African States Quick To Adopt Network Surveillance

Governments in Sudan, Nigeria, South Africa and Ethiopia are the latest to deploy sophisticated network eavesdropping tools against their citizens. 

Uganda has been using a surveillance program, codenamed Fungua Macho, or “open eyes” in Swahili, to spy on opposition politicians and anyone “deemed dangerous to state security,” according to an investigation by Privacy International and BBC Newsnight. Policy documents dating back to 2012 detail the use of the security software called Finfisher and 70 intelligence officers to collect data on potential threats, although Ugandan authorities deny the operation’s existence.

Uganda isn’t alone. African countries are entering the world’s newest arms race, for cyber weapons and surveillance, at a rapid clip. According to a recent Wall Street Journal report, an estimated 29 countries around the world now have formal or military units dedicated to cyber warfare, and 63 countries have used cyber surveillance on their own citizens or abroad. Of those, four were in sub-Saharan Africa.

Ethiopia
Ethiopian authorities are suspected of using off-the shelf hacking software to spy on journalists and members of the Ethiopian diaspora living in the United States and Europe. An American citizen who was born in Ethiopia filed a lawsuit against the government claiming his Skype (pdf) have been monitored and recorded by Ethiopian authorities.
CitizenLab, a watchdog group that is part of Canada’s Munk School of Global Affairs, believes that at least some of the attacks were done by the Ethiopian. Hacking Team, the Italian provider of “offensive security technology” that sold software to Ethiopia, says they stopped providing their service last year.
Within Ethiopia, the government’s control over the telecom sector means that it has easy access to the phone records of citizens, according to Human Rights Watch. A former opposition party member told last year, “They showed me a list of all my phone calls and they played a conversation I had with my brother. They arrested me because we talked about politics on the phone. It was the first phone I ever owned, and I thought I could finally talk freely.”

Nigeria
News reports last year claimed the government had completed a $40 million contract with an Israeli company for a surveillance system. Citizen Lab also found evidence of US and UK-developed monitoring software in Nigeria in 2013. Privacy advocates say that Nigeria has alack of detailed privacy laws and that its citizens are thus vulnerable to monitoring by their government as well as foreign ones.

South Africa
Policy documents dated 2006 revealed procedures for electronic, as well as physical, surveillance of individuals in the country were made public earlier this year. Authorities said last year that, “South Africa requires the protection of its cyber-domain, through…a comprehensive information”. Critics say South Africa’s secretive is at the center of the country’s surveillance programs and operates above the law.

Sudan
In 2011, Sudan established the Cyber Jihadist Unit, using equipment developed in Italy, to monitor political opposition figures and journalists, according to Citizen Lab. Last year, the head of the National Assembly’s communications committee said that surveillance of phone calls would stop but critics say it has continued.

DefenseOne:

« US Drone Registry Set Up In Response to Safety Concerns
NATO Forces Shoot Down a Russian Drone Over Turkey. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

Noerr

Noerr

Noerr is one of the top European law firms with 500 professionals in Germany, Europe and the USA. We provide solutions to complex and sophisticated legal matters including cyber risks.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

SecurEyes

SecurEyes

SecurEyes is a leading cybersecurity firm that provides specialised services, including cybersecurity assessments, managed services, and governance risk and compliance services.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.