<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">Vestnik RUDN. International Relations</journal-id><journal-title-group><journal-title xml:lang="en">Vestnik RUDN. International Relations</journal-title><trans-title-group xml:lang="ru"><trans-title>Вестник Российского университета дружбы народов. Серия: Международные отношения</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2313-0660</issn><issn publication-format="electronic">2313-0679</issn><publisher><publisher-name xml:lang="en">федеральное государственное автономное образовательное учреждение высшего образования «Российский университет дружбы народов имени Патриса Лумумбы» (РУДН)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">31408</article-id><article-id pub-id-type="doi">10.22363/2313-0660-2022-22-2-288-302</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>THEMATIC DOSSIER</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>ТЕМАТИЧЕСКОЕ ДОСЬЕ</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Malicious Use of Artificial Intelligence in Sub-Saharan Africa: Challenges for Pan-African Cybersecurity</article-title><trans-title-group xml:lang="ru"><trans-title>Злонамеренное использование технологий искусственного интеллекта в странах Африки южнее Сахары: вызовы панафриканской кибербезопасности</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-2164-9525</contrib-id><name-alternatives><name xml:lang="en"><surname>Pantserev</surname><given-names>Konstantin A.</given-names></name><name xml:lang="ru"><surname>Панцерев</surname><given-names>Константин Арсеньевич</given-names></name></name-alternatives><bio xml:lang="en"><p>PhD, Dr. of Sc. (Political Sciences), Professor, Department of Theory and History of International Relations, The Faculty of International Relations</p></bio><bio xml:lang="ru"><p>доктор политических наук, профессор кафедры теории и истории международных отношений факультета международных отношений</p></bio><email>pantserev@yandex.ru</email><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">St. Petersburg State University</institution></aff><aff><institution xml:lang="ru">Санкт-Петербургский государственный университет</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2022-07-03" publication-format="electronic"><day>03</day><month>07</month><year>2022</year></pub-date><volume>22</volume><issue>2</issue><issue-title xml:lang="en">Non-Western World in Cyberspace</issue-title><issue-title xml:lang="ru">Незападный мир в киберпространстве</issue-title><fpage>288</fpage><lpage>302</lpage><history><date date-type="received" iso-8601-date="2022-07-03"><day>03</day><month>07</month><year>2022</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2022, Pantserev K.A.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2022, Панцерев К.А.</copyright-statement><copyright-year>2022</copyright-year><copyright-holder xml:lang="en">Pantserev K.A.</copyright-holder><copyright-holder xml:lang="ru">Панцерев К.А.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/international-relations/article/view/31408">https://journals.rudn.ru/international-relations/article/view/31408</self-uri><abstract xml:lang="en"><p style="text-align: justify;">For almost two decades, Sub-Saharan African countries have been making significant efforts to ensure the rapid development of industries related to information and communication technology (ICTs) in the region. At present, all leading nations are placing greater emphasis on the development of hybrid intelligent systems capable of solving extremely complicated tasks. This includes Sub-Saharan African countries, which consider the development of advanced technologies to be an effective instrument for ensuring sustainable social and economic growth and solving a great number of the continent’s problems. It has become evident, however, that all technological novelties that should simplify our lives can be used for malicious purposes. The present study examines existing practices and risks of malicious use of artificial intelligence (MUAI) in Sub-Saharan African countries. At the end of the study, the author comes to the conclusion that the problem of ensuring information, psychological, and cybersecurity is common to all African countries, which creates a serious obstacle for their further sustainable social and economic development. Over the past decade, Sub-Saharan Africa has made significant efforts to elaborate a joint vision for counteracting cybercrimes and the malicious use of advanced technologies. But all the attempts to establish effective supranational instruments that would regulate the fight against cyberattacks at the Pan-African level and take into account the interests of the vast majority of African countries in this area have failed. This demonstrates the presence of serious contradictions among African countries, which, taken together, prevent the establishment of mutually beneficial cooperation even in such an important field as cybersecurity. However, until such cooperation is established, it seems unlikely that African countries will even come close to solving this problem, which means that their information space will continue to be subjected to large-scale cyber-attacks that pose a serious threat not only to the security of individuals, but also to national and Pan-African security.</p></abstract><trans-abstract xml:lang="ru"><p style="text-align: justify;">На протяжении двух десятилетий страны Африки южнее Сахары прилагали значительные усилия, направленные на быстрое развитие информационно-коммуникационных технологий. В настоящее время все ведущие мировые державы уделяют повышенное внимание созданию гибридных интеллектуальных систем, способных решать наиболее сложные задачи. Страны Африки южнее Сахары не остались в стороне от этого процесса. Их правительства убеждены, что передовые технологии являются наиболее эффективным инструментом, способным обеспечить устойчивый социально-экономический рост и решить наиболее насущные проблемы. Однако любые технологические новации, которые призваны упростить нашу жизнь, могут быть использованы и в злонамеренных целях. Настоящее исследование показывает возможные риски злонамеренного использования технологий искусственного интеллекта в странах Африки, расположенных южнее Сахары. Некоторые из этих рисков уже стали реальностью. Автор приходит к выводу, что проблема обеспечения информационно-психологической и кибербезопасности является общей для всех африканских стран. Именно она встает на пути обеспечения дальнейшего устойчивого социально-экономического роста государств рассматриваемого региона. На протяжении последнего десятилетия страны Африки южнее Сахары старались выработать совместное видение борьбы с киберпреступлениями и злонамеренным применением передовых технологий. Однако все их попытки создать действенные наднациональные институты, которые регулировали бы борьбу с кибератаками на панафриканском уровне и учитывали бы интересы подавляющего большинства африканских стран, провалились. Данное обстоятельство демонстрирует наличие серьезных противоречий среди африканских государств, которые препятствуют установлению взаимовыгодного сотрудничества даже в такой важной сфере, какой является проблема обеспечения кибербезопасности. Тем не менее пока подобное сотрудничество не будет налажено, представляется маловероятным, что африканские страны хотя бы приблизятся к решению данной проблемы, что означает, что они и в дальнейшем будут подвергаться масштабным кибератакам, которые создают серьезную угрозу для личной, национальной и панафриканской безопасности.</p></trans-abstract><kwd-group xml:lang="en"><kwd>artificial intelligence</kwd><kwd>strategic communication</kwd><kwd>psychological warfare</kwd><kwd>information security</kwd><kwd>cybersecirity</kwd><kwd>Sub-Saharan African countries</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>искусственный интеллект</kwd><kwd>стратегическая коммуникация</kwd><kwd>информационно-психологическое противоборство</kwd><kwd>информационная безопасность</kwd><kwd>кибербезопасность</kwd><kwd>страны Африки южнее Сахары</kwd></kwd-group><funding-group><award-group><funding-source><institution-wrap><institution xml:lang="ru">Статья выполнена при финансовой поддержке СПбГУ, проект № 93024916 «Искусственный интеллект и наука о данных: теория, технология, отраслевые и междисциплинарные исследования и приложения».</institution></institution-wrap><institution-wrap><institution xml:lang="en">This research was supported by the St. Petersburg State University, project No. 93024916 “Artificial Intelligence and Data Science: Theory, Technology, Sectoral and Interdisciplinary Researches and Applications”.</institution></institution-wrap></funding-source></award-group></funding-group></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><citation-alternatives><mixed-citation xml:lang="en">Antinori, A. (2019). Terrorism and deepfakes: From hybrid warfare to post-truth warfare in a hybrid world. In P. Griffths &amp; M. Nowshade (Eds.), Proceedings of the European conference on the impact of artificial intelligence and robotics (pp. 23-20). Reading, South Oxfordshire, England: Academic Conferences and publishing limited.</mixed-citation><mixed-citation xml:lang="ru">Antinori A. Terrorism and Deepfakes: From Hybrid Warfare to Post-Truth Warfare in a Hybrid World // Proceedings of the European Conference on the Impact of Artificial Intelligence and Robotics / ed. by P. Griffths, M. Nowshade. Reading, South Oxfordshire, England : Academic Conferences and publishing limited, 2019. P. 23—20.</mixed-citation></citation-alternatives></ref><ref id="B2"><label>2.</label><citation-alternatives><mixed-citation xml:lang="en">Artificial intelligence for Africa: An opportunity for growth, development, and democratisation. (2018). Access Partnership. Retrieved from https://www.up.ac.za/media/shared/7/ZP_Files/ai-for-africa.zp165664.pdf</mixed-citation><mixed-citation xml:lang="ru">Artificial Intelligence for Africa: An Opportunity for Growth, Development, and Democratisation // Access Partnership. 2018. URL: https://www.up.ac.za/media/shared/7/ZP_Files/ai-for-africa.zp165664.pdf  (accessed: 12.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B3"><label>3.</label><citation-alternatives><mixed-citation xml:lang="en">Bazarkina, D. Y., &amp; Pashentsev, E. N. (2019). Artificial intelligence and new threats to international psychological security. Russia in Global Affairs, 17(1), 147-170. https://doi.org/10.31278/1810-6374-2019-17-1-147-170</mixed-citation><mixed-citation xml:lang="ru">Bazarkina D. Y., Pashentsev E. N. Artificial Intelligence and New Threats to International Psychological Security // Russia in Global Affairs. 2019. Vol. 17, no. 1. P. 147—170. https://doi.org/10.31278/1810-6374-2019-17-1-147-170</mixed-citation></citation-alternatives></ref><ref id="B4"><label>4.</label><citation-alternatives><mixed-citation xml:lang="en">Bazarkina, D. Y., Pashentsev, E. N., &amp; Simons, G. (2020). Terrorism and advanced technologies in psychological warfare: New risks, new opportunities to counter the terrorist threat. New York: Nova Science Publishers.</mixed-citation><mixed-citation xml:lang="ru">Bazarkina D. Y., Pashentsev E. N., Simons G. Terrorism and Advanced Technologies in Psychological Warfare: New Risks, New Opportunities to Counter the Terrorist Threat. New York : Nova Science Publishers, 2020.</mixed-citation></citation-alternatives></ref><ref id="B5"><label>5.</label><citation-alternatives><mixed-citation xml:lang="en">Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., et al. (2018). The malicious use of artificial intelligence: forecasting, prevention, and mitigation. Future of Humanity Institute, University of Oxford, Centre for the Study of Existential Risk, University of Cambridge, Center for a New American Security, Electronic Frontier Foundation, OpenAI, 1-100. Retrieved from https://arxiv.org/ftp/arxiv/papers/1802/1802.07228.pdf</mixed-citation><mixed-citation xml:lang="ru">Brundage M., Avin S., Clark J., Toner H., Eckersley P. et al. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. Future of Humanity Institute, University of Oxford, Centre for the Study of Existential Risk, University of Cambridge, Center for a New American Security, Electronic Frontier Foundation, OpenAI, 2018. P. 1—100. URL: https://arxiv.org/ftp/arxiv/papers/1802/1802.07228.pdf  (accessed: 12.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B6"><label>6.</label><citation-alternatives><mixed-citation xml:lang="en">Butcher, N., Wilson-Strydom, M., &amp; Baijnath, M. (2021). Artificial intelligence capacity in Sub-Saharan Africa. Compendium Report. International Development Research Centre. Retrieved from https://idl-bnc-idrc.dspacedirect.org/bitstream/handle/10625/59999/27ea1089-760f-4136-b637-16367161edcc.pdf?sequence=1</mixed-citation><mixed-citation xml:lang="ru">Butcher N., Wilson-Strydom M., Baijnath M. Artificial Intelligence Capacity in Sub-Saharan Africa // Compendium Report. International Development Research Centre. 2021. URL: https://idl-bnc-idrc.dspacedirect.org/bitstream/handle/10625/59999/27ea1089-760f-4136-b637-16367161edcc.pdf?sequence=1 (accessed: 12.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B7"><label>7.</label><citation-alternatives><mixed-citation xml:lang="en">Chesney, R., &amp; Citron, D. (2018). Deep fakes: A looming challenge for privacy, democracy, and national security. California Law Review, 107(1753), 1753-1820. https://doi.org/10.15779/Z38RV0D15J</mixed-citation><mixed-citation xml:lang="ru">Chesney R., Citron D. Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security // California Law Review. 2018. Vol.107, no. 1753. P. 1753—1820. https://doi.org/10.15779/Z38RV0D15J</mixed-citation></citation-alternatives></ref><ref id="B8"><label>8.</label><citation-alternatives><mixed-citation xml:lang="en">Chiluwa, I. E. (2019a). Deception in online terrorist propaganda: A study of ISIS and Boko Haram. In I. E. Chiluwa &amp; S. A. Samoilenko (Eds.), Handbook of research on deception, fake news, and misinformation online (pp. 520-537). Hershey, PA: Information Science Reference. https://doi.org/10.4018/978-1-5225-8535-0.ch028</mixed-citation><mixed-citation xml:lang="ru">Chiluwa I. E. (2019a). Deception in Online Terrorist Propaganda: A Study of ISIS and Boko Haram // Handbook of Research on Deception, Fake News, and Misinformation Online / ed. by I. E. Chiluwa, S. A. Samoilenko. Hershey, PA : Information Science Reference, 2019a. P. 520—537. https://doi.org/10.4018/978-1-5225-8535-0.ch028</mixed-citation></citation-alternatives></ref><ref id="B9"><label>9.</label><citation-alternatives><mixed-citation xml:lang="en">Chiluwa, I. E. (2019b). Discourse analysis and conflict studies. In SAGE Research Methods Cases. London: SAGE Publications. https://dx.doi.org/10.4135/9781526468208</mixed-citation><mixed-citation xml:lang="ru">Chiluwa I. E. Discourse Analysis and Conflict Studies // SAGE Research Methods Cases. London : SAGE Publications, 2019b. https://dx.doi.org/10.4135/9781526468208</mixed-citation></citation-alternatives></ref><ref id="B10"><label>10.</label><citation-alternatives><mixed-citation xml:lang="en">Chiluwa, I. E. (2019c). Online activism in Mali: A study of digital discourses of the movement for the liberation of Azawad. In I. E. Chiluwa &amp; G. Bourvier (Eds.), Activism, campaigning and political discourse on Twitter (pp. 207-234). New York: Nova Science Publishers.</mixed-citation><mixed-citation xml:lang="ru">Chiluwa I. E. Online Activism in Mali: A Study of Digital Discourses of the Movement for the Liberation of Azawad // Activism, Campaigning and Political Discourse on Twitter / ed. by I. E. Chiluwa, G. Bourvier. New York : Nova Science Publishers, 2019c. P. 207—234.</mixed-citation></citation-alternatives></ref><ref id="B11"><label>11.</label><citation-alternatives><mixed-citation xml:lang="en">Chiluwa, I. E., Chimuanya, L., &amp; Ajiboye, E. (2020). Communicating religious extremism in West Africa. In J. Tarusarira &amp; E. Chitando (Eds.), Themes in religion and human security in Africa (pp. 166-179). London: Routledge. https://doi.org/10.4324/9781003017080-12</mixed-citation><mixed-citation xml:lang="ru">Chiluwa I. E., Chimuanya L., Ajiboye E. Communicating Religious Extremism in West Africa // Themes in Religion and Human Security in Africa / ed. by J. Tarusarira, E. Chitando. London : Routledge, 2020. P. 166—179. https://doi.org/10.4324/9781003017080-12</mixed-citation></citation-alternatives></ref><ref id="B12"><label>12.</label><citation-alternatives><mixed-citation xml:lang="en">Dack, S. (2019). Deep fakes, fake news, and what comes next. The Henry M. Jackson School of International Studies, University of Washington. Retrieved from https://jsis.washington.edu/news/deep-fakes-fake-news-and-what-comes-next</mixed-citation><mixed-citation xml:lang="ru">Dack S. Deep Fakes, Fake News, and What Comes Next. The Henry M. Jackson School of International Studies, University of Washington, 2019. URL: https://jsis.washington.edu/news/deep-fakes-fake-news-and-what-comes-next  (accessed: 12.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B13"><label>13.</label><citation-alternatives><mixed-citation xml:lang="en">Haula, K., &amp; Agbozo, E. (2020). A systematic review on unmanned aerial vehicles in Sub-Saharan Africa: A socio-technical perspective. Technology in Society, 63, 1-7. https://doi.org/10.1016/j.techsoc.2020.101357</mixed-citation><mixed-citation xml:lang="ru">Haula K., Agbozo E. A Systematic Review on Unmanned Aerial Vehicles in Sub-Saharan Africa: A Socio-Technical Perspective // Technology in Society. 2020. Vol. 63. P. 1—7. https://doi.org/10.1016/j.techsoc.2020.101357</mixed-citation></citation-alternatives></ref><ref id="B14"><label>14.</label><citation-alternatives><mixed-citation xml:lang="en">Interpol. (2020). Online African organized crime from surface and dark web. Interpol Analytical Report. Retrieved from: https://www.euneighbours.eu/sites/default/files/publications/2020-08/INTERPOL%20report.pdf</mixed-citation><mixed-citation xml:lang="ru">Ishengoma F. R. Online Social Networks and Terrorism 2.0 in Developing Countries // International Journal of Computer Science and Network Solutions. 2013. Vol. 1, no. 4. P. 1—12. https://doi.org/10.48550/arXiv.1410.0531</mixed-citation></citation-alternatives></ref><ref id="B15"><label>15.</label><citation-alternatives><mixed-citation xml:lang="en">Ishengoma, F. R. (2013). Online social networks and terrorism 2.0 in developing countries. International Journal of Computer Science and Network Solutions, 1(4), 1-12. https://doi.org/10.48550/arXiv.1410.0531</mixed-citation><mixed-citation xml:lang="ru">Jeangène Vilmer J.-B., Escorcia A., Guillaume M., Herrera J. Les manipulations de l’information: un défi pour nos démocraties // Rapport du Centre d’analyse, de prévision et de stratégie (CAPS) du ministère de l’Europe et des Affaires étrangères et de l’Institut de recherche stratégique de l’École militaire (IRSEM) du ministère des Armées. 2018. P. 1—214. URL: https://www.diplomatie.gouv.fr/IMG/pdf/les_manipulations_de_l_information_2__cle04b2b6.pdf  (accessed: 12.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B16"><label>16.</label><citation-alternatives><mixed-citation xml:lang="en">Jeangène Vilmer, J.-B., Escorcia, A., Guillaume, M., &amp; Herrera, J. (2018). Les manipulations de l’information: un défi pour nos démocraties. Rapport du Centre d’analyse, de prévision et de stratégie (CAPS) du ministère de l’Europe et des Affaires étrangères et de l’Institut de recherche stratégique de l’École militaire (IRSEM) du ministère des Armées, 1-214. Retrieved from https://www.diplomatie.gouv.fr/IMG/pdf/les_manipulations_de_l_information_2__cle04b2b6.pdf</mixed-citation><mixed-citation xml:lang="ru">Kharouni L. Africa: A New Safe Harbor for Cybercriminals? // Trend Micro Incorporated Research Paper. 2013. P. 1—31. URL: https://web.archive.org/web/20220403192613/https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-africa.pdf  (accessed: 12.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B17"><label>17.</label><citation-alternatives><mixed-citation xml:lang="en">Kharouni, L. (2013). Africa: A new safe harbor for cybercriminals? Trend Micro Incorporated Research Paper, 1-31. Retrieved from https://web.archive.org/web/20220403192613/https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-africa.pdf</mixed-citation><mixed-citation xml:lang="ru">Online African Organized Crime from Surface and Dark Web // Interpol Analytical Report. 2020. URL: https://www.euneighbours.eu/sites/default/files/publications/2020-08/INTERPOL%20report.pdf  (accessed: 12.02.2022).</mixed-citation></citation-alternatives></ref><ref id="B18"><label>18.</label><citation-alternatives><mixed-citation xml:lang="en">Owoyemi, A., Owoyemi, J., Osiyemi, A., &amp; Boyd, A. (2020). Artificial intelligence for healthcare in Africa. Frontiers in Digital Health, 2, 1-5. https://doi.org/10.3389/fdgth.2020.00006</mixed-citation><mixed-citation xml:lang="ru">Owoyemi A., Owoyemi J., Osiyemi A., Boyd A. Artificial Intelligence for Healthcare in Africa // Frontiers in Digital Health. 2020. Vol. 2. P. 1—5. https://doi.org/10.3389/fdgth.2020.00006</mixed-citation></citation-alternatives></ref><ref id="B19"><label>19.</label><citation-alternatives><mixed-citation xml:lang="en">Pashentsev, E. (2019). Destabilization of unstable dynamic social equilibriums through high-tech strategic psychological warfare. In N. van der Waag-Cowling &amp; L. Leenen (Eds.), Proceedings of the 14th International Conference on Cyber Warfare and Security (pp. 322-328). Reading, South Oxfordshire, England: Academic Conferences and publishing limited.</mixed-citation><mixed-citation xml:lang="ru">Pashentsev E. Destabilization of Unstable Dynamic Social Equilibriums through High-Tech Strategic Psychological Warfare // Proceedings of the 14th International Conference on Cyber Warfare and Security / ed. by N. van der Waag-Cowling, L. Leenen. Reading, South Oxfordshire, England : Academic Conferences and publishing limited, 2019. P. 322—328.</mixed-citation></citation-alternatives></ref><ref id="B20"><label>20.</label><citation-alternatives><mixed-citation xml:lang="en">Vattapparamban, E., Güvenç, İ, Yurekli, A., Akkaya, K., &amp; Uluağaç S. (2016). Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 216-221). New York: Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/IWCMC.2016.7577060</mixed-citation><mixed-citation xml:lang="ru">Vattapparamban E., Güvenç İ., Yurekli A., Akkaya K., Uluağaç S. Drones for Smart Cities: Issues in Cybersecurity, Privacy, and Public Safety // 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). New York : Institute of Electrical and Electronics Engineers, 2016. P. 216—221. https://doi.org/10.1109/IWCMC.2016.7577060</mixed-citation></citation-alternatives></ref></ref-list></back></article>
