Professional Documents
Culture Documents
Bulelani Jili1
Jesus College, Cambridge University
FUTUREID3: Identification in the Era of Automated Decision Making
Abstract
The paper reviews the recent development of the Chinese social credit system. It challenges
some of the easy, and now common, suppositions about the development of an Orwellian scoring
nightmare. It chiefly brings attention to the denial of privacy that has been prompted by public
and private surveillance mechanisms and the automation of censorship. The project highlights
and explores the relationship between China and African countries, like Ethiopia, that have
adopted its model of economic development and surveillance. The paper questions the centrality
of delegated, commercial systems of automated surveillance in China by large firms, moreover,
explores how that might unfold in the context of Ethiopia’s hybridized surveillance order. The
ICT systems resourced by Chinese firms and loans have become instruments for development in
places like Ethiopia, but also contested sites for competing political visions, which bear little
resemblance to the matrix of private and public interests in China. This outcome suggests that the
fundamental architecture of the social credit system is not exportable.
1
Bulelani Jili is an incoming Ph.D. student at Harvard University (U.S.). In 2018, he was a
Derek Cooper Scholar at Cambridge University (UK). From 2016 to 2017, he was a Yenching
Scholar at Peking University (CN). Under Prof. He Yafei, former Vice-Minister of the Ministry
of Foreign Affairs, and Prof. Jiang Guo Hua, he studied Chinese geopolitical and economic
strategies. Currently, he is working at WISER (Wits institute for Social and Economic Research
in South Africa) as a research associate. Bulelani holds a MPhil in African Politics from
Cambridge University, M.A. in Economics from Peking University, and a B.A., honors, in
Politics, Philosophy, and Economics from Wesleyan University (CT).
Conference Paper 1
Introduction
This paper investigates the advances of the Chinese social credit system. Elucidating on the
nature of the social credit system and China’s involvement in Ethiopia, it essays to comprehend
China’s growing surveillance apparatus and its ability to be exported. The article challenges
illusions to a scoring Orwellian nightmare; moreover, accents the real threats around privacy.
Namely, while the social credit is a part of China’s broader plan to create a surveillance state, it
is one part. China’s push for the ubiquitous installation of CCTV video cameras and biometric
data collection are clearly more serious threats to privacy — and remain overlooked in
mainstream discussions.
The case of Ethiopia, as a nation seeking development, is underscored for its novel
approaches to Information and Communications Technology (ICT) systems and its collaboration
with the Chinese state. Ethiopia is notorious for its low levels of internet penetration. Yet, with
the financial assistance of China, it has charted new avenues of ICT development and changed
the country’s modes of governance. That is to say, it has championed the use of ICT platforms as
emboldened the ambitions to create a surveillance state. The paper examines the centrality of
delegated, commercial systems of automated surveillance in China by large firms, like Alibaba,
and how that might function in the context of Ethiopia’s hybridized surveillance order. The work
lucidly challenges the assumed neutrality of technology and it illustrates how technical devices
Simply put, social credit is the Chinese Party State’s shorthand for its broad efforts to
advance reform in the market economy and security in the public arena. In 2014, China’s State
Council published an outline for establishing a social credit system by 2020. The concept of
2
Chinese Social Credit initiatives and African Surveillance States
social credit, shehui xinyong, (社会信用 体系) is not clearly defined in any official national
documents. But its primary motivations are predicated on legal and economic development.2
The system’s intended goals are to (1) improve fundamental laws, regulations, and standards for
credit, (2) engender sharing credit information platforms, (3) build credit service markets, and (4)
make joint incentives and punishment mechanisms as a means to ameliorate problems with
institutional discipline. Principally, the state frames the social credit system as a set of
apparatuses providing rewards and punishments grounded on lawfulness and morally inclined
At the same time, Western observers maintain that scoring in an Orwellian nightmare,
where a panopticon structure built on big data, conspires to realize the totalitarian impulses of the
Chinese party state. This objective may result, for the first time, in the capacity to monitor the
discretions of the state. Specifically, the data points will be made-up of purchases and publicly
expressed political opinions. In turn, this score will determine access to loans, travel options,
and critical public resources like education and health facilities3. The question is whether
trepidations are warranted? Yes, they are. However, the comparisons to an episode of Black
Mirror are misleading. Scoring is not the major conundrum. As I will show later, scoring done by
Sesame does not result in punishment. The critical matter is the social credit system’s capacities,
2
“Social Credit Articles.” China Law Translate ,16 October 2018,
https://www.chinalawtranslate.com/en/social-credit-articles/ (accessed 1 February 2019)
3
Josh Dehaas. “China’s social credit system uses technology to punish citizens.” The Loop, 19
December 2018, https://www.theloop.ca/ctvnews/chinas-social-credit-system-uses-technology-
to-punish-citizens/ (accessed 29 December 2018)
Conference Paper 3
I will attempt to corroborate this argument by examining media literature, identification
concerning social credit systems. In so doing, I hope to discern the development of the social
credit system in China. I investigate how Chinese firms’ engagement in Ethiopia broadens our
understanding of what ICT systems can be used for, and how China’s involvement enables
tyrannical surveillance. In light of what is said above, I am aware that this article privileges the
actions and perspectives of policy makers, and those who occupy positions of authority, rather
than the engagements of ordinary folk. Yet, I maintain that such an analytical agenda is worth
pursuing as it illustrates some of the paramount political and economic decisions, which shape
These early days in social credit initiatives and Chinese built ICT systems, in Africa,
make any rigorous diagnosis tricky. Far more evidence, and substantial data, is necessary to
understand the long-term implications for these new systems and their related technologies.
Suffice it to say that, this paper will attempt to take stock of our current circumstances and
While the scope and size of this project does not permit an exhaustive exploration into
Africa-China relations, it does offer a keen look into ICT systems. Focusing on China-Ethiopia
relations, it explores how Chinese investments have shaped the media space, local economies
and the unfolding of domestic politics. Secondly, the increasing focus on productive sectors in
fast growing economies in Africa suggests that there are opportunities for Chinese investors,
which can, and do, support the creation of jobs, markets, technology transfer, and needed
economic growth. Current strands of research from Bräutigam, Iginio, Borojo, and Alden are
4
Chinese Social Credit initiatives and African Surveillance States
exploring these potentialities, against the popular strain of discourse, and showing some of the
positive cooperative endeavors between Chinese actors and local firms in Tanzania, Ethiopia,
Rwanda, and Nigeria. Nevertheless, these benefits do not blossom without controversies and
constraints. Thus, assessing how and who benefits from China’s increased presence in the
African theater becomes paramount. It enables us to underscore the peculiarities that shape
relations.
To set the stage for my arguments about China’s initiatives, I first offer an analysis of the
social credit system, which illustrates its development over-time in China. It then moves on to an
analysis of the development of ICT systems in Ethiopia. The subsequent section investigates the
risks associated with the development of Chinese social credit systems and the exportation of
ICT technology in Africa, and particularly Ethiopia. This paper concludes with highlighting the
risks to privacy in China and Ethiopia because of weaker institutional capacities to safeguard
rights.
Social Credit
architecture into a market-based arrangement. However, the reorganization of banks has lagged
behind other reform movements. Chinese banks recently reformed risk management and internal
control mechanisms.4 Yet, even with these advances, such a strategy remains limited if there are
no structural mechanisms for sharing credit information. Zhang and Smyth, in “An Emerging
Credit-Reporting System in China”, illustrates this point. They maintain that if a borrower does
not repay a loan, and other banks are not aware of this, then the defaulting individual will
4
, Guibin Zhang and Russell Smyth, "An emerging credit-reporting system in China." Chinese
Economy 42.5 (2009): 41.
Conference Paper 5
successfully secure another loan.5 By learning and sharing information about customer’s
borrowing history, banks are able to lower the probability of defaulting clients. Thus, a credit
reporting system acts as a constraint on borrower’s behavior, reduces the likelihood of default,
and more broadly, meliorates the bank’s concerns with information asymmetry.
The literature on information asymmetry focuses on two key concepts: adverse selection
and moral hazard. Adverse selection occurs when lenders cannot distinguish between borrowers.
More specifically, a client’s ability to payback their loans. And so, the concern that clients can
be trusted to payback their loan is paramount. In other words, individuals either have good or bad
creditworthiness, and banks must be able to discern the likelihood that individuals will repay
their debts. In this context, a bank will offer terms, which are contingent on the average risk of
default.6 Needless to say, this is not fair because riskier borrowers are more likely to default,
thereby, raising the cost for lenders who are less likely to default. To solve this credit asymmetry
problem, lenders have developed credit-reporting systems. These institutions collect credit data
as means to learn about the borrower’s payment history and creditworthiness. By providing
credit information on individuals and businesses, credit-reporting bodies help those who issue
Relatedly, internet finance has developed rapidly, which helps manage financial risk. The
advent of big data and information technology helps banks accrue the necessary information to
circumvent the problems of information asymmetry. Huang, Lei, and Shen, echo these
sentiments: ‘the construction of credit reporting systems helps to alleviate adverse selection and
moral hazard caused by information asymmetry effectively controlling credit risk, which is the
5
Ibid., 41.
6
Guibin Zhang and Russell Smyth, "An emerging credit-reporting system in China." Chinese
Economy 42.5 (2009): 42.
6
Chinese Social Credit initiatives and African Surveillance States
most common form of financial risk.’7 Reports from the World Bank, and beyond, have further
demonstrated that a credit reporting system remarkably decreases default rates. And so, the
systems help enhance trust, and the confidence of investors in financial markets. Put differently,
in the language of game theory, the implementation of the credit rating system transforms the
interactions between lenders and borrows from a one-stage game into a multistage where the
The first high profile reference to a social credit system was by Secretary General Jiang
Zemin (江泽民) at the 16th Party Congress in 2002. The call to establish a social credit system
was a means to further the development of China’s nascent market economy.9 Trustworthiness,
yongxin, (永信) was identified as a critical means in supporting market transaction, and
deepening economic reform, which will foster economic growth. Specifically, the system was a
potential solution to the assumed absence of trustworthy behavior in the areas of intellectual
property, food control, and governance. I will elaborate on this last point later. But immediately,
though, two elements of the social credit system were distinct from its inception. Firstly, credit
referred to financial creditworthiness, which is similar to Fair Isaac Corporation (FICO) scores in
the United States. On the other hand, it also suggested a broader conception of trust in
The People’s Bank of China, and related bodies, took initial steps to establish regulatory
measures for financial credit reporting. Notedly, building on the “Bank Credit Registry and
7
Huang, Zhuo, Yang Lei, and Shihan Shen. “China’s personal credit reporting system in the
internet finance era: challenges and opportunities.” China Economic Journal 9.3 (2016): 289.
8
Ibid.,291.
9
“Report at the 16th National Congress of the Chinese Communist Party.” Chinese Communist
Party, 2002 http://www.china.org.cn/english/features/49007.htm (accessed 20 January 2019)
Conference Paper 7
Consulting System,” that was in place since 1997. The People’s bank in 2006 founded the
“Credit Reference Centre”, which was the only national credit-scoring bureau.10 Banks and other
creditworthiness is determined by their financial standing and their non-financial records. The
non-financial records are based on engagements with courts, government departments, and
reporting system, which garnered its information from commercial banks, but also supplemented
The first concrete policy and organizational measures to establish the social credit system
began in 2007. The State Council met in April to establish an interministerial joint conference
(IJC) for the formation of the social credit system. With most members in the meeting
representing economic interests. For example, the State Council General Office, People’s Bank
and Reform Commission.12 This meeting divulged the state’s desire to reform the market
architecture of the country. In other words, one of social credit’s goals was to nurture the
development of a private financial credit investigation and credit service industry, which would
provide credit products and applications. An accompanying State Council policy document
substantiates these claims. Firstly, it demanded the creation of an enhanced credit information
system, with a particular reference to tax compliance, product quality, and contract
10
Huang, Zhuo, Yang Lei, and Shihan Shen. “China’s personal credit reporting system in the
internet finance era: challenges and opportunities.” China Economic Journal 9.3 (2016): 288.
11
Rogier Creemers, “China’s Social Credit System: An Evolving Practice of Control.” SSRN
(2018): 9.
12
“Inter-Ministerial Joint Conference System for the Construction of the State Council's Social
Credit System.” State Council Bulletin, 2007,
http://www.gov.cn/gongbao/content/2007/content_632090.htm (accessed 1 February 2019)
8
Chinese Social Credit initiatives and African Surveillance States
implementation.13 Secondly, it pointed to the creation of a social credit system for the
commercial sector.14 Thirdly, the document mentions the development of a credit service market,
with government departments playing a leading role in ensuring transparency in collected data.15
Broadly, the social credit system enables the exchange and sharing of data, in order, to create a
network that governs information flows across the nation. The conference was framed around
developing the system’s configuration, researching and drafting policy measures, and overseeing
While the founding efforts to engineer a social credit system chiefly focused on market
economic interests, the nexus between credit and social management began in the local
government arena. In Yichang (宜昌), a prefectural-level city of Hubei (湖北) province, this
undertaking resulted in the creation of a designation known as ‘credit community.’ This title was
bestowed on localities with good credit environments. The best reported example; however, is in
the county of Suining (睢宁), in Jiangsu (江苏) province. In 2010, Suining introduced a mass
conduct.16 County members were given 1000 credit points to start with. Points were added or
norms occasioned a deduction in points. For instance, drunk driving cost 50 points, false
13
“State Council General Office Some Opinions concerning the Construction of a Social
Credit System.” China Copyright and Media, 2007
https://chinacopyrightandmedia.wordpress.com/2007/03/23/state-council-general-office-some-
opinions-concerning-the-construction-of-a-social-credit-system/ (accessed 24 January 2019)
14
Ibid.
15
Ibid.
16
Rogier Creemers, “China’s Social Credit System: An Evolving Practice of Control.” SSRN
(2018): 10.
Conference Paper 9
accusations and slander cost 100 points, and a failure to repay a loan cost 30 to 50 points.17
Nonetheless, points could be recovered after two to five years. On the basis of their scores,
citizens were classified from letters A to D.18 A-class citizens were awarded privileges like job
opportunities. While D-class citizens were deprived of resources and government sponsored
opportunities. The Suining government created a public record of the points system, and notedly
The Suining project was eventually abandoned. Criticism from state media, namely the
Global Times, which focuses on international and domestic politics from the Chinese
government’s viewpoint, argued that the task of the national credit system is not to control
people in this fashion.19 Liu Zhun, a journalist at Global Times, highlighted that the experiment
was met with a public backlash, and had to be immediately revised. In their words, ‘this policy
failure should serve as a lesson for the upcoming national credit system. The range of the system
must be meticulously restricted, and it should only stay effective in people’s economic life and
part of their social life where laws and principles are clearly defined and widely recognized.’20
They later argue, ‘these doubts and worries can serve as warnings to the Chinese authorities
when they specify the system.’21 The Suining experiment is an example of the failure of local
leadership, and principally the disjunction between local and national bureaucratic ambitions.
The move to establish the social credit system is a means to improve the control of governing
mechanisms, including the quality of data gathering and sharing between governmental bodies
17
Chen Zhao, “Suining County Public Credit Information Evaluation Rules,” 20 May 2011,
https://wenku.baidu.com/view/25db9520192e45361066f5fa.html (accessed 12 January 2019)
18
Ibid.
19
Liu Zhun, “China’s social credit system won’t be Orwellian” Global Times, 1 November 2016,
http://www.globaltimes.cn/content/1015248.shtml (accessed 3 January 2019)
20
Ibid.
21
Ibid.
10
Chinese Social Credit initiatives and African Surveillance States
across levels and regions. Accordingly, making the elimination of corruption and the
implementation of policy more possible and efficacious. Regardless, even with its termination,
the Suining model contained the nascent forms of organization, which inform later social credit
initiatives. Specifically, notions of identification and blacklisting, which become means for
social management.
Chinese leadership instigated a strategy towards fighting declension. The 6th Plenum of
the 17th Party Congress, in 2011, focused on cultural and ideological concerns. The Plenum
called for the invention of a social credit system, which promotes trust in society as a catalyst to
foster good governance.22 This policy position, lucidly illustrates how trust is not only an
ameliorant in the marketplace, but a mechanism to transform the instruments of governance and
Conference changed in order to reflect this shift. It expanded to include: Central Political and
Legal Affairs Committee (which oversees domestic security and safety); the Central Propaganda
Department, the Central Discipline Inspection Committee (the internal anti-corruption unit), and
the Central Leading Group for the Construction of a Spiritual Civilization.23 With all these
political organs together, the IJC began drafting a broader social credit system, which
22
“Central Committee of the Chinese Communist Party Decision Concerning Deepening
Cultural Structural Reform.” China Copyright and Media, 2014,
https://chinacopyrightandmedia.wordpress.com/2011/10/18/central-committee-of-the-chinese-
communist-party-decision-concerning-deepening-cultural-structural-reform/ (accessed 12
January 2019)
23
“Institutional membership list of the Interministerial Joint Conference for the Construction of
the Social Credit System (2012).” Peking University Legal Information Network, 2012,
http://www.pkulaw.cn/fulltext_form.aspx?db=chl&gid=179820 (accessed 10 February 2019)
Conference Paper 11
Elaborating on the above arguments, the social credit system is a response to the
supposed moral dilemma in Chinese politics. The ubiquitous use of social media reveals the
public outcry and anger towards systemic corruption.24 The incessant scandals, particularly in the
local administrative level, intimated a weakening central government. For instance, Chen Xu (陈
旭), Prosecutor General of Shanghai, was sentenced to life in prison for accepting bribes worth
more than 74.2 million yuan (US$10.7 million) personally or through family members between
2000 and 2015.25 In addition, food security scandals such as the discovery of melamine in infant
milk formula, diluted trust in leadership.26 After taking office on the 15 November 2012, in his
first speech to the Politburo, Xi Jinping (习近平)warned that failing to act against corruption
would be the doom of the Chinese state and the party.27 The social credit system promotes the
creation of public constraints and punishment. Specifically, creating records of illegal and wrong
behavior and excluding those individuals and suppliers for a period of time. The system chiefly
aims to better check behavior, revitalize the party’s public image, and drives parts of Xi
24
Keith Bradsher, “China’s Anticorruption Commission Investigates Senior Official” New York
Times, 5 December 2012, https://www.nytimes.com/2012/12/06/world/asia/early-target-of-
chinas-anti-corruption-commission-identified.html?mtrref=en.wikipedia.org (accessed 30
December 2018)
25
“Shanghai’s jailed top prosecutor ‘implicates 100 other officials in corruption case’” South
China Morning Post, 12 November 2018,
https://www.scmp.com/news/china/politics/article/2172762/shanghais-jailed-top-prosecutor-
implicates-100-other-officials (accessed 18 January 2019)
26
“China passes food safety law after melamine scandal” CTV News, 1 March 2009,
https://www.ctvnews.ca/china-passes-food-safety-law-after-melamine-scandal-1.374919
(accessed 21 December 2018)
27
Keith Bradsher, “China’s Anticorruption Commission Investigates Senior Official” New York
Times, 5 December 2012, https://www.nytimes.com/2012/12/06/world/asia/early-target-of-
chinas-anti-corruption-commission-identified.html?mtrref=en.wikipedia.org (accessed 30
December 2018)
12
Chinese Social Credit initiatives and African Surveillance States
The 2014 “Planning Outline for the Construction of a Social Credit System” is the
official document on current social credit initiatives. Building on local ventures across the
country, the plan underscores the economic motivations for a credit system and the far-reaching
aims to enhance trust and governance through such an invention. Namely, it outlined a 2020 plan
to build an incentive and punishment apparatus, legal and regulatory constraints on the credit
system, credit oversight bodies, and further reform within the credit economy.28 These efforts
should enhance the efficiency of bureaucratic processes and trust in financial markets, healthcare
providers and the food industry. Relatedly — echoing Xi’s ambitions — the social credit system
should help promote lawful governance; furthermore, amplify trust in local and national
leadership.
To achieve these reforms in the market and society, the planning outline highlighted four
basic tactics. Firstly, the social credit system should aggregate and integrate information within
and across geographic regions and professional fields in China.29 Secondly, mechanisms like
blacklisting are to be built in order to incentivize trustworthy behavior and to punish dishonest
conduct.30 Thirdly, greater use of credit evaluation platforms must be encouraged in the realms
of employment and financial transactions.31 Lastly, all the strategies named above must work
towards fostering greater trust in the country.32 These basic strategies reveal that this system is
28
“Planning Outline for the Construction of a Social Credit System 2014-2020” China Copyright
and Media, 2014, https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-
for-the-construction-of-a-social-credit-system-2014-2020/ (accessed 20 January 2019)
29
“Establishment of a Social Credit System.” China Law Translate, 2015,
https://www.chinalawtranslate.com/en/socialcreditsystem/ (accessed 3 February 2019)
30
Ibid.
31
Ibid.
32
Ibid.
Conference Paper 13
more than just a policy position, and more like an ideology of data, and how it will be
instrumentalized to govern.
The realization that credit systems can be used for social management overlapped with
the rapid advancement in identification and surveillance technology. The decision to take on this
new frontier was obviously motivated by the worry of chaotic governing processes and
corruption within the party. Xi at the third plenary session of the 19th Central Commission for
Discipline Inspection said: ‘efforts should be made to make sure officials don't dare to, are
unable to and have no desire to commit corruption, to improve Party and state oversight systems,
and to ensure the spirit of the 19th CPC National Congress and major decisions of the CPC
Central Committee are resolutely implemented, so as to greet the 70th anniversary of the
founding of the People's Republic of China (PRC) with great achievements.’33 These ambitions
drive the establishing of cross-region and cross-departmental systems for rewards and
punishments. Through information sharing and joint incentive and discipline mechanisms, make
it so that poor behavior is dissuaded but good behavior rewarded. By utilizing technology to
police behavior, officials and judges are able to punish offenders and place them on blacklist
platforms like “Credit China.”34 By 2013, the first place in which this machinery was put in place
was the “untrustworthy persons subject to enforcement”, shixin bei zhixing, (失信被执行人名
judgements. Consequently, compelling state departments across the country to engineer their
33
Bianji Hongyu,“Xi calls for ‘greater strategic achievements’ in Party governance”
Xinhua,2019, http://en.people.cn/n3/2019/0112/c90000-9537115.html (accessed 10 February
2019)
34
“Blacklist of untrustworthy” Credit China, 2019,
https://www.creditchina.gov.cn/xinyongfuwu/shixinheimingdan/ (accessed 5 January 2019)
14
Chinese Social Credit initiatives and African Surveillance States
provinces like Tibet and Xinjiang. I will discuss, the case of Xinjiang later. Immediately, though,
surveillance technology has been implemented in urban areas like Chongqing (重庆), Beijing (北
京), and Shanghai (上海). Grid management techniques, which couple communication and
information technologies with on the ground policing are installed across the country’s cities.35
For example, the mass surveillance network in Yizhuang (亦庄) named Xueliang (雪亮) or
Sharp Eyes was built in October 2017. The network connects security cameras around the city,
and additionally, integrates them into a single data-sharing platform.36 Xuanzun Liu, in a Global
Times article, reports that the Sharp Eyes project is extending Yizhuang’s surveillance network.37
Headed by the Central Political and Legal Affairs Commission of the Communist Party, the
Sharp Eyes project has installed 2243 high-definition security cameras, 277 vehicle recognition
cameras and 267 facial recognition cameras in an 18.18 square kilometer town.38 The aims of
these technologies are to enforce acquiescence to legal demands and to prevent destabilizing
risks.39 These ambitions underscore the state’s desire to harness big data and artificial
intelligence for the means of social management. This example pointedly illustrates how the
social credit system is an element in a growing ecology of surveillance, which bolsters the state’s
surveillance ambitions.
35
Qiang Wu, “Urban Grid Management and Police State in China: A Brief Overview” China Change, 12
August 2014, https://chinachange.org/2013/08/08/the-urban-grid-management-and-police-state-in-china-a-brief-
overview/ (accessed 20 December 2018)
36
Xuanzun Liu, “Ubiquitous surveillance cameras in a Beijing district reduce crimes by nearly
40%” Global Times, 1 August 2018, http://www.globaltimes.cn/content/1113386.shtml
(accessed 10 January 2019)
37
Ibid.
38
Ibid.
39
Ibid.
Conference Paper 15
The implementation of the social credit system is deeply dependent on the fundamental
standardized means to record and share information in different departments of government. This
is to say that databases store information at the local and central levels of government, and the
devices enable the sharing of data within state bodies, but also with the public.40 For instance, in
2015, the National Development and Reform Commission (NDRC) and the State Information
Centre jointly inaugurated the “Credit China” platform, designed in cooperation with Baidu, in
order, to provide accessible credit information from national and local government
and encourages horizonal and vertical information sharing. The credit reporting systems support
a structure of rewards and punishment predicated on the means of blacklisting. Needless to say,
for these technologies to take effect, they require the capacity to accurately identify citizens and
The system must be able to uniformly identify citizens and store their identities in a
filling system, which assigns a unique marker. In 2004, a new generation identity card was
disseminated in China. It contained an 18-digit code, which holds the date of birth and the
issuing of the local authority.42 In 2013, when the social credit system introduced the punishment
and rewards scheme, it coupled it to the 18-digit code.43 The unique identifiers linked with legal
names enables the state to connect individuals and businesses to specific actions. These data
40
Establishment of a Social Credit System.” China Law Translate, 2015,
https://www.chinalawtranslate.com/en/socialcreditsystem/ (accessed 3 February 2019)
41
Rogier Creemers, “China’s Social Credit System: An Evolving Practice of Control.” SSRN
(2018): 21.
42
Ibid., 20.
43
Ibid., 20.
16
Chinese Social Credit initiatives and African Surveillance States
points are usually financially related or administrative facts. However, with the advent of facial
recognition cameras, for example, they are now able to accrue biometric information.
progressively come with the capacity to collect and store data, but also the computational
faculties to process and analyze data to generate actionable insights. The most notable case of
this is the correlational big data analysis, which is able to sort individuals on the basis of
probabilistic computations.44 Large sample sizes come with unique computational and statistical
of data for social management purposes. The little that is done is focused on financial credit
scoring. The available state documents maintain that scores are mostly shaped by citizens’
purchasing histories.
Chinese private tech enterprises have also created their own social credit platforms. With
the aid of the Peoples’ Bank of China, this initiative fostered the development of personal credit
rating systems similar to the FICO scoring system in the U.S. By 2015, the bank selected eight
companies to begin developing credit reporting platforms. Most were eventually abandoned, but
the best-known outcome of this endeavor is the Sesame Credit system (also known as Zhima
Credit), which was developed by the Ant Financial Group, a corporation that is a subsidiary of
Alibaba. The service generates scores between 350 and 950 points, and the score is determined
by five key factors (1) credit history, (2) behavioral trends, which refers to when and how
44
Rogier Creemers, “China’s Social Credit System: An Evolving Practice of Control.” SSRN
(2018): 22.
45
Fan Jianging, Fang Han, Han Liu, “Challenges of Big Data analysis.” National Science Review
1.2 (2014): 293.
Conference Paper 17
accounts are settled, (3) stable revenue and personal assets, (4) personal information that is
verifiable, (5) and social relations, which refers to your interactions with your friends on the
platform.46 To be clear, little is known on exactly what actions, and to what extent they will
change your score. The lack of transparency in this regard raises concerns. Especially, among
Western audiences that assume that ambiguity signifies Orwellian social management.
As stated above, customers’ scores are based on their use of the affiliated services.
Zhima’s current operations can be better understood as loyalty reward programs. High credit
scores receive awards like deposit waivers. Enrollment is voluntary and there are no
The eight pilot companies, including Zhima, in a move to get the People’s Bank of China
licensure, created a database of online non-bank lending information. And so, in May 2018,
Baihang Credit was established. It was the first licensed credit scoring firm in China. It was
created by the China Internet Finance Association and the eight commercial enterprises, marking
a joint endeavor by private and public entities. This endeavor produced a unified personal credit
investigation and services system.48 The venture received accreditation to do business in personal
credit information services. Baihang is able to stockpile stupendous amounts of personal data
from the eight financial and non-financial contributors.49 The information is stored in a unified
46
Tianxia Li, “Internet Finance and Big Data Risk Management.” Zhihu, 4 January 2017,
https://zhuanlan.zhihu.com/p/24712959 (accessed 25 January 2019)
47
Jeremy Duam, “Chinathrough a glass, darkly” China Law Translate, 27 December 2017,
https://www.chinalawtranslate.com/en/seeing-chinese-social-credit-through-a-glass-darkly/
(accessed 1 February 2019)
48
Duoguang Bei, Growing with Pain. Beijing: Chinese Academy of Financial Inclusion, 2018,
78.
49
Ibid.,79
18
Chinese Social Credit initiatives and African Surveillance States
platform, which functions as a supplement to the People’s Bank of China credit reference
system.
The notion of private enterprises working in conjunction with the Chinese state to enforce
social norms through credit reporting is contentious. The degree that Alipay and WeChat work in
concert with leadership to shape norms is an open question, which requires further research. Yet,
it is clear that there are forms of collaboration. Hu Tao, the general manager of Sesame Credit,
maintained that ‘Zhima Credit is dedicated to creating trust in a commercial setting and
independent of any government-initiated social credit system.’50 He later argues, ‘Zhima Credit
does not share user scores or underlying data with any third party including the government
without the user’s prior consent.’51 This is obviously not true. In 2015, Ant Financial helped the
government establish a blacklist platform, which holds over 6 million peoples data. Such
information flows should not suggest that Sesame’s scoring is linked with the lists’ penalties. As
Jeremy Duam makes clear: ‘Sesame Credit incorporates this publicly available court blacklist
into its scoring process, but to link the lists’ penalties in any way to Sesame Credit, as some have
done, doesn’t make much sense. A credit company’s consideration of delinquent child support
payments in their calculations doesn’t make them responsible for the wage garnishing that might
accompany it.’52 I should note that the application of credit systems to influence behavior has
historical precedence. Early forms of credit reporting systems in the United States, explicitly
50
Mara Hvistendahl, “Inside China’s Vast New Experiment in Social Ranking.” Wired, 14
December 2017, https://www.wired.com/story/age-of-social-credit/ (accessed 24 January 2019)
51
Tao Hu, “Zhima Credit does not share user scores or data.” Financial Times, 15 November
2017, https://www.ft.com/content/ec4a2a46-c577-11e7-a1d2-6786f39ef675 (accessed 28
December 2018)
52
Jeremy Duam, “Chinathrough a glass, darkly” China Law Translate, 27 December 2017,
https://www.chinalawtranslate.com/en/seeing-chinese-social-credit-through-a-glass-darkly/
(accessed 1 February 2019)
Conference Paper 19
expressed the goal to discipline citizens. Creditors would inquire about race, gender, and
marriage status. It was only until the Fair Credit Reporting Act (FCRA) of 1970, that anti-
discrimination laws were put in place to ensure accuracy, fairness, and privacy to citizens. The
key areas of the Act are to underscore the protection of credit reporting information and the
standards for how credit information is recorded. The FCRA can be found in the United States
Code Title 15, Section 1681.53 With the radical transformation of the technological landscape
and the faculties of new devices, it raises questions about the state of data justice. Evidently,
Ant Financial solved a critical problem for Alibaba. Like FICO in the U.S. decades
earlier, Ant executives discussed how a data-driven approach would support borrowing for
people who otherwise were locked out from the formal economy. Particularly, the most rural and
vulnerable. China at the time, was predominately a cash-based economy, where few individuals
had access to credit cards. Alibaba’s model as an intermediary for sellers and customers, required
Alipay, a mobile payment system. The sell for the 400 million Alipay customers is clear: your
data will give you access to credit. In turn, this system meant that Zhima could access its
customers creditworthiness. The chart below shows the number of service providers using Zhima
Credit.
53
“15 U.S. Code § 1681.Congressional findings and statement of purpose.” Legal Information
Institute, https://www.law.cornell.edu/uscode/text/15/1681 (accessed 12 January 2019)
20
Chinese Social Credit initiatives and African Surveillance States
Sources: Research Report on the Development of Credit-Aided Sharing Economy jointly issued by the Sharing
Economy Research Center of the State Information Center and Ant Financial Research Institute
The chart precisely illustrates the number of users from January 2016 to April 2017.
Accordingly, it intimates the growth of the platform and its customer base. The users increased
by 270 percent representing an average 12.7 percent monthly growth. Hence, Alibaba could
finally achieve its aim to present itself as a trusted intermediary brokering between sellers and
buyers.
The line between state and private actors is unclear in China. Since 2014 the Chinese
state was able to establish a social credit system, which tracks individual behavior. Private
companies with the support of the People’s Bank of China built their own systems. These
systems help enforce traditional law enforcement tools. An example of this is blacklisting, which
exposes and limits the online conduct of enterprises and individuals caught committing fraud,
“rumor” spreading, and violating others’ rights. Importantly, conflating Sesame Credit with
broader Social Credit initiatives is problematic. By doing so, you inflame international
Conference Paper 21
trepidations about the application of information technologies in China. Secondly, Sesame is not
a mandatory application that engenders a score on the discretions of the state. Poor scores have
no bearing on citizens’ station in society. Such qualms resonate because we are becoming
Worries have been expressed about consumer privacy in China. On Weibo, China’s
version of twitter, costumers have learnt how Zhima has shared their credit information with
Alipay. Fanny Wu, a spokesperson for Ant Financial, admitted that customers data was shared
with Alipay and some third-party companies.54 Dealing with this crisis of trust, Alipay has
updated its reporting landing page so that users now can elect to share their Zhima Credit scores.
In summary, the social credit initiative is not a single and nationwide integrated system.
Rather the system is an ecology of fragmented local initiatives, which share a common state goal
and operational framework. From the standpoint of the government, the principal objectives are
to improve legal and regulatory compliance in the economic and social domain.55 The core
mechanism of the social credit system operates on punishment and rewards. The mechanisms of
punishment like blacklisting platforms add a means to surveillance. While the private sector, has
been able to devise their own credit systems, which are centered on rating systems and loyalty
schemes. The conception of a social credit system began as an elixir to the lack of trust in
citizens through verification and assessment by a mobile social credit system. In other words, the
social credit system enabled non-financial proxy categories to substitute for a well-measured
54
Liping Zhang, “Zhima credit admits it was stupid. “Sixth Tone, 4 January 2018
https://www.sixthtone.com/news/1001503/after-privacy-concerns%2C-zhima-credit-admits-it-
was-stupid (accessed 20 January 2019
55
Rogier Creemers, “China’s Social Credit System: An Evolving Practice of Control.” SSRN
(2018): 12.
22
Chinese Social Credit initiatives and African Surveillance States
creditworthiness record. Therefore, private enterprises that run their own social credit system, are
utilizing this tool to garner more customers, reward loyal users, and to ultimately render their
products more alluring to larger audiences. However, social credit systems, through state and
private collaboration, are also a device to monitor behavior and combat ‘corruption’.
No strings attached
In the case of technological infrastructure on the African continent, poor nations, like Ethiopia
and Rwanda, have embraced the supposed benefits of heavy investments in ICTs. As the late
Not long ago, many of us felt that we were too poor to afford to invest seriously in ICT.
We assumed that ICT was a luxury that only the rich could afford. We did not believe that serious
investment in ICT had anything to do with facing the challenges of poverty that kills. Now we
believe we are too poor not to save everything we can and invest as much of it as possible on
ICT. We recognize that while ICT may be a luxury for the rich, for us – the poor counties – it is a
vital and essential tool for fighting poverty.56
This understanding accounts for how policy makers now perceive technology as an instrument
for political ambitions. And so, rather than being an impartial means that responds to functional
imperatives, the technologies operate precisely for government purposes. Understanding the
provision of technology as a work of state representation pushes us to unearth the ways in which
they are implemented. Considering these dimensions in the process of technological adoption
and adaptation means underlining how devices influence the spaces they operate in, but also how
they are built and for what purposes they are institutionalized.57
56
Iginio Gagliardone and Frederick Golooba-Mutebi, “The Evolution of the Internet in Ethiopia
and Rwanda: Towards a ‘Developmental’ Model?” Stability: International Journal of Security
and Development 5.1 (2016): 5.
57
It should be noted, that because technologies have their own material shape and design, they
cannot be completely reduced to the intentions, which they were are engineered for. They do not
simply enact relations of ideology.
Conference Paper 23
The application of ICT systems to bureaucratic processes has been introduced, on a mass
scale, across the global North. Such initiatives have promised to transform citizens’ experience
of governance by ensuring efficiency and transparency. That is to say, ICT systems, in the West,
were expressly designed to provide citizens information and accessible means to complete
transactions with the state.58 In the case of ICT platforms being engendered and exported by
China, many have raised concerns about China being a net exporter of authoritarianism, selling
its own strategies of surveillance and control, that undermine Western efforts to promote the
internet, and media specifically, as a democratizing apparatus. This section is, primarily,
concerned with exploring the problematics of China-Ethiopia relations, and focuses on how
Chinese engagement has influenced the development of the Ethiopian media sphere. I argue that
ICT systems are a conduit of development; however, they come with the possibilities of risk to
civil liberties, which are prone to countries with weak systems of political checks and balances.
China has received applause and criticism for its apathy. Simply put, their ‘no strings
attached’ policy that advocates for unconditional aid to low-income countries has been a
contentious point of discussion. This strategy has enabled collaboration in the media sector,
concretely with African nations, like Rwanda and Ethiopia, who are authoritarian and able to
practice in ways that facilitate long-term investment and the use of rents for growth-generating
activities.”59 Some critics; nonetheless, maintain that the concept of neutrality embraced by the
Chinese is, in fact, another form of ideology. I should say, even more precisely, that the lack of
58
Randolph Kluver, “The architecture of control: A Chinese strategy for e-governance.” Journal
of Public Policy 25.1 (2005): 77.
59
Iginio Gagliardone and Frederick Golooba-Mutebi, “The Evolution of the Internet in Ethiopia
and Rwanda: Towards a ‘Developmental’ Model?” Stability: International Journal of Security
and Development 5.1 (2016): 5.
24
Chinese Social Credit initiatives and African Surveillance States
conditions enables another kind of ideology, which presents China as a generous actor, and
ultimately enshrouds its political ambitions. Thus, how China chooses to intervene “neutrally”,
inevitably, enforces a particular change in the global arena. The looming debt crisis across Africa
On the other hand, some academics challenge the idea that China has geopolitical
ambitions to export authoritarianism. Alves and Alden argue compellingly that China’s aid does
not support the export of its values and ambitions. Rather it reinforces the processes that were
already in place in respective African countries.60 Thus, the supposition that China is a net
exporter of authoritarian values is contested. With that said, these views are principally based on
the assumption that, as Western countries have tried to promote their values and models in
Africa, China as a global actor exports its own. Martha Finnemore maintains that international
actors attempting to shape the behavior of nations are ‘active teachers.’61 China repudiates that
role, and advocates a politics of solidarity, which suggests a shared identity with fellow third
world states. Nonetheless, Beijing’s claims do not deny the possibilities of other nations copying
and adapting Chinese modes of governance, particularly after receiving support to build ICT
infrastructure.
China’s increasing engagement in the media sphere is an area of study that offers a
critical entry point into understanding the broader political and economic implications for China-
Africa relations. Since 2006, China has become a paramount player on the global stage,
60
Alden, Chris, and Cristina Alves, “History & identity in the construction of China's Africa
policy.” Review of African political economy 35.115 (2008): 55.
61
Martha Finnemore, “International organizations as teachers of norms: the United Nations
Educational, Scientific, and Cutural Organization and science policy.” International
organization 47.4 (1993): 569.
Conference Paper 25
particularly as new development actor.62 It now functions as an alternative source for investment
beyond traditional donors, like the U.S. and U.K., helping to sponsor the development of ICT
systems across Africa.63 As stated above, this article seeks to meditate on some of the
Ethiopia, and the development of its telecommunication sector, we accent the ramifications of its
development. As it will be discussed later, Ethiopia is the only African nation with a state-
controlled Internet service Provider. China at an ideational level, agreeing with Gagliardone, is
able to balance the growth of users and the control of information online, which makes it a model
and source of legitimation for repressive practices in Ethiopia, and other countries across the
globe. Chinese support of Ethiopian development does not categorically prove Beijing’s
authoritarian exportation. Yet, it draws attention to how it provides financial, technical and
In 2006, the Ethiopian Telecommunication Corporation and Chinese telecom giant ZTE
signed a historical agreement. Backed by the China Development Bank, ZTE (partially state-
owned) offered a loan of 1.5 billion dollars, which ZTE contributed 400 million dollars.64 This
telecommunications system. Therefore, the loan was spent in three phases; furthermore, expected
to be paid back within thirteen years. The first phase installed more than two thousand kilometers
of fibre optic cable — connecting Ethiopia’s thirteen largest cities.65 The second and third phase
62
Deborah Bräutigam, and Tang Xiaoyang. “African Shenzhen: China's special economic zones
in Africa.” The Journal of Modern African Studies 49.1 (2011): 28.
63
Ibid.,404.
64
Iginio Gagliardone, Nicole Stremlau, and Daniel Nkrumah, "Partner, prototype persuader?
China's renewed media engagement with Ghana." Communication, Politics
& Culture45.2 (2012): 179.
65
Iginio Gagliardone, and Frederick Golooba-Mutebi, “The Evolution of the Internet in Ethiopia
26
Chinese Social Credit initiatives and African Surveillance States
continued with the building of telecommunication infrastructure across the country, and
principally expanded coverage to include the rural peripheries. This action augmented the
capacity of the system to support about 15.4 percent of individuals in Ethiopia from an initial
0.22 percent.66
telecommunication infrastructure, but also the means to retain its authoritarian predilections.
This is to say, China has capacitated the Ethiopian government to expand access while
reprisal has propelled the constraints on media in Ethiopia. This is made most obvious by the
arrests of twenty journalists during the tumultuous 2005 May election.68 In addition, foreign
journalists have had tremendous difficulty in acquiring authorization to work in Ethiopia, in fact,
an Associated Press reporter was deported in 2006 after ‘tarnish[ing] the image of the country.’69
Elsewhere in Africa, like Rwanda and Kenya, the liberalization of the market was driven by the
systems lagged behind in the advancement of information infrastructure and services. However,
China’s support, that comes with ‘no strings’ attached, offers the financial aid and technical
Conference Paper 27
support to sustain Ethiopia’s autocratic bearings, while fostering development. Admittingly,
without its support, the EPRDF would have been forced to liberalize or continue to lack
connectivity.
Despite the unprecedented loans made by China to Ethiopia, the country remains at the
bottom in Africa, and the world, in terms of access to ICTs. In 2017, around 15 percent of the
population has usage of the internet regularly. This is up from 12 percent the previous year.70
Mobile phone penetration is also considerably low at about 59.7 percent.71 Comparatively,
Kenya has usage of around 85 percent and 86.2 percent respectively.72 Low penetration rates
completely absent in rural areas, where about 85 percent of the Ethiopian population reside.
While Chinese financial support has boosted connectively and expanded access, the Ethiopian
state still lags behind its neighbors. This underdevelopment is partially driven by the
unwillingness to liberalize the sector. The Ethiopian state wishes to maintain a state monopoly
Contrastingly, employing ICTs, the Ethiopian government has engineered some of the
most innovative projects to support development and service delivery. Woredanet and Schoolnet
operate on similar architectural design, which broadcasts between the center and the peripheries,
as a way to bolster state capacity. Woredanet, which stands for network of district (woreda)
offices in order to instruct them about the duties of their work. Schoolnet promulgates pre-
70
“World telecommunication/ICT indicators database.” International Telecommunications
Union, 2009, https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx
71
International Telecommunication Union. Statistics, 2017,
https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx (accessed 10 January 2019)
72
Ibid.
28
Chinese Social Credit initiatives and African Surveillance States
recorded classes on a multiplicity of academic subjects to high school students across the
country.73 Both projects are a means to development, but also a way to convey a message of
In 2011, the Ethio-Telecom, the country’s sole telecom operator, issued a tender to
further expand the country’s mobile-phone network to 50 million subscribers by 2015. Like the
ZTE case, the tender was founded on a vendor-financing basis. Yet, unlike the 2006 episode, it
was a public tender that invited competition. Matthew Dalton’s piece, “Telecom Deal by China's
ZTE, Huawei in Ethiopia Faces Criticism”, in The Wall Street Journal, more than anything else,
argued that financing won the day.74 The deal went to Chinese firms, ZTE and Huawei, which
pledged a total of 1.6 billion dollars.75 With the signing of two agreements worth 800 million
With regard to the above, China continues to rebuff claims of wishing to export its
authoritarian strategies for development and governance, despite its financial support in
countries like Kenya and Ghana. The Chinese government has invested 180 million dollars in
Ghana in order to establish an e-government system.76 Afforded by China’s Exim Bank through
73
Iginio Gagliardone, "“A country in order”: Technopolitics, nation building, and the
development of ICT in Ethiopia." Information Technologies & International Development 10.1
(2014): 10.
74
Matthew Dalton, “Telecom Deal by China’s ZTE, Huawei in Ethiopia Faces Criticism.” Wall
Street Journal, 7 January 2014, https://www.wsj.com/articles/telecom-deal-by-china8217s-zte-
huawei-in-ethiopia-faces-criticism-1389064617 (accessed 9 December 2018)
75
Ibid.
76
Iginio Gagliardone, Nicole Stremlau, and Daniel Nkrumah, "Partner, prototype or
Conference Paper 29
two concessionary loans of 30 million dollars in 2008 and 150 million dollars in 2010, the
Chinese have conveyed their commitment to development in Ghana. Chen, Dollar, and Tang
convincingly demonstrate how Chinese ODI in Africa, mainly in the service sector, appears to be
related to the profit-driven nature of ODI.77 Concretely, Chinese investments are concentrated in
capital intense sectors in capital scarce countries like Ghana and Ethiopia.78 Such a move
suggests a strong incentive to seek profit in risker environments.79 Relatedly, while this ‘no
strings attached’ investment policy may be consistent and enable the Chinese party state to be
involved in politically and economically moot projects, it; nevertheless, does not mean that its
impact is neutral. As previously asserted, Chinese investment privileges state actors, therefore,
assessing which countries benefit from China’s aid becomes important because it bears an
analytical approach, which captures how to understand a political milieu with a more financially
resourced state.
Gagliardone expounds how the Ethiopian government has tried to develop without
compromising political power and sovereignty.80 By doing so, he explores how Ethiopia is
greatly reliant on Chinese foreign investment for development. This support materialized initially
in the form of concessionary loans provided by the Chinese to build ICT systems.81 Chinese aid
meant that the Ethiopian state could ‘afford’ to exclude the private sector and have greater
persuader? China's renewed media engagement with Ghana," Communication, Politics &
Culture45.2 (2012): 185.
77
Chen, Wenjie, David Dollar, and Heiwai Tang, “Why is China investing in Africa? Evidence
from the firm level.” The World Bank Economic Review 32.3 (2016): 620.
78
Ibid., 622.
79
Ibid., 622.
80
Iginio Gagliardone, and Frederick Golooba-Mutebi, “The Evolution of the Internet in Ethiopia
and Rwanda: Towards a ‘Developmental’ Model?” Stability: International Journal of Security
and Development 5.1 (2016): 8.
81
Ibid., 14.
30
Chinese Social Credit initiatives and African Surveillance States
control over the development of the internet. This argument underscores earlier contentions
about Beijing intervention.82 The absence of conditions for aid subsequently fortifies the
processes within countries. More saliently, it also revels the tendency, by the Chinese
Communist Party, to privilege state actors over private enterprises. This stands in sharp contrast
to Western governments, which have largely focused on supporting private institutions and civil
In this context, can the Ethiopian state copy and adapt the Chinese social credit system,
and specifically modes of surveillance? No. The installment of social credit systems is greatly
system is a byproduct of private and public collaboration to build hardware and software
infrastructure. Behemoths like Alibaba, Baidu, and Tencent have technically supported the
state’s labors to build a tool to remedy failures of trust within the marketplace, but also as a
means to drive social management. The absence of financially and technically powerful private
actors within the Ethiopian telecommunication landscape, makes it implausible to devise a credit
system, which depends on collecting, storing, and processing mechanisms. Above all, it must be
made clear that Ethiopian leadership is wary about technology. Their commitment to investing in
new technologies for development is matched with an equally strong resistance to its capacities
to give voice and autonomy to the local.83 This is to say, that there is opposition towards uses of
ICTs to challenge centralized power. In 2005, Ethiopian activists challenged the results of
parliamentary elections by propagating their opinions and disgruntlement via SMS and social
82
Iginio Gagliardone, Maria Repnikova, and Nicole Stremlau, “China in Africa: a new approach
to media development?” (2010): 4.
83
Iginio Gagliarone, The Politics of Technology in Africa. Cambridge: Cambridge University
Press, 2016, 2.
Conference Paper 31
media broadly. This compelled the state to further impede development and access to the
internet. At the same time, that ICTs have become useful tools for development, they also have
become contested sites, which are presumed to undermine centralized state power. The exclusion
of the private sector and the purposeful underdevelopment of ICTs is a means to maintain
political power.
Ethiopia does not have the technological sophistication to build a social credit system, yet
surveillance technologies can be purchased. American and European companies have exported
internet and cellular surveillance tools to countries with known human right violations. The EU
on December 2014 introduced the common export restriction policy in order to curb the sales of
intrusion software and internet surveillance devices.84 Human Rights Watch argues that further
while people around the world are right to be shocked by former National Security
Agency contractor Edward Snowden’s revelations of mass surveillance by the U.S. government,
they should also be concerned that repressive governments such as Ethiopia’s are purchasing and
using advanced technologies to target independent voices beyond their borders. The export and
use of these European-made commercial products remains virtually unregulated. This is
particularly worrying given that evidence exists that similar technologies may be in the hands of
authoritarian regimes throughout the world.85
Ethiopia monitors dissenting voices inside and outside its borders. The government acquired
these monitoring tools through commercially available spyware — namely the U.K. and
German-based Gamma International FinFishers and the Italian based Hacking Team’s Remote-
Control System.86 These apparatuses extend the countries surveillance capacities, and effectively
84
Maaike Goslinga and Dimitri Tokmetzis, “The surveillance industry still sells to repressive
regimes. Here’s what Europe can do about it,” De Correspondent, 23 February 2017,
https://thecorrespondent.com/6249/the-surveillance-industry-still-sells-to-repressive-regimes-
heres-what-europe-can-do-about-it/679999251459-591290a5 (accessed 3 February 2019)
85
Felix Horne, “Ethiopia's borderless cyberespionage” Human Rights Watch, 7 April 2014,
https://www.hrw.org/news/2014/04/07/ethiopias-borderless-cyberespionage (accessed 8
February 2019)
86
Ibid.
32
Chinese Social Credit initiatives and African Surveillance States
enable access to files on targeted laptops.87 They also log keystrokes and password as a way to
switch on a device’s webcam and microphone, turning the computer into a spy gadget.
Even with Ethiopia’s limited technological faculties, a more critical question is what can
be learnt? In other words, what can be imported from China’s social credit system? Ethiopia’s
hybridized surveillance apparatus reveals the state’s capacity to do patchwork with diversely
sourced technology. I imagine that the fundamental logics of the social system can be adopted
and adapted. The heart of the social credit system is harnessing digital information to shape
conduct. Namely, the project requires improving operational mechanisms with an emphasis on
collecting, storing, and processing data. The Ethiopian state can gradually advance the exchange
through all regions of the country, as a means to foster surveillance and compliance with law.
The logics of the credit system can ideationally support the state’s desire to formulate norms of
Ethiopia. Echoing Purdekova, in “Even if I am not here, there are so many eyes’”, ‘what are the
apparatuses through which the central power reaches people’?88 The present information
apparatuses at the state’s disposal is supplemented by webs of people. Put differently, rather than
spyware, another key instrument for surveillance is spreading webs of people. By utilizing local
administers as the ears and eyes of the central government, the state is able to supplant its
technological efforts and ultimately, engineer a system of control in the peripheries. Cooptation
87
Felix Horne, “Ethiopia's borderless cyberespionage” Human Rights Watch, 7 April 2014,
https://www.hrw.org/news/2014/04/07/ethiopias-borderless-cyberespionage (accessed 8
February 2019)
88
Andrea Purdeková, “‘Even if I am not here, there are so many eyes’: surveillance and state
reach in Rwanda." The Journal of Modern African Studies 49.3 (2011): 478.
Conference Paper 33
through responsibility is a lateral system, instead of a vertical means of control and policing,
which relies on technology. For instance, Abdi (not his real name), a 32-year-old primary school
teacher from Ethiopia’s Oromia region, had been arrested for protesting local government
corruption.89 But, also for refusing to be an informant in his school for local authorities.90 This
case illustrates how Ethiopia’s technological feet are complimented by widespread and locally
Orwellian nightmare
China’s social credit initiative has instigated alarm in the West. U.S. Politicians like Vice
President Pence have claimed that an “Orwellian system premised on controlling virtually every
facet of human life” has emerged in China.91 This argument hinges on the advancement and
implementation of social credit technology in China. More than anything else, the historical
truncation of civil liberties underpins people’s suspicion about the party’s intentions to apply big
data and artificial intelligence for despotic rule. And so, the government’s motivation to collect
vast information on its citizenry, and its social credit system, raises many questions and concerns
Jamie Horsley’s article, “China’s Orwellian Social Credit Score Isn’t Real”, argues the
contrary. It contends that mainstream media narratives on this subject are misleading. She justifies the
contention on the bases that Chinese authorities have not assigned a single score, which determines every
89
Felix Horne, “Ethiopia’s borderless cyberespionage.” Human Rights Watch, 7 April 2014,
https://www.hrw.org/news/2014/04/07/ethiopias-borderless-cyberespionage (accessed 23
November 2019)
90
Ibid.
91
Jamie Horsley, “China’s Orwellian Social Credit Score Isn’t Real.” Foreign Policy, 16 November
2018, https://foreignpolicy.com/2018/11/16/chinas-orwellian-social-credit-score-isnt-real/ (accessed 25
December 2018)
34
Chinese Social Credit initiatives and African Surveillance States
aspect of citizen’s life.92 In short, the system does not yet exist — at least as it is generally discussed.
Thus, incumbent discourses are presumptive, and social credit technologies can still be seen as
empowering to Chinese publics. Echoing these sentiments, Kluver argues that surveillance is a
It is true that the government devotes significant resources to surveillance and control
mechanisms to prevent the outright expression of political dissent, the intrusion of “foreign
nations” into domestic affairs, and to protect the online population from pornographic or
otherwise illegal content. These efforts, however, are really a small portion of the government’s
interactions with the network, as far more resources are devoted to building the infrastructure,
mandating official use of the Internet, and encouraging online participation than are spent on the
mechanisms of control.93
Above all else, Horsley argues that the social credit codes assigned to companies and individual
national ID numbers do not result in scores or rankings being produced. Currently, there is no
universal scoring system. She adds that enterprises and professionals in various sectors do
receive scores; however, such marks do not propound a social credit score, but rather a
Scoring on either public or private platforms does not result in punishment. Social credit
systems focus on information collection, consolidation, and aggregation rather than scoring. This
emphasis on scoring, particularly in Western media is hyperbolic. The confusion lies in the role
of Sesame credit and other private credit investigation systems and their relationship with
broader government social credit initiatives. Collaboration between the private and public has
supported the establishment of reward and punishment mechanisms. As noted earlier, Zhima
supports the operation of blacklist platforms. But, punishment is not an outcome of poor scoring.
92
Jamie Horsley, “China’s Orwellian Social Credit Score Isn’t Real.” Foreign Policy, 16 November
2018, https://foreignpolicy.com/2018/11/16/chinas-orwellian-social-credit-score-isnt-real/ (accessed 25
December 2018)
93
Randolph Kluver, “The architecture of control: A Chinese strategy for e-governance.” Journal
of Public Policy 25.1 (2005): 83.
Conference Paper 35
The primary punishment instrument is blacklisting, which results from a violation of industry
regulations. Being entered into a blacklist can limit access to goods like private education,
airplane tickets, and entertainment. Getting off the list merely requires addressing the violation.
Even with all this said, concerns remain legitimate. Kluver admits to problematic
surveillance. Horsely’s contentions do not dispel suspicions at all. They merely intimate that
definitive remarks should be suspended until further evidence can be harvested. We know
Beijing regulates speech. We know that it polices association. Speaking from personal
experience, I have dealt with WeChat censorship. After the passing of Liu Xiaobo (刘晓波),
some friends and I attempted to honor his life by posting about his passing on WeChat. We
found that WeChat blocked our messages. Namely, when mentioning his medical treatment and
the establishment of chapter 08. This suggests that politically sensitive material does not get sent
on WeChat. A study by The Citizen Lab corroborates these claims and maintains that ‘WeChat
performs censorship on the server-side, which means that messages sent over the app pass
through a remote server that contains rules for implementing censorship. If the message includes
a keyword that has been targeted for blocking, the entire message will not be sent.’94
Consequently, the development of all technical systems that can support surveillance, in this
instance, the social credit system, should be monitored and eyed with misgivings because such
Similarly, the little that is known about the application of surveillance technology and
social credit systems is locally sourced. In places like Chongqing (重庆市), facial recognition
technology is being deployed, which enables the police to verify people’s identities by analyzing
94
Lotus Ruan , Jeffrey Knockel, and Masashi Crete-Nishihata,“WE (CAN’T) CHAT”, The
Citizen Lab, 13 April 2017, https://citizenlab.ca/2017/04/we-cant-chat-709-crackdown-
discussions-blocked-on-weibo-and-wechat/ (accessed 9 February 2019)
36
Chinese Social Credit initiatives and African Surveillance States
their faces.95 The project is known as ‘Xue Liang’ (雪亮), which ties security cameras around the
city, and additionally, integrates them into a single nationwide surveillance and data-sharing
platform.96 Such advances pose a risk to citizen’s rights. More specifically, the data revolution is
primarily a technological revolution, which facilitates the power to process, intervene, share, and
sort copious amounts of information. But these means have not been coupled to a social justice
agenda by the bodies involved in collecting and sharing data. It is obvious that China does not
have overarching privacy laws or even the capacity to enforce these protections. Thus, the
creation of a social credit system warrants alarm and demands for information security and legal
privacy protections.
For Ethiopia, and other low-income countries, the implementation of ICTs, with the help
of China, raises even more pointed matters. Regardless of whether China is thought to be an
Ethiopia’s weak rule of law, poor record of internet freedom, and limited independent oversight
over government programs means that ICT systems are likely to be abused. For instance, while
most countries in Africa are liberalizing internet provision, the Ethiopian government has
decided to introduce regulatory provisions. In December 2006, the state began requiring internet
cafes to log the names and addresses of customers, as an attempt to track users engaged in illegal
activities online.97 The lists are turned over to the police, and internet café owners who fail to do
95
Simon Denyer, “Beijing bets on facial recognition in a big drive for total surveillance.”
Washington Post, 7 January 2018,
file://localhost/Users/bulelanijili/Zotero/storage/7INK3CXN/in-china-facial-recognition-is-
sharp-end-of-a-drive-for-total-surveillance.html? utm_term=.fa462b2512d9 (accessed 8
December 2018)
96
Ibid.
97
“Internet filtering in Ethiopia” OpenNet Initiative, Creative Commons, 2009,
https://opennet.net/research/profiles/ethiopia
Conference Paper 37
so face prison time.98 More recently, Human Rights Watch contends that, ‘the [Ethiopian]
government has gone to various lengths to restrict OMN [Oromia Media Network] – an
independent media network that covers current events in Oromia, Ethiopia – and other diaspora
media outlets. Given Ethiopia’s stranglehold on independent media and access to information,
diaspora media outlets provide an important source of information that is independent from
government, albeit often heavily politicized.’99 This example illustrates the state’s ambition and
capacity to control the internet and online media, despite its constitutional guarantees of freedom
Risks to privacy are prone to be higher in countries like China and Ethiopia because of
weaker systems of political checks and balances. Admittingly, Jack Ma Co-founder and
Executive Chairman of Alibaba, during the Davos 2019 World Economic Forum, said: ‘embrace
the future. People here in Europe are talking about how can we regulate it [technology]? How
can we protect it? There is nothing that can protect you unless you have the capacity of knowing
the technology. That’s why we don’t go to America first. We don’t come to European countries
President Kagame and Zanny Beddoes, Editor-in-Chief at The Economist, Ma matinaied that
Africa is a promising site for investment because of its lack of legal and regulatory restrictions.
Arguments of this nature echo colonial imaginings that present Africa as a petri dish for new
98
Abate Groum, “Ethiopia Internet cafes start registering users.” Nazret, 27 December 2006,
http://nazret.com/blog/index.php/2006/12/27/ethiopia_internet_cafes_start_registerin (accessed
30 November 2018)
99
“Ethiopia: New Spate of Abusive Surveillance.” Human Rights Watch, 6 December 2017,
https://www.hrw.org/news/2017/12/06/ethiopia-new-spate-abusive-surveillance accessed (12
January 2019)
100
World Economic Forum, “Digitizing Emerging Markets.” World Economic Forum Annual
Meeting, 23 January 2019, https://www.weforum.org/events/world-economic-forum-annual-
meeting/sessions/digitalizing-emerging-markets (accessed 23 January 2019)
38
Chinese Social Credit initiatives and African Surveillance States
forms of social and political organization, which render its communities more vulnerable to
subjugation. Secondly, China’s ‘no strings attached policy’ currently aids troubling processes
within Ethiopia and beyond. While China’s financial support has allowed Ethiopia to modernize
Another risk is political exclusion. The danger that the Chinese Communist party may
attempt to utilize the social credit system, as means to determine the creditability of citizens, on
the basis of their ethnicity or political persuasion, cannot be overlooked. China already outlaws
reporting on protests, spreading rumors online, and growing ‘abnormal’ beards in Xinjiang.101
Needless to say, novel surveillance tools have already helped authorities round up Uighurs, and
other Muslims, as a means to imprison them into clandestine camps known as “re-education
centers.”102 In the name of combating Islamic radicalism, China has turned Xinjiang, in Gay
McDougall words, a member of the United Nations Committee on the Elimination of Racial
of no-rights zone.’103
Similarly, in the context of Ethiopia, we are worried about the use of data for deepening
existing political bias against journalist and political opponents to the EPRDF. Specifically,
initiatives such as the Anti-Terrorism Proclamation have been used to override the existing
101
Charles Rollet, “In China’s Far West, Companies Cash in on Surveillance Program That
Targets Muslims.” Foreign Policy, 13 June 2018, https://foreignpolicy.com/2018/06/13/in-
chinas-far-west-companies-cash-in-on-surveillance-program-that-targets-muslims/ (accessed 15
November 2018)
102
Adrian Zens, “New Evidence for China’s Political Re-Education Campaign in Xinjiang.” The
Jamestown Foundation,15 May 2018, https://jamestown.org/program/evidence-for-chinas-
political-re-education-campaign-in-xinjiang/ (accessed 1 January 2019)
103
Nick Cumming-Bruce, “U.N. Panel Confronts China Over Reports That It Holds a Million
Uighurs in Camps.” The New York Times, 10 August 2018,
https://www.nytimes.com/2018/08/10/world/asia/china-xinjiang-un-uighurs.html (accessed 20
December 2018)
Conference Paper 39
norms in the media space, to silence activists, threaten journalists, and to essentially police the
national information space.104 Corroborating these claims, Lewis Gordon, Sean Sullivan, Sonal
Mittal, and Kate Stone maintain, ‘Ethiopia’s anti-terrorism law is premised on an extremely
broad and vague definition of terrorist activity. It is a definition that permits the government to
repress internationally protected freedoms and to crack down on political dissent, including
permits long-term imprisonment and even the death penalty for “crimes” that bear no
resemblance, under any credible definition, to terrorism.’105 And so, these instances underscore
the risks related to these technologies, and how they can be weaponized to augment despotic
With the growing technological advances, more countries are being propelled to
implement data privacy and protection measures. But such laws may not offer comfort in
Ethiopia, and other countries, where there is little technical or institutional capacity to protect
privacy and enforce the rule of law. Graham Greenleaf, in “the influence of European data
privacy standards outside Europe”, discusses how data privacy laws across the globe are
Alebachew Birhanu Enyew, in “Towards Data Protection Law in Ethiopia”, illustrates how
Ethiopian courts recognition of the right to privacy is negligible.107 The problem of ensuring
privacy of personal data is greater than simply whether a data privacy law is legally
104
Lewis Gordon, Sean Sullivan, Sonal Mittal, and Kate Stone, “Ethiopia’s Anti-Terrorism
Law.” The Oakland Institute and Environmental Defender Law Center (2015): 9.
105
Ibid., 9.
106
Graham Greenleaf, “The influence of European data privacy standards out simplications for
globalization of Convention 108.” International Data Privacy Law 2.2 (2012): 2.
107
Alebachew Birhanu Enyew, "Towards Data Protection Law in Ethiopia." African Data
Privacy Laws (2016): 4.
40
Chinese Social Credit initiatives and African Surveillance States
engineered.108 Capacity to enforce and protect those rights is crucial in the quest for human
dignity.
Conclusion
Social credit systems originally emerged as a remedy to the lack of trust in the financial arena.
But, now, their purpose also combines concerns with social management. Concretely, China’s
social credit systems attempt to ameliorate issues of corruption and domestic consumption as
unbanked and underbanked, access to credit through mobile devices.110 In a word, ICTs offer a
means to engender transparency and accountability between departments and publics, which
functions as a political check to corruption. On the other hand, for private enterprises these
platforms operate as a means to reward loyalty and present their products as more attractive.
It should be said, that in China the line between state and non-state actors is unclear. The
private sector’s support of government initiatives, like blacklisting, amplifies state power. More
specifically, traditional law enforcements faculties are reinforced through collaboration with the
private sector and new technologies. In light of the fact, that private enterprises deny storing data
for the state, like Zhima, raises questions about the nature and the degree to which private actors
108
Alan Gelb and Anna Diofasi Metz, Identification Revolution: Can Digital ID be Harnessed
for Development? Brookings Institution Press, 2018, 137.
109
“Shanghai Municipal Social Credit Regulations.” China Law Translate, 30 June 2017,
https://www.chinalawtranslate.com/%E4%B8%8A%E6%B5%B7%E5%B8%82%E7%A4%BE
%E4%BC%9A%E4%BF%A1%E7%94%A8%E6%9D%A1%E4%BE%8B/?lang=en (accessed
30 November 2018)
110
World Economic Forum, “Digitizing Emerging Markets.” World Economic Forum Annual
Meeting, 23 January 2019, https://www.weforum.org/events/world-economic-forum-annual-
meeting/sessions/digitalizing-emerging-markets (accessed 23 January 2019)
Conference Paper 41
help enforce social behavior. The extent to which Alipay, Zhima and WeChat works with the
Chinese Communist Party is a future line of research worth exploring. Needless to say, there is
little doubt that China’s police can access a wide range of government and private held data
when they feel it is necessary. How and to what extent the social credit system supports these
The broader question of whether the social credit system functions as an instrument of
domination remains open. Indeed, the Chinese state is invested in social management; however,
the role and the degree of how social credit systems will operate towards these ends remains
open. The inquiry remains because of the need for further investigation, but also the reality of the
overt practice of power in China.111 The government already rules legitimately with its
unconcealed paternalistic predilections. The need for surreptitious modes of control seems rather
gratuitous. In Jeremy Duam’s words, “China’s Social Credit Plans aren’t secret. An outline for
progress through 2020 was release in 2014 laying out broad premises and mechanisms, and an
enormous wave of implementing rules and regulation has since followed.”112 Social control
practices in the West, which rely on inconspicuous approaches, like nudging, exploit
unconscious biases. The social credit system in China does not conceal its aspirations for reform,
As is apparent from the discussion available, there is still much work that needs to be
done in the area of China-Africa relations, and technologies impact on development strategies.
Principally, a major priority is to understand China’s economic footprint across the continent, its
111
Rogier Creemers, “China’s Social Credit System: An Evolving Practice of Control.” SSRN
(2018): 26.
112
Jeremy Duam, “Chinathrough a glass, darkly” China Law Translate, 27 December 2017,
https://www.chinalawtranslate.com/en/seeing-chinese-social-credit-through-a-glass-darkly/
(accessed 1 February 2019)
42
Chinese Social Credit initiatives and African Surveillance States
impact on the development of the internet, and how China-Africa relations fosters, and in some
ways constrains, the development of ICT systems. Secondly, more countries need to be surveyed
as there is still much to be understood about how these technologies operate locally, and what do
people on the ground think about the opportunities and obstacles erected by these new systems of
None of the above arguments maintain that China and Ethiopia’s initiatives have failed.
In fact, I argue that both have succeed in utilizing technology towards development. However,
these successes need to be understood within relative terms. In the case of China, tax revenues
have increased, legal reforms achieved, and aspects of governance have improved. These
achievements do not exonerate the social credit system, and some of its troubling potentialities,
but it does accent the myriad problems that have encumbered effective government in China. On
the other hand, in the case of Ethiopia, we see how ICT systems have impelled progress and
enabled the establishment of Woredanet and Schoolnet. Yet, this commitment to new
technologies for development are accompanied with equal resistance towards ICTs as conduits
for voice and representation. The Ethiopian state has purposefully undercut internet access as a
way to preserve central power. This decision suggests that ICTs can be analyzed as contested
sites, moreover, understood for their ability to be imbued with values and visions.
The consideration of China’s credit system cannot simply end with China Evil.113 This
reductive argument does not stimulate critical discourse or enable deep study. And so, instead,
we should be broadening our research on how law and cultural norms struggle to keep pace with
113
DeathbyChina, “Death by China: How America lost its manufacturing Base,” YouTube, 10
April 2016
https://www.youtube.com/watch?v=mMlmjXtnIXI&ab_channel=DeathByChina (accessed 10
January 2019)
Conference Paper 43
the changing technological and information landscape, and if China’s social credit system is
indeed unredeemable, then how do other nations do better, particularly African nations with
weak political systems of check and balances. Secondly, how do we devise the necessary laws
and policy provisions, which will promote civil liberates in the digital age? There needs to be
more inquiry on the legal realities of data privacy. As previously stated, the problems of ensuring
personal data is greater than simply crafting privacy laws. And so, scholarship needs to
comprehend how advancing legal capacity will enable the protection of data. There is research,
which investigates the spread of data privacy legislation; nevertheless, barely any explore the
inadequacy of current legal apparatuses and the possibility of new regulations that speak to the
Obviously, a more nuanced debate and approach is needed to capture the efforts of
institutional development and the competing internal and global forces, which shape states across
Africa. Along with the concerns of rights and technology, the issues of Ethiopia are not unique to
it or Africa, governments across the globe are operating in political and economic environments
that are increasingly dealing with the impact of the technological revolution, which is changing
credit schemes, identification systems and communication. China’s engagement on the continent
imaginations about development. By giving China a greater role on the part of development, it
may effectively create novel approaches to economic growth; however, these new ventures will
44
Chinese Social Credit initiatives and African Surveillance States
Bibliography
Abate, Groum. “Ethiopia Internet cafes start registering users.” Nazret, 27 December 2006,
http://nazret.com/blog/index.php/2006/12/27/ethiopia_internet_cafes_start_registerin
(accessed 30 November 2018)
Acemoglu, Daron, Simon Johnson, James Robinson and Yunyong Thaicharoen. “Institutional
Causes, Macroeconomic Symptoms: Volatility, Crises and Growth.” Journal of Monetary
Economics 50 (2003): 49-123.
Adam, Lishan. “Ethiopia telecommunications sector performance review: a supply side analysis
of policy outcomes.” Research ICT Africa (2007).
Alden, Chris, and Cristina Alves. “History & identity in the construction of China's Africa
policy.” Review of African political economy 35.115 (2008): 43-58.
Amin, Aloysius Ajab, 2013. “Africa’s Development: Institutions, Economic Reforms and
Growth.” International Journal of Economics and Financial Issues 3.2 (2013): 324-336.
Bei, Duoguang. Growing with Pain. Beijing: Chinese Academy of Financial Inclusion, 2018.
Berwick, Angus. “How ZTE helps Venezuela create China-style Social Control” Reuters, 14
November 2018, https://www.reuters.com/investigates/special-report/venezuela-zte/
(accessed 20 November 2018)
Bijker, Wiebe E., Thomas Parke Hughes, and Trevor J. Pinch, eds. The social construction of
technological systems: New directions in the sociology and history of technology.
Cambridge: MIT press, 1987.
Borojo, Dinkneh Gebre, and Yushi Jiang. “The Impact of Africa-China Trade Openness on
Technology Transfer and Economic Growth for Africa: A Dynamic Panel Data
Approach.” Annals of Economics & Finance 17.2 (2016): 403-431
Bräutigam, Deborah and Tang Xiaoyang. “African Shenzhen: China's special economic zones in
Africa.” The Journal of Modern African Studies 49.1 (2011): 28.
Conference Paper 45
— Bräutigam, Deborah, The Dragon’s Gift: The real Story of China in Africa. Oxford:
Oxford University Press, 2010.
Bradsher, Keith. “China’s Anticorruption Commission Investigates Senior Official” New York
Times, 5 December 2012, https://www.nytimes.com/2012/12/06/world/asia/early-target-
of-chinas-anti-corruption-commission-identified.html?mtrref=en.wikipedia.org (accessed
30 December 2018)
Breckenridge, Keith. “The failure of the ‘single source of truth about Kenyans: The NDRS,
collateral mysteries and the Safaricom monopoly.” African Studies (2018): 1-21.
Creemers, Rogier. “China’s Social Credit System: An Evolving Practice of Control.” SSRN
(2018): 1-32.
Chen, Wenjie, David Dollar, and Heiwai Tang. “Why is China investing in Africa? Evidence
from the firm level.” The World Bank Economic Review 32.3 (2016): 610-632.
Cumming-Bruce, Nick. “U.N. Panel Confronts China Over Reports That It Holds a Million
Uighurs in Camps.” The New York Times, 10 August 2018,
https://www.nytimes.com/2018/08/10/world/asia/china-xinjiang-un-uighurs.html
(accessed 20 December 2018)
Dalton, Matthew. “Telecom Deal by China’s ZTE, Huawei in Ethiopia Faces Criticism.” Wall
Street Journal, 7 January 2014, https://www.wsj.com/articles/telecom-deal-by-
china8217s-zte-huawei-in-ethiopia-faces-criticism-1389064617 (accessed 9 December
2018)
Daum, Jeremy. “Chinathrough a glass, darkly” China Law Translate, 27 December 2017,
https://www.chinalawtranslate.com/en/seeing-chinese-social-credit-through-a-glass-
darkly/ (accessed 1 February 2019)
D’Costa, Anthony. “Catching up and falling behind: inequality, IT, and the Asian
diaspora.” Asia. com (2003): 62-84.
DeathbyChina, “Death by China: How America lost its manufacturing Base,” YouTube, 10 April
2016
https://www.youtube.com/watch?v=mMlmjXtnIXI&ab_channel=DeathByChina
(accessed 10 January 2019)
Dehaas, Josh. “China’s social credit system uses technology to punish citizens.” The Loop, 19
December 2018, https://www.theloop.ca/ctvnews/chinas-social-credit-system-uses-
technology-to-punish-citizens/ (accessed 29 December 2018)
46
Chinese Social Credit initiatives and African Surveillance States
Ding, Jeffrey Paul Triolo, and Samm Sacks. “Chinese Interests Take a Big Seat at the AI
Governance Table.” New America, 20 June 2018,
https://www.newamerica.org/cybersecurity-initiative/digichina/blog/chinese-interests-
take-big-seat-ai-governance-table/ (accessed 3 January 2018)
Denyer, Simon. “Beijing bets on facial recognition in a big drive for total surveillance.”
Washington Post, 7 January 2018,
file://localhost/Users/bulelanijili/Zotero/storage/7INK3CXN/in-china-facial-recognition-
is-sharp-end-of-a-drive-for-total-surveillance.html? utm_term=.fa462b2512d9 (accessed
8 December 2018)
Elu, Juliet and Gregory N. Price. “Does China transfer productivity enhancing technology to
Sub-Saharan Africa? Evidence from manufacturing firms.” African Development
Review 22 (2010): 587-598.
Enyew, Alebachew Birhanu. "Towards Data Protection Law in Ethiopia." African Data Privacy
Laws (2016): 143-159.
Eubanks, Virginia. Automating inequality: How high-tech tools profile, police, and punish the
poor. New York: St. Martin's Press, 2018.
Feola, Josh. “China Exports Facial Scan Tech to Zimbabwe, launches First Al Technology
Entry to Africa” RAD II, 16 April 2018, https://radiichina.com/china-exports-facial-scan-
tech-to-zimbabwe-launches-first-ai-technology-entry-to-africa/ (accessed 29 November
2018)
Gagliardone, Iginio. "“A country in order”: Technopolitics, nation building, and the development
of ICT in Ethiopia." Information Technologies & International Development 10.1 (2014): 1-18.
— Gagliardone, Iginio. "China and the African Internet: Perspectives from Kenya and
Ethiopia/China y el Internet africano: Perspectivas desde Kenia y Etiopía." Index.
comunicación: Revista científica en el ámbito de la Comunicación Aplicada 3.2 (2013):
67-82.
— Gagliardone, Iginio, Maria Repnikova, and Nicole Stremlau. “China in Africa: a new
Conference Paper 47
approach to media development?” (2010): 1-21.
Gelb, Alan, and Anna Diofasi Metz. Identification Revolution: Can Digital ID be Harnessed for
Development? Brookings Institution Press, 2018.
Gordon Lewis, Sean Sullivan, Sonal Mittal, Kate Stone. “Ethiopia’s Anti-Terrorism Law.”
The Oakland Institute and Environmental Defender Law Center (2015): 1-23.
Goslinga Maaike and Dimitri Tokmetzis, “The surveillance industry still sells to repressive
regimes. Here’s what Europe can do about it,” De Correspondent, 23 February 2017,
https://thecorrespondent.com/6249/the-surveillance-industry-still-sells-to-repressive-
regimes-heres-what-europe-can-do-about-it/679999251459-591290a5 (accessed 3
February 2019)
Greenleaf, Graham. “The influence of European data privacy standards outside Europe:
implications for globalization of Convention 108.” International Data Privacy Law 2.2
(2012): 68-92.
Hawkins, Amy. “Beijing’s Big Brother Tech Needs African Faces.” Foreign Policy, 24 July 2018,
https://foreignpolicy.com/2018/07/24/beijings-big-brother-tech-needs-african-faces/ (accessed 2
December 2018)
He, Yong. “Does China’s Trade Expansion Help African Development? An Empirical
Estimation.” China Economic Review 26 (2013): 28-38.
Henry, Michael, Richard Kneller, and Chris Milner. “Trade, technology transfer and national
efficiency in developing countries.” European Economic Review 53.2 (2009): 237-254.
Hongyu, Bianji.“Xi calls for ‘greater strategic achievements’ in Party governance” Xinhua,2019,
http://en.people.cn/n3/2019/0112/c90000-9537115.html (accessed 10 February 2019)
Horne, Felix. “Ethiopia’s borderless cyberespionage.” Human Rights Watch, 7 April 2014,
https://www.hrw.org/news/2014/04/07/ethiopias-borderless-cyberespionage (accessed 23
November 2019)
48
Chinese Social Credit initiatives and African Surveillance States
Horsley, Jamie. “China’s Orwellian Social Credit Score Isn’t Real.” Foreign Policy, 16 November 2018,
https://foreignpolicy.com/2018/11/16/chinas-orwellian-social-credit-score-isnt-real/ (accessed 25
December 2018)
Hu, Tao. “Zhima Credit does not share user scores or data.” Financial Times, 15 November
2017, https://www.ft.com/content/ec4a2a46-c577-11e7-a1d2-6786f39ef675 (accessed 28
December 2018)
Huang, Zhuo, Yang Lei, and Shihan Shen. “China’s personal credit reporting system in the
internet finance era: challenges and opportunities.” China Economic Journal 9.3 (2016):
288-303.
Hvistendahl, Mara. “Inside China’s Vast New Experiment in Social Ranking.” Wired, 14
December 2017, https://www.wired.com/story/age-of-social-credit/ (accessed 24 January
2019)
Jianging, Fan Fang Han, Han Liu, “Challenges of Big Data analysis.” National Science Review
1.2 (2014): 293-314.
“Institutional membership list of the Interministerial Joint Conference for the Construction of the
Social Credit System (2012).” Peking University Legal Information Network, 2012,
http://www.pkulaw.cn/fulltext_form.aspx?db=chl&gid=179820 (accessed 10 February
2019) (In Chinese)
Inter-Ministerial Joint Conference System for the Construction of the State Council's Social
Credit System.” State Council Bulletin, 2007,
http://www.gov.cn/gongbao/content/2007/content_632090.htm (accessed 1 February
2019) (In Chinese)
Kaufmann, Daniel, Aart Kraay, and Massimo Mastruzzi. “The worldwide governance indicators:
methodology and analytical issues.” Hague Journal on the Rule of Law 3.2 (2011): 220-
246.
Kelsall, Tim. Business, politics, and the state in Africa: Challenging the orthodoxies on growth
Conference Paper 49
and transformation. New York: Zed Books Ltd., 2013.
Kinde, Samuel. “Internet in Ethiopia - Is Ethiopia Off-line or Wired to the Rim?” Media
Ethiopia,
November2007, http://www.mediaethiopia.com/Engineering/Internet_in_Ethiopia_Nove
mber20... (accessed 20 November 2018)
Kluver, Randolph. “The architecture of control: A Chinese strategy for e-governance.” Journal
of Public Policy 25.1 (2005): 75-97.
Langone, Alix. “We Now Stand at a Crossroads.' Here's What Barack Obama Said During His
First Big Speech Since He Left Office.” Time, 17 July 2018,
http://time.com/5341180/barack-obama-south-africa-speech-transcript/ (15 November
2018)
Leftwich, Adrian. “Bringing politics back in: Towards a model of the developmental state.” The
journal of development studies 31.3 (1995): 400-427.
Li, Tianxia. “Internet Finance and Big Data Risk Management.” Zhihu, 4 January 2017,
https://zhuanlan.zhihu.com/p/24712959 (accessed 25 January 2019) (In Chinese)
Looy, J. van de, and L.J. de Haan. “Africa and China: A Strategic Partnership?” Strategic
Analysis 30.3 (2006): 562-575.
Lubin, Matthew. “China’s Social Credit System Offers a New Silver Lining to Travelers.”
JingTravel, 19 December 2018, https://jingtravel.com/china-social-credit-travelers/
(accessed 5 December 2018)
Maasho, Aaron. “Ethiopia to sign mobile network deals with ZTE, Huawei.” Reuters, 30
May2013, https://www.reuters.com/article/ethiopia-telecoms/ethiopia-to-sign-mobile-
network-deals-with-zte-huawei-idUSL5N0EB36920130530 (accessed 7 December 2018)
Marysse, Stefaan, and Sara Geenen. “Win-Win or Unequal Exchange? The Case of the Sino-
Congolese Cooperation Agreements.” The Journal of Modern African Studies 47.3
(2009): 371-396.
Mayer, Jörg. “Technology diffusion, human capital and economic growth in developing
countries.” United Nations Conference on Trade and Development (2001): 1-21.
50
Chinese Social Credit initiatives and African Surveillance States
“Number of users of leading mobile payment platforms worldwide as of August 2017” Statista,
2017, https://www.statista.com/statistics/744944/mobile-payment-platforms-users/
(accessed 12 January 2019)
“Obama warns against China’s model and rise of ‘strongman politics’, in speech hailing
Mandela’s legacy.” South China Morning Post, 18 July 2018,
https://www.scmp.com/news/world/united-states-canada/article/2155731/obama-warns-
against-chinas-model-and-rise-strongman ( accessed 4 December 2018)
Omoju, Oluwasola, and Olumide Adesanya. “Does trade promote growth in developing
countries? Empirical evidence from Nigeria.” International Journal of Development and
Sustainability 1.3 (2012): 743-753.
Opinion released on use of big data” The State Council People’s Republic of China, Chinese
government, 2018,
http://english.gov.cn/policies/latest_releases/2015/07/01/content_281475138273106.htm
(accessed 5 January 2019)
Planning Outline for the Construction of a Social Credit System 2014-2020” China Copyright
and Media, 2014, https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-
outline-for-the-construction-of-a-social-credit-system-2014-2020/ (accessed 20 January
2019)
Purdeková, Andrea. "‘Even if I am not here, there are so many eyes’: surveillance and state reach
in Rwanda." The Journal of Modern African Studies 49.3 (2011): 478.
Renard, Mary-Françoise. “China’s Trade and FDI in Africa.” China and Africa: An emerging
partnership for development 25 (2011):1-158.
Report at the 16th National Congress of the Chinese Communist Party.” Chinese Communist
Party, 2002 http://www.china.org.cn/english/features/49007.htm (accessed 20 Jnaury
2019)
“Reporters Without Borders”, Reporters Without Borders Annual Report, 1 February 2007,
https:// www.refworld.org/docid/46e692a01a.html (accessed 3 November 2018)
Rollet, Charles. “In China’s Far West, Companies Cash in on Surveillance Program That Targets
Muslims.” Foreign Policy, 13 June 2018, https://foreignpolicy.com/2018/06/13/in-
chinas-far-west-companies-cash-in-on-surveillance-program-that-targets-muslims/
(accessed 15 November 2018)
Rose, Richard. The Internet and Governance: The Global Context, University of Oxford. Oxford
Internet Institute, 2004. https://www.oii.ox.ac.uk/events/the-internet-and-governance-the-
global-context/ (accessed 20 January 2019)
Ruan Lotus, Jeffrey Knockel, and Masashi Crete-Nishihata,“WE (CAN’T) CHAT”, The Citizen
Conference Paper 51
Lab, 13 April 2017, https://citizenlab.ca/2017/04/we-cant-chat-709-crackdown-
discussions-blocked-on-weibo-and-wechat/ (accessed 9 February 2019)
Sachs, Jeffrey D., and Andrew M. Warner. “Sources of Slow Growth in African Economies.”
Journal of African Economies 6.3 (1997): 335-376.
Sanusi, Lamido. “Africa must get real about Chinese Ties.” The Financial Times,11 March 2013,
https://www.ft.com/content/562692b0-898c-11e2-ad3f-00144feabdc0 (accessed 20
November 2018)
Seldon, Andrew “The Safe City Africa Summit & Kenya Showcase 2016 in Nairobi, Kenya,
demonstrated the value of a safe city within Africa’s safe city.” Hi-tech Security
Magazine, February 2017, http://www.securitysa.com/56445n (accessed 26 December
2018)
“Shanghai Municipal Social Credit Regulations.” China Law Translate, 30 June 2017,
https://www.chinalawtranslate.com/%E4%B8%8A%E6%B5%B7%E5%B8%82%E7%A
4%BE%E4%BC%9A%E4%BF%A1%E7%94%A8%E6%9D%A1%E4%BE%8B/?lang=
en (accessed 30 November 2018)
Song, Bing. “The West may be wrong about China’s social credit system.” Washington Post, 29
November 2018,
https://www.washingtonpost.com/news/theworldpost/wp/2018/11/29/social-
credit/?noredirect=on&utm_term=.f0abae325506 ( accessed 2 December 2018)
State Council General Office Some Opinions concerning the Construction of a Social
Credit System.” China Copyright and Media, 2007
https://chinacopyrightandmedia.wordpress.com/2007/03/23/state-council-general-office-
some-opinions-concerning-the-construction-of-a-social-credit-system/ (accessed 24
January 2019) (In Chinese)
Sun, Peng, and Almas Heshmati. “International trade and its effects on economic growth in
China.” SSRN (2010): 1-38.
Taylor, Linnet. "What is data justice? The case for connecting digital rights and freedoms
globally." Big Data & Society 4.2 (2017): 1-14.
Sachs, Jeffrey D., and Andrew M. Warner. “Sources of Slow Growth in African Economies.”
Journal of African Economies 6.3 (1997): 335-376.
Wang Lei. “Passenger security: making security checks faster.” CAACNEWS, 13 December
2018, http://www.caacnews.com.cn/1/5/201812/t20181213_1262823.html (accessed 31
December 2018) (In Chinese)
52
Chinese Social Credit initiatives and African Surveillance States
Woodside, Alexander. Lost modernities: China, Vietnam, Korea, and the hazards of world
history. Cambridge: Harvard University Press, 2006.
World Economic Forum, “Digitizing Emerging Markets.” World Economic Forum Annual
Meeting, 23 January 2019, https://www.weforum.org/events/world-economic-forum-
annual-meeting/sessions/digitalizing-emerging-markets (accessed 23 January 2019)
Wu, Qiang. “Urban Grid Management and Police State in China: A Brief Overview” China Change, 12
August 2014, https://chinachange.org/2013/08/08/the-urban-grid-management-and-police-state-in-china-
a-brief-overview/ (accessed 20 December 2018)
Xueyuan, Fu. “Exporting to Africa, Chinese ‘Eagle Eye’ Technology will serve Zimbabwe.”
Science and Technology Daily, 12 April 2018, http://www.stdaily.com/kjrb/kjrbbm/2018-
04/12/content_658070.shtml (27 November 2018) (In Chinese)
Zens, Adrian. “New Evidence for China’s Political Re-Education Campaign in Xinjiang.” The
Jamestown Foundation,15 May 2018, https://jamestown.org/program/evidence-for-
chinas-political-re-education-campaign-in-xinjiang/ (accessed 1 January 2019)
Zhang, Carolyn. “Inside China’s Dystopian Dreams: A.I., Shame and Lots of Camera.”
New York Times, 8 July 2018, https://www.nytimes.com/2018/07/08/business/china-
surveillance-technology.html (accessed 8 December 2018)
Zhang, Guibin, and Russell Smyth. “An emerging credit-reporting system in China.” Chinese
Economy 42.5 (2009): 40-57.
Zhang, Liping. “Zhima credit admits it was stupid. “Sixth Tone, 4 January 2018
https://www.sixthtone.com/news/1001503/after-privacy-concerns%2C-zhima-credit-
admits-it-was-stupid (accessed 20 January 2019)
Zhao, Chen. “Suining County Public Credit Information Evaluation Rules,” 20 May 2011,
https://wenku.baidu.com/view/25db9520192e45361066f5fa.html (accessed 12 January
2019) (In Chinese)
Zhun, Liu. “China’s social credit system won’t be Orwellian,” Global Times, 1 November 2016,
http://www.globaltimes.cn/content/1015248.shtml (accessed 3 January 2019)
Conference Paper 53