presentation by air vice marshal victor udoh chief of defence space agency nigeria ·...
TRANSCRIPT
RESTRICTED
PRESENTATIONBY
AIR VICE MARSHALVICTOR UDOH
CHIEF OF DEFENCESPACE AGENCY
NIGERIA1RESTRICTED
PRESENTATIONBY
AIR VICE MARSHALVICTOR UDOH
CHIEF OF DEFENCESPACE AGENCY
NIGERIA
RESTRICTEDRESTRICTED
INFORMATION TECHNOLOGY AND
NATIONAL SECURITY:
COUNTERTERRORISM PERSPECTIVE
2RESTRICTEDRESTRICTED 2
INFORMATION TECHNOLOGY AND
NATIONAL SECURITY:
COUNTERTERRORISM PERSPECTIVE
RESTRICTEDRESTRICTED
AGENDA1. INTRODUCTION
2. DEFINITION OF KEY CONCEPTS
3. PROBLEMS ASSOCIATED WITH TERRORISM
4. USE OF INFORMATION TECHNOLOGY IN COUNTER-
TERRORISM
5. THE CHALLENGE
6. ROLES OF IT PROFESSIONALS IN COUNTERTERRORISM
7. CONCLUDING REMARKS
3RESTRICTEDRESTRICTED 3
1. INTRODUCTION
2. DEFINITION OF KEY CONCEPTS
3. PROBLEMS ASSOCIATED WITH TERRORISM
4. USE OF INFORMATION TECHNOLOGY IN COUNTER-
TERRORISM
5. THE CHALLENGE
6. ROLES OF IT PROFESSIONALS IN COUNTERTERRORISM
7. CONCLUDING REMARKS
RESTRICTED
LET ME BEGIN BY STATING THAT CONFLICT IS PART OFHUMAN. (EXAMPLES ABOUND IN RELIGIOUS BOOKS).DURING THE COLD WAR ERA, CONFLICTS USED TO BEA CONTEST WERE BETWEEN STATES. HOWEVER,SINCE THE END OF THE COLD WAR, CONFLICTSGLOBALLY ARE MORE OF CONTEST BETWEEN STATESAND NON-STATE ACTORS (IN THE FORM OFINSURGENCY AND TERRORISM)
FROM RELEVANT STATISTICS, BETWEEN 1965 AND2011, OUT OF 260 PEACE AGREEMENTS SIGNED, 196(OVER 75%) WERE BETWEEN STATES AND NON-STATEACTORS
INTRODUCTION (Contd)
4RESTRICTED
LET ME BEGIN BY STATING THAT CONFLICT IS PART OFHUMAN. (EXAMPLES ABOUND IN RELIGIOUS BOOKS).DURING THE COLD WAR ERA, CONFLICTS USED TO BEA CONTEST WERE BETWEEN STATES. HOWEVER,SINCE THE END OF THE COLD WAR, CONFLICTSGLOBALLY ARE MORE OF CONTEST BETWEEN STATESAND NON-STATE ACTORS (IN THE FORM OFINSURGENCY AND TERRORISM)
FROM RELEVANT STATISTICS, BETWEEN 1965 AND2011, OUT OF 260 PEACE AGREEMENTS SIGNED, 196(OVER 75%) WERE BETWEEN STATES AND NON-STATEACTORS
RESTRICTED
COMPARISON BETWEEN INTER-STATESAND INTRA-STATE CONFLICTS
INTRODUCTION (Contd)
5RESTRICTED
RESTRICTED
TODAY, THE WORLD IS FACED WITH MANY THREATS. THE THREATOF IGNORANCE, THE THREAT OF ECONOMY AND THE THREAT OFTERRORISM
HOWEVER, WE NEED PEACE AND SECURITY IN ORDER TO HAVESOCIO-ECONOMIC DEVELOPMENT. NO SECURITY OR SAFETY, NODEVELOPMENT BECAUSE NO INVESTORS WILL COME AROUND.THE FEW ONES WILL EVEN LEAVE LEADING TO UNEMPLOYEMENT
IT IS THROUGH ADVANCEMENT IN TECHNOLOGY THAT WE CANATTAIN ECONOMIC PROSPERITY, GROWTH AND OVERCOME MOSTSECURITY PROBLEMS.
WE THEREFORE NEED TO DEVELOP TECHNOLOGICALLY SO THATWE CAN OVERCOME BOTH ECONOMIC PROBLEM AND THREAT TOHUMAN LIFE SUCH AS TERRORISM THAT IS PREVALENT TODAY
INTRODUCTION
6RESTRICTED
TODAY, THE WORLD IS FACED WITH MANY THREATS. THE THREATOF IGNORANCE, THE THREAT OF ECONOMY AND THE THREAT OFTERRORISM
HOWEVER, WE NEED PEACE AND SECURITY IN ORDER TO HAVESOCIO-ECONOMIC DEVELOPMENT. NO SECURITY OR SAFETY, NODEVELOPMENT BECAUSE NO INVESTORS WILL COME AROUND.THE FEW ONES WILL EVEN LEAVE LEADING TO UNEMPLOYEMENT
IT IS THROUGH ADVANCEMENT IN TECHNOLOGY THAT WE CANATTAIN ECONOMIC PROSPERITY, GROWTH AND OVERCOME MOSTSECURITY PROBLEMS.
WE THEREFORE NEED TO DEVELOP TECHNOLOGICALLY SO THATWE CAN OVERCOME BOTH ECONOMIC PROBLEM AND THREAT TOHUMAN LIFE SUCH AS TERRORISM THAT IS PREVALENT TODAY
RESTRICTED
Terrorists, are known to use methods thatneutralize the strengths of conventionalforces.Terrorists set up websites, media and
communication as well as radio stationsthat are used to propagate their ideologies,recruitment and fund raising.In the last one month, we have witnessed
terrorist attacks in the US, Turkey, andFrance being the latest; killing over 100people.
INTRODUCTION (Contd)
7RESTRICTED
Terrorists, are known to use methods thatneutralize the strengths of conventionalforces.Terrorists set up websites, media and
communication as well as radio stationsthat are used to propagate their ideologies,recruitment and fund raising.In the last one month, we have witnessed
terrorist attacks in the US, Turkey, andFrance being the latest; killing over 100people.
RESTRICTED
Use of Improvised Explosive Devices (IED) oncivilian targets, ambushes of undefendedconvoys, and assassinations of poorly protectedindividuals are common tactics.
Terrorism is usually fought throughcounterterrorism warfare.
Application of appropriate technologies (ITinclusive) and intelligence have been responsiblefor nearly all successful counterterrorismcampaign globally and thus provide security andsafety to the populace.
INTRODUCTION (Contd)
8RESTRICTED
Use of Improvised Explosive Devices (IED) oncivilian targets, ambushes of undefendedconvoys, and assassinations of poorly protectedindividuals are common tactics.
Terrorism is usually fought throughcounterterrorism warfare.
Application of appropriate technologies (ITinclusive) and intelligence have been responsiblefor nearly all successful counterterrorismcampaign globally and thus provide security andsafety to the populace.
RESTRICTEDRESTRICTED
DEFINITION OF KEY CONCEPTS
1. INFORMATION TECHNOLOGY
2. NATIONAL SECURITY
3. TERRORISM/COUNTERTERRORISM
9RESTRICTEDRESTRICTED 9
1. INFORMATION TECHNOLOGY
2. NATIONAL SECURITY
3. TERRORISM/COUNTERTERRORISM
RESTRICTED
DEFINITION OF INFORMATIONTECHNOLOGY
Electronic equipment or interconnectedsystems that are used in the automaticacquisition, storage and manipulation ofdata or information to generate output in theform of numeric data, text, sound or imagescapable of being used for decision making orto control other processes.
10RESTRICTED
Electronic equipment or interconnectedsystems that are used in the automaticacquisition, storage and manipulation ofdata or information to generate output in theform of numeric data, text, sound or imagescapable of being used for decision making orto control other processes.
RESTRICTEDRESTRICTED
“NATIONAL SECURITY ENTAILS THE ABILITY OF ANATION TO OVERCOME THE MULTI-DIMENTIONALTHREATS TO THE WELL-BEING OF ITS PEOPLEAND ITS SURVIVAL AS A NATIONA-STATE BY THEINTEGRATED USE OF A ALL ELEMENT OF HERNATIONAL POWER SUCH AS POLITICALPOWER, DIPLOMACY, ECONOMIC POWER ANDMILITARY MIGHT”
NATIONAL SECURITY
11RESTRICTEDRESTRICTED 11
“NATIONAL SECURITY ENTAILS THE ABILITY OF ANATION TO OVERCOME THE MULTI-DIMENTIONALTHREATS TO THE WELL-BEING OF ITS PEOPLEAND ITS SURVIVAL AS A NATIONA-STATE BY THEINTEGRATED USE OF A ALL ELEMENT OF HERNATIONAL POWER SUCH AS POLITICALPOWER, DIPLOMACY, ECONOMIC POWER ANDMILITARY MIGHT”
RESTRICTED
NATO DEFINES TERRORISM AS "THEUNLAWFUL USE OR THREATENED USE OFFORCE OR VIOLENCE AGAINSTINDIVIDUALS OR PROPERTY IN AN ATTEMPTTO COERCE OR INTIMIDATE INDIVIDUALS,GOVERNMENTS OR SOCIETIES TO ACHIEVEPOLITICAL, RELIGIOUS OR IDEOLOGICALOBJECTIVES
TERRORISM
12RESTRICTED
NATO DEFINES TERRORISM AS "THEUNLAWFUL USE OR THREATENED USE OFFORCE OR VIOLENCE AGAINSTINDIVIDUALS OR PROPERTY IN AN ATTEMPTTO COERCE OR INTIMIDATE INDIVIDUALS,GOVERNMENTS OR SOCIETIES TO ACHIEVEPOLITICAL, RELIGIOUS OR IDEOLOGICALOBJECTIVES
RESTRICTED
COUNTER-TERRORISM
COUNTER-TERRORISM INCORPORATES THEPRACTICE, TACTICS, TECHNIQUES, ANDSTRATEGY THAT GOVERNMENT, MILITARY,LAW ENFORCEMENT AND INTELLIGENCEAGENCIES (OR CITIZENS) USE TO COMBATOR PREVENT TERRORISM
13RESTRICTED
COUNTER-TERRORISM INCORPORATES THEPRACTICE, TACTICS, TECHNIQUES, ANDSTRATEGY THAT GOVERNMENT, MILITARY,LAW ENFORCEMENT AND INTELLIGENCEAGENCIES (OR CITIZENS) USE TO COMBATOR PREVENT TERRORISM
RESTRICTEDRESTRICTED
SOME PROBLEMSASSOCIATED WITH
TERRORISM
14RESTRICTEDRESTRICTED 14
SOME PROBLEMSASSOCIATED WITH
TERRORISM
RESTRICTEDRESTRICTED
SOME PROBLEMS ASSOCIATED WITH CURBINGTERRORISM
1. Problem of Identity
2. Tracking the Insurgents, Collaborators and
Sponsors
3. Use of Social Media by Insurgents for
recruitment & funds raising (problem of anonymity
and trans border issues)
4. Use of Explosives for Suicide Bombing
5. Difficulty of Gathering Timely Intelligence15RESTRICTEDRESTRICTED 15
1. Problem of Identity
2. Tracking the Insurgents, Collaborators and
Sponsors
3. Use of Social Media by Insurgents for
recruitment & funds raising (problem of anonymity
and trans border issues)
4. Use of Explosives for Suicide Bombing
5. Difficulty of Gathering Timely Intelligence
RESTRICTEDRESTRICTED
POSSIBLE AREAS OFAPPLICATION OF IT TO
SOLVE IDENTIFIEDPROBLEMS
16RESTRICTEDRESTRICTED 16
POSSIBLE AREAS OFAPPLICATION OF IT TO
SOLVE IDENTIFIEDPROBLEMS
RESTRICTEDRESTRICTED
USE OF INFORMATION TECHNOLOGY INCOUNTER-TERRORISM
1. Biometric (Fingerprint, Iris and DNA technologies for
identification).
2. Geo-locators, Lawful Intercepts and Forensic.
3. Use of Open Source Intelligence and Ethical Hacking
to address the terrorists use of social media.
4. Robots for Explosives Destruction.
5. Use of Remote Sensing Satellites, ISR Platforms,
Radars, Electronic Fencing and Aerostat Balloon) for
Surveillance.17RESTRICTEDRESTRICTED 17
1. Biometric (Fingerprint, Iris and DNA technologies for
identification).
2. Geo-locators, Lawful Intercepts and Forensic.
3. Use of Open Source Intelligence and Ethical Hacking
to address the terrorists use of social media.
4. Robots for Explosives Destruction.
5. Use of Remote Sensing Satellites, ISR Platforms,
Radars, Electronic Fencing and Aerostat Balloon) for
Surveillance.
RESTRICTEDRESTRICTED
USE OF INFORMATION TECHNOLOGY INCOUNTER-TERRORISM
Biometric (Fingerprint, Iris and DNA technologies for
identification). The ongoing effort to provide National
Identity Card for all residents in Nigeria would go a long way
to address the challenge of multiple identities. Other efforts
in this direction include BVN, e-Passport, Drivers license.
There is also an effort to have a unified database of residents.
18RESTRICTEDRESTRICTED 18
Biometric (Fingerprint, Iris and DNA technologies for
identification). The ongoing effort to provide National
Identity Card for all residents in Nigeria would go a long way
to address the challenge of multiple identities. Other efforts
in this direction include BVN, e-Passport, Drivers license.
There is also an effort to have a unified database of residents.
SOURCE : Google Image
RESTRICTEDRESTRICTEDUSE OF ARTIFICIAL INTELLIGENCE AND
MODELLING IN IDENTIFYING TERRORISTS
21RESTRICTEDRESTRICTED 21SOURCE : Google Image
RESTRICTEDRESTRICTED
USE OF IT DEVICES TO TRACK TERRORISTS
Geo-locators, Lawful Intercepts and Forensic Analysis.
IT systems are usually employed to locate the current
location of terrorists and thereafter continue to track the
target until arrest is made. There are also IT systems that are
employed for lawful intercepts and Forensic analysis of
terrorists handsets and/or laptops.
22RESTRICTEDRESTRICTED 22
Geo-locators, Lawful Intercepts and Forensic Analysis.
IT systems are usually employed to locate the current
location of terrorists and thereafter continue to track the
target until arrest is made. There are also IT systems that are
employed for lawful intercepts and Forensic analysis of
terrorists handsets and/or laptops.
RESTRICTEDRESTRICTED
USE OF IT IN COUNTER-TERRORISMUse of Open Source Intelligence and Ethical Hacking to
address the terrorists use of social media. IT software are
often use to counter the use of the Internet by terrorists for
recruitment, fund raising and communication.
Terrorists can also be tracked by being their friends on SM.
Ethical Hacking and DDOS attacks are employed to disrupt
and/or deny the terrorist use of cyberspace. Terrorist radio
broadcasting using internet protocols have been disrupted in
the past by this method, while radio stations using
frequencies are usually traces using direction finders before
destruction.23RESTRICTEDRESTRICTED 23
Use of Open Source Intelligence and Ethical Hacking to
address the terrorists use of social media. IT software are
often use to counter the use of the Internet by terrorists for
recruitment, fund raising and communication.
Terrorists can also be tracked by being their friends on SM.
Ethical Hacking and DDOS attacks are employed to disrupt
and/or deny the terrorist use of cyberspace. Terrorist radio
broadcasting using internet protocols have been disrupted in
the past by this method, while radio stations using
frequencies are usually traces using direction finders before
destruction.
RESTRICTEDRESTRICTED
OPEN SOURCE INTELLIGENCE AND ETHICALHACKING (CYBER WARFARE)
24RESTRICTEDRESTRICTED 24SOURCE : Google Image
RESTRICTEDUSE OF INFORMATION TECHNOLOGY IN COUNTER-TERRORISM
25RESTRICTED
Brain Fingerprinting for interrogation (animprovement over polygraph machine
SOURCE : Google Image
RESTRICTEDRESTRICTED
USE OF INFORMATION TECHNOLOGY INCOUNTER-TERRORISM
Use of Robots for Explosives Destruction.
Explosive Ordnance Disposal (EOD) robots deployed by
major armed forces across the world.
26RESTRICTEDRESTRICTED 26
RESTRICTEDRESTRICTED
USE OF INFORMATION TECHNOLOGY INCOUNTER-TERRORISM
Surveillance Systems. Many surveillance systems are
powered by sensors and/or chips placed on the platforms.
Some of the surveillance systems employed to counter-
terrorism include:
ISR Platforms
Radars
Electronic Fencing
Aerostat Balloon
Remote Sensing Satellites
27RESTRICTEDRESTRICTED 27
Surveillance Systems. Many surveillance systems are
powered by sensors and/or chips placed on the platforms.
Some of the surveillance systems employed to counter-
terrorism include:
ISR Platforms
Radars
Electronic Fencing
Aerostat Balloon
Remote Sensing Satellites
RESTRICTEDRESTRICTED
SURVEILLANCE SYSTEMS
28RESTRICTEDRESTRICTED 28
Ground Surveillance Radar
Surveillance Cameras
SOURCE : Google Image
Aerostat Balloon System
RESTRICTED
UNMANNED AERIAL VEHICLE FORSURVEILLANCE
UNMANNED AERIAL VEHICLE FORSURVEILLANCE
30RESTRICTED
RESTRICTEDRESTRICTED
THE CHALLENGE1. Most of the IT solution use for counter-terrorism
are imported.
2. Foreign Currency is becoming expensive.
3. Security of life and property is threatened daily
by terrorists and other vandals.
4. As IT Professionals, what can we contribute to
counter-terrorism (safe life and make legitimate
earnings?)36RESTRICTEDRESTRICTED 36
1. Most of the IT solution use for counter-terrorism
are imported.
2. Foreign Currency is becoming expensive.
3. Security of life and property is threatened daily
by terrorists and other vandals.
4. As IT Professionals, what can we contribute to
counter-terrorism (safe life and make legitimate
earnings?)
RESTRICTEDRESTRICTED
ROLE OF ITPROFESSIONALS IN
COUNTER-TERRORISM
37RESTRICTEDRESTRICTED 37
ROLE OF ITPROFESSIONALS IN
COUNTER-TERRORISM
RESTRICTEDRESTRICTED
ROLE OF IT PROFESSIONALS
1. Embarking on Research and Development
2. Collaboration among Government, Industries,
Academia and Security Agencies
3. Sponsorship of IT competitions in Institutions.
4. Converting “Non-Ethical Hackers (Black Hat)”
and “Yahoo Yahoo boys” to “Ethical White Hat
Hackers”.
38RESTRICTEDRESTRICTED 38
1. Embarking on Research and Development
2. Collaboration among Government, Industries,
Academia and Security Agencies
3. Sponsorship of IT competitions in Institutions.
4. Converting “Non-Ethical Hackers (Black Hat)”
and “Yahoo Yahoo boys” to “Ethical White Hat
Hackers”.
RESTRICTED
CONCLUDING REMARKS• Undoubtedly, the security of citizens globally is being
threatened by activities on non-state actors in the form ofterrorism.
• The presentation provides a foundation to examine theroles of information technology in counterinsurgencyoperations aimed at enhancing the security of lives andproperty in Nigeria.
• Obviously, Technology (IT) and intelligence are used toenhance counter-insurgency.
• Significant victories recorded against terrorists by thesecurity agencies in recent time underscores the fact thateffective intelligence and technology (IT) is required tocurb insurgency.
40RESTRICTED
• Undoubtedly, the security of citizens globally is beingthreatened by activities on non-state actors in the form ofterrorism.
• The presentation provides a foundation to examine theroles of information technology in counterinsurgencyoperations aimed at enhancing the security of lives andproperty in Nigeria.
• Obviously, Technology (IT) and intelligence are used toenhance counter-insurgency.
• Significant victories recorded against terrorists by thesecurity agencies in recent time underscores the fact thateffective intelligence and technology (IT) is required tocurb insurgency.
RESTRICTED
CONCLUDING REMARKS• Judging from occurrences globally, IT and other form of
technologies are employed extensively in counter-terrorism. Most of the equipment are imported fromadvanced countries in hard currencies running.
• Our great country is currently going through tough times.As IT professionals and technologists, what will be ourcontribution to our country at a time like this.
• I believe that that this is the time for IT Professionals,academicians and technology companies to collaboratemore with the security agencies in search of indigenoussolutions to counter-terrorism solutions that will save thecountry foreign exchange.
• As I leave, let me remind us the quotations of John FKennedy to the American some years back.
41RESTRICTED
• Judging from occurrences globally, IT and other form oftechnologies are employed extensively in counter-terrorism. Most of the equipment are imported fromadvanced countries in hard currencies running.
• Our great country is currently going through tough times.As IT professionals and technologists, what will be ourcontribution to our country at a time like this.
• I believe that that this is the time for IT Professionals,academicians and technology companies to collaboratemore with the security agencies in search of indigenoussolutions to counter-terrorism solutions that will save thecountry foreign exchange.
• As I leave, let me remind us the quotations of John FKennedy to the American some years back.
RESTRICTEDRESTRICTED
“My fellow Americans, ask not whatyour country can do for you, askwhat you can do for your country”
John F. Kennedy
For me, “tough times never last buttough people do”
42RESTRICTEDRESTRICTED 42
“My fellow Americans, ask not whatyour country can do for you, askwhat you can do for your country”
John F. Kennedy
For me, “tough times never last buttough people do”
RESTRICTEDRESTRICTED
I THANK YOU
FOR YOUR
ATTENTION
43RESTRICTEDRESTRICTED 43
I THANK YOU
FOR YOUR
ATTENTION
RESTRICTED
REFERENCES1. US Army War College 2013, Boko Haram: Developing New Strategies toCombat Terrorism in Nigeria by Col Solomon Effiong Udounwa Nigerian Army.
2. Technology in Counterinsurgency Warfareby SWJ Editors.
3. The Use of ICT Tools in Tackling Insecurity and Terrorism Problem inNigeria by A.I. Oludare et al
4. Countering the Use of the Internet for Terrorist Purposes - Legal andTechnical Aspects by UN Counter-Terrorism Task Force, May 2011
5. Technological Approach to Curbing Insurgency: Challenges and Options forthe Armed Forces of Nigeria – A Lecture Delivered at the Nigerian army Schoolof Logistics by AVM TV Udoh, May 2016
44RESTRICTED
1. US Army War College 2013, Boko Haram: Developing New Strategies toCombat Terrorism in Nigeria by Col Solomon Effiong Udounwa Nigerian Army.
2. Technology in Counterinsurgency Warfareby SWJ Editors.
3. The Use of ICT Tools in Tackling Insecurity and Terrorism Problem inNigeria by A.I. Oludare et al
4. Countering the Use of the Internet for Terrorist Purposes - Legal andTechnical Aspects by UN Counter-Terrorism Task Force, May 2011
5. Technological Approach to Curbing Insurgency: Challenges and Options forthe Armed Forces of Nigeria – A Lecture Delivered at the Nigerian army Schoolof Logistics by AVM TV Udoh, May 2016