SSS Displays Documents Recovered From APC Office In Lagos, Alleges Plan To Clone INEC Database!

Nigeria’s State Security Service today displayed a series of documents recovered from the Lagos office of the principal opposition party, the All Progressives Congress. The service alleges the party was attempting to undermine the coming presidential election with fradulent documents, multiple registrations, and a plan to clone the INEC database.

The spokesperson of DSS, Marilyn Ogar, disclosed this on Wednesday at a news conference in Abuja on Wednesday. Ogar also said that video with tutorial for hacking was also uncovered when the service raided a building in Lagos.
She displayed the lists and other items recovered from the building to newsmen.
She also alleged that the APC filled forms without passport photographs, books containing names of people with phone numbers and many envelopes containing passport photographs of people were also recovered.

NAN recalls that operatives of the service raided the building at No. 10, Bola Ajibola St., Ikeja, Lagos state, on Nov. 24, 2014, following a tip-off.
“We suspect that there was an elaborate and well articulated plan to inflate the party’s membership data as well as hack into INEC’s voter registration database,” the spokesperson said.

According to her, this was done through the creation of the party’s membership forms and cards to match INEC’s voters register across the country.
Ogar said that the video of 21 hacking tutorials, “a temporary voter card, a permanent voter card” were also recovered.

“The tutorial video focused on the following areas: How to become a hacker and steps to take to avoid detection in the process of hacking web services.
“Steps and procedures of system hacking, passwords cracking, decrypting, escalating access privileges and creating backdoors to servers,” she said.

Ogar also said that the tutorial clearly explained how to evade security of database such as “Intrusion Detection Systems (IDS), firewalls and other measures put in place to deter backers”.
She said the video also outlined ways to identify vulnerabilities in systems and how to cleverly drop a USB flash drive in a target establishment.

She alleged that the drive, when plugged into any commuter, could transmit “malicious codes enough to gain access into and compromise the entire system of the target organisation”.
“The video explains how to hack into the systems of media houses with the aim of broadcasting fake stories or headlines,” she said. Ogar said that suspects arrested in connection with the raid had been charged to court, while investigation had begun.

She promised to update the public with further developments.
Responding to questions, Ogar said the service had written to the security agencies whose personnel were found on the APC register to investigate their involvement and take necessary actions.
Photo source: Sahara Reporters

Comments