelligence cycle.
Data warehouse involves subject-oriented, integrated non-volatile collection of data in support of strategic management tasks. Data mining applications are now being used in counterterrorism.
Online Analytical Processing is software that aids online collection and analysis of data for decision-making.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 3434
SOFTWARE TOOLS
General tools refer to innovations that can be adapted for intelligence use, like the Internet.
The Internet can be used directly as a primary source of information and or a secondary source by experts.
It runs virtually all essential utilities like telecommunications, transport, financial, banking, health, education, security and law enforcement.
The social networking applications are vital means of intelligence gathering.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 3535
3636
Giorgio Rinaldi and his wife Angela Maria used their skills as parachutists to spy for Russia. The Italian skydivers travelled throughout NATO countries giving aerobatic displays, during rehearsals often photographed secret missile sites or sensitive airport installations.
HARDWARE TOOLS
The predominant method of collecting information is surveillance.
This includes keeping suspected persons, premises or vehicles under secret observation for purpose of identifying a suspect and their contacts..
With contemporary security challenges, ICT tools are becoming invaluable
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google ImagePeugeot 3008 Spy Car
3737
HARDWARE TOOLS
Covertly recording a conversation may provide important lead to times, dates and locations of future events. .
The same recording may also provide names of parties involved and, it is quite often possible to pick up on the mood of those involved in the conversation that has been recorded.
The sophisticated microphone technology now enables recording of conversations within a remote distance of a voice recording device.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 3838
HARDWARE TOOLS
Talking, texting, emailing, video watching, game playing, researching and shopping are now being carried out on smart phones.
Smart phones, could enable combatants to communicate with one another in multiple ways, watch airplane drone video live in the field, quickly go through maps, and share intelligence reports, just to name a few possible uses.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 3939
HARDWARE TOOLS
GSM transmitter is usually of the size of a cigarette packet that can easily be concealed in a room, office, vehicle or even on a boat.
Once fixed in position, it could be activated by dialing its secret number from any telephone in the world and the eavesdropper instantly hears all the conversations in the area
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 4040
HARDWARE TOOLS
These are video surveillance cameras specifically designed on the premise that video installations are often prone to less than ideal lighting and operating conditions.
There are analogue and digital cameras that operate with lens separate from the camera circuitry and specifically designed for covert operation in restricted environment.
Some transmitters are specially designed for telephone monitoring and could transmit all calls from telephone extensions.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 4141
HARDWARE TOOLS
Pictures and Video tools which are miniature in size and easy to use include Tie, Pen, Belt, Glasses and Wristwatches.
These items are made with inbuilt memory, undetectable spy camera, USB port, LED status indicator, continuous recording and auto shut-off.
They have in-built DVR equipped with internal memory which allows for long hours of recording.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 4242
HARDWARE TOOLS
An Echelon is the name given to the massive worldwide surveillance system that is capable of capturing and scanning every telephone call, fax and email sent anywhere in the world.
An Echelon uses satellites, ground receiving stations and electronic intercepts that enables them pick all communications traffic sent by satellite, cellular, microwave and fibre optics
ICT AND INFORMATION GATHERING TECHNIQUES(CONT)
Source: Google Image 4343
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE
GATHERING
POOR INFRASTRUCTURE.
There are inadequate infrastructure both in private sectors and government parastatals including the military.
Lack of modern ICT technologies for obtaining intelligence in most of the nation’s security agencies impacts negatively on national security.
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATHERING
Source: Google Image 4545
POOR HUMAN CAPITAL DEVELOPMENT
ICT is knowledge-based hence it could be difficult if not impossible for the nation to have effective development in this sector without an active and coordinated human resource development.
The nation lacks sufficient post graduates in various field of specialization related to intelligence gathering.
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT)
Source: Google Image 4646
Absence of National Electronic Database
The USA National Counterterrorism Centre makes use of 23 databases.
Nigeria is yet to have the required databases that can aid national security.
The Sim card registration and the national ID-card project would be useful when fully implemented.
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT)
Source: Google Image 4747
4848
A KGB agent bugged the bed used by the British Queen during her tour of West Germany in 1965. Martin Margraf, who posed as a freelance waiter, was working at the Luxurious Petersburg Hotel, beside the Rhine near Bonn, when the Queen and her husband Prince Philip arrived. He concealed tiny microphone behind the headboard of their bed and retrieved it when they left.
THE WAY FORWARD
PROVISION OF INFRASTRUCTURE
IGO in Nigeria suffers from lack of infrastructure that is typical of our nation.
To take advantage of ICT, government could provide infrastructure such as constant power supply and modern telecommunication facilities like fibre optics and wireless technologies.
THE WAY FORWARD
Source: Google Image 5050
HUMAN CAPACITY DEVELOPMENT
To ensure ICT penetration within the intelligence gathering organisations (IGO), the need to train and re-train personnel becomes more important..
The agencies would need to develop and upgrade their ICT personnel development programmes.
The IGO needs to create minimum standards of competence and skills especially in the technical and military fields.
THE WAY FORWARD(CONT)
Source: Google Image 5151
COORDINATION AND COOPERATION ICT has facilitated interconnectivity amongst peoples, government and organizations through networking.
This could be achieved through the establishment of an intranet connection and electronic database to input commonly used data which must be updated regularly for it to be useful.
The Computer Professionals (Registration Council of Nigeria) (CPN) must conduct extensive requirement analysis before embarking on any applications development or procurement.
THE WAY FORWARD(CONT)
Source: Google Image 5252
DEDICATED TELECOMMUNICATION INFRASTRUCTURE
In view of the inadequate service delivery and insecurity associated with the use of open commercial telecommunication lines, an IGO should have a dedicated telecommunication infrastructure..
Dedicated telecommunications would guarantee security of information and enhance effective gathering of intelligence.
THE WAY FORWARD(CONT)
Source: Google Image 5353
CONCLUSIONCONCLUSION
CONCLUSION
5454
RECOMMENDATION
CPN should collaborate with Intelligence
Gathering Organisations in Nigeria to
develop purpose-built software and
hardware system for intelligence gathering
5555
THANK YOU FOR YOUR KIND ATTENTION
5656
REFERENCES Aina A.O, “Intelligence and National Development; Challenges
to Nigeria.” A research project submitted at National War College, Abuja-Nigeria. July 2003
Aminu Chindo, “Intelligence Management and Internal Security Operations: Challenges and Prospects”, Research Project submitted to National Defence College, Course 18 at National War College, Abuja 2010
Aris Pappas A and James J Simon Jr, “The Intelligence Community: 2001-2015”, http://www.cia.gov/csi/studies/vol46no1/article05.html, accessed on 10/12/2005 18:17
Bozeman AB, Strategic Intelligence & Statecraft, (Washington: Brasseys, Inc.1992)
Buzan B, Peoples States and Fear: An Agenda for International Security Studies in the Post Cold War Era (2nd Edition), (New York: Harvester/Wheatsheat, 1999)
Bichi YM,” The challenges of Operations and Intelligence in a Modernising Economic Environment: The Nigerian Perspective. (Unpublished Paper Delivered at an in-House Seminar at Abuja, NHQS in July, 2004)
5757
REFERENCES (CONT) Boroffice RA, “National Space Programmes Challenges and
Prospect”, lecture delivered to participants of National Defence College Course 16, 20 November 2007
Bruce Berkowitz D, and Allan Goodman E, Best Truth: Intelligence in the Information Age, (London: Yale University Press, 2000)
Col Odunukwe BC, “Information and Communication Technology In Nigeria: An Evaluation”, Research Project submitted to National Defence College, Course 16 at National War College, Abuja 2005
Capt Okojie JO “Strategic intelligence and National Security In Nigeria: Challenges and Prospects”, Research Project submitted to National Defence College, Course 18 at National College College, Abuja 2010
Copley G, ‘Forging the Shield: Intelligence Management in the Developing World,’ (New York, 1987)
Copeland TE, The Information Revolution and National Security, (Carlisle: Strategic Studies Institute, 2000)
5858
REFERENCES (CONT)
Chung LC and Lok LF, A Caveat to Researchers on the Implementation of Information Technology, (Hong Kong: Chinese University Press, 1998)
“Creation of US NETCOMM”, Signal Magazine(US), 10/6/03
Dirk Vriens, “The Role of Information and Communication Technology in Competitive Intelligence”, (Netherland: University of Nijmegen, 2004)
Dokubo C, ”Statecraft Strategy and National Security” lecture delivered at the National Defence College Abuja, to Participant of Course 16, on 2 October 2007
Eteng GB, “Striking a balance between Intelligence Gathering and Enforcement,” (The TRIPLE S Magazine, Published by the SSS, No 2, 2006)
e-Shekels – Nationwide Survey of Internet Users, 2006
5959
REFERENCES (CONT)
Gerald Kovacich L and William Boni C, High-Technology-Crime Investigator’s Handbook: Working in the Global Information Environment, (USA: Butterworth-Heinemann, 2000)
Grand Strategy for National Security, 2001
Gallie W, “Essentially Contested Concepts”, Processing of the Aristotelian Society, Vol. 56, (1955-56)
Hamilton LG, “Challenges for Intelligence in American Democracy,” (A paper Presented at International Spy Museum Exhibit opening, Washington, USA, May 5, 2004)
Hadiza Mustapha, “Nigeria Intelligence Community and Challenges of Information and Communication Technology”, Research Project submitted to National Defence College, Course 14 at National War College, Abuja 2006
Johns G, political Editor, The Telegraph, ‘How France helped us win the Falklands war, by John Nott’ Published on 13th March, 2002 6060