All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1104349",
"signature": "Article:1104349",
"url": "https://staging.dailymaverick.co.za/article/2021-11-22-the-pandora-papers-effective-use-of-open-source-data-can-be-a-treasure-trove-to-curb-potential-for-corruption-in-south-africa/",
"shorturl": "https://staging.dailymaverick.co.za/article/1104349",
"slug": "the-pandora-papers-effective-use-of-open-source-data-can-be-a-treasure-trove-to-curb-potential-for-corruption-in-south-africa",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "The 'Pandora Papers': Effective use of open-source data can be a treasure trove to curb potential for corruption in South Africa",
"firstPublished": "2021-11-22 13:40:50",
"lastUpdate": "2021-11-22 13:40:50",
"categories": [
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6422,
"contents": "<span style=\"font-weight: 400;\">On 3 October the International Consortium of Investigative Journalists released the ‘</span><a href=\"https://www.icij.org/investigations/pandora-papers/about-pandora-papers-leak-dataset/\"><span style=\"font-weight: 400;\">Pandora</span></a><span style=\"font-weight: 400;\"> Papers’ — a treasure trove of documents exposing attempts by wealthy elites to hide their assets and cash in offshore tax havens. </span>\r\n\r\n<span style=\"font-weight: 400;\">Thirty-five current and former heads of state were named after 2.9 terabytes of leaked data that were processed, picked over, packaged and published by a global team of hundreds of journalists. It’s a potent reminder of the power of data and its ability to expose illicit cash flows and dubious business deals that deprive the fiscus of much-needed tax revenues. </span>\r\n\r\n<p><img loading=\"lazy\" class=\"wp-image-1104352\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2021/11/Pandora-Papers-Graph-.png\" alt=\"\" width=\"720\" height=\"530\" /> Breakdown of the contents of the 2.9 terabyte Pandora Papers leak. (Graph: Supplied by ISS Today)</p>\r\n\r\n<span style=\"font-weight: 400;\">In Africa, where many of the pillars of democracy remain fragile, including a free media, the use of data to force accountability is one of the transformative properties of emerging tech. While caution is needed in an era of fake news and deliberate mis/disinformation campaigns, the power of data to achieve greater accountability of those elected or appointed to serve the public cannot be underestimated.</span>\r\n\r\n<span style=\"font-weight: 400;\">The Pandora Papers and its 2016 predecessor, the </span><a href=\"https://www.icij.org/investigations/panama-papers/\"><span style=\"font-weight: 400;\">Panama</span></a><span style=\"font-weight: 400;\"> Papers, were based on leaked data. But the development of investigative databases to hold public bodies such as municipal authorities or police departments to account, and open-source investigation tools (OSINT), make it </span><a href=\"https://issafrica.org/crimehub/iss-today/using-digital-tools-against-financial-crime-and-corruption\"><span style=\"font-weight: 400;\">easier</span></a><span style=\"font-weight: 400;\"> for investigators to follow the electronic clues. </span>\r\n\r\n<span style=\"font-weight: 400;\">This is what the experts often call the ‘digital exhaust’ that follows our every interaction online. Machine learning and powerful algorithms have enabled huge troves of data to be organised methodically and processed at speed in a way that wasn’t previously possible. The data can be packaged and contextualised in a timely manner that demands action.</span>\r\n\r\n<span style=\"font-weight: 400;\">It is important to distinguish between leaked data such as the Pandora and Panama Papers, and open-source data, which anyone can access on the internet through OSINT tools. These include applications such as </span><a href=\"https://medium.com/infosec/exploring-google-hacking-techniques-using-google-dork-6df5d79796cf\"><span style=\"font-weight: 400;\">Google Dork</span></a><span style=\"font-weight: 400;\">,</span><span style=\"font-weight: 400;\"> which allow search operators to identify specific details of a person/company or other entity buried in websites.</span>\r\n\r\n<span style=\"font-weight: 400;\">In contrast, leaked data isn’t always made public. Some may be redacted by journalists or non-governmental organisations (NGOs) before the details are released into the public domain. They are essentially ‘gatekeepers’, and one of their key functions is to give the leaked material context. </span>\r\n\r\n<span style=\"font-weight: 400;\">Having leaked data in the public domain is essential because it also gives law enforcement access to investigate illicit flows, corruption, and other financial crimes. This is an ethical issue insofar as journalists and NGOs consider themselves as conveyors of information, but not cyber sleuths or intelligence operatives acting on behalf of the state.</span>\r\n\r\n<span style=\"font-weight: 400;\">Civil society organisations in South Africa are using open-source data tools to encourage citizens to hold government agencies to account. “While we haven’t the skills and resources to use forensic technology,” argues David Lewis, Executive Director of Corruption Watch, “we are using contemporary tech to assist us on the ground.”</span>\r\n\r\n<span style=\"font-weight: 400;\">At the beginning of 2021, Corruption Watch launched the </span><a href=\"https://www.corruptionwatch.org.za/event/launch-of-the-veza-tool-for-increased-police-transparency-and-accountability/\"><span style=\"font-weight: 400;\">Veza Tool</span></a><span style=\"font-weight: 400;\"> to make the police service more accountable. Veza, which means to ‘expose’ or ‘reveal’ in isiZulu, aims to combat corruption and “break the cycle of impunity in the police service.” The app enables citizens to access details of police resources, locations and personnel across the country using heat maps. They can then compare these with lived experiences. </span>\r\n\r\n<span style=\"font-weight: 400;\">Lewis sees enormous potential in developing data tools to force more responsibility in South Africa. “We are trying to build up a best practice on procurement, but if the country had a database that listed every single contract, it would make accountability so much easier.” </span><i><span style=\"font-weight: 400;\">ISS Today</span></i><span style=\"font-weight: 400;\"> understands research is underway to develop a tool that would match the allocation of South African government tenders against a database of government officials, to expose patronage networks.</span>\r\n\r\n<span style=\"font-weight: 400;\">The World Bank recently hosted a </span><a href=\"https://www.worldbank.org/en/events/2021/10/25/symposium-on-data-analytics-and-anticorruption\"><span style=\"font-weight: 400;\">symposium</span></a><span style=\"font-weight: 400;\"> on using data tools to detect and measure corruption and assess the effectiveness of policies designed to combat it. Among the analytics being run largely in Europe — which could be replicated in Africa with sufficient funding support — are European Public Accountability </span><a href=\"http://europam.eu/\"><span style=\"font-weight: 400;\">Mechanisms</span></a><span style=\"font-weight: 400;\">. These examine political financing and public procurement. Another, </span><a href=\"https://opentender.eu/start\"><span style=\"font-weight: 400;\">Opentender</span></a><span style=\"font-weight: 400;\">, analyses tender data mainly from European jurisdictions.</span>\r\n\r\n<span style=\"font-weight: 400;\">Using open-source research techniques by organisations such as Bellingcat has enabled researchers to access free online tools. These include programmes or applications to track shipping and aircraft movements and geolocating individuals or objects such as military hardware. It also provides reverse engineering technology for verification and accessing phone and email databases. </span>\r\n\r\n<span style=\"font-weight: 400;\">Bellingcat’s methodologies are frequently made public, and their findings have exposed alleged human rights abuses in Africa, including in Cameroon and </span><a href=\"https://www.washingtonpost.com/news/monkey-cage/wp/2016/02/23/heres-how-you-catch-atrocities-and-rights-violations-were-looking-at-you-burundi/\"><span style=\"font-weight: 400;\">Burundi</span></a><span style=\"font-weight: 400;\">,</span><span style=\"font-weight: 400;\"> which become a catalyst for legal investigations. They’ve also been used to uncover information campaigns regarding the notorious </span><a href=\"https://www.bellingcat.com/news/africa/2017/08/04/guptaleaks-google-analytics/\"><span style=\"font-weight: 400;\">Gupta</span></a><span style=\"font-weight: 400;\"> family in South Africa and shed light on Russia’s shadowy </span><a href=\"https://twitter.com/bellingcat/status/1294189542623383552\"><span style=\"font-weight: 400;\">Wagner</span></a><span style=\"font-weight: 400;\"> Group’s operations in Africa.</span>\r\n\r\n<span style=\"font-weight: 400;\">Access to alternative data is a powerful bulwark against attempts to erode the democratic space, especially when newspapers are silenced and social media sites switched off in numerous African countries. Arguably, the monopoly of information enjoyed by many states for years is rapidly being eroded.</span>\r\n\r\n<span style=\"font-weight: 400;\">For those African governments committed to consolidating their democracies, this is an opportunity for state prosecutors, investigators and other government officials to arm themselves with new data tools. They should embrace the power of big data to facilitate accountability and efficiency, tackle criminality and improve service delivery, thereby setting a standard for other African states to follow. </span>\r\n\r\n<span style=\"font-weight: 400;\">African policymakers and their partners should consider working with academic institutions and the private sector to develop similar databases to the accountability tools being rolled out across Europe. These would arm citizens with information to confront transgressions and offer investigators leads to gather further evidence to mount prosecutions. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Karen Allen, Consultant, ISS Pretoria.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a><span style=\"font-weight: 400;\">.</span>",
"teaser": "The 'Pandora Papers': Effective use of open-source data can be a treasure trove to curb potential for corruption in South Africa",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "23372",
"name": "Karen Allen",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/karen-allen/",
"editorialName": "karen-allen",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "11846",
"name": "Panama Papers",
"url": "https://staging.dailymaverick.co.za/keyword/panama-papers/",
"slug": "panama-papers",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Panama Papers",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "62041",
"name": "Corruption Watch",
"url": "https://staging.dailymaverick.co.za/keyword/corruption-watch/",
"slug": "corruption-watch",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Corruption Watch",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "359778",
"name": "Pandora Papers",
"url": "https://staging.dailymaverick.co.za/keyword/pandora-papers/",
"slug": "pandora-papers",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Pandora Papers",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "362478",
"name": "offshore tax haven",
"url": "https://staging.dailymaverick.co.za/keyword/offshore-tax-haven/",
"slug": "offshore-tax-haven",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "offshore tax haven",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "57003",
"name": "Breakdown of the contents of the 2.9 terabyte Pandora Papers leak. (Graph: Supplied by ISS Today)",
"description": "<span style=\"font-weight: 400;\">On 3 October the International Consortium of Investigative Journalists released the ‘</span><a href=\"https://www.icij.org/investigations/pandora-papers/about-pandora-papers-leak-dataset/\"><span style=\"font-weight: 400;\">Pandora</span></a><span style=\"font-weight: 400;\"> Papers’ — a treasure trove of documents exposing attempts by wealthy elites to hide their assets and cash in offshore tax havens. </span>\r\n\r\n<span style=\"font-weight: 400;\">Thirty-five current and former heads of state were named after 2.9 terabytes of leaked data that were processed, picked over, packaged and published by a global team of hundreds of journalists. It’s a potent reminder of the power of data and its ability to expose illicit cash flows and dubious business deals that deprive the fiscus of much-needed tax revenues. </span>\r\n\r\n[caption id=\"attachment_1104352\" align=\"aligncenter\" width=\"720\"]<img class=\"wp-image-1104352\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/2021/11/Pandora-Papers-Graph-.png\" alt=\"\" width=\"720\" height=\"530\" /> Breakdown of the contents of the 2.9 terabyte Pandora Papers leak. (Graph: Supplied by ISS Today)[/caption]\r\n\r\n<span style=\"font-weight: 400;\">In Africa, where many of the pillars of democracy remain fragile, including a free media, the use of data to force accountability is one of the transformative properties of emerging tech. While caution is needed in an era of fake news and deliberate mis/disinformation campaigns, the power of data to achieve greater accountability of those elected or appointed to serve the public cannot be underestimated.</span>\r\n\r\n<span style=\"font-weight: 400;\">The Pandora Papers and its 2016 predecessor, the </span><a href=\"https://www.icij.org/investigations/panama-papers/\"><span style=\"font-weight: 400;\">Panama</span></a><span style=\"font-weight: 400;\"> Papers, were based on leaked data. But the development of investigative databases to hold public bodies such as municipal authorities or police departments to account, and open-source investigation tools (OSINT), make it </span><a href=\"https://issafrica.org/crimehub/iss-today/using-digital-tools-against-financial-crime-and-corruption\"><span style=\"font-weight: 400;\">easier</span></a><span style=\"font-weight: 400;\"> for investigators to follow the electronic clues. </span>\r\n\r\n<span style=\"font-weight: 400;\">This is what the experts often call the ‘digital exhaust’ that follows our every interaction online. Machine learning and powerful algorithms have enabled huge troves of data to be organised methodically and processed at speed in a way that wasn’t previously possible. The data can be packaged and contextualised in a timely manner that demands action.</span>\r\n\r\n<span style=\"font-weight: 400;\">It is important to distinguish between leaked data such as the Pandora and Panama Papers, and open-source data, which anyone can access on the internet through OSINT tools. These include applications such as </span><a href=\"https://medium.com/infosec/exploring-google-hacking-techniques-using-google-dork-6df5d79796cf\"><span style=\"font-weight: 400;\">Google Dork</span></a><span style=\"font-weight: 400;\">,</span><span style=\"font-weight: 400;\"> which allow search operators to identify specific details of a person/company or other entity buried in websites.</span>\r\n\r\n<span style=\"font-weight: 400;\">In contrast, leaked data isn’t always made public. Some may be redacted by journalists or non-governmental organisations (NGOs) before the details are released into the public domain. They are essentially ‘gatekeepers’, and one of their key functions is to give the leaked material context. </span>\r\n\r\n<span style=\"font-weight: 400;\">Having leaked data in the public domain is essential because it also gives law enforcement access to investigate illicit flows, corruption, and other financial crimes. This is an ethical issue insofar as journalists and NGOs consider themselves as conveyors of information, but not cyber sleuths or intelligence operatives acting on behalf of the state.</span>\r\n\r\n<span style=\"font-weight: 400;\">Civil society organisations in South Africa are using open-source data tools to encourage citizens to hold government agencies to account. “While we haven’t the skills and resources to use forensic technology,” argues David Lewis, Executive Director of Corruption Watch, “we are using contemporary tech to assist us on the ground.”</span>\r\n\r\n<span style=\"font-weight: 400;\">At the beginning of 2021, Corruption Watch launched the </span><a href=\"https://www.corruptionwatch.org.za/event/launch-of-the-veza-tool-for-increased-police-transparency-and-accountability/\"><span style=\"font-weight: 400;\">Veza Tool</span></a><span style=\"font-weight: 400;\"> to make the police service more accountable. Veza, which means to ‘expose’ or ‘reveal’ in isiZulu, aims to combat corruption and “break the cycle of impunity in the police service.” The app enables citizens to access details of police resources, locations and personnel across the country using heat maps. They can then compare these with lived experiences. </span>\r\n\r\n<span style=\"font-weight: 400;\">Lewis sees enormous potential in developing data tools to force more responsibility in South Africa. “We are trying to build up a best practice on procurement, but if the country had a database that listed every single contract, it would make accountability so much easier.” </span><i><span style=\"font-weight: 400;\">ISS Today</span></i><span style=\"font-weight: 400;\"> understands research is underway to develop a tool that would match the allocation of South African government tenders against a database of government officials, to expose patronage networks.</span>\r\n\r\n<span style=\"font-weight: 400;\">The World Bank recently hosted a </span><a href=\"https://www.worldbank.org/en/events/2021/10/25/symposium-on-data-analytics-and-anticorruption\"><span style=\"font-weight: 400;\">symposium</span></a><span style=\"font-weight: 400;\"> on using data tools to detect and measure corruption and assess the effectiveness of policies designed to combat it. Among the analytics being run largely in Europe — which could be replicated in Africa with sufficient funding support — are European Public Accountability </span><a href=\"http://europam.eu/\"><span style=\"font-weight: 400;\">Mechanisms</span></a><span style=\"font-weight: 400;\">. These examine political financing and public procurement. Another, </span><a href=\"https://opentender.eu/start\"><span style=\"font-weight: 400;\">Opentender</span></a><span style=\"font-weight: 400;\">, analyses tender data mainly from European jurisdictions.</span>\r\n\r\n<span style=\"font-weight: 400;\">Using open-source research techniques by organisations such as Bellingcat has enabled researchers to access free online tools. These include programmes or applications to track shipping and aircraft movements and geolocating individuals or objects such as military hardware. It also provides reverse engineering technology for verification and accessing phone and email databases. </span>\r\n\r\n<span style=\"font-weight: 400;\">Bellingcat’s methodologies are frequently made public, and their findings have exposed alleged human rights abuses in Africa, including in Cameroon and </span><a href=\"https://www.washingtonpost.com/news/monkey-cage/wp/2016/02/23/heres-how-you-catch-atrocities-and-rights-violations-were-looking-at-you-burundi/\"><span style=\"font-weight: 400;\">Burundi</span></a><span style=\"font-weight: 400;\">,</span><span style=\"font-weight: 400;\"> which become a catalyst for legal investigations. They’ve also been used to uncover information campaigns regarding the notorious </span><a href=\"https://www.bellingcat.com/news/africa/2017/08/04/guptaleaks-google-analytics/\"><span style=\"font-weight: 400;\">Gupta</span></a><span style=\"font-weight: 400;\"> family in South Africa and shed light on Russia’s shadowy </span><a href=\"https://twitter.com/bellingcat/status/1294189542623383552\"><span style=\"font-weight: 400;\">Wagner</span></a><span style=\"font-weight: 400;\"> Group’s operations in Africa.</span>\r\n\r\n<span style=\"font-weight: 400;\">Access to alternative data is a powerful bulwark against attempts to erode the democratic space, especially when newspapers are silenced and social media sites switched off in numerous African countries. Arguably, the monopoly of information enjoyed by many states for years is rapidly being eroded.</span>\r\n\r\n<span style=\"font-weight: 400;\">For those African governments committed to consolidating their democracies, this is an opportunity for state prosecutors, investigators and other government officials to arm themselves with new data tools. They should embrace the power of big data to facilitate accountability and efficiency, tackle criminality and improve service delivery, thereby setting a standard for other African states to follow. </span>\r\n\r\n<span style=\"font-weight: 400;\">African policymakers and their partners should consider working with academic institutions and the private sector to develop similar databases to the accountability tools being rolled out across Europe. These would arm citizens with information to confront transgressions and offer investigators leads to gather further evidence to mount prosecutions. </span><b>DM</b>\r\n\r\n<i><span style=\"font-weight: 400;\">Karen Allen, Consultant, ISS Pretoria.</span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a><span style=\"font-weight: 400;\">.</span>",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/Y4TsCdJ-pse2fufbHnSfb_K-Veg=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/k9J_0ZYPkqN-9gi8zI6ASXVbFfA=/450x0/smart/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/shijY0ZPXxr-cgkLhdSgsAJv56s=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/NZsNTnapls2akxGibYhXHIvVZJI=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/CvR-sbTUHd88x-3GXTmCt_mWVDI=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/Y4TsCdJ-pse2fufbHnSfb_K-Veg=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg",
"url_medium": "https://dmcdn.whitebeard.net/i/k9J_0ZYPkqN-9gi8zI6ASXVbFfA=/450x0/smart/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg",
"url_large": "https://dmcdn.whitebeard.net/i/shijY0ZPXxr-cgkLhdSgsAJv56s=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg",
"url_xl": "https://dmcdn.whitebeard.net/i/NZsNTnapls2akxGibYhXHIvVZJI=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg",
"url_xxl": "https://dmcdn.whitebeard.net/i/CvR-sbTUHd88x-3GXTmCt_mWVDI=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2021/10/Oped-Milo-PopiaTW.jpeg",
"type": "image"
}
],
"summary": "Alternative forms of information can force accountability, especially in countries where the democratic space is being eroded. ",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "The 'Pandora Papers': Effective use of open-source data can be a treasure trove to curb potential for corruption in South Africa",
"search_description": "<span style=\"font-weight: 400;\">On 3 October the International Consortium of Investigative Journalists released the ‘</span><a href=\"https://www.icij.org/investigations/pandora-papers/about-pandora-pa",
"social_title": "The 'Pandora Papers': Effective use of open-source data can be a treasure trove to curb potential for corruption in South Africa",
"social_description": "<span style=\"font-weight: 400;\">On 3 October the International Consortium of Investigative Journalists released the ‘</span><a href=\"https://www.icij.org/investigations/pandora-papers/about-pandora-pa",
"social_image": ""
},
"cached": false,
"access_allowed": true
}