source: google image

60
1

Upload: tynice

Post on 06-Jan-2016

42 views

Category:

Documents


0 download

DESCRIPTION

INTELLIGENCE GATHERING AND NATIONAL SECURITY: USING INFORMATION TECHNOLOGY TO COMBAT NATIONAL SECURITY CHALLENGES By Air Commodore IA Odun-Ayo psc (+) fdc (+) MSc NPOM at the Information Technology Professionals’ Assembly of the Computer Professionals (Registration Council of Nigeria) on - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Source: Google Image

11

Page 2: Source: Google Image

Source: Google Image 22

Page 3: Source: Google Image

INTRODUCTION The earliest recorded use of information for the survival of a nation is found in the work of the Chinese philosopher Sun Zi.

Sun Zi referred to this as ‘foreknowledge’ and in contemporary times, it is called ‘intelligence’.

What enables an intelligent government and leadership to overcome others and achieve extraordinary accomplishment beyond the reach of ordinary men is foreknowledge.

Source: Google Image 33

Page 4: Source: Google Image

INTRODUCTION(CONT)The provision of timely and credible intelligence, has helped nations in maintaining and enhancing relative security by giving forewarning of threats that allows for timely implementation of a preventive policy or strategy.

Source: Google Image 44

Page 5: Source: Google Image

INTRODUCTION(CONT)  Credible and accurate intelligence gathering is essential to any country’s national security

These threats are now multi-dimensional because traditional threats such as intra-state conflicts, proliferation of small arms and light weapons, are aided by the use of globalisation tools of which ICT is the driver.

The handling and utilisation of intelligence obtained from various overt and covert sources play a significant role in mitigating issues affecting national security.

Source: Google Image 55

Page 6: Source: Google Image

  ICT provides the veritable platform for development across economic, security and other sectors if well harnessed

With the ubiquity of computer and telecommunications technology, ICT has gained widespread recognition in most parts of the world.

These realities, underscore the relevance of ICT within the perspective of national intelligence mechanism, particularly in the area of national security.

INTRODUCTION(CONT)

Source: Google Image 66

Page 7: Source: Google Image

77

During the Cold war, the CIA was always

trying to stay ahead of the KGB. They

discovered KGB agents in the US were

hiring cars from a particular place and

staying in particular locations. The CIA

also hired the cars one per week, took them

to their technical department and fitted

them with audio-visual devices that would

never be detected. Cameras and listening

devices were also fitted covertly in the KGB

agent’s apartments.

Page 8: Source: Google Image

AIM

To discuss the relevance of

ICT in intelligence

gathering as it pertains to

national security in Nigeria.

88

Page 9: Source: Google Image

SCOPE Conceptual clarifications.

Organisation of intelligence in Nigeria’s security system.

Steps in compromising security.

ICT and information gathering techniques.

Challenges inhibiting ICT’s contribution to intelligence gathering.

The way forward

99

Page 10: Source: Google Image

CONCEPTUAL DEFINITIONS Intelligence is conceived to mean intellectual skill, reasoning, imagination, or mental ability in solving problems.

Information relevant to a government’s formulating and implementing policy to further national security interests and deal with threats to those interests from actual or potential adversaries.

The actual and potential threats to a country’s interests can emanate either from internal or external sources.

Northrop Grumman Intel Gathering Aircraft System

Source: Google Image 1010

INTELLIGENCE

Page 11: Source: Google Image

  National security is the preservation of a way of life acceptable to the people and compatible with the needs and legitimate aspirations of others. It includes freedom from military attack or coercion, freedom from internal subversion and freedom from the erosion of political, economic and social values which are essential to the quality of life.

CONCEPTUAL DEFINITIONS(CONT)

Source: Google Image 1111

NATIONAL SECURITY

Page 12: Source: Google Image

Aggregate of security interests of all individuals, communities and ethnic groups…. the strengthening of the Federal Republic of Nigeria, to advance her interest and objectives, to contain instability, control crime, eliminate corruption, enhance genuine development, progress and growth, improve the welfare and well being and quality of the life of every citizen.

CONCEPTUAL DEFINITIONS(CONT)

Source: Google Image 1212

Page 13: Source: Google Image

  ICT is the use of modern technology to aid the capture, processing, storage and retrieval, and communication of information whether in the form of numerical data, text, sound or image.

The drivers of which are; integrated circuits, advanced computers and adaptive software, fibre optics, cellular technology, satellite and space technologies, advanced networks, and digitalization.

In intelligence parlance ICT is seen as electronic tools that can support intelligence process.

CONCEPTUAL DEFINITIONS(CONT)

Source: Google Image 1313

INFORMATION AND COMMUNICATION

TECHNOLOGY

Page 14: Source: Google Image

Intelligence is seen as a product, an activity and an organization, whose main objective is to contribute to national security policy in order to achieve national objectives.

ICT supports intelligence activities such as collection, analysis, communication, dissemination and information management as well as covert actions like surveillance.

If dependable intelligence is available using ICT, it follows that national security can reasonably be enhanced.

CONCEPTUAL DEFINITIONS(CONT)

Source: Google Image 1414

Page 15: Source: Google Image

ORGANISATION OF INTELLIGENCE IN NIGERIA’S

SECURITY SYSTEM

Page 16: Source: Google Image

ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM

The Nigerian Security System comprises the primary security institutions such as, the Armed Forces of Nigeria (AFN), Nigeria Police, the Department of State Security and the National Intelligence Agency.

The intelligence management structure and functions in the country has the National Security Adviser (NSA) as the overall coordinator of the National intelligence management process.

Source: Google Image 1616

Page 17: Source: Google Image

  The output of the intelligence management structure supports the decision making process of the National Security Council (NSC) and the National Defence Council (NDC) which are the highest levels of national security mechanism.

ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM(CONT)

Source: Google Image 1717

The National Assembly’s Security and Intelligence committees are important because they exercise oversight functions on the intelligence agencies.

Page 18: Source: Google Image

1818

American Cryptographers broke the

Japanese Purple Code after the disaster of

Pearl Harbour. In May 1942 it enabled them

to gain revenge and turn the tide of war in

the Pacific. Admiral Chester Nimitz learned

of a planned Japanese invasion of an island

codenamed “AF”. He was certain the target

was Midway, but just to make sure, he

ordered the commander there to radio HQ

he was running short of water. Three days

later, Japanese radio traffic revealed water

shortage at their target “AF”. When the

Japanese attacked they suffered a

shattering defeat.

Page 19: Source: Google Image

1919

Page 20: Source: Google Image

STEPS IN COMPROMISING SECURITY Critical groups literally mean groups or something that have a decisive importance in a country for example the AFN and other security agencies.

Negative critical groups also known as Hostile Targets, are groups that constitute threat to a nation. Some of these include; a. Religious extremists – Boko Haram, Taliban.b. Criminal gangs and Petty Thieves.c. Kidnappers and Hostage Takers.d. Terrorist Groups – Al-Qaida.e.Sabotage Agents. Source: Google Image 2020

Page 21: Source: Google Image

One cannot discountenance the activities of Hostile Intelligence Services, that is, those operating in embassies in Nigeria because they sometimes support Domestic Subversive Organisations.

ICT must aid intelligence gathering in this era of globalisation or else we will continue to live in perpetual fear.

STEPS IN COMPROMISING SECURITY(CONT)

Source: Google Image 2121

Page 22: Source: Google Image

Surveillance.   If there is a specific target that Hostile groups have chosen, that target area will most likely be observed during the planning phase of their operation.

Therefore, it is important to take note of such things as someone recording or monitoring activities, drawing diagrams or annotating on maps, the use of vision-enhancing devices,

Electro-optical surveillance made easier by ICT, allows images and sound to be sent in real time to controllers of the criminal group in a remote place.

STEPS IN COMPROMISING SECURITY(CONT)

Source: Google Image 2222

Page 23: Source: Google Image

Elicitation.

Elicitation refers to attempts to gain information about a place, person, or operation

To gain knowledge about a foreign staff residence, office, critical infrastructure like a power plant, oil & gas installations, military installations and ammunition depots.

With help of the web, bombs and other Improvised Explosive Devices can be manufactured at relatively cheap cost and they are difficult to trace when deployed

STEPS IN COMPROMISING SECURITY(CONT)

Source: Google Image 2323

Page 24: Source: Google Image

Tests of Security.  This is usually conducted by driving around the target, moving into sensitive areas and observing security or law enforcement response.

They may also try to penetrate physical security barriers or procedures in order to assess strengths and weaknesses.

They may try to gain this knowledge in order to make their mission or scheme more effective.

STEPS IN COMPROMISING SECURITY(CONT)

Source: Google Image 2424

Page 25: Source: Google Image

Acquiring Supplies.   It may be a case where someone is purchasing or stealing explosives, weapons, or ammunition and chemicals for improvised home-made explosive devices.

It could also entail acquisition of military uniforms, medals, badges, as well as flight passes, or even flight manuals.

Possessing any of these would make it easier for one to gain entrance into secured or usually prohibited areas.

STEPS IN COMPROMISING SECURITY(CONT)

Source: Google Image 2525

Page 26: Source: Google Image

Suspicious People   It may mean having someone in a workplace, building, neighbourhood, or business establishment that does not fit in because of their demeanour, their language usage or unusual questions they ask.

STEPS IN COMPROMISING SECURITY(CONT)

Source: Google Image 2626

Page 27: Source: Google Image

Dry Runs.  Before execution of final operation or plan, a practice session will be conducted to work out the flaws and unanticipated problems.

This activity could include mapping out routes and determining the timing of traffic lights and flow.

This stage is usually considered the best time to intercept and stop an attack.

STEPS IN COMPROMISING SECURITY(CONT)

Source: Google Image 2727

Page 28: Source: Google Image

Funding and Fundraising.  In order to fund an attack, terrorists seek financial resources from Hostile Intelligence Services.

Suspicious transactions involving large cash payments, deposits or withdrawals are common signs of terrorist funding.

There are telecommunications issues which include tendency to make an unusual large amount of telephone calls, use of internet, use of postal service, or use of ATM and banking facilities.

STEPS IN COMPROMISING SECURITY(CONT)

Source: Google Image 2828

Page 29: Source: Google Image

2929

Frank Bossard, an employee at the Ministry of Aviation jailed for 21 years in London for passing secrets to the Russians, was finally trapped by minute electronic bleepers attached to sensitive files. Bossard was already under suspicion, but MI5 needed evidence to take him to court. When he took one of the bugged files out of the building, he was trailed to a hotel room, and caught in the act of photographing the aircraft secrets inside

Page 30: Source: Google Image

ICT AND INFORMATION GATHERING TECHNIQUES

  Through the use of information gathered and processed as intelligence; an operation can be designed to disrupt any impending threat that could emanate as an aftermath of the various methods discussed above.

A source is a person, thing or activity from which information is obtained; it provides accurate and detailed information concerning vital issues or activities.

Source: Google Image 3030

Page 31: Source: Google Image

  Positive information indicates an activity in progress, identity of organisation, target or presence of suspect equipment and activities of critical groups.

Negative information shows that either the suspect has abandoned the previous idea or taken another deceptive approach or cause of action.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 3131

Page 32: Source: Google Image

The Intelligence Cycle is the process of converting information requirements of a chief executiveor policy maker to actionable Intelligence.

Direction. This is the determination of information requirements or the chief executives order.

Collection. This involves breaking request down into basic information requirements and tasking the collection agencies.

Processing. ICT tools are used to aid the analysis because of the speed of processing and thus enhance national security.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 3232

Page 33: Source: Google Image

SOFTWARE TOOLS

Vital information on markets, competitors and new products are now actively being collected by business organizations, to enable them formulate strategies to gain competitive advantage.

Intelligence in the developing world depends largely on overt methods, as against covert methods to collect Open-Source Intelligence.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 3333

Page 34: Source: Google Image

SOFTWARE TOOLS

Tools are classified as specific when they have been designed commercially, or in-house, purposely for application in one or more stages in the intelligence cycle.

Data warehouse involves subject-oriented, integrated non-volatile collection of data in support of strategic management tasks. Data mining applications are now being used in counterterrorism.

Online Analytical Processing is software that aids online collection and analysis of data for decision-making.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 3434

Page 35: Source: Google Image

SOFTWARE TOOLS

General tools refer to innovations that can be adapted for intelligence use, like the Internet.

The Internet can be used directly as a primary source of information and or a secondary source by experts.

It runs virtually all essential utilities like telecommunications, transport, financial, banking, health, education, security and law enforcement.

The social networking applications are vital means of intelligence gathering.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 3535

Page 36: Source: Google Image

3636

Giorgio Rinaldi and his wife Angela Maria used their skills as parachutists to spy for Russia. The Italian skydivers travelled throughout NATO countries giving aerobatic displays, during rehearsals often photographed secret missile sites or sensitive airport installations.

Page 37: Source: Google Image

HARDWARE TOOLS

The predominant method of collecting information is surveillance.

This includes keeping suspected persons, premises or vehicles under secret observation for purpose of identifying a suspect and their contacts..

With contemporary security challenges, ICT tools are becoming invaluable

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google ImagePeugeot 3008 Spy Car

3737

Page 38: Source: Google Image

HARDWARE TOOLS

Covertly recording a conversation may provide important lead to times, dates and locations of future events. .

The same recording may also provide names of parties involved and, it is quite often possible to pick up on the mood of those involved in the conversation that has been recorded.

The sophisticated microphone technology now enables recording of conversations within a remote distance of a voice recording device.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 3838

Page 39: Source: Google Image

HARDWARE TOOLS

Talking, texting, emailing, video watching, game playing, researching and shopping are now being carried out on smart phones.

Smart phones, could enable combatants to communicate with one another in multiple ways, watch airplane drone video live in the field, quickly go through maps, and share intelligence reports, just to name a few possible uses.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 3939

Page 40: Source: Google Image

HARDWARE TOOLS

GSM transmitter is usually of the size of a cigarette packet that can easily be concealed in a room, office, vehicle or even on a boat.

Once fixed in position, it could be activated by dialing its secret number from any telephone in the world and the eavesdropper instantly hears all the conversations in the area

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 4040

Page 41: Source: Google Image

HARDWARE TOOLS

These are video surveillance cameras specifically designed on the premise that video installations are often prone to less than ideal lighting and operating conditions.

There are analogue and digital cameras that operate with lens separate from the camera circuitry and specifically designed for covert operation in restricted environment.

Some transmitters are specially designed for telephone monitoring and could transmit all calls from telephone extensions.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 4141

Page 42: Source: Google Image

HARDWARE TOOLS

Pictures and Video tools which are miniature in size and easy to use include Tie, Pen, Belt, Glasses and Wristwatches.

These items are made with inbuilt memory, undetectable spy camera, USB port, LED status indicator, continuous recording and auto shut-off.

They have in-built DVR equipped with internal memory which allows for long hours of recording.

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 4242

Page 43: Source: Google Image

HARDWARE TOOLS

An Echelon is the name given to the massive worldwide surveillance system that is capable of capturing and scanning every telephone call, fax and email sent anywhere in the world.

An Echelon uses satellites, ground receiving stations and electronic intercepts that enables them pick all communications traffic sent by satellite, cellular, microwave and fibre optics

ICT AND INFORMATION GATHERING TECHNIQUES(CONT)

Source: Google Image 4343

Page 44: Source: Google Image

CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE

GATHERING

Page 45: Source: Google Image

POOR INFRASTRUCTURE.

There are inadequate infrastructure both in private sectors and government parastatals including the military.

Lack of modern ICT technologies for obtaining intelligence in most of the nation’s security agencies impacts negatively on national security.

CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATHERING

Source: Google Image 4545

Page 46: Source: Google Image

POOR HUMAN CAPITAL DEVELOPMENT

ICT is knowledge-based hence it could be difficult if not impossible for the nation to have effective development in this sector without an active and coordinated human resource development.

The nation lacks sufficient post graduates in various field of specialization related to intelligence gathering.

CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT)

Source: Google Image 4646

Page 47: Source: Google Image

Absence of National Electronic Database

The USA National Counterterrorism Centre makes use of 23 databases.

Nigeria is yet to have the required databases that can aid national security.

The Sim card registration and the national ID-card project would be useful when fully implemented.

CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT)

Source: Google Image 4747

Page 48: Source: Google Image

4848

A KGB agent bugged the bed used by the British Queen during her tour of West Germany in 1965. Martin Margraf, who posed as a freelance waiter, was working at the Luxurious Petersburg Hotel, beside the Rhine near Bonn, when the Queen and her husband Prince Philip arrived. He concealed tiny microphone behind the headboard of their bed and retrieved it when they left.

Page 49: Source: Google Image

THE WAY FORWARD

Page 50: Source: Google Image

PROVISION OF INFRASTRUCTURE

IGO in Nigeria suffers from lack of infrastructure that is typical of our nation.

To take advantage of ICT, government could provide infrastructure such as constant power supply and modern telecommunication facilities like fibre optics and wireless technologies.

THE WAY FORWARD

Source: Google Image 5050

Page 51: Source: Google Image

HUMAN CAPACITY DEVELOPMENT

To ensure ICT penetration within the intelligence gathering organisations (IGO), the need to train and re-train personnel becomes more important..

The agencies would need to develop and upgrade their ICT personnel development programmes.

The IGO needs to create minimum standards of competence and skills especially in the technical and military fields.

THE WAY FORWARD(CONT)

Source: Google Image 5151

Page 52: Source: Google Image

COORDINATION AND COOPERATION ICT has facilitated interconnectivity amongst peoples, government and organizations through networking.

This could be achieved through the establishment of an intranet connection and electronic database to input commonly used data which must be updated regularly for it to be useful.

The Computer Professionals (Registration Council of Nigeria) (CPN) must conduct extensive requirement analysis before embarking on any applications development or procurement.

THE WAY FORWARD(CONT)

Source: Google Image 5252

Page 53: Source: Google Image

DEDICATED TELECOMMUNICATION INFRASTRUCTURE

In view of the inadequate service delivery and insecurity associated with the use of open commercial telecommunication lines, an IGO should have a dedicated telecommunication infrastructure..

Dedicated telecommunications would guarantee security of information and enhance effective gathering of intelligence.

THE WAY FORWARD(CONT)

Source: Google Image 5353

Page 54: Source: Google Image

CONCLUSIONCONCLUSION

CONCLUSION

5454

Page 55: Source: Google Image

RECOMMENDATION

CPN should collaborate with Intelligence

Gathering Organisations in Nigeria to

develop purpose-built software and

hardware system for intelligence gathering

5555

Page 56: Source: Google Image

THANK YOU FOR YOUR KIND ATTENTION

5656

Page 57: Source: Google Image

REFERENCES Aina A.O, “Intelligence and National Development; Challenges

to Nigeria.” A research project submitted at National War College, Abuja-Nigeria. July 2003

 Aminu Chindo, “Intelligence Management and Internal Security Operations: Challenges and Prospects”, Research Project submitted to National Defence College, Course 18 at National War College, Abuja 2010

 Aris Pappas A and James J Simon Jr, “The Intelligence Community: 2001-2015”, http://www.cia.gov/csi/studies/vol46no1/article05.html, accessed on 10/12/2005 18:17

 Bozeman AB, Strategic Intelligence & Statecraft, (Washington: Brasseys, Inc.1992)

 Buzan B, Peoples States and Fear: An Agenda for International Security Studies in the Post Cold War Era (2nd Edition), (New York: Harvester/Wheatsheat, 1999)

 Bichi YM,” The challenges of Operations and Intelligence in a Modernising Economic Environment: The Nigerian Perspective. (Unpublished Paper Delivered at an in-House Seminar at Abuja, NHQS in July, 2004)

5757

Page 58: Source: Google Image

REFERENCES (CONT) Boroffice RA, “National Space Programmes Challenges and

Prospect”, lecture delivered to participants of National Defence College Course 16, 20 November 2007

 Bruce Berkowitz D, and Allan Goodman E, Best Truth: Intelligence in the Information Age, (London: Yale University Press, 2000)

 Col Odunukwe BC, “Information and Communication Technology In Nigeria: An Evaluation”, Research Project submitted to National Defence College, Course 16 at National War College, Abuja 2005

 Capt Okojie JO “Strategic intelligence and National Security In Nigeria: Challenges and Prospects”, Research Project submitted to National Defence College, Course 18 at National College College, Abuja 2010

 Copley G, ‘Forging the Shield: Intelligence Management in the Developing World,’ (New York, 1987)

 Copeland TE, The Information Revolution and National Security, (Carlisle: Strategic Studies Institute, 2000)

5858

Page 59: Source: Google Image

REFERENCES (CONT)

Chung LC and Lok LF, A Caveat to Researchers on the Implementation of Information Technology, (Hong Kong: Chinese University Press, 1998)

 “Creation of US NETCOMM”, Signal Magazine(US), 10/6/03

 Dirk Vriens, “The Role of Information and Communication Technology in Competitive Intelligence”, (Netherland: University of Nijmegen, 2004)

 Dokubo C, ”Statecraft Strategy and National Security” lecture delivered at the National Defence College Abuja, to Participant of Course 16, on 2 October 2007

 Eteng GB, “Striking a balance between Intelligence Gathering and Enforcement,” (The TRIPLE S Magazine, Published by the SSS, No 2, 2006)

 e-Shekels – Nationwide Survey of Internet Users, 2006

5959

Page 60: Source: Google Image

REFERENCES (CONT)

Gerald Kovacich L and William Boni C, High-Technology-Crime Investigator’s Handbook: Working in the Global Information Environment, (USA: Butterworth-Heinemann, 2000)

 Grand Strategy for National Security, 2001

 Gallie W, “Essentially Contested Concepts”, Processing of the Aristotelian Society, Vol. 56, (1955-56)

 Hamilton LG, “Challenges for Intelligence in American Democracy,” (A paper Presented at International Spy Museum Exhibit opening, Washington, USA, May 5, 2004)

 Hadiza Mustapha, “Nigeria Intelligence Community and Challenges of Information and Communication Technology”, Research Project submitted to National Defence College, Course 14 at National War College, Abuja 2006

 Johns G, political Editor, The Telegraph, ‘How France helped us win the Falklands war, by John Nott’ Published on 13th March, 2002 6060