The Institute of Development Studies and Partner Organisations
Browse
DOCUMENT
ADRN_Surveillance_Supply_Chain_Report.pdf (1.93 MB)
DOCUMENT
ADRN_Surveillance_Supply_Chain_Report_Executive_Summary.pdf (870.44 kB)
DOCUMENT
ADRN_Surveillance_Supply_Chain_Report_Nigeria_Country_Report.pdf (284.73 kB)
DOCUMENT
ADRN_Surveillance_Supply_Chain_Report_Ghana_Country_Report.pdf (138.81 kB)
DOCUMENT
ADRN_Surveillance_Supply_Chain_Report_Morocco_Country_Report.pdf (193.09 kB)
DOCUMENT
ADRN_Surveillance_Supply_Chain_Report_Malawi_Country_Report.pdf (152.46 kB)
DOCUMENT
ADRN_Surveillance_Supply_Chain_Report_Zambia_Country_Report.pdf (116.73 kB)
DOCUMENT
ADRN_Surveillance_Supply_Chain_Report_Supply-side_Report.pdf (216.51 kB)
1/0
8 files

Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia

online resource
posted on 2024-09-05, 21:12 authored by Tony Roberts, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal, Jimmy Kainja, Sam Phiri, Kiss Abraham, Sebastian Klovig Skelton, Anand Sheombar
African governments are spending over 1US$bn per year on digital surveillance technologies which are being used without adequate legal protections in ways that regularly violate citizens’ fundamental human rights. This report documents which companies, from which countries, are supplying which types of surveillance technology to African governments. Without this missing detail, it is impossible to adequately design measures to mitigate and overcome illegal surveillance and violations of human rights. Since the turn of the century, we have witnessed a digitalisation of surveillance that has enabled the algorithmic automation of surveillance at a scale not previously imaginable. Surveillance of citizens was once a labour and time-intensive process. This provided a practical limit to the scope and depth of state surveillance. The digitalisation of telephony has made it possible to automate the search for keywords across all mobile and internet communications. For the first time, state surveillance agencies can do two things: (a) conduct mass surveillance of all citizens’ communications, and (b) micro-target individuals for in-depth surveillance that draws together in real-time data from mobile calls, short message service (SMS), internet messaging, global positioning system (GPS) location, and financial transactions. This report was produced by qualitative analysis of open-source data in the public domain. The information presented is drawn from a diverse range of sources, including open government data sets, export licence portals, procurement notices, civil society databases of surveillance contracts, press releases from surveillance companies, academic articles, reports, and media coverage. The research is organised using a typology of five categories of surveillance technology. We did not set out to detail every technology available, every company, or every supply contract. Instead, we document the main companies and countries selling digital surveillance technologies to African governments. Rather than focus on the technical functionality distinguishing each product offering, we highlight five of the most important types of surveillance technology: internet interception, mobile interception, social media surveillance, ‘safe city’ technologies for the surveillance of public spaces, and biometric identification technologies.

Funding

Civic Futures

History

Publisher

Institute of Development Studies

Citation

Roberts, T. et al. (2023) Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia, Brighton: Institute of Development Studies, DOI: 10.19088/IDS.2023.027

Version

  • VoR (Version of Record)

Copyright holder

Institute of Development Studies

Language

en

Project identifier

Default project::e4b8632d-62dd-4f31-9936-43860ac26f9a::600

Usage metrics

    @ IDS Research

    Categories

    No categories selected

    Licence

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC