African Union HQ Building Bugged

A number of African leaders have turned to Chinese investment as a viable alternative to Western development aid. The recent allegations of Chinese cyber-espionage of the African Union’s headquarters might prompt them to reconsider.

Earlier this year, Le Monde reported that confidential data on the IT network of the Chinese-built African Union headquarters in Ethiopia was being siphoned off to Shanghai every night between 2012 and 2017.

Despite denials from China and the African Union, the alleged espionage is worth analysing as it highlights Africa’s geopolitical importance to China and endangers Beijing’s preferred narrative of benevolent relations with African states. Moving forward, African leaders will face a more complex calculus when approaching the West and China with respect to tech issues.

Although this sort of Spycraft is fairly routine, it signals Africa’s growing strategic importance to China. In a world of finite resources, states spy on states that matter to them. China seems to have calculated that the hard power benefits of accessing internal AU data to gain the upper hand in negotiations with African leaders outweighed the soft power benefits that came with building them a headquarters.

For their part, a number of African leaders have turned to Chinese investment as a viable alternative to Western development aid. Beijing has invested millions of dollars in infrastructure across the continent, trades heavily with the continent, and opened its first overseas military base in Djibouti.

African leaders, including Uganda’s Yoweri Museveni, have decried Western actors as “conceited, full of themselves, ignorant of our conditions, and they make other people’s business their business, while the Chinese just deal with you as one who represents your country.”

China’s alleged espionage takes it from benevolent business partner to potential political meddler, adding a dimension of realpolitik to the relationship.

What Can African States Do?

According to Le Monde, the African Union kept the Chinese surveillance secret for a year after discovering it, suggesting that African leaders believed such information, if public, could have explosive consequences for their relationship with China. Africa’s hesitation to disclose this incursion demonstrates just how much influence Chinese strategic ambitions have over choices African actors make.

What can AU members do? African states have historically found ways to push back against powerful outside influences, despite continued power imbalances. Cold War geopolitics allowed African states play Soviet and Western interests off of each other, giving them more “space” to operate.

For instances, they used aid and trade deals from one region to negotiate better deals with another. They also strategically granted military privileges to one side or the other as a negotiating tactic.

The African strategic toolkit shifted with the post-Cold War ascendancy of the West. African states began to use rules, a central element of Western global politics, as a mode of resistance.

All but three African members of the International Telecommunication Union that attended an important 2012 conference endorsed changes to a telecom treaty known as the International Telecommunications Regulations.

China also endorsed these changes, while the United States did not.

African states have also been reticent to accede to the Council of Europe’s Convention on Cybercrime, largely on the grounds that they had no role in drafting it.

Instead, African states developed their own rival set of rules in the African Union Convention on Cybersecurity and Personal Data Protection, underscoring their resistance.

Resistance through rules probably will not help African states deter Chinese cyber espionage. International law is generally silent on espionage, so playing one set of rules off of another would do little to deter it. Instead, African states could return to playing one region’s interests off of another to gain strategic space to maneuver. African states will not be able to stop Chinese espionage.

But, African states could respond to this allegation of Chinese espionage by, for example, indicating greater openness to Western partners. This incident also opens possibilities for the West to re-engage with African countries and offer itself as a more appealing partner to African states to balance China’s influence.

So far, however, African states have failed to deal with China in response to the bugging in a manner that bolsters their autonomy. Eight days after news of the Chinese espionage broke, the African Union joined Chinese denials. The AU chairman appeared in Beijing with the Chinese foreign minister calling the allegations “all lies” while the Chinese foreign minister added that the allegation was a Western attempt to divide China and Africa.

The African Union’s failure to address China’s behavior demonstrates just how dramatically China’s influence has narrowed African strategic choices. African states have failed to counterbalance China’s interests by buying the party line.

If this behavior continues, African autonomy will take a real hit. The original Le Monde report quotes AU officials rationalising the Chinese behavior, ‘at least they never colonised us.’

This may be true, but China does not have to colonise Africa to affect its destiny on Chinese rather than African terms.

DefenseOne

You Might Also Read: 

Chinese Hacker Groups Shift Focus To India:

In S.Africa The Cybersecurity Skills Gap Is A Chasm:

 
« Cybersecurity At Sea
Cybercrime Costs Londoners £26m Every Month »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ANS Group

ANS Group

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Sardine

Sardine

Sardine is a leader in financial crime prevention. Using unparalleled device intelligence and behavior biometrics, Sardine applies machine learning to detect and stop fraud before it happens.

Argantic

Argantic

Argantic aims to help organisations thrive and reach their full potential in a modern cloud-centric era.