Show simple item record

dc.contributor.authorRoberts, Tony
dc.contributor.authorGitahi, Judy
dc.contributor.authorAllam, Patrick
dc.contributor.authorOboh, Lawrence
dc.contributor.authorOladapo, Oyewole
dc.contributor.authorAppiah-Adjei, Gifty
dc.contributor.authorGalal, Amira
dc.contributor.authorKainja, Jimmy
dc.contributor.authorPhiri, Sam
dc.contributor.authorAbraham, Kiss
dc.contributor.authorKlovig Skelton, Sebastian
dc.contributor.authorSheombar, Anand
dc.date.accessioned2023-09-25T09:23:06Z
dc.date.available2023-09-25T09:23:06Z
dc.date.issued2023-09-25
dc.identifier.citationRoberts, T. et al. (2023) Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia, Brighton: Institute of Development Studies, DOI: 10.19088/IDS.2023.027en
dc.identifier.urihttps://opendocs.ids.ac.uk/opendocs/handle/20.500.12413/18120
dc.description.abstractAfrican governments are spending over 1US$bn per year on digital surveillance technologies which are being used without adequate legal protections in ways that regularly violate citizens’ fundamental human rights. This report documents which companies, from which countries, are supplying which types of surveillance technology to African governments. Without this missing detail, it is impossible to adequately design measures to mitigate and overcome illegal surveillance and violations of human rights. Since the turn of the century, we have witnessed a digitalisation of surveillance that has enabled the algorithmic automation of surveillance at a scale not previously imaginable. Surveillance of citizens was once a labour and time-intensive process. This provided a practical limit to the scope and depth of state surveillance. The digitalisation of telephony has made it possible to automate the search for keywords across all mobile and internet communications. For the first time, state surveillance agencies can do two things: (a) conduct mass surveillance of all citizens’ communications, and (b) micro-target individuals for in-depth surveillance that draws together in real-time data from mobile calls, short message service (SMS), internet messaging, global positioning system (GPS) location, and financial transactions. This report was produced by qualitative analysis of open-source data in the public domain. The information presented is drawn from a diverse range of sources, including open government data sets, export licence portals, procurement notices, civil society databases of surveillance contracts, press releases from surveillance companies, academic articles, reports, and media coverage. The research is organised using a typology of five categories of surveillance technology. We did not set out to detail every technology available, every company, or every supply contract. Instead, we document the main companies and countries selling digital surveillance technologies to African governments. Rather than focus on the technical functionality distinguishing each product offering, we highlight five of the most important types of surveillance technology: internet interception, mobile interception, social media surveillance, ‘safe city’ technologies for the surveillance of public spaces, and biometric identification technologies.en
dc.description.sponsorshipCivic Futuresen
dc.language.isoenen
dc.publisherInstitute of Development Studiesen
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/en
dc.titleMapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambiaen
dc.rights.holderInstitute of Development Studiesen
dc.identifier.doi10.19088/IDS.2023.027
rioxxterms.funderDefault funderen
rioxxterms.identifier.projectDefault projecten
rioxxterms.versionVoRen
rioxxterms.versionofrecord10.19088/IDS.2023.027en
rioxxterms.funder.projecte4b8632d-62dd-4f31-9936-43860ac26f9aen


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

http://creativecommons.org/licenses/by/4.0/
Except where otherwise noted, this item's license is described as http://creativecommons.org/licenses/by/4.0/