Open Source Intelligence and Combating Terrorism in Nigeria and Appraisal
CHAPTER ONE
OBJECTIVES OF THE STUDY
The aims and objectives include:
- Taking a broad look at the Open source intelligence technique and studying it in depth.
- Reviewing the methods, scenarios and the impacts on investigation and intelligence gathering
- Studying through a sample size the accuracy and the effectiveness of this method of intelligence gathering
CHAPTER TWO
LITERATURE REVIEW
CONCEPTUAL DISCOURSE
Open Source Intelligence is a concept that addresses the search, collection, processing, analysis, and use of information from open sources that can be legally accessed by any individual or organization. Open Source Intelligence locates, selects, and extracts that information from open sources such as Twitter and LinkedIn, as well as analyzing this information to produce intelligence by how it can be used (Koops et al., 2013; Howells & Ertugan, 2017). Two important terms are related to Open Source Intelligence by the US Department of the Army & US Department of the Army (2012). They are “Open sources” and “Publicly information available.” Open sources: Any person, group or system that provides information without expectation of privacy. The information contained in these sources is not protected against public disclosure. Publicly information available: Data, facts, instructions or other material published, shared or transmitted for general public consumption; legally observed by a person . Open Source Intelligence application may involve other concepts that address information gathering for other purposes. These concepts are denominated “Intelligence Disciplines.” Each of these intelligence disciplines described in Table 1 can act in conjunction with Open Source Intelligence or even be part of Open Source Intelligence. Table 1 presents the intelligence disciplines and their descriptions (Evangelista et al., 2019). Each of these intelligence disciplines is specific tasks for intelligence services. In each of these tasks, Open Source Intelligence can act together, or even, be an essential element for this task to be completed. For example, for the GEOINT discipline, where geospatial information is searched, Open Source Intelligence can be a fundamental tool to search for this type of information, using resources such as Google Maps. The study of Open Source Intelligence emerged as a trend that involved the business, military, and political intelligence. Conferences on the subject are held, large organizations are using Open Source Intelligence strategically and academics are researching techniques to work in conjunction with Open Source Intelligence (Yates & Zvegintzovi, 1999). The practice of knowledge and knowledge collection has been discussed since 1941 when German and Japanese radio broadcasts were launched with the creation of the Foreign Broadcast Monitoring Service, an organization that later became the Open Source Center. From the creation of the Open Source Center to this , numerous tools and techniques for collecting information from open sources have emerged that self-tune the search and analysis. These tools can provide various capabilities to find some sensitive information on websites, for example, Google Maps, Maltego, the Harvester, and, Carrot2 (Lee & Shon, 2016).
REVIEW OF RELATED STUDIES
Open Source Intelligence (Open Source Intelligence) is the concept used to describe the search and acquisition of information from publicly available sources, as well as the techniques and tools used (Glassman & Kang, 2012). Open Source Intelligence can be employed in a wide variety of open sources, such as social media, government reports, geolocations, code sites, social networks, satellite images, academic publications, vulnerabilities database, as well as a host of other information available through the internet and others open media features (Quick & Choo, 2018; Settanni et al., 2017). So, the extent to which the information can be found and collected is large and open sources where this information meet is diverse (Watters & Layton, 2016).
CHAPTER THREE
METHODOLOGY OF THE STUDY
TYPE OF RESEARCH.
This study makes use of the descriptive survey method. This design was selected for the study to elicit a reasonable response rate from the participants. This will help the researcher in gathering sufficient data to be coded and quantitatively analyzed. Relationships were measured to determine the degree of association between the variables of interest (Howell, 2007; McMillan & Schumacher, 2006; Osuala, 2005).
The nature of the research involve a mixture of both the quantitative and the qualitative research.
Quantitative research is expressed in numbers and graphs. It is used to test or confirm theories and assumptions. This type of research can be used to establish generalizable facts about a topic which in this case is an appraisal of Open Source Intelligence Application on the war against terrorism.
Common quantitative methods include experiments, observations recorded as numbers, and surveys with closed-ended questions.
Qualitative research on the other hand is expressed in words. It is used to understand concepts, thoughts or experiences. This type of research would enable us gather in-depth insights on the topic of the appraisal of Open Source Intelligence on the counter terrorism process.
Common qualitative methods include interviews with open-ended questions, observations described in words, and literature reviews which have been conducted in the previous chapter that explore concepts and theories.
CHAPTER FOUR
DATA PRESENTATION AND ANALYSIS
INFORMATION AND ANALYSIS OF THE SAMPLE.
In this this chapter, results of data were discussed and interpreted. The number of questionnaires that were administered was 120. A total of 74 questionnaires were properly filled and returned. This represented an overall successful response rate of 62%. According to Mugenda and Mugenda (2003), as cited in Murithi, Tiberious, Mwania and Mwinzi (2016), a response rate of more than 50% is adequate for analysis. In essence, return rates of 50% are acceptable to analyze and publish.
CHAPTER FIVE
SUMMARY CONCLUSION AND RECOMMENDATIONS
SUMMARY OF RESEARCH FINDINGS.
Concluding this research,:
From the results obtained from the survey, it showed that majority of stakeholders have an optimistic and favourable view about the future of ICT use in the legal Education sector. It also gathered that in majority of the students’ opinion, they are not satisfied with the extent to which ICT is used in their instruction and lectures.
STRATEGIES TO IMPROVE THE SUBJECT MATTER (PLUS SAFE TEST AND RISK ANALYSIS).
In order to improve the subject matter, there is a need to broaden the scope of study in order to gauge with more accuracy the opinion of the public and the stakeholders involved in the use of the Open Source Intelligence information
CONCLUSION
This study examined the impact of e-commerce risks on internal audit management in private universities in Osun State, Nigeria. Three hypotheses were tested to determine whether Open Source Intelligence gathering:
- Affects counter terrorism efforts in Nigeria.
- Determines success in counter terrorism efforts in Nigeria
- Influences decision making in counter terrorism efforts in Nigeria
The findings show that Open Source Intelligence generally has significant impact on counter terrorism in Nigeria. In addition, Open source Intelligence has been discovered to have a good influence in determining success in combating terrorism in Nigeria However, the findings further suggested that open source intelligence does not significantly affect or influence the decision making process of security experts and or other stakeholders
RECOMMENDATIONS AND (DETAILED) IMPLEMENTATION OUTLINE.
At the end of this study, the following are recommended:
- There is the need for a collaboration between journalists and security experts to improve earlier efforts against terrorism.
- There should be capacity building for security experts in order to be able to use and interprete sections of open source intelligence which would be relevant to their counter terrorism efforts.
- More sophisticated and current skills, knowledge and newer technology should be encouraged in order to fight terrorism with the use of open source intelligence sources.
- The government should provide the much-needed support for the journalistic society in order to have a seamless use of their information especially information gotten from interacting with residents of particular areas affected greatly by terrorism.
SUGGESTIONS FOR FURTHER STUDIES.
For further studies, I would recommend a larger scope of the number of respondents and across states to reflect a more accurate representation of opinions regarding the use of Open Source intelligence to combat terrorism in Nigeria.
REFERENCES
- McLaughlin, Michael (June 2012). “Using open source intelligence software for cybersecurity intelligence”. ComputerWeekly.com. Archived from the original on 2018-06-29. Retrieved 2018-06-29.
- Richelson, Jeffrey (2016). The US Intelligence Community. ISBN 978-0813349183.
- George, edited by Roger Z; Kline, Robert D; Lownethal, Mark M (2005). Intelligence and the national security strategist : enduring issues and challenges. Lanham: Rowman and Littlefield. ISBN 9780742540392.
- Bornn, D Marshall (2013). “Service members, civilians learn to harness power of ‘Open Source’ information”. www.army.mil. Archived from the original on 9 December 2017. Retrieved 14 May 2017.
- Lowenthal, Mark; Clark, Robert (2015). The Five Disciplines of Intelligence Collection. CQ Press. p. 18. ISBN 978-1483381114.
- Denyer, D., & Tranfield, D. (2009). Producing a systematic review. In D. A. Buchanan & A. Bryman (Eds.), The SAGE handbook of organizational research methods (pp.671–689). SAGE Publications Ltd.
- Dwivedi, Y. K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., Duan, Y., Dwivedi, R., Edwards, J., Eirug, A., Galanos, V., Vigneswara Ilavarasan, P., Janssen, M., Jones, P., Kumar Kar, A., Kizgin, H., Kronemann, B., Lal, B., Lucini, B., Williams, M. D. (2019). Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management