China Exports Cyber Surveillance To Africa

China has consistently been ranked by digital advocates as the world’s worst abuser of Internet freedom. 

The country, however, isn’t just tightening online controls at home but is becoming more brazen in exporting some of those techniques abroad including in Africa, says a new report from the US-based think tank Freedom House.

Using a mix of official training, providing technological infrastructure to authoritarian regimes, and insisting that international companies accept its content regulations even outside of China, Beijing is becoming adept at controlling information both inside and outside its borders. 

Together, these trends present “an existential threat to the future of the open internet and prospects for greater democracy around the globe,” the Washington DC-based non-profit said.

The study assessed developments related to internet freedom that took place between June 2017 and May 2018 in 65 countries across the world.

The issue of internet freedom and its link to China has gained urgency as the nation’s tech behemoths expand globally to disrupt industries as varied as communications, e-commerce, facial recognition technology, and artificial intelligence. 

As part of its Belt & Road infrastructure project, the Asian giant is also developing a “digital Silk Road” that will establish fiber optic networks across the developing world. 

But given the close links between Chinese tech companies and the government, experts have warned that these digital systems could be used for Beijing’s intelligence operations and electronic surveillance.

Over the past year, China hosted sessions on its sprawling system of censorship and surveillance for media officials from countries such as Morocco, Egypt, and Libya. Last November, it also held a two-week seminar on “Cyberspace Management for Officials of Countries along the Belt and Road Initiative.” 

Freedom House says “it is not always clear what transpires during such seminars,” but that the meetings have usually been followed by the introduction of cybersecurity laws that closely resemble China’s own law including in Uganda and Tanzania.

Chinese companies are also playing a prominent role in their push to install internet and mobile networking equipment across Africa. The Shenzhen-based Transsion Holdings, for instance, is now Africa’s largest phone maker. 

Startups like CloudWalk is undertaking a mass facial recognition program in Zimbabwe. Huawei is advising Kenya on its information and communication technology master plan.

But while building these infrastructures is crucial for the continent, there’s also fear that China could use “backdoor mechanisms” to access massive amounts of personal, government and financial data. 

Earlier this year, reports showed that Beijing bugged the African Union headquarters in Addis Ababa, which it helped build, and transferred data for more than five years.

Beijing is taking these steps even as African governments increasingly look at the Internet as a threat, using a motley of targeted shutdowns, surveillance, and arbitrary legislation to silence digital users. 

Citing fake news, increasing online “gossip,” and plans to boost domestic revenues, governments have also begun taxing Internet bundles, introducing a costly impact not just on democracy and social cohesion, but on economic growth, innovation, and net neutrality.

Defense One:

You Might Also Read:

China’s Electronic Surveillance Program Targets Muslims:

China Wants To Use AI To Predict Civil Disorder:

 

« Russian Internet Research Agency Has A New Propaganda Campaign
GDPR Alert As Average ICO Fines Double In A Year »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

ANIS

ANIS

ANIS represents the interests of Romanian IT companies and supports the development of the software and services industry.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.