West Nile Journalists and Human Rights Defenders Condemn Cyber-attacks and Internet Abuse By State and Non-state Actors

By Hafiz Bakhit |

Arua District. Internet has broken more barriers than before as the future of media continues to turn digital especially in entertainment, news, and business.

However, Journalists and Human rights defenders drawn across west Nile region during a two-day training in Arua District, noted with concern that though the Internet has brought new and exciting communication methods that allow users to share messages more quickly and across greater distances, there is need to pay much attention to the risks involved.

These Include deliberate targeting and clampdown on human rights organisation defenders by both state and non-state actors, intimidation, arrests, Cyber attacks and harassment of social media users which have all become a serious threat to Internet freedom.

Also Key in the discussions were Digital Rights in Uganda, Combating Dis/Misinformation and Hate Speech, fact-checking to fight fake news, freedom of expression, best digital security practices, laws governing Internet use and related media laws among others.

Edrine Wanyama the Legal Officer from the Collaboration on International ICT Policy in East and Southern Africa (CIPESA) the organization which organized the training called for more vigilance in dealing with the rising cases of Cyberbullying, invasion of privacy, identity theft, and exposure to offensive images.

“We have seen people uploading inappropriate content, embarrassing or provocative photos or videos of themselves or others, sharing personal information with strangers – for example, phone numbers, date of birth or location and other confidential personal data hence falling prey to hackers and scammers”, Wanyama Added.

He also mentioned state and non-state actors who tend to undermine internet freedom by legalizing surveillance and interception of communication, digital taxation, internet disruptions, collection of biometric data among others.

The journalists and human rights defenders noted that Orchestrators of fake news, online scammers and hackers are posing huge threat to the fundamental digital rights.

The participants therefore agreed that there is need to protect Internet Users against hackers, fake and harmful information by unscrupulous individuals or groups intended to abuse rights of others.

“Many women and children have fallen prey to child pornography, fraudsters and kidnappers who persuade their victims through all sorts of enticing posts, and as a result many unsuspecting people have fallen victim to the online scammers” noted Brian Byaruhanga, Technology Officer and human rights advocate working with CIPESA.

The question is who has the mandate to regulate the Digital space I Uganda?” asked William Amanzuru – a renowned environmental activist working with Friends of Zoka Forest in Adjumani who emphasized the urgent need for policy reviews and new laws to check the digital space.

“Government should not invest all its energy on tracking its critics such as we journalists and other human rights defenders as seen in the 2021 Elections and related scenarios but also focus on orchestrators of cyber violence against women, children and fraudsters or scammers online” says one of the Journalists who preferred to stay anonymous.

Brian Byaruhanga, urged online consumers to always practice encryption, data backups to protect data from possible threats while working online.

To limit online virus attacks, Byaruhanga implored the participants to install paid-for antivirus since unpaid for anti-virus can expose users to hackers. Byaruhanga also advises online users to avoid unsolicited email and links.

“Before you click on any link you first cross-check if at all it’s legitimate or owned by real company or group,” Byaruhanga added.

In the past few years, Uganda registered a wave of Gender based online abuse against a number of female celebrities targeted especially by their jilted lovers or unscrupulous people who were all out to blackmail them for money or selfish interests.

Nude Photos of the victims including Fabiola Anita, Martha Kagimba popularly known as Martha Kay, Judith Heard, Cindy Sanyu, Sanyu Robina Mweruka, Desire Luzinda, Zari Hassan, and herbalist Sylvia Namutebi popularly known as Maama Fiina were leaked through the social media.

There has also been increase in cases of fake news about purported death of prominent persons in the country.
Participants therefore agreed that for digital rights to be enjoyed freely, stakeholders need to strengthen Collaboration in advocacy of Digital rights issues at the various levels.

They said, technology presents various challenges to the protection of human rights such as the lack of adequate avenues to verify authenticity of information shared, violation of the right to privacy, respect to copyright issues and the right to anonymity among others hence with a shrinking civic space in Uganda, Human Rights Defenders need to be more vigilant in securing their digital environments.

These require an awareness of the digital security threats faced by Human Rights defenders, a clear understanding and implementation of internet freedom legalization affecting their works and different digital security tools that they can use to protect their online privacy.

This article was first published on the Cross Border Net site on August 14, 2022

Privacy Imperilled: Analysis of Surveillance, Encryption and Data Localisation Laws in Africa

By Evelyn Lirri |

Across Africa, the proliferation of digital technologies is being matched by state measures that negate the right to privacy. The accelerated adoption of digital technologies has come with increased collection and sharing of large quantities of personal data, which is a major concern as several countries lack data privacy laws and many that have them are not implementing the laws. 

As a result, the right to privacy has come under growing siege, which is in turn negatively impacting the enjoyment of other rights, including freedom of expression, association, and access to information online.

In this report, the Collaboration on International ICT Policy for East and Southern Africa (CIPESA) analyses country-specific laws that various governments on the continent have enacted and how they impact privacy and data security through surveillance, restrictions on encryption, data localisation, and biometric databases. The report covers 23 countries – Algeria, Angola, Benin, Burkina Faso, Burundi, Cape Verde, the Central Africa Republic (CAR), Congo Brazzaville, the Democratic Republic of Congo (DRC), Gabon, Guinea Conakry, Ivory Coast, Lesotho, Liberia, Madagascar, Mauritania, Morocco, Niger, Sao Tome and Principe, Sierra Leone, South Sudan, and Togo.

According to the report, governments across the continent continue to collect and process personal data, intercept communications and permit surveillance without putting in place the requisite oversight mechanisms and adequate remedies, despite being signatories to regional and international conventions that recognise the right to privacy and provide safeguards for data protection, such as the revised Declaration of Principles of Freedom of Expression and Access to Information in Africa, the International Covenant on Civil and Political Rights, and the Universal Declaration of Human Rights.

Weak Oversight of Surveillance Operations 

One of the emerging concerns is the lack of independent judicial oversight over surveillance operations. In some countries, surveillance operations are entirely carried out and overseen by bodies within the executive, with parliaments and courts of law excluded. In Lesotho, interception warrants may be issued by the Minister responsible for the National Security Services, while in Niger, interception is ordered by the President. In South Sudan, this responsibility is vested with the Director General of the National Security Service, while in The Gambia it lies with the Minister of Interior. In Togo, the Prime Minister, and the Ministers responsible for the economy and finance, defence, justice, and security and civil protection can trigger interception of communications.

In countries such as Benin, the Democratic Republic of the Congo (DRC), Morocco, Niger, and Togo, justification for surveillance is specified under the law. The reasons provided include the preservation of national security or defence, investigation of crimes, prevention of terrorism, organised crime, and activities that undermine public peace or public order. However, these crimes are not defined or are vaguely defined, which gives latitude to state authorities to broadly interpret the laws in undermining the rights of critics and opponents.

 Limitations on Encryption

The use of encryption is critical in helping citizens to protect their data and communications while enjoying the right to privacy and freedom of expression. In several countries, however, this right is being threatened as governments impose restrictions that require the registration of encryption service providers, ban certain types of encryptions, and compel service providers to hand over decrypted data.

In Algeria, individuals and organisations that want to acquire and use encryption services must be granted authorisation by the country’s Regulatory Authority of Post and Electronic Communications. On the other hand, in countries such as the Democratic Republic of Congo, the Central Africa Republic, Niger, Benin, Guinea Conakry, Ivory Coast, Congo-Brazzaville, Morocco, Togo and Burkina Faso, an authorisation may be sought if the encryption is not exclusively for providing authentication or integrity control functions. Failure to seek authorisation or using prohibited encryption could attract a heavy penalty including jail time, a fine, or both.

Countries like Mali, Tanzania, and Malawi also require service providers to disclose specific software to be used for encryption. Such prohibitive provisions undermine privacy and freedom of expression that access to encryption accords.

Compelled Assistance by Service Providers

Governments are also using compelled assistance – where state agencies seek access to data from service providers, including through courts of law and regulators, to gain access to individuals’ private data. This includes access to the secret code of encrypted data, or to decrypted data, and generally requiring service providers to render assistance to state agencies in the interception of communications.     

Laws in countries like Benin, Ivory Coast, Congo-Brazzaville, Gabon, Guinea Conakry, and Sierra Leone specify grounds on which the state can access encrypted data of individuals and also facilitate lawful interception of communications. Laws in several countries require intermediaries such as telecom companies and Internet Service Providers (ISPs) to facilitate surveillance.

 As the report notes, compelled service provider assistance as stipulated in some countries’ laws is quite worrisome as it gives governments and their agencies unfettered access to individuals’ private data beyond limits prescribed by law or permissible by international standards.

Data Localisation

Various countries have enacted laws to control the cross-border transfer of personal data for a multitude of reasons, including national security, personal data protection, and data sovereignty. Algeria, Niger, Morocco, Benin, Cape Verde, Madagascar, Guinea Conakry, Ivory Coast, Congo Brazzaville, Sao Tome & Principe and Togo have laws that prohibit cross-border transfer of personal data unless authorised by data protection authorities.

However, as the report’s findings show, despite having laws in place, enforcement remains weak. Further, data localisation requirements could, in the absence of robust legal and practical safeguards, further facilitate efforts by state and non-state actors to undermine privacy-related rights. Morocco, Algeria, and Ivory Coast are some of the countries where data localisation measures are being implemented.

 Biometric Data Collection

Recent years have seen a number of African countries undertake mass collection, processing and storage of personal data through initiatives such as mandatory SIM card registration, electronic biometric passports, IDs, and driving licences. Although many countries have also passed laws on data protection and privacy, weak implementation mechanisms, coupled with the absence of the requisite safeguards, remain a threat to individual privacy. This is particularly so in instances where regulatory authorities have the power to direct telecom operators to hand over information such as that contained in the SIM card databases.  

Furthermore, the existing oversight mechanisms and provisions for remedies in the case of data breaches have not been effective enough to protect the personal information and communication of individuals in line with internationally recognised human rights standards.    Many countries have enacted data protection laws but have additional legislation that gives the state and its agencies power to access citizens’ biometric information, often under the guise of protecting national security. This is the case with countries such as Kenya, Gabon, Uganda, Lesotho, Mauritius, Morocco, Niger, Sao Tome, Togo, Algeria, Congo Brazzaville, and Ivory Coast.

 Recommendations

 Government:

  • Enact data protection laws in countries such as Liberia, Sierra Leone and South Sudan to provide for and guarantee protection of personal data.
  • Review existing laws, policies and practices on surveillance, including COVID-19 surveillance, biometric data collection, encryption and data localisation, to ensure they comply with article 9 of the African Charter and with the principles in the African Commission on Human and Peoples’ Rights Declaration of Principles on Freedom of Expression and Access to Information in Africa 2019.
  • Cease blanket compelled service provider assistance and provide for clear, activity-bound and court-mandated assistance.
  • Submit periodic reports to the different international human rights treaty body monitoring mechanisms such as the African Commission on Human and Peoples’ Rights, the Human Rights Committee and the Universal Periodic Review process, on the measures taken to guarantee the right to privacy and data protection.

Civil Society:

  • Work collaboratively with stakeholders such as the private sector and academia, including through litigation to challenge laws and measures that violate privacy rights.
  • Monitor and document privacy rights violations through evidence-based research.
  • Conduct regular analysis of proposed laws to identify the gaps and propose revisions before they are enacted into law.
  • Advocate for the promotion and protection of the right to privacy and data protection through various advocacy engagements.

Private Sector: 

  • Develop, publish and implement internal privacy and data protection policies and best practices in handling customer data so as to guarantee customers’ data protection and privacy.
  • Regularly publish transparency reports that highlight all cases of personal data and information disclosure to government agencies as well as other assistance offered to governments to enable communication interception and monitoring.
  • Develop technologies and solutions and use privacy-enhancing technologies that embed and integrate privacy principles by design and default.
  • Comply with the United Nations Business and Human Rights Principles by conducting human rights impact assessments to ensure that measures undertaken do not harm individual rights to privacy and data protection.

Find the full report here: Privacy Imperilled: Analysis of Surveillance, Encryption And Data Localization Laws in Africa  

See another CIPESA report Mapping and Analysis of Privacy Laws in Africa that maps privacy-related laws in 19 other countries.

Uganda: CIPESA Submits Comments on the Computer Misuse (Amendment) Bill, 2022 to Parliament

By Edrine Wanyama |

The Collaboration on International ICT Policy for East and Southern Africa (CIPESA) has made a submission on emerging concerns from the proposed Computer Misuse (Amendment) Bill, 2022 (the Bill) to the Parliamentary Committee on Information and Communications Technology. In its submission, CIPESA analyses the changes proposed by the Bill which are a blow to online civil liberties in Uganda.

The private members Bill is seeking to amend the Computer Misuse Act of 2011and  argues that existing laws “do not specifically address regulation of information sharing on social media” or are “not adequate to deter the vice”. The objectives of the amendment are: to enhance the provisions on unauthorised access to information or data; prohibit the sharing of any information relating to a child without authorisation from a parent or guardian; prohibit the sending or sharing of information that promotes hate speech; prohibit the sending or sharing of false, malicious and unsolicited information; and to restrict persons convicted of any offence under the Computer Misuse law from holding public office for a period of 10 years.

While the amendment could be justified by advancements in technology, upsurge in cybercrime, disinformation, and hate speech (clause 4), experience has shown that the law since enactment has been used to suppress digital rights including free expression and access to information.

The underlying provisions of the bill including clause 5 which seeks to prohibit the sending or sharing of unsolicited information through a computer, and clause 6 on prohibition of sharing malicious or misleading information, could be misused and abused by the government and its agencies to curtail sharing and dissemination of information, which would limit freedom of expression and access to information. Moreover, such restriction would counter the ruling by Supreme Court in Charles Onyango Obbo and Another v Attorney General that the penalisation of the publication of false news under Section 50 of the Penal Code is unconstitutional.

The Bill also duplicates existing laws including the Regulation of Interception of Communications Act, 2010 and Data Protection and Privacy Act in as far as it relates to unlawful interception of communications and unlawful access to and sharing of personal information under clause 2 and  prohibition of processing and sharing information about children under clause 2.

Similarly, the Bill proposes the adoption of very punitive and prohibitive penalties which could not only hinder expression and access to information but also transparency and accountability in governance. The penalties proposed stretch to UGX 15 million (USD 3,900), imprisonment not exceeding 10 years, or both for unauthorised access, interception, recording and sharing of information under clause 2. On the other hand, sharing information related to children (clause 3), hate speech (clause 4), unsolicited information (clause 5) and misleading or malicious information (clause 6) are punished with imprisonment not exceeding seven years.

While specifically targeting leaders, Clause 7 of the Bill seeks to bar persons convicted under the Computer Misuse Act from holding public office for a period of 10 years, and to further dismiss convicted personsfrom public offices that they were holding.  In addition to the restrictions under the  Official Secrets Act  it may discourage the disclosure of information by duty bearers where such disclosure would be necessary for enforcing transparency and accountability.

The Computer Misuse Act has been previously used to suppress digital rights including free expression and access to information. For instance, academic and social critic Dr. Stella Nyanzi was arrested for insulting the president in a social media post. In 2019, she was convicted of cyber harassment contrary to section 24 of the Act but acquitted of offensive communications, which is proscribed under section 25. Other individuals who have suffered the wrath of the same law include former presidential aspirant Henry Tumukunde who was arrested over alleged treasonable utterances in radio and television interviews, the Bizonto comedy group who were arrested over alleged offensive and sectarian posts, and author Kakwenza Rukirabashaija who was arrested, detained and prosecuted over offensive communication against the president and his son.

While the need for amendment of the Computer Misuse Act might be eminent to address emerging technologies, the proposed provisions are unfounded and redundant, and stipulate highly punitive penalties. They fail to address existing retrogressive provisions including section 24 on cyber harassment and section 25 on offensive communication, which have been used to criminalise freedom of expression. Moreover, trolling, cyber harassment, unauthorised sharing of intimate images, and other forms of online violence against women and girls are not addressed.

Read CIPESA’s full submission!

How the ADRF is Building Capacity and Traction for Digital Rights Advocacy in Africa

By Apolo Kakaire |

Three years since it was launched and with USD 649,000 disbursed to 52 beneficiaries across 39 African countries, the Africa Digital Rights Fund (ADRF) is powering digital rights policy advocacy and engagement across the continent. According to several beneficiaries, the ADRF is a unique funding initiative that has broken ranks with traditional funders’ structures, and to considerable effect.

The Fund is lauded for adopting a simple application process, allowing for flexibility in implementation, breaking barriers for little-known actors, enabling grantees to build on previous initiatives to ensure greater reach and impact, and supporting local context-specific and responsive projects. This, according to grantees and collaborators who were part of a June 2022 virtual convening on ADRF advocacy experiences which was aimed at promoting learning and best practice.

The ADRF was launched in April 2019 in recognition of the growing role of technology in fostering democracy and promoting equity on the African continent amidst rising arrests of activists, network disruptions in several countries, and restrictive legislation that stifled innovation and human rights online. Moreover, assessments at the time had found that many digital rights interventions were limited in scope, thinly spread across the continent, faced resource limitations, and were often inconsistent in their engagement with digital rights work. 

“The situation called for partnerships to bring together different competences to advance digital rights on the continent through seed funding,” said Ashnah Kalemera, the Programme Manager at the Collaboration on International ICT Policy for East and Southern Africa (CIPESA), the administrators of the ADRF.  Those partnerships required provision of flexible and rapid response funding to a range of entities that did not have the ability to attract funding from traditional funders, who have stringent application requirements and lengthy grant application processing times. 

With grants ranging between USD 1,000 and USD 20,000,  ADRF beneficiaries have undertaken various initiatives focused on technology in society, the public and private sectors. Besides the funding, grantees have also received capacity building in data-driven advocacy and impact communication and media relations. Across the continent, the Fund has helped to strengthen capacity in evidence-based research, collaborative advocacy and impactful policy engagements responsive to regulatory and practice developments that affect the internet freedom landscape.

At the June convening, select initiatives in Kenya, Namibia and Somalia supported by the Fund shared their advocacy experiences. In Somalia, the ADRF-supported work of Digital Shelter has seen a major breakthrough in stakeholder dialogue and engagement on hitherto undiscussed digital rights subjects such as digital inclusion, online civic space, gender-based violence online, digital entrepreneurship, civic participation and data protection and privacy

“Prior to ADRF’s support, people in the country had no appreciation for digital rights and the consequences of internet shutdowns. The Fund helped us to engage the government to talk about policies and legislation and when the conversation started, the Minister [of Communications and Technology] was very open and he was surprised that there was a local group addressing these issues,” said Ayaan Khalif, Co-founder of Digital Shelter. “The ADRF was an eye opener and helped us partner and link with other organisations and to understand what works in other countries.” 

Aayan added that applying for the ADRF funding was an easy process. She said: “We were almost giving up on donor funding after so many rejections. The ADRF process was simple. Some donors complicate things. The [application templates] are in English but sometimes it is as if it is in another language.”

The inroads made by Digital Shelter underscore the importance of collaboration and partnership in advancing digital rights in the region. Zakarie Ismael, the eGovernment Implementation Advisor in Somali’s Ministry of Communications and Technology, stated that the government of Somalia, through the ministry has responded to the appeals of Digital Shelter and other actors by prioritising the technology sector, including through the ICT Policy and Strategy 2019-2024. That government responsiveness has been crucial to the work of digital rights activists. As Ayaan noted, “It makes it easy to make inroads when you have people backing you up in policy advocacy. Our partnership with the government has been very practical in this regard.”.

As legislative and oversight bodies, national parliaments have a key role in advancing  digital inclusion and rights-respecting digital policies and practices. Indeed, some grantees, including Mzalendo Trust in Kenya, have dedicated efforts to promoting citizen-parliamentary engagement on digital rights. With the suspension of parliamentary proceedings in Kenya at the height of the Covid-19 pandemic, the ADRF supported functionality upgrades to the Dokeza and Bonga Na Mzalendo platforms. The upgrades enabled citizen participation through remote annotation and submission of memoranda on bills including on the controversial Huduma Initiative

Mzalendo Trust has also worked to promote an inclusive digital economy in Kenya. Like Ayaan, Slyvia Katua, a Programme Officer at Mzalendo Trust, lauded the ADRF for using a simple and straightforward application process. “The application requires you to outline what issues you are targeting, what solutions you offer and what impact you foresee,” she said. 

Meanwhile, Josephat Vijanda Tjiho, from the Internet Society (ISOC) Namibia Chapter, appreciated the ADRF grant process for allowing them to build from one project to another. “We organised forums on digital media and elections, then stepped up to privacy and data protection especially around the Covid-19 pandemic and thereafter a campaign against online violence against women and children. Our ideas [which the ADRF supported] were building from one to the other and this made our application process quite smooth,” Tjiho said. 

ISOC Namibia conducted research and convened engagements with different stakeholders on data protection, gender-based violence online and access to information. “Based on our engagements, the Namibia Access to Information (ATI) Act was passed in June 2022 and this was partly made possible through support from the ADRF,” stated Tijho. For its campaign against gender-based violence, ISOC Namibia successfully collaborated with prominent personalities including a technologist, musician and pageant as part of the 16 Days of Activism Against Gender-Based Violence. The campaign fed directly into work on research and workshops on gender-based violence in the Southern African Development Community (SADC) region for which ISOC Namibia partnered with CIPESA, Meta, Pollicy, Genderlinks and University of Pretoria Centre for Human Rights.

According to Neema Lugangira, a Member of Parliament (MP) in Tanzania, undertaking digital rights advocacy without involving parliament has created huge gaps in ensuring that policy and legislation around digital rights are rights-respecting and are effectively implemented. She faulted civil society organisations seeking policy reforms for concentrating on other arms of the government and ignoring parliaments yet they play a key role in policy formulation and oversight. She urged ADRF grantees and other digital rights actors to actively engage MPs as part of their programming. “We should prioritise capacity building for MPs because they are ignorant about digital rights,” said Lugangira.

The experiences of ADRF grantees indicate the potential of rapid response and flexible funding in positively shaping the digital rights landscape in Africa through targeted research, advocacy and movement building.

Kenya’s 2022 Political Sphere Overwhelmed by Disinformation

Ahead of the August 9, 2022, general elections, Kenya has been hit by a deluge of disinformation, which is fanning hate speech, threatening electoral integrity, and is expected to persist well beyond the polls. Last month, the Kenya ICT Action Network (KICTANet) and CIPESA convened stakeholders in Nairobi to disseminate the findings of research on the nature, pathways, and effects of disinformation in the lead-up to the election, and the actions required to combat disinformation. Below is a summary of the report findings and takeaways from the dissemination event, as captured by KICTANet:

There is a lot of strange information going on around the country, and this has been happening for a while. During the Kenya Internet Governance Forum (IGF) week, the Kenya ICT Action Network (KICTANet) in partnership with the Collaboration on International ICT Policy in East and Southern Africa (CIPESA) held a workshop to disseminate a report on  Disinformation in Kenya’s Political Sphere: Actors, Pathways and Effects. The research is part of a regional study conducted by CIPESA, that explores the nature, perpetrators, and effects of misinformation in Cameroon, Ethiopia, Uganda, Nigeria, and Kenya.

As Kenya nears the 2022 general elections, disinformation remains at its peak levels, both at grassroots and national levels. The availability of sophisticated technology and its ease of use has enabled a wide range of political actors to act as originators and spreaders of disinformation.

Currently, there is no law that clearly defines or distinguishes between misinformation and disinformation. However, it is an offense to deliberately create and spread false or misleading information in the country. False publications and the publication of false information are punishable under the Computer Misuse and Cyber Crimes Act under Sections 22 and 23. It is a crime to relay false information with the intent that such information is viewed as true, with or without monetary gain. However, these same laws can also be used to silence dissent, making it a double-edged sword.

The study identifies different forms of disinformation that take place both physically and online. They include deep fakes, text messages, WhatsApp messages, and physical copies such as pamphlets and fliers. These are spread through the use of keyboard armies on social media, where politicians up to the grassroots levels hire influencers, and content creators who spread messages around them or against their opponents. This is done through mass brigading and document and content manipulation. The rationale is driven by the desire to get ahead politically or economically and is fuelled by an ecosystem that is fertile for the spread of this vice.

According to Safaricom, in the year 2017, 50% of its communications department time was spent monitoring fraud and fake information at different times. The instigators of this disinformation are influencers, politicians themselves, people they work with, and their parties.

There is a flow to how the fake news gets to the audience, and disinformation does not start with the pictures but with a plan that is part of a bigger political strategy. It starts with identifying the target audience, choosing the personnel and people to push the message, and then narrative development is done. This is followed by content development, which includes videos, pictures or memes, and audio files. Once this is done, the content is then strategically released to the unknowing public, who, without critically analyzing the information, spread it far and wide to a wider audience. This results in diminished trust in democratic and political institutions and restricted access to reliable and diverse information.

This can be addressed by having increased government engagement on social media as opposed to it being reactive only. For example, the government needs to be an active contributor to accurate information. Considering there is a space in which disinformation thrives, in particular where there is a lack of response, rumors spread. Civil society should also engage with policymakers and media representatives on enhancing digital literacy and fact-checking skills. The intermediaries should increase transparency and accountability in content moderation measures and conduct cross-sectoral periodic policy reviews.

Key Takeaways

  1. The weakest link in disinformation is the citizen, and therefore, one of the most effective ways to tackle the issue is to empower the citizenry to be able to detect and respond wisely to misinformation. If the general public is not informed, it is a lost battle.
  2. There is a thin line between misinformation and mal-information and it can easily be blurred.
  3. The Computer Misuse and Cyber Crimes Act 2018 is a double-edged sword that censors yet tries to get some accountability from the general public in regard to spreading misinformation.
  4. Safaricom reported that during the 2017 election, 50% of its time was spent monitoring fraudulent interactions.