630 likes | 831 Views
INTELLIGENCE GATHERING AND NATIONAL SECURITY: USING INFORMATION TECHNOLOGY TO COMBAT NATIONAL SECURITY CHALLENGES By Air Commodore IA Odun-Ayo psc (+) fdc (+) MSc NPOM at the Information Technology Professionals’ Assembly of the Computer Professionals (Registration Council of Nigeria) on
E N D
INTELLIGENCE GATHERING AND NATIONAL SECURITY: USING INFORMATION TECHNOLOGY TO COMBAT NATIONAL SECURITY CHALLENGES By Air Commodore IA Odun-Ayo psc(+) fdc(+) MSc NPOM at the Information Technology Professionals’ Assembly of the Computer Professionals (Registration Council of Nigeria) on 7 June 2012
INTRODUCTION • The earliest recorded use of information for the survival of a nation is found in the work of the Chinese philosopher Sun Zi. • Sun Zi referred to this as ‘foreknowledge’ and in contemporary times, it is called ‘intelligence’. • What enables an intelligent government and leadership to overcome others and achieve extraordinary accomplishment beyond the reach of ordinary men is foreknowledge. Source: Google Image
INTRODUCTION(CONT) The provision of timely and credible intelligence, has helped nations in maintaining and enhancing relative security by giving forewarning of threats that allows for timely implementation of a preventive policy or strategy. Source: Google Image
INTRODUCTION(CONT) • Credible and accurate intelligence gathering is essential to any country’s national security • These threats are now multi-dimensional because traditional threats such as intra-state conflicts, proliferation of small arms and light weapons, are aided by the use of globalisation tools of which ICT is the driver. • The handling and utilisation of intelligence obtained from various overt and covert sources play a significant role in mitigating issues affecting national security. Source: Google Image
INTRODUCTION(CONT) • ICT provides the veritable platform for development across economic, security and other sectors if well harnessed • With the ubiquity of computer and telecommunications technology, ICT has gained widespread recognition in most parts of the world. • These realities, underscore the relevance of ICT within the perspective of national intelligence mechanism, particularly in the area of national security. Source: Google Image
During the Cold war, the CIA was always trying to stay ahead of the KGB. They discovered KGB agents in the US were hiring cars from a particular place and staying in particular locations. The CIA also hired the cars one per week, took them to their technical department and fitted them with audio-visual devices that would never be detected. Cameras and listening devices were also fitted covertly in the KGB agent’s apartments.
AIM To discuss the relevance of ICT in intelligence gathering as it pertains to national security in Nigeria.
SCOPE • Conceptual clarifications. • Organisation of intelligence in Nigeria’s security system. • Steps in compromising security. • ICT and information gathering techniques. • Challenges inhibiting ICT’s contribution to intelligence gathering. • The way forward
CONCEPTUAL DEFINITIONS • Intelligence is conceived to mean intellectual skill, reasoning, imagination, or mental ability in solving problems. • Information relevant to a government’s formulating and implementing policy to further national security interests and deal with threats to those interests from actual or potential adversaries. • The actual and potential threats to a country’s interests can emanate either from internal or external sources. INTELLIGENCE Northrop Grumman Intel Gathering Aircraft System Source: Google Image
CONCEPTUAL DEFINITIONS(CONT) • National security is the preservation of a way of life acceptable to the people and compatible with the needs and legitimate aspirations of others. It includes freedom from military attack or coercion, freedom from internal subversion and freedom from the erosion of political, economic and social values which are essential to the quality of life. NATIONAL SECURITY Source: Google Image
CONCEPTUAL DEFINITIONS(CONT) • Aggregate of security interests of all individuals, communities and ethnic groups…. the strengthening of the Federal Republic of Nigeria, to advance her interest and objectives, to contain instability, control crime, eliminate corruption, enhance genuine development, progress and growth, improve the welfare and well being and quality of the life of every citizen. Source: Google Image
CONCEPTUAL DEFINITIONS(CONT) • ICT is the use of modern technology to aid the capture, processing, storage and retrieval, and communication of information whether in the form of numerical data, text, sound or image. • The drivers of which are; integrated circuits, advanced computers and adaptive software, fibre optics, cellular technology, satellite and space technologies, advanced networks, and digitalization. • In intelligence parlance ICT is seen as electronic tools that can support intelligence process. INFORMATION AND COMMUNICATION TECHNOLOGY Source: Google Image
CONCEPTUAL DEFINITIONS(CONT) • Intelligence is seen as a product, an activity and an organization, whose main objective is to contribute to national security policy in order to achieve national objectives. • ICT supports intelligence activities such as collection, analysis, communication, dissemination and information management as well as covert actions like surveillance. • If dependable intelligence is available using ICT, it follows that national security can reasonably be enhanced. Source: Google Image
ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM • The Nigerian Security System comprises the primary security institutions such as, the Armed Forces of Nigeria (AFN), Nigeria Police, the Department of State Security and the National Intelligence Agency. • The intelligence management structure and functions in the country has the National Security Adviser (NSA) as the overall coordinator of the National intelligence management process. Source: Google Image
ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM(CONT) • The output of the intelligence management structure supports the decision making process of the National Security Council (NSC) and the National Defence Council (NDC) which are the highest levels of national security mechanism. • The National Assembly’s Security and Intelligence committees are important because they exercise oversight functions on the intelligence agencies. Source: Google Image
American Cryptographers broke the Japanese Purple Code after the disaster of Pearl Harbour. In May 1942 it enabled them to gain revenge and turn the tide of war in the Pacific. Admiral Chester Nimitz learned of a planned Japanese invasion of an island codenamed “AF”. He was certain the target was Midway, but just to make sure, he ordered the commander there to radio HQ he was running short of water. Three days later, Japanese radio traffic revealed water shortage at their target “AF”. When the Japanese attacked they suffered a shattering defeat.
STEPS IN COMPROMISING SECURITY • Critical groups literally mean groups or something that have a decisive importance in a country for example the AFN and other security agencies. • Negative critical groups also known as Hostile Targets, are groups that constitute threat to a nation. Some of these include; • a. Religious extremists – BokoHaram, Taliban. • b. Criminal gangs and Petty Thieves. • c. Kidnappers and Hostage Takers. • d. Terrorist Groups – Al-Qaida. • Sabotage Agents. Source: Google Image
STEPS IN COMPROMISING SECURITY(CONT) • One cannot discountenance the activities of Hostile Intelligence Services, that is, those operating in embassies in Nigeria because they sometimes support Domestic Subversive Organisations. • ICT must aid intelligence gathering in this era of globalisation or else we will continue to live in perpetual fear. Source: Google Image
STEPS IN COMPROMISING SECURITY(CONT) • Surveillance. • If there is a specific target that Hostile groups have chosen, that target area will most likely be observed during the planning phase of their operation. • Therefore, it is important to take note of such things as someone recording or monitoring activities, drawing diagrams or annotating on maps, the use of vision-enhancing devices, • Electro-optical surveillance made easier by ICT, allows images and sound to be sent in real time to controllers of the criminal group in a remote place. Source: Google Image
STEPS IN COMPROMISING SECURITY(CONT) • Elicitation. • Elicitation refers to attempts to gain information about a place, person, or operation • To gain knowledge about a foreign staff residence, office, critical infrastructure like a power plant, oil & gas installations, military installations and ammunition depots. • With help of the web, bombs and other Improvised Explosive Devices can be manufactured at relatively cheap cost and they are difficult to trace when deployed Source: Google Image
STEPS IN COMPROMISING SECURITY(CONT) • Tests of Security. • This is usually conducted by driving around the target, moving into sensitive areas and observing security or law enforcement response. • They may also try to penetrate physical security barriers or procedures in order to assess strengths and weaknesses. • They may try to gain this knowledge in order to make their mission or scheme more effective. Source: Google Image
STEPS IN COMPROMISING SECURITY(CONT) • Acquiring Supplies. • It may be a case where someone is purchasing or stealing explosives, weapons, or ammunition and chemicals for improvised home-made explosive devices. • It could also entail acquisition of military uniforms, medals, badges, as well as flight passes, or even flight manuals. • Possessing any of these would make it easier for one to gain entrance into secured or usually prohibited areas. Source: Google Image
STEPS IN COMPROMISING SECURITY(CONT) • Suspicious People • It may mean having someone in a workplace, building, neighbourhood, or business establishment that does not fit in because of their demeanour, their language usage or unusual questions they ask. Source: Google Image
STEPS IN COMPROMISING SECURITY(CONT) • Dry Runs. • Before execution of final operation or plan, a practice session will be conducted to work out the flaws and unanticipated problems. • This activity could include mapping out routes and determining the timing of traffic lights and flow. • This stage is usually considered the best time to intercept and stop an attack. Source: Google Image
STEPS IN COMPROMISING SECURITY(CONT) • Funding and Fundraising. • In order to fund an attack, terrorists seek financial resources from Hostile Intelligence Services. • Suspicious transactions involving large cash payments, deposits or withdrawals are common signs of terrorist funding. • There are telecommunications issues which include tendency to make an unusual large amount of telephone calls, use of internet, use of postal service, or use of ATM and banking facilities. Source: Google Image
Frank Bossard, an employee at the Ministry of Aviation jailed for 21 years in London for passing secrets to the Russians, was finally trapped by minute electronic bleepers attached to sensitive files. Bossard was already under suspicion, but MI5 needed evidence to take him to court. When he took one of the bugged files out of the building, he was trailed to a hotel room, and caught in the act of photographing the aircraft secrets inside
ICT AND INFORMATION GATHERING TECHNIQUES • Through the use of information gathered and processed as intelligence; an operation can be designed to disrupt any impending threat that could emanate as an aftermath of the various methods discussed above. • A source is a person, thing or activity from which information is obtained; it provides accurate and detailed information concerning vital issues or activities. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • Positive information indicates an activity in progress, identity of organisation, target or presence of suspect equipment and activities of critical groups. • Negative information shows that either the suspect has abandoned the previous idea or taken another deceptive approach or cause of action. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • The Intelligence Cycle is the process of converting information requirements of a chief executive • or policy maker to actionable Intelligence. • Direction. This is the determination of information requirements or the chief executives order. • Collection. This involves breaking request down into basic information requirements and tasking the collection agencies. • Processing. ICT tools are used to aid the analysis because of the speed of processing and thus enhance national security. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • SOFTWARE TOOLS • Vital information on markets, competitors and new products are now actively being collected by business organizations, to enable them formulate strategies to gain competitive advantage. • Intelligence in the developing world depends largely on overt methods, as against covert methods to collect Open-Source Intelligence. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • SOFTWARE TOOLS • Tools are classified as specific when they have been designed commercially, or in-house, purposely for application in one or more stages in the intelligence cycle. • Data warehouse involves subject-oriented, integrated non-volatile collection of data in support of strategic management tasks. Data mining applications are now being used in counterterrorism. • Online Analytical Processing is software that aids online collection and analysis of data for decision-making. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • SOFTWARE TOOLS • General tools refer to innovations that can be adapted for intelligence use, like the Internet. • The Internet can be used directly as a primary source of information and or a secondary source by experts. • It runs virtually all essential utilities like telecommunications, transport, financial, banking, health, education, security and law enforcement. • The social networking applications are vital means of intelligence gathering. Source: Google Image
Giorgio Rinaldi and his wife Angela Maria used their skills as parachutists to spy for Russia. The Italian skydivers travelled throughout NATO countries giving aerobatic displays, during rehearsals often photographed secret missile sites or sensitive airport installations.
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • The predominant method of collecting information is surveillance. • This includes keeping suspected persons, premises or vehicles under secret observation for purpose of identifying a suspect and their contacts.. • With contemporary security challenges, ICT tools are becoming invaluable Peugeot 3008 Spy Car Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • Covertly recording a conversation may provide important lead to times, dates and locations of future events. . • The same recording may also provide names of parties involved and, it is quite often possible to pick up on the mood of those involved in the conversation that has been recorded. • The sophisticated microphone technology now enables recording of conversations within a remote distance of a voice recording device. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • Talking, texting, emailing, video watching, game playing, researching and shopping are now being carried out on smart phones. • Smart phones, could enable combatants to communicate with one another in multiple ways, watch airplane drone video live in the field, quickly go through maps, and share intelligence reports, just to name a few possible uses. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • GSM transmitter is usually of the size of a cigarette packet that can easily be concealed in a room, office, vehicle or even on a boat. • Once fixed in position, it could be activated by dialing its secret number from any telephone in the world and the eavesdropper instantly hears all the conversations in the area Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • These are video surveillance cameras specifically designed on the premise that video installations are often prone to less than ideal lighting and operating conditions. • There are analogue and digital cameras that operate with lens separate from the camera circuitry and specifically designed for covert operation in restricted environment. • Some transmitters are specially designed for telephone monitoring and could transmit all calls from telephone extensions. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • Pictures and Video tools which are miniature in size and easy to use include Tie, Pen, Belt, Glasses and Wristwatches. • These items are made with inbuilt memory, undetectable spy camera, USB port, LED status indicator, continuous recording and auto shut-off. • They have in-built DVR equipped with internal memory which allows for long hours of recording. Source: Google Image
ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • An Echelon is the name given to the massive worldwide surveillance system that is capable of capturing and scanning every telephone call, fax and email sent anywhere in the world. • An Echelon uses satellites, ground receiving stations and electronic intercepts that enables them pick all communications traffic sent by satellite, cellular, microwave and fibre optics Source: Google Image
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATHERING
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATHERING • POOR INFRASTRUCTURE. • There are inadequate infrastructure both in private sectors and government parastatals including the military. • Lack of modern ICT technologies for obtaining intelligence in most of the nation’s security agencies impacts negatively on national security. Source: Google Image
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT) • POOR HUMAN CAPITAL DEVELOPMENT • ICT is knowledge-based hence it could be difficult if not impossible for the nation to have effective development in this sector without an active and coordinated human resource development. • The nation lacks sufficient post graduates in various field of specialization related to intelligence gathering. Source: Google Image
CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT) • Absence of National Electronic Database • The USA National Counterterrorism Centre makes use of 23 databases. • Nigeria is yet to have the required databases that can aid national security. • The Sim card registration and the national ID-card project would be useful when fully implemented. Source: Google Image
A KGB agent bugged the bed used by the British Queen during her tour of West Germany in 1965. Martin Margraf, who posed as a freelance waiter, was working at the Luxurious Petersburg Hotel, beside the Rhine near Bonn, when the Queen and her husband Prince Philip arrived. He concealed tiny microphone behind the headboard of their bed and retrieved it when they left.
THE WAY FORWARD • PROVISION OF INFRASTRUCTURE • IGO in Nigeria suffers from lack of infrastructure that is typical of our nation. • To take advantage of ICT, government could provide infrastructure such as constant power supply and modern telecommunication facilities like fibre optics and wireless technologies. Source: Google Image