Professional Documents
Culture Documents
Digital Surveillance
in Southern Africa
Policies, Politics and Practices
Allen Munoriyarwa Admire Mare
Department of Communication Department of Communication
and Media and Media
University of Johannesburg University of Johannesburg
Johannesburg, South Africa Johannesburg, South Africa
© The Editor(s) (if applicable) and The Author(s), under exclusive licence to Springer
Nature Switzerland AG 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the
Publisher, whether the whole or part of the material is concerned, specifically the rights of
translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on
microfilms or in any other physical way, and transmission or information storage and retrieval,
electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are
exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information
in this book are believed to be true and accurate at the date of publication. Neither the
publisher nor the authors or the editors give a warranty, expressed or implied, with respect
to the material contained herein or for any errors or omissions that may have been made.
The publisher remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
This Palgrave Macmillan imprint is published by the registered company Springer Nature
Switzerland AG.
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
v
vi PREFACE
China itself in the region. The immediate danger is that some of the semi-
authoritarian regimes in the region might be persuaded to mimic Chinese
‘hard surveillance’ practices like the social credit system. The existence of
technology companies willing to provide the technological infrastructure,
Beijing approval and grants and loans from Chinese bank and the already-
absent rule-of-law-based surveillance practices in some countries of the
region make this danger very real. We also highlight that recent events
suggesting the fragmentation of the internet into multiple intranets, tech-
nical standards and norms have the potential to further entrench surveil-
lance practices and cultures. This is more evident in a case where countries
in the global South are forced to choose between Chinese and Western
versions of the internet. Whilst it is too early to theorize about the implica-
tions of the ‘splinternet’, it is not too far-fetched to postulate that some
authoritarian regimes in Africa will use this balkanization of the internet as
an opportunity to curtail inalienable rights and entrenching surveillance
into their telecommunications infrastructures.
Our book ends on a cautionary note where we problematize recent
developments in ‘sousveillance’, the splinternet as providing further impe-
tus to unregulated surveillance. The existential risks include the erosion of
the rights to privacy and the danger that political surveillance will lead to
the erosion of political rights like the right to free and fair election, to
choose political representatives and so forth. The danger is all too real in
countries where such rights have always been precarious and where sur-
veillance has often been politically instrumentalized.
We have written this book for the general reader interested more
broadly in surveillance studies: the academic researcher, the activist and
everyone with a deep appreciation of how surveillance practices are influ-
encing our daily lives and how they are closely linked not only to our
security but to our individual rights as well. Because of our intention to
engage with as many readers as we possibly can, we have attempted to be
simple and straightforward in our arguments. This book is one of the pio-
neer studies in the field of digital surveillance in southern Africa. This
makes it the more relevant and timeous.
The first steps towards the writing of this book were taken between 31
October and 1 November 2019 with the organization of a two-day Digital
Surveillance Workshop at the University of Johannesburg. During the
workshop and the intense discussions that emerged from it, patterns and
trends emerged across the different countries represented on how digital
surveillance was shaping up in the region. It was from these discussions
that the authors hatched a plan to edit a timeous book of this nature.
COVID-19 came and disrupted the work. Instead of editing, we then
decided to author the book ourselves. Such a book could not have mate-
rialized without the help of many people who we wish to acknowledge.
We owe so much to the journalists and scholars who were part of this two-
day workshop, and from whose works we draw on. These include Dumisani
Dhlela from Zimbabwe, Ernesto Nhanale from Mozambique, Brenda
Zulu from Zambia, Frederico Links from Namibia, Arsene Tsungali from
the Democratic Republic of the Congo and Heidi Swart and Murray
Hunter from South Africa. This book draws on their research outputs
which we reference frequently. We are also indebted to the Media Policy
and Democracy Project (MPDP), a project whose principal investigator,
Professor Jane Duncan, allowed us to tap into the numerous journalistic
and research outputs which form the backbone of this book. It is impor-
tant for us to mention that without the MPDP, this book would not have
existed. One of the authors of this book, Dr Allen Munoriyarwa, was
given the privilege to coordinate the MPDP project. This presented an
opportunity to lay the foundations of this book. For this, we are indebted
to Professor Jane Duncan. In addition to the journalists who met for this
ix
x ACKNOWLEDGEMENTS
1 Introduction:
Twists and Turns? From Analogue to Digital
Surveillance 1
2 The
Political Economy of Digital Surveillance: Actors,
Powers and Interests 53
5 Mainstreaming
Surveillance Through the Biometrification
of Everyday Life141
Appendices203
Index207
xi
About the Authors
xiii
xiv ABOUT THE AUTHORS
xv
xvi ABBREVIATIONS
Figs. 4.1
and 4.2 How Chinese public surveillance company technology
producers package fear and market insecurity in the South
African context to gain business from actors 118
Fig. 6.1 The bulk surveillance governance analysis scheme by Wetzling
and Vieth (2018) that can be adopted to govern surveillance in
the SADC region 160
xvii
CHAPTER 1
The talk of the existence of ‘Big Brother’ in the lives of ordinary people is
something that is often discussed in mainstream literature as a distant
occurrence. It is often associated with “the state and its agencies exspress-
ing their overreach tendencies through intelligence and policies strate-
gies” (Lyon & Murakami Wood, 2020). It is also presented in very abstract
terms in its manifestation and material consequences. It is framed as if it
only targsets terrorists or in lay man’s terms ‘the enemies of the state’. This
‘watching over’ of individuals and collectives is meant to control, disci-
pline and sort information and behaviours. It is synonymous with the
tracking and monitoring of the activities of what some loosely call ‘prob-
lematic elements’ in society. Such a stereotypical representation of surveil-
lance is problematic on many fronts. It simplifies a very complex societal
phenomenon with disproportionate consequences on individual and col-
lective rights. It obfuscates the invasive and intrusive nature of surveillance
in contemporary societies. It ignores the ‘everydayness’ of this unprece-
dented and pervasive ‘watching over’. It normalizes surveillance activities
of the state and corporate entities in an environment where the infrastruc-
ture for monitoring and tracking actors and actants in everyday life has
become pervasive and relatively cheaper to acquire and deploy. In most
cases, the idea of the Fourth Industrial Revolution1 (4IR) is sold to many
of us in colourful and enticing ways. Unfortunately, what is obfuscated
from this technological solutionistic narrative is that automation, datafica-
tion of society and robotization of social processes unintentionally pro-
mote invasive surveillance practices and cultures. These surveillance
practices impact negatively on the enjoyment of the right to privacy as
enshrined in national constitutional, regional instruments and interna-
tional model laws.
Furthermore, the state is presented as justified in its acquisition, deploy-
ment and management of surveillance infrastructures. It is represented as
symbolized by the operations of men and women in dark suits and shades.
It is also associated with boots on the ground (physical surveillance).
Thus, surveillance is talked about in terms of national security, terrorism,
public order and central intelligence operations. These narratives resonate
with discourses about surveillance, which are largely rehearsed and uncriti-
cally deployed by the mainstream media, platform companies and opinion
leaders in society. Giant tech companies present themselves as ‘saviors’ and
‘solution finders’. Their products are marketed as ‘problem solvers’ with
innate power to solve societal challenges. Because of the apparent opaque-
ness and lack of transparency associated with surveillance in general, little
is known about the necessity, legality and proportionality of extant surveil-
lance laws in southern Africa.
Surveillance has become in a thorn in the flesh of most postcolonial
societies including those in the Southern Africa Development Community
(SADC) region. This practice does not require a human to read the inter-
cepted communication, as any automated action of communications sur-
veillance represents an interference with the right to privacy. As
communications technologies developed, from the telegraph to fixed
landlines to mobile communications and the internet, human beings have
been given more control over who they can communicate with and the
method in which to do so. Surveillance technologies have become more
and more sophisticated, and capable of grabbing even more information
than ever before. The situation has further been complicated by the inces-
tuous relationship between most SADC countries and China. Russia,
Israel and Iran have also played an important role not only in terms of
1
The 4IR is characterized by a range of new technologies that are fusing the physical, digi-
tal and biological worlds, impacting all disciplines, economies and industries, and even chal-
lenging ideas about what it means to be human (Schwab, 2016).
1 INTRODUCTION: TWISTS AND TURNS? FROM ANALOGUE TO DIGITAL… 3
exporting their ideologies to the region but also selling their surveillance
technologies in return for lucrative mining deals. These countries have
also helped countries in the region to come up with draconian surveillance
laws under the guise of data protection, electronic transactions, cyber-
security and computer bills as well as intelligence laws. Significant litera-
ture (Duncan, 2014, 2016a, 2018, 2022; Roberts & Mohamed Ali, 2021;
Roberts et al., 2021; Hunter & Mare, 2020; Hunter, 2020; Munoriyarwa
& Chiumbu, 2022; Mare, 2015, 2016a, 2019) has begun to emerge in
South Africa, Zimbabwe and Mauritius highlighting the pernicious effect
of surveillance. Apart from media and policy reports (Links, 2018a; Privacy
International, 2015; Right2Know Campaign, 2015), there is a dearth of
evidence-based information on the state of (digital) surveillance in south-
ern Africa.
Edward Snowden’s disclosures about the extensive surveillance pro-
grammes of the National Security Agency (NSA) in the United States and
the Government Communications Headquarters (GCHQ) in the United
Kingdom, revealed that intelligence agencies routinely gather vast amounts
of data about our activities (Wahl-Jorgensen et al., 2017). Snowden also
showed that surveillance occurred via the interception of data shared on
the internet, hacking into computer systems and compromising security
levels. It also entailed the bulk collection of everyone’s data as well as tar-
geted surveillance of governments, companies and civil society organiza-
tions (CSOs) (Wahl Jorgensen et al., 2017). These disclosures indicated
that the intelligence agencies accessed information gathered by Facebook,
Google, Apple and other Big Tech companies (Fidler, 2015). Because of
its nefarious nature, citizens across the globe are increasingly coming to
accept the ubiquity and pervasiveness of surveillance as part and parcel of
everyday life (Bauman & Lyon, 2013). In the wake of the Cambridge
Analytica scandal, Snowden revelations and Pegasus spyware cases, it has
become evident that both democratic and non-democratic governments
often conduct surveillance on their citizens (Ekdale & Tully, 2019; Human
Rights Watch, 2014; Amnesty International, 2021). It is therefore unsur-
prising that most countries in southern Africa have joined the bandwagon
of imposing mandatory Subscriber Identity Module (SIM) card registra-
tion regulations, and some are the in process of coming with up contro-
versial data protection and cyber-security bills. There is plausible suspicion
that the United States, which has its army base in Botswana, has assisted
the country to implement a sophisticated surveillance infrastructure. Be
that as it may, there are few empirical studies (see Hunter & Mare, 2020;
4 A. MUNORIYARWA AND A. MARE
2
http://www.lemonde.fr/afrique/article/2018/01/26/a-addis- abeba-le-siege-de-l-
union-africaine-espionne-par-les-chinois_5247521_3212.html.
1 INTRODUCTION: TWISTS AND TURNS? FROM ANALOGUE TO DIGITAL… 5
Definition of Surveillance
Surveillance means different things to different constituencies in society.
The term ‘surveiller’, which is borrowed from French, refers to the prac-
tice of ‘watch over’. Whilst so many scholars (Andrejevic, 2007; Monahan,
2010; Randy & Murakami Wood, 2012; Murakami Wood, 2013a) have
propounded several definitions, David Lyon, who is one of the foremost
thought leaders in surveillance studies in the global North, has advanced
much more nuanced ones. Lyon (2003, p. 14) defines surveillance as “the
focused, systematic and routine attention to personal details for purposes
of influence, management, protection or direction”. It is important to
highlight the systematic and routine nature of surveillance regimes.
Furthermore, it is noteworthy to emphasize that surveillance is deployed
for specific purposes including attempts at influencing, managing, control-
ling and predicting. It encapsulates physical (face-to-face encounters) and
digital forms (mediated arrangements dependent on a wide and ever-
growing range of information technologies). As Lyon (2010b) observes,
surveillance can entail benign routines such as watching to enhance the
care and safety of the watched (such as patrolling malls by the police) or it
can involve an effort to control those whose conduct is under suspicion
(e.g., police on a neighbourhood stakeout) and permit discriminatory
practices (social welfare beneficiaries). In the case of social welfare benefi-
ciaries where surveillance is concerned with “sorting people into catego-
ries, and assigning worth or risk, it can have devastating effects” on
citizens’ life-chances (Lyon, 2003). Surveillance3 encapsulates various
modes of categorization and social sorting, where discrimination and priv-
ilege are entrenched through the unplanned consequences of data gather-
ing and analysis (Lyon, 2001a, 2003). Though state surveillance is not
necessarily unlawful, it can be harmful when deployed in contexts of politi-
cal repression that limit or restrict individual rights and freedoms. There
can be legitimate justifications (such as in combatting threats to the public
order or to safety) for undertaking mass or targeted surveillance. In addi-
tion, surveillance activities need to conform to “necessity and
3
Surveillance refers to “any collection and processing of personal data, whether identifi-
able or not, for the purpose of influencing or managing those whose data have been gar-
nered” (Lyon, 2001a, p. 1). At the core of this definition is the acknowledgement that
surveillance involves power. It involves the collection of information for the purposes of
“influencing or managing” some individual or group. Another important aspect is that sur-
veillance is relational, involving a power dynamic likely to unfold in complicated ways.
6 A. MUNORIYARWA AND A. MARE
4
It refers to those assets (online or offline), networks, systems, processes, information and
functions that are vital for the maintenance of vital societal functions, health, safety, security,
economic or social well-being of people, and the disruption or destruction of which would
have serious consequences.
8 A. MUNORIYARWA AND A. MARE
5
This refers to “the use of technical means to extract or create personal data” (Marx,
2002, p. 12).
1 INTRODUCTION: TWISTS AND TURNS? FROM ANALOGUE TO DIGITAL… 9
The surveillance regimes later evolved with the roll out of the pass sys-
tem. Through the pass system, colonizers, capitalists and business elite in
colonial Africa were able to remotely to police the movements of African
workers. In some areas, statutes on the books were too difficult or impos-
sible to enforce. The pass system was used for segregation, labour control,
and punishment (Kwet, 2020). Besides skin branding system, fingerprint-
ing was also introduced in order to simplify and the pass system at the
beginning of the twentieth century (Kwet, 2020). The introduction of
fingerprinting was the first attempt at institutionalizing the biometric
technology in colonial Africa (see Chap. 5, for a more nuanced take on
this subject). Together with the pass laws, the fingerprinting system was
adapted to local conditions (Kwet, 2020). During the colonial and apart-
heid eras, white elites in the public and private sector administered a dys-
topian surveillance state which brutalized and humiliated Africans for
centuries. Colonial powers collaborated with local elites on projects of
mass surveillance. Unlike other southern African countries, there was an
attempt by the National Party in apartheid South Africa to implement an
“all-seeing surveillance system” (Kwet, 2020). This panoptic system was
aimed at imposing a regime of fixed racial classification and keeping
detailed records about the African population. Built around the state-
mining industrial complex, the closed compound was designed to facili-
tate the panoptic surveillance of workers (Kwet, 2020). At the core of this
surveillance regime were technologies such as skin branding, fingerprint-
ing, photography and computer automation.
Surveillance regimes in Africa were always devised in collaboration with
foreign colonizers, imperialists, intellectuals, and profit-seeking capitalists
(Kwet, 2020). The trend has continued in postcolonial southern Africa,
with big technology companies and foreign powers such as United States,
Israeli, China, Russia and others playing a pivotal role. In South Africa, the
legal apparatus of race-based surveillance was only temporarily abolished
at the dawn of democracy in 1994 (Kwet, 2020; Duncan, 2018). However,
there is ample evidence that surveillance continued unabated in post-
apartheid South Africa (Duncan, 2018, 2022). This legacy of surveillance
was inherited by most postcolonial governments and used the system to
surveil ‘new’ surveillant subjects. In some cases, the system was repro-
duced as it is while in other cases the system was modified and refined to
meet the shifting targets of surveillance. The new targets of surveillance
included human rights lawyers, journalists, trade unionists, opposition
1 INTRODUCTION: TWISTS AND TURNS? FROM ANALOGUE TO DIGITAL… 11
6
This refers to colonial practices and cultures in the digital space, where Big Tech corpora-
tions from the global North exploit resources from the Global South in ways that mimic
traditional colonialism.
12 A. MUNORIYARWA AND A. MARE
7
AI is a set of theories, approaches, methods and applications—such as machine learning,
deep learning and neural networks—increasingly used in many aspects of computing and
everyday life.
1 INTRODUCTION: TWISTS AND TURNS? FROM ANALOGUE TO DIGITAL… 13
8
To consider surveillance as social sorting is to focus on the social and economic categories
and the computer codes by which personal data is organized with a view to influencing and
managing people and populations.
1 INTRODUCTION: TWISTS AND TURNS? FROM ANALOGUE TO DIGITAL… 15
9
This refers to conflicts that accompany and are triggered by democratic transformations
like constitutional, social protests, factionalism, accountability and electoral issues.
10
This is a state that sees surveillance as the solution to complex social issues. It collects
information on everyone, without regards to innocence or guilt, and pretends it is not
surveillance.
16 A. MUNORIYARWA AND A. MARE
software has been detected in Zambia, which was also identified as a major
regional surveillance hub in documents leaked by former NSA contractor
Edward Snowden (Greenwald, 2014). Leaked emails from the Italian sur-
veillance firm Hacking Team also revealed that the company might have
sold its sophisticated spyware known as Remote Control System (RCS) to
the Zambian authorities. Recent studies (Munoriyarwa & Chiumbu,
2022; Chiumbu, 2022; Phiri & Zorro, 2021) on smart cities project in
Zambia have flagged China’s influence in the emerging digital surveillance
cultures and practices.
Namibia has continued to consolidate its democratic institutions under
the leadership of President Hage Geingob in the past few years. There are,
however, concerns that the president and the South-West Africa Political
Organization (SWAPO) have become increasingly intolerant to divergent
political views. Facing challenges from youthful parties such as Affirmative
Repositioning (AR), Landless People’s Movement (LPM), Economic
Freedom Fighters Namibia (EFF-Namibia) and Independent Patriots for
Change (IPC), researchers have pointed out that the Government of
Namibia has begun to flex its surveillance muscles in order to monitor the
activities of opposition politicians, activists and journalists (Mare, 2019).
Calls for the regulation of social media have grown louder as the ruling
party feels the heat from restless unemployed youths. Endemic factional-
ism within SWAPO have also justified the need to ‘watch over’ comrades.
Sporadic protests such as #ShutItAllDown and #FeesMustFall have also
put the government on high alert. The United Kingdom has exported
highly invasive international mobile subscriber identity catchers (IMSI-
catcher) to Namibia (Links, 2018a). Mandatory SIM card registration was
implemented in 2022 in Namibia. In Botswana, cases of surveillance have
graced national and regional media following the ouster of Ian Seretse
Khama. The fall out between him and current President Masisi has threat-
ened to destabilize the country. After the arrest of Isaac Kgosi, the former
Director of Security Services (DISS) at the airport, he threatened to stage
a coup. It is believed that Mr Kgosi is aligned to President Khama’s fac-
tion. It is possible that surveillance is being used for factional purposes as
well as monitoring opposition parties.
Similar trends have been reported in Eswatini, Lesotho and Malawi.
The two small kingdoms (Lesotho and Eswatini) are believed to have also
acquired surveillance technologies to deal with their own peculiar politi-
cal, social and economic problems. Both countries have encountered a
series of social protests against the rule by Kings. In Eswatini, protestors
18 A. MUNORIYARWA AND A. MARE
have been killed and shot at by the security forces for demanding the res-
ignation of King Mswati. Opposition leaders, activists, journalists and
trade unions have been on the receiving end of the repressive state appa-
ratuses of the Eswatini. Fragile political arrangements in Lesotho have
rendered coups normal as politicians jostle for power. Protests and frac-
tious political coalitions have struggled to keep the country together. Like
her neighbours, Malawi was in a dire situation during the reign of Peter
Mutharika who was defeated by President Lazarus Chakwera. Authoritarian
tendencies led to a sustained cycle of protests in major cities and towns.
Opposition politicians, academics, human rights lawyers and activists have
been targeted for surveillance purposes. The two Lusophone countries in
SADC—Angola and Mozambique—have their own dynamics. Unlike
other southern Africa countries, Mozambique is the only a terrorist target.
Whereas Mozambique has justified its acquisition of surveillance technol-
ogies to fight terrorism in Northern parts of the country, Angola has done
so to quell social protests, factionalism and national security challenges.
Media reports have alleged that the Mozambican government engages in
monitoring of e-mails and internet traffic of members of opposition politi-
cal parties, and with capacity and support from the state of China.
As far as Zimbabwe is concerned, disputed elections, the resurgence of
the now rebranded Citizens Coalition for Change (formerly Movement
for Democratic Change [MDC] Alliance), militarization of politics and
fear of the return of the Generation-40 (G-40) splinter group from
ZANU-PF have rendered surveillance the weapon of last resort. Despite
limited government interference on the internet market, communication
surveillance has been happening for a long time in Zimbabwe (Mare,
2016a; Karekwaivanane & Msonza, 2021). Media reports suggest that it
is occurring secretly based on the leaked emails and WhatsApp chats of
Elizabeth Macheka, Tendai Biti and the late Morgan Tsvangirai during the
tenure of government of national unity (2009–2013). Furthermore,
research (Tendi, 2016; Media Democracy & Policy Project, 2019;
Munoriyarwa, 2021) suggests that surveillance has been used in the suc-
cession and factional battles which rocked the Zimbabwe African National
Union-Patriotic Front (ZANU-PF) in the run up to the party’s 2014
National Congress. The battles claimed the scalp of Vice-President Joice
Mujuru and a few former liberation war stalwarts. As Tendi (2016, p. 20)
argues, “invisible or seemingly ‘non-existent’ high-tech surveillance, tak-
ing the form of electronic bugs, hidden cameras, phone monitoring tech-
nology, voice cloning software, and drone cameras were apparently central
1 INTRODUCTION: TWISTS AND TURNS? FROM ANALOGUE TO DIGITAL… 19
11
Metadata can include the length of phone calls, the phone numbers of the caller and the
recipient, the serial numbers of the devices used and sometimes the locations of those who
made the call. It consists of information about who phone users call, when they call and for
how long.
12
Resistance can take many forms. It incorporates varying notions of action, interaction,
opposition, awareness and power. It has four consistent properties: its interactional nature,
the central role of power, how the concept of resistance is socially constructed and the com-
plex nature of resistance.
22 A. MUNORIYARWA AND A. MARE
COVID-19-Related Surveillance
Besides democratization conflicts, terrorism, crime, immigration and
national security concerns, it is important to tease out the role of pandem-
ics in the normalization of surveillance regimes in southern Africa. The
trend towards what Lyon (2002) refers to as “everyday surveillance” was
escalated during the on-going COVID-19 global pandemic. The
COVID-19 pandemic, which was first detected in Wuhan, China, in
December 2019, has disrupted our everyday lives. It has brought with it
practices such as lockdowns, self-isolation, wearing of face masks and
quarantine. Southern Africa has not escaped this phenomenon.
Governments have put in place measures to increase public health surveil-
lance, in some cases, without the necessary and proportionate legal frame-
works to safeguard citizens’ data and personal information. Theorizing
about the normalization of surveillance during the COVID-19 pandemic,
Lyon (2021a) has coined the term ‘pandemic surveillance’. The term
refers to “a situation where governments and private actors are allowed to
monitor and surveil the spread of the virus and to make sure citizens fol-
low the measures they put in place” (Lyon, 2021a: n.p). It manifests itself
in different forms and shapes depending on contextual peculiarities. As a
result, several governments and private actors have been able to mobilize
massive and unprecedented quantum of public health data to contain and
combat the virus. The SADC region has witnessed the unprecedented
acquisition and deployment of surveillance technologies like contact-trac-
ing apps, facial recognition, filling in of public registers and population
tracking. Whilst there are tangible benefits associated with pandemic sur-
veillance, it is noteworthy to foreground the unintended consequences of
such practices. This is very important in context where data protection
laws are weak and at worst non-existent as well as oversight systems are
compromised. Most surveillance programmes put in place in response to
the COVID-19 pandemic in southern Africa violated privacy protections
as enshrined in national constitutions. They also contradicted an ethics of
care as evidenced African philosophical underpinnings such as ubuntu. In
the age of data deluge, pandemic surveillance has been critiqued for
1 INTRODUCTION: TWISTS AND TURNS? FROM ANALOGUE TO DIGITAL… 23
violating the basics of ‘data justice’. This refers to “fairness in the way
people are made visible, represented and treated as a result of their pro-
duction of digital data—is necessary to determine ethical paths through a
datafying world” (Taylor, 2017, p. 1).
The magnitude of the COVID-19-related surveillance expansion in
southern Africa will take a long time to quantify but there is anecdotal
evidence which suggests that most governments have upped their ante in
terms of collecting and processing personal information related to the
public health disaster over the last three years. For instance, in the wake of
the COVID-19 pandemic, some governments in southern Africa used AI
powered by data science and machine learning in public health manage-
ment and public policy to model and predict outbreaks and COVID-19
spread and help with contact tracing (Mudongo, 2021). Some of the
southern African governments are increasingly adopting measures that
could lead to violations of human rights. This raises the challenge of pre-
serving and upholding both individual and collective rights (Mudongo,
2021). Without adequate safeguards on data protection and protection of
personal information, it is arguable that citizens’ data and personal infor-
mation collected as part of the COVID-19 pandemic could be abused by
governments and private companies for political and economic gains.
Cases abound where some of the public registers have been sold to adver-
tising agencies. It is within this context that Lyon (2021a, n.p) questions
whether this new culture of pandemic surveillance will become a perma-
nent feature of post-pandemic societies? If so, this will undoubtedly have
long term effects on social inequalities and human freedoms.
Theorizing Surveillance
In view of the expanding range and diversity of surveillance sites, we jet-
tison the deployment of grand theories in favour of an eclectic approach
that emphasizes structuration (structure and agency). Such an approach
allows us to analyse the causes, the courses, political economy, resistance
and the consequences of surveillance. We acknowledge that surveillance
processes are more complex, ambiguous and open-ended than the panop-
ticon allows. We go beyond the notion of ‘Big brother’ by underscoring
post-panoptic theories of surveillance. Drawing inspiration from Giddens
(1984), we posit that there is structuration between socio-technical sur-
veillance systems and surveillant subjects. Our argument is that
24 A. MUNORIYARWA AND A. MARE
Adding their voice to the critiques which have been levelled against
Foucauldian theorization, Haggerty and Ericson (2000) argue that the
deployment of the panopticon metaphor is not suitable for analysing sur-
veillance in the information society, because surveillance would no longer
serve the single coherent purpose of control. Haggerty argues that the
panopticon directs scholarly attention to a select group of surveillance
attributes while neglecting “a host of other key qualities and processes of
surveillance that fall outside of the panoptic framework” (2006, p. 23).
There are two problems with the Foucauldian literature outlined earlier.
First, surveillance subjects are portrayed as “passive” subjects or “docile
bodies”, rather than social agents who may negotiate, modify, evade or
deny surveillance practices (Coleman & McCahill, 2011b). Second,
Foucauldian accounts of “the movement of panoptic principles into new
settings [are] often presented as entirely frictionless” and lacking any
“sense of a surveillance politics” (Haggerty, 2006, p. 34). Haggerty goes
further with this same criticism stating that “the panoptic model does not
contain an image of resistance” (2006, p. 36).
13
Sousveillance is ‘watching from below,’ a form of inverse surveillance in which people
monitor the surveillors. It includes citizen video, watchdog web sites or the monitoring of
authorities (corporations, military and government). It also embraces the idea of transpar-
ency as an antidote to concentrated power in the hands of surveillers.
28 A. MUNORIYARWA AND A. MARE
are likely not much more ‘secure’. More important, ‘protection’ from the
‘surveillance threat’ is often understood as a series of measures undertaken
by individuals, hiding the collective possibility for resistance (Fernandez &
Huey, 2009).
over-
emphasizing pervasive constraints and their changing logics over
time, Scott’s theory foregrounds small-scale, everyday, tiny activities that
human agents could afford to articulate given their political constraints.
Instead of revolutionary social and political change, everyday forms of
(surveillance) resistance acknowledges that the ‘local’ and individual
should be recognized as a significant site of struggle as well as a unit of
analysis. It posits that organized collective action against surveillance may
not be possible everywhere, and thus alternative forms of struggles must
be discovered and acknowledged (Bayat, 2009, p. 48). This approach
expands the domain of politics to the realm of everyday life (to what Scott
(1976) calls the ‘infrapolitics of the powerless’) beyond formal organiza-
tions (like civil society organizations and social movements) and collective
mobilizations (visible protests and marches).
Methodological Approach
Our book relies on a qualitative research methodology. Unlike quantita-
tive research, the advantage of qualitative research methodology is that it
allows one to understand social phenomena from the perspective of social
actors, to retrieve experiences from the past and to gain insight into the
everyday practices of social actors (Babbie & Mouton, 2001). It starts
from the assumption that in studying people, researchers are examining a
creative process whereby humans produce and maintain forms of life, soci-
ety and systems of meaning. It puts emphasis on ‘thick descriptions’
(Geertz, 1973), which are the detailed description of the phenomenon
under study. As Bryman (1988, p. 63) observes:
* *
*