All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "412042",
"signature": "Article:412042",
"url": "https://staging.dailymaverick.co.za/article/2019-09-09-policing-the-fourth-industrial-revolution-in-sub-saharan-africa/",
"shorturl": "https://staging.dailymaverick.co.za/article/412042",
"slug": "policing-the-fourth-industrial-revolution-in-sub-saharan-africa",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Policing the Fourth Industrial Revolution in sub-Saharan Africa",
"firstPublished": "2019-09-09 14:37:56",
"lastUpdate": "2019-09-09 14:37:56",
"categories": [
{
"id": "3",
"name": "Africa",
"signature": "Category:3",
"slug": "africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6212,
"contents": "<span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>First published by </i></span></span></span><a href=\"https://issafrica.org/iss-today\"><span style=\"color: #2f57d2;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>ISS Today</i></span></span></span></a>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">There’s a hype to the Fourth Industrial Revolution (4IR) with its disruptive digital technologies that promise to transform our lives, calibrate our decision making with algorithmic precision and satisfy our every craving in real time. But what are its risks, and how do we police this new cyber environment? </span></span></p>\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-US\">One of the problems with 4IR, South Africa’s Tshwane University of Technology cyber expert Prof Mammo Muchie and others have observed, is that ‘technology advances at exponential rates, human society does not.’ So while business leaders at the World Economic Forum in Cape Town last week focused on the massive economic and developmental potential of dramatic advances in technology, others remain </span></span></span><a href=\"https://issafrica.org/iss-today/is-africa-cybercrime-savvy\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">concerned</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-US\"> about human security and the potential vulnerabilities. </span></span></span>\r\n\r\n<iframe src=\"https://www.youtube.com/embed/pRdS-ddtJqo\" width=\"853\" height=\"480\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-US\">At a recent Institute for Security Studies </span></span></span><a href=\"https://issafrica.org/media-resources/videos-and-infographics/iss-live-is-4ir-a-threat-to-human-security\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">seminar</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-US\"> on the issue, Anriette Esterhuysen – a senior figure on the Global Commission on the Stability of Cyberspace and a convener for the African School on Internet Governance – said African countries needed to develop good basic capacity in institutions such as the courts and government ministries to withstand virtual threats in the new digital age. </span></span></span>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">At the same time, Africa must be part of the global conversations about establishing “cyber norms”. These provide the base or the “ecosystem” in which the continent can build resilience to mitigate the abuse of technology.</span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">South African President Cyril Ramaphosa has established a 4IR Commission to embed cyber culture into government. But commissions are only as robust as the actions that follow. And due to the transnational nature of the threat, any policy prescription should locate South Africa and Africa more generally in an international context, rather than retreat into national silos.</span></span></p>\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-US\">An increasingly interconnected world makes Africa as vulnerable (if not more so) than the wealthier global north. When the Cambridge Analytica scandal became headline news, in which big data was manipulated to help shape the voting patterns of millions of citizens, it </span></span></span><a href=\"https://www.fin24.com/Companies/ICT/up-to-60-000-sa-users-affected-by-facebook-data-leak-20180409\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">emerged</span></span></a><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-US\"> that the data of 60,000 South African internet users had been compromised</span></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-US\"><b>.</b></span></span></span>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Lower internet penetration in Africa compared to the global north is also no insurance against data manipulation and cyber attacks. Tech expansion is happening at an astonishing rate. There are expected to be nearly half a million more internet users in sub-Saharan Africa by 2022. </span></span></p>\r\n<p lang=\"en-US\">“<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Controlling the narrative”, whether for political, commercial or social ends, has seen the use of technologies such as Twitter bots, which automatically convey multiple messages, proliferate. In future, as 4IR technologies allow for even more automation, issues of accountability and attribution will become murkier. This new technological dawn also represents a shifting of power from traditional governments to those who control and own big data, including big commercial entities. </span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Tech was once the preserve of nation states and their militaries. Now it is available off the shelf for anyone who can afford it. On the one hand that is empowering and represents a diffusion of power to ordinary citizens. But because cybercriminals who abuse that resource are not constrained by borders, their actions raise questions of accountability. </span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Countries in the global south struggle with capacity. South Africa is no exception. Ramaphosa has promised that one million more young people will be trained in data science in the next decade in South Africa. There is scope for the private sector to play a bigger role in developing human know-how in order to reap the benefits of big tech for society in general. This will also help identify “blind spots” before they’re exploited by those breaking the law. </span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">So what laws are we referring to when it comes to those who abuse big data or commit cybercrime? The answer is littered with caveats. South Africa’s law doesn’t fully cover cyber issues. This year the Protection of Personal Information Act (2013) will come into effect. However with organisations having two years to ensure they are compliant, it won’t be until 2022 that we start to see enforcement. </span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">South Africa is also still without a law that deals specifically with cybercrime and cybersecurity. The Cybercrimes and Cybersecurity Bill needs to be approved by Parliament before it is enacted as law. Given the transnational nature of cybercrimes, international law should similarly develop to cover them.</span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Already South Africa is participating at the United Nations level in several initiatives to establish cyber “norms” (agreed rules of state behaviour) to support international human rights law. These include limits on state actions that threaten human rights and the security of users. </span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But there is a sense among many international players that at a global level South Africa could use its position to show leadership and achieve more for the region as a whole. The country has indicated its desire to “go it alone” by resisting ratifying key cyber conventions such as the Malabo and Budapest conventions, choosing instead to use such treaties as reference points. </span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">While issues of sovereignty are politically sensitive, not least given the view by some in government that such bodies are “elite clubs” that set the rules, the exponential nature of technological change needs a decisive and timely response. This would help ensure that Africa as a whole doesn’t become a “safe haven” for cyber criminals, cyber terrorists and more.</span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">At a domestic level there are practical steps that could be considered in the short term to fortify countries against cyber attacks. Closer government engagement with the private sector could help build the human and technical capacity to withstand threats. That may include upscaling skills exchange programmes, and deploying industry specialists to engage in global conversations on creating an ecosystem to minimise future threats. </span></span></p>\r\n<p lang=\"en-US\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Politics and ideology must not be allowed to stand in the way of building a consensus among African states, industry, government and civil society to develop a robust response to future threats. <u><b>DM</b></u></span></span></p>\r\n<a name=\"_GoBack\"></a> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>Karen Allen is a senior research adviser, Emerging Threats in Africa, ISS</i></span></span>",
"teaser": "Policing the Fourth Industrial Revolution in sub-Saharan Africa",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "23372",
"name": "Karen Allen",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/karen-allen/",
"editorialName": "karen-allen",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "2760",
"name": "Africa",
"url": "https://staging.dailymaverick.co.za/keyword/africa/",
"slug": "africa",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Africa",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "5371",
"name": "Cyberspace",
"url": "https://staging.dailymaverick.co.za/keyword/cyberspace/",
"slug": "cyberspace",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cyberspace",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "5505",
"name": "Security",
"url": "https://staging.dailymaverick.co.za/keyword/security/",
"slug": "security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "92414",
"name": "Fourth Industrial Revolution",
"url": "https://staging.dailymaverick.co.za/keyword/fourth-industrial-revolution/",
"slug": "fourth-industrial-revolution",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Fourth Industrial Revolution",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "106304",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/gfduGj8psRRZ89-OyvC8cz0DdCQ=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/mue-7LEQzXBY6bAzA8ALEGoyahQ=/450x0/smart/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/lLvfp84Dv9uJY-ja7C9g8RH__vQ=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/lbeeG7ypLWRdqZ1seAwtzD4f4q8=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/Uz-gNdUPsXHIWSCqGxQQo8mvObQ=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/gfduGj8psRRZ89-OyvC8cz0DdCQ=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/mue-7LEQzXBY6bAzA8ALEGoyahQ=/450x0/smart/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/lLvfp84Dv9uJY-ja7C9g8RH__vQ=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/lbeeG7ypLWRdqZ1seAwtzD4f4q8=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/Uz-gNdUPsXHIWSCqGxQQo8mvObQ=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-09-09-iss-today-4ir-banner.jpg",
"type": "image"
}
],
"summary": "Can South Africa lead the way in reducing the risks of cyberspace to human security? ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Policing the Fourth Industrial Revolution in sub-Saharan Africa",
"search_description": "<span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>First published by </i></span></span></span><a href=\"https://issafrica.org/iss-today\"><span ",
"social_title": "Policing the Fourth Industrial Revolution in sub-Saharan Africa",
"social_description": "<span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>First published by </i></span></span></span><a href=\"https://issafrica.org/iss-today\"><span ",
"social_image": ""
},
"cached": true,
"access_allowed": true
}