Blog: Cybersecurity awareness and why it matters in South Sudan

As South Sudan’s internet penetration grows, so do cyber threats such as cyberbullying, scamming, and hacking. Fortunately, a concern to curb this is taking shape through cybersecurity awareness—an effort from the government and nonprofit organisations.

Writer: Ghai Aketch

It’s your right to get access to the internet, given the contemporary environment of modernisation. But your rights can be your downfall if you aren’t extra cautious with your online interactions. It, therefore, comes with responsibility, discipline, and alertness to be secure on the internet. 

With internet adoption in South Sudan in recent years, many people have made money and lost it to online scammers. 

The country has three mobile network operators, with 3,885,484 users in 2022. Moreover, there are 12 internet service providers (ISPs) with a major market in Juba. Both ISPs and mobile internet users constituted 1.25 million in 2022, according to Data Reportal statistics.

South Sudan’s internet penetration rate stands at 10.9 per cent in 2022. But out of this figure, Facebook has nearly 500 thousand users. Bringing total social media users to 515 thousand in the country.

That has compelled the National Communications Authority and SafetyComm South Sudan to launch extensive cybersecurity awareness to curb growing cyber attacks on individuals’ social media pages, accounts and organisations. 

Lately, hackers have targeted internet users in the country, with most scams coming through e-business services, fake scholarships, grant applications and trickery links shared on social media. 

Cyber experts stress that South Sudanese netizens fall prey to scams that come to them through ‘fully funded’ scholarships and financial grants for business support but end up spending their own money on non-existing services.

Others lose thousands of dollars to non-existing car shipping companies that mimic real car-dealing websites overseas. 

Angel Atem, a South Sudanese netizen, lost her Facebook account to hackers earlier in October 2022. That implies she now has no control over her account, but the hackers have. They’ve been sending her friends’ links via inbox and asking for financial support in her name. 

My Facebook account was hacked, and I don’t know what to do. I registered it with my sim card, but it has been changed, so I can’t log in again,” she said.

She is just one of the many other online users in the country who are only interested in employing curiosity while surfing the internet while clicking links that subsequently require their login details.

Another loophole cybersecurity experts caution netizens is having one password for a long time or having one password across their multiple internet accounts. 

“If someone tells you that they’re going to connect you to free MTN data, then you give them your password, that’s not facebook giving out your password; it’s you,” Ariik Robert, a cybersecurity expert working for SafetyComm South Sudan told the audience during a cybersecurity awareness campaign.

“So that’s why awareness is a key so that we tell you it’s a lie so that next time it comes your way, you will definitely know someone is trying to take over your account,” Robert explained. 

Global cybersecurity awareness month, NCA will take multiple activities to raise awareness levels in our communities and build the capacity and empower the people to be resilient to mitigate cybersecurity attacks and to deal with them once they are attacked,” Unguec Stephan Kang, NCA Assistant Director Cybersecurity, said in October.

According to the NCA, the country must protect exposed internet users from scammers. One significant way to protect them is to increase digital literacy and creation awareness across the country.

But as a digital citizen, you have the responsibility to keep yourself and others secure, experts advise. 

Simple ways to protect yourself from hackers

  • Use dual-factor authentication on your cloud, email, social media and bank accounts. Two-factor authentication gives you control of the activity login of your accounts by sending your codes to your mobile phone or email.
  • Strong password, using a combination of characters such as; caps, lowe@, numbers, _ or # )
  • You should use a different password across all your internet accounts and keep it unchanged for a long time. If not, hackers can quickly gain access to your account by breaking the password.
  • Use anti-virus software on all your devices. That will offer more security against malware designed to attack you.
  • Not clicking suspicious links and entering your login credentials when it instructs you to do so. You’re about to be scammed should that link redirect for a login. Stop it! 
  • Changing passwords often, not using the same password across the accounts, creating extended passports, and not clicking links you don’t know. 

Robert reiterated that social media is very addictive; it has so much convenience with it, it’s entertaining-takes away so much boredom- these are threads hackers take advantage of, he warned. 

This blog post was published as part of the Fact-checking and Digital Rights Fellowship in the context of the Africa Digital Rights Fund with support from the Collaboration on International ICT Policy in East and Southern Africa (CIPESA). 

Blog: South Sudan must fortify its cyberspace as cybercrime attacks cost billions of dollars in losses globally

Cyber attacks are one of the most dangerous phenomena haunting people worldwide. The attacks, aided by information technology infrastructure and actors, cause severe damage to the lives of people everywhere.

Writer: Ochaya Jackson

Cyber crime is committed through illegal attacks by entities or individuals using collective methods of knowledge, device and the internet to get unauthorised access to computer systems, networks and other information technology devices. 

Cyber-attacks are of various categories and take different dimensions depending on the attacker’s interests in the target. It combines techniques, skills, devices and the target’s vulnerability to accomplish a successful attack.

If they succeed in the attacks, data is compromised, devices are infected, and the victims are psychologically tortured as they are left with pain.

The cyber-attack actors are the crime organisations, the state, and the individual. The mission of the attack may differ, but it primarily is to harvest data from the targets that could yield millions or billions of dollars and information gathering.

There are many types of cyber-attacks, including phishing, SQL injection threat, man – in – the middle, cross-site scripting, distributed denial of service, password, AI-powered, drive, eavesdropping, ransomware, and so on.

These attacks are the most commonly used globally to commit cybercrime operations over the internet to compromise victims.

The illustration of phishing attack © AAG IT Company

Even though the internet has many advantages, South Sudanese should be aware of its risks and dangers. This necessitates understanding cybercrime attacks and the methods used to carry them out.

Nobody can, however, eliminate cyber attacks, but understanding the dynamics of the attacks can help reduce attacks and save money and people’s lives.

According to the AAG IT Company 2022 cyber crime report, phishing attacks are widely executed.

Phishing remains the most common form of cybercrime. Globally, 323,972 internet users fell victim to phishing attacks in 2021. This means half of the users who were a victim of cybercrime fell for a phishing attack. An average of $136 lost per phishing attack amounts to $44.2 million stolen by cyber criminals through phishing attacks in 2021”, part of the report reads.

The victims of cybercrime are targeted using emails, and in 2021, the report said about one billion emails were breached, and the data lost is sold to criminals to enhance further attacks.

“Phishing attacks largely target victims through emails; 2021 saw nearly 1 billion emails exposed, affecting 1 in 5 internet users. These breached databases are sold on black marketplaces on the dark web, meaning cyber criminals can purchase them and use the addresses in phishing attacks”.

The Phishing Trends both in 2021 and 2022

The LinkedIn platform is where phishing email attacks are delivered because of its many users. In the first quarter of 2021, phishing emails attached to LinkedIn were highly clicked at 42%, followed by Facebook at 20% and Twitter at 9%.

LinkedIn42%
Facebook20%
Twitter9%
Table showing phishing percentage attacks volume delivered through emails on social media

And in the first quarter of 2022, there are five top platforms which experienced phishing, with LinkedIn taking the lead at 52%, DHL at 14%, Google at 7%, Microsoft at 6%, and FedEx at 6%.

LinkedIn52%
DHL14%
Google7%
Microsoft6%
FedEx6%
Table showing phishing attack volume delivered through different platforms

The rationales for the increase in the cost of cybercrime are that cybercriminals have developed new attack technologies, many countries have weak cybersecurity, cybercrime has turned into a service or business, and the criminals monetise their targets, according to Internet Society Organization.

In an article published by Security Magazine, which highlighted the state of phishing report for 2022 by SlashNext, it found 255 million attacks had taken place in the form of URL based-links, email messages, and mobile and browser channels, amounting to 61% higher than in 2021.

The report indicated that phishing attacks have shifted to mobile devices and communication channels, primarily targeting employees with scams and personal information theft.

Global Cybercrime statistics 2022

The worldwide trends of cybercrime have wrecked damages lost to institutions, individuals, and information technology devices.

In Europe, the United Kingdom has many cybercrime victims, numbering 4783 as of November 2022, above 40% compared with 2020.

In the first quarter of 2022, Russia had 42.92 million data breaches. However, it dropped to 28.78 million violations in the second quarter of 2022. 

The United States of America accounts for 46% of cybercrime attacks worldwide. In Asia, Pakistan experienced an 83% increase in financial fraud committed through social media between 2018 and 2021.

 In  2018, about 17,560 India-based websites were hacked, including 26,121 one in 2020 were hacked.  In the African continent, Nigeria in 2022 has seen 1616% higher data breaches in the first quarter, 35 472 in the second quarter, and 608,765 in the third quarter.

In Australia, $72 million was lost in 2022 through scams. In September this year, Optus telecommunications company experienced a data breach that victimised about 2.1 million customers, and 9.8 million records were stolen.

In conclusion, with the advance in technology, cyber crimes have become more sophisticated, lucrative, and well-organized. The attackers evade the security layers or protocols of individuals, groups, organisations, institutions, and devices.

The victims of the attacks could be institutions, individuals, and information technology devices or infrastructures.

This blog post was published as part of the Fact-checking and Digital Rights Fellowship in the context of the Africa Digital Rights Fund with support from the Collaboration on International ICT Policy in East and Southern Africa (CIPESA). 

Blog: Why does the digital divide between men and women appear to grow?

Women and girls are underrepresented online due to digital illiteracy and irregular access to digital devices, platforms, and services.

Writer: Beatrice Amude Paulino

UN Human Rights says that women and girls are nearly 15% less likely to be online than men worldwide. However, experts say that this digital gender gap can be closed by educating women and girls, ensuring they have internet access, and helping them learn new skills.

The case is no different in South Sudan; a female social media user who recently lost her Facebook account to hackers, Nadab Bushari Ali, blames the divide on digital illiteracy and a lack of proper formal education for most women.

Since April 2022, my account has been hacked, and I lost a lot of things because I tried to log in, and it is not going through. Women are not digitally literate because most of them are not educated,” Nadab Bushari Ali narrated in an interview with 211 Check.

Digital technologies generate, store, or process data. Digital technologies keep growing. Internet and mobile technologies; digital networks, content, services, and applications; old and new media, communication, and information-connected devices and environments; virtual and augmented reality; AI, including machine learning; robotics; automated systems and data analytics; biometrics and biotechnology.

Online experiences and opportunities are essential for kids’ development. Online education, formal and informal learning, health and well-being information and support, creative and cultural practice, civic engagement and expression of ideas and opinions, leisure and peer connections, employment, career information, and entrepreneurship opportunities.

Digital literacy is linked to higher earning potential and new economic opportunities.

Disabled and gender-related access gaps persist in geography, economics, and society. Closing the digital divide for all children requires individualised strategies.

Is there a gap in women’s and girls’ digital adoption compared to men’s and boys?

According to the report of UNICEF 2020, most data available to quantify this gap focuses on adults only, not children. The international Telecommunications Union (ITU) reports that more than 50% of women are offline.

According to the Digital 2022 South Sudan report, at the start of 2022, 27.3% of Facebook’s audience in South Sudan was female, while 72.7% was male and in the same year, 24.9% of females were using Instagram while 75.1% were male.

In early 2022, 24.2% of Facebook messenger users were female, and 75.8% were male. In early 2022, 25.2% of LinkedIn’s audience in South Sudan was female, while 74.8% was male.

Platform% male% female
Facebook72.7% 27.3%
Messenger75.8%25.2% 
Instagram75.1%24.9%
LinkedIn74.8%25.2%
Table showing % of male and female South Sudanese on four major social sites

How vulnerable women are to social media and cybersecurity-related issues?

Safety Comm Coordinator Ariik Robert Ajack says women and girls are susceptible to revenge porn, cyberbullying, and harassment. “There is no specific data, but we have handled many revenge porn cases,” he said.

Helen Ladu, a social media user whose Facebook profile was compromised, stated that the incident caused her to lose a lot of friends and family contacts.

“My account was hacked. I felt so sad and confused because I lost a lot of friends and family contacts,” she told 211 Check.

Noel Taban, a Journalism, Media, and Communication student at the University of Juba, sees things differently. He believes that because of South Sudanese culture and norms, some women are not considered to participate in particular social media platforms.

“Women are used to advertising a pornographic business, to attract customers, especially males. The abuse has led women to become less active or even inactive on social media,” he says.

What is the impact of the gender digital divide?

Girls and women cannot participate equally in our increasingly digital societies unless they have equal access to technology and the internet. Girls and women are held back in this area in every aspect of their lives, including their ability to speak out and campaign on issues that matter to them.

Furthermore, if girls and women are not involved in creating digital tools and online content, existing inequalities may be exacerbated.

How can we bridge the digital divide?

To bridge the gender digital divide, African governments must implement legislative, policy, administrative, and practical measures to address existing structural inequalities in income, education, and employment opportunities and to remove political, economic, legal, cultural, technological, and social barriers that prevent women and girls from using the internet and ICT. These measures should ensure more women and girls have affordable internet and digital devices, meaningful connectivity, and good digital literacy and skills. To close the digital gender gap, countries must collect and share gender- and age-disaggregated data on ICT access and use it to track and evaluate progress and shape policies to promote women’s and girls’ digital rights on the continent.

Empowering women and girls with internet and digital technologies could help them start businesses and access education, health, social, and financial services. It could also empower women and girls to participate in governance, associate, assemble, and express themselves on digital rights issues, and develop relevant content. Increase women’s leadership and decision-making roles in ICT.

Bridging the digital divide for women and girls is both complex and daunting. Still, hopefully, if the public and private institutions and organisations stand to address it, the gap will be reduced.

This blog post was published as part of the Fact-checking and Digital Rights Fellowship in the context of the Africa Digital Rights Fund with support from the Collaboration on International ICT Policy in East and Southern Africa (CIPESA).

Fact-check: Yes, these images show a traffic jam along Seventh-day – Gudele street in Juba

There was heavy traffic along Saint Kizito – Gudele street. If you look closely, there are water tanks common in South Sudan.

Writer Beatrice Amude Paulino

A Facebook post on 24th November 2022 by Paam Ke sharing pictures of a traffic jam along Gudele street in South Sudan’s capital city, Juba, is true.

A traffic jam at Seventh Day Round about this evening. A lot of cars…,” partly reads the post‘s caption in which the pictures were shared.

But people said different things. Some people in the crowd were not sure if the photos were really taken on Gudele Street in Juba.

I don’t think it’s the Seventh-day – Gudele street,” wonders one Mr. Malish Michael

You are lying we don’t have these types of cars in South Sudan. Stop lying,” warned another.

Which begs the question, where exactly were these pictures taken? Why don’t we find out?

Using visual cues, one could see similar structures along the roads, an MTN billboard in the far left corner, a mGurush billboard in the far right ends, and some water tank trucks, which are common in Juba.

MTN billboard near Star Village Building and mGurush Billboard at the far right  

A search on Facebook for “Gudele jam” yielded the same images that were first posted on November 24th, 2022, at 5:01 pm by Advance Digital, a Juba-based mainstream media company.

Heavy Traffic Jam around St Kizito,” it captioned the pictures.

According to our observations, the photos were taken from the upper level of the building where Advance Digital is located, Star Village.

MTN billboard near Star Village Building and mGurush Billboard at the far right

Juba Electricity Distribution Company (JEDCO) poles and a transformer are also visible

Conclusion: 

211 Check confirms that these photographs were taken on November 24, 2022, along Seventh-day – Gudele Street. They were taken from an aerial view of the Star Village Building, which is located on this road.

#FactsMatter, Don’t be a victim of fake news; instead, let’s fight misinformation on both mainstream and alternative media. To avoid spreading false information, don’t share content you’re unsure about or know where it comes from.

To learn more about our fact-checking process, go to https://211check.org/ or send us a WhatsApp message at +211 917 298 255 to present a claim, and our team will immediately fact-check it and respond.