Explainer: Is the consumption of sugar-sweetened beverages harmful to human health?

Writer:  Ochaya Jackson

A video shared on Facebook on December 15th, 2022, and still making the rounds on social media, claims that Coca-Cola, which is one of the sugar-sweetened beverages, is not fit for the human body.

The three-minute video shows a Coca-Cola drink being poured into a saucepan and is accompanied by text that reads: “I will never buy Coca-Cola again. I discovered the secret.”

The screenshot of the heating stove while Coca-Cola drink is being poured

The video features a female voice narration demonstrating the effects of heating Coca-Cola on a hot stove in a saucepan. The narrator warns people not to drink Coca-Cola while raising questions about its chemical composition. 

The video alleges that Coca-Cola contains sugar and other harmful chemicals for the body. However, it does not specify the exact nature of these chemicals in Coca-Cola drinks.

“Don’t take this. Do you know that you are in danger by taking it? I’m going to show you now why you can not take it. Look now, I’m going to put about two bottles in a pot, and I will show you the danger you are running. People often do not know what they are taking. What is really the composition of Coca-cola? This drink has its chemistry. It is not really good for [the] human body. When you take it you feel your blood pressure rise,” the female’s voice explanation about the Coca-Cola drink on the video claimed. Four people die of diabetes. It is something very dangerous. The whole world knows that the sugar level is very high. It does more damage to your health,” the narrator claims.  

Additionally, the video suggests Kappa Tea as a healthier alternative, emphasising that it is produced ‘without sugar’.

Coca-Cola falls under sugar-sweetened/carbonated beverages, along with other sodas with added sugar.

Investigation:

211 Check researched on Coca-Cola drinks and other sugar-sweetened beverages, using publicly available data or literature on beverage drinks; and it gathered that excessive consumption of such drinks is unhealthy for the human body.

A study published in 2015 by the U.S.-based National Institute of Health, estimated that 184,000 people globally died due to sugary drink consumption. 

“Worldwide, the model estimated 184,000 deaths/year attributable to Sugar Sweetened Beverages (SSB) consumption: 133,000 (126,000–139,000) from diabetes, 45,000 (26,000–61,000) from cardiovascular diseases, and 6,450 (4,300–8,600) from cancers. 5.0% of SSB-related deaths occurred in low-income, 70.9% in middle-income, and 24.1% in high-income countries,” indicates the study. 

Similarly, a 2016 study on rats examined the effects of Coca-Cola consumption on rodents and found that those who consumed the beverage developed kidney and liver malfunctions compared to rats that did not drink it. Notably, the study emphasized the need for further research to confirm whether these effects extend to humans.

Likewise, in 2018, the National Institute of Health published a literature review detailing the impact of sugary drinks on the brain. The review revealed that sugar-sweetened beverages increase the risk of stroke and dementia due to the compounds and chemicals they contain.

According to Medical News Today, regular consumption of sugary drinks can increase blood sugar levels and affect the brain’s pleasure centres in a manner similar to heroin. There is also a confirmed link between sugary drinks and diabetes and their adverse effects on kidney and liver activity.

However, the report suggests that moderate consumption of Coca-Cola and sugar-sweetened beverages has only a minimal impact on human health.

Meanwhile, Coca-Cola Australia, in one of its advisories, acknowledges that many of its beverages contain sugar and that moderate consumption is considered healthy. Nevertheless, excessive consumption is not advisable for human health.

Many of our beverages contain sugar, which has kilojoules. While sugar is fine in moderation, too much of it isn’t good for anyone. Consuming too many kilojoules, including soft drinks with sugar, can contribute to weight gain,” it said on its website.

Further, Coca-Cola recommends a maximum of 150 milligrams per day, which, according to Mathaauditor and Flightpedia, equals 0.15 millitters. 

Fact-sheet

In 2015, the World Health Organisation (WHO) updated its guidelines on free sugar intake, recommending less than 10% of total daily energy consumption for adults and children. It further conditionally suggested reducing free sugar intake to less than 5%, equivalent to 25 grams (6 teaspoons) per day, for better health.

Free sugars include those added to foods and drinks by manufacturers, cooks, or consumers and sugars naturally present in honey, syrups, and fruit juice concentrates. A single can of sugar-sweetened soda contains up to 40 grams (around ten teaspoons) of free sugar, according to the WHO.

According to a 2022 report by the Centers For Disease Control and Prevention, frequent consumption of sugar-sweetened beverages is linked to weight gain, obesity, type 2 diabetes, heart disease, kidney diseases, non-alcoholic liver disease, tooth decay, cavities, gout, and arthritis. To maintain a healthy weight and dietary pattern, individuals are advised to limit their intake of sugary drinks.

Conclusion:

Research shows that excessive consumption of Coca-Cola or other sugar-sweetened beverages may harm human health, and moderate consumption is therefore advisable.

To maintain good health and a healthy weight, individuals should consume these drinks moderately to reduce the risk of developing diseases such as diabetes, cancer, cardiovascular issues, kidney disease, heart disease, liver disease, obesity, and related illnesses.

This fact check was published by 211 Check with support from Code for Africa’s PesaCheck and African Fact-Checking Alliance.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

It’s vital to fight misinformation and disinformation in the media by avoiding fake news. Don’t share content you’re uncertain about. False information can harm and mislead people, risking lives—Fact-check before sharing. For more details, visit https://211check.org/ or message us on WhatsApp at +211 917 298 255. #FactsMatter 

South Sudan S.4 Results 2023: A Comprehensive Analysis of Performance by Gender, States, and Schools

South Sudan’s S4 2023 results reveal Central Equatoria State’s dominance in top-performing schools and the highest number of students, with notable success in the science category.

Writer: Stephen Topua

Brace yourself for an enlightening journey as we delve into a comprehensive analysis of gender-based achievements, state-level triumphs, and the schools that paved the way for success in the 2022/23 South Sudan Certificate of Secondary Education (CSE) examinations results.

This data story highlights the students’ performances in the recently released South Sudan Certificate of Secondary Education (CSE), also known as Senior Four (S.4) results. We look at the performance by gender, state and school.

The data used in the making of this data story is available here.

Feb 24, 2023, the Ministry of General Education and Instruction of the Republic of South Sudan released a press statement on the upcoming Certificate of Secondary Education (CSE) examinations for March 2023. Thirty-five thousand four hundred fifty-nine (35,459) students were registered to participate in the exams in three hundred ninety-eight (398) schools across the states and administrative regions. 

However, the total number of students who sat for the S4 results in 2023 was 28,916, with Central Equatoria State accounting for 13,901 students or 48% of the total student population. 

Abyei and Pubor Administrative Region accounted for 255 and 38 students, respectively or a mere 1.01% of the total student population. This is highlighted in the chart below. 

Results by State

South Sudan has ten (10) states and three (03) Administrative areas, and we analyse the results based on these parts. The results are highlighted below. We display the performance index of each State. Central Equatoria had the highest performance index of 74.8%, while Pibor Administrative Area, which also had the least number of students, had the lowest performance index of 59.7%. Unity State, Ruweng Administrative Area, IDP Juba and UNS are not represented in this data. 

Top Performing Schools

Of the best-performing schools, except one (01) – (Laselie Boys from Lakes) are from Central Equatoria State. Among the top 10, Juba Dioceseaen was the best in the country, with an index of 85.8, with 134 candidates. Among the top 10, Darling Wisdom Academy had the highest number of students, with a total of 330, while Covenant Progress had the least number of students, with a total of 17. 

The average number of students among the top 10 schools is 115, with an average index of 84.867. this is illustrated in detail in the graph below

Top Performing Students

How was the performance of the students? We analyse that below.

In this section, we study several parameters:

Number of students in top 10 positions

A total of twenty (20) students shared the top ten (10) positions, a total of twelve (12) gents and eight (08) ladies. All but one student was from the science section. The best student was from Western Bahr el Ghazal, while eighteen (18) were from Central Equatoria. Lakes was the other state with a representative in the second position. 

A total of eight (08) schools were represented, with Brilliant Academy Secondary School having the highest number of students, a total of nine (09) out of twenty (20), or a whopping 45% of all students in the top 10 positions. This is represented below. 

Performance of female students 

Fourteen (14) students shared the top ten (10) female student positions, all from Central Equatoria State. Only seven (07) schools have students on this list. Darling Wisdom Academy and Brilliant Academy each have four (04) students on this list, while four (04) schools have one (01) student each.  This is illustrated in the chart below. 

Conclusion:

One of the findings from this data story is that Central Equatoria State (CES) has the highest number of schools, and the top-performing schools are also from Central Equatoria State (CES). 

The science category also produced the highest number of top-performing students, both in general and among female students. Many students were also sharing the top positions, indicating good performance among the top students.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Explainer: What are internet cookies, and what are they used for? 

Internet cookies, small text files stored on devices, remember preferences, track activity, and enhance browsing. However, concerns about tracking and privacy exist, and users can accept or reject cookies based on convenience, personalization, and privacy preferences.

Writer: Steve Topua

Internet cookies, or HTTP cookies, are small text files stored on a user’s computer or device when they visit a website. These files contain data websites use to remember user preferences, track activity, and enhance the browsing experience. Websites create cookies and send them to a user’s web browser, where they are stored and sent back to the website each time the user revisits it.

History

The concept of internet cookies was introduced by Lou Montulli, a computer programmer, in 1994. Montulli worked at Netscape Communications Corporation (now known as Mozilla Corporation). He developed the original implementation of cookies to solve a problem related to managing online shopping carts.

Montulli’s invention of cookies was a significant milestone in web technology. It allowed websites to store small data on a user’s computer or device, enabling them to remember user preferences, maintain session information, and enhance the browsing experience.

Since their introduction, cookies have become an integral part of the web ecosystem, serving various functions for website functionality, personalisation, and analytics. They have evolved and been standardised over time, with different types and mechanisms for managing them implemented in web browsers and governed by privacy regulations.

Types of Cookies

Some of the types of cookies include:

  • Necessary cookies: a cookie the website uses to function correctly, without which the site would not work. This type of cookie does not collect any personally identifiable information about you and does not track your browsing habits.
  • Session Cookies: These cookies are temporary and are erased once the user closes their browser. They are primarily used to maintain a user’s session on a website, remembering actions and preferences during the visit. Session cookies are crucial in online shopping carts or maintaining logged-in states.
  • Persistent/permanent Cookies: Unlike session cookies, persistent cookies remain on a user’s device even after the browser is closed. They have an expiration date and can store information such as login details, language preferences, and personalised settings. Persistent cookies enable websites to recognise returning users and provide a more personalised experience.
  • Third-Party Cookies: Third-party cookies are created by domains other than the website a user is visiting. They are commonly used for advertising and tracking purposes, allowing advertisers to deliver targeted ads based on a user’s browsing history and behaviour across multiple websites.

Uses

The following are some of the uses of Internet Cookies:

  • Enhanced User Experience: Cookies enable websites to remember user preferences, making subsequent visits more personalised and efficient. They allow for features like saved login information, language preferences, and tailored content recommendations.
  • Shopping Convenience: Persistent cookies facilitate online shopping by storing items in a user’s cart even if they navigate away from the website. They also remember user details, simplifying the checkout process.
  • Website Analytics: Cookies provide valuable insights to website owners by collecting anonymous data on user behaviour. This data helps improve website performance, identify popular content, and optimise marketing strategies.

Concerns and Privacy Considerations:

While cookies offer numerous benefits, privacy and data security concerns have arisen. Some key considerations include

  • Tracking and Profiling: Third-party cookies can track users’ activities across multiple websites, leading to concerns about data privacy and online profiling. This has sparked debates about the balance between personalised experiences and individual privacy.
  • Security Risks: As cookies store information on a user’s device, there is a potential risk if malicious parties access them. However, modern web browsers have implemented safeguards to mitigate these risks.
  • Opt-Out Options: Recognizing the need for transparency and control, web browsers and privacy regulations allow users to manage and control cookie settings. Users can block or delete cookies or opt out of targeted advertising.

Should you Accept or Reject Internet Cookies?

We explore the benefits and challenges of each of the two options.

Accepting Cookies gives you the following advantages:

  • Buying cookies enables websites to remember your preferences and settings, such as language preferences, login information, and personalised content recommendations.  This often leads to a more customised and convenient browsing experience.
  • Cookies help websites remember your previous interactions, making it easier for you to navigate and interact with the site. For instance, if you add items to your shopping cart and accept cookies, the website can retain that information, even if you leave and return later.
  • Many website features and services rely on cookies to function correctly. Accepting cookies ensures that all website functionalities, such as forms, shopping carts, and user preferences, operate smoothly.

Rejecting Cookies ensures the following is achieved:

  • Enhanced Privacy: Rejecting cookies can provide a higher level of privacy as it limits the data that websites can collect about your browsing habits. This is particularly relevant for third-party cookies, often used for tracking and targeted advertising.
  • Limited Personalization: Without cookies, websites may be unable to remember your preferences or provide personalised experiences. You may need to enter login information manually, set language preferences, or customise settings each time you visit a site.
  • Disrupted Functionality: Some websites may rely heavily on cookies to provide certain functionalities. Rejecting cookies might reduce functionality, rendering certain features inaccessible or less convenient.

Managing Cookie Settings:

 Many web browsers offer more granular controls for managing cookie settings. These options include blocking third-party cookies and deleting cookies.

Ultimately, the decision to accept or reject cookies depends on your preferences regarding convenience, personalisation, and privacy. Reviewing and adjusting your cookie settings in your web browser to align with your desired level of privacy and browsing experience is advisable.

Can cookies be erased or blocked?

To erase cookies, you must find and delete the folder or file where they are stored on your device.

  • Session cookies will automatically be deleted when you close your web browser.
  • You can also block a website’s cookies by configuring your browser settings.
  • You can also use specialist software that protects against malicious cookies. These applications can be customised to let you change the content of the cookies you want to receive or allow to be stored on your device.

Cookie Wall and its implications:

According to cookiebot , a cookie wall is a practice where a website blocks access to its content or services unless the user consents to use cookies. In other words, it forces users to accept cookies to access the website’s full functionality. Cookie walls are often presented as pop-up overlays or banners that require users to click “Accept” or a similar option to proceed.

The use of cookie walls has been debated and has raised concerns regarding privacy and freedom of choice for users. Critics argue that cookie walls may create a situation where users feel coerced into accepting cookies, compromising their privacy rights. They say that users should be able to access a website’s content without being forced to consent to data collection through cookies.

Laws addressing Cookie Walls

The following are some laws that specifically address cookie walls. These laws protect user privacy and ensure consent is not obtained through coercion. They promote transparency and allow users to make informed choices about cookies and their data.

General Data Protection Regulation (GDPR)

The GDPR, which applies to the European Union (EU) and the European Economic Area (EEA), sets strict requirements for obtaining user consent. It requires all multinational companies to provide an opt-in whereby website owners receive a user’s permission to use cookies before storing them on a user’s web browsers. This opt-in is designed to give users greater control over their data, knowing the information is being collected if they consent to that data collection. It also emphasises that permission must be freely given, specific, informed, and unambiguous. GDPR explicitly states that consent is invalid if a user is forced to consent by a cookie wall. 

ePrivacy Directive

The ePrivacy Directive, or the “Cookie Law,” applies to EU member states and governs using cookies and similar technologies. It requires websites to obtain user consent before placing non-essential cookies, such as those used for tracking or advertising. The directive does not explicitly address cookie walls, but it emphasises the importance of user consent and transparency.

California Consumer Privacy Act (CCPA)

CCPA, a privacy law in California, gives consumers the right to opt out of selling their personal information. While it does not explicitly mention cookie walls, it provides users the right to refuse the sale of their personal information, which may include data collected through cookies.

Brazil’s General Data Protection Law (LGPD)

LGPD, Brazil’s data protection law, requires websites to obtain explicit user consent before processing data. While it does not explicitly mention cookie walls, it highlights the importance of freely given consent.

Website owners and operators must comply with relevant privacy laws and ensure their practices respect user rights and privacy preferences.

Sources:

  1. https://allaboutcookies.org/what-is-a-cookie 
  2. https://www.cloudflare.com/learning/privacy/what-are-cookies/#:~:text=Cookies%20are%20small%20files%20of,makes%20of%20the%20web%20server
  3. https://www.earthlink.net/blog/what-are-internet-cookies/ 

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

South Sudanese Pound’s Rollercoaster Ride: Analyzing its exchange rate journey against the Dominant American Dollar

This comprehensive analysis explores the history and determinants of the South Sudanese Pound’s exchange rate against the American Dollar, providing insights into its fluctuations and implications for the country’s economy.

Author: Stephen Topua

Introduction:

Currency exchange rates play a crucial role in international trade and financial markets, reflecting the value of one currency to another. This data story delves into the history of the South Sudanese Pound (SSP) and its exchange rate fluctuations against the mighty American Dollar (USD) since its introduction in 2012. We aim to provide valuable insights into the evolving relationship between the SSP and USD, shedding light on the factors influencing their exchange rate dynamics by analysing this trend over the past ten years.

South Sudan, a young nation that gained independence in 2011, introduced its national currency, the South Sudanese Pound, to establish its economic identity. Since then, the exchange rate between the SSP and USD has been a critical measure of the country’s financial performance and stability.

We use this trend to give a perspective of how this relationship has evolved over the last ten years until the present moment when the SSP is trading for over 900 for every USD. 

Background:

Exchange rate: the exchange rate represents the price of a national currency valued as a foreign currency. When the exchange rate for a currency rises so that the currency exchanges for more of other currencies, it is referred to as appreciating or “strengthening.” When the exchange rate for a currency falls so that it trades for less than other currencies, it is referred to as depreciating or “weakening. 

How are exchange rates determined?

Exchange rates, which reflect the value of a country’s currency to other currencies, are influenced by various factors. Inflation, interest rates, public debt, political stability, and economic health all play crucial roles in shaping the strength or weakness of a currency. Countries with low inflation rates and stable political environments tend to have stronger currencies, as they attract investors and inspire confidence. Additionally, a robust economy, positive balance of trade, and low current account deficits contribute to a currency’s appreciation. However, speculative activities and short-term market sentiments can also affect exchange rates.

Understanding these determinants helps in analyzing and predicting currency movements. Knowledge of these factors is vital for businesses, investors, and policymakers in making informed decisions in the global financial markets. It is important to monitor inflation rates, as low inflation tends to support stronger currencies. Interest rates influence the attractiveness of a currency to investors, and higher rates can strengthen exchange rates. Public debt levels, political stability, and economic health also impact exchange rates. Finally, trade balance and current account deficits affect a country’s currency value. By considering these determinants, stakeholders can navigate the complex world of foreign exchange and adjust their strategies accordingly.

Types of exchange rate systems:

There are four main types of exchange rate regimes. The first is the free-floating system, where exchange rates fluctuate constantly based on market demand and supply. Currency prices change dynamically, reflecting the forces of the foreign exchange market.

The remaining three types include fixed, pegged, and managed float systems. In the fixed system, a monetary authority sets a firm exchange rate for the currency to a foreign currency or a basket of currencies. This fixed rate remains constant over time. Under the pegged system, a country ties the value of its currency to a foreign currency or a specific unit of account. Although bilateral parity is maintained, the value of the home currency fluctuates in line with the anchor country’s currency. In the managed float system, the exchange rate is influenced by both market conditions and interventions by the monetary authority. The central bank actively participates in the foreign exchange market to manage and steer the exchange rate without committing to a predetermined path.

Understanding these various exchange rate systems is crucial for comprehending the dynamics of international trade and financial markets. Each system offers different degrees of flexibility and control over a country’s currency value, shaping economic outcomes and policy decisions.

The United States of America vs South Sudan Economies by Comparison:

The GDP is the market value of all final goods and services produced within a country in a given period. For comparison purposes, The GDP of both the USA and South Sudan are:

  • USA: 26.24 trillion USD 
  • South Sudan: 7.02 Billion USD

Evolution in the exchange rate of the South Sudanese Pounds (SSP) versus the United States Dollars (USD)

At the inception, the exchange rate was SSP 2.75 for every 1 USD. However, things quickly went downhill as the exchange rate is currently at 980 SSP for every 1 USD within years, peaking at 1001 SSP for every USD. This is highlighted by the graphs below.:

The first graph shows how the exchange rates have evolved between 2012 and 2023, offering the highs and lows in the process. The second graph displays daily changes in the exchange rates, showing drastic daily changes in the process, such as the highest daily exchange rate, highest gain and highest loss in value by the SSP on the United States dollar. 

The link to the visualisation is Here.

The link to the visualisation showing the daily difference in the exchange rate is given Here

Some insights emerge from the data, which we highlight below:

  • The most significant loss in value for the SSP against the USD was between 12 and 13 October 2020, when it went from 515 to 700 in a matter of 24 hours 
  • The biggest gain in value for the SSP against the USD was between 13 and 14 October 2020 and between 6  and 7 August 2022, when it went from 700 to 550 in a matter of 24 hours 
  • The highest-ever exchange rate was on 24 May 2023, when it stood at 1001 SSP for every USD

How do search terms related to Exchange rates compare in South Sudan for the past 12 months? 

In conclusion, we compare how searches are compared for four related topics: South Sudanese pound, USD, BoSS, exchange rate and FOREX. For this segment, we use Google Trends for the data collection and visualisation. Google Trends is a website by Google that analyzes the popularity of search queries in Google Search across various regions and languages. The website uses graphs to compare the search volume of different questions over time. We use this feature to analyse how the search patterns of the four topics emerge from July 2022 to June 2023. 

The graph below shows interest over the past 12 months. The research shows that USD is consistently the most searched term, indicating considerable interest in USD in the country. All the data was collected using GoogleTrends.

The graph below shows that the USD generated the most interest in the period lasting 12 months, followed by Exchange Rate. In contrast, BoSS and the SSP showed little interest in search volumes in the analysed period.

NB: the data was visualised using Datawrapper. 

This comprehensive analysis explores the South Sudanese Pound’s history and its exchange rate fluctuations against the American Dollar over the past decade. Factors influencing exchange rates, such as inflation, interest rates, public debt, political stability, economic health, balance of trade, and confidence/speculation, are discussed. The four main types of exchange rate regimes—freely floating, fixed, pegged, and managed float—are explained, highlighting their characteristics and implications. The article emphasizes the importance of understanding these determinants and exchange rate systems for businesses, investors, and policymakers to make informed decisions in the global financial markets. We also examined search trends related to exchange rates in South Sudan, indicating significant interest in the United States Dollar while providing valuable insights into the complex dynamics of exchange rates and their impact on economies.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Blog: The psychology behind why people create online scams and fraud

We explore the psychology behind online scams and frauds, including common tactics used by scammers, the impact of such activities on individuals and society, legal consequences for those participating in these activities, and ways to verify the authenticity and protect oneself from online fraud.

Writer: Emmanuel Bida Thomas

Unfortunately, online scams and frauds are all too common in today’s digital age. Despite efforts to increase awareness and educate people about these types of fraud, they continue to occur at an alarming rate. The psychology behind why people create online scams and frauds is complex and multifaceted. In this blog post, we’ll explore some of the common tactics used by scammers, the impact of online scams and frauds on individuals and society as a whole, the legal consequences of participating in online scams and frauds, how to verify the authenticity of scams such as job offers or recruitment messages, and how to protect oneself from online job scams and frauds.

The global prevalence of online scams and fraud

According to PwC’s Global Economic Crime and Fraud Survey 2022, 51% of surveyed organisations say they experienced fraud in the past two years, the highest level in their 20 years of research. The survey of 1,296 executives across 53 countries and regions also shows that fraudsters are becoming more sophisticated in their tactics. In a survey of over 5,000 respondents across 99 global territories in 2020, PricewaterhouseCoopers (PwC) found that 47 per cent had suffered at least one form of fraud in the prior 24 months—averaging six per company. These were commonly customer fraud, cybercrime, asset misappropriation, bribery, and corruption, costing $42 billion.

The Psychology Behind Online Scams and Frauds

The desire for financial gain is the root of most online scams and frauds. Scammers often use social engineering techniques to manipulate victims into giving up personal information, money, or sensitive data. These techniques exploit human vulnerabilities, including fear, curiosity, greed, and compassion. For example, some scammers may pose as a trustworthy authority figures, such as a doctor or government official, to convince their victims to hand over sensitive information.

Others may use emotional appeals, promising quick riches or presenting themselves as long-lost friends or loved ones needing urgent help. Still, others may use threats or blackmail to extort money or information from their victims. Ultimately, the success of any scam relies on the victim’s willingness to trust the scammer and act upon their demands.

Socio-economic factors contributing to online scams and positive impacts

Some people may use online scams to survive in countries with limited economic opportunities. While this does not justify fraudulent behaviour, it is essential to acknowledge that underlying socioeconomic factors may contribute to the prevalence of online scams.

It’s important to understand that people engage in fraudulent behaviour for various reasons. These reasons are often related to broader societal issues such as poverty, inequality, and lack of access to education and economic opportunities. While it’s never acceptable to engage in fraud or other illegal activities, addressing the root causes of these behaviours is essential to create a more just and equitable society. One way to do this is by investing in programs and policies that promote economic growth and opportunity, improve access to education and training, and support marginalised communities. A holistic approach to addressing these issues can reduce the prevalence of online scams and other forms of fraud while promoting more significant social and economic justice.

It is difficult to find any positive impacts of online scams. However, some studies suggest that online shaming can have positive influences, such as the communication of group norms and the punishment of their violation by elevating the status of those enforcing them. 

The four stages of a scam are:

The typical stages of a scam are from when the scammer first contacts a potential victim to the victim realising they’ve been defrauded.

The opportunity is also called setup: Scammers contact potential victims. They often have tremendous success if the victim is experiencing a vulnerable period in their life. The scammer sets up the scam, which involves creating a fake story or scenario to trick the victim into parting with their money or personal information. 

The hook or scam itself: The scammer makes initial contact with the victim and uses various tactics to gain their trust and confidence, such as offering a fake investment opportunity or pretending to be a government agency. Fraudsters create a credible fake story to target victims, such as a bank staff member, an investment expert, a seller of goods or a romantic interest. Scammers use imitation to appear more believable. Tactics include spoofing phone numbers or using fake reviews to create credible online ads. Scammers build a relationship with the victim by appearing likeable and establishing similarities.

The payoff, known as payment: The scammer convinces the victim to send them money or provide personal information, often by promising a significant return on investment or threatening legal action if they don’t comply. Scammers create an overwhelming sense of urgency, leaving victims little time to double-check details and manipulating them into dismissing warnings from experts, family members or friends.

The endgame and aftermath: The scammer disappears with the victim’s money or personal information, leaving them with little recourse for recovery. In some cases, the scammer may continue to contact the victim to get more money or information from them. The victim realises that they’ve been scammed, often causing feelings of distress and shame. Too often, banks and the police don’t deal with the situation well, leaving the victim under further stress. On many occasions, the victim isn’t reimbursed for their losses.

Common Tactics Used by Scammers

Scammers use various tactics to trick people into giving them money or personal information. Some of the most common tactics used by scammers include impersonation, urgency, and emotional manipulation:

  • Phishing emails and text messages: Appear to be from a reputable source but contain links or attachments that install malware or steal personal information.
  • Advance fee scams: These are scams where the scammer poses as a wealthy individual who needs help transferring funds out of their country. The victim is promised a reward for helping but is asked to pay various fees upfront, which are never returned.
  • Charity scams: These are scams where the scammer poses as a charitable organisation and solicits donations from unsuspecting individuals. The money collected is often never used for its intended purpose.
  • Impersonation scams: These are scams where the scammer poses as a legitimate authority figure, such as a government official, police officer, or bank representative. They use this guise to obtain personal or sensitive information from their victims.

Impact of Online Scams and Frauds

The impact of online scams and frauds can devastate individuals and society. Victims can suffer financial losses, identity theft, and emotional distress. Online scams and frauds can undermine trust in institutions and the economy. Victims may also face legal consequences if they unknowingly participate in illegal activities, such as money laundering or wire fraud.

Online scams and frauds impact society, eroding trust and confidence in digital transactions and communication. This can lead to decreased adoption of new technologies and increased costs for businesses that must invest in cybersecurity measures to protect themselves and their customers. According to the International Monetary Fund (IMF), incidents that corrupt the integrity of financial data can potentially undermine trust and confidence more broadly. In addition, exposure to online misinformation has been linked to lower trust in mainstream media across party lines.

Legal Consequences of Participating in Online Scams and Frauds

Participating in online scams and frauds can have serious legal consequences. Depending on the nature and scope of the scam, individuals who are caught may face fines, imprisonment, or both. In some cases, individuals may also be required to pay restitution to their victims.

How to Verify the Authenticity of Scams

It’s important to verify the authenticity of any message or job offer before providing personal or sensitive information. Some ways to do this include:

-Researching the company or organisation online to see if they have a legitimate website or social media presence.

  • Contact the company or organisation directly to confirm the message’s legitimacy or offer.
  • Checking with relevant authorities, such as the Better Business Bureau or local law enforcement, to see if any reports of fraud or scams are associated with the company or organisation.

How to Protect Oneself from Online Scams and Frauds

There are several things that individuals can do to protect themselves from online scams and frauds:

  • Be cautious about providing personal or sensitive information online.
  • Avoid clicking on links or downloading attachments from unknown sources.
  • Use strong passwords and two-factor authentication for online accounts.
  • Install antivirus software and keep it updated.
  • Report any suspicious activity to relevant authorities.

A fairer system for scam victims

South Sudan has been plagued by scams and frauds, leaving many victims without justice or compensation. To establish a fairer system, the establishment of Computer Incident Response Term (CIRT), a centralised government agency by the National Community Authority, should be expedited to handle scams and fraud reports. CIRT should employ trained investigators who work with victims to gather evidence and pursue legal action against scammers. Scam victims should be provided with counselling services, information on avoiding scams and establishing a compensation fund in the future. The legal system must be strengthened to ensure that scammers are held accountable, and victims receive justice. Education and awareness campaigns could be implemented to help prevent future scams by educating the public on how to spot and avoid them.

Computer Incident Response Teams (CIRTs) can effectively combat online scams by providing a coordinated and rapid response to security incidents. CIRTs can help to identify and contain security incidents, minimise damage, and restore normal operations as quickly as possible. They can also help to prevent future incidents by identifying vulnerabilities and implementing security measures to address them. 

While implementing such a system may require significant resources and effort, it could provide much-needed support and justice to victims of scams in South Sudan.

New laws could provide more excellent protection

Two significant pieces of legislation that are yet to go through parliament will help to provide improved protections against scams or help for scam victims in South Sudan:

The Data Protection Bill aims to regulate the collection, use, storage, and sharing of personal data by individuals, organisations, and institutions. It will hold online platforms responsible for fraudulent content and ads, which means that they will be required to take steps to prevent the spread of malicious advertisements and fake news on their platforms. This could help reduce the number of online scams and provide more excellent protection to consumers who may fall victim to these scams.

The Cybercrime and Computer Misuse Bill addresses cybercrime activities such as hacking, identity theft, and phishing. The bill criminalises computer-related offences and provides penalties for those found guilty of engaging in such activities. This bill can help deter cybercriminals from carrying out illegal activities by imposing stiff penalties and providing a legal framework within which law enforcement agencies can investigate and prosecute cybercriminals.

Conclusion

Unfortunately, online scams and frauds are a reality in today’s digital age. The psychology behind why people create these types of fraud is complex but often involves a desire for financial gain. To protect oneself from these types of scams, it’s essential to be cautious about providing personal information online and to verify the authenticity of any message or job offer before acting upon it. By staying vigilant and informed, individuals can avoid falling victim to online scams and fraud.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Explainer: Distributed Denial of Service Attack (DDoS Attack)

This article discusses Distributed Denial of Service (DDoS) attacks, how they can be prevented and mitigated, and their potential impact on businesses.

Writer: Jibi Moses

Distributed denial of service (DDoS) attacks are now everyday occurrences. Whether a small non-profit or a huge multinational conglomerate, the organisation’s online services—email, websites, anything that faces the internet—can be slowed or completely stopped by a DDoS attack. For data centres, colocation, hosting and other service providers, DDoS attacks threaten the infrastructure that provides network and service availability to all its tenants, subscribers and customers and can target the most valuable customers.

A successful DDoS attack can seriously damage a brand’s reputation and cost hundreds or even millions of dollars in revenue. Moreover, DDoS attacks are sometimes used to distract cybersecurity operations while other criminal activity, such as data theft or network infiltration, is underway.

A Denial-of-Service (DoS) attack shuts down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash. Some definitions of the DoS can be found here, here, here and here.

Network traffic is the data moving across a computer network at any given time. Network traffic, also called data traffic, is broken down into data packets and sent over a network before being reassembled by the receiving device or computer.  In the case of an attack, keep sight of the other hosts, assets, or services residing on your network.

Meanwhile, a Distributed denial-of-Service (DDoS) attack is a DoS attack that uses multiple computers or machines to flood a targeted resource. Both attacks overload a server or web application, intending to interrupt services. 

Many attackers conduct DoS or DDoS attacks to deflect attention away from their intended target and use the opportunity to conduct secondary attacks on other services within your network. 

These attacks come in many forms: Volume-based attacks, Protocol attacks, Application-layer attacks, UDP attacks, ICMP attacks, Ping of death, Slowloris, and NTP application attacks. 

All the above affect the victim(s) differently but with a similar intention of disrupting the user. However, this doesn’t give the attacker access to the website he/ she has attacked.

A recent example of a DDoS attack in South Sudan was the attack on the Bank of South Sudan site. The local media was awash with the news, as reported by Eye Radio, CityReview, and Sudan Post, A mysterious group calling itself Anonymous South Sudan, claimed responsibility of the attack, citing high inflation rates as the main reason for hacking the bank’s website. Calling for a drop in the wanted South Sudanese Pounds exchange rate to  400 SSPP per 1 USD.

Besides in the other parts of the world, there are some popular and recent DDoS attacks; the Github hub attack in Feb 2018, the Mirai botnet attack in 2016, The AWS DDoS Attack in 2020 and the European Gambling Company in 2021.

Meanwhile, Denial of Service should be distinct from Hacking. According to Malwarebytes: Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays, most references to hacking, and hackers, characterise it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge. Another point is that hackers have total control of the site or whatever they have broken into, unlike DDoS, whereby the system is flooded with traffic to interrupt the system. However, DDoS is one of the many tools for hacking. 

Prevention:

DDoS (Distributed Denial of Service) attacks can be challenging to prevent completely, but there are several measures that you can take to minimise their impact. Here are some steps to stop a DDoS attack on your website:

  1. Use a DDoS protection service: Consider using a third-party DDoS protection service to detect and mitigate attacks in real-time.
  1. Increase your server capacity: DDoS attacks can cause your website to become unavailable due to overwhelming traffic. Increasing your server capacity can help your website handle the traffic and remain available during an attack.
  1. Use a CDN (Content Delivery Network): A CDN can help distribute the traffic to multiple servers and reduce the load on your website, making it more resilient to DDoS attacks.
  1. Configure your firewall: Configure your firewall to block traffic from known malicious IP addresses, limit connections from a single IP address, and filter traffic based on specific patterns common in DDoS attacks.
  1. Keep your software up to date: Regularly update your website software, including the operating system, web server, and any third-party applications, to ensure that they are free from known vulnerabilities that could be exploited in a DDoS attack.
  1. Monitor your traffic: Analyze your traffic logs to identify any unusual traffic patterns that could indicate a DDoS attack. Using a monitoring tool can help you detect attacks early and take steps to mitigate them.
  1. Have a DDoS response plan: Develop a DDoS response plan that outlines the steps you will take in the event of an attack. This should include procedures for notifying your hosting provider, engaging a DDoS protection service, and communicating with your users.

What next if attacked?

Resolving a DDoS attack can be challenging, but there are several steps you can take to mitigate its effects: Identify the source of the attack: Determine where the attack is coming from and which systems or machines are being used to launch it. Block traffic from the attacking IPs: Once you know where the attack is coming from, block all traffic from those IP addresses to your network or website. Filter traffic: Apply filters to incoming traffic to identify and block malicious traffic and allow legitimate traffic. Increase server capacity: Add more servers or bandwidth to handle the increased traffic load. Use a Content Delivery Network (CDN): A CDN distributes network traffic across multiple servers, reducing the attack’s impact on any one server. Contact your Internet Service Provider (ISP): Your ISP may have tools or resources to help you mitigate the effects of a DDoS attack. Implement DDoS protection software: Several commercial and open-source options are available to help prevent DDoS attacks.

Remember that preventing DDoS attacks before they occur is the best strategy. It’s important to stay vigilant and keep your security measures up-to-date to reduce the risk of a successful attack.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

Data Story: South Sudan’s population surges to 12.4 million, reveals 2021 survey

The survey is expected to be an essential resource for the government’s development planning, decision-making, and provision of services as it provides the latest accurate population estimates and other demographic and socio-economic characteristics of the inhabitants.

Writer: Jibi Moses 

The National Bureau of Statistics (NBS) in South Sudan released the Population Estimation Survey 2021 (PES) on April 6th, 2023, revealing a surge in the country’s population to 12.4 million people, a rise of over four million people. The PES 2021 was conducted between May 28th and June 15th, 2021, across ten states and three Administrative areas, with a female population of 52.9% and a male population of 47.1%, while the youth population stands at 77%.

The PES 2021 is expected to be an essential resource for the government’s development planning, decision-making, and provision of services. The survey will monitor the performance of the National Development strategy and the sustainable development goals while providing policymakers with briefs and reference points for research.

With South Sudan’s last census conducted in 2008, the PES 2021 provides the latest accurate population estimates and other demographic and socio-economic characteristics of the inhabitants. The NBS utilised satellite imagery and enumeration to ensure the quality of information and data for the survey met the basic assumptions of the analytic method.

Despite the impact of civil war outbreaks since independence in 2011, the PES 2021 provides a comprehensive and up-to-date representation of South Sudan’s population, enabling policymakers and decision-makers to implement evidence-based planning and decision-making for progress and sustainable development in the country.

The country’s last Census was in 2008, when it was still an autonomous region of Sudan. While releasing the results, Isaiah Chol Aruai, the chairperson of NBS, explained that the figures are based on satellite imagery and enumeration across ten states and three Administrative areas.

The quality of information and data for a given locale, as well as the ability of the data to meet the basic assumptions of the analytic method, are key to performing accurate estimates or projections,” Isaiah Chol Aruai said.

S/No.State/Administrative areaModelled Population Estimates 
1Upper Nile 790,147
2Jonglie 791,105
3Unity 892,780
4Western Bahr El Ghazal 562,555
5Northern Bahr el Ghazal 1,924,342
6Warrap 2,639, 484
7Lakes 1,265, 473
8Western Equatoria 663,233
9Central Equatoria 1,324,521
10Eastern Equatoria 981,902
11Greater Pibor A A240,102
13Ruweng AA234,416
14Abyei133,955
Total12,444,018
Fig 1.0: A table showing the data of the PES 2021 | Source: National Bureau of Statistics 

National statistical offices often produce estimates and projections of various characteristics of a population. These statistics are a vital source of information for decision-makers throughout the government, the private sector, and civil society. An estimate calculates a population’s size or distribution or another population characteristic for the present or past. At the same time, a projection describes these characteristics in the future.

In most countries, policymakers and other data users often require accurate information between census data releases every ten years. Although a full population count only occurs during a census, statistical methods and tools often produce regular, up-to-date population estimates.

Population estimates can describe the population size and demographic characteristics such as age, sex, or education level. Population estimates depend on change’s demographic components: mortality, fertility, and migration.

Estimates of mortality, fertility, and migration estimates are derived from data available from censuses, surveys, registration systems, and other administrative records. Estimates and projections are calculated similarly. However, estimates employ observed data and hypotheses of demographic change when data are incomplete. Projections, on the other hand, rely on hypotheses about demographic change in the future.

One of the most widely used approaches for producing population estimates and projections is the Cohort Component Method, which can be used to calculate detailed statistics such as population by age and sex, total fertility rate, infant mortality rate, and population growth rate. A population may also be estimated and projected for multiple geography units, from the national to various subnational levels (e.g.States, Counties, Districts, Payams, Bomas). 

Figure 2: A bar chart showing the total populations from the ten states and the administrative Areas | Source: Flourish Studio Data Visualization

Fig 3. A stacked bar chart showing the figures of the two most recent population census in 2008 and the PES 2021 | Source: Flourish studio data visualization

Fig 4: A bar chart showing the population percentage between the two censuses, 2008 and PES 2021 | Source: Flourish Studio Data Visualization

Criticisms from the Public:

The PES 2021 report was received with much scepticism and criticism from the public. Individuals and organisations criticised the authenticity of the data. Some voices challenging the report can be found in this article by The East African and an analysis by The Sudd Institute. 

Some opposition politicians and some in the civil society questioned the estimates that put the total of the country’s population to 12,444,018 and are demanding what they term “a proper census” as per the 2018 peace agreement. UN estimates had put the population at 11,556,069 even though the UN itself partly supported the current survey,” reports The East African

Augustino T. Mayai, the Managing Director of the Sudd Institute, an independent research organisation, analysed the scientific, political, and policy implications of the PES results stating that the new estimates are in stark contrast with South Sudan’s 2008 census counts, which stood at 8.26 million, informing the 2010 regional and national elections. These estimates, he says, “…have so far generated heated debates in various quarters, with many outright contesting them for a host of good reasons.”

However, on the 13th of April, NBS clarified that the PES 2021 results should not be used for electoral purposes, Juba Echo, but for planning and policy guidance, such as Something Augustino T. Magai questions.  

‘’…if the PES results cannot be used for electoral purposes, then it is odd to use them

for development. Using the scientifically troubled PES results for development (i.e., 

distributing services) is more problematic than using them for politics. This is because 

development is for the ‘greater good for a greater number of people,’ as should be obvious, 

South Sudan’s politics benefits a select few. Let me illustrate. Suppose the Northern Bahr el Ghazal government constructs 50 new schools in Aweil East based on the current estimates, subsequently recruiting teachers and enrolling students. It then dawns on the government that only ten such schools must be based on actual enrollments. The result then boils down to resources wasted and injustice inflicted on populations that genuinely deserve the services but could not get..,’’ as quoted in his report. 

Conclusion:

Much as the PES 2021 results announced, NBS decried a lot of challenges in bringing out accurate and perfect results; among these, they cited the insecurity in parts of the country, floods that had submerged a lot of the inhabited land areas, lack of resources both financial and human. However, against all odds, they could still get the necessary data.

The PES 2021 results put the current estimated population at 12,446,016, with an increment of 4,186,335 from the 2008 population census, which had the country at 8,260,490. This shows an annual percentage growth of 3.9%. 

The current population of South Sudan is 11,556,786 as of Tuesday, April 25th 2023, based on the latest United Nations data. With 43% of the population below 14, 54%  between 15 – 64 and 3% representing 65 and above.

Population estimates are a vital source of information for decision-makers throughout the government, private sector, and civil society. In most countries, policymakers and other data users often require accurate information between census data releases every ten years. Although a full population count only occurs during a census, statistical methods and tools often produce regular, up-to-date population estimates.

Demographic components such as mortality, fertility, and migration must be considered to ensure the accuracy of population estimates. Estimates of these components are derived from data available from censuses, surveys, registration systems, and other administrative records. The Cohort Component Method is widely used for producing population estimates and projections.

Given the importance of accurate population estimates, it is recommended that South Sudan conducts regular surveys and censuses to ensure policymakers have the necessary information for decision-making. Innovative methods such as satellite imagery and enumeration can enhance the quality of information and data collected during surveys and censuses. Policymakers should prioritise evidence-based planning and decision-making for progress and sustainable development in South Sudan.

This article is part of our data stories work written with the firm belief that factual and data-driven reporting can influence decision-making and public perceptions and educate the audience on public interest issues.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

 Fact-check: Is a new ocean forming in East Africa? Yes, scientists say so

The formation of a new ocean in East Africa, expected to occur in a million years due to the movement of tectonic plates pushing in opposite directions and creating a chasm, is a gradual process, as indicated by scientists.

Writer: Jibi Moses 

Voice of Juba, a Facebook page posted on the 18th March 2023, pictures of some parts of the globe, mainly the African continent, with claims that Scientists have discovered a new ocean forming as Africa begins to split.

The post claimed this discovery could see East Africa forming its separate continent. South Sudan, Zambia and Uganda could one day have their coastlines if the land mass continues to separate. 

A screenshot of the post by Voice of Juba

Investigation:

On carrying out Google and Bing searches, several results show that there is a possibility of an Ocean forming in East Africa, given the presence of the rift Valley backed by scientific evidence. The rift Valley spreads itself from the southern part of Africa to the East African countries of Tanzania, Kenya, and Ethiopia and connects to the Red Sea. 

However, these sources clearly state that this process would take millions of years to happen as it’s gradual. These explanations are seen here below as 1, 2, 3, 4. Besides, these youtube videos explain more 1, 2.

“This is the only place on Earth where you can study how a continental rift becomes an oceanic rift,” said Christopher Moore, a PhD doctoral student at the University of Leeds in the United Kingdom, who has been using satellite radar to monitor volcanic activity in East Africa that is associated with the continent’s breakup.

It’s thought that Africa’s new ocean will take at least between five million and ten million years to form.

The East African Valley:

The East African Rift (EAR) or East African Rift System (EARS) is an active continental rift zone in East Africa. The EAR began developing around the onset of the Miocene, 22–25 million years ago.[1] In the past, it was considered part of a larger Great Rift Valley that extended north to Asia Minor.

A narrow zone, the rift is a developing divergent tectonic plate boundary where the African Plate is splitting into two tectonic plates, called the Somali Plate and the Nubian Plate, at a rate of 6-7 mm per year.[2] The rift system consists of three microplates, the Victoria Microplate to the north and the Rovuma and Lwandle microplates to the south. The Victoria Microplate is rotating anti-clockwise for the African plate. Its rotation is caused by the configuration of mechanically weaker and stronger lithospheric regions in the East African Rift system.

In addition to this description, many geologists and geological houses have described it as here here here, here, and here, 

Tectonic plates and  forces:

A tectonic plate (a lithospheric plate) is a massive, irregularly shaped solid rock, generally composed of continental and oceanic lithosphere. Plate size can vary greatly, from a few hundred to thousands of kilometres across; the Pacific and Antarctic Plates are among the largest. There are seven significant plates; Pacific Plate, North American Plate, Eurasian Plate, African Plate, Antarctic Plate, Indo-Australian Plate, and South American Plate. 

Meanwhile, Tectonic forces refer to the forces or conditions within the earth that cause crust movements. designating the results of such movements: tectonic valleys. These forces are significant in forming the continents and subsequent features like rift valleys and lakes.

Conclusion:

Given the evidence from science that East Africa is within the East African Rift Valley System, which is active as evidenced by the active volcanic mountains and the changes (expansion) of the rift valley every year and in addition, the proof by science that tectonic plate (African Plate) on which the East African part of the continent lies are moving apart over time, it is true that a new ocean is forming in East Africa. The Gulf of Aden and the Red Sea will flood over the Afar region and into the East African Rift Valley and become a new ocean, and that part of East Africa will become its own separate small continent.

However, this is expected to happen in a million years to come, as these changes are happening in a very gradual process.

Fight misinformation in mainstream and alternative media by not being a victim of fake news. Refrain from sharing content you are unsure about or don’t know where it comes from to prevent spreading false information. For more information on our fact-checking process, visit https://211check.org/ or send us a WhatsApp message at +211 917 298 255 to present a claim. Our team will fact-check it and respond promptly. #FactsMatter

Explainer: What is a deep fake and how to spot it?

Deepfake is an application of AI technology that can manipulate videos, images, and audio of real people. It has been used for hate speech and misinformation, as well as to impersonate people’s likenesses.

Writer: Ghai Aketch

Have you ever wondered when digital content looking authentic is flagged as fake? It is indeed possible with the rapid evolution of Artificial Intelligence (AI) technology that is a sophisticated spread of disinformation and hate speech. 

Deepfake is, therefore a product of such advanced tech. It’s an application of sophisticated computer AI to manipulate videos, images or audio of real people. Its name is derived from Deep Learning, a type of AI system.  

The targeted images are altered by deep fake software to generate exact images of the person, and  synthetic character is produced. The output of the manipulated footage turns real people to say words they never spoke or act as the programmer wants. 

The deepfake videos were initially targeting celebrities to ‘feature’ in explicit clips. The explicit contents would sequentially promote clicks on the websites. 

The programmers download random pornographic videos and swap faces of prominent people with the video characters which to great extent looks original.

So, given the possibility to manipulate images of real people is worrying according to  researches when  political or religious leaders are targeted to ‘utter’ hate speech towards other groups. It has become a great source for hate speech and misinformation propagation. 

Although no reported clips of deepfake involving South Sudanese prominent figures, concerns should be placed on alertness on the dangers this technology could cause in the politically  fragile state should it happen. 

When used in a political setting, the image-altering emerging trends could cause detrimental cybersecurity and society threats according to Security Week.

The most recent example of a deepfake footage is of the US sitting president, Joe Biden. 

The footage in circulation was manipulated and appeared ridiculing transgender women, by allegedly saying, “you will never be a real woman.”

Interestingly, he had earlier supported transgender Americans before the footage emerged. It was hard though to distinguish it as fake. But with keen reference to past events can wake your curiosity. 

The United Nations Office of Disarmament Affairs(UNODA)  in 2019 to 2021 held a series of multi-stakeholders sessions highlighting that  misuse of ICT may ‘harm international peace and security.’ 

But fast-advancing technology has eased this machine learning process. That’s to say anyone with a computer and internet access can, with ease, generate deepfake contents. 

Also, its emerging  user-friendly interface has made AI-altered products more available on the internet today. 

However, countering that, developers  have reverse engineered the deepfake processes. Several deepfake debunking softwares such as, DeepTrace, Microsoft Video Authenticator and DuckDuckGoose are countering spread of disinformation through digital content verification. 

As much as deepfake is useful in the entertainment industry, it’s largely digressing into real crimes and insecurity for states. 

How to detect deepfake

Emergence of new tech has made almost anything possible. But people tend to be baffled  while sifting genuine information from deepfakes.

Fortunately, you can, without using deepfake detecting tools, try to spot the following in a computer-doctored footage.

How to spot deep fake

Additionally, being critical enough of digitally-generated content can do you better to detect certain flaws in deepfakes considering  coherence of speeches, or previous  events. 

For example, the recent Joe Biden deepfake which allegedly ‘ridiculed’ transgender women. But look, previously he had signed sex-marriage bill into law, saying that Americans have rights to choose whom they want to marry. 

Moreover, in the US transgender policies are upheld in some states including Washington D.C, where the government sits. So, such sudden inconsistencies can give you clear  hints  that that particular footage is fake.

It has come a time you should not always believe what you see according to an analytical report on deepfake emergence.  

In South Sudan, impersonation of people’s likenesses has been through the commonly easy-to-use celebrity photos swapping Apps. However, it’s simple to spot that such images are inauthentic looking at the skin tone and image orientation.

In conclusion,  deepfakes will keep increasing and grow complex according to available publications. But you need to be curious as deepfakes disseminate disinformation via altered images of powerful and famous personalities. 

Data Story: Young men circumcised in Bor since July 2021

More than 2,000 locals mostly young men have been circumcised voluntarily since the exercise started in July 2021

By Deng Ghai Deng

Health officials in Bor town say the free medical male circumcision is gaining momentum as young people are now embracing the cut and testifying to its benefits to their oblivious colleagues.

1st 2nd  3rd 4th 5th 6th 7th 8th 9th 
180223227234210209226244257
Table Showing  Number of Young People Circumcised in Bor in 9 Rounds Since July 2021 

Amid the negative cultural perceptions attached to the cut, which persisted over years, the Jonglei State Ministry of Health, in collaboration with partners, launched the first-ever free circumcision in July 2021 to sensitise locals to take up circumcision.

The move was triggered by reports that most of the people living with HIV/AIDs in Jonglei State were uncircumcised.

The rollout triggered mixed reactions from various quarters, as some people condemned it, while others viewed it as a welcome remedy.

The Executive Director for the Community Support Initiative (CSI), Achiek David Arou, who plays a part in the implementation of the initiative, revealed that the exercise had to overcome lots of resistance when it began last year.

Although the culture denies it; we are being dictated to by the health risk of not being circumcised,” he said.

Our circumcision is not a cultural-based exercise, but it is a health-driven need that targets only the sexual reproductive age. So, people get information one by one throughout our demand creation activities,” Mr Arou explained.

After raising awareness, the health partner said their facility now receives more people who are demanding voluntary male circumcision and HIV/AIDS services as well.

We are also embarking on other activities, for example, contact tracing and case finding indexes for HIV/AIDs,” he said.

More than 2,000 locals mostly young men have been circumcised since the exercise started in July 2021.

These include the community living around the barracks, SSPDF cadres, and the two direct beneficiaries of the initiative.

However, before the clients are circumcised, voluntary HIV testing is also undertaken for the recipients to know their status.

About 10 people, estimated at one per cent of the clients, tested positive for HIV throughout the exercise.

Motivational factors

Arou Elijah Kur, one of the beneficiaries who applauded the rollout, revealed he took it up after being convinced by its health benefits.

Firstly, I got motivated because I had already been aware of its importance, especially when I was at school. So, I opted for general cleanliness and the fact that it prevents the transmission of STIs, “he narrated.

Mr Kur confessed that circumcision had helped him to realise that he could nowadays last longer in bed as opposed to the previous times when he used to ejaculate within a few moments.

I remember those days; I could just ‘release’ within a few minutes. But I now last longer than that, and that is one of the achievements of this service, “he added.

According to Kur, the 60 per cent chance of evading contracting venereal diseases when circumcised was another motivating factor to embrace the cut.

Beating the odds  

When asked whether he was not worried about repercussions, he said it was high time to forgo bad cultural practices. 

Most uncircumcised people have been unable to go for the procedure due to peer pressure and old cultural beliefs.

Kur encouraged the uncircumcised male to reject circumcision stereotypes and embrace the cut.

“I went out of my girlfriend’s notice, but after I underwent it, she is now benefiting from it,” he happily recounts.

“We are in a modern society whereby things are hidden, but let’s be at least friendly to ourselves and our health. We shouldn’t be hearing what people are saying about it,” he added.

Upsetting the odds

In recent months, a song in Dinka dubbed “Aguala Ku Le Bor Ka Thou” which literally translates to “If a circumcised one happens to go to Bor, then he can die” went viral to many ears.

But Mr Kur said: “These were lies. Why am I still alive? He was questioned. “I am in Bor now, I actually got circumcised in Bor, and I have not died. Instead, I am alive and healthy. We should style up and abandon these rigid cultures, “he concluded.

A 24-year-old client who did not want his name to be disclosed said he shunned criticism given the modern exposure.

“Whenever you didn’t taste the food cooked by another woman; you will just think that your mother is the best cook,” he said.

“But there are other unique dishes besides that of your mother, so being circumcised is much better than the life we used to live,” he said.

When asked whether he still practises safe sex or not; he confessed that he still goes for safe sex, though the girlfriend gives him a hard time on a constant basis.

“In this part of the world, whenever you tell your girlfriend that you want to use a condom, she will feel bad and shy. She always thinks that condoms are for prostitutes, “the source stated.

According to him, he normally convinces the fiancée to accept safe sex even if she does not like condoms.

Relevancy

Daniel Wut Achom, Data Clerk, HIV/AIDs department at Bor State Hospital, believes the exercise will help the youngsters avoid contracting the disease if it continues.

“The people being circumcised are young people, but based on the prevalence among young people, it can help a lot in reduction of HIV infections. It is one of the strategies being used,” he said.

The official added the exercise would be better supported if the state established a centre within the main hospital.

About the Authors:

Deng Ghai Deng, a Data Speaks Fellow at #defyhatenow South Sudan, wrote this data story, which was edited by 211 Check Editor Emmanuel Bida Thomas and approved for publication by Steve Topua, a Data Analyst and Trainer. It is part of the ongoing #defyhatenow South Sudan Data Speaks Fellowship program with funding from the European Union Delegation to South Sudan.

About South Sudan Data Speaks Fellowship: 

This is a three months data journalism fellowship for South Sudanese content creators with an aim of educating participants on the fundamentals of data journalism through in-depth training facilitated by experienced data analysts.

The fellows have been selected from across South Sudan and they are trained in data sourcing/mining, data analysis, and data visualisation for three months (October to December) 

Each fellow will produce a minimum of three (03) data stories during the fellowship. The focus will be on increasing access to information