The China Factor in Africa’s Pursuit of Digital Sovereignty

Main Article Content

Mandira Bagwandeen

Abstract




Digital sovereignty has emerged as a crucial issue in African countries seeking to reduce their dependence on foreign states, notably the US and Europe, for processing and storing data. Several African countries, such as Senegal and Zimbabwe, have actively formulated policies and reforms in pursuit of digital independence and have set up digital infrastructure, notably data centres, with assistance from Chinese telecom companies. Against the backdrop of the tech dispute between the US and China, this article argues that Chinese telecom companies play a significant role in shaping Africa’s digital landscape and influencing the make-up of the continent’s digital sovereignty through various infrastructure developments. However, amid (primarily Western) accusations that Beijing is using Chinese technology for cyber espionage and promoting digital authoritarianism, this article argues that Africa’s digital sovereignty and development interests must be prioritised, irrespective of the foreign entities that African countries engage with for digital development.




Article Details

How to Cite
Bagwandeen, M. (2023). The China Factor in Africa’s Pursuit of Digital Sovereignty. The Africa Governance Papers, 1(3). Retrieved from https://tagp.gga.org/index.php/system/article/view/41
Section
Research Articles
Author Biography

Mandira Bagwandeen

Dr Mandira Bagwandeen has experience working with think tanks, local and international corporate companies, and lecturing at universities in South Africa. She is a senior research fellow at the Nelson Mandela School of Public Governance at the University of Cape Town, where she focuses on Africa’s regional integration and industrialisation and Africa-China relations. Mandira has provided commentary for various local and international media outlets and written several academic and opinion articles on Africa-China issues. Her latest article on African agency, Covid-19 and debt renegotiations with China was published in the South African Journal of International Affairs. Her most recent op-ed, The fourth scramble for Africa – an opportunity for Africans to dictate the rules of the game – was published by Daily Maverick. Bagwandeen’s first co-edited book, titled Africa’s Railway Renaissance: The Role and Impact of China, will be out in June 2023.

References

Abimbola, O., Aggad, F., & Ndzendze, B. (2021). What is Africa’s Digital Agenda? African Policy Research Institute. https://afripoli.org/uploads/publications/ Africas_Digital_Agenda_final.pdf

African Union. (2020). The Digital Transformation Strategy for Africa (2020- 2030). https://au.int/sites/default/files/documents/38507-doc-dts-english.pdf

Agbebi, M. (2022). China’s Digital Silk Road and Africa’s Technological Future. Council on Foreign Relations. https://www.cfr.org/sites/default/files/pdf/ Chinas%20Digital%20Silk%20Road%20and%20Africas%20Technological%20 Future_FINAL.pdf

Bagwandeen, M. (2021b, October 14). Of the ties that bind: China’s party diplomacy in Africa. Wits Centre for Journalism: Africa-China Reporting Project. https:// africachinareporting.com/of-the-ties-that-bind-chinas-party-diplomacy-in-africa/

Bagwandeen, M. (2022). China Expands Its Digital Sovereignty to Africa. Africa in Fact. 62. Good Governance Africa. https://gga.org/china-expands-its-digital- sovereignty-to-africa/

Bagwandeen. (2021a, September 09). Don’t blame China for the rise of digital authoritarianism in Africa. London School of Economics and Political Science. https://blogs.lse.ac.uk/africaatlse/2021/09/09/dont-blame-china-for-rise-of- digital-authoritarianism-africa-surveillance-capitalism/

Barlow, J. P. (1996, February 08). A declaration of the independence of Cyberspace. Electronic Frontier Foundation. https://www.eff.org/cyberspace-independence

Barney, N. & Wigmore, I. (2022). Definition: Surveillance Capitalism. Tech Target. https://www.techtarget.com/whatis/definition/surveillance-capitalism

Bartz, D. & Alper, A. (2022, December 01). U.S. bans new Huawei, ZTE equipment sales, citing national security risk. Reuters. https://www.reuters.com/business/ media-telecom/us-fcc-bans-equipment-sales-imports-zte-huawei-over- national-security-risk-2022-11-25/

Bateman, J. (2022). U.S.-China technological “decoupling”: A strategy and policy framework. Carnegie Endowment for International Peace. https:// carnegieendowment.org/files/Bateman_US-China_Decoupling_final.pdf

Beacon, R. (2021, June 10). What is the state of debate on digital democracy? Tony Blair Institute for Global Change. https://www.institute.global/insights/tech- and-digitalisation/what-state-debate-digital-democracy

Bernot, A. (2021, September 22). Digital authoritarianism is not just a China problem. The Low Institute: The Interpreter. https://www.lowyinstitute.org/ the-interpreter/digital-authoritarianism-not-just-china-problem

Botelho, B. & Bigelow, S.J. (2022). Big Data. Tech Target. https://www.techtarget. com/searchdatamanagement/definition/big-data

Chal, K., & Okubadejo,F. (2020, October 20). Africa’s digital revolution needs data centres. ACTIS. https://www.act.is/the-street-view/article/africas-digital- revolution-needs-data-centres/

Chander, A., & Sun, H. (2021). Sovereignty 2.0. Georgetown University Law Center. https://scholarship.law.georgetown.edu/cgi/viewcontent. cgi?article=3422&context=facpub

Chen, Q. (2022, May 17). Why does China want to build a national data center system by 2025? Technode. https://technode.com/2022/05/17/why-does- china-want-to-build-a-national-data-center-system-by-2025/

Chenou, J.-M. (2014). From cyber-libertarianism to neoliberalism: Internet exceptionalism, multistakeholderism, and the institutionalisation of internet governance in the 1990s. Globalizations, 11(2), 205–223. https://doi.org/10.10 80/14747731.2014.887387

China.org.cn. (2017, July 03). International Strategy of Cooperation on Cyberspace. http://www.china.org.cn/chinese/2017-03/07/content_40424606_2.htm

Cissé, D. (2022). Chinese Telecommunications Companies in Africa. Alignment with African Countries’ Interests in Developing their ICT Sector. Megatrends Afrika, Policy Brief 7. doi:10.18449/2022MTA-PB07

Computer Security Resource Centre (CSR). (n.d). Cyber Attack – Glossary. https://csrc.nist.gov/glossary/term/Cyber_Attack

Couture, S., & Toupin, S. (2019). What does the notion of “sovereignty” mean when referring to the digital? New Media & Society, 21(10), 2305–2322. https:// doi.org/10.1177/1461444819865984

Curtis, M. & Kennard, M. (2019, September 20). Exporting repression: How Britain is supplying surveillance technology to human-rights abusing countries. Global Justice Now. https://www.globaljustice.org.uk/resource/exporting-repression- how-britain-supplying-surveillance-technology-human-rights-abusing/

Dahir, A.L. (2018, January 30). China “gifted” the African Union a headquarters building and then allegedly bugged it for state secrets. Quartz. https://qz.com/ africa/1192493/china-spied-on-african-union-headquarters-for-five-years

Daigle, B. (2021). Data Protection Laws in Africa: A Pan-African Survey and Noted Trends. United States International Trade Commission: Journal of International Commerce and Economics. https://www.usitc.gov/publications/332/journals/ jice_africa_data_protection_laws.pdf

Dawn-Hiscox.T. (2017, March 24). Zimbabwe launches two data centers in partnership with Huawei. Data Center Dynamics. https://www. datacenterdynamics.com/en/news/zimbabwe-launches-two-data-centers-in- partnership-with-huawei/

Erie, M. S. & Streinz, T. (2021). The Beijing Effect: China’s Digital Silk Road as Transnational Data Governance. New York University: Journal of Law and Politics, 54(1), 1-92.

Feldstein, S. (2020, February 12). When it comes to digital authoritarianism, China is a challenge – but not the only challenge. War on the Rocks. https:// warontherocks.com/2020/02/when-it-comes-to-digital-authoritarianism- china-is-a-challenge-but-not-the-only-challenge/

Floridi, L. (2020). The fight for digital sovereignty: What it is, and why it matters, especially for the EU. Philosophy And Technology, 33(3), 369–378. https://doi. org/10.1007/s13347-020-00423-6

Follorou, J. (2022, March 14). Britain has spent years spying on Israel’s leaders. Le Monde. https://www.lemonde.fr/en/archives/article/2022/03/14/britain-has- spent-years-spying-on-israel-s-leaders_5978487_113.html

Fouquet, H. & Patel,T.(2021, March 01). France’s Huawei Ban Begins to Kick in With Purge in Urban Areas. Bloomberg. https://www.bloomberg.com/news/ articles/2021-03-01/france-s-huawei-ban-begins-to-kick-in-with-purge-in- urban-areas?leadSource=uverify%20wall

Gady, F.-S. (2016, January 14). The Wuzhen Summit and the battle over internet governance. The Diplomat. https://thediplomat.com/2016/01/the-wuzhen- summit-and-the-battle-over-internet-governance/

Gagliardone, I. (2021, May 24). Be Wary of All Those “Hyperbolic” Reports Warning of the Dangers of Chinese Technology. China Global South Project. https://chinaglobalsouth.com/2021/05/24/be-wary-of-all-those-hyperbolic- reports-warning-of-the-dangers-of-chinese-technology/

Gillis, A. S.(2023a). What is Cyber Espionage? How to Protect Against It. Tech Target. https://www.techtarget.com/searchsecurity/definition/cyber-espionage

Gillis, A. S., Bush, K., & Teravainen, T. (2021). Definition: Spyware. Tech Target. https://www.techtarget.com/searchsecurity/definition/spyware

Gillis, A.S., Shea, S., & Clark, C. (2023b). What is cybersecurity? Tech Target. https://www.techtarget.com/searchsecurity/definition/cyber-espionage

Gopaldas, R. (2022, April 3). Data sovereignty is key. Good Governance Africa. https://gga.org/data-sovereignty-is-key/

Gopani, A.(2021, December 16). Questioning The Future of Africa’s Digital Sovereignty, Powered By China. Analytics India Mag. https://analyticsindiamag. com/questioning-the-future-of-africas-digital-sovereignty-powered-by-china/

Govender, M. (2021, July 18). The West looks on as Africa opts for China’s Digital Silk Road programme. Business Day. https://www.businesslive.co.za/bd/ opinion/2021-07- 18-the-west-looks-on-as-africa-opts-for-chinas-digital-silk- road-programme/

Government of South Africa: Department of Communications and Digital Technologies. (2021). Draft National Policy on Data and Cloud. https://www. gov.za/sites/default/files/gcis_document/202104/44389gon206.pdf

Gravett, W. (2020). Digital neo-colonialism: The Chinese model of internet sovereignty in Africa. African Human Rights Law Journal. 20 (1), 125–146.

Hartman, L. (2020, December 17). Expanded Clean Network Initiative Safeguards Data. U.S. Embassy in Georgia. https://ge.usembassy.gov/expanded-clean- network-initiative-safeguards-data/

Hiscock, R. (2022, March 30). Explainer: Data Localization and the Benefit to Your Business. Onetrust. https://www.onetrust.com/blog/explainer-data- localization-and-the-benefit-to-your-business/

Hofmann, J. (2016). Multi-stakeholderism in Internet governance: Putting a fiction into practice. Journal of Cyber Policy, 1(1), 29–49. https://doi.org/10.108 0/23738871.2016.1158303

Hofmeyer, J. Wolf, N., & Cloete, D. (2022). SADC Futures of Digital Geopolitics: Towards African Digital Sovereignty. (South African Institute of International Affairs, Occasional Paper 337).

Hruby, A. (2021, April 8). The digital infrastructure imperative in African markets. Atlantic Council. https://www.atlanticcouncil.org/blogs/africasource/the- digital-infrastructure-imperative-in-african-markets/

Internet Society. (2016). Internet Governance: Why the Multistakeholder Approach Works. https://www.internetsociety.org/wp-content/uploads/2016/04/IG- MultiStakeholderApproach.pdf

Internet Society. (2022). Navigating Digital Sovereignty And Its Impact On The Internet. https://www.internetsociety.org/wp-content/uploads/2022/11/Digital- Sovereignty.pdf

Irfan, M. (2019). Data Flows, Data Localisation, Source Code: Issues, Regulations and Trade Agreements. CUTS International. Geneva.

Jin, H., Ibrahim, S., Bell, T., Qi, L., Cao, H., Wu, S., & Shi, X. (2010). Tools and Technologies for Building Clouds. In: Antonopoulos, N., Gillam, L. (Eds) Cloud Computing. Computer Communications and Networks. Springer, London.

Jun, L. (2022). Eastern Data and Western Computing: Building New Computing- first Networks. (Huawei Tech Issue 2). https://www.huawei.com/en/ huaweitech/publication/202202/eastern-data-western-computing-network

Kathure, M. (2021). Africa’s digital sovereignty: Elusive or a stark possibility through the AFCFTA? Afronomicslaw. https://www.afronomicslaw.org/ category/analysis/africas-digital-sovereignty-elusive-or-stark-possibility- through-afcfta

Kijirah, M. & Thuo, E.W. (2021). Data Protection and Data Localisation in Kenya: Potential Economic Impact and Effect on Kenya’s Commitments in Various Regional Treaty Frameworks. Policy Brief 3. University of the Witwatersrand, Mandela Institute. https://www.wits.ac.za/media/wits-university/faculties- and-schools/commerce-law-and-management/research-entities/mandela- institute/documents/research-publications/800419%20PB3%20Data%20 Protection%20and%20Localisation%20in%20Kenya_REV%20Dec2021.pdf

Klein, H. (2002). ICANN and Internet Governance: Leveraging Technical Coordination to Realize Global Public Policy. The Information Society, 18(3), 193–207. https://doi.org/10.1080/01972240290 074959

Kwet, M. (2019). Digital colonialism: US empire and the new imperialism in the Global South. Race & Class, 60 (4), 3–26. https://doi. org/10.1177/0306396818823172

Laskai, L. (2017). Nailing Jello To A Wall. In Golley, J., Javin, L., & Tomba, L. (Eds), China’s Story Yearbook 2016: Control. ANU Press.

Lima, J.M. (2021, December 20). Huawei lines up for Africa data center expansion. The Tech Capital. https://thetechcapital.com/huawei-lines-up-for-africa-data- center-expansion/

Mackinnon, A. (2019, March 19). For Africa, Chinese-Built Internet Is Better Than No Internet At All. Foreign Policy. https://foreignpolicy.com/2019/03/19/for- africa-chinese-built-internet-is-better-than-no-internet-at-all/

Martin, C. (2021). Geo-Politics and Digital Sovereignty. In Werthner, H., Prem, E., Edward, A.L., & Ghezzi, C. (Eds), Perspectives on Digital Humanism. Springer. https://link.springer.com/chapter/10.1007/978-3-030-86144-5_30

Monyae, D. (2021, September 28). Africa’s Digital Sovereignty A Timely And Relevant Debate. The University of Johannesburg. https://www.uj.ac.za/news/ africas-digital-sovereignty-a-timely-and-relevant-debate/

Moss, S. (2022, February 21). China plans four more data center mega clusters, could lead to tens of billions in investment. Data Center Dynamics. https:// www.datacenterdynamics.com/en/news/china-plans-four-more-data-center- mega-clusters-could-lead-to-tens-of-billions-in-investment/

Mueller, M. L. (2020). Against sovereignty in cyberspace. International Studies Review, 22(4), 779–801. https://doi.org/10.1093/isr/viz044

Nyabiage, J. (2021a, December 26). China promotes ‘digital silk road’ as solution to Africa’s data needs. South China Morning Post. https://www.scmp.com/news/ china/diplomacy/article/3160525/china-promotes-digital-silk-road-solution- africas-data-needs

Nyabiage, J. (2021b, June 28). African nations continue to put trust in Huawei for data management. South China Morning Post. https://www.scmp.com/ news/china/diplomacy/article/3138917/african-nations-continue-put-trust- huawei-data-management

Olander, E. (2021, June 21). Senegal builds national data centre in partnership with Huwaei. The Africa Report. https://www.theafricareport.com/101896/ senegal-builds-national-data-centre-in-partnership-with-huwaei/

Park, C. (2022, March). Knowledge Base: China’s ‘Global Data Security Initiative 全球数据安全倡. Stanford University: DigiChina. https://digichina.stanford. edu/work/knowledge-base-chinas-global-data-security-initiative/

Parkinson, J., Bariyo, N., & Chin, J. (2019, August 15). Huawei technicians helped African governments spy on political opponents. The Wall Street Journal. https:// www.wsj.com/articles/huawei-technicians-helped-african-governments-spy- on-political-opponents-11565793017

Pohle, J., & Thiel, T. (2020). Digital Sovereignty. Internet Policy Review: Journal on Internet Regulation, 9 (4): 2–19. https://doi.org/10.14763/2020.4.1532

Raymond, M., & DeNardis, L. (2015). Multistakeholderism: Anatomy of an inchoate global institution. International Theory, 7(3), 572–616. https://doi. org/10.1017/S1752971915000081

Republic of Rwanda: Ministry of Youth and ICT.(2017). National Data Revolution Policy. https://statistics.gov.rw/publication/rwanda-national-data-revolution- and-big-data

Reuters. (2022, October 13). UK extends deadline to remove Huawei equipment from 5G network core. https://www.reuters.com/business/media-telecom/uk- extends-deadline-remove-huawei-equipment-5g-network-core-2022-10-13/

Ross, A., Pearson, J., & Bing, C. (2023, May 24). Exclusive: Chinese hackers attacked Kenyan government as debt strains grew. https://www.reuters.com/world/ africa/chinese-hackers-attacked-kenyan-government-debt-strains-grew-2023- 05-24/#:~:text=A%20Reuters%20review%20of%20internet,2022%20until%20 February%20this%20year.

Runde, D.F. & Ramanujam, R. (2021, October 1). Global Digital Governance: Here’s What You Need to Know. Center for Strategic and International Studies (CSIS). https://www.csis.org/analysis/global-digital-governance-heres-what-you-need- know#:~:text=A1%3A%20Digital%20and%20internet%20technologies,and%20 use%20of%20these%20technologies.

Satter, R. (2020, December 16). Exclusive-Suspected Chinese hackers stole camera footage from African Union – memo. Reuters. https://www.reuters.com/ article/us-ethiopia-african-union-cyber-exclusiv-idINKBN28Q1DB

Smit, S.(2022, March 28). Government data must stay in South Africa, says state technology executive. Mail & Guardian. https://mg.co.za/news/2022-03-28- government-data-must-stay-in-south-africa-says-state-technology-executive/

Solomon, S. (2021, January 05). Experts: Report of China Hacking African Union HQ Fits Larger Pattern. Voice of America. https://www.voanews.com/a/east- asia-pacific_voa-news-china_experts-report-china-hacking-african-union-hq- fits-larger-pattern/6200356.html

Stewart, E. (2019, August 19). The US government’s battle with Chinese telecom giant Huawei, explained. Vox. https://www.vox.com/ technology/2018/12/11/18134440/huawei-executive-order-entity-list-china- trump

Swinhoe, D. (2021a, June 23). Senegal to migrate all government data and applications to new government data center. Data Center Dynamics. https://

www.datacenterdynamics.com/en/news/senegal-to-migrate-all-government- data-and-applications-to-new-government-data-center/

Swinhoe, D. (2021b, February 26). National Data Center in Zimbabwe opens. Data Center Dynamics. https://www.datacenterdynamics.com/en/news/national- data-center-zimbabwe-opens/

Sylla, A. (2023, February 24). Recent Developments in African Data Protection Laws – Outlook 2023. Hogan Lovells. https://www.engage.hoganlovells.com/ knowledgeservices/news/recent-developments-in-african-data-protection-laws- outlook-for-2023

Taylor, M. (2022). China’s Digital Authoritarianism: A Governance Perspective. Palgrave Macmillan: Cham, Switzerland

The White House. (2022). A Declaration for the Future of the Internet. https:// www.whitehouse.gov/wp-content/uploads/2022/04/Declaration-for-the- Future-for-the-Internet_Launch-Event-Signing-Version_FINAL.pdf

United Nations Office on Drugs and Crime (UNODC). (2020). Cybercrime in brief. https://www.unodc.org/e4j/en/cybercrime/module-1/key-issues/cybercrime- in-brief.html

van Staden, C. (2021a, March 8). China, Africa, and the Internet, Again. China Global South Project. https://chinaglobalsouth.com/analysis/china-africa-and- the-internet-again/

van Staden, C. (2021b, March 11). Chinese internet and African authoritarianism. The Africa Report. https://www.theafricareport.com/71396/chinese-internet- and-african-authoritarianism/

Velluet, Q., & Beaubois-Jude, A. (2021, November 30). Africa: Why data centres are crucial for the continent’s sovereignty. The Africa Report. https://www. theafricareport.com/148875/africa-why-data-centres-are-crucial-for-the- continents-sovereignty/

Walsh, P. (2022, June 24). We’re living through a digital privacy catastrophe: It’s past time for a serious nationwide privacy law. Forbes. https://www. forbes.com/sites/forbestechcouncil/2022/06/24/were-living-through-a- digital-privacy-catastrophe-its-past-time-for-a-serious-nationwide-privacy- law/?sh=320486412625

Wang, A. (2020). Chinese Cyber Sovereignty At Its Boldest: A Chinese Perspective. The Ohio State Technology Law Journal, 16(2), 396–466.

Wang, O. (2022, January 23). China must brace for ‘digital cold war’ with US as battle for tech supremacy heats up. South China Morning Post. https://www. scmp.com/economy/china-economy/article/3164367/china-must-brace- digital-cold-war-us-battle-tech-supremacy

Wood, S., Hoffmann, S., McFadden, M., Kaur, A., Sarongrat, W., Schoentgen, A., Forsyth, G., & Wilkinson, L. (2020, August). Digital Sovereignty: The Overlap and Conflict Between States, Enterprises and Citizens. Plum Consulting. https:// oxil.uk/publications/2021-01-20-plum-digital-sovereignty/Plum_Aug_2020_ Digital_Sovereignty_states_enterprise_citizens%20%281%29.pdf

Woods, A.K. (2018). Litigating Data Sovereignty. The Yale Law Journal, 128 (328), 332–405.

Yusuf, M. (2021, October 22). China’s Reach Into Africa’s Digital Sector Worries Experts. Voice of America. https://www.voanews.com/a/china-reach-into- africa-digital-sector-worries-experts/6281543.html

Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: Public Affairs.