Existing practice and risks of malicious use of artificial intelligence in Sub-Saharan Africa

 
PIIS032150750016841-7-1
DOI10.31857/S032150750016841-7
Publication type Article
Status Published
Authors
Occupation: Professor, Faculty of International Relations
Affiliation: Saint-Petersburg State University
Address: St. Petersburg, Russian Federation
Journal nameAsia and Africa Today
EditionIssue 10
Pages31-37
Abstract

The necessity of the development of advanced technologies is considering as the essential condition for the ensuring of the world leadership in the contemporary world. But the rapid growth of such technologies and their implementation into all spheres of our life increase the risk of their malicious use in the future. African countries are no exception in this regard. They regularly become victims of cyber-attacks, which every year become more and more high-tech.

There has been undertaken in the article the analysis of the existing practice and risks of malicious use of advanced technologies in Sub-Saharan Africa. The author notes that today the banking sector is most exposed to cyber-attacks. But advanced technologies are gradually beginning to be used also for the mind management and creating the public opinion convenient for perpetrators who are aimed on the increase of social tension in certain countries or the entire regions. Undoubtedly even the possibility of such attacks poses a very serious threat to international information and psychological security. Finally, the author comes to the conclusion that African countries should develop effective supranational instruments aimed at improving their information security and preventing further malicious use of advanced technologies. Until this happens, it seems unlikely that African countries will even come close to solving the problem of ensuring their information security. So their information space will continue to be subjected to large-scale cyber-attacks that pose a serious threat not only to the security of individuals, but also to the entire national security system of the state.

KeywordsStates of Sub-Saharan Africa, Information Technologies, Strategic Communication, Artificial Intelligence, Information and Psychological Security, Innovations
AcknowledgmentThis research was supported by the St. Petersburg State University, project № 73555239 "Artificial Intelligence and the Data Science: Theory, Technology, Sectoral and Interdisciplinary Research and Applications".
Received06.07.2021
Publication date01.11.2021
Number of characters20863
Cite  
1 rub.
When subscribing to an article or issue, the user can download PDF, evaluate the publication or contact the author. Need to register.

Number of purchasers: 0, views: 511

Readers community rating: votes 0

1. Pashentsev E.N. 2019. Malicious Use of Artificial Intelligence: New Challenges for International Psychological Security and Ways of their Neutralization. Public administration. Electronic bulletin. № 76 (In Russ.). http://www.elibrary.ru/item.asp?id= 41254064 (accessed 29.06.2021)

2. Bazarkina D., Pashentsev E. 2019. Artificial Intelligence and New Threats to International Psychological Security. Russia in Global Affairs. № 17(1), pp. 147-170. https://eng.globalaffairs.ru/articles/artificial-intelligence-and-new-threats-to-international-psy-chological-security (accessed 29.06.2021)

3. Africa Cyber Security Report 2017: Demystifying Africa’s Cyber Security Poverty Line. https://www.serianu.com/downloads/AfricaCyberSecurityReport2017.pdf (accessed 01.07.2021)

4. Isiavwe D. 2020. Cybersecurity Threat Evolution: Perspectives from Africa. https://www.issan.org.ng/download/cyber-security-threat-evolution (accessed 05.07.2021)

5. Cyberattacks on the Basis of Artificial Intelligence and Machine Learning. Cloud Networks. 4.06.2020. (In Russ.). https://zen.yandex.ru/media/id/5e71e35dac36540bbf854c99/kiberataki-na-osnove-mashinnogo-obucheniia-i-kak-ot-nih-zascititsia-5ed90b0d8e6e074cb42cd4a7 (accessed 05.07.2021)

6. Kharouni L. 2013. Africa: A New Safe Harbor for Cybercriminals? Trendmicro. https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-africa.pdf?_ga=2.144503985.507792652.1626804790-2127745893.1626804790 (accessed 11.07.2021)

7. Mohapi T. What we know so far about South Africa's largest ever data breach. iAfrikan. October, 18, 2017. https://iafrikan.com/2017/10/17/south-africas-govault-hacked-over-30-million-personal-records-leaked (accessed 11.07.2021)

8. Mohapi T. Is Dracore Data Sciences responsible for South Africa's largest ever data leak? iAfrikan. October, 18, 2017. https://iafrikan.com/2017/10/18/dracore-data-sciences (accessed 11.07.2021)

9. What has been done for the counteraction the cybercrime in East Africa. High-Tech News. 4.12.2019. (In Russ.). https://cdnews.ru/2019/12/04/chto-sdelano-dlja-borby-s-kiberprestupnostju-v-vostochnoj-afrike (accessed 17.07.2021)

10. Faife C. In Africa, Fear of State Violence Informs Deepfake Threat: WITNESS' workshop in South Africa revealed that perceived threats from synthetic media vary greatly by region, especially where repressive government is a factor. WITNESS. December 9, 2019. https://blog.witness.org/2019/12/africa-fear-state-violence-informs-deepfake-threat (accessed 18.07.2021)

11. Burning building video from India, not from xenophobic violence in South Africa. Africa Check. September 19, 2019. https://africacheck.org/fact-checks/fbchecks/burning-building-video-india-not-xenophobic-violence-south-africa (accessed 18.07.2021)

12. South Africa apologizes to Nigeria over xenophobic attacks. BBC. September 17, 2019. https://www.bbc.com/news/world-africa-49726041 (accessed 18.07.2021)

13. African Information Security Association.http://www.jidaw.com/aisa (accessed 21.07.2021).

14. African Union Convention on Cyber Security and Personal Data Protection. 2014. https://issafrica.org/ctafrica/uploads/ AU%20Convention%20on%20Cyber%20Security%20and%20Personal%20Data%20Protection.pdf (accessed 21.07.2021)

15. Information Security Society of Africa - Nigeria (ISSAN). https://issan.org.ng (accessed 21.07.2021)

Система Orphus

Loading...
Up