China Exports Cyber Surveillance To Africa

China has consistently been ranked by digital advocates as the world’s worst abuser of Internet freedom. 

The country, however, isn’t just tightening online controls at home but is becoming more brazen in exporting some of those techniques abroad including in Africa, says a new report from the US-based think tank Freedom House.

Using a mix of official training, providing technological infrastructure to authoritarian regimes, and insisting that international companies accept its content regulations even outside of China, Beijing is becoming adept at controlling information both inside and outside its borders. 

Together, these trends present “an existential threat to the future of the open internet and prospects for greater democracy around the globe,” the Washington DC-based non-profit said.

The study assessed developments related to internet freedom that took place between June 2017 and May 2018 in 65 countries across the world.

The issue of internet freedom and its link to China has gained urgency as the nation’s tech behemoths expand globally to disrupt industries as varied as communications, e-commerce, facial recognition technology, and artificial intelligence. 

As part of its Belt & Road infrastructure project, the Asian giant is also developing a “digital Silk Road” that will establish fiber optic networks across the developing world. 

But given the close links between Chinese tech companies and the government, experts have warned that these digital systems could be used for Beijing’s intelligence operations and electronic surveillance.

Over the past year, China hosted sessions on its sprawling system of censorship and surveillance for media officials from countries such as Morocco, Egypt, and Libya. Last November, it also held a two-week seminar on “Cyberspace Management for Officials of Countries along the Belt and Road Initiative.” 

Freedom House says “it is not always clear what transpires during such seminars,” but that the meetings have usually been followed by the introduction of cybersecurity laws that closely resemble China’s own law including in Uganda and Tanzania.

Chinese companies are also playing a prominent role in their push to install internet and mobile networking equipment across Africa. The Shenzhen-based Transsion Holdings, for instance, is now Africa’s largest phone maker. 

Startups like CloudWalk is undertaking a mass facial recognition program in Zimbabwe. Huawei is advising Kenya on its information and communication technology master plan.

But while building these infrastructures is crucial for the continent, there’s also fear that China could use “backdoor mechanisms” to access massive amounts of personal, government and financial data. 

Earlier this year, reports showed that Beijing bugged the African Union headquarters in Addis Ababa, which it helped build, and transferred data for more than five years.

Beijing is taking these steps even as African governments increasingly look at the Internet as a threat, using a motley of targeted shutdowns, surveillance, and arbitrary legislation to silence digital users. 

Citing fake news, increasing online “gossip,” and plans to boost domestic revenues, governments have also begun taxing Internet bundles, introducing a costly impact not just on democracy and social cohesion, but on economic growth, innovation, and net neutrality.

Defense One:

You Might Also Read:

China’s Electronic Surveillance Program Targets Muslims:

China Wants To Use AI To Predict Civil Disorder:

 

« Russian Internet Research Agency Has A New Propaganda Campaign
GDPR Alert As Average ICO Fines Double In A Year »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ANS Group

ANS Group

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.