Abstract
In 2013, former National Security Agency (NSA) contractor Edward Snowden collaborated with journalists to leak documents on the NSA’s spying activities. The NSA is a United States (US) governmental agency responsible for the collection of signals intelligence, or intelligence gleaned from the surveillance of electronics networks (Gill & Phythian, 2012, pp. 79–101). The leaks revealed that the NSA was intercepting the communications of millions of innocent citizens in the USA and elsewhere, through various surveillance programmes. These widespread abuses of citizens’ right to privacy occurred in spite of the fact that the NSA was meant to use programmatic surveillance only to collect evidence of serious crimes or terrorism, which are almost universally considered to be legitimate grounds for surveillance. The documents also showed that the NSA collaborated extensively with other governmental spy agencies, especially those that form part of the ‘Five Eyes’ group of countries. The ‘Five Eyes’ refers to a coalition of countries co-operating with one another to fight terrorism and other national security threats, and includes the USA, the United Kingdom (UK), Australia, New Zealand and Canada (Privacy International, n.d.-b). The Snowden revelations caused widespread outrage, with communications users in many countries protesting against violations of their rights and freedoms.
I would like to acknowledge the assistance of Henry Maina, director of Article 19 East Africa, and Claire Lauterbach, research officer for Privacy International, for providing information for this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Personal communications with Leon Labuschagne, Manager: Marketing and Technology Research, Vastech, 6 April 2017.
- 2.
National Security Agency, ‘X-Keyscore’ (powerpoint presentation’, 25 February 2008, republished in The Guardian, 31 July 2013, https://www.theguardian.com/world/interactive/2013/jul/31/nsa-xkeyscore-program-full-presentation (accessed 13 March 2017).
- 3.
Personal correspondence with Heidi Swart, 5 May 2017.
Bibliography
Anderson, C. (2015). Considerations on Wassenaar arrangement control list additions for surveillance technologies. Retrieved January 10, 2016, from https://www.accessnow.org/cms/assets/uploads/archive/Access%20Wassenaar%20Surveillance%20Export%20Controls%202015.pdf
Bennett, C. (2011). In defence of privacy. Surveillance and Society, 8(4), 487–488.
Cheru, F. (1995). The World Bank and structural adjustment in Africa: A critical view of adjustment in Africa: Reforms, results and the road ahead. Africa Insight, 25(4), 236–240.
Citizenlab. (n.d.). About (company website). Retrieved January 16, 2017, from https://citizenlab.org/about/
Clarke, R. (1988). Information technology and dataveillance. Communications of the ACM, 35(5), 498–499.
Dencik, L., & Cable, J. (2017). The advent of surveillance realism: Public opinion and activist responses to the Snowden leaks. International Journal of Communication, 11, 763–781.
Duncan, J. (2016). Protest nation: The right to protest in South Africa. Durban: University of KwaZulu/Natal Press.
Duncan, J. (in press). Stopping the spies: Constructing and resisting the surveillance state in South Africa. Unpublished manuscript.
European Commission. (2016, August 24). Report from the European Commission to the European Parliament and the Council on the implementation of Regulation (EC) No 428/2009 setting up a community regime for the control of exports, transfer, brokering and transit of dual-use items (report). Retrieved April 27, 2017, from http://trade.ec.europa.eu/doclib/docs/2016/september/tradoc_154929.pdf, p. 9.
European Court of Human Rights. (2017, December 4). Roman Zakharov v. Russia (legal judgement): Para 270. http://hudoc.echr.coe.inteng#{%22fulltext%22:[%22zakharov%22],%22documentcollectionid2%22:[%22GRANDCHAMBER%22,%22CHAMBER%22],%22itemid%22:[%22001-159324%22]}.
FinFisher GmbH. (n.d.). Finspy PC, Remote Monitoring Solutions (product brochure). Wikileaks Spyfiles 4 (database of leaked documents). Retrieved February 24, 2017, from https://wikileaks.org/spyfiles4/documents/FinSpy-Catalog.pdf
Foreign Intelligence Surveillance Court. (2010). Exhibit F: In the matter of foreign governments, foreign factions, foreign entities and foreign based political organisations, Certification 2010 A. Retrieved August 11, 2016, from https://search.edwardsnowden.com/docs/ExhibitF2014-06-30nsadocs
Foucault, M. (1975). Discipline and punish: The birth of the prison (p. 201). Middlesex: Penguin Books.
Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.
Gill, P., & Phythian, M. (2012). Intelligence in an insecure world (pp. 79–101). Cambridge: Polity Press.
Groenewald, Y. (2011, September 2). SA firm “helped” Gadaffi spy on the people of Libya. Mail & Guardian. Retrieved January 9, 2016, from http://mg.co.za/article/2011-09-02-sa-firm-helped-gaddafi-spy
Gunter, J. (2014, February 26). Digital surveillance in Angola and other “less important” African countries. Global Voices. Retrieved May 4, 2017, from https://advox.globalvoices.org/2014/02/26/digital-surveillance-in-angola-and-other-less-important-african-countries/
Hacking Team. (n.d.). Remote control system (information brochure), in privacy international. Surveillance Industry Index. Retrieved October 27, 2016, from http://sii.transparencytoolkit.org/docs/Hacking-Team_Remote-Control-System_Product-Descriptionsii_documents
Hintz, A., & Brown, I. (2017). Enabling digital citizenship? The reshaping of surveillance policy after snowden. International Journal of Communication, 11, 782–801.
Landau, S. (2010). Surveillance or security? The risks posed by new wiretapping technologies. Cambridge, MA: Massachusetts Institute for Technology.
Lyon, D. (2017). Surveillance culture: Engagement, exposure and ethics in digital modernity. International Journal of Communication, 11, 824–842.
Madsen, W. (2014, August 6). America’s expanding aggressive signals intelligence operations, strategic culture foundation. Retrieved January 13, 2017, from http://www.strategic-culture.org/news/2014/08/06/americas-expanding-aggressive-signals-intelligence-operations.html
Marx, G. (2012). “Your papers please”: Personal and professional encounters with surveillance. In K. Bell, K. D. Haggerty, & D. Lyon (Eds.), Handbook of surveillance studies (p. xxv). Oxon: Routledge.
News24. (2016, July 4). SA votes against internet freedoms in UN resolution. Daily Maverick. Retrieved August 10, 2016, from http://www.dailymaverick.co.za/article/2016-07-04-sa-votes-against-internet-freedoms-in-un-resolution/#.V6sFUFt97IU
Okoth-Ogenda, H. W. O. (1991). Constitutions without constitutionalism: Reflections on an African political paradox. In I. Shivji (Ed.), State and constitutionalism: An African debate on democracy. Harare: SAPES Books.
Omanovic, E. (2015, 13 March). New paper reveals how to keep surveillance tech from human rights abusers. Access Now (blog). Retrieved January 10, 2016, from https://www.accessnow.org/new-paper-recommends-how-to-keep-surveillance-tech-from-human-rights-abuser/
Omanovic, E. (2016, 8 April). Hacking team’s global licence revoked by Italian export authorities. Privacy International (blog). Retrieved October 25, 2016, from https://www.privacyinternational.org/node/826
Oxford, A. (2013, August 3). Why is X-keyscore in Zambia and the Sudan? HTXT. Retrieved August 11, 2016, from http://www.htxt.co.za/2013/08/03/why-is-xkeyscore-in-zambia-and-the-sudan/
Paradigm Initiative Nigeria. (2016, December 8). Digital rights in Africa Report 2016 (p. 2).
Perlo-Freeman, S. A., Fleurant, P., Wezeman, P., & Wezeman, S. (2016, April). Trends in world military expenditure 2015. Retrieved September 22, 2016, from https://www.sipri.org/sites/default/files/EMBARGO%20FS1604%20Milex%202015.pdf.
Prempeh, O. (2004). Anti-globalization forces, the politics of resistance, and Africa. Journal of Black Studies, 34(4), 580–598.
Privacy International. (2015, October). For God and my president: State surveillance in Uganda (blog post). Retrieved May 4, 2017, from https://www.privacyinternational.org/sites/default/files/Uganda_Report_1.pdf
Privacy International (2016a, 14 December). Switching hats: Why South Africa’s surveillance industry needs scrutiny (blog post). Retrieved March 7, 2017, from https://www.privacyinternational.org/node/1031
Privacy International. (2016b), 1 April). UN calls on Namibia, New Zealand, Rwanda, South Africa to reform surveillance. Will the governments act? Retrieved May 4, 2017, from https://medium.com/privacy-international/un-calls-on-namibia-new-zealand-rwanda-south-africa-and-sweden-to-reform-surveillance-14aea8008b29
Privacy International. (2016c). The Global Surveillance Industry (report). Retrieved April 4, 2017, from https://privacyinternational.org/node/911
Privacy International. (2017a, March 14). State of privacy: Kenya (report). Retrieved May 4, 2017, from https://www.privacyinternational.org/node/980#toc-4
Privacy International. (2017b, March 14). State of privacy: Uganda (report). Retrieved May 3, 2017, from https://www.privacyinternational.org/node/965#toc-4
Privacy International. (2017c, March). Track, capture, kill: Inside communications surveillance and counterterrorism in Kenya. Retrieved May 4, 2017, from https://www.privacyinternational.org/sites/default/files/track_capture_final.pdf
Privacy International. (n.d.-a). Briefing for the Italian Government on Hacking Team (undated letter to the Italian government). Retrieved May 2, 2017, from https://privacyinternational.atavist.com/hackingteamsurveillanceexports
Privacy International. (n.d.-b). The Five Eyes (blog post). Retrieved March 1, 2017, from https://www.privacyinternational.org/node/51
Privacy International. (n.d.-c). What is communications surveillance? (blog post). Retrieved February 22, 2017, from https://www.privacyinternational.org/node/10
The Wassenaar Arrangement. (n.d.). Participating states. Retrieved April 27, 2017, from http://www.wassenaar.org/participating-states/
Tsandzana, D. (2016, May 16). The government of Mozambique is “spying on its citizens” according to @Verdade (blog post). Global Voices. Retrieved May 4, 2017, from https://advox.globalvoices.org/2016/05/16/the-government-of-mozambique-is-spying-on-its-citizens-according-to-verdade/
Valentino-DeVries, J, Lam Thuy, V., & Yadron, D. (2015, December 28). Cataloguing the World’s Cyberforces. The Wall Street Journal. Retrieved May 3, 2017, from http://graphics.wsj.com/world-catalogue-cyberwar-tools/
Vastech. (n.d.). Zebra Strategic Network communication monitoring (undated product brochure). Retrieved January 9, 2016, from https://www.documentcloud.org/documents/711299-brochure484.html#document/p4/a119774
Wikileaks. (2014, September 15). Finfisher—documents. Spyfiles 4 (database of leaked documents). Retrieved February 27, 2017, from https://wikileaks.org/spyfiles4/documents.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Duncan, J. (2018). Taking the Spy Machine South: Communications Surveillance in Sub-Saharan Africa. In: Mutsvairo, B. (eds) The Palgrave Handbook of Media and Communication Research in Africa. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-70443-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-70443-2_9
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-70442-5
Online ISBN: 978-3-319-70443-2
eBook Packages: Literature, Cultural and Media StudiesLiterature, Cultural and Media Studies (R0)