African States Quick To Adopt Network Surveillance

Governments in Sudan, Nigeria, South Africa and Ethiopia are the latest to deploy sophisticated network eavesdropping tools against their citizens. 

Uganda has been using a surveillance program, codenamed Fungua Macho, or “open eyes” in Swahili, to spy on opposition politicians and anyone “deemed dangerous to state security,” according to an investigation by Privacy International and BBC Newsnight. Policy documents dating back to 2012 detail the use of the security software called Finfisher and 70 intelligence officers to collect data on potential threats, although Ugandan authorities deny the operation’s existence.

Uganda isn’t alone. African countries are entering the world’s newest arms race, for cyber weapons and surveillance, at a rapid clip. According to a recent Wall Street Journal report, an estimated 29 countries around the world now have formal or military units dedicated to cyber warfare, and 63 countries have used cyber surveillance on their own citizens or abroad. Of those, four were in sub-Saharan Africa.

Ethiopia
Ethiopian authorities are suspected of using off-the shelf hacking software to spy on journalists and members of the Ethiopian diaspora living in the United States and Europe. An American citizen who was born in Ethiopia filed a lawsuit against the government claiming his Skype (pdf) have been monitored and recorded by Ethiopian authorities.
CitizenLab, a watchdog group that is part of Canada’s Munk School of Global Affairs, believes that at least some of the attacks were done by the Ethiopian. Hacking Team, the Italian provider of “offensive security technology” that sold software to Ethiopia, says they stopped providing their service last year.
Within Ethiopia, the government’s control over the telecom sector means that it has easy access to the phone records of citizens, according to Human Rights Watch. A former opposition party member told last year, “They showed me a list of all my phone calls and they played a conversation I had with my brother. They arrested me because we talked about politics on the phone. It was the first phone I ever owned, and I thought I could finally talk freely.”

Nigeria
News reports last year claimed the government had completed a $40 million contract with an Israeli company for a surveillance system. Citizen Lab also found evidence of US and UK-developed monitoring software in Nigeria in 2013. Privacy advocates say that Nigeria has alack of detailed privacy laws and that its citizens are thus vulnerable to monitoring by their government as well as foreign ones.

South Africa
Policy documents dated 2006 revealed procedures for electronic, as well as physical, surveillance of individuals in the country were made public earlier this year. Authorities said last year that, “South Africa requires the protection of its cyber-domain, through…a comprehensive information”. Critics say South Africa’s secretive is at the center of the country’s surveillance programs and operates above the law.

Sudan
In 2011, Sudan established the Cyber Jihadist Unit, using equipment developed in Italy, to monitor political opposition figures and journalists, according to Citizen Lab. Last year, the head of the National Assembly’s communications committee said that surveillance of phone calls would stop but critics say it has continued.

DefenseOne:

« US Drone Registry Set Up In Response to Safety Concerns
NATO Forces Shoot Down a Russian Drone Over Turkey. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

Morphisec

Morphisec

Morphisec's world leading prevention-first software stops ransomware and other advanced attacks from endpoint to the cloud.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.