27
Project Communication and Documentation 12

DESIGN AND IMPLEMENTAION OF AN ICT-BASED NATIONAL (HOMELAND) SECURITY NETWORK By Emmanuel E. Ekuwem, PhD, IEEE, NPOM GMD/CEO, Teledom Group [email protected]

Embed Size (px)

Citation preview

DESIGN AND IMPLEMENTAION OF DESIGN AND IMPLEMENTAION OF

AN ICT-BASED NATIONAL AN ICT-BASED NATIONAL (HOMELAND) SECURITY NETWORK(HOMELAND) SECURITY NETWORK

ByBy

Emmanuel E. Ekuwem, PhD, IEEE, Emmanuel E. Ekuwem, PhD, IEEE, NPOMNPOM

GMD/CEO, Teledom GroupGMD/CEO, Teledom Group

[email protected]@teledominternational.net

Key Terms-1Key Terms-1

PeoplePeople NigeriaNigeria Lives and PropertyLives and Property Peace and OrderPeace and Order Law, Crime, CriminalsLaw, Crime, Criminals Law Enforcement/Law Enforcement Law Enforcement/Law Enforcement

AgenciesAgencies Privacy, Fundamental Human RightsPrivacy, Fundamental Human Rights

Key terms-2Key terms-2

Security-physical, economic, cyber, Security-physical, economic, cyber, spiritual, etc spiritual, etc

Investments (Local and Foreign)Investments (Local and Foreign) Economic Activities/ProductivityEconomic Activities/Productivity Economic Growth and DevelopmentEconomic Growth and Development Job and Wealth CreationJob and Wealth Creation Increase in GDPIncrease in GDP Vision 20-2020Vision 20-2020 National Well-beingNational Well-being

Infrastructure of Infrastructure of DevelopmentDevelopment

Peace and Security, Law and Order are Peace and Security, Law and Order are the infrastructure of developmentthe infrastructure of development

In one word SECURITY underpins any In one word SECURITY underpins any development----economic, political or development----economic, political or socialsocial

Physical Security----security of lives and Physical Security----security of lives and property in the physical space/worldproperty in the physical space/world

Cyber security-----security of “lives” and Cyber security-----security of “lives” and “property” in the cyberspace which “property” in the cyberspace which empowers lives in the physical world empowers lives in the physical world

Trajectory of Trajectory of lawfulness/criminality-1lawfulness/criminality-1

Who did what, where, when, how, with Who did what, where, when, how, with who, for how long, for who, to whom and who, for how long, for who, to whom and for what?for what?

Who knew what, where and when?Who knew what, where and when? Who said what, where, when, how, for how Who said what, where, when, how, for how

long, for who, to whom and for what?long, for who, to whom and for what? Who witnessed the doing or saying of what Who witnessed the doing or saying of what

to whom, when, where, by who and for to whom, when, where, by who and for what?what?

Who carried/transported what, when, from Who carried/transported what, when, from where, through where, to where?where, through where, to where?

Trajectory of Trajectory of lawfulness/criminality-2lawfulness/criminality-2

Who and who saw/witnessed who Who and who saw/witnessed who carrying/transporting what with carrying/transporting what with who, from where, to where, through who, from where, to where, through where, when, for what, for how where, when, for what, for how long?long?

WHO is WHO uniquely IDENTIFIEDWHO is WHO uniquely IDENTIFIED

Trajectory of Trajectory of lawfulness/criminality-3lawfulness/criminality-3

From cradle to grave our lawful or/and From cradle to grave our lawful or/and criminal routes can tracedcriminal routes can traced

From cradle to grave our lawful or/and From cradle to grave our lawful or/and criminal activities can be ASSEMBLED criminal activities can be ASSEMBLED from scattered or distributed sourcesfrom scattered or distributed sources

Every human activity leaves a TRACEEvery human activity leaves a TRACE Assembling traces aids the Assembling traces aids the

establishment of INTEGRITY of citizensestablishment of INTEGRITY of citizens

911 – Twin Tower: 911 – Twin Tower: Who/What Captured these?Who/What Captured these?

China Earthquake: China Earthquake: Who/What Captured this?Who/What Captured this?

Tsunami: Who/What Tsunami: Who/What Captured these?Captured these?

Who/What Captured Who/What Captured these?these?

Recent Times Square Car Bomber in Recent Times Square Car Bomber in New York- monitored in both Times New York- monitored in both Times Square and JFK airportSquare and JFK airport

Terrorists attack on the City of Terrorists attack on the City of London London

IDENTITY Platform-1IDENTITY Platform-1

WHO is WHO?WHO is WHO? Are we uniquely INDENTIFIEDAre we uniquely INDENTIFIED Identity Authentication and Identity Authentication and

VerificationVerification Identity Non REPUDIATIONIdentity Non REPUDIATION Unique Biometrics---finger print, IrisUnique Biometrics---finger print, Iris Facial recognitionFacial recognition Name (may not be unique)Name (may not be unique)

IDENTITY Platform-2IDENTITY Platform-2

State, local government area, ward, State, local government area, ward, village of origin or of domicile (better)village of origin or of domicile (better)

Geopolitical zone (SS, SE, SW, NW, Geopolitical zone (SS, SE, SW, NW, NC and NE)NC and NE)

Birth date/ageBirth date/age ParentsParents Next of kinNext of kin Schools attendedSchools attended

IDENTITY Platform-3IDENTITY Platform-3

GenderGender Religion/denominationReligion/denomination Ethnic groupEthnic group Indigenous languages spokenIndigenous languages spoken Foreign language spokenForeign language spoken HeightHeight Colour of eyes, hair, etcColour of eyes, hair, etc

IDENTITY Platform-4IDENTITY Platform-4

WeightWeight Voter’s CardVoter’s Card Blood groupBlood group GenotypeGenotype HIV StatusHIV Status AllergiesAllergies

INTEGRITY PlatformINTEGRITY Platform

The Integrand of one’s lawful or The Integrand of one’s lawful or criminal activities from birth to the criminal activities from birth to the point of assessmentpoint of assessment

Do certain types of IDENTITY Do certain types of IDENTITY provide an enabling environment for provide an enabling environment for the development certain types of the development certain types of INTEGRITY?INTEGRITY?

Monitoring Monitoring Lawfulness/Lawlessness -1Lawfulness/Lawlessness -1

Monitoring lawlessness and/or lawfulness on Monitoring lawlessness and/or lawfulness on Roads, Streets, Highways, Security patrol vans Roads, Streets, Highways, Security patrol vans and boats, Waterways and Creeks, residential and boats, Waterways and Creeks, residential estates, seaports, airports, international borders.estates, seaports, airports, international borders.

Video and audio data capture at monitored Video and audio data capture at monitored pointspoints

Cargo scanning of containers, trucks, cars at Cargo scanning of containers, trucks, cars at seaports, airports, highways, waterways, border seaports, airports, highways, waterways, border posts with remote access, posts with remote access, centralized/distributed archiving with date and centralized/distributed archiving with date and time-specific playback. time-specific playback.

Surveillance System—Video Surveillance System—Video & Audio-1& Audio-1

IP Camera with POE supply and CCTV, IP Camera with POE supply and CCTV, both with IR features, for night visionboth with IR features, for night vision

Solar powered or solar-wind hybrid Solar powered or solar-wind hybrid powered or PHCN-solar float-chargedpowered or PHCN-solar float-charged

Bidirectional audio captureBidirectional audio capture Designation of positions of data Designation of positions of data

capture to be done to meet security capture to be done to meet security needs appropriate local law needs appropriate local law enforcement agenciesenforcement agencies

Surveillance System-Video Surveillance System-Video & Audio-2& Audio-2

Primary area of data capture is the Local Primary area of data capture is the Local Government AreaGovernment Area

Micro Security Network Operating Centre Micro Security Network Operating Centre (SNOC) is located in the local government (SNOC) is located in the local government headquarters or DPO’s premises or any headquarters or DPO’s premises or any agreed locationagreed location

Communications transport from points of Communications transport from points of data capture is by Wifi, point-to-point data capture is by Wifi, point-to-point broadband wireless, or fibre optic cable broadband wireless, or fibre optic cable (where available and affordable)(where available and affordable)

Surveillance System-Video Surveillance System-Video & Audio-3& Audio-3

Data from all the Master SNOCs from the Data from all the Master SNOCs from the states and FCT home to the Grand SNOC states and FCT home to the Grand SNOC in Abujain Abuja

Communications transport from the Communications transport from the Master SNOCs to the Grand SNOC is by Master SNOCs to the Grand SNOC is by VSAT, optic fibre, WiMax or dedicated 3G VSAT, optic fibre, WiMax or dedicated 3G networknetwork

There is local monitoring and archiving in There is local monitoring and archiving in each SNOC with date and time-specific each SNOC with date and time-specific playback features in Data Centres.playback features in Data Centres.

Surveillance System-Video Surveillance System-Video & Audio-4& Audio-4

Data from a group of geographically Data from a group of geographically contiguous Micro SNOCs from LGAs are contiguous Micro SNOCs from LGAs are transported to the Area Police Command in a transported to the Area Police Command in a Mini SNOCMini SNOC

Data from a group of Mini SNOCs from Area Data from a group of Mini SNOCs from Area Police Commands are transported to State Police Commands are transported to State Police Command headquarters in the state Police Command headquarters in the state capital in a Master SNOC.capital in a Master SNOC.

Communication transport from the Mini Communication transport from the Mini SNOCs to the Master SNOC is by Broadband SNOCs to the Master SNOC is by Broadband wireless or VSAT or optic fibre wireless or VSAT or optic fibre

Surveillance System-Video Surveillance System-Video & Audio-5& Audio-5

Both in-SNOC and remotely Both in-SNOC and remotely accessed analysis of captured data.accessed analysis of captured data.

Prompt issue of real-time commands Prompt issue of real-time commands to relevant law enforcement officers to relevant law enforcement officers for rapid response as appropriatefor rapid response as appropriate

Playback during criminal Playback during criminal investigationsinvestigations

Patrol Van-based Video Patrol Van-based Video SurveillanceSurveillance

Security patrol van-mounted systemSecurity patrol van-mounted system Remote monitoring and control of Remote monitoring and control of

mounted cameras via various mounted cameras via various communication networkscommunication networks

Used in targeted locationsUsed in targeted locations Real-time broadcast over 2.5G/3G, Real-time broadcast over 2.5G/3G,

WiFi, WLAN or WiMax networksWiFi, WLAN or WiMax networks DVD record of quality footage for later DVD record of quality footage for later

inspectionsinspections Commanded by a SNOCCommanded by a SNOC

Container, Truck and Car Container, Truck and Car Scanning SystemScanning System

Gamma and X-rays based scanning of Gamma and X-rays based scanning of containers at seaports, airports, dry containers at seaports, airports, dry ports, highways, border posts with ports, highways, border posts with both in-situ and remotely accessed both in-situ and remotely accessed analyses and storage of captured dataanalyses and storage of captured data

Scanning of cars on highways and Scanning of cars on highways and relevant roads with both in-situ and relevant roads with both in-situ and remotely accessed analyses and remotely accessed analyses and storage of datastorage of data

Lawful Interception-1Lawful Interception-1

Interception of VOICE, VIDEO and legacy data Interception of VOICE, VIDEO and legacy data from virtually all networks; wireless, wired from virtually all networks; wireless, wired (fixed line), LAN, MAN, Intranet, Internet, (fixed line), LAN, MAN, Intranet, Internet, WiFi, WiMax, in conformity national and WiFi, WiMax, in conformity national and regional lawful interception standards regional lawful interception standards

Enables government, National Security Enables government, National Security Adviser, law enforcement agencies to Adviser, law enforcement agencies to neutralize the threats posed by terrorists, neutralize the threats posed by terrorists, kidnappers, militants, hired assassins, coup kidnappers, militants, hired assassins, coup plotters, armed robbers, 419ers, hackersplotters, armed robbers, 419ers, hackers

Lawful Interception-2Lawful Interception-2

Relevant Law Enforcement agencies Relevant Law Enforcement agencies include: NSA, Police, EFCC, ICPC, CID, include: NSA, Police, EFCC, ICPC, CID, SSS, Army, Air Force, Navy, Customs, SSS, Army, Air Force, Navy, Customs, Immigration, etcImmigration, etc

Lawful processes must be followed Lawful processes must be followed before interception is carried outbefore interception is carried out

Telecom Operators, ISPs and other Telecom Operators, ISPs and other relevant ICT service providers must sign relevant ICT service providers must sign up and cooperate with the law up and cooperate with the law enforcement agenciesenforcement agencies

Lawful Interception-3Lawful Interception-3

National, state and local coordination National, state and local coordination and exchange of real-time data and and exchange of real-time data and information and access to centralized information and access to centralized and distributed databases via secure and distributed databases via secure telecom transport facilities.telecom transport facilities.

Inter-Agency collaboration. Inter-Agency collaboration. Availability of a National Identity Availability of a National Identity

Management Database referral systemManagement Database referral system

Lawful Interception Lawful Interception Services-4Services-4

Voice (fixed line, fixed wireless, mobile, Voice (fixed line, fixed wireless, mobile, IPT)IPT)

VideoVideo Video conferencingVideo conferencing ChatChat WebmailWebmail SMSSMS MMSMMS IMSIMS FaxFax Instant MessagingInstant Messaging

Interception Network Interception Network PlatformsPlatforms

Land lineLand line Wireless (cellular, WiFi, WiMax)Wireless (cellular, WiFi, WiMax) SatelliteSatellite Broadband accessBroadband access International private-leased circuitInternational private-leased circuit NGN (Next Generation Networks)NGN (Next Generation Networks) IMS (IP Multimedia Subsystems)IMS (IP Multimedia Subsystems) Converged wireless/land line PD/CS Converged wireless/land line PD/CS

network) network)

Lawful Interception-5Lawful Interception-5

Push-to-TalkPush-to-Talk Web browsingWeb browsing Social NetworkingSocial Networking etcetc

Lawful Layered Voice Lawful Layered Voice Analyses Analyses

On-line and off-line detection of On-line and off-line detection of mood, emotions, malicious intentions mood, emotions, malicious intentions of suspectsof suspects

Online or off-line truth verificationOnline or off-line truth verification Identification of deceitIdentification of deceit Risk assessmentRisk assessment Connectivity to SNOC (grand, Connectivity to SNOC (grand,

master, mini or micro) master, mini or micro)

SIM Card Registration-1SIM Card Registration-1

Need to match every active SIM Need to match every active SIM card in the telecom industry card in the telecom industry UNIQUELY to an OWNER, a Human UNIQUELY to an OWNER, a Human being with a name, Man or Woman being with a name, Man or Woman or a Company or any organisation or or a Company or any organisation or corporate entity with a name and the corporate entity with a name and the name of the contact person.name of the contact person.

This UNIQUE name cannot be This UNIQUE name cannot be REPUDIATED REPUDIATED

SIM Card Registration-2SIM Card Registration-2 Useful for law enforcementUseful for law enforcement Will drastically reduce the use mobile phones Will drastically reduce the use mobile phones

to send threat text messages (SMS) and make to send threat text messages (SMS) and make threat calls, negotiate ransom by kidnappers, threat calls, negotiate ransom by kidnappers, send advance notice for armed robbery by send advance notice for armed robbery by armed robbers to would-be victims, etcarmed robbers to would-be victims, etc

Again, central Identity Database is required to Again, central Identity Database is required to eliminate submission of fraudulent bio-data by eliminate submission of fraudulent bio-data by criminals during SIM card registration. criminals during SIM card registration. However, while the central National Identity However, while the central National Identity database is being developed, Telecom service database is being developed, Telecom service providers can start with operator-specific providers can start with operator-specific databases databases

Cyber SecurityCyber Security

Cyber security lawCyber security law Critical National Information Critical National Information

Infrastructure lawInfrastructure law CERTCERT NSANSA EFCCEFCC Financial IndustryFinancial Industry ICT IndustryICT Industry

RecommendationsRecommendations

National Identity Management Database National Identity Management Database development. This is a reference Database for development. This is a reference Database for voters register, voters at every election, voters register, voters at every election, national security monitoring, surveillance, national security monitoring, surveillance, identification and arrest of criminals, etcidentification and arrest of criminals, etc

Establishment a National Security Grand Establishment a National Security Grand SNOC with integrated downstream Master SNOC with integrated downstream Master SNOC, Mini SNOC and Micro SNOC to SNOC, Mini SNOC and Micro SNOC to ensure national security surveillance, ensure national security surveillance, monitoring, tracking, isolation and arrest of monitoring, tracking, isolation and arrest of criminals.criminals.

THANK YOUTHANK YOU