Upload
shona-randall
View
220
Download
0
Tags:
Embed Size (px)
Citation preview
DESIGN AND IMPLEMENTAION OF DESIGN AND IMPLEMENTAION OF
AN ICT-BASED NATIONAL AN ICT-BASED NATIONAL (HOMELAND) SECURITY NETWORK(HOMELAND) SECURITY NETWORK
ByBy
Emmanuel E. Ekuwem, PhD, IEEE, Emmanuel E. Ekuwem, PhD, IEEE, NPOMNPOM
GMD/CEO, Teledom GroupGMD/CEO, Teledom Group
[email protected]@teledominternational.net
Key Terms-1Key Terms-1
PeoplePeople NigeriaNigeria Lives and PropertyLives and Property Peace and OrderPeace and Order Law, Crime, CriminalsLaw, Crime, Criminals Law Enforcement/Law Enforcement Law Enforcement/Law Enforcement
AgenciesAgencies Privacy, Fundamental Human RightsPrivacy, Fundamental Human Rights
Key terms-2Key terms-2
Security-physical, economic, cyber, Security-physical, economic, cyber, spiritual, etc spiritual, etc
Investments (Local and Foreign)Investments (Local and Foreign) Economic Activities/ProductivityEconomic Activities/Productivity Economic Growth and DevelopmentEconomic Growth and Development Job and Wealth CreationJob and Wealth Creation Increase in GDPIncrease in GDP Vision 20-2020Vision 20-2020 National Well-beingNational Well-being
Infrastructure of Infrastructure of DevelopmentDevelopment
Peace and Security, Law and Order are Peace and Security, Law and Order are the infrastructure of developmentthe infrastructure of development
In one word SECURITY underpins any In one word SECURITY underpins any development----economic, political or development----economic, political or socialsocial
Physical Security----security of lives and Physical Security----security of lives and property in the physical space/worldproperty in the physical space/world
Cyber security-----security of “lives” and Cyber security-----security of “lives” and “property” in the cyberspace which “property” in the cyberspace which empowers lives in the physical world empowers lives in the physical world
Trajectory of Trajectory of lawfulness/criminality-1lawfulness/criminality-1
Who did what, where, when, how, with Who did what, where, when, how, with who, for how long, for who, to whom and who, for how long, for who, to whom and for what?for what?
Who knew what, where and when?Who knew what, where and when? Who said what, where, when, how, for how Who said what, where, when, how, for how
long, for who, to whom and for what?long, for who, to whom and for what? Who witnessed the doing or saying of what Who witnessed the doing or saying of what
to whom, when, where, by who and for to whom, when, where, by who and for what?what?
Who carried/transported what, when, from Who carried/transported what, when, from where, through where, to where?where, through where, to where?
Trajectory of Trajectory of lawfulness/criminality-2lawfulness/criminality-2
Who and who saw/witnessed who Who and who saw/witnessed who carrying/transporting what with carrying/transporting what with who, from where, to where, through who, from where, to where, through where, when, for what, for how where, when, for what, for how long?long?
WHO is WHO uniquely IDENTIFIEDWHO is WHO uniquely IDENTIFIED
Trajectory of Trajectory of lawfulness/criminality-3lawfulness/criminality-3
From cradle to grave our lawful or/and From cradle to grave our lawful or/and criminal routes can tracedcriminal routes can traced
From cradle to grave our lawful or/and From cradle to grave our lawful or/and criminal activities can be ASSEMBLED criminal activities can be ASSEMBLED from scattered or distributed sourcesfrom scattered or distributed sources
Every human activity leaves a TRACEEvery human activity leaves a TRACE Assembling traces aids the Assembling traces aids the
establishment of INTEGRITY of citizensestablishment of INTEGRITY of citizens
Who/What Captured Who/What Captured these?these?
Recent Times Square Car Bomber in Recent Times Square Car Bomber in New York- monitored in both Times New York- monitored in both Times Square and JFK airportSquare and JFK airport
Terrorists attack on the City of Terrorists attack on the City of London London
IDENTITY Platform-1IDENTITY Platform-1
WHO is WHO?WHO is WHO? Are we uniquely INDENTIFIEDAre we uniquely INDENTIFIED Identity Authentication and Identity Authentication and
VerificationVerification Identity Non REPUDIATIONIdentity Non REPUDIATION Unique Biometrics---finger print, IrisUnique Biometrics---finger print, Iris Facial recognitionFacial recognition Name (may not be unique)Name (may not be unique)
IDENTITY Platform-2IDENTITY Platform-2
State, local government area, ward, State, local government area, ward, village of origin or of domicile (better)village of origin or of domicile (better)
Geopolitical zone (SS, SE, SW, NW, Geopolitical zone (SS, SE, SW, NW, NC and NE)NC and NE)
Birth date/ageBirth date/age ParentsParents Next of kinNext of kin Schools attendedSchools attended
IDENTITY Platform-3IDENTITY Platform-3
GenderGender Religion/denominationReligion/denomination Ethnic groupEthnic group Indigenous languages spokenIndigenous languages spoken Foreign language spokenForeign language spoken HeightHeight Colour of eyes, hair, etcColour of eyes, hair, etc
IDENTITY Platform-4IDENTITY Platform-4
WeightWeight Voter’s CardVoter’s Card Blood groupBlood group GenotypeGenotype HIV StatusHIV Status AllergiesAllergies
INTEGRITY PlatformINTEGRITY Platform
The Integrand of one’s lawful or The Integrand of one’s lawful or criminal activities from birth to the criminal activities from birth to the point of assessmentpoint of assessment
Do certain types of IDENTITY Do certain types of IDENTITY provide an enabling environment for provide an enabling environment for the development certain types of the development certain types of INTEGRITY?INTEGRITY?
Monitoring Monitoring Lawfulness/Lawlessness -1Lawfulness/Lawlessness -1
Monitoring lawlessness and/or lawfulness on Monitoring lawlessness and/or lawfulness on Roads, Streets, Highways, Security patrol vans Roads, Streets, Highways, Security patrol vans and boats, Waterways and Creeks, residential and boats, Waterways and Creeks, residential estates, seaports, airports, international borders.estates, seaports, airports, international borders.
Video and audio data capture at monitored Video and audio data capture at monitored pointspoints
Cargo scanning of containers, trucks, cars at Cargo scanning of containers, trucks, cars at seaports, airports, highways, waterways, border seaports, airports, highways, waterways, border posts with remote access, posts with remote access, centralized/distributed archiving with date and centralized/distributed archiving with date and time-specific playback. time-specific playback.
Surveillance System—Video Surveillance System—Video & Audio-1& Audio-1
IP Camera with POE supply and CCTV, IP Camera with POE supply and CCTV, both with IR features, for night visionboth with IR features, for night vision
Solar powered or solar-wind hybrid Solar powered or solar-wind hybrid powered or PHCN-solar float-chargedpowered or PHCN-solar float-charged
Bidirectional audio captureBidirectional audio capture Designation of positions of data Designation of positions of data
capture to be done to meet security capture to be done to meet security needs appropriate local law needs appropriate local law enforcement agenciesenforcement agencies
Surveillance System-Video Surveillance System-Video & Audio-2& Audio-2
Primary area of data capture is the Local Primary area of data capture is the Local Government AreaGovernment Area
Micro Security Network Operating Centre Micro Security Network Operating Centre (SNOC) is located in the local government (SNOC) is located in the local government headquarters or DPO’s premises or any headquarters or DPO’s premises or any agreed locationagreed location
Communications transport from points of Communications transport from points of data capture is by Wifi, point-to-point data capture is by Wifi, point-to-point broadband wireless, or fibre optic cable broadband wireless, or fibre optic cable (where available and affordable)(where available and affordable)
Surveillance System-Video Surveillance System-Video & Audio-3& Audio-3
Data from all the Master SNOCs from the Data from all the Master SNOCs from the states and FCT home to the Grand SNOC states and FCT home to the Grand SNOC in Abujain Abuja
Communications transport from the Communications transport from the Master SNOCs to the Grand SNOC is by Master SNOCs to the Grand SNOC is by VSAT, optic fibre, WiMax or dedicated 3G VSAT, optic fibre, WiMax or dedicated 3G networknetwork
There is local monitoring and archiving in There is local monitoring and archiving in each SNOC with date and time-specific each SNOC with date and time-specific playback features in Data Centres.playback features in Data Centres.
Surveillance System-Video Surveillance System-Video & Audio-4& Audio-4
Data from a group of geographically Data from a group of geographically contiguous Micro SNOCs from LGAs are contiguous Micro SNOCs from LGAs are transported to the Area Police Command in a transported to the Area Police Command in a Mini SNOCMini SNOC
Data from a group of Mini SNOCs from Area Data from a group of Mini SNOCs from Area Police Commands are transported to State Police Commands are transported to State Police Command headquarters in the state Police Command headquarters in the state capital in a Master SNOC.capital in a Master SNOC.
Communication transport from the Mini Communication transport from the Mini SNOCs to the Master SNOC is by Broadband SNOCs to the Master SNOC is by Broadband wireless or VSAT or optic fibre wireless or VSAT or optic fibre
Surveillance System-Video Surveillance System-Video & Audio-5& Audio-5
Both in-SNOC and remotely Both in-SNOC and remotely accessed analysis of captured data.accessed analysis of captured data.
Prompt issue of real-time commands Prompt issue of real-time commands to relevant law enforcement officers to relevant law enforcement officers for rapid response as appropriatefor rapid response as appropriate
Playback during criminal Playback during criminal investigationsinvestigations
Patrol Van-based Video Patrol Van-based Video SurveillanceSurveillance
Security patrol van-mounted systemSecurity patrol van-mounted system Remote monitoring and control of Remote monitoring and control of
mounted cameras via various mounted cameras via various communication networkscommunication networks
Used in targeted locationsUsed in targeted locations Real-time broadcast over 2.5G/3G, Real-time broadcast over 2.5G/3G,
WiFi, WLAN or WiMax networksWiFi, WLAN or WiMax networks DVD record of quality footage for later DVD record of quality footage for later
inspectionsinspections Commanded by a SNOCCommanded by a SNOC
Container, Truck and Car Container, Truck and Car Scanning SystemScanning System
Gamma and X-rays based scanning of Gamma and X-rays based scanning of containers at seaports, airports, dry containers at seaports, airports, dry ports, highways, border posts with ports, highways, border posts with both in-situ and remotely accessed both in-situ and remotely accessed analyses and storage of captured dataanalyses and storage of captured data
Scanning of cars on highways and Scanning of cars on highways and relevant roads with both in-situ and relevant roads with both in-situ and remotely accessed analyses and remotely accessed analyses and storage of datastorage of data
Lawful Interception-1Lawful Interception-1
Interception of VOICE, VIDEO and legacy data Interception of VOICE, VIDEO and legacy data from virtually all networks; wireless, wired from virtually all networks; wireless, wired (fixed line), LAN, MAN, Intranet, Internet, (fixed line), LAN, MAN, Intranet, Internet, WiFi, WiMax, in conformity national and WiFi, WiMax, in conformity national and regional lawful interception standards regional lawful interception standards
Enables government, National Security Enables government, National Security Adviser, law enforcement agencies to Adviser, law enforcement agencies to neutralize the threats posed by terrorists, neutralize the threats posed by terrorists, kidnappers, militants, hired assassins, coup kidnappers, militants, hired assassins, coup plotters, armed robbers, 419ers, hackersplotters, armed robbers, 419ers, hackers
Lawful Interception-2Lawful Interception-2
Relevant Law Enforcement agencies Relevant Law Enforcement agencies include: NSA, Police, EFCC, ICPC, CID, include: NSA, Police, EFCC, ICPC, CID, SSS, Army, Air Force, Navy, Customs, SSS, Army, Air Force, Navy, Customs, Immigration, etcImmigration, etc
Lawful processes must be followed Lawful processes must be followed before interception is carried outbefore interception is carried out
Telecom Operators, ISPs and other Telecom Operators, ISPs and other relevant ICT service providers must sign relevant ICT service providers must sign up and cooperate with the law up and cooperate with the law enforcement agenciesenforcement agencies
Lawful Interception-3Lawful Interception-3
National, state and local coordination National, state and local coordination and exchange of real-time data and and exchange of real-time data and information and access to centralized information and access to centralized and distributed databases via secure and distributed databases via secure telecom transport facilities.telecom transport facilities.
Inter-Agency collaboration. Inter-Agency collaboration. Availability of a National Identity Availability of a National Identity
Management Database referral systemManagement Database referral system
Lawful Interception Lawful Interception Services-4Services-4
Voice (fixed line, fixed wireless, mobile, Voice (fixed line, fixed wireless, mobile, IPT)IPT)
VideoVideo Video conferencingVideo conferencing ChatChat WebmailWebmail SMSSMS MMSMMS IMSIMS FaxFax Instant MessagingInstant Messaging
Interception Network Interception Network PlatformsPlatforms
Land lineLand line Wireless (cellular, WiFi, WiMax)Wireless (cellular, WiFi, WiMax) SatelliteSatellite Broadband accessBroadband access International private-leased circuitInternational private-leased circuit NGN (Next Generation Networks)NGN (Next Generation Networks) IMS (IP Multimedia Subsystems)IMS (IP Multimedia Subsystems) Converged wireless/land line PD/CS Converged wireless/land line PD/CS
network) network)
Lawful Interception-5Lawful Interception-5
Push-to-TalkPush-to-Talk Web browsingWeb browsing Social NetworkingSocial Networking etcetc
Lawful Layered Voice Lawful Layered Voice Analyses Analyses
On-line and off-line detection of On-line and off-line detection of mood, emotions, malicious intentions mood, emotions, malicious intentions of suspectsof suspects
Online or off-line truth verificationOnline or off-line truth verification Identification of deceitIdentification of deceit Risk assessmentRisk assessment Connectivity to SNOC (grand, Connectivity to SNOC (grand,
master, mini or micro) master, mini or micro)
SIM Card Registration-1SIM Card Registration-1
Need to match every active SIM Need to match every active SIM card in the telecom industry card in the telecom industry UNIQUELY to an OWNER, a Human UNIQUELY to an OWNER, a Human being with a name, Man or Woman being with a name, Man or Woman or a Company or any organisation or or a Company or any organisation or corporate entity with a name and the corporate entity with a name and the name of the contact person.name of the contact person.
This UNIQUE name cannot be This UNIQUE name cannot be REPUDIATED REPUDIATED
SIM Card Registration-2SIM Card Registration-2 Useful for law enforcementUseful for law enforcement Will drastically reduce the use mobile phones Will drastically reduce the use mobile phones
to send threat text messages (SMS) and make to send threat text messages (SMS) and make threat calls, negotiate ransom by kidnappers, threat calls, negotiate ransom by kidnappers, send advance notice for armed robbery by send advance notice for armed robbery by armed robbers to would-be victims, etcarmed robbers to would-be victims, etc
Again, central Identity Database is required to Again, central Identity Database is required to eliminate submission of fraudulent bio-data by eliminate submission of fraudulent bio-data by criminals during SIM card registration. criminals during SIM card registration. However, while the central National Identity However, while the central National Identity database is being developed, Telecom service database is being developed, Telecom service providers can start with operator-specific providers can start with operator-specific databases databases
Cyber SecurityCyber Security
Cyber security lawCyber security law Critical National Information Critical National Information
Infrastructure lawInfrastructure law CERTCERT NSANSA EFCCEFCC Financial IndustryFinancial Industry ICT IndustryICT Industry
RecommendationsRecommendations
National Identity Management Database National Identity Management Database development. This is a reference Database for development. This is a reference Database for voters register, voters at every election, voters register, voters at every election, national security monitoring, surveillance, national security monitoring, surveillance, identification and arrest of criminals, etcidentification and arrest of criminals, etc
Establishment a National Security Grand Establishment a National Security Grand SNOC with integrated downstream Master SNOC with integrated downstream Master SNOC, Mini SNOC and Micro SNOC to SNOC, Mini SNOC and Micro SNOC to ensure national security surveillance, ensure national security surveillance, monitoring, tracking, isolation and arrest of monitoring, tracking, isolation and arrest of criminals.criminals.