China reportedly helping Zambia with eavesdropping technology

Officials have been visiting ISPs and telcos in connection with communications-monitoring project, sources say

China is facing allegations that it is helping the Zambian government with deep packet inspection technology to eavesdrop, mine data, censor and intercept communications.

The allegations come less than two years after the Chinese government was accused of helping the Ethiopian government block news websites in Ethiopia and jam Ethiopian Satellite Television (ESAT) and other broadcasters including the Voice of America and Germany's Deutsche Welle Amharic service.

Deep packet inspection technology (DPI) allows monitoring of traffic from a specific IP address and enables the ability to spy on email even as it is being typed out by the user. The Zambian government reportedly intends to introduce the monitoring mechanism to vet Internet services coming in and out of the country.

Zambian and Chinese security officials have reportedly been traveling between the two countries for the project, expected to cost the Zambian government over $5 million.

Officials from the country's three mobile operators -- MTN, Airtel and Zamtel -- and some ISPs have confirmed on condition of anonymity that in the past week, members of the Office of the President (OP) have been visiting them in an attempt to facilitate monitoring of e-mail and voice communications.

Zambian Minister of Information and Broadcasting Kennedy Sakeni and Chinese embassy officials declined to comment about the reports. However, the Zambian government has made it clear in the recent past that it wants to monitor popular social media networks including Facebook and Twitter as well as blogs and e-mails, and block unfriendly news websites.

"The introduction of communication monitoring would clearly undermine civil liberties because the office of the president can snoop on all e-mails and internet traffic," opposition National Restoration Party President Elias Chipimo told Computerworld Zambia Feb. 19.

Zambia joins many African countries that consider social media networks to be tools for promoting unrest, after successful uprisings in Egypt, Libya and Tunisia toppled the governments in those nations.

Just last month, the Zambian government said it had finished drafting a law that will see the closure of online newspapers that are critical of the Zambian government.

Over the past year, the Zambian government through the Zambia Information and Communication Technology Authority (ZICTA), the country's telecom sector regulator, tried in vain to close some online publications, including the Zambian Watchdog. Attempts to close some of the sites, including the Zambian Watchdog, failed because they are hosted outside the country. The Zambian Watchdog is an online newspaper that is critical of the Zambian government.

Official distrust of social media is growing in Africa because it is seen as a platform used mainly by youths to plan and coordinate their plans regarding government issues.

"Most of the bloggers who insults the head of state everyday and daring the government were young people between the ages of 25 and 45," Sakeni told the media this week.

In Malawi, the government has already passed a law allowing government officials to censor what citizens do online. It seeks to regulate and control online communications including social media networks in the country. For example, the law requires that editors of online publications reveal to officials their names, home addresses and telephone numbers in addition to other information.

The Malawian law further introduces the concept of government-appointed cyber-inspectors who have the power to, among other things, monitor and inspect websites or activity on any information system in the public domain and report any unlawful activity to the regulator.

Join the CSO newsletter!

Error: Please check your email address.

Tags securitylegalgovernmentMTNinternetprivacyZamtelAirtel

More about DPIFacebookTechnology

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Michael Malakata

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place