2021
DOI: 10.19088/ids.2021.059
|View full text |Cite
|
Sign up to set email alerts
|

Surveillance Law in Africa: a Review of Six Countries

Abstract: This review provides the first comparative analysis of African legal surveillance frameworks. The study identifies nine core principles derived from existing guidelines as an analytical framework to identify opportunities to strengthen privacy protection, while narrowly targeting surveillance on the most serious crimes. Six detailed country reports are synthesised in this comparative analysis to produce a series of actionable recommendations for policy, practice and further research.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 6 publications
0
0
0
Order By: Relevance
“…However, African countries have invested more in surveillance technologies than in cybersecurity initiatives. This is evidenced by the procurement of spying equipment and systems such as the International Mobile Subscriber Identity (IMSI) catcher, NSO Group's Pegasus, and the collection of customer data from telecom operators (Sutherland, Digital privacy in Africa: cybersecurity, data protection & surveillance, 2018;Jili, 2010;Roberts, Mohamed Ali, Farahat, Oloyede, & Mutung'u, 2021). These procurements are done in countries where CSIRTs are under-resourced, insufficient, and lack cyber-attacks and defense registers.…”
Section: Introductionmentioning
confidence: 99%
“…However, African countries have invested more in surveillance technologies than in cybersecurity initiatives. This is evidenced by the procurement of spying equipment and systems such as the International Mobile Subscriber Identity (IMSI) catcher, NSO Group's Pegasus, and the collection of customer data from telecom operators (Sutherland, Digital privacy in Africa: cybersecurity, data protection & surveillance, 2018;Jili, 2010;Roberts, Mohamed Ali, Farahat, Oloyede, & Mutung'u, 2021). These procurements are done in countries where CSIRTs are under-resourced, insufficient, and lack cyber-attacks and defense registers.…”
Section: Introductionmentioning
confidence: 99%