African Nations Join UN Cyber Crime Initiative

African diplomats will meet their global counterparts in New York on January 17th to thrash out the details of a proposed new United Nations (UN) treaty to tackle cyber crime. It will be an opportunity for the African delegates to highlight growing digital threats and determine how to define, investigate and prosecute what is in effect a borderless crime.

Existing treaties such as the Budapest Convention or the African Union (AU) Convention on Cybercrime and Personal Data Protection (the Malabo Convention) are considered by some states to be useful if somewhat limited regional instruments. 

Russia has been among the countries arguing for a UN-wide convention, with cyberspace increasingly becoming a theatre of geopolitical competition.

The New York meeting is an example of the growing influence of cyber diplomacy. It is among a raft of multilateral forums, many of them led by the UN and driven by competing resolutions, where cyber governance, resilience, capacity and response are discussed. 

The core of such engagements is how states balance freedom of information, privacy and security in the rapidly evolving digital world.

An upcoming Institute for Security Studies (ISS) report explains why Africa cannot afford to take a back seat in such diplomatic discussions. The continent currently lags behind many other parts of the world when it comes to digital ‘capacity’, the people, processes and technology that define the digital age. Discussions on cybercrime, cyber security and how future digital technology is developed, diffused and deployed cannot be the sole preserve of richer nations with more advanced digital capabilities. 

Those same technologies are increasingly being used in Africa to shape the way business, government and security are conducted.

Africa’s more digitally advanced states, including Kenya, South Africa, Mauritius, Nigeria, Ghana, Morocco, Egypt and Rwanda, must articulate the continent’s digital priorities coherently and convert this into organisational strength. This would almost certainly bolster Africa’s influence in cyber diplomacy negotiations. One regional cyber security expert interviewed for the ISS report observed that in many multilateral forums, ‘cyber superpowers view Africans as junior partners needed to make up the numbers in possible coalitions.’ 

To counteract this, Africa needs continental champions who can negotiate common digital positions for presentation by continent-wide bodies such as the AU.

Examples of the most pressing issues include how African states can rapidly develop their digital capacity in line with the AU’s Digital Transformation Strategy. Beyond this are issues of cyber security. For instance, how should African states respond to attacks on critical infrastructure or the weaponisation of cyberspace to conduct disinformation campaigns and undermine democracy? 

It also includes the threat posed by cyber-enabled crimes. Their perpetrators use the internet to engage in traditional crimes like fraud and forgery, human trafficking or the illicit trade in drugs, wildlife products, weapons, precious stones etc.

The AU’s Digital Transformation Strategy emphasises the economic and developmental potential of rapid digital advances to the continent. A key part of this is ensuring equitable access to digital technologies and building the human capacity to benefit from them. However, discussions are needed on the unintended consequences of evolving technologies on human security. Without strategic thinking on shaping and taming the algorithms and deploying future digital technologies, African states risk being swept along by the more digitally mature superpowers and their agendas. 

The continent needs to upskill African cyber diplomats and embed digital knowledge across government. 
Competition over the ownership of emerging technologies and related power relationships are another reason Africa should engage more actively in cyber diplomacy.  African states need the infrastructure underpinning digital technologies such as the networks, hardware and other tools that define the cyber ecosystem. This makes them dependent on other state actors and their proxies but also leaves them vulnerable to influence and imported norms about privacy, mass surveillance and security.

The rapid rollout of CCTV camera systems along with facial recognition tools supplied by Chinese firms in countries including Ethiopia, South Africa, Kenya and Zimbabwe have ignited a debate about sovereignty, technological interdependence and digital feudalism.

Given the modest level of digital development among many of the AU’s 54 states, Africa seems particularly vulnerable to tech-infused geopolitics. The economic challenges facing many countries on the continent may incline them to opt for the cheapest tech rather than the most secure. The ISS report argues that the AU should encourage states to, where possible, delink trade from cyber diplomacy dialogue. Bilateral trading relationships with powerful state tech suppliers may cloud judgements over governance issues, for example. 

Delinking trade from tech may encourage continent-wide approaches to governance and cyber security rather than pursuing individual short-term economic gains. This would reduce the potential for global powers to adopt ‘divide and rule’ strategies on digital issues. With their relatively youthful populations, African states can also position themselves as a rapidly expanding future source and marketplace for new technology. The emergence of indigenous technologies such as M-Pesa in Kenya is an example of local innovation. 

According to World Bank figures, by 2050, one in four of the world’s people will come from sub-Saharan Africa. This, together with the continent’s large proportion of young people, provides leverage for African states to ensure their current digital needs and challenges are addressed as a global priority.

Article First published by ISS Today

Karen Allen is an  and former BBC Foreign Correspondent, an expert on international policy and founder of Karen Allen International

You Might Also Read: 

Internet Cable To Encircle Africa:

 

« The Cyber Skills Shortage & Training Gap - What Is The Solution?
Azure Active Directory Recycle Bin Won’t Save Your Critical Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Black Girls In Cyber (BGiC)

Black Girls In Cyber (BGiC)

Black Girls In Cyber's mission is to increase industry awareness and diversity in cybersecurity, privacy, and STEM for women of color.

Ontinue

Ontinue

Ontinue ION is an MXDR service that provides Nonstop SecOps through five key capabilities that enable your organization to respond to attacks and continuously reduce risk.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.