Malicious Use of Artificial Intelligence in Sub-Saharan Africa: Challenges for Pan-African Cybersecurity
- 作者: Pantserev K.A.1
-
隶属关系:
- St. Petersburg State University
- 期: 卷 22, 编号 2 (2022): Non-Western World in Cyberspace
- 页面: 288-302
- 栏目: THEMATIC DOSSIER
- URL: https://journals.rudn.ru/international-relations/article/view/31408
- DOI: https://doi.org/10.22363/2313-0660-2022-22-2-288-302
如何引用文章
详细
For almost two decades, Sub-Saharan African countries have been making significant efforts to ensure the rapid development of industries related to information and communication technology (ICTs) in the region. At present, all leading nations are placing greater emphasis on the development of hybrid intelligent systems capable of solving extremely complicated tasks. This includes Sub-Saharan African countries, which consider the development of advanced technologies to be an effective instrument for ensuring sustainable social and economic growth and solving a great number of the continent’s problems. It has become evident, however, that all technological novelties that should simplify our lives can be used for malicious purposes. The present study examines existing practices and risks of malicious use of artificial intelligence (MUAI) in Sub-Saharan African countries. At the end of the study, the author comes to the conclusion that the problem of ensuring information, psychological, and cybersecurity is common to all African countries, which creates a serious obstacle for their further sustainable social and economic development. Over the past decade, Sub-Saharan Africa has made significant efforts to elaborate a joint vision for counteracting cybercrimes and the malicious use of advanced technologies. But all the attempts to establish effective supranational instruments that would regulate the fight against cyberattacks at the Pan-African level and take into account the interests of the vast majority of African countries in this area have failed. This demonstrates the presence of serious contradictions among African countries, which, taken together, prevent the establishment of mutually beneficial cooperation even in such an important field as cybersecurity. However, until such cooperation is established, it seems unlikely that African countries will even come close to solving this problem, which means that their information space will continue to be subjected to large-scale cyber-attacks that pose a serious threat not only to the security of individuals, but also to national and Pan-African security.
作者简介
Konstantin Pantserev
St. Petersburg State University
编辑信件的主要联系方式.
Email: pantserev@yandex.ru
ORCID iD: 0000-0002-2164-9525
PhD, Dr. of Sc. (Political Sciences), Professor, Department of Theory and History of International Relations, The Faculty of International Relations
Saint Petersburg, Russian Federation参考
- Antinori, A. (2019). Terrorism and deepfakes: From hybrid warfare to post-truth warfare in a hybrid world. In P. Griffths & M. Nowshade (Eds.), Proceedings of the European conference on the impact of artificial intelligence and robotics (pp. 23-20). Reading, South Oxfordshire, England: Academic Conferences and publishing limited.
- Artificial intelligence for Africa: An opportunity for growth, development, and democratisation. (2018). Access Partnership. Retrieved from https://www.up.ac.za/media/shared/7/ZP_Files/ai-for-africa.zp165664.pdf
- Bazarkina, D. Y., & Pashentsev, E. N. (2019). Artificial intelligence and new threats to international psychological security. Russia in Global Affairs, 17(1), 147-170. https://doi.org/10.31278/1810-6374-2019-17-1-147-170
- Bazarkina, D. Y., Pashentsev, E. N., & Simons, G. (2020). Terrorism and advanced technologies in psychological warfare: New risks, new opportunities to counter the terrorist threat. New York: Nova Science Publishers.
- Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., et al. (2018). The malicious use of artificial intelligence: forecasting, prevention, and mitigation. Future of Humanity Institute, University of Oxford, Centre for the Study of Existential Risk, University of Cambridge, Center for a New American Security, Electronic Frontier Foundation, OpenAI, 1-100. Retrieved from https://arxiv.org/ftp/arxiv/papers/1802/1802.07228.pdf
- Butcher, N., Wilson-Strydom, M., & Baijnath, M. (2021). Artificial intelligence capacity in Sub-Saharan Africa. Compendium Report. International Development Research Centre. Retrieved from https://idl-bnc-idrc.dspacedirect.org/bitstream/handle/10625/59999/27ea1089-760f-4136-b637-16367161edcc.pdf?sequence=1
- Chesney, R., & Citron, D. (2018). Deep fakes: A looming challenge for privacy, democracy, and national security. California Law Review, 107(1753), 1753-1820. https://doi.org/10.15779/Z38RV0D15J
- Chiluwa, I. E. (2019a). Deception in online terrorist propaganda: A study of ISIS and Boko Haram. In I. E. Chiluwa & S. A. Samoilenko (Eds.), Handbook of research on deception, fake news, and misinformation online (pp. 520-537). Hershey, PA: Information Science Reference. https://doi.org/10.4018/978-1-5225-8535-0.ch028
- Chiluwa, I. E. (2019b). Discourse analysis and conflict studies. In SAGE Research Methods Cases. London: SAGE Publications. https://dx.doi.org/10.4135/9781526468208
- Chiluwa, I. E. (2019c). Online activism in Mali: A study of digital discourses of the movement for the liberation of Azawad. In I. E. Chiluwa & G. Bourvier (Eds.), Activism, campaigning and political discourse on Twitter (pp. 207-234). New York: Nova Science Publishers.
- Chiluwa, I. E., Chimuanya, L., & Ajiboye, E. (2020). Communicating religious extremism in West Africa. In J. Tarusarira & E. Chitando (Eds.), Themes in religion and human security in Africa (pp. 166-179). London: Routledge. https://doi.org/10.4324/9781003017080-12
- Dack, S. (2019). Deep fakes, fake news, and what comes next. The Henry M. Jackson School of International Studies, University of Washington. Retrieved from https://jsis.washington.edu/news/deep-fakes-fake-news-and-what-comes-next
- Haula, K., & Agbozo, E. (2020). A systematic review on unmanned aerial vehicles in Sub-Saharan Africa: A socio-technical perspective. Technology in Society, 63, 1-7. https://doi.org/10.1016/j.techsoc.2020.101357
- Interpol. (2020). Online African organized crime from surface and dark web. Interpol Analytical Report. Retrieved from: https://www.euneighbours.eu/sites/default/files/publications/2020-08/INTERPOL%20report.pdf
- Ishengoma, F. R. (2013). Online social networks and terrorism 2.0 in developing countries. International Journal of Computer Science and Network Solutions, 1(4), 1-12. https://doi.org/10.48550/arXiv.1410.0531
- Jeangène Vilmer, J.-B., Escorcia, A., Guillaume, M., & Herrera, J. (2018). Les manipulations de l’information: un défi pour nos démocraties. Rapport du Centre d’analyse, de prévision et de stratégie (CAPS) du ministère de l’Europe et des Affaires étrangères et de l’Institut de recherche stratégique de l’École militaire (IRSEM) du ministère des Armées, 1-214. Retrieved from https://www.diplomatie.gouv.fr/IMG/pdf/les_manipulations_de_l_information_2__cle04b2b6.pdf
- Kharouni, L. (2013). Africa: A new safe harbor for cybercriminals? Trend Micro Incorporated Research Paper, 1-31. Retrieved from https://web.archive.org/web/20220403192613/https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-africa.pdf
- Owoyemi, A., Owoyemi, J., Osiyemi, A., & Boyd, A. (2020). Artificial intelligence for healthcare in Africa. Frontiers in Digital Health, 2, 1-5. https://doi.org/10.3389/fdgth.2020.00006
- Pashentsev, E. (2019). Destabilization of unstable dynamic social equilibriums through high-tech strategic psychological warfare. In N. van der Waag-Cowling & L. Leenen (Eds.), Proceedings of the 14th International Conference on Cyber Warfare and Security (pp. 322-328). Reading, South Oxfordshire, England: Academic Conferences and publishing limited.
- Vattapparamban, E., Güvenç, İ, Yurekli, A., Akkaya, K., & Uluağaç S. (2016). Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC) (pp. 216-221). New York: Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/IWCMC.2016.7577060