African States Quick To Adopt Network Surveillance

Governments in Sudan, Nigeria, South Africa and Ethiopia are the latest to deploy sophisticated network eavesdropping tools against their citizens. 

Uganda has been using a surveillance program, codenamed Fungua Macho, or “open eyes” in Swahili, to spy on opposition politicians and anyone “deemed dangerous to state security,” according to an investigation by Privacy International and BBC Newsnight. Policy documents dating back to 2012 detail the use of the security software called Finfisher and 70 intelligence officers to collect data on potential threats, although Ugandan authorities deny the operation’s existence.

Uganda isn’t alone. African countries are entering the world’s newest arms race, for cyber weapons and surveillance, at a rapid clip. According to a recent Wall Street Journal report, an estimated 29 countries around the world now have formal or military units dedicated to cyber warfare, and 63 countries have used cyber surveillance on their own citizens or abroad. Of those, four were in sub-Saharan Africa.

Ethiopia
Ethiopian authorities are suspected of using off-the shelf hacking software to spy on journalists and members of the Ethiopian diaspora living in the United States and Europe. An American citizen who was born in Ethiopia filed a lawsuit against the government claiming his Skype (pdf) have been monitored and recorded by Ethiopian authorities.
CitizenLab, a watchdog group that is part of Canada’s Munk School of Global Affairs, believes that at least some of the attacks were done by the Ethiopian. Hacking Team, the Italian provider of “offensive security technology” that sold software to Ethiopia, says they stopped providing their service last year.
Within Ethiopia, the government’s control over the telecom sector means that it has easy access to the phone records of citizens, according to Human Rights Watch. A former opposition party member told last year, “They showed me a list of all my phone calls and they played a conversation I had with my brother. They arrested me because we talked about politics on the phone. It was the first phone I ever owned, and I thought I could finally talk freely.”

Nigeria
News reports last year claimed the government had completed a $40 million contract with an Israeli company for a surveillance system. Citizen Lab also found evidence of US and UK-developed monitoring software in Nigeria in 2013. Privacy advocates say that Nigeria has alack of detailed privacy laws and that its citizens are thus vulnerable to monitoring by their government as well as foreign ones.

South Africa
Policy documents dated 2006 revealed procedures for electronic, as well as physical, surveillance of individuals in the country were made public earlier this year. Authorities said last year that, “South Africa requires the protection of its cyber-domain, through…a comprehensive information”. Critics say South Africa’s secretive is at the center of the country’s surveillance programs and operates above the law.

Sudan
In 2011, Sudan established the Cyber Jihadist Unit, using equipment developed in Italy, to monitor political opposition figures and journalists, according to Citizen Lab. Last year, the head of the National Assembly’s communications committee said that surveillance of phone calls would stop but critics say it has continued.

DefenseOne:

« US Drone Registry Set Up In Response to Safety Concerns
NATO Forces Shoot Down a Russian Drone Over Turkey. »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

K7 Computing

K7 Computing

K7 provides antivirus and internet security products for business and home users.

PlaxidityX

PlaxidityX

PlaxidityX (formerly Argus Cyber Security) is a global leader in mobility cyber security, provides DevSecOps, vehicle protection and fleet protection technologies and services.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Advantech

Advantech

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Travelers

Travelers

Travelers is a leading writer of US commercial property casualty insurance and one of the world’s largest global insurers for cyber insurance.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Camel Secure - ZeroRisk

Camel Secure - ZeroRisk

Camel Secure is a company specialized in the development of products for information security and technology risk management.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

NAM-CSIRT

NAM-CSIRT

NAM-CSIRT is a team established to contribute to the security and stability of critical infrastructure and critical information infrastructure of the Republic of Namibia.