presentation by air vice marshal victor udoh chief of defence space agency nigeria ·...

44
RESTRICTED PRESENTATION BY AIR VICE MARSHAL VICTOR UDOH 1 RESTRICTED VICTOR UDOH CHIEF OF DEFENCE SPACE AGENCY NIGERIA

Upload: others

Post on 24-Apr-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

RESTRICTED

PRESENTATIONBY

AIR VICE MARSHALVICTOR UDOH

CHIEF OF DEFENCESPACE AGENCY

NIGERIA1RESTRICTED

PRESENTATIONBY

AIR VICE MARSHALVICTOR UDOH

CHIEF OF DEFENCESPACE AGENCY

NIGERIA

RESTRICTEDRESTRICTED

INFORMATION TECHNOLOGY AND

NATIONAL SECURITY:

COUNTERTERRORISM PERSPECTIVE

2RESTRICTEDRESTRICTED 2

INFORMATION TECHNOLOGY AND

NATIONAL SECURITY:

COUNTERTERRORISM PERSPECTIVE

RESTRICTEDRESTRICTED

AGENDA1. INTRODUCTION

2. DEFINITION OF KEY CONCEPTS

3. PROBLEMS ASSOCIATED WITH TERRORISM

4. USE OF INFORMATION TECHNOLOGY IN COUNTER-

TERRORISM

5. THE CHALLENGE

6. ROLES OF IT PROFESSIONALS IN COUNTERTERRORISM

7. CONCLUDING REMARKS

3RESTRICTEDRESTRICTED 3

1. INTRODUCTION

2. DEFINITION OF KEY CONCEPTS

3. PROBLEMS ASSOCIATED WITH TERRORISM

4. USE OF INFORMATION TECHNOLOGY IN COUNTER-

TERRORISM

5. THE CHALLENGE

6. ROLES OF IT PROFESSIONALS IN COUNTERTERRORISM

7. CONCLUDING REMARKS

RESTRICTED

LET ME BEGIN BY STATING THAT CONFLICT IS PART OFHUMAN. (EXAMPLES ABOUND IN RELIGIOUS BOOKS).DURING THE COLD WAR ERA, CONFLICTS USED TO BEA CONTEST WERE BETWEEN STATES. HOWEVER,SINCE THE END OF THE COLD WAR, CONFLICTSGLOBALLY ARE MORE OF CONTEST BETWEEN STATESAND NON-STATE ACTORS (IN THE FORM OFINSURGENCY AND TERRORISM)

FROM RELEVANT STATISTICS, BETWEEN 1965 AND2011, OUT OF 260 PEACE AGREEMENTS SIGNED, 196(OVER 75%) WERE BETWEEN STATES AND NON-STATEACTORS

INTRODUCTION (Contd)

4RESTRICTED

LET ME BEGIN BY STATING THAT CONFLICT IS PART OFHUMAN. (EXAMPLES ABOUND IN RELIGIOUS BOOKS).DURING THE COLD WAR ERA, CONFLICTS USED TO BEA CONTEST WERE BETWEEN STATES. HOWEVER,SINCE THE END OF THE COLD WAR, CONFLICTSGLOBALLY ARE MORE OF CONTEST BETWEEN STATESAND NON-STATE ACTORS (IN THE FORM OFINSURGENCY AND TERRORISM)

FROM RELEVANT STATISTICS, BETWEEN 1965 AND2011, OUT OF 260 PEACE AGREEMENTS SIGNED, 196(OVER 75%) WERE BETWEEN STATES AND NON-STATEACTORS

RESTRICTED

COMPARISON BETWEEN INTER-STATESAND INTRA-STATE CONFLICTS

INTRODUCTION (Contd)

5RESTRICTED

RESTRICTED

TODAY, THE WORLD IS FACED WITH MANY THREATS. THE THREATOF IGNORANCE, THE THREAT OF ECONOMY AND THE THREAT OFTERRORISM

HOWEVER, WE NEED PEACE AND SECURITY IN ORDER TO HAVESOCIO-ECONOMIC DEVELOPMENT. NO SECURITY OR SAFETY, NODEVELOPMENT BECAUSE NO INVESTORS WILL COME AROUND.THE FEW ONES WILL EVEN LEAVE LEADING TO UNEMPLOYEMENT

IT IS THROUGH ADVANCEMENT IN TECHNOLOGY THAT WE CANATTAIN ECONOMIC PROSPERITY, GROWTH AND OVERCOME MOSTSECURITY PROBLEMS.

WE THEREFORE NEED TO DEVELOP TECHNOLOGICALLY SO THATWE CAN OVERCOME BOTH ECONOMIC PROBLEM AND THREAT TOHUMAN LIFE SUCH AS TERRORISM THAT IS PREVALENT TODAY

INTRODUCTION

6RESTRICTED

TODAY, THE WORLD IS FACED WITH MANY THREATS. THE THREATOF IGNORANCE, THE THREAT OF ECONOMY AND THE THREAT OFTERRORISM

HOWEVER, WE NEED PEACE AND SECURITY IN ORDER TO HAVESOCIO-ECONOMIC DEVELOPMENT. NO SECURITY OR SAFETY, NODEVELOPMENT BECAUSE NO INVESTORS WILL COME AROUND.THE FEW ONES WILL EVEN LEAVE LEADING TO UNEMPLOYEMENT

IT IS THROUGH ADVANCEMENT IN TECHNOLOGY THAT WE CANATTAIN ECONOMIC PROSPERITY, GROWTH AND OVERCOME MOSTSECURITY PROBLEMS.

WE THEREFORE NEED TO DEVELOP TECHNOLOGICALLY SO THATWE CAN OVERCOME BOTH ECONOMIC PROBLEM AND THREAT TOHUMAN LIFE SUCH AS TERRORISM THAT IS PREVALENT TODAY

RESTRICTED

Terrorists, are known to use methods thatneutralize the strengths of conventionalforces.Terrorists set up websites, media and

communication as well as radio stationsthat are used to propagate their ideologies,recruitment and fund raising.In the last one month, we have witnessed

terrorist attacks in the US, Turkey, andFrance being the latest; killing over 100people.

INTRODUCTION (Contd)

7RESTRICTED

Terrorists, are known to use methods thatneutralize the strengths of conventionalforces.Terrorists set up websites, media and

communication as well as radio stationsthat are used to propagate their ideologies,recruitment and fund raising.In the last one month, we have witnessed

terrorist attacks in the US, Turkey, andFrance being the latest; killing over 100people.

RESTRICTED

Use of Improvised Explosive Devices (IED) oncivilian targets, ambushes of undefendedconvoys, and assassinations of poorly protectedindividuals are common tactics.

Terrorism is usually fought throughcounterterrorism warfare.

Application of appropriate technologies (ITinclusive) and intelligence have been responsiblefor nearly all successful counterterrorismcampaign globally and thus provide security andsafety to the populace.

INTRODUCTION (Contd)

8RESTRICTED

Use of Improvised Explosive Devices (IED) oncivilian targets, ambushes of undefendedconvoys, and assassinations of poorly protectedindividuals are common tactics.

Terrorism is usually fought throughcounterterrorism warfare.

Application of appropriate technologies (ITinclusive) and intelligence have been responsiblefor nearly all successful counterterrorismcampaign globally and thus provide security andsafety to the populace.

RESTRICTEDRESTRICTED

DEFINITION OF KEY CONCEPTS

1. INFORMATION TECHNOLOGY

2. NATIONAL SECURITY

3. TERRORISM/COUNTERTERRORISM

9RESTRICTEDRESTRICTED 9

1. INFORMATION TECHNOLOGY

2. NATIONAL SECURITY

3. TERRORISM/COUNTERTERRORISM

RESTRICTED

DEFINITION OF INFORMATIONTECHNOLOGY

Electronic equipment or interconnectedsystems that are used in the automaticacquisition, storage and manipulation ofdata or information to generate output in theform of numeric data, text, sound or imagescapable of being used for decision making orto control other processes.

10RESTRICTED

Electronic equipment or interconnectedsystems that are used in the automaticacquisition, storage and manipulation ofdata or information to generate output in theform of numeric data, text, sound or imagescapable of being used for decision making orto control other processes.

RESTRICTEDRESTRICTED

“NATIONAL SECURITY ENTAILS THE ABILITY OF ANATION TO OVERCOME THE MULTI-DIMENTIONALTHREATS TO THE WELL-BEING OF ITS PEOPLEAND ITS SURVIVAL AS A NATIONA-STATE BY THEINTEGRATED USE OF A ALL ELEMENT OF HERNATIONAL POWER SUCH AS POLITICALPOWER, DIPLOMACY, ECONOMIC POWER ANDMILITARY MIGHT”

NATIONAL SECURITY

11RESTRICTEDRESTRICTED 11

“NATIONAL SECURITY ENTAILS THE ABILITY OF ANATION TO OVERCOME THE MULTI-DIMENTIONALTHREATS TO THE WELL-BEING OF ITS PEOPLEAND ITS SURVIVAL AS A NATIONA-STATE BY THEINTEGRATED USE OF A ALL ELEMENT OF HERNATIONAL POWER SUCH AS POLITICALPOWER, DIPLOMACY, ECONOMIC POWER ANDMILITARY MIGHT”

RESTRICTED

NATO DEFINES TERRORISM AS "THEUNLAWFUL USE OR THREATENED USE OFFORCE OR VIOLENCE AGAINSTINDIVIDUALS OR PROPERTY IN AN ATTEMPTTO COERCE OR INTIMIDATE INDIVIDUALS,GOVERNMENTS OR SOCIETIES TO ACHIEVEPOLITICAL, RELIGIOUS OR IDEOLOGICALOBJECTIVES

TERRORISM

12RESTRICTED

NATO DEFINES TERRORISM AS "THEUNLAWFUL USE OR THREATENED USE OFFORCE OR VIOLENCE AGAINSTINDIVIDUALS OR PROPERTY IN AN ATTEMPTTO COERCE OR INTIMIDATE INDIVIDUALS,GOVERNMENTS OR SOCIETIES TO ACHIEVEPOLITICAL, RELIGIOUS OR IDEOLOGICALOBJECTIVES

RESTRICTED

COUNTER-TERRORISM

COUNTER-TERRORISM INCORPORATES THEPRACTICE, TACTICS, TECHNIQUES, ANDSTRATEGY THAT GOVERNMENT, MILITARY,LAW ENFORCEMENT AND INTELLIGENCEAGENCIES (OR CITIZENS) USE TO COMBATOR PREVENT TERRORISM

13RESTRICTED

COUNTER-TERRORISM INCORPORATES THEPRACTICE, TACTICS, TECHNIQUES, ANDSTRATEGY THAT GOVERNMENT, MILITARY,LAW ENFORCEMENT AND INTELLIGENCEAGENCIES (OR CITIZENS) USE TO COMBATOR PREVENT TERRORISM

RESTRICTEDRESTRICTED

SOME PROBLEMSASSOCIATED WITH

TERRORISM

14RESTRICTEDRESTRICTED 14

SOME PROBLEMSASSOCIATED WITH

TERRORISM

RESTRICTEDRESTRICTED

SOME PROBLEMS ASSOCIATED WITH CURBINGTERRORISM

1. Problem of Identity

2. Tracking the Insurgents, Collaborators and

Sponsors

3. Use of Social Media by Insurgents for

recruitment & funds raising (problem of anonymity

and trans border issues)

4. Use of Explosives for Suicide Bombing

5. Difficulty of Gathering Timely Intelligence15RESTRICTEDRESTRICTED 15

1. Problem of Identity

2. Tracking the Insurgents, Collaborators and

Sponsors

3. Use of Social Media by Insurgents for

recruitment & funds raising (problem of anonymity

and trans border issues)

4. Use of Explosives for Suicide Bombing

5. Difficulty of Gathering Timely Intelligence

RESTRICTEDRESTRICTED

POSSIBLE AREAS OFAPPLICATION OF IT TO

SOLVE IDENTIFIEDPROBLEMS

16RESTRICTEDRESTRICTED 16

POSSIBLE AREAS OFAPPLICATION OF IT TO

SOLVE IDENTIFIEDPROBLEMS

RESTRICTEDRESTRICTED

USE OF INFORMATION TECHNOLOGY INCOUNTER-TERRORISM

1. Biometric (Fingerprint, Iris and DNA technologies for

identification).

2. Geo-locators, Lawful Intercepts and Forensic.

3. Use of Open Source Intelligence and Ethical Hacking

to address the terrorists use of social media.

4. Robots for Explosives Destruction.

5. Use of Remote Sensing Satellites, ISR Platforms,

Radars, Electronic Fencing and Aerostat Balloon) for

Surveillance.17RESTRICTEDRESTRICTED 17

1. Biometric (Fingerprint, Iris and DNA technologies for

identification).

2. Geo-locators, Lawful Intercepts and Forensic.

3. Use of Open Source Intelligence and Ethical Hacking

to address the terrorists use of social media.

4. Robots for Explosives Destruction.

5. Use of Remote Sensing Satellites, ISR Platforms,

Radars, Electronic Fencing and Aerostat Balloon) for

Surveillance.

RESTRICTEDRESTRICTED

USE OF INFORMATION TECHNOLOGY INCOUNTER-TERRORISM

Biometric (Fingerprint, Iris and DNA technologies for

identification). The ongoing effort to provide National

Identity Card for all residents in Nigeria would go a long way

to address the challenge of multiple identities. Other efforts

in this direction include BVN, e-Passport, Drivers license.

There is also an effort to have a unified database of residents.

18RESTRICTEDRESTRICTED 18

Biometric (Fingerprint, Iris and DNA technologies for

identification). The ongoing effort to provide National

Identity Card for all residents in Nigeria would go a long way

to address the challenge of multiple identities. Other efforts

in this direction include BVN, e-Passport, Drivers license.

There is also an effort to have a unified database of residents.

SOURCE : Google Image

RESTRICTEDRESTRICTED

19RESTRICTEDRESTRICTED 19

RESTRICTEDRESTRICTED

EXPLOSIVE DETECTORS

20RESTRICTEDRESTRICTED 20SOURCE : Google Image

RESTRICTEDRESTRICTEDUSE OF ARTIFICIAL INTELLIGENCE AND

MODELLING IN IDENTIFYING TERRORISTS

21RESTRICTEDRESTRICTED 21SOURCE : Google Image

RESTRICTEDRESTRICTED

USE OF IT DEVICES TO TRACK TERRORISTS

Geo-locators, Lawful Intercepts and Forensic Analysis.

IT systems are usually employed to locate the current

location of terrorists and thereafter continue to track the

target until arrest is made. There are also IT systems that are

employed for lawful intercepts and Forensic analysis of

terrorists handsets and/or laptops.

22RESTRICTEDRESTRICTED 22

Geo-locators, Lawful Intercepts and Forensic Analysis.

IT systems are usually employed to locate the current

location of terrorists and thereafter continue to track the

target until arrest is made. There are also IT systems that are

employed for lawful intercepts and Forensic analysis of

terrorists handsets and/or laptops.

RESTRICTEDRESTRICTED

USE OF IT IN COUNTER-TERRORISMUse of Open Source Intelligence and Ethical Hacking to

address the terrorists use of social media. IT software are

often use to counter the use of the Internet by terrorists for

recruitment, fund raising and communication.

Terrorists can also be tracked by being their friends on SM.

Ethical Hacking and DDOS attacks are employed to disrupt

and/or deny the terrorist use of cyberspace. Terrorist radio

broadcasting using internet protocols have been disrupted in

the past by this method, while radio stations using

frequencies are usually traces using direction finders before

destruction.23RESTRICTEDRESTRICTED 23

Use of Open Source Intelligence and Ethical Hacking to

address the terrorists use of social media. IT software are

often use to counter the use of the Internet by terrorists for

recruitment, fund raising and communication.

Terrorists can also be tracked by being their friends on SM.

Ethical Hacking and DDOS attacks are employed to disrupt

and/or deny the terrorist use of cyberspace. Terrorist radio

broadcasting using internet protocols have been disrupted in

the past by this method, while radio stations using

frequencies are usually traces using direction finders before

destruction.

RESTRICTEDRESTRICTED

OPEN SOURCE INTELLIGENCE AND ETHICALHACKING (CYBER WARFARE)

24RESTRICTEDRESTRICTED 24SOURCE : Google Image

RESTRICTEDUSE OF INFORMATION TECHNOLOGY IN COUNTER-TERRORISM

25RESTRICTED

Brain Fingerprinting for interrogation (animprovement over polygraph machine

SOURCE : Google Image

RESTRICTEDRESTRICTED

USE OF INFORMATION TECHNOLOGY INCOUNTER-TERRORISM

Use of Robots for Explosives Destruction.

Explosive Ordnance Disposal (EOD) robots deployed by

major armed forces across the world.

26RESTRICTEDRESTRICTED 26

RESTRICTEDRESTRICTED

USE OF INFORMATION TECHNOLOGY INCOUNTER-TERRORISM

Surveillance Systems. Many surveillance systems are

powered by sensors and/or chips placed on the platforms.

Some of the surveillance systems employed to counter-

terrorism include:

ISR Platforms

Radars

Electronic Fencing

Aerostat Balloon

Remote Sensing Satellites

27RESTRICTEDRESTRICTED 27

Surveillance Systems. Many surveillance systems are

powered by sensors and/or chips placed on the platforms.

Some of the surveillance systems employed to counter-

terrorism include:

ISR Platforms

Radars

Electronic Fencing

Aerostat Balloon

Remote Sensing Satellites

RESTRICTEDRESTRICTED

SURVEILLANCE SYSTEMS

28RESTRICTEDRESTRICTED 28

Ground Surveillance Radar

Surveillance Cameras

SOURCE : Google Image

Aerostat Balloon System

RESTRICTED

SURVEILLANCE AIRCRAFT

29RESTRICTED

Surveillance Camera

RESTRICTED

UNMANNED AERIAL VEHICLE FORSURVEILLANCE

UNMANNED AERIAL VEHICLE FORSURVEILLANCE

30RESTRICTED

RESTRICTED

REMOTE SENSING SATELLITE

31RESTRICTED

RESTRICTEDRESTRICTED

SATELLITE IMAGERY OF NEW TENT AT SAMBISA FOREST

32RESTRICTEDRESTRICTED 32

RESTRICTED

SATELLITE IMAGERY OF PIPELINE SABOUTAGE

33RESTRICTED

RESTRICTED

SATELLITE IMAGERY OF PIPELINE SABOUTAGE

34RESTRICTED

RESTRICTEDRESTRICTED

THE CHALLENGE

35RESTRICTEDRESTRICTED 35

THE CHALLENGE

RESTRICTEDRESTRICTED

THE CHALLENGE1. Most of the IT solution use for counter-terrorism

are imported.

2. Foreign Currency is becoming expensive.

3. Security of life and property is threatened daily

by terrorists and other vandals.

4. As IT Professionals, what can we contribute to

counter-terrorism (safe life and make legitimate

earnings?)36RESTRICTEDRESTRICTED 36

1. Most of the IT solution use for counter-terrorism

are imported.

2. Foreign Currency is becoming expensive.

3. Security of life and property is threatened daily

by terrorists and other vandals.

4. As IT Professionals, what can we contribute to

counter-terrorism (safe life and make legitimate

earnings?)

RESTRICTEDRESTRICTED

ROLE OF ITPROFESSIONALS IN

COUNTER-TERRORISM

37RESTRICTEDRESTRICTED 37

ROLE OF ITPROFESSIONALS IN

COUNTER-TERRORISM

RESTRICTEDRESTRICTED

ROLE OF IT PROFESSIONALS

1. Embarking on Research and Development

2. Collaboration among Government, Industries,

Academia and Security Agencies

3. Sponsorship of IT competitions in Institutions.

4. Converting “Non-Ethical Hackers (Black Hat)”

and “Yahoo Yahoo boys” to “Ethical White Hat

Hackers”.

38RESTRICTEDRESTRICTED 38

1. Embarking on Research and Development

2. Collaboration among Government, Industries,

Academia and Security Agencies

3. Sponsorship of IT competitions in Institutions.

4. Converting “Non-Ethical Hackers (Black Hat)”

and “Yahoo Yahoo boys” to “Ethical White Hat

Hackers”.

RESTRICTEDRESTRICTED

CONCLUDINGREMARKS

39RESTRICTEDRESTRICTED 39

CONCLUDINGREMARKS

RESTRICTED

CONCLUDING REMARKS• Undoubtedly, the security of citizens globally is being

threatened by activities on non-state actors in the form ofterrorism.

• The presentation provides a foundation to examine theroles of information technology in counterinsurgencyoperations aimed at enhancing the security of lives andproperty in Nigeria.

• Obviously, Technology (IT) and intelligence are used toenhance counter-insurgency.

• Significant victories recorded against terrorists by thesecurity agencies in recent time underscores the fact thateffective intelligence and technology (IT) is required tocurb insurgency.

40RESTRICTED

• Undoubtedly, the security of citizens globally is beingthreatened by activities on non-state actors in the form ofterrorism.

• The presentation provides a foundation to examine theroles of information technology in counterinsurgencyoperations aimed at enhancing the security of lives andproperty in Nigeria.

• Obviously, Technology (IT) and intelligence are used toenhance counter-insurgency.

• Significant victories recorded against terrorists by thesecurity agencies in recent time underscores the fact thateffective intelligence and technology (IT) is required tocurb insurgency.

RESTRICTED

CONCLUDING REMARKS• Judging from occurrences globally, IT and other form of

technologies are employed extensively in counter-terrorism. Most of the equipment are imported fromadvanced countries in hard currencies running.

• Our great country is currently going through tough times.As IT professionals and technologists, what will be ourcontribution to our country at a time like this.

• I believe that that this is the time for IT Professionals,academicians and technology companies to collaboratemore with the security agencies in search of indigenoussolutions to counter-terrorism solutions that will save thecountry foreign exchange.

• As I leave, let me remind us the quotations of John FKennedy to the American some years back.

41RESTRICTED

• Judging from occurrences globally, IT and other form oftechnologies are employed extensively in counter-terrorism. Most of the equipment are imported fromadvanced countries in hard currencies running.

• Our great country is currently going through tough times.As IT professionals and technologists, what will be ourcontribution to our country at a time like this.

• I believe that that this is the time for IT Professionals,academicians and technology companies to collaboratemore with the security agencies in search of indigenoussolutions to counter-terrorism solutions that will save thecountry foreign exchange.

• As I leave, let me remind us the quotations of John FKennedy to the American some years back.

RESTRICTEDRESTRICTED

“My fellow Americans, ask not whatyour country can do for you, askwhat you can do for your country”

John F. Kennedy

For me, “tough times never last buttough people do”

42RESTRICTEDRESTRICTED 42

“My fellow Americans, ask not whatyour country can do for you, askwhat you can do for your country”

John F. Kennedy

For me, “tough times never last buttough people do”

RESTRICTEDRESTRICTED

I THANK YOU

FOR YOUR

ATTENTION

43RESTRICTEDRESTRICTED 43

I THANK YOU

FOR YOUR

ATTENTION

RESTRICTED

REFERENCES1. US Army War College 2013, Boko Haram: Developing New Strategies toCombat Terrorism in Nigeria by Col Solomon Effiong Udounwa Nigerian Army.

2. Technology in Counterinsurgency Warfareby SWJ Editors.

3. The Use of ICT Tools in Tackling Insecurity and Terrorism Problem inNigeria by A.I. Oludare et al

4. Countering the Use of the Internet for Terrorist Purposes - Legal andTechnical Aspects by UN Counter-Terrorism Task Force, May 2011

5. Technological Approach to Curbing Insurgency: Challenges and Options forthe Armed Forces of Nigeria – A Lecture Delivered at the Nigerian army Schoolof Logistics by AVM TV Udoh, May 2016

44RESTRICTED

1. US Army War College 2013, Boko Haram: Developing New Strategies toCombat Terrorism in Nigeria by Col Solomon Effiong Udounwa Nigerian Army.

2. Technology in Counterinsurgency Warfareby SWJ Editors.

3. The Use of ICT Tools in Tackling Insecurity and Terrorism Problem inNigeria by A.I. Oludare et al

4. Countering the Use of the Internet for Terrorist Purposes - Legal andTechnical Aspects by UN Counter-Terrorism Task Force, May 2011

5. Technological Approach to Curbing Insurgency: Challenges and Options forthe Armed Forces of Nigeria – A Lecture Delivered at the Nigerian army Schoolof Logistics by AVM TV Udoh, May 2016