420 likes | 559 Views
DESIGN AND IMPLEMENTAION OF AN ICT-BASED NATIONAL (HOMELAND) SECURITY NETWORK By Emmanuel E. Ekuwem, PhD, IEEE, NPOM GMD/CEO, Teledom Group info@teledominternational.net. Key Terms-1. People Nigeria Lives and Property Peace and Order Law, Crime, Criminals
E N D
DESIGN AND IMPLEMENTAION OF AN ICT-BASED NATIONAL (HOMELAND) SECURITY NETWORK By Emmanuel E. Ekuwem, PhD, IEEE, NPOM GMD/CEO, Teledom Group info@teledominternational.net
Key Terms-1 • People • Nigeria • Lives and Property • Peace and Order • Law, Crime, Criminals • Law Enforcement/Law Enforcement Agencies • Privacy, Fundamental Human Rights
Key terms-2 • Security-physical, economic, cyber, spiritual, etc • Investments (Local and Foreign) • Economic Activities/Productivity • Economic Growth and Development • Job and Wealth Creation • Increase in GDP • Vision 20-2020 • National Well-being
Infrastructure of Development • Peace and Security, Law and Order are the infrastructure of development • In one word SECURITY underpins any development----economic, political or social • Physical Security----security of lives and property in the physical space/world • Cyber security-----security of “lives” and “property” in the cyberspace which empowers lives in the physical world
Trajectory of lawfulness/criminality-1 • Who did what, where, when, how, with who, for how long, for who, to whom and for what? • Who knew what, where and when? • Who said what, where, when, how, for how long, for who, to whom and for what? • Who witnessed the doing or saying of what to whom, when, where, by who and for what? • Who carried/transported what, when, from where, through where, to where?
Trajectory of lawfulness/criminality-2 • Who and who saw/witnessed who carrying/transporting what with who, from where, to where, through where, when, for what, for how long? • WHO is WHO uniquely IDENTIFIED
Trajectory of lawfulness/criminality-3 • From cradle to grave our lawful or/and criminal routes can traced • From cradle to grave our lawful or/and criminal activities can be ASSEMBLED from scattered or distributed sources • Every human activity leaves a TRACE • Assembling traces aids the establishment of INTEGRITY of citizens
Who/What Captured these? • Recent Times Square Car Bomber in New York- monitored in both Times Square and JFK airport • Terrorists attack on the City of London
IDENTITY Platform-1 • WHO is WHO? • Are we uniquely INDENTIFIED • Identity Authentication and Verification • Identity Non REPUDIATION • Unique Biometrics---finger print, Iris • Facial recognition • Name (may not be unique)
IDENTITY Platform-2 • State, local government area, ward, village of origin or of domicile (better) • Geopolitical zone (SS, SE, SW, NW, NC and NE) • Birth date/age • Parents • Next of kin • Schools attended
IDENTITY Platform-3 • Gender • Religion/denomination • Ethnic group • Indigenous languages spoken • Foreign language spoken • Height • Colour of eyes, hair, etc
IDENTITY Platform-4 • Weight • Voter’s Card • Blood group • Genotype • HIV Status • Allergies
INTEGRITY Platform • The Integrand of one’s lawful or criminal activities from birth to the point of assessment • Do certain types of IDENTITY provide an enabling environment for the development certain types of INTEGRITY?
Monitoring Lawfulness/Lawlessness -1 • Monitoring lawlessness and/or lawfulness on Roads, Streets, Highways, Security patrol vans and boats, Waterways and Creeks, residential estates, seaports, airports, international borders. • Video and audio data capture at monitored points • Cargo scanning of containers, trucks, cars at seaports, airports, highways, waterways, border posts with remote access, centralized/distributed archiving with date and time-specific playback.
Surveillance System—Video & Audio-1 • IP Camera with POE supply and CCTV, both with IR features, for night vision • Solar powered or solar-wind hybrid powered or PHCN-solar float-charged • Bidirectional audio capture • Designation of positions of data capture to be done to meet security needs appropriate local law enforcement agencies
Surveillance System-Video & Audio-2 • Primary area of data capture is the Local Government Area • Micro Security Network Operating Centre (SNOC) is located in the local government headquarters or DPO’s premises or any agreed location • Communications transport from points of data capture is by Wifi, point-to-point broadband wireless, or fibre optic cable (where available and affordable)
Surveillance System-Video & Audio-3 • Data from all the Master SNOCs from the states and FCT home to the Grand SNOC in Abuja • Communications transport from the Master SNOCs to the Grand SNOC is by VSAT, optic fibre, WiMax or dedicated 3G network • There is local monitoring and archiving in each SNOC with date and time-specific playback features in Data Centres.
Surveillance System-Video & Audio-4 • Data from a group of geographically contiguous Micro SNOCs from LGAs are transported to the Area Police Command in a Mini SNOC • Data from a group of Mini SNOCs from Area Police Commands are transported to State Police Command headquarters in the state capital in a Master SNOC. • Communication transport from the Mini SNOCs to the Master SNOC is by Broadband wireless or VSAT or optic fibre
Surveillance System-Video & Audio-5 • Both in-SNOC and remotely accessed analysis of captured data. • Prompt issue of real-time commands to relevant law enforcement officers for rapid response as appropriate • Playback during criminal investigations
Patrol Van-based Video Surveillance • Security patrol van-mounted system • Remote monitoring and control of mounted cameras via various communication networks • Used in targeted locations • Real-time broadcast over 2.5G/3G, WiFi, WLAN or WiMax networks • DVD record of quality footage for later inspections • Commanded by a SNOC
Container, Truck and Car Scanning System • Gamma and X-rays based scanning of containers at seaports, airports, dry ports, highways, border posts with both in-situ and remotely accessed analyses and storage of captured data • Scanning of cars on highways and relevant roads with both in-situ and remotely accessed analyses and storage of data
Lawful Interception-1 • Interception of VOICE, VIDEO and legacy data from virtually all networks; wireless, wired (fixed line), LAN, MAN, Intranet, Internet, WiFi, WiMax, in conformity national and regional lawful interception standards • Enables government, National Security Adviser, law enforcement agencies to neutralize the threats posed by terrorists, kidnappers, militants, hired assassins, coup plotters, armed robbers, 419ers, hackers
Lawful Interception-2 • Relevant Law Enforcement agencies include: NSA, Police, EFCC, ICPC, CID, SSS, Army, Air Force, Navy, Customs, Immigration, etc • Lawful processes must be followed before interception is carried out • Telecom Operators, ISPs and other relevant ICT service providers must sign up and cooperate with the law enforcement agencies
Lawful Interception-3 • National, state and local coordination and exchange of real-time data and information and access to centralized and distributed databases via secure telecom transport facilities. • Inter-Agency collaboration. • Availability of a National Identity Management Database referral system
Lawful Interception Services-4 • Voice (fixed line, fixed wireless, mobile, IPT) • Video • Video conferencing • Chat • Webmail • SMS • MMS • IMS • Fax • Instant Messaging
Interception Network Platforms • Land line • Wireless (cellular, WiFi, WiMax) • Satellite • Broadband access • International private-leased circuit • NGN (Next Generation Networks) • IMS (IP Multimedia Subsystems) • Converged wireless/land line PD/CS network)
Lawful Interception-5 • Push-to-Talk • Web browsing • Social Networking • etc
Lawful Layered Voice Analyses • On-line and off-line detection of mood, emotions, malicious intentions of suspects • Online or off-line truth verification • Identification of deceit • Risk assessment • Connectivity to SNOC (grand, master, mini or micro)
SIM Card Registration-1 • Need to match every active SIM card in the telecom industry UNIQUELY to an OWNER, a Human being with a name, Man or Woman or a Company or any organisation or corporate entity with a name and the name of the contact person. • This UNIQUE name cannot be REPUDIATED
SIM Card Registration-2 • Useful for law enforcement • Will drastically reduce the use mobile phones to send threat text messages (SMS) and make threat calls, negotiate ransom by kidnappers, send advance notice for armed robbery by armed robbers to would-be victims, etc • Again, central Identity Database is required to eliminate submission of fraudulent bio-data by criminals during SIM card registration. However, while the central National Identity database is being developed, Telecom service providers can start with operator-specific databases
Cyber Security • Cyber security law • Critical National Information Infrastructure law • CERT • NSA • EFCC • Financial Industry • ICT Industry
Recommendations • National Identity Management Database development. This is a reference Database for voters register, voters at every election, national security monitoring, surveillance, identification and arrest of criminals, etc • Establishment a National Security Grand SNOC with integrated downstream Master SNOC, Mini SNOC and Micro SNOC to ensure national security surveillance, monitoring, tracking, isolation and arrest of criminals.