1 / 60

Intelligence Gathering and National Security: Utilizing IT to Combat Security Challenges

This article discusses the importance of information technology in intelligence gathering and its role in addressing national security challenges. It explores the conceptual definitions of intelligence, information, national security, and ICT, and examines the steps involved in compromising security. The article also highlights the techniques and challenges of using ICT for intelligence gathering and proposes the way forward.

kellybryant
Download Presentation

Intelligence Gathering and National Security: Utilizing IT to Combat Security Challenges

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTELLIGENCE GATHERING AND NATIONAL SECURITY: USING INFORMATION TECHNOLOGY TO COMBAT NATIONAL SECURITY CHALLENGES By Air Commodore IA Odun-Ayo psc(+) fdc(+) MSc NPOM at the Information Technology Professionals’ Assembly of the Computer Professionals (Registration Council of Nigeria) on 7 June 2012

  2. Source: Google Image

  3. INTRODUCTION • The earliest recorded use of information for the survival of a nation is found in the work of the Chinese philosopher Sun Zi. • Sun Zi referred to this as ‘foreknowledge’ and in contemporary times, it is called ‘intelligence’. • What enables an intelligent government and leadership to overcome others and achieve extraordinary accomplishment beyond the reach of ordinary men is foreknowledge. Source: Google Image

  4. INTRODUCTION(CONT) The provision of timely and credible intelligence, has helped nations in maintaining and enhancing relative security by giving forewarning of threats that allows for timely implementation of a preventive policy or strategy. Source: Google Image

  5. INTRODUCTION(CONT) • Credible and accurate intelligence gathering is essential to any country’s national security • These threats are now multi-dimensional because traditional threats such as intra-state conflicts, proliferation of small arms and light weapons, are aided by the use of globalisation tools of which ICT is the driver. • The handling and utilisation of intelligence obtained from various overt and covert sources play a significant role in mitigating issues affecting national security. Source: Google Image

  6. INTRODUCTION(CONT) • ICT provides the veritable platform for development across economic, security and other sectors if well harnessed • With the ubiquity of computer and telecommunications technology, ICT has gained widespread recognition in most parts of the world. • These realities, underscore the relevance of ICT within the perspective of national intelligence mechanism, particularly in the area of national security. Source: Google Image

  7. During the Cold war, the CIA was always trying to stay ahead of the KGB. They discovered KGB agents in the US were hiring cars from a particular place and staying in particular locations. The CIA also hired the cars one per week, took them to their technical department and fitted them with audio-visual devices that would never be detected. Cameras and listening devices were also fitted covertly in the KGB agent’s apartments.

  8. AIM To discuss the relevance of ICT in intelligence gathering as it pertains to national security in Nigeria.

  9. SCOPE • Conceptual clarifications. • Organisation of intelligence in Nigeria’s security system. • Steps in compromising security. • ICT and information gathering techniques. • Challenges inhibiting ICT’s contribution to intelligence gathering. • The way forward

  10. CONCEPTUAL DEFINITIONS • Intelligence is conceived to mean intellectual skill, reasoning, imagination, or mental ability in solving problems. • Information relevant to a government’s formulating and implementing policy to further national security interests and deal with threats to those interests from actual or potential adversaries. • The actual and potential threats to a country’s interests can emanate either from internal or external sources. INTELLIGENCE Northrop Grumman Intel Gathering Aircraft System Source: Google Image

  11. CONCEPTUAL DEFINITIONS(CONT) • National security is the preservation of a way of life acceptable to the people and compatible with the needs and legitimate aspirations of others. It includes freedom from military attack or coercion, freedom from internal subversion and freedom from the erosion of political, economic and social values which are essential to the quality of life. NATIONAL SECURITY Source: Google Image

  12. CONCEPTUAL DEFINITIONS(CONT) • Aggregate of security interests of all individuals, communities and ethnic groups…. the strengthening of the Federal Republic of Nigeria, to advance her interest and objectives, to contain instability, control crime, eliminate corruption, enhance genuine development, progress and growth, improve the welfare and well being and quality of the life of every citizen. Source: Google Image

  13. CONCEPTUAL DEFINITIONS(CONT) • ICT is the use of modern technology to aid the capture, processing, storage and retrieval, and communication of information whether in the form of numerical data, text, sound or image. • The drivers of which are; integrated circuits, advanced computers and adaptive software, fibre optics, cellular technology, satellite and space technologies, advanced networks, and digitalization. • In intelligence parlance ICT is seen as electronic tools that can support intelligence process. INFORMATION AND COMMUNICATION TECHNOLOGY Source: Google Image

  14. CONCEPTUAL DEFINITIONS(CONT) • Intelligence is seen as a product, an activity and an organization, whose main objective is to contribute to national security policy in order to achieve national objectives. • ICT supports intelligence activities such as collection, analysis, communication, dissemination and information management as well as covert actions like surveillance. • If dependable intelligence is available using ICT, it follows that national security can reasonably be enhanced. Source: Google Image

  15. ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM

  16. ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM • The Nigerian Security System comprises the primary security institutions such as, the Armed Forces of Nigeria (AFN), Nigeria Police, the Department of State Security and the National Intelligence Agency. • The intelligence management structure and functions in the country has the National Security Adviser (NSA) as the overall coordinator of the National intelligence management process. Source: Google Image

  17. ORGANISATION OF INTELLIGENCE IN NIGERIA’S SECURITY SYSTEM(CONT) • The output of the intelligence management structure supports the decision making process of the National Security Council (NSC) and the National Defence Council (NDC) which are the highest levels of national security mechanism. • The National Assembly’s Security and Intelligence committees are important because they exercise oversight functions on the intelligence agencies. Source: Google Image

  18. American Cryptographers broke the Japanese Purple Code after the disaster of Pearl Harbour. In May 1942 it enabled them to gain revenge and turn the tide of war in the Pacific. Admiral Chester Nimitz learned of a planned Japanese invasion of an island codenamed “AF”. He was certain the target was Midway, but just to make sure, he ordered the commander there to radio HQ he was running short of water. Three days later, Japanese radio traffic revealed water shortage at their target “AF”. When the Japanese attacked they suffered a shattering defeat.

  19. STEPS IN COMPROMISING SECURITY • Critical groups literally mean groups or something that have a decisive importance in a country for example the AFN and other security agencies. • Negative critical groups also known as Hostile Targets, are groups that constitute threat to a nation. Some of these include; • a. Religious extremists – BokoHaram, Taliban. • b. Criminal gangs and Petty Thieves. • c. Kidnappers and Hostage Takers. • d. Terrorist Groups – Al-Qaida. • Sabotage Agents. Source: Google Image

  20. STEPS IN COMPROMISING SECURITY(CONT) • One cannot discountenance the activities of Hostile Intelligence Services, that is, those operating in embassies in Nigeria because they sometimes support Domestic Subversive Organisations. • ICT must aid intelligence gathering in this era of globalisation or else we will continue to live in perpetual fear. Source: Google Image

  21. STEPS IN COMPROMISING SECURITY(CONT) • Surveillance. • If there is a specific target that Hostile groups have chosen, that target area will most likely be observed during the planning phase of their operation. • Therefore, it is important to take note of such things as someone recording or monitoring activities, drawing diagrams or annotating on maps, the use of vision-enhancing devices, • Electro-optical surveillance made easier by ICT, allows images and sound to be sent in real time to controllers of the criminal group in a remote place. Source: Google Image

  22. STEPS IN COMPROMISING SECURITY(CONT) • Elicitation. • Elicitation refers to attempts to gain information about a place, person, or operation • To gain knowledge about a foreign staff residence, office, critical infrastructure like a power plant, oil & gas installations, military installations and ammunition depots. • With help of the web, bombs and other Improvised Explosive Devices can be manufactured at relatively cheap cost and they are difficult to trace when deployed Source: Google Image

  23. STEPS IN COMPROMISING SECURITY(CONT) • Tests of Security. • This is usually conducted by driving around the target, moving into sensitive areas and observing security or law enforcement response. • They may also try to penetrate physical security barriers or procedures in order to assess strengths and weaknesses. • They may try to gain this knowledge in order to make their mission or scheme more effective. Source: Google Image

  24. STEPS IN COMPROMISING SECURITY(CONT) • Acquiring Supplies. • It may be a case where someone is purchasing or stealing explosives, weapons, or ammunition and chemicals for improvised home-made explosive devices. • It could also entail acquisition of military uniforms, medals, badges, as well as flight passes, or even flight manuals. • Possessing any of these would make it easier for one to gain entrance into secured or usually prohibited areas. Source: Google Image

  25. STEPS IN COMPROMISING SECURITY(CONT) • Suspicious People • It may mean having someone in a workplace, building, neighbourhood, or business establishment that does not fit in because of their demeanour, their language usage or unusual questions they ask. Source: Google Image

  26. STEPS IN COMPROMISING SECURITY(CONT) • Dry Runs. • Before execution of final operation or plan, a practice session will be conducted to work out the flaws and unanticipated problems. • This activity could include mapping out routes and determining the timing of traffic lights and flow. • This stage is usually considered the best time to intercept and stop an attack. Source: Google Image

  27. STEPS IN COMPROMISING SECURITY(CONT) • Funding and Fundraising. • In order to fund an attack, terrorists seek financial resources from Hostile Intelligence Services. • Suspicious transactions involving large cash payments, deposits or withdrawals are common signs of terrorist funding. • There are telecommunications issues which include tendency to make an unusual large amount of telephone calls, use of internet, use of postal service, or use of ATM and banking facilities. Source: Google Image

  28. Frank Bossard, an employee at the Ministry of Aviation jailed for 21 years in London for passing secrets to the Russians, was finally trapped by minute electronic bleepers attached to sensitive files. Bossard was already under suspicion, but MI5 needed evidence to take him to court. When he took one of the bugged files out of the building, he was trailed to a hotel room, and caught in the act of photographing the aircraft secrets inside

  29. ICT AND INFORMATION GATHERING TECHNIQUES • Through the use of information gathered and processed as intelligence; an operation can be designed to disrupt any impending threat that could emanate as an aftermath of the various methods discussed above. • A source is a person, thing or activity from which information is obtained; it provides accurate and detailed information concerning vital issues or activities. Source: Google Image

  30. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • Positive information indicates an activity in progress, identity of organisation, target or presence of suspect equipment and activities of critical groups. • Negative information shows that either the suspect has abandoned the previous idea or taken another deceptive approach or cause of action. Source: Google Image

  31. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • The Intelligence Cycle is the process of converting information requirements of a chief executive • or policy maker to actionable Intelligence. • Direction. This is the determination of information requirements or the chief executives order. • Collection. This involves breaking request down into basic information requirements and tasking the collection agencies. • Processing. ICT tools are used to aid the analysis because of the speed of processing and thus enhance national security. Source: Google Image

  32. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • SOFTWARE TOOLS • Vital information on markets, competitors and new products are now actively being collected by business organizations, to enable them formulate strategies to gain competitive advantage. • Intelligence in the developing world depends largely on overt methods, as against covert methods to collect Open-Source Intelligence. Source: Google Image

  33. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • SOFTWARE TOOLS • Tools are classified as specific when they have been designed commercially, or in-house, purposely for application in one or more stages in the intelligence cycle. • Data warehouse involves subject-oriented, integrated non-volatile collection of data in support of strategic management tasks. Data mining applications are now being used in counterterrorism. • Online Analytical Processing is software that aids online collection and analysis of data for decision-making. Source: Google Image

  34. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • SOFTWARE TOOLS • General tools refer to innovations that can be adapted for intelligence use, like the Internet. • The Internet can be used directly as a primary source of information and or a secondary source by experts. • It runs virtually all essential utilities like telecommunications, transport, financial, banking, health, education, security and law enforcement. • The social networking applications are vital means of intelligence gathering. Source: Google Image

  35. Giorgio Rinaldi and his wife Angela Maria used their skills as parachutists to spy for Russia. The Italian skydivers travelled throughout NATO countries giving aerobatic displays, during rehearsals often photographed secret missile sites or sensitive airport installations.

  36. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • The predominant method of collecting information is surveillance. • This includes keeping suspected persons, premises or vehicles under secret observation for purpose of identifying a suspect and their contacts.. • With contemporary security challenges, ICT tools are becoming invaluable Peugeot 3008 Spy Car Source: Google Image

  37. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • Covertly recording a conversation may provide important lead to times, dates and locations of future events. . • The same recording may also provide names of parties involved and, it is quite often possible to pick up on the mood of those involved in the conversation that has been recorded. • The sophisticated microphone technology now enables recording of conversations within a remote distance of a voice recording device. Source: Google Image

  38. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • Talking, texting, emailing, video watching, game playing, researching and shopping are now being carried out on smart phones. • Smart phones, could enable combatants to communicate with one another in multiple ways, watch airplane drone video live in the field, quickly go through maps, and share intelligence reports, just to name a few possible uses. Source: Google Image

  39. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • GSM transmitter is usually of the size of a cigarette packet that can easily be concealed in a room, office, vehicle or even on a boat. • Once fixed in position, it could be activated by dialing its secret number from any telephone in the world and the eavesdropper instantly hears all the conversations in the area Source: Google Image

  40. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • These are video surveillance cameras specifically designed on the premise that video installations are often prone to less than ideal lighting and operating conditions. • There are analogue and digital cameras that operate with lens separate from the camera circuitry and specifically designed for covert operation in restricted environment. • Some transmitters are specially designed for telephone monitoring and could transmit all calls from telephone extensions. Source: Google Image

  41. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • Pictures and Video tools which are miniature in size and easy to use include Tie, Pen, Belt, Glasses and Wristwatches. • These items are made with inbuilt memory, undetectable spy camera, USB port, LED status indicator, continuous recording and auto shut-off. • They have in-built DVR equipped with internal memory which allows for long hours of recording. Source: Google Image

  42. ICT AND INFORMATION GATHERING TECHNIQUES(CONT) • HARDWARE TOOLS • An Echelon is the name given to the massive worldwide surveillance system that is capable of capturing and scanning every telephone call, fax and email sent anywhere in the world. • An Echelon uses satellites, ground receiving stations and electronic intercepts that enables them pick all communications traffic sent by satellite, cellular, microwave and fibre optics Source: Google Image

  43. CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATHERING

  44. CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATHERING • POOR INFRASTRUCTURE. • There are inadequate infrastructure both in private sectors and government parastatals including the military. • Lack of modern ICT technologies for obtaining intelligence in most of the nation’s security agencies impacts negatively on national security. Source: Google Image

  45. CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT) • POOR HUMAN CAPITAL DEVELOPMENT • ICT is knowledge-based hence it could be difficult if not impossible for the nation to have effective development in this sector without an active and coordinated human resource development. • The nation lacks sufficient post graduates in various field of specialization related to intelligence gathering. Source: Google Image

  46. CHALLENGES INHIBITING ICT’S CONTRIBUTION TO INTELLIGENCE GATEHRING(CONT) • Absence of National Electronic Database • The USA National Counterterrorism Centre makes use of 23 databases. • Nigeria is yet to have the required databases that can aid national security. • The Sim card registration and the national ID-card project would be useful when fully implemented. Source: Google Image

  47. A KGB agent bugged the bed used by the British Queen during her tour of West Germany in 1965. Martin Margraf, who posed as a freelance waiter, was working at the Luxurious Petersburg Hotel, beside the Rhine near Bonn, when the Queen and her husband Prince Philip arrived. He concealed tiny microphone behind the headboard of their bed and retrieved it when they left.

  48. THE WAY FORWARD

  49. THE WAY FORWARD • PROVISION OF INFRASTRUCTURE • IGO in Nigeria suffers from lack of infrastructure that is typical of our nation. • To take advantage of ICT, government could provide infrastructure such as constant power supply and modern telecommunication facilities like fibre optics and wireless technologies. Source: Google Image

More Related