All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "885237",
"signature": "Article:885237",
"url": "https://staging.dailymaverick.co.za/article/2021-04-07-tech-enabled-social-engineering-casting-digital-shadows-across-africa/",
"shorturl": "https://staging.dailymaverick.co.za/article/885237",
"slug": "tech-enabled-social-engineering-casting-digital-shadows-across-africa",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Tech-enabled social engineering casting digital shadows across Africa",
"firstPublished": "2021-04-07 14:48:40",
"lastUpdate": "2021-04-07 14:48:40",
"categories": [
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "134172",
"name": "Maverick Citizen",
"signature": "Category:134172",
"slug": "maverick-citizen",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-citizen/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "239338",
"name": "COVID-19",
"signature": "Category:239338",
"slug": "covid-19",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/covid-19/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6289,
"contents": "<b> </b><i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a>\r\n\r\n<span style=\"font-weight: 400;\">Within a year, much of the world has adopted the norm of wearing masks to protect against the Covid-19 pandemic. Notwithstanding the political jostling that such face coverings have come to represent, it has become a social norm driven by circumstance. </span>\r\n\r\n<span style=\"font-weight: 400;\">Scholars have undertaken extensive </span><a href=\"https://adambrown.info/p/notes/finnemore_and_sikkink_international_norm_dynamics_and_political_change\"><span style=\"font-weight: 400;\">work</span></a><span style=\"font-weight: 400;\"> on the life cycle of norms to demonstrate how they cascade into society and eventually become internalised.</span>\r\n\r\n<span style=\"font-weight: 400;\">But to what extent does technology have a normative function – the power to shape human behaviour and deliver real-world consequences? In the absence of robust safeguards and in states with fragile democracies, could Africa become a testing ground for tech-enabled social engineering? Shaping norms or beliefs, governing how we vote, who we love and stirring up existing ethnic or religious cleavages?</span>\r\n\r\n<span style=\"font-weight: 400;\">Information disorders expert Eleonore Pauwels argues that the convergence of artificial intelligence and data-capture capability threatens to </span><a href=\"https://www.kas.de/en/web/newyork/single-title/-/content/the-anatomy-of-information-disorders-in-africa\"><span style=\"font-weight: 400;\">undermine</span></a><span style=\"font-weight: 400;\"> institutions that form the bedrock of democracies. </span>\r\n\r\n<span style=\"font-weight: 400;\">The rapid emergence of artificial intelligence tech tools across Africa coupled with powerful social media platforms such as Facebook, Reddit and Twitter has made data a commodity. Some commentators describe it as the new </span><a href=\"https://www.wired.com/insights/2014/07/data-new-oil-digital-economy/\"><span style=\"font-weight: 400;\">oil</span></a><span style=\"font-weight: 400;\">. These tech tools include biometric databases for tracking population movements at borders, registering voters before elections or documenting key life events (births, marriages and deaths). </span>\r\n\r\n<span style=\"font-weight: 400;\">Besides capturing human behaviour, likes and preferences, technology potentially has the power to shape it, Pauwels argued at a webinar on </span><a href=\"https://www.youtube.com/watch?v=3ILkj03oDLA\"><span style=\"font-weight: 400;\">surveillance</span></a><span style=\"font-weight: 400;\"> and information disorder in Africa last month. Artificial intelligence and data capture technologies together form a powerful alliance that enables micro-targeting and precision messaging, she says.</span>\r\n\r\n<span style=\"font-weight: 400;\">Institute for Security Studies (ISS) </span><a href=\"https://enactafrica.org/research/research-papers/whos-watching-who-biometric-surveillance-in-kenya-and-south-africa\"><span style=\"font-weight: 400;\">research</span></a><span style=\"font-weight: 400;\"> shows that the ‘digital exhaust’ we leave behind on the internet – and the personal biometric information captured on CCTV cameras in shops or from centralised databases when we register to vote or apply for a driving licence – provides the raw material for data manipulation in Africa.</span>\r\n\r\n<span style=\"font-weight: 400;\">According to Pauwels, human beings are rapidly becoming “data points” or “digital bodies and minds” whose exact location and biometric features can be matched in real-time. This can have profound implications for personal privacy and security.</span>\r\n\r\n<span style=\"font-weight: 400;\">She says that unless checked, machine learning technologies have the potential to override or shape human judgement and political agency. This is especially true in settings where democratic checks and balances are still fragile. For this reason, numerous African countries including Zimbabwe and Kenya have been the focus of her work.</span>\r\n\r\n<span style=\"font-weight: 400;\">The purpose of analysing our “digital bodies and minds” is, among others, to manipulate group conversations and behaviours either for political or commercial gain. This can create chaos or assert control, particularly during election times or periods of national emergency such as a war or pandemic. </span>\r\n\r\n<span style=\"font-weight: 400;\">The ISS has demonstrated how potent algorithms can help amplify xenophobic narratives. The South African case </span><a href=\"https://enactafrica.org/events/digital-vigilantism-and-social-media-organised-crimes-untested-terrain\"><span style=\"font-weight: 400;\">study</span></a><span style=\"font-weight: 400;\"> shows how messages could find reach far beyond what might be expected in the ‘real’ (rather than virtual) world. Pauwels’s research builds on this idea, highlighting the use of botnets by those wishing to control a message for viral propagation and to optimise search engine and algorithmic content regulation.</span>\r\n\r\n<span style=\"font-weight: 400;\">Such potent social manipulation tools are being monetised, enabling data capture companies such as the now-disbanded Cambridge Analytica to identify individuals’ “deepest fears, hatreds and prejudices to influence elections,” Pauwels asserts. </span>\r\n\r\n<span style=\"font-weight: 400;\">Using Kenya’s 2013 and 2017 elections as a case study, she documents how existing ethnic tensions in Kenya were exploited by similar commercial entities, explaining that “in 2017 WhatApp groups, including non-political ones, were inundated with incendiary ethno-nationalist rhetoric, mis- and disinformation.” </span>\r\n\r\n<span style=\"font-weight: 400;\">This raw material – i.e. personal data – was illegally acquired by political parties and deployed as part of their communications strategy. This practice is outlined in more detail in a Strathmore University Centre for Intellectual Property and Information Technology Law report.</span>\r\n\r\n<span style=\"font-weight: 400;\">Another form of social manipulation comes from technology’s ability to automatically “generate new content such as photographs, video and text” creating so-called deep fakes. These have significant implications for the future of propaganda, deception and social engineering. </span>\r\n\r\n<span style=\"font-weight: 400;\">They can also generate </span><a href=\"https://cpr.unu.edu/research/projects/the-new-geopolitics-of-converging-risks-the-un-and-prevention-in-the-era-of-ai.html#outline\"><span style=\"font-weight: 400;\">fake</span></a><span style=\"font-weight: 400;\"> intelligence scenarios, paving the way to what some scholars have described as digital dictatorships and providing a pretext for social control and securitising legislation aimed at curbing its use. </span>\r\n\r\n<span style=\"font-weight: 400;\">Such fake scenarios can enable illiberal states to silence dissent. The shutdown of social media platforms has already been observed in Uganda and Ethiopia in recent months with the justification that national security is under threat.</span>\r\n\r\n<span style=\"font-weight: 400;\">Social engineering may also take the form of determining what information citizens have access to via the internet. Freedom House argues that the system’s current weakness has played into the hands of less democratic governments looking to increase their </span><a href=\"https://freedomhouse.org/article/rise-digital-authoritarianism-fake-news-data-collection-and-challenge-democracy\"><span style=\"font-weight: 400;\">control</span></a><span style=\"font-weight: 400;\"> of the internet.</span>\r\n\r\n<span style=\"font-weight: 400;\">And the very existence of such data monitoring, using equipment provided by foreign entities such as China, can impose new surveillance norms on populations that host the latest technology. This “cyber nationalism” potentially normalises pervasive digital surveillance, and there’s scope for much research to be done on the role of foreign actors in this sphere.</span>\r\n\r\n<span style=\"font-weight: 400;\">For all these reasons, policymakers need to consider the blind spots of such mass capture technologies. Although new data laws are coming on stream setting out strict rules regarding how data is captured, stored and </span><a href=\"https://popia.co.za/\"><span style=\"font-weight: 400;\">limiting</span></a><span style=\"font-weight: 400;\"> its reuse, the enforcement of new regulations will be severely tested.</span>\r\n\r\n<span style=\"font-weight: 400;\">In the rush to develop centralised biometric databases, algorithms need to be open to inspection and a new culture of ethical technology (possibly with incentives and sanctions) must be developed. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Karen Allen, Senior Research Adviser, ISS Pretoria.</span></i>\r\n\r\n ",
"teaser": "Tech-enabled social engineering casting digital shadows across Africa",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "23372",
"name": "Karen Allen",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/karen-allen/",
"editorialName": "karen-allen",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "2760",
"name": "Africa",
"url": "https://staging.dailymaverick.co.za/keyword/africa/",
"slug": "africa",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Africa",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "7647",
"name": "Democracy",
"url": "https://staging.dailymaverick.co.za/keyword/democracy/",
"slug": "democracy",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Democracy",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "41738",
"name": "ISS Today",
"url": "https://staging.dailymaverick.co.za/keyword/iss-today/",
"slug": "iss-today",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "ISS Today",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "52684",
"name": "Social engineering",
"url": "https://staging.dailymaverick.co.za/keyword/social-engineering/",
"slug": "social-engineering",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Social engineering",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "232858",
"name": "Covid-19",
"url": "https://staging.dailymaverick.co.za/keyword/covid19/",
"slug": "covid19",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Covid-19",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348845",
"name": "Karen Allen",
"url": "https://staging.dailymaverick.co.za/keyword/karen-allen/",
"slug": "karen-allen",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Karen Allen",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348846",
"name": "data manipulation",
"url": "https://staging.dailymaverick.co.za/keyword/data-manipulation/",
"slug": "data-manipulation",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "data manipulation",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "348847",
"name": "botnets",
"url": "https://staging.dailymaverick.co.za/keyword/botnets/",
"slug": "botnets",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "botnets",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "79919",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/g0Buz1A6BOGWLTpNfmKMKsx6c9U=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/97rh9cLQtCs_bxu7tZ339Bx84ok=/450x0/smart/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/6xjPvSFvI4ZioPDNsVJseNO6FSw=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/zPfADxvS7_zzV5uXLxu03jee9b4=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/b-PXt63d85HMDmjKBA7Trzqv-hQ=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/g0Buz1A6BOGWLTpNfmKMKsx6c9U=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/97rh9cLQtCs_bxu7tZ339Bx84ok=/450x0/smart/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/6xjPvSFvI4ZioPDNsVJseNO6FSw=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/zPfADxvS7_zzV5uXLxu03jee9b4=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/b-PXt63d85HMDmjKBA7Trzqv-hQ=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/tess-fakenews-elections-explainer.jpg",
"type": "image"
}
],
"summary": "The absence of robust safeguards leaves many countries on the continent vulnerable to personal and political data manipulation. ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Tech-enabled social engineering casting digital shadows across Africa",
"search_description": "<b> </b><i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a>\r\n\r\n<span style=\"font-weig",
"social_title": "Tech-enabled social engineering casting digital shadows across Africa",
"social_description": "<b> </b><i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a>\r\n\r\n<span style=\"font-weig",
"social_image": ""
},
"cached": true,
"access_allowed": true
}