Webinar – session 1
17 Apr 2024 10:00h - 11:30h
Table of contents
Disclaimer: This is not an official record of the session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed.
Knowledge Graph of Debate
Session report
Full session report
Experts Convene in Nairobi to Tackle Cybersecurity Challenges in Social Media
The webinar held in Nairobi brought together a diverse group of experts from across Africa to discuss the cybersecurity risks associated with social media, as well as potential remedies and solutions. The panel included law enforcement officials, regulatory authorities, and civil society representatives, who provided insights into the complex landscape of social media usage and its associated challenges.
One of the central themes of the discussion was the immense popularity of social media in Africa, driven by factors such as the availability of affordable smartphones, reduced costs of internet connectivity, and the instantaneous nature of information sharing. Social media has become a vital platform for political engagement, self-expression, and entrepreneurship, particularly among the youth.
Despite the benefits, the panel highlighted the prevalence of cybercrimes facilitated by social media, including ransomware, sextortion, cyber sex trafficking, and identity theft. Vulnerable groups, especially women and young people, are at increased risk due to economic hardship and a lack of awareness about online safety.
The issue of underreporting cybercrimes was a significant concern raised by the panel. Victims often refrain from reporting due to shame or ignorance about how to report. To address this, the importance of public education and awareness campaigns was emphasized, aiming to empower individuals to report incidents and protect themselves online. Law enforcement agencies have been working to provide resources and information to the public on reporting cybercrimes and the investigative process that follows.
The international aspect of cybercrimes was addressed by Interpol’s Jackson Cheboi, who outlined the organization’s strategies for combating transnational cybercrimes through global cooperation among law enforcement agencies. Interpol’s role includes influencing policies, building capacity, and providing expertise to member countries.
The panel also discussed the impact of social media on elections and governance, expressing concerns about the manipulation of social media to influence political outcomes and the spread of misinformation. The need for regulation and accountability of social media platforms was discussed, with calls for amendments to relevant laws to ensure responsible use of these platforms.
Emerging technologies, particularly artificial intelligence, were identified as presenting both opportunities and challenges. AI’s potential to create deepfakes and commit sophisticated frauds necessitates targeted awareness and capacity building to address these challenges. The need for more resources and technical support for law enforcement to address cases of impersonation and AI-generated fraud was highlighted by Lillian Nawoga from CIPESA.
In conclusion, the webinar reached a consensus on the need for comprehensive and targeted approaches to mitigate cybersecurity risks associated with social media. The importance of raising public awareness, enhancing digital literacy, strengthening law enforcement capabilities, and fostering international cooperation was agreed upon. The discussion also emphasized the need for a balance between cybersecurity enforcement and the protection of human rights.
Key observations included the rapid adoption of technology such as AI in Africa, with banks already experiencing AI-generated frauds. The call for a hybrid system of reporting and investigating cybercrimes to build public trust was significant. Additionally, the emphasis on the need for cyber diplomacy and the alignment of policies among states to facilitate cross-border cooperation in cybercrime investigations was a crucial takeaway from the webinar.
Session transcript
Mwende Njiraini:
Good afternoon and good evening to all of you who have joined us this afternoon in Nairobi. But we are from all over the world. We welcome you. I trust that you’re keeping well and that you can hear me. And that we are ready to join this discussion on cyber security risks in social media remedies and solutions. We are excited to have distinguished panelists from all over Africa. We have panelists from Uganda and Kenya as well. And we are hoping to expand this in our next webinar to expand the reach of our participants and our panelists from all over Africa. So thank you so much for registering and for joining us this afternoon. Thank you so much for giving us your time. I will now invite, I am Mwenda Njeraini, sorry, and I work with Diplo Foundation. I will now invite Jovan Kubalia, who is the Diplo Executive Director, to welcome us by giving us the opening remarks. So Jovan, please.
Jovan Kurbalija:
Thank you. Thank you, Mwenda. Dear colleagues and friends, it’s great to connect from Geneva. the UN compound and the Geneva digital ecosystem. And I would like to congratulate Mvende and Kate and colleagues from Kenya for organizing today’s webinar. And it was an interesting coincidence, first two days of this week, our team was in Addis Ababa, Kate can probably reflect more on that, delivering training for African diplomats on cyber issues. And today we have multi-stakeholder community here, people from civil society, technical community and other actors. And it’s good news that there are discussions on different levels on similar issues, because in Addis they discuss cyber diplomacy, cyber security, cyber crime and other related issues. Why is this very important and timely discussion? Obviously, social media is impacting our lives on many fronts. And definitely one is a content governance, content policy, which is a big issue worldwide, especially during this election year, where more than half of the global population is going to some sort of elections worldwide. But there is issue also on the core security aspects, which are listed in the program of today’s workshop. Therefore, apart from the content, question of misinformation, fake news, misuse of the social media, we have some core issues of protection of our accounts and our system on social media. And here we have issues of definitely encryption, end-to-end encryption, which is a big issue, which many governments are trying to to find the back doors for justified or not justified reasons. But this is an issue that has to be discussed. There is a question of security and privacy of data. And this morning, I read an interesting interview with Pavel Dura, the founder and owner of the Telegraph, where he basically, he’s an interesting person because he moved out of Russia in 2014 because of the government’s push for the surveillance. And then he wanted to set up his company in the United States. But then he realized that he was basically, his engineers were approached by FBI to find the back door into Telegram application. Therefore, he ended up in Dubai. And I suggest you to listen to his interview because it’s interesting. He ran away from one censorship, he moved to the other country, he faced another censorship, and he settled in Dubai, where he’s now based. Therefore, there are different aspects from the personal protection of security and data to the question of the end-to-end encryption, which is very often proclaimed and very often upheld by companies. But also there are back doors and there are questions how to be sure that our communication is private, protected, and secure. Therefore, there are many issues that we have to face. And it’s great to see that there is an interest and there is a dynamism on African continent on addressing these issues, which are global. But I think insights from Africa, where the social media is very, very dynamic, very busy, where you don’t have that strict regulation like in other parts of the world, could be particularly relevant not only for solving African problems. immediate problems, but also for addressing the questions of the global nature, how to get social media protection security right. And I would say, if I can list among the issues, although AI is all over the place, there is a hype, but there are two issues which I think we should prioritize as humanity. One is content governance on social media, very delicate issue, affected by local cultures, security, affected by justified reasons of governments to have some surveillance, especially in the fight against the crime and terrorism, but also governments going one step further beyond proportional and trying to have overall surveillance, therefore a very delicate issue which cannot be easily solved. But this is the first issue which is for me the priority for humanity, much higher than AI governance, because it affects people’s life directly. And second issue is the question of protection of cables. We are not aware how our Internet is vulnerable, especially nowadays when many, not only countries, but also private entities can cut the cables. And we had recently two examples in West Africa and in the Red Sea, which affected partially connections in them, including Kenya and West Africa countries. But this is the global problem, because ultimately our Internet boils down to a few cables crossing the Atlantic Ocean or going to the Red Sea or around the African continent. Those are two issues which, when people ask me what makes you awake during the night, those are two, when it comes to digital governance, those are two issues much, much more important than AI governance, which is all over the place. Therefore, once more, congratulations for putting… this topic on the agenda to Mervand and Kate, and I wish you a good discussion, and again, which is not only relevant for Africa, but also for the rest of the world. Unfortunately, I will have to leave soon, but I’m going to follow carefully later on when I finish series of meetings, the recordings, and learn more from your experience. I wish you good, fruitful, and impactful discussion.
Mwende Njiraini:
Thank you so much, Jovan, for the introduction and the welcoming remarks. Thank you for raising the issues that you have raised, and I’m sure we’ll address them and other issues that will come to face us in this webinar. So with that, I would like to welcome Dr. Catherine Gitao to take over on the next session and introduce, I guess the panelists will be introducing themselves, but introduce the next section of this webinar. Thank you. So, Dr. Gitao.
Katherine Getao:
Okay. Thank you very much, Mwende, and thank you, Jovan, if you’re still with us for that provocative welcome and introduction. If I look a little tired, I just traveled from training diplomats this morning, and many of the issues we’ll be discussing were also issues of concern to them. So we have a distinguished panel before us. There are two panelists who are still expecting, so please flag me if they’ve entered the house, but for the moment, I’ll mention those who I know are with us. So, from civil society, we have Dennis Awuah, who comes from FIDA, which is a legal NGO. that offers services to citizens, legal services. I believe you’ll explain to us whether it’s free or affordable as you do your introduction. Welcome Dennis. We also have David Ndeje from the Kenya ICT Action Network which has been extremely active, not only in participating from the civil society point of view in policy discussions, but also in educating the public on issues that are pertinent to successful use of ICTs including cybersecurity. So welcome David, we look forward to hearing from you. Then from law enforcement, this is really unique I believe and we’re really excited to have Jackson Chiboy from Interpol which is the sort of police agency that enables collaboration between police forces around the world, especially when a crime crosses borders. And we have Lawrence Agola who is from our own Directorate of Criminal Investigation here in Kenya who have increasingly been looking at this kind of crimes. So last but not least, who I know is in the house is Francis Sitati from the regulator here in Kenya. And they have not only been very active in dealing with issues of cybersecurity including social media, they have also been at the forefront of child online protection activities and education. education. So welcome, Francis, and thank you for being with us. So we’re still expecting the Honourable John Kiari, who is the Chairman of the ICT Committee in our Parliament here in Kenya. And if you’re with us, John, welcome. And Lilian Nnawoga, who comes from civil society within Uganda, but serves the Eastern Southern African region. So thank you very much for bearing with me. If any of the panellists would like to add something that I didn’t mention when I was briefly introducing you, of course, each of them are very, very distinguished people in the organisations that I mentioned. Please do go ahead as I asked the first question. Now, the reason why we came to this topic is that Africans have really taken social media to heart. And I think it is the application of ICT above any other that is bringing Africans to the digital world, and they’re heavy users of social media. But we also know that this is becoming a haven for certain types of criminals. So in the first round of questions, which I’ll ask all of you to just give your point of view, beginning with Francis Titati, and when he ends his contribution, I will mention which panellists should go next. So the question is, why do you think that social media is so popular? with Africans, young and old, and related to that I’m sure you’re all aware of the kinds of crimes that are occurring as criminals also become attracted to this area. So maybe you can just briefly give us an example of a social media crime that either you’re dealing with or that has really caught your attention recently. So let’s start with Francis from the Communications Authority, and then we’ll do the first round of questions.
Francis Sitati:
Thank you so much, Dr. Gitao, if you can hear me, I’ll just proceed. As mentioned, my name is Francis Iklati from the Communications Authority of Kenya, specifically the KE-SAT, that’s a Computer Incidents Response Team for Kenya, which is a multi-function, it’s a multi-agency function of government, whereby we have technical personnel from the authority as well as officers seconded from the various law enforcement agencies. So to jump right into the questions, yes indeed we have seen that social media has become a very popular medium for communication in the country, and this is for various reasons. We are seeing that we have improved connectivity in the country in terms of internet coverage. Based off of the last report, what we call the quarterly statistics report from the Communications Authority of Kenya, that’s as of December of 2023. In terms of the connectivity, in terms of the number of SIM cards, that is unique SIM cards, it was recorded at about 66 million, and of the 66 million SIM cards, about 33 million are smartphones, so you can see that from a population of about give or take 50 million, almost everybody has a smartphone. So the availability of affordable devices and also internet connectivity, the cost of broadband connectivity has also substantially reduced, could be attributed as two major reasons why social media has become very popular. But having said that, in terms of the platforms themselves, we see that information spreads very quickly on social media, you’re able to reach very many people within a very short time span. So in terms of communication, in terms of outreach, it’s a very good media to communicate quickly. Also, we are seeing a young generation of Kenyans who are using social media for self-expression and creativity. We are seeing the popularity of various social media influencers who are pushing brands, are using that to make money. So it’s an avenue for self-employment and entrepreneurship. So social media, for that reason, is becoming a very popular means of communication. Also, Kenyans, of course, as you may know, we like to engage in political discourse and civil engagement. So whenever anything happens in the social circles, a lot of Kenyans are discussing these issues. So as opposed to how it was done previously, where you’d have to wait for the traditional media to watch the news, now in the advent of social media, you simply log on to your favorite social media platform and you’re able to get the latest. in terms of, you know, your favorite politician. And maybe the last thing I want to talk about is, and it’s tied to the other points, is that the information is in real time. You’re able to quickly get information on the fly. You know, many of the young people are outwardly mobile, so you want to get information as it happens. So social media is obviously a very good choice for that. Thank you.
Katherine Getao:
Okay, I was having difficulties and muting. I think my status had changed. So I’m sorry about that. Okay, so thank you very much Francis you’ve given us a very good overview of why social media is so compelling. For most of us and I think everybody here right now we’re using a form of social media. And this is very popular. So perhaps. Now I’ll turn to those from the law enforcement agencies, starting with Jackson and then following on to Lawrence. What are some of the things that are happening online which are drawing your attention. What happens completely online and what happens that’s online, but comes into the physical realm. of things that not only happen here locally, but have an international component, I’d be grateful. Jackson?
Jackson Cheboi:
Thank you very much, Dr. Ketau, and thank you, Frances, for laying the foundation. Maybe picking from Frances’ explanation, I think currently it’s said that if it’s not on social media, most probably it didn’t happen, and if it did, maybe it impacted none, maybe that were only. So on that realm, maybe when it gets to the criminal perspective, especially the international crime, and what I call international crime is a transnational and trans-across-the-borders. What the social media has done is as availed an avenue where the actors can be in different locations and coordinating seamlessly to commit crimes that would otherwise be impossible to be done the conventional ways. From the Interpol’s perspective, we are seeing some crimes that basically stand out because of the component of social media and also other facilitators within the internet environment. Let me mention maybe three. Ransomware. Most of you have heard about that. Being a financial crime starts probably with the wetware, that’s the human being, processed through even the regulated or the mainstream system of the Chekas and ultimately the proceeds are cashed out in financial institution and it can happen maybe not only in Africa but across even the entire globe. That’s one of the greatest things that we are watching at Singapore at this particular moment because it has a great wave and a great impact. Other types of clouds come in between and the last one is facilitated majorly by social engineering and people especially targeting the western lead to sextortion. Those are the three main ones that are happening in continent Africa and it has a trace to other parts of the world.
Katherine Getao:
Thank you very much Lawrence for that overview. Now I’d like to turn to Lawrence because what provoked us to actually have this webinar was some incidents where some young ladies in Kenya who had been groomed online ended up losing their physical lives after meeting the criminals physically. So I believe there’s a lot of crime which is starting online and or which can even be completed online as Jackson has shown us but there are also crimes new crimes. crimes, physical crimes, which start online. Could you just give us some insight and maybe some examples into this kind of crime?
Lawrence Okoth:
Yeah, thank you very much, Dr. Gitao, for this opportunity. And I want to say and align myself with what my senior colleagues have really put forward. Internet, I want to say is not a bad thing. And it’s growing and really speeding up a lot of growth in terms of business, in terms of household economic income. And during the COVID-19, a lot of people, including children, because of the close of schools, were able to join internet so as to continue pooling even when they were at home. And after the COVID-19, they still maintained using the internet. And a lot of businesses have also come up because of the internet. So this has really attracted criminals who are hiding behind keyboards to offend against those people who are not aware of the securities or how to protect themselves online. So where I work, we focus on internet crimes against children. And some of the crimes that we deal with are trade on child pornography. And you find that people are targeting children, luring them, grooming them, and also trying to meet them offline. So you find criminals are using Internet to target those vulnerable members of the society. And offending them either sexually and even defrauding them. So with the development of even the cryptocurrency, the virtual money, this has really furthered the crimes that are happening online. Because some people who are trading on maybe, for example, child pornography, they want to pay or receive money through cryptocurrency, and they are able to buy child abuse materials. Another crime that is really coming up is also cyber sex trafficking. You find that young women are recruited online, and they are made to send their details with specifications that have been advertised online, only to realize they have been lured to a business that they are put in front of a camera, performed through coercion, they perform cyber sex, and they are paid online. So you find that this is… something that is really global and through cryptocurrency, people are really really making a lot of dirty money through this kind of illicit business. So the type and kind of crimes that are happening online are also motivated with what is happening offline. You find also young adults, the youth are also following footballs, they are able to place bets so betting is also motivating young people to be online so that they can try their luck to win. So besides the good side of the technology, the criminals are also using technology to further their crimes and offend against children, young people and even the adults. Yes.
Katherine Getao:
Okay, thank you so much for that summary of some of the crimes that are emerging in this area and I think now the word you really mentioned Lawrence is lured. So there seems to be an element of ignorance that is facilitating these kinds of crimes. So it’s my chance to turn to some of our civil society partners to tell us what they are finding in this space and also what they’re doing about it. So I’ll start with Dennis from FIDA. Are people coming to you with these kinds of crimes? for assistance? Have you prosecuted any? And basically, you can also tell us your view on the kind of things that are happening. Thanks.
Dennis Otieno:
Thank you so much, Dr. Ari. First, receive our warmest greetings from our Executive Director, Annie Reri, who was not able to be here today, but she passes her regards. So, on the question on, do we receive such cases? I’ll pick it up from what Mr. Lawrence, of course, has spoken about, and I would target on the extreme cases of vulnerability and mostly economic vulnerability. And you will find that some of the cases that come onto our desk, and these ones I’m not referring to femicide, the victims or survivors who come to our desk, they would tell us that one of the things that would push them to engage in such matters concerning cyber vulnerability is issues on economy. When you find that the economy has risen, some people are unable to cater for themselves, some people are unable to be able to address the day-to-day needs, the day-to-day financial living needs that they need. And you’ll find that most of them are usually women, most of them are young and impressionable, some are the early teens, early teenage, and the range is usually from early teenage to late 20s. That’s the potential, highest potential and highest risk age that we find that are susceptible mostly to this kind of cyber crimes. And one of the things that FIDA usually does, we take it from a two-facet perspective, we do legal and we also do to psychosocial, in that the victim and or survivor undergoes counseling, counseling that will enable to give them psychosocial support, will be able to give them strength, because one thing you should remember is when such crimes are happening, one of the things that happens is that our clients tend to lose their dignity, the women tend to lose their dignity, they tend to lose a lot of their will to live because of the kind of embarrassment that it has a push on them, and as such you’ll find that some of them suffer a lot of mental distress and mental stress, which may lead to eventual depression, so we engage in counseling and psychosocial support. The second thing that we do, legal representation, legal advice and representation, you’ll find that we watch brief in cases where they were victims, we are able to watch brief in court under the Victim Protection Act, we are able to act on their behalf so that they have a hand that is holding them aside from the prosecution of their criminal cases, they have another hand that is holding them, that is through our pro bono advocates, through us as in-house counselors as well, we are able to assist them, follow up in the matters. So, one other thing maybe that I would be able to add about one of the things that was noted greatly in terms of why there is a risk factor that is very high with women, I already cited vulnerability and economic vulnerability. Number two, you will find that the information, being informed on the risks of sharing your information online is one thing that is overlooked. Most of the time, you’ll find that even as civic education is being done, people are not being informed on what are the risks, what are the benefits. of social media, of sharing your information online, how does data protection come in to protect the data that you have shared with members of the public or you have shared with somebody who has presented themselves in a perceived manner. So you will find that conversations will be ongoing, that the DCR interpol will come to realize later that this particular person was actually being defrauded and they did not know and it is at the point of femicide when it is a bit too late that people come in to start realizing that their data that they were sharing, even instances of identity theft are becoming rampant because now their identities are being taken away without their knowledge and this becomes a risk factor that not only leaves them vulnerable to abuse or sexual abuse or gender-based violence but it leaves them in points where they are vulnerable to blackmail and this kind of blackmail is where you find they’re told if you do not do this we will release this information that you shared with us or we will release these pictures that you shared with us at a moment of vulnerability so that’s how we as FIDA come in to be able to assist them and those are some of the notable issues that we’ve been able to see over time as we represent them in court.
Katherine Getao:
Thank you very much for that very insightful contribution Dennis. Now again last but not least we turn to David from Caternet and I’d like you to focus on two things. One is the educational part which Lawrence has already talked about that many people are coming on to these platforms, not knowing what happens when you just share your information freely without a proper understanding of the consequences. The second thing I can see in the chat that people are asking about emerging technologies, particularly AI. So if you have any insight into whether it’s protecting us or whether you also have seen some new risks and issues and some new needs for education emanating from AI coming into the market and being used by ordinary people. So David, please guide us on these two issues.
David Indeje:
Thank you. Thank you, Dr. Gitau and thank you also to my panelists and to everyone who is present in this particular webinar. So my name is David Ndeje. I’m the Communications Officer for the Kenya ICT Action Network. This is KIKTANET, which is a multi-stakeholder platform for people and institutions interested in ICT policy. And largely our philosophy is that of encouraging synergies for ICT policy related activities and initiatives. And as a result, we try as much as possible to provide mechanisms and framework for continuing cooperation and collaboration in ICT matters among industry, technical community, the academia, media, development partners and government. And to be able to respond to the question that has emerged is KIKTANET, where we sit at, we realized in 2019, just after the COVID-19, we realized that there were gaps when it comes to cybersecurity. capacity building awareness, creation on cyber hygiene, and the development of cyber security courses in learning institutions as key priorities. And again, I believe in the year 2022, we called upon all stakeholders, whom I’ve just mentioned earlier, that it was necessary to develop strategies to address the emerging gaps. Because we understand in Kenya, in as much as I believe Kenya is at the forefront, we have made a lot of milestones. I can guess, not talking within the East African region, but across Africa, because we have enacted various several policies, and we also have various laws that include, top of mind, the 2022 national ICT, the Kenya National Digital Master Plan, 2022, 2023. We also have the National Cyber Security Strategy, 2022, 2027, and we also have the Kenyan Information and Communication Act, besides the Computer Misuse and Cybercrimes Act of 2018. And on the side, we can also insert the Data Protection Act. So, having realized this particular landscape that we are playing in as Kiktanet, so, we had to come back to the lowest level, to what many people here have just asked from the chat. Like, how do you first create digital literacy among the population? It is good to have devices, it’s good to have internet capability, it’s good to bring businesses, it’s good to bring organizations, and everything within the digital space, now that even the government that we are in currently, it’s embracing digital, everything is digital. But, what about the user? And that is now why we came up with… with what we call cyber hygiene. We also came up with modules around online gender-based violence, especially for the vulnerable. And in this space, we saw that largely it is women, the young, even the politicians, especially those people who are highly vulnerable to the emerging threat, emerging cyber incidents, and what did we do? We had to think of user education and awareness campus. And this has been an ongoing initiative that started with social justice organizations. We did educational awareness for small, micro, and medium enterprises, the SMEs, and we have also been able just to teach how to reach communities around the most basic, even human rights defenders. We’ve been trying to talk to them like, how do you use your mobile phone? How do you set up your passwords? How do you ensure your settings, your mobile settings are fit for the work that you do? How do you even transfer money online? How are you able to identify the simple things like fishing, how are you able to, how can you be able to mitigate simple things that can affect to you? Like the entry, what is the entry point? The entry point is your password. How is your password money? How do you get entry into your mobile phone, into your emails? That is a first. Then we go to another layer where we ask ourselves, what kind of password even do you have? Is it your name? Is it your birthday? Is it your birth month? Is it something that led to your family or not? So we try to tell them that the most simplest things that you have been doing become even some of the most vulnerable areas. that affect you when it comes to social media crimes within the ecosystem. So another thing that we’ve been trying to do is that criminals on social media actually are some of the people whom you know because of the anonymity and ease of access that attract criminals. And common crimes that have been mentioned like online harassment, scams. Dr. Ali mentioned even in my panel about romance scams. What was popularly known as femicide cases early this year in Kenya. Fake investment schemes, which are popularly known as pyramid schemes. We have so many people who have been scammed. We have identity theft. And we have even matters like hate speech that are being propagated within the social media spaces. And those are just examples on how we have been able to go to the lowest level. And another layer that we’ve been able to go to is we did a policy review around cyber hygiene. And I think even you, Dr. Ali, our moderator, you played a key role in that. Where can we begin in terms of just understanding how cyber aware are you from a user point of view, even before you go to the technical people, even before you go to the platform people? As a user, where are you? What is your awareness level? Is it at the risky level, at the moderate level, or you are 100% aware of what happens within that aspect of cyber hygiene? How cautious are you in terms of how you interact, your online interactions? How do you share your personal information? And how do you use the entry points that I mentioned? And so far… it is what software where we sit, we believe it is still work in progress and we still believe unless there is enough digital literacy among end users then the discussion around cyber crimes within the digital spaces will continue to be to be a burden for the stakeholders based on the financial aspect that are attached. And on the other question that spoke around emerging technologies, what I can say is with the emergence of artificial intelligence just as one participant or one listener just asked, it’s a good thing, it complements the work that we do. However, we also need to understand that artificial intelligence also comes with biases and it is also good from a user point of view, even from a technical point of view, to be able to understand how these biases come about. For example, we have allegory bias, these are now from the platform, the owners of the platforms, we have data bias and we also have confirmation bias which occurs during the pre-processing stages of AI development. But the big question that comes as a result of this is that, I will respond in terms of a call to action for people especially who are within the African continent, is that most people who create, who develop models for the AI models, we are the ones who are being used to do that particular work. But we have also realized that some of the content that we feed into these AI models actually are being plucked again to say that is it is not correct, a letter, an email. We believe that an email might start with DSR or Dear Mother. However, you find that some of the AI models or some models are flagging as DSR, Dear Mother, as AI-assisted kind of language, which is already biased. We believe we need to, let me not quote unquote, we need to make a lot of noise in terms of how we are also being used to feed content into these AI models. And at the same time, the same content that we are feeding, they flag when it’s being used. And this has been very evident in terms to students in learning institutions, whereby a legitimate research is being flagged as AI-assisted. And this, I think, is affecting the quality of work that is coming out from the African continent. And I don’t know for people who are outside the African continent if they are experiencing the same, but these are some of the emerging technologies here to assist us to complement. But the underlying issues that I’ve just provided an example to show that there’s still a lot of work to be done on this particular point. Back to you, Dr. Ndiaye.
Katherine Getao:
OK. Thank you very much, David, for covering my two questions and telling us some of the efforts to educate people about these new realms so that they are not as vulnerable as they are when they come in ignorance. Firstly, I’d like to welcome Lilian Alwoga, who is now with us. She’s also from the civil society realm. And we’re very, very excited to have you, Lilian. So I’m going to jump right into asking you a question. And I’m just drawing on from what David has just said. We were just looking at the issue of emerging technology and also in his submission, Lawrence from the Federation of Women Lawyers told us that some of the most vulnerable groups are women, the young, politicians. I’ll also add the elderly because I’ve had several cases of friends who are a bit older being scammed because this is a new realm for them. So just connecting those two points, now that emerging technologies enabling faking. So somebody who looks like myself can appear, looks and sounds like myself, can appear to say something or do something which they have not really done, but which then goes viral and everybody gets to see it and is associated with a person and is very difficult to deny. Have you come across this and do you have ideas of how this can be mitigated or how society can be helped to identify fake content and react to it appropriately? So Lillian, just go ahead, please.
Lillian Nawoga:
Thank you so much, Dr. Catherine and good afternoon, everyone, morning, whoever you are. Yes, apologies. I think I joined in a bit 10 minutes into the call. So I just slightly went in with a flow without making myself known that I was on call. But yes, really happy to be here and to be. part of this conversation. I listened in so well through to the past presenters and on the topic of AI and cyber crime or fake news, this is really, I think it’s the current pandemic that we are having more so in Africa. I thought, I think my introduction was made earlier on in the call. I, my name is Lilian Naroga and I work with, as a programs manager at CPSA, which is the collaboration on international ICT policy for Eastern Southern Africa. I also do, I’m a founding member of the Internet Society Uganda chapter and currently serve as an advisor there. On this particular topic, one is before I go to your correspondence to your question, doctor, is that we have seen quite a number of, you know, cyber attacks and mainly being, you know, used through AI, you know, to scam and defraud clients in businesses. I think that has been talked about. I’ll just throw some staggering because I came across some report in the course of last year, last, in the past month, there was a staggering, you know, cyber attack, you know, in the bank of, central bank of Tanzania, where there was a total of 8 billion Tanzanian shillings that was lost through, you know, cyber crowd, cyber fraud and, you know, ATM scheming. More so even here in Uganda, we’ve had issues of artificial AI generated fraud that has, you know, attacked the central bank, attacks through the central bank. So really, this is really a pandemic that we are facing with. And just like you mentioned that it is easier for someone to crown themselves, you know, right now someone can just take a screenshot of my face and go and pause that, you know, as Lillian and more so, you know, I work here and there. And then, you know, they start going on with, you know, masquerading to be me. I will also give a scenario I saw in 2020, 22 years ago, there was a case that one of the police cybercrime reports in Uganda arrested an individual who had mastered the art of using AI to pose as, you know, police, you know, taking on posts of virus, you know, police agents posing as prominent, some of the prominent, you know, individuals in Uganda. And they had started, you know, frowding, you know, stealing, you know, people, you know, data, scheming for money and all that. Good enough, these cases, you know, this person was arrested and the police was able to, you know, make this known and a call for, you know, awareness was put. But more so, back to these are cases that are coming around, our work, what I can say at CIPESA, we’ve been able to, we conduct research on topics like, you know, AI, artificial intelligence and its potential impact on either digital rights or internet freedoms, either on the general well-being, you know, of people. And mainly we’ve been able to highlight cases of AI use around election time and how this has kind of impacted or impacted negatively democratic practices in the region. And I think also that captures the aspects that David was mentioning how, you know, different actors are using AI to come in and, you know, spread fake news, the lack of awareness, you know, and what are the key stakeholders doing, you know, the unsupportive, all policy and regulatory frameworks that are non-supportive, the lack of capacity, the technical skills for the individuals who are working around these issues. I know there’s a colleague here, one of the speakers is from Interpol, but there’s a big skills gap that we’ve identified, you know, across the region that, you know, law enforcement still is not well equipped to handle certain cases when it comes to, you know, cases of AI. It may be a skills gap, but also, you know, lack of, you know, either dedicated, you know, units, the units are there, but they’re not well staffed. The policy makers, like say parliamentarians, often pass laws that kind of, you know, limit, you know, certain use of certain technology or certain use of, you know, certain use of, you know, social media in general, which is good. I’ll draw a particular case for Uganda, because this is where I’m best and I can really give quite, you know, more, you know, focused, you know, kind of contribution. You have the Computer Misuse Act, which is an act that is made to, you know, make, you know, internet or, you know, computer use generally, social media, anything internet related, be of relevance or, you know, be of, you know, good practice or for everyone. And we have seen cases where the same law in Uganda, the act itself has been used to curtail on certain rights of individuals, which at times may deter other people who are just joining the landscape to utilize social media. So there are those scenarios that I can draw to, but back to your question on the AI incidents, they are there, but what needs to be done is more awareness creation. How can we identify a deep fake? Do the citizens, the internet users, are they able to tell what is fake or not? How can we empower law enforcement to address cases of impersonation online? Social media or whichever platforms. How can we empower them to identify that? How can we give them enough resources? Because the other aspect that probably is lacking also is the issue of resources in terms of financial resources. We need to find a way of encouraging more support to law enforcement. And I think probably the gentleman from Interpol can share more cases there. There’s been collaborations with the AU, the global cybersecurity, through the AU global cybersecurity expertise forum and the likes and that. But yes, these cases are there. We’ve documented quite a number of them through our policy and research-based work, but also we need to do more engagements, awareness creation, and create resources, financial and technical, for us to be able to address that problem. So I’ll stop at that, Dr. Catherine.
Katherine Getao:
Thank you, Lillian, for a very wide ranging and even telling us about specific cases. And you can see how quickly the technology comes into Africa. I didn’t know that banks had already experienced AI generated frauds. So this is very enlightening and it really shows us that this technology moves like lightning. Now, firstly, I’d like to, now we’ve had a chance to hear from all the speakers. So please feel free to put questions into chats. There’s a very able lady called Judy Okite who’s watching the chats. Welcome, Judy. I know you’ve been there since the beginning and she will be from time to time directing us so that we can direct the discussion towards the contributions that are coming through on the chat. So please do that. Hopefully the last 10, 15 minutes, there will be a chance for a few of you to ask direct questions to our panelists, but please continue to interact on the chat so that I can try and direct the discussion towards your interests. Now, there’s something that Jovan said at the beginning where he said that content governance and protection of cables for him were what kept him awake at night. And I’d like to relate this with something that Lillian has just said about elections and the kind of things that happen around the elections. I think earlier, someone… referred to hate speech. So I’d like to go back to the regulator, Francis. And could you tell us a little bit about some of the challenges that you have around elections as people try to use the technology, especially social media, in a variety of ways? One is to influence others. And we’ve seen a lot of manipulation going on through social media, some of it personalized using big data and using technology such as AI to present compelling messages, true or false, to individuals. And we’ve also had a lot of allegations in West Africa, in Southern Africa, even here in East Africa, that people feel that election technology has been manipulated. So could you give us a little insight onto the dangers of this particular approach? And maybe if you have examples of how it has been mitigated, you can also tell us about that, Francis.
Francis Sitati:
Thank you very much, Dr. Gitao, for that question. Indeed, elections in Kenya especially tend to be a very emotive issue during the country, I mean in the country. And we see temperatures getting out of hand. And social media is actually one of the platforms that a lot of the wars are taken to. And the reason for this, I could say, is I could identify maybe three or four reasons why this could be the case. The first one, of course, is the aspect of anonymity. Because of the aspect of anonymity, you see a lot of what you call the pseudo-accounts, where people create accounts, obviously not in their real names, to try to push out different agendas and also to try to influence various trends. The aspect of anonymity obviously tends to lead to abuse. Based on the frameworks that we have at the Communications Authority, at the CAESAT, with the law enforcement agencies, we try to mitigate this through our collaborations with the DCI and also the various social media providers. Also, the aspect of coming from a regulator, obviously regulation is something that I would have to think about because of the tendency of people to think that, fine, these social media platforms are unregulated. Because of that, I can push out content, try to influence different trends without any repercussions. So, it’s one of the issues that, as the regulator, we are trying to take care of, specifically in terms of amendments to the Kenya Information and Communications Act and the attendant regulations. We’re trying to see, in terms of social media, we need to hold them to account to a certain level, either through licensing or through some other kind of registration, inasmuch as these platforms are majorly foreign-owned. But, if there are crimes being committed within our country, then these platforms need to be accounted for. to a certain extent. Also, availability of personally identifiable information, whereby you find that a lot of Kenyans are unaware, and it has been mentioned by the previous panelists, of the dangers of oversharing, if I can say, whereby your PII is out there, so it makes it easier for the cybercriminals to commit identity theft, create your digital profile and use that, perhaps with the AI technologies we have, the advent of deepfakes, to easily create a video, a deepfake video, of a certain presidential candidate or some other kind of candidate, making some allegations about some issue. So that’s a big problem, even for technical people, people who are knowledgeable in cyber security, the issue of deepfakes is an issue that really is problematic, and we’re working with various providers, social media providers, to try to address this issue in the best way possible. I think I can stop at that, with regard to that subject.
Katherine Getao:
Okay, thank you very, very much for that, Francis. And now I’ll move on to our law enforcement brothers, and this time I’ll start with Lawrence. What we’ve heard from previous panelists is that the victims of these crimes are not only individuals, we also have corporates like banks, I don’t know whether you can commit a crime against the government, but we also have governments. suffering consequences from activities that take place on social media. Now perhaps we can turn to reporting, Lawrence. Firstly, are these crimes being reported? We know there are a lot of them from the research that has been done. Are you seeing individuals, corporates, and even governments coming to you and actually reporting the crimes or not? And if not, why do you think the crimes are not being reported? And then very, very briefly, you can tell us how a crime is reported. These kinds of crimes are reported. Where do we go? And very briefly, what happens from there? If I arrive maybe at a police station and I say that I’ve been the victim of a cyber crime, what happens next? Just so that everybody gets an idea. Thank you, Lawrence. Just go on.
Lawrence Okoth:
Yeah, thank you very much once again. Yeah, on reporting, I’ll start by reporting this kind of crime. What we have observed at our unit is that some of the social media crimes or online crimes are not reported. We get a lot of underreporting when it comes to even offences against a person. So some of them are attached to maybe personality issues. Some people may feel ashamed because of the kind of crime or the kind of situation that they have found themselves in. And we’ve seen a number of… cases where someone comes up after he or she has tried to even pay the criminals so that they can stop harassing them or bullying them online. So very few people report and we have tried also to ensure that we create avenues that people use to report and we also work very closely with the tech industry whereby on social media each and every social media platform has got a mechanism of reporting. If you look at Facebook, look at Instagram or any other even app that was known as Twitter, you can report when you are being harassed or there’s something making you uncomfortable online just by going on the usually there’s a three dotted dots on the right corner of each and every post for example Facebook. If you choose on that or you click on that post you are able to report and the platform or the electronic service provider that you are on will use their internal mechanism to analyze and go through your report and preserve and even pull it down and for our cases of maybe child abuse related cases. We have partnered with an international organization besides other organizations that are working on the same space. We have the National Center for Missing and Exploited Children, whereby they receive reports from all these electronic service providers and they make the reports available for investigations to the relevant authorities. So as DCI, we connected to their database. We are able to pull those reports that are touching on the Kenyan domain and we are able to investigate. So we pull them in the form of cyber intelligence. So you find that even the victims at times, they are not aware because they have been groomed and they have been made to believe that whatever experience they are going through is normal for children. We’ve also experienced a case where you find someone using dating apps, someone who is really looking for victims or vulnerables to abuse. They are lured, they meet and they are abused. So if you find someone who is really going through that kind of harassment, at times they are not easily able to report because of the shame that is attached to it. So they try to handle these kinds of cases themselves without reporting. And when it pops up… It pops up when they are traumatized, they are not ready to even talk about it. So a lot of mechanism, other supporting service providers like the psychosocial support, the health sector are able to come in to help and try to recover these kind of victims from that experience. So we are not receiving a lot of reports, and some of them do not even know how to report. So that’s why advocacy is playing a big role. We also, at times, partner with other organizations just to ensure that we sensitize the public that if they don’t report, then internet do not forget. So it will still pop up. So it is good to come out, report, so that the relevant institutions dealing with these kind of crimes are able to assist. Because as we work very closely with the communications authority of Kenya, they are able to help cool down and also liaise with these other big tech companies to ensure that those reported files are kept as evidence to support cases where we charge perpetrators in court. And a lot of reports that we get, you realize, for children are unable to even share what they are experiencing. So we also ensure that parents are able to… keep an eye on what their children are doing online. We encourage parents to also ensure that they build close relationships, the rapport with their children so that they are the immediate confidence, the trusted adults that a child can run to and report when they are experiencing some discomfort or cyber harassment online. We also want to say so long as even in the, there are those cyber espionage that is also affecting government institutions, we, even the government can be a victim but a lot of efforts and I believe my colleague and friends will tell you that they are doing a 24-7 monitoring of being ready and prepared to respond to any cyber threats that is touching on the Kenyan space and some of them that are individual in nature are reported and they are also able to channel once they receive reports even from the members of the public, they are able to share with the investigative agencies to investigate as they also help to pull down and ensure that those attacks are controlled. Other than that, I want to say DCI has got social media platforms that people can always be sensitized. what is really going on, the emerging trends, and how people can even protect themselves. And we also participate on law reforms. We inform the encounters that we encounter when dealing with this kind of emerging crimes that are touching on social media. So with that, I want to stop at that. Thank you very much.
Katherine Getao:
Yeah, and really excellent information from the Directorate of Criminal Investigation. Lawrence, I think there’s several things you’ve said, which I didn’t know. And I think we’ll all be turning to your portals and websites to get more information. But you can see that the police is catching up. So really encouraging. Now, I know that there may be questions. And I’d really like Judy, maybe to start scanning to see who has their hand up, and to see what’s on social media so that in five or six minutes, I’ll ask so that we can at least have a few questions from the floor. But before we do that, firstly, I’ll ask Jackson, just to tell us a little bit about the international component. A lot of these crimes are transnational, meaning that the criminal is in a different country from the victim. Maybe just give us a slight insight into how they are reported and investigated. And also a slight insight into how you’re building the capacity of police forces around the world, but especially in Africa, to deal with these emerging crimes. Now, so as to make good use of time. I turn to my civil society immediately after Jackson, any of you can chip in, that is Lillian, David, or Dennis, just to tell us what you believe is the most important thing that needs to be done to ensure that citizens are able to get the best out of this technology without suffering the devastating, humiliating, I’ve heard words of depression created by the few people who are committing crimes. If you were to give one prescription, one prescription item from each of you, what would you prescribe needs to be urgently done to help the public? So I’ll start with Jackson to tell us whether these crimes which are cross borders can be caught and whether you are helping police forces to build up their capacity to deal with these crimes. Go ahead, Jackson.
Jackson Cheboi:
Thank you very much, Dr. Arie. Just to mention FASTA-S Interpol is an organization comprising of 196 member countries and each country has at least one node, that’s the NCB, National Central Bureau, which is a law enforcement entity within every country. So I have an imagination of 196 law enforcement entities nodes who try to bring any transnational crime to a stop. The approach is both proactive and reactive, and in this cyberspace, the proactive part is the participation of Interpol as a representative of law enforcement agencies globally, to influence policies, particularly by the large service providers, the globe, to have that initiative, an in-house initiative, to protect the vulnerable and bring adversaries to a stop by collaborating with Interpol and law enforcement agencies around the globe to provide evidence and to stop any form of abuse of such platforms. So the proactive voice has borne fruits because it becomes protection by default, but some will slip that net and when it happens, we bank on the local enforcement agencies, as mentioned by my colleague, Lawrence, to pick up some of those investigative issues towards arresting any situation and should there be a gap in terms of investigation, in terms of technology, in terms of human capacity, Interpol also plays a role in building that capacity in its member countries and expertise within Interpol that can be available to any member country should there be a need to progress an investigative matter. As always. Interpol is protecting people for a safer world. Thank you.
Katherine Getao:
Thank you very much, Jackson. And now I throw it to the people who care about people. Lillian, David, Dennis, you can just chip in and tell us what do we do next.
Dennis Otieno:
Thank you so much, Dr. Tari. Okay, yeah, thank you so much, Dr. Tari. So the question that we are having at hand is what is the most important thing to be done? And what would we prescribe at this particular point? One of the most important things that I would say needs to be done is just a mass civic education. If we can have a mass civic education, continuous education of members of the public, awareness of matters of artificial intelligence, matters of technology, matters of social media. If we can have continuous civic education on the same, this knowledge is what will actually help reduce the vulnerabilities that are around. So that you will find that if we even target children at the schools as well, because we are finding that children are accessing technology as early as age six, and they’re growing up with technology, they’re growing up with social media. If we can target various members of the public on what are the risk factors, what kind of things they should be able to look out for, the essence of detecting their data, the importance of also protecting their data, that kind of mass awareness, which would require a collaborative approach. even amongst civil society organizations, as well as with the government, as well as international organizations. So that when we are doing things like the community forums or Know Your Right campaigns, we are also able to incorporate some bits and pieces of how to manage digital spaces, how to manage social media and what have you. So one prescription that we would prescribe for the members of the public or for everyone in general is that let’s look at a preventive measure approach so that we are not decorating news with the fatalities of cybercrime, cyber securities or cyber security fraud, so that we are having an approach that actually helps us have preventive measures so that we reduce the number of victims from a preventive aspect rather than from reactive aspect. Thank you.
Katherine Getao:
Thank you very much, Dennis, Lillian or David, just chip in.
Lillian Nawoga:
Thanks so much, Catherine, and thanks, Dennis. Maybe just to add to what you just shared is, yes, massive awareness, but also when we say public, I think we need to be more targeted. Public can be more general. We need to go back to the traditional of doing things like mass production of awareness materials on traditional media like television, on radio. I know organizations that are working around using a similar approach, that would be the massive awareness for the public. But when we come now to much more targeted is when you look at cyber security, there are layers. And whereas… each one of us has a role to play, then we need to be more targeted. If it is law enforcement, what do we need them to understand? What kind of awareness? Is it them understanding how these cases come about, how these incidents come around? If it is the policy makers, because most of the times when we are looking at it, we are looking at the regulatory policy angle, what do the law enforcement, I mean, what do the policy makers need? If it is say civic defenders, if it is people who are working around say, creating awareness or engaging, people who are protecting the person who is at the lower ground, what particular skillset do they want? And I think this CPS has been doing this kind of work, so it’s been kicked on it and maybe also a feeder in Kenya. But also the other aspect is when we look at say, the private sector, what aspect of awareness when it comes to cybersecurity, do we need them to understand? So yes, we need to be more targeted, more purposeful, because each part of in the cybersecurity realm presents its own risk and its own issue to be tackled. So that is what I would add on to what Dennis has shared. Thank you.
Katherine Getao:
Wonderful, Lillian, thank you for the targeted approach. And David, you’re going to have the last word.
David Indeje:
Thank you, Dr. Ali and thanks to Lillian and Jackson. I have three things which I’ve just been noting. I will not belabor what my colleagues have emphasized. The entry point should be awareness of privacy rights for all users because as Jackson and the regulators were speaking about, if a parent does not know how to use the devices that they are having, then how will it be easy for the same parent to know what actions their children or child is doing on their mobile phone? So awareness of privacy rights and then every stakeholder, be it the civil society, be it government, be it the academia, whichever sector they are in, we need to reinforce that aspect of having digital literacy programs beginning at the entry level, that is learning institutions, colleges, even at our workplaces whereby we have in-built trainings to build the capacity of the people who we work with around digital literacy programs. And then the second aspect that I would recommend is that for all stakeholders, and this one is specifically for the regulators and the law enforcers, is that there is also a need to have an understanding of ensuring cyber security. Also, as we try to enforce cyber security, we also have to ensure that we are also safeguarding human rights in this aspect. And it has been a huge clarion call for KikTernet in all its work. And then lastly, when we do our mapping, every year KikTernet does an annual mapping of the cyber security needs for Kenya, and something that we have also… noticed is that there is low reporting and low enforcement or when it goes to court there is a low rate of judicial response because number one for a very long time the institutions that are also tasked with investigating and doing all these things, there are trust issues when it comes to maybe their mandate or their mandate cross cuts amongst each other. And then another thing is that internet has been calling for a hybrid kind of system rather than a closed system so that it also becomes another level of building trust among the population. It also builds trust in how cases are reported, cases are investigated, and also it builds on a case-to-case scenario on the development with the law enforcement side. But what we currently have largely from the case is that we have data around how many incidents were reported and when it comes even to the media we have only when a case escalates, maybe within the digital spaces due to civic activism from the population is when a case is normally addressed or when a case from a financial institution has a huge magnitude like what we’ve been from the two examples that we saw in Kenya this week and a few weeks back we saw a case that happened in the financial sector in Uganda is when we see it being reported but you need to have an open system. And then on another, similar to that, internet has also been a goal for cyber diplomacy aspect when it comes to cyber. How do states come up with policies or systems that are aligned to each other, so that to what our interpol colleague was speaking about, it even becomes easy for them when they are trying to do their investigations, because there is a lot of collaboration between states and some of the safeguards that are aligned, would be let’s say the East African community all the way to the African Union level. I think those four are some of the key takeaways from this particular discussion. Thank you, Dr. Ndiaye.
Katherine Getao:
Okay, thank you very much, David, for great enlightenment also. I do apologize that we have run over by about five minutes. I’ve been checking the interaction, and I don’t see any question or any hand raised, so I hope that it means that the presenters have been comprehensive. This is clearly a very broad topic, and I don’t think I need to summarize, because each presenter has been very clear. So I just want to extend my thanks to Francis, Florence, Jackson, Dennis, David, and Lillian for sharing their expertise for such clear presentation and great coverage of very important material. Please, we have a quarterly webinar from the Diplo Foundation. The next one will be in the third quarter. That is between July and September. So please look out for it, and do communicate with us what your interests are. Thank you so, so much for attending, and thank you once again to our presenters. Thank you to Arvind and Jovan. and Mwende and Judy for the work that you are doing in the background together with colleagues. Thank you very, very much and may God bless you all.
Speakers
DI
David Indeje
Speech speed
144 words per minute
Speech length
2248 words
Speech time
934 secs
Report
David Ndeje, the Communications Officer for the Kenya ICT Action Network (KIKTANET), detailed the organisation’s crucial role in creating a cohesive force among different stakeholders in Kenya’s ICT policy sphere. KIKTANET, as a multi-faceted platform, promotes collaboration amongst industry experts, academia, government bodies, and other key players in the ICT domain.
Post-COVID-19, Ndeje highlighted the strategies implemented to address cybersecurity challenges in Kenya by focusing on capacity building, cyber hygiene and the development of pertinent educational materials. To address the digital literacy divide, KIKTANET has executed educational campaigns targeting vulnerable individuals and groups.
These campaigns prioritise cyber safety, including password management, identifying phishing scams and promoting secure internet use. Ndeje emphasised the necessity of educating communities on the secure handling of digital devices and personal information to prevent cybercrime victimisation. He acknowledged prevalent cyber threats such as online harassment, scams, romance fraud, and identity theft, advocating for increased alertness and protective actions.
Ndeje raised concerns about the implications of emerging technologies such as artificial intelligence (AI), referring to it as a dual-faceted entity with potential to both augment efficiency across sectors and induce biases, ultimately risking disproportionate impacts on Africa. He noted issues like algorithmic and data biases in AI that often inadvertently discredit African developers’ and researchers’ outputs, calling for efforts to rectify this and ensure equitable recognition and valuation of their contributions.
Beyond awareness campaigns, Ndeje reported that KIKTANET also champions privacy rights and embeds digital literacy into grassroots level programmes. He acknowledged the crucial roles played by regulatory bodies and law enforcement in sustaining cybersecurity while upholding human rights. The challenges of low incident reporting, enforcement hurdles, and judicial responsiveness were acknowledged, with Ndeje advocating for hybrid systems that promote trust through open inter-institutional communication.
Furthermore, he accentuated the importance of nurturing cyber diplomacy and harmonising international policies, aiding organisations like Interpol to execute effective, cooperative cross-border investigations. Such collaboration is deemed essential for building trust and improving international cybersecurity measures. In closing, Ndeje, along with other expert panelists including Dr.
Ndiaye, asserted the importance of privacy rights education and digital literacy for the wider public. They urged for reformation in reporting and enforcement practices to contribute to a robust cybersecurity infrastructure. The speakers called for a diplomatic, unified cybersecurity strategy that respects human rights, advocating for inclusive, trust-based systems that promote transparent and effective responses to cybersecurity incidents, thus reinforcing an international cooperative cybersecurity framework.
DO
Dennis Otieno
Speech speed
155 words per minute
Speech length
1211 words
Speech time
468 secs
Arguments
FIDA receives cases involving cyber vulnerability with young women as common victims.
Supporting facts:
- Victims or survivors report economic vulnerability as a factor in engaging with cyber vulnerabilities.
- The age range of highest risk is from early teenage to late 20s.
Topics: Cybercrime, Women’s Rights, Gender-Based Violence
FIDA provides legal and psychosocial support to victims of cybercrimes.
Supporting facts:
- Counseling is offered for mental distress and depression arising from cybercrimes.
- Legal representation includes watching briefs and advocacy.
Topics: Legal Aid, Mental Health, Victim Support
Lack of awareness and information contributes to the risk of cyber vulnerability.
Supporting facts:
- People are generally uninformed on the risks associated with sharing personal information online.
- The need for civic education on data protection and online risks is emphasized.
Topics: Digital Literacy, Data Protection, Online Safety
Identity theft and blackmail are notable issues linked to the vulnerability of victims of cybercrimes.
Supporting facts:
- Identity theft is increasingly common, leaving victims open to abuse and blackmail.
- Blackmail can include threats to release personal data or pictures shared during moments of vulnerability.
Topics: Identity Theft, Cyber Extortion, Online Privacy
Report
The Federation of Women Lawyers (FIDA) is at the forefront of efforts to combat cyber vulnerability, with particular attention to the worrying prevalence of cybercrimes affecting young women. Reports indicate those in the early teenage to late 20s age bracket are particularly susceptible, with economic vulnerability being a prominent factor that ensnares women in cyber risks.
FIDA is proactively engaged in addressing these issues, providing comprehensive support services to victims. This support encompasses legal aid involving watching briefs and vigorous advocacy, and psychosocial assistance through counselling services aimed at relieving mental distress and depression resulting from cybercrime encounters.
FIDA expresses deep concern over the lack of digital literacy and awareness regarding data protection, which markedly increases the risk of cyber vulnerability. Individuals often unknowingly expose themselves to online dangers, exacerbating the problem. The issue of identity theft is a growing cause for concern, with victims susceptible to abuse, cyber extortion, and blackmail—often through the misuse of personal data or images shared in vulnerable moments.
FIDA’s stance recognises the relationship between economic hardship and the increased likelihood of women engaging in hazardous online activities. In response, FIDA supports interventions designed to improve the socioeconomic status of women, thereby mitigating their cyber vulnerability. Furthermore, FIDA champions the establishment of rigorous data protection laws and comprehensive civic education.
This would provide the public with the skills to make informed decisions on social media, understanding its benefits whilst recognising its potential hazards. Such preventative measures are crucial in securing personal online data and diminishing the rates of cyber exploitation.
In conclusion, FIDA’s involvement depicts a multifaceted approach to addressing cybercrimes against women. Their actions provide immediate support to victims and advocate for systemic changes through the promotion of effective legislation and education. By tackling both the symptoms and root causes of cyber vulnerability, FIDA strives to create a more secure online environment and advance the status of women’s rights and equality in the digital realm.
FS
Francis Sitati
Speech speed
133 words per minute
Speech length
1048 words
Speech time
474 secs
Report
Francis Iklati from the Communications Authority of Kenya provided an insightful analysis into the increased social media engagement in Kenya. He underscored the country’s strong internet connectivity, revealing that as of December 2023, around 66 million SIM cards were in use, surpassing Kenya’s population of 50 million.
With more than half of these being smartphones (approximately 33 million), this indicates significant mobile internet use. The rise in mobile access can be attributed to the affordability of smartphones and reduced broadband pricing. The boom in social media isn’t solely due to technological growth; it mirrors the Kenyan populace’s thirst for instant information, active political engagement, and means for creative expression.
The youth, in particular, utilise online platforms for entrepreneurship, driving self-made business opportunities by promoting brands through their online presence. Iklati touched on the divisive nature of social media in politics, especially during election periods. He pinpointed the issue of online anonymity as it paves the way for faux accounts that can propagate false information and biased narratives, intensifying tensions in an already volatile political environment.
The collaboration between the Communications Authority’s KE-SAT, law enforcement agencies such as the Directorate of Criminal Investigations, and social media companies is key to counteracting this issue. Regulating these predominantly foreign-owned social media platforms poses a significant challenge. Iklati posited that amendments to Kenya’s Information and Communications Act might be needed to hold these platforms to account for illicit activities carried out on their systems within Kenya, potentially introducing mechanisms like licensing.
Privacy issues and their accompanying threats were also discussed. The habitual oversharing of personal information by Kenyans makes them vulnerable to crimes such as identity theft and the spread of deepfakes. Advanced artificial intelligence technologies exacerbate this problem by enabling the production of realistic fake content that can damage reputations or manipulate public opinion.
Iklati emphasised the importance of tackling these emerging cyber threats, which pose complex challenges even for cybersecurity experts. In summary, Iklati’s presentation illustrates the delicate equilibrium required to nurture a digital environment in Kenya that promotes open innovation and facilitates business, whilst ensuring online integrity and security.
Although social media yields numerous benefits, the potential for its misuse and the risks associated with under-regulated platforms call for vigilant monitoring and forward-thinking policy development.
JC
Jackson Cheboi
Speech speed
100 words per minute
Speech length
568 words
Speech time
340 secs
Report
Dr. Ketau, together with Frances, instigated a dialogue emphasising the fundamental role of social media in authenticating events in the modern digital age. They referenced the saying “if it isn’t on social media, it didn’t happen,” to illustrate the perception that events are deemed significant when acknowledged on online platforms.
They then examined how social media facilitates the planning and implementation of international crimes, highlighting the need for vigilance due to the ease of global coordination through digital means. Interpol, with its global network of 196 member countries, each maintaining a National Central Bureau (NCB), is acutely aware of the challenge posed by cybercrime via social media.
The organisation has spotlighted ransomware, financial cybercrimes involving regulated financial institutions, and sextortion, where individuals, often from Western countries, are manipulated for exploitative purposes, as primary crimes of importance. These acts, while not confined to any single region, showcase the widespread nature of cybercriminal networks.
To counteract these crimes, Interpol employs both proactive and reactive strategies. Proactively, it is striving to influence policy among major internet service providers globally, advocating for default protective measures to shield those at risk and diminish the chances of platform misuse.
Collaboration with these providers is essential for the collection of evidence and the prevention of platform abuse. Reactively, when preventative measures are inadequate, local law enforcement agencies take the lead on investigations, with Interpol providing supplementary support in areas lacking technology, expertise, or capability.
In summary, Interpol is relentlessly working towards creating a more secure global community, fostering capacity building within its member states, and providing necessary expertise to enhance investigative efforts. These actions reflect Interpol’s unwavering commitment to protecting the public and reducing the impact of transnational cybercrime.
The discussion reaffirmed Interpol’s role in ensuring public safety, marking it as a crucial element in the pursuit of a safer world. The text maintains UK spelling and grammar throughout. However, it’s important to note that while key details from the original text have been included in the summary, there may be limitations to integrating long-tail keywords without compromising the summary’s quality and its faithful reflection of the source material.
JK
Jovan Kurbalija
Speech speed
137 words per minute
Speech length
932 words
Speech time
410 secs
Arguments
Social media is significantly influencing various aspects of life.
Supporting facts:
- Social media’s impact on content governance and policy, especially during election periods where misinformation is a concern.
- Social media’s role in both personal security/protection and broader content and data governance issues on a global scale.
Topics: Social Media Impact, Digital Governance
Content governance on social media is a critical issue for global society.
Supporting facts:
- Content governance’s complexity due to cultural variations and necessity for balance between government surveillance for security and personal privacy rights.
- The global importance of getting social media protection and security right, influencing societies worldwide.
Topics: Content Governance, Misinformation, Fake News
Protection of internet infrastructure, especially undersea cables, is essential.
Supporting facts:
- Vulnerability of the internet due to potential cable cuts by countries or private entities.
- Recent incidents affecting internet connections in West Africa and the Red Sea region demonstrate the fragility of global internet infrastructure.
Topics: Internet Infrastructure, Cyber Security
The need for discussions and actions on a range of cyber security issues at different levels is acknowledged.
Supporting facts:
- Recent training for African diplomats on cyber issues in Addis Ababa indicates an active approach to cyber security and diplomacy.
- The webinar itself symbolizes the recognition of and commitment to addressing cyber security risks, both in Africa and globally.
Topics: Cyber Security, Cyber Diplomacy
End-to-end encryption and data privacy are significant concerns.
Supporting facts:
- Government attempts to create back doors in encrypted services.
- Pavel Durov’s experiences with government pressure for surveillance leading him to base Telegram in Dubai highlight the struggle between privacy and government surveillance.
Topics: Data Privacy, Encryption
Report
The pervasive nature of social media is significantly shaping various facets of contemporary life, especially evident within the realm of digital governance and the dissemination of information. Its role becomes particularly crucial during election periods when the spread of misinformation can have substantial consequences.
The governance of content on these platforms represents a complex challenge, necessitating navigation through a myriad cultural nuances while maintaining a delicate balance between the need for government surveillance to ensure security and the preservation of personal privacy rights, which are fundamental to democratic societies.
Despite its neutral sentiment, the discourse acknowledges the considerable influence of social media on personal security and its broader implications for content and data governance on a global scale. Further complicating these governance issues is the international landscape’s diversity, where cultural variations heighten the complexity of formulating universally effective governance systems.
Attention is also focused on the fragility of the global internet infrastructure, notably regarding undersea cables, which are the backbone for international connectivity. These infrastructures have been identified as vulnerable, with potential cable cuts—by nations or private entities—exposing the internet’s susceptibility to disruptions.
Recent incidents affecting network connections in West Africa and the Red Sea region have illustrated this vulnerability, raising concerns over the need to secure these essential components. In the cybersecurity landscape, there’s a positive move towards strengthening cyber defences and diplomacy.
This proactive measure is exemplified by the specialised training provided to African diplomats in cyber issues at a summit in Addis Ababa, showing recognition and an active response to cyber-related risks. The initiative represents a commendable sign of international commitment to address cybersecurity challenges.
Another pivotal aspect of cybersecurity is data privacy, particularly concerning end-to-end encryption. Attempts by governments to install surveillance backdoors in encrypted communication services have sparked a substantial debate over the tension between national security concerns and personal privacy. This tension is exemplified by the experiences of Telegram’s founder, Pavel Durov, who encountered governmental pressure, leading him to relocate the company to Dubai to stand for user privacy.
The dialogue culminates with an advisory stance, urging the prioritisation of pressing concerns such as content governance and the maintenance of internet infrastructure over the intricate and prospective anxieties surrounding AI governance. The argument posits that while AI governance is indeed a long-term concern, issues like content governance and the security of undersea cables have direct, immediate repercussions on people’s lives and thus demand urgent consideration.
In sum, the expanded analysis highlights social media’s expanding influence on societal structures and the critical need to address interconnected challenges of digital governance, infrastructure protection, and data privacy. These concerns have substantial, immediate consequences, emphasising the necessity for a cohesive and informed global response to these pressing issues, ensuring resilient internet connectivity for all.
KG
Katherine Getao
Speech speed
132 words per minute
Speech length
2767 words
Speech time
1257 secs
Arguments
Social media is a compelling platform for communication.
Supporting facts:
- Francis Iklati discussed the surge in social media usage in Kenya.
- Social media facilitates rapid information dissemination and enables real-time updates.
Topics: Social Media, Communication Technology
Social media’s immediacy and reach make it a preferred medium.
Supporting facts:
- Katherine Getao acknowledges the popularity and compelling nature of social media.
- Regular use of social media among meeting participants.
Topics: Social Media, Information Dissemination
Online activities with negative impacts are concerning for law enforcement.
Topics: Cybersecurity, Law Enforcement, Online Behavior
Online grooming of young women resulting in physical harm raises concerns about cyber-related physical crimes.
Supporting facts:
- Some young ladies in Kenya had been groomed online and ended up losing their lives after meeting with the criminals physically.
- There are crimes that start online and can be completed online, but also new physical crimes that commence in the digital space.
Topics: Cybersecurity, Online Grooming, Physical Crime
The Internet is accelerating growth in business and household incomes but also attracts criminals.
Supporting facts:
- Internet was crucial during COVID-19 for business and education.
- Post COVID-19, internet usage has continued to contribute to economic activities.
Topics: Cybersecurity, Economic Growth
Crimes such as child pornography, cyber sex trafficking, and online fraud are becoming prevalent.
Supporting facts:
- Criminals lure children and young people online for exploitation.
- The use of cryptocurrency is facilitating anonymous transactions for illicit materials.
Topics: Child Exploitation, Cyber Crime, Human Trafficking, Online Fraud
There is a need to address the ignorance that facilitates online crimes.
Supporting facts:
- Lawrence Okoth emphasizes the importance of online security awareness.
- Civil society partners are expected to share insights on the crimes and their prevention.
Topics: Cybersecurity Education, Child Protection
Cyber crimes impacts are broad, affecting individuals, corporates, and governments.
Supporting facts:
- Victims of crimes include individuals, corporates like banks, and governments
Topics: Cyber Crime, Social Media, National Security
The reporting of cyber crimes is unclear, and there is a need to understand the process.
Supporting facts:
- Questions raised regarding whether crimes are being reported, how they are reported, and the process following a report
Topics: Cyber Crime Reporting, Law Enforcement
No need for a summary as each presenter was clear.
Supporting facts:
- Presenters comprehensively covered important material
Topics: Webinar Efficiency, Presenter Clarity
Acknowledgement of the presenters’ expertise and presentation quality.
Supporting facts:
- Expressions of gratitude towards Francis, Florence, Jackson, Dennis, David, and Lillian for sharing expertise
Topics: Expertise Recognition, Presentation Skills
Apology for the overrun of the scheduled time.
Supporting facts:
- Session went over by five minutes
Topics: Time Management
Encouragement to attend future webinars.
Supporting facts:
- The announcement of a quarterly webinar from the Diplo Foundation between July and September
Topics: Continuing Education, Future Engagement
Satisfaction with the level of participant engagement.
Supporting facts:
- Observation of no questions or hands raised suggesting comprehensive presentations
Topics: Participant Engagement, Webinar Interaction
Appreciation for the behind-the-scenes team.
Supporting facts:
- Acknowledgement of Arvind, Jovan, Mwende, and Judy’s contributions
Topics: Teamwork, Event Support
Report
The webinar provided a comprehensive analysis of the multifaceted nature of modern communication technology, particularly highlighting the role of social media in fostering connectivity and the emerging threats in cybersecurity as society becomes more digitised. Speakers such as Francis Iklati and Katherine Getao exhibited a positive stance, underlining the crucial role social media plays in the rapid dissemination of information and real-time updates.
This increased reliance on social media, especially noted in Kenya, aligns with SDG 9, which focuses on building resilient infrastructure, promoting sustainable industrialisation, and spurring innovation. Additionally, social media’s role in public political engagement and civil discourse supports SDG 11’s aim to create safe, sustainable, and inclusive urban spaces.
Contrasting with these advancements, the webinar addressed serious concerns surrounding online safety and cybersecurity. Instances of online grooming leading to physical violence against young women in Kenya were spotlighted, reflecting the urgent issues that impinge on SDG 5’s objectives of gender equality and the empowerment of women and girls.
These discussions highlighted the growing necessity of cybersecurity awareness and the vital role civil society organisations play in safeguarding against online crimes, thereby reinforcing the importance of SDG 16 in promoting just, peaceful, and inclusive societies. Emerging threats such as child exploitation, cybercrime, human trafficking, and online fraud were also heavily emphasised, with experts pointing to cryptocurrency as a tool for anonymous illicit transactions.
This underscored the critical need for continuous education and awareness-raising in cyber safety (SDG 4). The ambiguity and complexity of cybercrime reporting was another significant topic, with discussions focusing on the need for clarity and support in the reporting process – a cornerstone of the broader objectives of SDG 16.
Expert contributors to the webinar, including Francis, Florence, Jackson, Dennis, David, and Lillian, were praised for their clarity and expertise. Their presentations were so effective that they left no room for additional questions, signalling an exhaustive coverage of the content.
While the event surpassed the scheduled time by a mere five minutes, this minor overrun did not detract from its success. The session was capped off with an announcement of upcoming webinars from the Diplo Foundation, which accentuated the importance of perpetual learning and engagement in these topics.
The organisational team – Arvind, Jovan, Mwende, and Judy – was also gratefully acknowledged, highlighting the significance of teamwork in facilitating successful events. In summary, the webinar adeptly navigated through the advantages and challenges of social media and cybersecurity, balancing technological progress with its potential issues, and emphasising the collective endeavour of presenters and organisers, all while setting the groundwork for ongoing discussions and education to enhance understanding and tackle critical cybersecurity concerns more effectively.
LO
Lawrence Okoth
Speech speed
103 words per minute
Speech length
1504 words
Speech time
874 secs
Report
Dr. Gitao’s forum delved into the multifaceted role of the internet within modern society, underscoring its key contributions to economic growth and educational accessibility, which became particularly pronounced during the COVID-19 pandemic. The pandemic led to an increased dependence on digital solutions, with children embracing online learning platforms due to school closures, while businesses actively enhanced their digital operations to endure.
However, with this digital progression, there has been a corresponding amplification of vulnerabilities, notably in cybersecurity. The speaker highlighted the darker aspects of internet growth, such as the targeting of minors through online crimes including the dissemination of child pornography and cybersex trafficking.
These heinous crimes are often abetted by the difficult-to-trace nature of cryptocurrencies, which provide a cloak of secrecy for illicit transactions. A crucial concern raised was the significant disparity in crime reporting rates. Many victims refrain from reporting cybercrimes because of embarrassment, fear, or a lack of knowledge about the reporting process.
Although social media platforms offer tools for reporting abuse, these are not invariably effective or used. Consequently, numerous cybercrimes remain undetected until they have already caused severe harm to the victims. For addressing these challenges, educational initiatives and advocacy are deemed indispensable.
Educating the public about the criticality of reporting cybercrimes and instructing them on the reporting process could contribute to making the internet a safer environment. Moreover, there is a call for persistent vigilance against cyber threats, with the Directorate of Criminal Investigations (DCI) having a pivotal role in monitoring and combating these threats within Kenya.
The work of the DCI, alongside other entities, involves sensitising the public, advocating for legal reforms, and utilising social media as a conduit to enhance awareness of emerging cyber threats, which are vital actions in developing policies that can keep up with the dynamic nature of cybercrime.
Additionally, the expanded summary accentuates the role of parents in online child protection. By fostering open communication and monitoring their children’s internet usage, parents can shield them from potential exploitation. They are the fundamental line of defence, providing children with a trusted figure to whom they can report disconcerting online experiences.
In summary, although the internet has revolutionised society by supporting business sustainability and educational access during crises, it has simultaneously opened avenues for exploiting the most vulnerable. Efficient reporting systems, public education, and legal reforms are critical in surmounting these challenges.
A united effort is required, involving law enforcement, tech companies, parents, and governments, to secure digital environments and address the intricate socioeconomic problems introduced by the digital age.
LN
Lillian Nawoga
Speech speed
149 words per minute
Speech length
1560 words
Speech time
630 secs
Report
In summary, Lilian Naroga delivered a persuasive argument emphasising the urgent need to address the multifaceted challenges presented by AI in cybercrime. Advocating a collaborative strategy, she pinpointed the requirement for enhanced awareness, the training of a diverse range of stakeholders, and the implementation of legal frameworks that safeguard rights while maintaining security.
Her insights drew on the detrimental effects of cybercrime in Africa, magnified by AI, citing significant losses experienced by the central bank in Tanzania and similar threats faced by Uganda’s financial systems. Naroga detailed the pernicious use of AI in manipulating electoral systems and propagating fake news, posing a serious threat to democratic structures.
She underscored the risks particularly evident during elections when AI can significantly disrupt democratic processes and norms. The crux of Naroga’s input revolved around a prevailing skills deficit within law enforcement, hindering the effective combatting of AI-driven cybercrime. She criticised the inadequacy of resources allocated to dedicated units, along with insufficient financial support, and highlighted legislative hurdles, such as the implications of Uganda’s Computer Misuse Act, which unintentionally curtail personal freedoms and discourage open online engagement.
Emphasising a multifaceted response to AI-generated cybersecurity threats, Naroga argued for both the upskilling of law enforcement agencies and public education on identifying deepfakes and counterfeit online activities. She emphasised the importance of cross-sector collaboration, involving law enforcement, policymakers, civil society advocates, and the private sector, each contributing through targeted training and industry-specific cybersecurity education to forge a robust stance against the exploitation of AI.
To encapsulate, Naroga’s address called for a united front to foster a digital landscape that is secure, respectful of personal liberties, and supportive of democratic integrity. This inclusive approach entails not only legislative precision and resource allocation but also a broad-based educational initiative to empower all sectors in mitigating the emerging risks associated with AI abuse in cybercrime.
MN
Mwende Njiraini
Speech speed
110 words per minute
Speech length
263 words
Speech time
143 secs
Report
Attendees from across the globe congregated virtually for the “Cyber Security Risks in Social Media” webinar held in Nairobi, epitomising a convergence of experts united by a concern for cyber security. Mwenda Njeraini from the Diplo Foundation elegantly initiated the session, highlighting the essentiality of this convening and the commitment of its participants.
Mwenda offered a heartfelt welcome and encouraged the participants to delve deeply into the vital issue of cyber security risks associated with social media platforms. The inclusion of expert panellists from renowned African countries, such as Uganda and Kenya, signified a regional cooperative effort to tackle these burgeoning challenges.
Accentuating the wide-ranging nature of the topic and the diverse makeup of the audience, Mwenda communicated enthusiasm for the prospect of broadening the knowledge base through the inclusion of more African voices in future webinars. The thankfulness expressed to attendees for their registration and readiness to dedicate time to this significant dialogue underscored the organiser’s appreciation for each participant’s contribution.
Following Mwenda’s sincere introduction, Jovan Kubalia, the Executive Director of Diplo, stepped up to provide the foundational remarks, aimed at prepping the stage for the forthcoming deliberations. While the details of Jovan’s comments were not included in the provided text, it is presumed that he addressed critical points that would channel the discussions, encouraging active participation from the panellists and audience in navigating the intricacies of cyber security and social media.
Then, Dr. Catherine Gitao took responsibility for steering the webinar. Tasked with coordinating the panellists—who were poised to introduce themselves—and managing the transition to the in-depth considerations of the webinar theme, Dr. Gitao’s role was crucial. Although specifics regarding Dr.
Gitao’s input and the panellists’ introductions remain unmentioned, the structure suggests an organised progression towards a valuable dialogue on the strategies and solutions for combating cyber security threats within social media. In summary, this overview paints a picture of the initial stages of a webinar brimming with specialist knowledge, aligned in the pursuit of addressing cyber security issues.
It portends engaging debates, the exchange of insights, and potential development of frameworks that could have lasting implications for future conversations and the wider journey in cyber security management. The absence of particularised information about the substantive discussions that occurred indicates that additional details from the rest of the content are needed to provide a full synopsis.
Related event
Cybersecurity risks in social media: Remedies and solutions
17 Apr 2024 10:00h - 11:30h
Nairobi,Kenya