African States Quick To Adopt Network Surveillance

Governments in Sudan, Nigeria, South Africa and Ethiopia are the latest to deploy sophisticated network eavesdropping tools against their citizens. 

Uganda has been using a surveillance program, codenamed Fungua Macho, or “open eyes” in Swahili, to spy on opposition politicians and anyone “deemed dangerous to state security,” according to an investigation by Privacy International and BBC Newsnight. Policy documents dating back to 2012 detail the use of the security software called Finfisher and 70 intelligence officers to collect data on potential threats, although Ugandan authorities deny the operation’s existence.

Uganda isn’t alone. African countries are entering the world’s newest arms race, for cyber weapons and surveillance, at a rapid clip. According to a recent Wall Street Journal report, an estimated 29 countries around the world now have formal or military units dedicated to cyber warfare, and 63 countries have used cyber surveillance on their own citizens or abroad. Of those, four were in sub-Saharan Africa.

Ethiopia
Ethiopian authorities are suspected of using off-the shelf hacking software to spy on journalists and members of the Ethiopian diaspora living in the United States and Europe. An American citizen who was born in Ethiopia filed a lawsuit against the government claiming his Skype (pdf) have been monitored and recorded by Ethiopian authorities.
CitizenLab, a watchdog group that is part of Canada’s Munk School of Global Affairs, believes that at least some of the attacks were done by the Ethiopian. Hacking Team, the Italian provider of “offensive security technology” that sold software to Ethiopia, says they stopped providing their service last year.
Within Ethiopia, the government’s control over the telecom sector means that it has easy access to the phone records of citizens, according to Human Rights Watch. A former opposition party member told last year, “They showed me a list of all my phone calls and they played a conversation I had with my brother. They arrested me because we talked about politics on the phone. It was the first phone I ever owned, and I thought I could finally talk freely.”

Nigeria
News reports last year claimed the government had completed a $40 million contract with an Israeli company for a surveillance system. Citizen Lab also found evidence of US and UK-developed monitoring software in Nigeria in 2013. Privacy advocates say that Nigeria has alack of detailed privacy laws and that its citizens are thus vulnerable to monitoring by their government as well as foreign ones.

South Africa
Policy documents dated 2006 revealed procedures for electronic, as well as physical, surveillance of individuals in the country were made public earlier this year. Authorities said last year that, “South Africa requires the protection of its cyber-domain, through…a comprehensive information”. Critics say South Africa’s secretive is at the center of the country’s surveillance programs and operates above the law.

Sudan
In 2011, Sudan established the Cyber Jihadist Unit, using equipment developed in Italy, to monitor political opposition figures and journalists, according to Citizen Lab. Last year, the head of the National Assembly’s communications committee said that surveillance of phone calls would stop but critics say it has continued.

DefenseOne:

« US Drone Registry Set Up In Response to Safety Concerns
NATO Forces Shoot Down a Russian Drone Over Turkey. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

GlobalPlatform

GlobalPlatform

GlobalPlatform’s specifications are highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.