1 / 38

The Role of ICT Deployment for National Security

The Role of ICT Deployment for National Security. A presentation by: Abdul-Hakeem B. D. Ajijola ajijola@consultancyss.com , ajijola@gmail.com 18 May 2010. @ the eNigeria 2010 Conference Shehu Musa Yar’adua Centre, Abuja 18 May , 2010. Food for thought.

odetta
Download Presentation

The Role of ICT Deployment for National Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Role of ICT Deployment for National Security A presentation by: Abdul-Hakeem B. D. Ajijola ajijola@consultancyss.com, ajijola@gmail.com 18 May 2010 @ the eNigeria 2010 Conference Shehu Musa Yar’adua Centre, Abuja 18 May, 2010

  2. Food for thought • In the 21st Century knowledge is arguably the single most important factor of socio-economic power, production and development • The management of intellectual capital is one of the most critical success factors of society in its quest for survival and dominance • Knowledge is about people

  3. National Security • “In the past, national security was understood, or more appropriately, misunderstood to be the sole job of the defense forces on the national frontiers and of the police inside the country. Today we know that national security now assumes a wider dimension than ever before to include EVERYTHING that threatens peace and tranquility in the society.” A. Mohammed

  4. National Security Policy Formulation

  5. ICT & National Security • Pooling and inter-connectivity of the resources base of security agencies • Central to this, is the importance of sharing intelligence and other collaborative measures • Intelligence managing process encourages the systematic exploitation of intelligence from diverse sources • National Security must become Information Technology (IT) driven

  6. Leverage ICT’s in the National Security Process • Need for proper coordination • Minimize duplication of effort and mishandling of information • Information sharing • Effective integration of data possible where trusted databases exist • Secure Circulation of Intelligence Products • Keep all abreast of trends and developments • If the maneuver forces cannot respond adequately to the intelligence provided then the efforts of the intelligence providers are in vain • If good intelligence is not available the decision-makers and security force only act blindly

  7. National Security Challenges • Consolidating our democratic gains • Stability in the polity and political process • Economic development and stability • Transnational organized crime • Financial crime and economic sabotage • Vandalization of pipelines and oil bunkering • Drugs and related crimes • Human Trafficking • Upsurge and promotion of divisive and parochial sentiments • Ethnicity, religious intolerance and bigotry • Increasing level of insecurity in the country • Proliferation of illegal weapons • Proliferation of small arms • Activities of militia groups • Civil emergencies • Natural disasters • Epidemics, extreme weather conditions etc • Poverty, inequality, poor governance, global trends e.g. financial crisis

  8. Addressing National Security Challenges • Growing sophistication in security challenges especially the trans-national nature of most and advances in technology have more than ever before underscored the importance of multi-sectoral, holistic and integral approach in intelligence management A. Mohammed

  9. Challenges of ICT in National Security • ICT can abet and/ or be the object of crime and criminals • ICT’s facilitate “traditional” crimes and spawn new types of crimes and criminal activity • The ICT security problem is growing in importance due to several trends • Volume: The rapidly increasing quantity of computerized data stored and transmitted over communication networks • Value: The increasing value of the data, both as a marketable commodity and as representative of value, for example, as in an electronic funds transfer or an automated stock exchange transaction • Privacy Issues: An increasing quantity of personal information is being collected, stored, and transmitted

  10. Challenge of Capacity Growth • 2001 • Connected Lines 866,782 • Mobile (GSM) 266,461 • Jan '09 (8 years) • Active Lines 65,514,537 • Installed Capacity 117,292,815 • Mobile (GSM) 58,286,444 • Feb '10 (13 months later) • Active Lines 75,934,207 • Installed Capacity 148,835,470 • Mobile (GSM) 67,851,706

  11. Challenge of Perception: Internet Crime Complaint Centre

  12. Challenge of Perception: Matters Arising • Do we have the capacities achieve our #3 rating • Bandwidth, available equipment, support infrastructure (PHCN), maintenance and human • the report is specific to the US only == 93% of complainants came from the US • Nigeria 419 Scam is now category of crime not always committed by Nigerian’s • Many people are involved: Who are they? • Cyber crime is replacing cultism in our higher education institutions • Boys: 419 letter scams • Girls: online prostitution • Does perception matter? • Perception is reality! • All must doing something

  13. Challenge of Cyberspace • Cyberspaceis an environment that does not exist in the normal physical sense, but exists as a bio-electronic ecosystem where people, systems along with abstract concepts, including software, interact with each other, which are usually underpinned by an electronic infrastructure • Cyberspace is not borderless; • however, the borders are seamless to the end user • Every country has its own cyberspace which is defined by its national infrastructure • Perpetrators of cyber-crime carry out their activities in an apparently seamless environment, law enforcement is constrained by issues of jurisdiction

  14. Mobile Systems • Advances mobile “smart phones” capabilities are making them ubiquitous and indispensible tools of modern life • Double edged sword • National Security can leverage them • National Security be compromised by them • Implication: • These devices empower people with knowledge – information which is not always true • Secure/ encrypted devices are available for the security conscious • China has tried to comprehensively monitor Internet communications with unverified success

  15. Cloud computing • Many applications and activities are moving off the standing/ standard computer onto server farms accessible through the Internet • Implications: • Cheaper information appliances which do not require the PC size or processing power • Challenge will be providing security and ubiquitous connectivity to access information sitting in the “cloud”

  16. High-speed Communications Links • Increasingly robust connectivity infrastructure and cheaper computers are developing the ability to provide usage opportunities “anytime, anywhere” • Implication: • Can Government monitor infrastructure it does not own? • High associated costs? • Such links needed for growth

  17. Gaming: A trend to watch • Massively multiplayer and other online game experience is gaining popularity among young people • Social Networking • Simulations for Defense Training • Implication: • Games offer an opportunity for increased social interaction and civic engagement among youth • Games can be time wasters for otherwise productive youth • Online-Games have triggered Murder and Divorce in South Korea

  18. Listserv’s: Weapons of Mass Mobilization • NAIJA IT Professionals Forum Discussion List Naija_IT_Professionals@yahoogroups.com • MoveOn.org: Leveraging email as a petition to a hundred or so friends calling on Congress to censure Clinton and "move on." • Initially ignored MoveOn.org used the list of email addresses to arrange for supporters to make personal visits to congressional field offices • The Obama Campaign leveraged the MoveOn.org phenomena

  19. Text Messaging: New political tool? • Demonstrations in Iran organized by leveraging SMS, e-mail and Twitter • Seoul, South Korea: Rapidly circulated Text Messages facilitated spontaneous rally of 400 students gathered to protest the severe pressures they must endure for the nation's highly competitive college-entrance exam • Lebanon: Anti-Syria protest were organized through e-mail and text messaging drawing together 1 million demonstrators to demand the withdrawal of Syrian troops and the resignation of the government • Recent Historical Technology Antecedents: • Television helped bring down the Berlin Wall • Fax machine helped protesters organize during the Tiananmen Square protests • Webcast of the Death of Nena in Iran, 2009

  20. SMS: The poor person's Internet • Text messaging has been fomenting what some experts call a "mobile democracy." • Unmonitored and cheap • Underground channel for succinct uncensored speech • Demonstrators use it to mobilize protests, dodge authorities, and fire off political spam • Helps to engineer collective action at unprecedented speed • Philippines in 2002: Black-clad protesters, summoned together by a single line passed from phone to phone: • "Go 2 EDSA [an acronym for a Manila street]. Wear Blck,“ • Eventually helped topple President Estrada

  21. SMS: Advocacy and Mobilization • South Korean President Roh Moo Hyun may not have been elected without the help of the Internet and SMS • "You might not trust what is coming out of the TV, but you take it seriously when the message comes from a friend." • December, 12,000 Chinese workers went on strike against a supplier of Wal-Mart. • Not part of a union, mobilized through SMS • Kuwait, women mobilized in record numbers to rally for the right to vote • Protests were more effective because text messaging allowed Kuwaiti demonstrators to pull young people out of school and into the streets • Nigeria Miss World pageant in 2002 protests had text messaging elements

  22. Critical Infrastructure • “those physical and cyber-based systems essential to the minimum operations of the economy and government.”Former US President Bill Clinton • Banking and Finance; • Electrical Power Systems; • Emergency and Security Services; • Gas and Oil Production, Storage and transportation; • Information and Communication; • Transportation; • Water Supply System; • Not all parts of a critical infrastructure are critical • Infrastructure interdependencies can be more critical than the specific infrastructure itself

  23. e-Mail Security Challenges

  24. Wikipedia and Intellipedia • An online tool that claims to reveal the identity of organizations that edit Wikipedia pages has revealed that the CIA was involved in editing entries. • Wikipedia Scanner allegedly shows that workers on the agency's computers made edits to the page of Iran's presidenthttp://news.bbc.co.uk/2/hi/6947532.stm • The CIA and other U.S. intelligence agencies have created a computer system that uses software from a popular Internet encyclopedia site to gather content on sensitive topics from analysts across the spy community, part of an effort to fix problems that plagued prewar estimates on Iraq • The system, dubbed Intellipedia because it is built on open-source software from Wikipedia, was launched earlier this year. • It already is being used to assemble intelligence reports on Nigeria and other subjects, according to U.S. intelligence officials who on Tuesday discussed the initiative in detail for the first time, Los Angeles Times reports http://english.pravda.ru/world/americas/01-11-2006/85315-Wikipedia%20encyclopedia%20Wikipedi-0

  25. 21st Century Warfare • One of the realities of modern warfare is that computers are as important as tanks – computer control the tanks. The U.S. military has created a new group, called Cyber Command, to supporting the information and communications systems of the military forces, and in extreme situations, get involved in a battle by attacking enemy networks • President Obama's nominee to head the Pentagon's new Cyber Command said the division would primarily focus on its defensive role… http://www.esecurityplanet.com/news/article.php/3876796/Cyber-Command-Nominee-Says-Focus-Is-Security-Coordination.htm

  26. Cyber Espionage • Economic espionage: Theft of secrets stored in digital files affects competitiveness • Infrastructure attacks: Assault against Critical Infrastructure threaten whole populations • The concept of protecting Nigeria’s “territorial integrity” must now include Nigeria’s cyber space

  27. “GhostNet” • Son of GhostNet: China-based hacking targets India government http://arstechnica.com/security/news/2010/04/son-of-ghostnet-china-based-hacking-targets-india-government.ars

  28. LESSONS FROM 9-11 • Disruptions to financial services were due to: • Loss of life – 70% of the civilians killed worked in financial services; • Damage to telecoms & power – the telecoms of 34,000 business & homes were cut off; • Physical facilities of several key market participants were destroyed; • Access restrictions in the aftermath. • Back-up facilities: Some firms: • Had no back-up facilities; • Back-up facilities were too small; • Back-up facilities were too close & thus inaccessible or affected by the same damaged infrastructure; • Acquired links from different providers, but the providers used the same paths or switches for their traffic. • Need for business continuity plansTestimony of the USA-General Accounting Office at the USA House of Representatives

  29. Government Combating Cyber Crime • Executive (ONSA): • DfC • CERT • Cyber-Forensics • Other initiatives • Legislature: • Draft legislation on Cyber Security and Information Protection Agency • Judiciary: • Review the Evidence Act of the Federal Republic of Nigeria • Make provisions for cyber-crimes • Enable electronic evidence to be admissible in court

  30. Economic and Financial Crimes Commission (EFCC) www.efccnigeria.org • Smart software to identify origin and take down scam emails • Over 800 fraudulent email addresses have been identified and shut down • EFCC is fine tuning security modalities and upon full deployment, the capacity to take down fraudulent e-mails will increase to 5,000 monthly • All Telco’s, ISP & Cyber café’s must register their IP details • October 2008: fifty-eight (58) persons arraigned in connection with advance fee fraud (419-emails) • July 2006 had raided 40 Cyber-café’s, seized 200 Computers as well as impounded 15 Server and Interrogated 5 ISP’s. 5 people had been prosecuted with 2 convictions • Innovative collaboration to reach the youth Maga (Victim) No Need Payhttp://www.youtube.com/watch?v=EGCnl6O6bnE • Member G8 24/7 network

  31. Other Players Combating Cyber Crime • UNODC: Capacity Building and Software • ITU: Cyber Security Work Program to Assist Developing Countries http://www.itu.int/ITU-D/cyb/cybersecurity • OIC: Computer Emergency Response Team http://www.oic-cert.org/index.html • NGO: Internet Safety, Security and Privacy Initiative for Nigeria (ISSPIN) Campaign http://www.pinigeria.org/isspin • Maga (Victim) No Need Pay (original) http://www.youtube.com/watch?v=EGCnl6O6bnE • Maga (Victim) No Need Pay (remix) http://www.facebook.com/pages/Cobhams-Emmanuel-Asuquo/94090705068?ref=nf • Professional Associations: Information Systems Security Association (ISSA) Abuja https://www.issa.org/Chapters/Chapter-Directory.html?Latitude=9.066667&Longitude=7.483333 • Collaboration: Microsoft, National Universities Commission, Association of Vice Chancellors of Nigerian Universities, Osun State University, Paradigm Initiative Nigeria (PIN)

  32. ICT & the National Security Establishment Matter Arising • Sharing of Best Practices must become the norm • Piecemeal reform is difficult and often ineffective • Change management process are required • Significant and consistent investment • Customization of interactions based on user needs require new skill sets and work ethic • Creatively tap into new information sources e.g. online • Foster partnership, cooperation and collaboration by all stakeholders • Minimize silos of information • Embrace change • Public Private partnerships • The Private Sector owns the infrastructure • Cyber Forensics capabilities?

  33. Be Safe Be Smart Today • Cyber-security starts with you protecting yourself • Face book/ Twitter generation – putting your life on a billboard • The first to secure, understand and apply information wins

  34. Way Forward • http://www.oic-cert.org

  35. CERT Services

  36. Establish National Security Sector CERT

  37. Conclusion • Knowledge Mobilisation:Attitude Predicated on Knowledge develops mankind, societies and economies • Trends in ICTs require that National Security establishment embrace, deploy, exploit and defend ICT • Knowledge and information are the bedrock of development • The user base is evolving and the National Security establishment and its operatives must evolve also: • Combining solutions and not simply running after technology – combinations of hi-tech, low-tech and no-tech • National Security operatives are inherently knowledge workers – Must be empowered accordingly • National Security like ICT’s are about people

  38. Thank you, for your attention ajijola@consultancyss.com Or ajijola@gmail.com

More Related