African Union HQ Building Bugged

A number of African leaders have turned to Chinese investment as a viable alternative to Western development aid. The recent allegations of Chinese cyber-espionage of the African Union’s headquarters might prompt them to reconsider.

Earlier this year, Le Monde reported that confidential data on the IT network of the Chinese-built African Union headquarters in Ethiopia was being siphoned off to Shanghai every night between 2012 and 2017.

Despite denials from China and the African Union, the alleged espionage is worth analysing as it highlights Africa’s geopolitical importance to China and endangers Beijing’s preferred narrative of benevolent relations with African states. Moving forward, African leaders will face a more complex calculus when approaching the West and China with respect to tech issues.

Although this sort of Spycraft is fairly routine, it signals Africa’s growing strategic importance to China. In a world of finite resources, states spy on states that matter to them. China seems to have calculated that the hard power benefits of accessing internal AU data to gain the upper hand in negotiations with African leaders outweighed the soft power benefits that came with building them a headquarters.

For their part, a number of African leaders have turned to Chinese investment as a viable alternative to Western development aid. Beijing has invested millions of dollars in infrastructure across the continent, trades heavily with the continent, and opened its first overseas military base in Djibouti.

African leaders, including Uganda’s Yoweri Museveni, have decried Western actors as “conceited, full of themselves, ignorant of our conditions, and they make other people’s business their business, while the Chinese just deal with you as one who represents your country.”

China’s alleged espionage takes it from benevolent business partner to potential political meddler, adding a dimension of realpolitik to the relationship.

What Can African States Do?

According to Le Monde, the African Union kept the Chinese surveillance secret for a year after discovering it, suggesting that African leaders believed such information, if public, could have explosive consequences for their relationship with China. Africa’s hesitation to disclose this incursion demonstrates just how much influence Chinese strategic ambitions have over choices African actors make.

What can AU members do? African states have historically found ways to push back against powerful outside influences, despite continued power imbalances. Cold War geopolitics allowed African states play Soviet and Western interests off of each other, giving them more “space” to operate.

For instances, they used aid and trade deals from one region to negotiate better deals with another. They also strategically granted military privileges to one side or the other as a negotiating tactic.

The African strategic toolkit shifted with the post-Cold War ascendancy of the West. African states began to use rules, a central element of Western global politics, as a mode of resistance.

All but three African members of the International Telecommunication Union that attended an important 2012 conference endorsed changes to a telecom treaty known as the International Telecommunications Regulations.

China also endorsed these changes, while the United States did not.

African states have also been reticent to accede to the Council of Europe’s Convention on Cybercrime, largely on the grounds that they had no role in drafting it.

Instead, African states developed their own rival set of rules in the African Union Convention on Cybersecurity and Personal Data Protection, underscoring their resistance.

Resistance through rules probably will not help African states deter Chinese cyber espionage. International law is generally silent on espionage, so playing one set of rules off of another would do little to deter it. Instead, African states could return to playing one region’s interests off of another to gain strategic space to maneuver. African states will not be able to stop Chinese espionage.

But, African states could respond to this allegation of Chinese espionage by, for example, indicating greater openness to Western partners. This incident also opens possibilities for the West to re-engage with African countries and offer itself as a more appealing partner to African states to balance China’s influence.

So far, however, African states have failed to deal with China in response to the bugging in a manner that bolsters their autonomy. Eight days after news of the Chinese espionage broke, the African Union joined Chinese denials. The AU chairman appeared in Beijing with the Chinese foreign minister calling the allegations “all lies” while the Chinese foreign minister added that the allegation was a Western attempt to divide China and Africa.

The African Union’s failure to address China’s behavior demonstrates just how dramatically China’s influence has narrowed African strategic choices. African states have failed to counterbalance China’s interests by buying the party line.

If this behavior continues, African autonomy will take a real hit. The original Le Monde report quotes AU officials rationalising the Chinese behavior, ‘at least they never colonised us.’

This may be true, but China does not have to colonise Africa to affect its destiny on Chinese rather than African terms.

DefenseOne

You Might Also Read: 

Chinese Hacker Groups Shift Focus To India:

In S.Africa The Cybersecurity Skills Gap Is A Chasm:

 
« Cybersecurity At Sea
Cybercrime Costs Londoners £26m Every Month »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

Securadin

Securadin

Securadin - Defending Your Data Security. We will assist you in learning how to maintain the confidentiality, integrity, and availability of your organization's assets.

NewEvol

NewEvol

Don’t React, Evolve! Outsmart threats with real-time AI-powered dynamic defense capability of NewEvol all-in-one cybersecurity platform.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

CliffGuard Cybersecurity

CliffGuard Cybersecurity

CliffGuard Cybersecurity deliver comprehensive services designed to protect your organization from the ever-evolving landscape of cyber threats.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.