Resolving & Managing Regional and Global Conflicts: The Role of Information Technology

Similar documents
ECOWAS COUNTER-TERRORISM STRATEGY AND IMPLEMENTATION PLAN Draft Dr Deo Barakamfitiye

Home Security: Russia s Challenges

Honourable members of the National Parliaments of the EU member states and candidate countries,

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

The Comprehensive National Cybersecurity Initiative

National Security Agency

The main object of my research is :

Countering Violent Extremism (CVE) Working Group Community-Oriented Policing Workshop 22 March 2013 United States Institute of Peace Washington

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises

Description of Homeland Security

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Obstacles for Security Cooperation in North America. Roberto Domínguez Jean Monnet/GGP Fellow

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

FBI AND CYBER SECURITY

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Cyber Security Strategy for Germany

Expert Seminar. Engagement with Non-State Armed Groups in Peace Processes

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

INTELLIGENCE AND ANALYSIS

Active Engagement, Modern Defence

Delegations will find in Annex Europol proposals on improving information and intelligence exchange in the area of counter terrorism across the EU.

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Authenticating and policing the internet for consumer confidence and security

MASTER OF PROFESSIONAL STUDIES

Analysis. Document. Abstract: Keywords: Receive our NEWSLETTER. Document Analysis 34/ /2013 3rd June 2013

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Managed Security in the Enterprise (U.S. Enterprise)

A Commander s Perspective on Building the Capacity of Foreign Countries Military Forces

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Examples of International terrorist attacks since 9/11

Criminal Justice Sector and Rule of Law Working Group

Option 1: Use the Might of the U.S. Military to End the Assad Regime

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

HOMELAND SECURITY INTERNET SOURCES

U.S. Cyber Security Readiness

Confrontation or Collaboration?

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

How Effective are International Approaches for Global Cyber Security?

Assessment of the Terror Threat to Denmark

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

DHS, National Cyber Security Division Overview

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

m a s t e r o f s c i e n c e i n

Espionage and Intelligence. Debra A. Miller, Book Editor

peace, Security and Development in BRICS

EU COOPERATION. The Madrid bombings have provided additional impetus for action. In an 18-page declaration on counter terrorism on

The National Security Strategy of the United Kingdom. Security in an interdependent world

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

White Paper: What You Need To Know About Hadoop

How To Write A National Cybersecurity Act

2 Gabi Siboni, 1 Senior Research Fellow and Director,

National Cyber Security Policy -2013

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY

Security Council. United Nations S/2008/434

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Detention and Reintegration Working Group and Sahel Region Capacity-Building Working Group

Training Courses Catalog 2015

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

Does NATO s Article V Genuinely Protect Its Members?

Setting the Standard in Risk Management Consulting and Investigation Services

Department of Political Science

Good morning. It is my pleasure to be here today as we begin. this workshop on improving regional responses to transnational

Cyber Diplomacy A New Component of Foreign Policy 6

The UK cyber security strategy: Landscape review. Cross-government

Federal Bureau of Investigation

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Counter-Terrorism Strategy

Actions and Recommendations (A/R) Summary

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing

NATIONAL STRATEGY FOR INFORMATION SHARING. Successes and Challenges In Improving Terrorism-Related Information Sharing

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

How To Get A Masters Degree In Intelligence Analysis

Social Impact of Information Technology

Security Analytics for Smart Grid

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee , Geneva

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

Jyväskylä Cyber Security Ecosystem

London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments

CRS Report for Congress

Counterintelligence Awareness Glossary

Cyber Security 2012 Carnegie Mellon University

Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING

Appropr iated Accounts Department-wide Systems and Capital Investment Program

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

The Landscape of Cyber, critical infrastructure and how Regulation fits in

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

The Geography of International terrorism

Developing a robust cyber security governance framework 16 April 2015

Intelligence Analysis for Homeland Security RPAD 557

Cyber Security and Science

How To Protect The Internet From Natural Disasters

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

THE OECD/DAC HANDBOOK ON SSR: SUPPORTING SECURITY AND JUSTICE

Introduction to Homeland Security Administration of Justice (AJ10) Fall Transportation Security Administration, 5757 Century Blvd.

Transcription:

DELIVERED AT THE 11TH INTERNATIONAL CONFERENCE OF THE NIGERIA COMPUTER SOCIETY (NCS) HELD AT THE ROYAL PARK HOTEL, ILOKO-IJESA, THE STATE OF OSUN, NIGERIA (24-26 JULY, 2013) Resolving & Managing Regional and Global Conflicts: The Role of Information Technology Dr. Adedayo Adetoye 24 July 2013

The Nature of Future Conflicts Increasingly non-conventional and assymetric State vs. Non-state, Proxies, Ideology (Al-Qaeda, Anonymous, Boko Haram, Hezbollah...) Conventional military intervention vs. insurgency (Iraq, Afghanistan,...) State vs. citizens rebellion (Tunisia, Egypt,...) Cyber conflict (Stuxnet, Chinese APT1,...) their mindset. Deterrence is likely to remain effective against state a may also have a degree of utility against some non-state actors alth will remain impossible to deter all extremists in all circumstances. T considerable risk that simply because deterrence does not stop all o threats terrorists in particular it may be viewed as having limited effectiveness. Deterrence is primarily about stopping high-end threa their absence, it must be assumed to be effective. If it is removed th adaptive adversary will simply raise his game to a higher level. Deterrence is Primarily about Stopping High-End Threat

Threat Drivers Global population pressures and changing demographics Limited energy and other resources Failed and failing states Ideology and identity Perceived inequality Poverty and illiteracy Easier global access to (mis)information Connectivity and interdependency T his chapter sets out the Report s framework for how countries escape the vicious cycle of fragility and move toward a virtuous cycle of confidence-building and institutional transformation, especially in the areas of citizen security, justice, and jobs. The framework is presented as an expanding spiral because these processes repeat over time as countries enter and exit multiple transition moments. Even as one set of immediate priorities is resolved, other risks emerge and require a repeated cycle of action to bolster institutional resilience. This process takes at least a generation. Societies undertaking this endeavor face a legacy of pervasive and enduring mistrust, which makes collective action to address challenges or provide public goods so difficult. Outsiders cannot restore confidence and transform institutions for countries because these processes are domestic and must be nationally led. But to help countries restore peace and reduce regional and global instability, international actors can provide external support and incentives and help reduce external stresses.

Role of Technology Technology cannot resolve conflicts. Solution will often be political Technology can be used to predict, exacerbate, enable, or dampen conflicts Intelligence, law enforcement, and counter-terrorism Examples...

Big Data Analytics Detect previously unknown, valid patterns in large data sets: money transfers, communications, travel, immigration and mobile communication records, social media... Identify terrorist activities Predict and detect fraud and crime Track terrorists Predictive policing Identify threats to national security

The Big Boys Already Use It In 2011 CIA allegedly sifted through 5 Million tweets a day CIA also admitted to full monitoring of Facebook, Twitter and other social networks NSA building a heavily-fortified $2 Billion centre in Utah to intercept, decipher, analyse and store vast amount of world communications over satellite, undersea cables Many more examples in Europe...

National Preparedness We urgently need to start developing our national cyber security capability. Otherwise we will be at a grave disadvantage against other nation states Develop a legal framework for checks and balances Take advantage of local expertise and in diaspora to formulate our strategy Government needs to engage Academia and groups such as NCS to make this happen Academics and professional bodies need to start training a crop of students to fill positions for this crucial national need

Warning! National security cannot be outsourced!!! We have a culture of awarding national projects to foreign companies NOT for National security Only vetted indigenes can be allowed to operate this (as is done everywhere in the world)

DELIVERED AT THE 11TH INTERNATIONAL CONFERENCE OF THE NIGERIA COMPUTER SOCIETY (NCS) HELD AT THE ROYAL PARK HOTEL, ILOKO-IJESA, THE STATE OF OSUN, NIGERIA (24-26 JULY, 2013) Thank You!