Professional Documents
Culture Documents
The Role of Citizens in Intelligence Gathering and Sharing
The Role of Citizens in Intelligence Gathering and Sharing
The Role of Citizens in Intelligence Gathering and Sharing
Don OKEREKE
(Twitter: @DonOkereke)
[1]
Introduction:
Thank you for the privilege and opportunity to partake in this webinar and share my
perspective on The Role of People in Intelligence Gathering. Inter-alia, I will shed light on
the meaning of intelligence and how it can be shared, Differences Between Intelligence and
Information, Intelligence gathering methodologies, Why we have intelligence failures?,
Plausible case studies of intelligence failures in Nigeria, Plethora of Government
Intelligence agencies in Nigeria, Challenges of harvesting and disseminating Intelligence in
Nigeria, How to share intelligence, Why private sector, citizens need to be involved in
intelligence gathering, See Something, Say Something, Ways to Use OSINT for Corporate
Security, What information should citizens report?
Context:
There is no gainsaying the fact that insecurity – terrorism, KRE, banditry is pervasive in
Nigeria and the country seems to be coming apart at the seams. For the sake of emphasis,
according to a report by SBM intelligence titled “The Economic of Nigeria’s Kidnap
Industry”, between July 2021 and June 2022, no fewer than 3,420 people were abducted
across Nigeria, with 564 others killed in violence associated with abductions. The report
stated that in the same period N6.531 billion was demanded in exchange for the release of
captives while N653.7 million was paid as ransom.
The implication of this is that while legitimate businesses are struggling in Nigeria, kidnap
for ransom and extortion is obviously the fastest growing industry in Nigeria. What is more
distressing is that there seem to be no end in sight unless there is a positive disruption.
The unrelenting security challenges we have in Nigeria can be described as largely being
man-made and can be blamed on amongst other things, failure of gathering or
disseminating intelligence.
Meaning of intelligence?
Intelligence means many things to many people.
People often use the words ‘Information’ and ‘Intelligence’ interchangeably. However,
there is a difference between the two.
Differences Between Intelligence and Information
INTELLIGENCE INFORMATION
1. Information or knowledge that has Pieces of raw data
been processed and logic applied.
[2]
2. Proactive – can forecast, correlate, Passive – data accepted and stored
offer supposition and direct an
investigation/inquiry.
3. Not readily available. Ubiquitous; Available everywhere
There are many ways of gathering intelligence that are often referred to as "intelligence
collection disciplines". They include:
II. Signals Intelligence (SIGINT) refers to electronic transmissions that can be collected
by planes, drones, ground sites, or satellites. Communications Intelligence (COMINT)
is a type of SIGINT and refers to the interception of communications.
[3]
III. Imagery Intelligence (IMINT) is sometimes also referred to as photo intelligence
(PHOTINT). Similar to this is Geospatial Intelligence (GEOINT) - analysis and visual
representation of security related activities on the earth.
Threat intelligence
Threat intelligence also known as cyber threat intelligence (CTI), is the process of
identifying, analysing cyber threats and data to better understand threats and
deploying solutions specific to the problem found.
Strategic threat intelligence: This is typically a high-level analysis designed for non-
technical audiences – for example, the board of a company or organisation.
Tactical threat intelligence: This is focused on the immediate future and is designed
for a more technically-proficient audience. It identifies simple indicators or elements
such as bad IP addresses, known malicious domain names, unusual traffic, log-in red
[4]
flags, or an increase in file/download requests. Tactical intelligence is the most
straightforward form of intelligence to generate and is usually automated.
1. Failure to process and analyze information correctly - the invasion of Iraq by the US
was premised on falsified intelligence.
I read how a former governor of Enugu state reportedly got Intel of an impending
attack on a community. He promptly shared it with Abuja (the police hierarchy) but
they dilly dallied in preventing the attack.
Recent attacks in Nigeria such as the following buttresses lax security and intelligence
failure:
Note that between 2015 and 2022, there were twenty attacks on prison facilities in
Nigeria. 2021 had the highest number of incidents in the 7-year period with a total of
7 attacks. Nearly 9,000 inmates were released from the prison breaks and nearly
half of them still on the run. This is a threat to national security.
Kuje prison break – Tukur Mamu, the media aide to Kaduna-based Islamic cleric,
Sheikh Ahmad Gumi, said he shared intelligence with the authorities about the Kuje
prison attack, but the intel agencies failed to act (Channels TV News, July 7, 2022).
[5]
According to Daily Trust Newspaper (Tuesday 26 July, 2022), the DSS forwarded 44
security reports to the security agencies warning of attacks on the Correctional
Facility in Kuje, Abuja and nothing was done.
If the security agencies didn't act on 44 intelligence reports availed to them by their
counterpart, the DSS, there's no assurance that an Intel from a private citizen would
be put to good use.
The Owo Catholic church attack – over 40 people killed. The attackers mounted
surveillance before attacks.
The Kaduna-Abuja train attack – Daily Trust Newspaper (March 311, 2022) reports that
intel agencies provided intelligence, but it was not acted on. Some of the released
victims confessed that they were well fed. Means the terrorists have access to
food/meat, possibly from the local market…
Kaduna Airport Security breach – 2nd time in 2 years of security breaches around the
Kaduna airport despite being in the centre of Nigerian security forces.
Nigerian Defence Academy Attack: On Tuesday, August 24, 2021, just a year ago,
bandits attacked Nigeria's elite military academy, The NDA, killing 2 officers and
kidnapped another in a brazen assault on a symbol of the armed forces.
March 23, 2020, about 50 soldiers reportedly lost their lives after Boko Haram staged
a deadly ambush on a convoy of troops around Alagarno in Yobe State.
[6]
June 30, 2022, bandits invaded a mining site in Shiroro LGA of Niger state and
reportedly killed ''43 people, including 37 Nigerian security personnel''. This is
equivalent to wiping out a PLATOON.
We cannot talk about the ‘’Role of people in Intelligence Gathering And Sharing’’
without citing the ultimate aggregators, beneficiaries, end-users of intelligence, that
is, mainstream government security/intelligence agencies.
Nigeria boasts of a mixed bag of government intelligence agencies. They include but
not limited to the following:
Lack of trust and no love lost between government intelligence agencies and
citizens: There seem to be lack of trust and no love lost between private citizens and
government security and intelligence agencies in Nigeria. This is largely because
Nigerian security and intelligence agencies are often skewed towards ‘regime
protection’ or doing the bidding of those in power than fighting for the common man.
Pervasive incidents of extrajudicial killings which culminated in the ENDSARS civil
unrest buttresses this assertion.
[7]
Lack of Privacy & Confidentiality: If citizens must feel free to share intelligence with
the security agencies, then their privacy and confidentiality must be guaranteed. And
this is where social media is apt in sharing intelligence anonymously.
Lack of synergy, Inter agency rivalry and superiority/inferiority complex: This is the
bane of the security and intelligence agencies in Nigeria. It appears they are working
at cross-purposes.
Politics is superior to security, nay, intelligence in Nigeria: There is a saying that
politics is superior to economics. It may be safe to also submit that politics is superior
to security and intelligence in Nigeria. We understand that politicians seldom dissect
or treat nuggets of intelligence reports made available to them. It can be a tough
decision trying to balance perception or likely panic and trying to be decisive.
Is there anyone here who watched the BBC Africa Eye video: The Bandit Warlords
of Zamfara? The NBC imposed a fine of N5 million on broadcast platforms that aired
the documentary on the grounds that they ‘promoted terror in the country’. The
inference from the documentary is that masterminds of banditry and terrorism in
parts of the country are not invincible after all. In some climes, government
intelligence agencies will synergize with those makers of the documentary to harvest
actionable intelligence from them. It appears the Nigerian establishment doesn’t
appreciate the publicity and feel embarrassed because they probably had all the intel
but have failed to act. Anyway, the government hates competition… As we speak,
notorious bandit leader, Turji Bello is said to have been granted an ‘amnesty’ and
‘embraced peace’ in Zamfara state. Imagine the faith of someone who gave out
intelligence about him.
Lack of anonymity: Scores of Nigerians don't feel free volunteering information, nay,
intelligence to government security, intelligence agencies. You don't even know if
the person you are giving the information is a sympathizer. Recall that a Premium
Times January 8, 2012 report quoted former President Goodluck Jonathan as
admitting that members of the extremist Boko Haram sect succeeded in infiltrating
his government, planting its members in government agencies and security outfits.
Food for thought: Why is that more often than not, when the Nigerian government
or the security denies anything, it turns out there’s some iota of truth in what they
are trying to deny?
[8]
Intelligence sharing is the process of exchanging actionable intelligence, information,
data, or knowledge amongst relevant government agencies or private-sector entities
as appropriate.
The Bible says Can two walk together without agreeing where to go? You can only
share intelligence or information if you have a good relationship and mutual trust
with the second party.
Intelligence can be shared amongst the security cum intelligence agencies - inter
agency collaboration. Ideally, Private citizens should also be able to share intelligence
with the security / intelligence agencies. I said ideally because we know this is not
always the case in Nigeria and the reason is not far-fetched.
Just like Georges Clemenceau quote that “War is too important to be left to the
generals”, I can paraphrase this to say that intelligence is too important to be left in
the hands of government intelligence agencies.
With due respect, the home truth is that Nigerian Security And intelligence agencies
are overwhelmed, stretched hence they tend to be more reactive than proactive.
Similar to this, they tend to devote more effort to regime protection, stifling
supposed opposition than fighting criminals.
While some people may blame mainstream intelligence agencies for the security
breaches in Nigeria, I think we are all complicit. As we say, security is a collective
responsibility.
[9]
social media accounts and they do follow individuals of interest (especially perceived
dissenters and opposition) on social media, the lack of official presence on social
media means they won’t be able to receive nuggets of intelligence from citizens,
anonymously.
This contrast with the practice across the world where the intelligence agencies are
quite active online and can be reached via social media. For instance, according to the
report: ‘’Spy Influencers: Social Media Secrets of the CIA, MI5, Mossad & More’’, the
‘The FBI reportedly runs more than 70 social media sites!
(https://spyscape.com/article/spy-influencers-social-media-secrets-revealed-by-the-
cia-mi5-mossad-more-fr)
Britain’s domestic intelligence agency, the Mi5, which is the equivalent of Nigeria’s
DSS, officially joined Instagram a while ago @Mi5official.
Canada's Communications Security Establishment (CSE), the Canadian spy agency has
LinkedIn, Twitter, Instagram, and YouTube accounts.
Nigerian intelligence agencies should take a cue from UK's Mi5, the American FBI etc.
by embracing social media. Social media cuts red tape and bureaucracy in sharing
intelligence. Imagine if I have an actionable intelligence that I want to share directly
with the National Security Adviser. It would be easier if I have his twitter handle. I can
also do that anonymously.
See Something, Say Something
The public should report suspicious activity such as the discovery of a suspicious
package or suspicious behavior, such as someone breaking into a restricted area,
attempting to gain access into a restricted area, or making suspicious purchases of
precursor chemicals (like fertilizer, )
According to the Money Laundering Act: Financial institutions and designated non-
financial institutions must report transactions in excess of 5 million Naira for
individuals or 10 million Naira for legal persons to the EFCC within seven days of such
transaction taking place. How many financial institutions actually do this? If they do,
they will help in sniffing out kidnappers and bandits. Following the money is a global
anti-terror and crime-fighting tactic.
[10]
Ways to Use OSINT for Corporate Security
Thanks to the rapid growth of public data, OSINT has now established itself as an
indispensable tool for business risk management and can be deployed in:
3. Identifying investment opportunities - OSINT is becoming the new litmus test for
investors because it is used for due diligence investigation due to benefits of speed
and size. Private equity firms use our OSINT-powered due diligence to know who
they’re dealing with, helping lower the risks. For instance, a single tweet or a just
published image can be an early signal of a major market event that would completely
change the winning strategy regarding particular stocks.
4. OSINT/SOCINT and civil unrest monitoring: Examples are the Capital Hill unrest in the
United States, the ENDSARS civil unrest in Nigeria had massive social media footprint
in real-time. Similarly, the “Arab Spring” and insurrections in Egypt demonstrates the
importance of OSINT/SOCMINT at a strategic level to intelligence tradecraft, as well
as the inefficacy of traditional intelligence sources and methodologies.
5. Loss And Fraud Prevention - Retail organizations around the world are fully
embracing open source intelligence (OSINT) to filter through billions of online posts
to discover valuable intelligence for their security operations, protect assets, detect
internal and external fraud and data breaches. Criminal groups often exploit social
media to coordinate robberies or share tips and tactics with their fellow thieves.
6. Supply Chain Protection - The process that delivers a product to store shelves is a
tightly interconnected network. If one link in that chain fails — from sourcing and
manufacturing to transportation — the whole system breaks down. A supply chain
[11]
disruption can result in millions of dollars of lost sales for retailers, result in financial
losses and impair the reputation of the entire company.
7. Event Security - Savvy event managers employ open source intelligence to protect
attendees. OSINT can be used to Anticipate Risks and spot potential problems ahead
of time. Continuous Intelligence: Security teams often conduct a threat assessment
ahead of an event. Locate an Incident: Geo-tagged social media posts allow teams to
quickly determine where an incident has taken place.
8. Monitoring Data Leaks and Social Engineering: - The average cost of a data breach
for organizations now tops almost $3.9 million, according to a 2021 survey by IBM and
increased to $8.2 million on average per incident for companies based in the US.
9. Crisis Response - Corporate security teams basically contend with three types of
hazards: Natural hazards (floods, earthquakes, and blizzards); Technological hazards
(power loss, industrial accidents, and infrastructure failures), man-made hazards
(October 2020 ENDSARS, January 6, 2021 Capitol attack in the US, cyber-attacks,
terrorist threats, or workplace violence.
[12]
Nationwide: The Nigeria Police Force recently secured '933' Short Code For Free
Emergency calls and information sharing with the citizens.
Concluding remark:
Let's hope Nigeria’s newly created and much touted National Counter Terrorism
Strategy Document (NACTEST), National Crisis Management Doctrine (NCMD), and
the National Counter Terrorism Centre (NCTC) domiciled in the of the Office of the
National Security Adviser (ONSA) enhances inter-agency collaboration between the
intelligence agencies and the Nigerian Army, the Nigeria Police Force, the Nigerian
Army, and the Nigerian Airforce, amongst others, at strategic, operational, and
tactical levels.
©Don OKEREKE, a security analyst, thought leader, and consultant can be reached
via: Twitter: @DonOKereke
www.donokereke.blogspot.com
[13]
References:
4. OSINT Tools
https://www.osinttechniques.com/osint-tools.html
7. Understanding OSINT
https://www.triangular-intelligence.com/the-power-of-osint
[14]
https://www.skopenow.com/news/6-open-source-intelligence-osint-applications-
for-your-business
16. Private guard companies recruit over 4.2million people in 6 years - NBS Monday,
https://www.legit.ng/1219749-private-guard-companies-recruit-42million-people-
6-years-nbs.html
19. Between 2015 and 2022, there were twenty attacks on prison facilities in Nigeria.
https://www.dataphyte.com/latest-reports/development/as-nigeria-experiences-
its-20th-jailbreak-in-7-years-here-are-four-issues-of-concern/
21. Private guard companies recruit over 4.2million people in 6 years - NBS Monday,
[15]
https://www.legit.ng/1219749-private-guard-companies-recruit-42million-people-
6-years-nbs.html
22. OSINT Goes Mainstream: How Security Teams Can Use Open-Source Intelligence
To Help Companies Understand Risk
23.https://www.forbes.com/sites/forbestechcouncil/2022/06/07/osint-goes-
mainstream-how-security-teams-can-use-open-source-intelligence-to-help-
companies-understand-risk/?sh=2a4b34811c82
25.MI5 warns of spies using LinkedIn to trick staff into spilling secrets
https://www.bbc.co.uk/news/technology-56812746
28.The Advantages and Challenges of Utilizing SOCMINT for National Security Affairs
https://cobwebs.com/the-advantages-and-challenges-of-utilizing-socmint-for-
national-security-affairs/
31. Social media intelligence, the wayward child of open source intelligence
https://responsibledata.io/2016/12/12/social-media-intelligence-the-wayward-child-
of-open-source-intelligence/
[16]
33.Boko Haram has infiltrated my government, says Jonathan
https://www.premiumtimesng.com/news/3360-boko-haram-has-infiltrated-my-
government-says-jonathan.html
34.Budget: Despite extra N12 trillion in 7 years, security remains elusive, as education,
health suffer
https://dailypost.ng/2021/10/15/budget-despite-extra-n12-trillion-in-7-years-
security-remains-elusive-as-education-health-suffer/
37.With NCMD, Police Have Five Minutes To Respond To Kidnap Attacks – Presidency
https://www.channelstv.com/2022/08/15/with-ncmd-police-have-five-minutes-to-
respond-to-kidnap-attacks-presidency/
39. https://www.kaspersky.com/resource-center/definitions/threat-intelligence
[17]