All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1164350",
"signature": "Article:1164350",
"url": "https://staging.dailymaverick.co.za/article/2022-02-01-growing-digital-threat-to-africas-humanitarian-sector-requires-rapid-solutions-to-keep-cybercriminals-at-bay/",
"shorturl": "https://staging.dailymaverick.co.za/article/1164350",
"slug": "growing-digital-threat-to-africas-humanitarian-sector-requires-rapid-solutions-to-keep-cybercriminals-at-bay",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Growing digital threat to Africa’s humanitarian sector requires rapid solutions to keep cybercriminals at bay",
"firstPublished": "2022-02-01 17:51:20",
"lastUpdate": "2022-02-01 17:51:20",
"categories": [
{
"id": "3",
"name": "Africa",
"signature": "Category:3",
"slug": "africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 7012,
"contents": "<span style=\"font-weight: 400;\">Last month’s </span><a href=\"https://www.theguardian.com/world/2022/jan/20/hacking-attack-on-red-cross-exposes-data-of-515000-vulnerable-people\"><span style=\"font-weight: 400;\">cyber-attack</span></a><span style=\"font-weight: 400;\"> on the International Committee of the Red Cross and its affiliated bodies showed that the humanitarian community isn’t immune from cybercrime. Given that Africa is a focal point for many humanitarian operations and is experiencing rising rates of </span><a href=\"https://www.interpol.int/en/News-and-Events/News/2021/INTERPOL-report-identifies-top-cyberthreats-in-Africa\"><span style=\"font-weight: 400;\">cybercrime</span></a><span style=\"font-weight: 400;\"> across all sectors, this is especially sobering. </span>\r\n\r\n<span style=\"font-weight: 400;\">It’s shone a spotlight on the reality that although emerging technologies have positively transformed how aid is delivered, there are also potential harms. Many Red Cross operations are conducted in </span><a href=\"https://www.icrc.org/en/where-we-work\"><span style=\"font-weight: 400;\">Africa</span></a><span style=\"font-weight: 400;\"> — e.g. in the Sahel, Ethiopia, Chad and the Democratic Republic of the Congo. So for the continent, it’s a reminder that tech without due consideration of the risks could expose many vulnerable people to harm. </span>\r\n\r\n<span style=\"font-weight: 400;\">The breach saw the personal data of nearly half a million vulnerable people being exposed globally. As more unfolds on the incident, it’s becoming clearer that the Red Cross was almost certainly singled out for attack. The motivation is yet to be established. </span>\r\n\r\n<span style=\"font-weight: 400;\">The hackers targeted the organisation’s servers stored at a Switzerland-based facility. “It was sophisticated enough that it wasn’t just a 15-year-old computer hacker having some fun,” said Delphine van Solinge, an adviser to the Red Cross on digital risks in the humanitarian sphere. “It seemed to be well organised, well planned and rolled out, but we cannot say who was behind it and why they did it.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Covid-19 and multiple cyber-attacks on institutions such as the World Health </span><a href=\"https://www.who.int/news/item/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance\"><span style=\"font-weight: 400;\">Organization</span></a><span style=\"font-weight: 400;\"> have underscored cyber threats to the aid world. Like governments, businesses, universities, and multilateral institutions, humanitarian players must temper the dash to embrace emerging tech and soberly assess potential risks.</span>\r\n\r\n<span style=\"font-weight: 400;\">The digital revolution has helped provide real-time data during crises or conflicts. But if this information falls into the wrong hands it can be potentially life-threatening, or at the very least distressing. </span>\r\n\r\n<span style=\"font-weight: 400;\">“It is very difficult to speculate on the intention of the perpetrator in this attack,” says Van Solinge, “but the individuals the [Red Cross] works with are often fleeing conflict and seeking to be reunited with families overseas. Revealing their identities or movements may put their safety in jeopardy.”</span>\r\n\r\n<span style=\"font-weight: 400;\">It may be used for politically expedient purposes. There’s also a market for personal data. Stolen identities are used to perpetrate fraud, extortion and other crimes. For these reasons, along with other ethical considerations, in the wake of the breach, the Red Cross appealed for people not to share, sell, or leak the information. </span>\r\n\r\n<span style=\"font-weight: 400;\">Unauthorised access to the same data held physically would also have been considered a serious breach. However, the digital dimension to this intrusion enables highly sensitive data to be distributed quickly. Also, once personal records are released publicly into cyberspace, they’re hard to remove.</span>\r\n\r\n<span style=\"font-weight: 400;\">Like other humanitarian players, the Red Cross is being forced to review its cyber security measures and consider the private sector's role to help mitigate risks. Understanding the benefits and limits of private sector engagement will be critical, says Van Solinge. Much of the know-how and expertise resides with that sector.</span>\r\n\r\n<span style=\"font-weight: 400;\">Timo Koster, a consultant for the not-for-profit Domain Name Server (DNS) resolver Quad9 (a DNS resolver converts domain names into IP addresses), told </span><i><span style=\"font-weight: 400;\">ISS Today</span></i><span style=\"font-weight: 400;\"> that “this incident reiterates how important a multi-layer defence is against cyber-attacks.” Quad9, which has a large presence in sub-Saharan Africa, also has a real-time threat filter based on multiple intelligence feeds. It blocks access to malicious websites that spread malware or engage in stealing, defrauding and phishing. </span>\r\n\r\n<span style=\"font-weight: 400;\">As well as offering protection, the way such cyber security tools are distributed (e.g. to the humanitarian and non-governmental organisation (NGO) sector) and are populated by pooled threat information from the cyber security industry could become a model for the future. Central is the principle that the delivery of safe internet services should be considered a public good rather than simply a commercial proposition.</span>\r\n\r\n<span style=\"font-weight: 400;\">It’s part of a wider debate about humanitarian aid and digital threats. In the real world, the Red Cross has protections under international humanitarian law. The red cross or red crescent symbol is a potent globally recognised image of neutrality and has a long </span><a href=\"https://www.icrc.org/en/doc/resources/documents/misc/emblem-history.htm\"><span style=\"font-weight: 400;\">history</span></a><span style=\"font-weight: 400;\">. </span>\r\n\r\n<span style=\"font-weight: 400;\">Over the past two years, the organisation has led a research project on the potential benefits and risks of a digital emblem. The purpose would be to flag the data and digital infrastructure of protected medical entities and certain humanitarian organisations and to signal their protection. However, one concern is that a form of digital branding could expose humanitarian data and assets to further attack by making it easier to target. </span>\r\n\r\n<span style=\"font-weight: 400;\">The Red Cross is under no illusion that a digital emblem would simply prevent cyber threats to the digital infrastructure of medical or humanitarian actors. Just as the physical emblem has never been a bullet-proof protection against physical attacks. However, it is a way to signal legal protection and serve as a means of identification. It would allow cyber operators to more easily identify and spare protected entities in times of armed conflict, remind belligerents of their legal obligations where applicable, and deter other actors.</span>\r\n\r\n<span style=\"font-weight: 400;\">Organisations such as the Red Cross have played a key role at international policy level to entrench norms, including that stating that international law applies in </span><a href=\"https://carnegieendowment.org/2021/06/14/brief-primer-on-international-law-and-cyberspace-pub-84763\"><span style=\"font-weight: 400;\">cyberspace</span></a><span style=\"font-weight: 400;\">. It has applications not only for the use of the internet but also for other emerging tech areas, including drone technology and autonomous weapons, which also rely on networking capabilities.</span>\r\n\r\n<span style=\"font-weight: 400;\">Another area of focus is the possibility of establishing a dedicated ‘cloud’ for the humanitarian sector. So far research has been undertaken to consider the use of cloud technology for humanitarian supply </span><a href=\"https://www.researchgate.net/publication/308273594_Humanitarian_supply_chain_use_of_cloud_computing\"><span style=\"font-weight: 400;\">chains</span></a><span style=\"font-weight: 400;\">. But a key requirement for secure cloud data storage for humanitarian purposes is that its integrity is maintained. </span>\r\n\r\n<span style=\"font-weight: 400;\">This is particularly critical given the Red Cross’s function in reuniting families in times of conflict. Imagine if data on unaccompanied children were hacked and data modified and people subsequently came forward pretending to be their parents? The potential consequences of data contamination are truly chilling, so humanitarian players must tread carefully.</span>\r\n\r\n<span style=\"font-weight: 400;\">As policy discussions on digital transformation across Africa gain more traction, international NGOs from the humanitarian world must note the potential risks and balance these against the benefits. Private sector expertise must be considered and speedy mitigation measures put in place.</span>\r\n\r\n<span style=\"font-weight: 400;\">Humanitarian players also need to continue to engage in </span><a href=\"https://issafrica.org/research/africa-report/cyber-diplomacy-and-africas-digital-development\"><span style=\"font-weight: 400;\">multilateral</span></a><span style=\"font-weight: 400;\"> discussions on cyber governance issues to ensure their needs are addressed. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Karen Allen, Consultant, ISS Pretoria.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a><span style=\"font-weight: 400;\">.</span>",
"teaser": "Growing digital threat to Africa’s humanitarian sector requires rapid solutions to keep cybercriminals at bay",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "23372",
"name": "Karen Allen",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/karen-allen/",
"editorialName": "karen-allen",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "2760",
"name": "Africa",
"url": "https://staging.dailymaverick.co.za/keyword/africa/",
"slug": "africa",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Africa",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "195310",
"name": "cyber attack",
"url": "https://staging.dailymaverick.co.za/keyword/cyber-attack/",
"slug": "cyber-attack",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyber attack",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "240227",
"name": "Red Cross",
"url": "https://staging.dailymaverick.co.za/keyword/red-cross/",
"slug": "red-cross",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Red Cross",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "366849",
"name": "humanitarian operations",
"url": "https://staging.dailymaverick.co.za/keyword/humanitarian-operations/",
"slug": "humanitarian-operations",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "humanitarian operations",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "366850",
"name": "Delphine van Solinge",
"url": "https://staging.dailymaverick.co.za/keyword/delphine-van-solinge/",
"slug": "delphine-van-solinge",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Delphine van Solinge",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "366851",
"name": "Domain Name Server",
"url": "https://staging.dailymaverick.co.za/keyword/domain-name-server/",
"slug": "domain-name-server",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Domain Name Server",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "366852",
"name": "Quad9",
"url": "https://staging.dailymaverick.co.za/keyword/quad9/",
"slug": "quad9",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Quad9",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "30382",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/qzxzw_sBdPZuMy9eb4idc0y0LAY=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/MzsirMPKpBMrAmK2h38ebjGY4eM=/450x0/smart/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/nt0crSLDFAX7oMePbpIdPmi3puE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/SFU4dUK8jf5U_qyoetWqSgbd-04=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/32d2kT_9ZnW7hWjtYiwCQhh4l7s=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/qzxzw_sBdPZuMy9eb4idc0y0LAY=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/MzsirMPKpBMrAmK2h38ebjGY4eM=/450x0/smart/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/nt0crSLDFAX7oMePbpIdPmi3puE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/SFU4dUK8jf5U_qyoetWqSgbd-04=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/32d2kT_9ZnW7hWjtYiwCQhh4l7s=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"type": "image"
}
],
"summary": "The recent Red Cross cyber-attack is a reminder that emerging tech comes with risks. ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Growing digital threat to Africa’s humanitarian sector requires rapid solutions to keep cybercriminals at bay",
"search_description": "<span style=\"font-weight: 400;\">Last month’s </span><a href=\"https://www.theguardian.com/world/2022/jan/20/hacking-attack-on-red-cross-exposes-data-of-515000-vulnerable-people\"><span style=\"font-weigh",
"social_title": "Growing digital threat to Africa’s humanitarian sector requires rapid solutions to keep cybercriminals at bay",
"social_description": "<span style=\"font-weight: 400;\">Last month’s </span><a href=\"https://www.theguardian.com/world/2022/jan/20/hacking-attack-on-red-cross-exposes-data-of-515000-vulnerable-people\"><span style=\"font-weigh",
"social_image": ""
},
"cached": true,
"access_allowed": true
}