Connect with us

Op-Eds

How to Re-Invent Money: Notes for Cryptocurrency Techno-Warriors

8 min read.

Ultimately money is a social contract DAVID NDII argues. And though Bitcoin and cryptocurrencies may yet emerge as transformative disrupters of human and economic relations, certain fundamentals need to be in place if they are not to go the way of other fads past. History teaches us that ultimately monetary delinquency is one of the more reliable harbingers of revolution. If government makes a mess of our money, we can always behead the King.

Published

on

How to Re-Invent Money: Notes for Cryptocurrency Techno-Warriors
Download PDFPrint Article

Ten years ago, an anonymous person or people known as Satoshi Nakamoto published a paper announcing a monetary innovation described as a peer-to-peer electronic cash system. “Peer-to-peer” means a system of exchange that does not require intermediaries, such as banks, to function. When we use a card to buy something at the supermarket, the holder’s account is debited and the account of the merchant is credited. There are at least three intermediaries to this transaction namely, the card-holder’s bank, the supermarket’s bank and the card issuer all who make some money from it, and there is of course the governments which are the ultimate guarantors of the payment systems we use.

The system devised by Satoshi Nakamoto known as Bitcoin became the progenitor of cryptocurrencies. Instead of the accounting systems of banks and other intermediaries, the cryptocurrency systems use a digital public register, known as a blockchain. When people transact, the transaction appears on the public register. The transaction’s security and validation services that we rely on: banks, card issuers, central banks and lately telcos and “fintechs” in the case of mobile phone payments platforms, is done by techies called “miners” who compete to verify transactions by solving puzzles. The miner who completes the verification first earns some bitcoins. So in effect, the claim that there is no third party intermediary is not quite accurate. What they have done is to replace centralized systems and authorities with a decentralized free-for-all system.

Bitcoin appeared have settled at around $1000 up until January 2017, when it began what was to become an unprecedented rise. In December 2017 it peaked at a little over $19,400. A year later it is down to under $4000. Bitcoin is now billed as the most spectacular financial bubble on record.

At the height of the cryptocurrency boom, enthusiasts were declaring fiat currencies history. Fiat money is a currency decreed by governments to be the “legal tender” in its jurisdiction and is one of three types of money that have existed in history. The other two are commodity and credit money. Commodity money is something of intrinsic value such as precious metals that is generally accepted for payment. Credit money arises when debt instruments typically issued by a reputable party such as a bank, wealthy enterprise or government becomes accepted for payment. The word “banknote” originates from the “free banking era” in the US, when promissory notes issued by banks were generally accepted as means of payment. Today’s prominent fiat currencies such as the US dollar began life as promissory notes issued by governments mostly to finance wars.

Bitcoin appeared have settled at around $1000 up until January 2017, when it began what was to become an unprecedented rise. In December 2017 it peaked at a little over $19,400. A year later it is down to under $4000. Bitcoin is now billed as the most spectacular financial bubble on record.

As Bitcoin soared, Initial Coin Offerings (ICOs) began to look uncannily like the prospectuses of South Sea Bubble companies (such as my personal favourite: “For carrying out an undertaking of great advantage; but nobody to know what it is”). Economists, who pointed this out, including this columnist, were dismissed as luddites who were stuck in old school thinking. Cryptocurrency and blockchain were the ultimate technological disrupter. We were on the cusp of a new economic architecture where the old rules would no longer apply.

Today’s prominent fiat currencies such as the US dollar began life as promissory notes issued by governments mostly to finance wars.

The cryptocurrency techno-warriors may yet have the last laugh. But to do that they would do well to learn a thing or two about the competition.

Up until they were colonized a century ago, my Agikuyu forebears were moneyless. In Elspeth Huxley’s irreverent parody of the Agikuyu’s early encounters with Europeans Red Strangers, this is what ensues when Muthengi is offered a job that pays five rupees a month: 

“I do not want these metal objects,” Muthengi answered. “What can I do with them? Why does he not give me goats?”

It is the same as if he gave you goats” the interpreter said. “You can exchange rupees for goats.”

“How many are needed to obtain a goat?”

One rupee will buy one goat?”

Muthengi could conceal his incredulity no longer. It was impossible to believe that the world held anyone so foolish as a man who would surrender a goat for a useless piece of metal possessed, it seemed, of no magical powers. But the thought of five goats a month burrowed like a mole underneath Muthengi’s mind. It seemed incredible, yet what if it could be true? Five goats a month, thirty goats a season, two hundred and ten goats in four seasons with the increase of one to each female in a season…it was impossible to encompass so many goats with the mind’s eye.

Muthengi accepts, dutifully converts his five rupees pay into goats every month, and becomes very rich.

In economics, we tend to look at money like Muthengi. Since money is not of itself productive people ought not hold on it longer than necessary, they would convert it to goats as soon as they are able. Money would be constantly changing hands, lubricating commerce. Why then, is money such a big deal?

To study questions like these, economists sometimes resort to reverse engineering to see whether we can build a model in which the thing in question arises “endogenously.” By “endogenous” we mean that it is not introduced by an outside agent, such as the mysterious Satoshi Nakamoto.

As Bitcoin soared, Initial Coin Offerings (ICOs) began to look uncannily like the prospectuses of South Sea Bubble companies. Economists who pointed this out were dismissed as luddites who were stuck in old school thinking. Cryptocurrency and blockchain were the ultimate technological disrupter. We were on the cusp of a new economic architecture where the old rules would no longer apply… The cryptocurrency techno-warriors may yet have the last laugh. But to do that they would do well to learn a thing or two about the competition.

Students of economics know that money serves three functions: a medium of exchange, a unit of account and a store of value. Our earliest ancestors were hunter-gatherers. We do not know for sure whether hunter-gatherers invented money. It is not evident that small bands of hunter-gatherers would find need to invent a medium of exchange, or units of account.

But one thing we are sure of is that hunter-gatherers grew old. They would have had to figure out some means of surviving in old age. One of these is to cultivate social bonds which obligate progeny to provide for the elderly. This is quite evidently true, but it is not entirely sufficient since not everyone will have children, and it is far from certain that children will survive to support their parents in old age. Thus, kinship-based old age security will result in some old people enjoying good care from their progeny, and others dying of destitution, quite an unsatisfactory situation.

Trading seems to be one of the things that we do naturally. Two hunter-gatherers, one who has caught an antelope and the other has harvested wild honey bump into each other on the way home. Can I have some of that, for some of this? Markets enable strangers to meet each other’s needs. Can the market find a solution for the old age security problem?

Now, imagine a small hunter-gatherer community with a population of two hundred people. Each person lives for two periods, youth and old age, and is endowed with three units of a consumption good, manna from heaven if you like, when young and one unit when old. As per the law of diminishing returns, consuming the first unit yields 20 units of happiness, the second yields 15 and the third yields 5 units. As shown in the table, if each person consumes only their endowment, they enjoy 60 units of happiness. If they can trade so that each person consumes two units in each stage, each person would enjoy 70 units of happiness in their lifetime.

In economics, we tend to look at money like Muthengi. Since money is not of itself productive people ought not hold on it longer than necessary, they would convert it to goats as soon as they are able. Money would be constantly changing hands, lubricating commerce. Why then, is money such a big deal?

This set up is called an overlapping generations model and is one of two devices that economists use to study long run economic dynamics (the other one is called an infinite horizon model). It was formulated by French economist Maurice Allais and refined by Paul Samuelson in a seminal 1958 paper titled A Consumption Loans Model of Interest with or without the Social Contrivance of Money. My set-up here conveys the gist of Samuelson’s model but the formulation and parameters are my own.

If the community can find a way to trade, everyone will enjoy 10 more units of happiness.  One way of thinking about this is as an increase in life expectancy from 60 to 70 years. The problem with this trade is that it cannot be conducted bilaterally, peer-to-peer if you like.  The young can support the old today, who will then die. For their own old age security, they will need the support of the next young generation which is as yet unborn. However, if society were to device a voucher, a receipt if you like, that is given to each prime-age adult in exchange for giving up one consumption good unit to support an old person, they can trade vouchers with the subsequent generation.

Be it a strip of buffalo hide, or a string of cowrie shells, a social security card or a promissory note, it stands to reason that once it’s invented each successive generation will value them, since everyone will also need to secure their old age with the successor generation. Individuals need no longer fear old age destitution on account of not having family support in their old age. In fact, this market system could have the unintended consequence of undermining the kinship system, as Alessandro Cigno observes in his book Economics of the Family:

“the growth of the financial sector (including in that the social security system, as well as banks, private insurance and the stock exchange) tends to coincide, in the development of an economy, with a sharp fall in fertility, the break up of extended family networks and a widespread reluctance on the part of the middle aged to accept responsibility of elderly relatives.”

Now that we have a theory of money, we can examine what attributes sound money should have. First, it needs to be trusted. Every voucher must be a legitimate store of value. It is not difficult to see that people entrusted with its production may be tempted to game the system by producing more vouchers than needed, and some people will find themselves with vouchers that command less than what they put it. Second, it should be possible to increase the number of vouchers in tandem with the population growth To see this, let us suppose the next generation increase to 110 people, an additional ten vouchers will be needed otherwise some of its members will be locked out of the intergenerational trade.

What then, are the lessons to be learned by people seized with the idea of re-inventing money?

One of the key requirements of sound money is a credible supply rule. In our simple model, the anchor is population growth. But it so happens that in our model population growth and economic expansion are identical, therefore it is the same as a money supply rule that is anchored on the size of the economy. Satoshi Nakamoto decreed that the bitcoin algorithm would cease after 21 million of them were mined. Why 21 million? Nobody seems to know. In effect, as a currency, bitcoin had the same flaw that undermined gold and silver, namely arbitrary supply that is unrelated to demand.

A second flaw is the tech-hype the cryptocurrency as the ultimate disruptive technology that would liberate society from the state-financial capitalist stranglehold. Because the value of technology innovations is highly uncertain, the value of bitcoin became entwined with people’s subjective guesses and predictions of what that value might turn out to be, as opposed to the economic fundamentals. We call this a sunspot equilibrium. For an asset purporting to be money, it is a highly undesirable attribute. It is this particular flaw that fueled the speculative bubble. This eventuality could have been mitigated by creating two assets: one that would profit from the innovation and one that reflected the economic fundamentals.

One of the key requirements of sound money is a credible supply rule. In our simple model, the anchor is population growth. But it so happens that in our model population growth and economic expansion are identical, therefore it is the same as a money supply rule that is anchored on the size of the economy. Satoshi Nakamoto decreed that the bitcoin algorithm would cease after 21 million of them were mined. Why 21 million? Nobody seems to know.

The third and perhaps fatal flaw is that cryptocurrency inventors failure to appreciate that fundamentally, money is a social contract. Social acceptance is what makes cowrie shells, beaver pelt, silver, gold or pieces of paper issued by government a currency. Of all our social contrivances, the one that money shares most attributes with is the state. It should not surprise then, that money has evolved into government-issued fiat currencies. But just like in governing, it does not mean that governments will excel in monetary affairs. In fact, the quality of a country’s money and governance tend to be closely correlated. Robert Mugabe’s ZANU-PF regime is but the latest to make a mess of both.

Monetary delinquency is one of the surer harbingers of revolution. If government makes a mess of our money, we can always behead the King. Which is just as well that Satoshi Nakamoto had the foresight to be anonymous. Could be he/she/they knew something that their starry-eyed cryptocurrency enthusiasts did not.

Support The Elephant.

The Elephant is helping to build a truly public platform, while producing consistent, quality investigations, opinions and analysis. The Elephant cannot survive and grow without your participation. Now, more than ever, it is vital for The Elephant to reach as many people as possible.

Your support helps protect The Elephant's independence and it means we can continue keeping the democratic space free, open and robust. Every contribution, however big or small, is so valuable for our collective future.

By

David Ndii is a leading Kenyan economist and public intellectual.

Op-Eds

Land Title and Evictions in the Supreme Court of Kenya

Violent evictions of families from their homes are not exceptional events. They go to the heart of Kenya’s political economy and its long history of valorising the rights of those who hold private title.

Published

on

Land Title and Evictions in the Supreme Court of Kenya
Download PDFPrint Article

The Supreme Court of Kenya published its judgment in William Musembi v The Moi Educational Centre Co. Ltd. on the 16th July 2021. The case arose after fourteen families — the residents of two informal settlements, City Cotton and Upendo village in Nairobi — petitioned the High court following their evictions in 2013. They had lived on the land since 1968 when it was public land. The first respondent claimed that they had legitimately acquired title to the land by letters of allotment and that the land was therefore private land. According to Amnesty Kenya, the evictions began in the early morning, without warning. Groups of young men burst into homes. Four hundred homes were demolished and personal possessions were destroyed. Crowbars and sledgehammers were used. The police were present. They fired live ammunition and used teargas canisters during the operation.

In the High Court, Judge Mumbi Ngugi held that the petitioners’ rights to dignity, security, and adequate housing had been infringed. There had been a violation of the rights of children and elderly persons under the constitution. She awarded damages. At the Court of Appeal this judgment was partially set aside. While accepting that there had indeed been violations of the rights to dignity and security, the Court of Appeal nonetheless set aside the order of damages arguing that “there was no material before the court on the basis of which the orders for compensation were made” and that, because it was unable to work out how the damages had been quantified, “the only relief that should have commended itself to the trial Court was a declaration that the forced eviction and demolition of their houses without a Court order is a violation of their right to human dignity and security.” Following this, the petitioners appealed to the Supreme Court.

Importance of the Supreme Court judgment

The importance of this case is, as Gautum Bhatia has written, that it raised the question whether “the right to accessible and adequate housing could be applied inter se between private parties”. It can thus be distinguished from the same Supreme Court’s Mitu-Bell Welfare Society v The Kenya Airports Authority, which ruled on evictions from public land.

Amongst several issues for determination, the petitioners in the present case asked the court to reach a determination of the question whether the letter of allotment held by the first respondent, the Moi Educational Centre, was issued lawfully or legally. Because that question had not been conclusively determined at the High Court or at the Court of Appeal, the petitioners sought “a declaration that the acquisition of the suit property was illegal and unlawful.”

The Supreme Court declined to do this. Arguing that in the High Court Judge Mumbi Ngugi had been right in holding that the question of the propriety of the first respondent’s title was a matter for the National Land Commission and that it is the Land and Environment Court that properly has jurisdiction over this question, the Supreme Court held in William Musembi that “the title of the first respondent remains unimpeached”. Instead, it held, the only question it ought to determine was whether, in evicting the petitioners, the respondents violated the petitioners’ rights to human dignity and security, as well as the rights to housing and health.

It is on the basis of the “unimpeached” title of the first respondent that the court goes on to make its landmark finding. For determination by the court was the question whether the first respondent, being a private party, could nonetheless be responsible for the violation of constitutional rights. Recognising that “the mandate to ensure the realization and protection of social and economic rights does not extend to the first respondent” because it is a private entity which is not under any obligation to ensure the progressive or immediate realisation of those rights, the court found that private parties do nonetheless have a “negative obligation to ensure that it does not violate the rights of the petitioners.”

For Bhatia, the judgment’s significance lies partly in its finding that “a negative obligation not to interfere with socio-economic rights (such as the right to housing), …applies to both public and private parties” although he argues persuasively that “the distinction between negative and positive obligations is doing a lot of work” and that the concrete practice of evictions significantly blurs the boundary between public and private actors. He rightly notes that “evictions invariably involve concert of action between State forces and private landowners, with the latter relying upon the former (either directly, or through forbearance) to accomplish physically removing people from land.”

Public and private

If the distinction between negative and positive obligations is somewhat artificial, I also want to suggest that Kenya’s history of land grabbing shows that so too is the distinction between the state and private landowners. More than just state forces doing the bidding of private landowners, wielding batons and using bullets to break into homes in the early morning, in Kenya the state/private distinction is a mirage. In William Musembi, the court does not elaborate on the important history of letters of allotment in Kenya and the process by which they enabled public land to morph into private land. Instead, it affirms the first respondent’s title – and proceeds to make an important ruling on the obligations of private actors. However, the history of land grabbing and the murky past of letters of allotment is a critical one to keep at the front of our minds.

For determination by the court was the question whether the first respondent, being a private party, could nonetheless be responsible for the violation of constitutional rights.

The report of the Commission of Inquiry into the Illegal/ Irregular Allocation of Public Land established in 2003 set out in forensic detail the illegal and irregular land awards made over the years using the mechanism of the letter of allotment. Awards of land were made to the families of Presidents Kenyatta and Moi, numerous former ministers, members of parliament and civil servants, as well as to individuals in the military and the judiciary. The report sets out how out of proximity to the state, private property owners were created. Public land – land set aside for the building of public health clinics or schools for example – mysteriously turned into private land on which malls, private residences, and diplomatic headquarters appeared. No doubt some individuals acquired perfectly legitimate letters of allotment. But from the 1970s onwards, a thriving market in improper letters of allotment developed. They came to be treated as tradable land documents. Widely but mistakenly used as land titles (with the collusion of lawyers), they changed hands quickly in sales of grabbed land. This was done in order to get the benefit of the principle that an innocent third party for value without notice takes good title. The full extent of this practice is unknown: the Ndung’u Commission warned that its report provided only a snapshot of the illegal/irregular land allocations that had taken place over the years.

I have written elsewhere that land grabbing is sedimented in Kenya’s political economy such that we can describe it as a “grabbed state”. The “normal” economy is founded on accumulation by dispossession. It is not possible to understand Kenya’s political economy without an understanding of how the normal and the supposedly abnormal are pervasively linked. Far from land grabbing being an aberrant phenomenon that can be sharply distinguished from normal business practice, the illegal and irregular appropriation of land structures Kenya’s economy.

Widely but mistakenly used as land titles (with the collusion of lawyers), they changed hands quickly in sales of grabbed land.

There is no operative distinction between the public and the private in Kenya. This makes the judgment in the present case even more consequential: given the history of these murky conversions in title, the judgment’s finding that negative constitutional obligations can attach to private actors is likely to cover a great many potential eviction scenarios. Indeed, I would argue that given the history of land described above, the court should have gone further. Grounding its reasoning in Kenya’s history of land grabbing and the dispossession and discrimination that resulted, it could have held that positive socio-economic obligations (such as providing alternative accommodation) should extend to private parties. Or it might have held that given the extent of land grabbing — which is a matter of public record — the state should not agree to enforce a court order for eviction until it is satisfied that alternative accommodation has been provided.

Entrenching private property

Welcoming the Supreme Court’s judgment, Bhatia has noted that it “continues the welcome trend of judicial scepticism towards entrenched property rights.” The court demonstrated this scepticism by extending negative constitutional obligations to private actors. However, to do so, the Supreme Court moved to confirm the respondent’s title. That title it described as “unimpeached”. The court used this as the basis for setting out the first respondent’s obligations as a private owner. The extension of constitutional obligations to private actors is to be welcomed. But it is important to recognise also that by refusing jurisdiction to question the first respondent’s title – and ruling that this is a matter for another forum – the Supreme Court effectively sanctioned the enclosure of what the appellants claimed was unalienated public land and potentially legitimated the grabbing of public land.

The court does not elaborate on the important history of letters of allotment in Kenya and the process by which they enabled public land to morph into private land.

Instead, the Supreme Court might have used Art. 23 which provides for the authority of courts to uphold and enforce the Bill of Rights, to try to fashion a remedy. It could have expressly referred the question of the integrity of the first respondent’s title to the National Land Commission rather than state as unequivocally as it did that it is unimpeached. At the very least, given the importance of a letter of allotment and the question of title in the case, the court should have rehearsed Kenya’s history of land grabbing and corruption as revealed by the Ndung’u report so as to give it judicial notice and provide a starting point for the wider task of challenging ill-gotten titles by those who might seek to do so.

Reinstating Judge Mumbi Ngugi judgment in the High Court and in particular her finding that damages should be paid to those evicted, the Supreme Court ordered the first respondents, the Moi Educational Centre, to pay fourteen families KSh150,000 (just over 1000 euros) each in damages. The government will also pay each family KSh100,000. In return, unless the National Land Commission or the Land and Environment Court are asked to rule on the propriety of the first respondent’s title and find against them, the Moi Educational Centre now hold unimpeached title to very valuable land in Nairobi. That is quite a windfall.

Violent evictions of families from their homes are not episodic and exceptional events. They go to the heart of Kenya’s political economy and its long history of valorising the rights of those who hold private title, however acquired. How far can the courts be relied upon to undo accumulation by dispossession?

Continue Reading

Op-Eds

South Africa Has to Heal Its Troubled Past – and the Time Is Now

If there is no material justice and investment in healing the generations of harm enacted onto South Africans, the rot in the country’s wounds will overcome them.

Published

on

South Africa Has to Heal Its Troubled Past – and the Time Is Now
Download PDFPrint Article

Social unrest”—though others may prefer “riots and looting,” “food riots,” or “insurrection”—have swept South Africa since Monday. It’s unsettled an already unsettled nation. And as with all South Africa’s heightened moments, our historic fault lines have been re-exposed. Racial and ethnic divisions, class antagonisms, xenophobia, questions of violence and its use. These are some of our wounds that have never been treated. Over the last decades we’ve covered them with patriotic bandages, unity slogans and surface-level performances of a shared national consciousness. But the wounds have opened again now, and as the country bleeds, the rot is open for all to see. Flashing moments tell an incomplete but tragic story of the reality unfolding in our country.

Impoverished communities with limited prospects, rejoice as they leave megastores with stolen food and essential resources. Elderly women are seen taking medication that they otherwise could not afford. A father exits a store with nappies (diapers) for his child. Families that have struggled with eating daily meals suddenly have food for a month.

Elsewhere, in the historically Indian community of Phoenix, an elderly man is surrounded by people from a nearby  informal settlement. He is commanded that he needs to hand over his home, or otherwise will face attacks on his family in the dead of night. In the night, drive-by shootings claim lives as stray bullets shatter family homes.

Armed Indian and white “vigilantes” drive around shooting African people they assume are looters. Hunting them down while recording vicious videos, beating them with sjamboks as the person begs for their lives.

These videos are shared and watched repeatedly across social media, racially charged viewers salivate with a carnal sense of pleasure as one racial group watches the other suffer and bleed.

At least 15 people are killed by armed community members of Phoenix. They blockade roads entering the community, racially profiling people, preventing them from access to functioning supermarkets. Bodies are found in the night. #PhoenixMassacre trends on twitter echoing disgust and outrage at the anti-black sentiment within the South African Indian community.

The home of Thapelo Mohapi, the spokesperson of Abahlali BaseMjondolo, the shack dwellers movement in KwaZulu-Natal that safeguards working-class interests, has his home burnt down on Wednesday morning. Mohapi, like most in Abahlali, is outspoken against ANC corruption and political violence in the country, with Abahlali members often the targets for political killings.

Shacks burnt down in response to the looting. Reports of xenophobic attacks by the rioters. Families terrified as gunshots break their windows. Small community stores torched. Blood banks and clinics ransacked. Essential foods become scarce, gas stations close.

The excitement of people getting access to expensive TVs, furniture, alcohol, and commodities they would not be able to access otherwise. Because in South Africa we know that nice things are reserved for a minority—and you either have to be crazy lucky and gifted, or crazy devious and connected, to escape the poverty cycle.

This is the status quo of our neocolonial, violent and divided country. Every snapshot from the riots reveals a new layer of a tragedy we’re all too familiar with but have made no substantial material effort to address to this point. And now the rot in our open wound has become septic.

In the midst of all this mess and complexity, many are now left trying to make sense of where they stand regarding these riots—with the mask of a shared national consciousness being ruthlessly peeled back — some who thought they understood their political standings are having to rethink their position after being thrust into a violent situation where racial and class perceptions pre-determine their position for them.

Orchestrated or Inevitable?

Acentral question on people’s minds is who is responsible for the unfolding events. How much of it is orchestrated as part of the #FreeZuma campaign that sparked this moment with former President Zuma’s arrest, and how much is simply an overflow from the desperate situation a majority of South Africans find themselves in. The reality is, of course, complex. Reports from activists on the ground and observers indicate the riots are likely made up of multiple forces.

Some are believed to be political agents of the pro-Zuma faction of the African National Congress ANC, using chaos to fight their battle against President Cyril Ramaphosa. These agents are known to have organized the initial demonstrations and are believed by some commentators to continue funding transport for rioters and operating in the background to hamstring the local economy. Some now attribute this orchestrated terror with the targeted burning of key distribution centers, factories, network towers, and trucks.

Others involved are not politically linked to a factional ANC agenda or desire to destabilize the country. They are there because the moment has presented families with access to food under dire circumstances and the opportunity for temporary relief from the dredges of poverty. One may say that their situation is being purposefully manipulated by political agendas, but the material reality of their situation is no less real. Individuals from well-known working class organizations that are strongly anti-ANC in all forms have reported taking part in looting as the moment allowed for sorely needed aid to struggling communities.

And of course, with any mass gathering, there are simply those criminal elements who use the moment with malicious intent, stirred by past and present grudges, looking to impose power and fear on those they see as “other.” Yet, these malicious sentiments exist on both the “sides” of the rioters and those responding to them. It is every person’s right and entitlement to defend themselves, their family, and personal property from harm against malicious forces. But much of this defence and protection of what is dear  has morphed into older desires to harm, dehumanize, and kill those considered “other.” How much of our violence in the name of defence is rooted in the historic rot we’ve left untreated from colonialism, apartheid, and a world that hates poor people?

Military intervention

Many are in support of the President Cyril Ramaphosa’s position that the army be deployed to quell the riots, looting, and violence. They argue for an armed, militant, and potentially lethal response.

Part of this rationale is in response to the signs of orchestration and mobilization by pro-Zuma political forces. As some of the actions show signs of being organized and targeted strikes, they will not subside organically and so the use of intelligence and organized force would be necessary to intervene. This tactical move acts in support of the President Cyril Ramaphosa and preserving the current status quo of South Africa.

The other reason is that the racial conflict between communities has reached such a heightened state that many fear an echo of the Durban Riots of 1949. With armed vigilantes enacting destruction, racial profiling, and vicious killing onto those they brand “looters”—  and the responsive revenge cycles this opens up—there can be no road that does not lead to further death. And right now there is no Steve Bantu Biko and his dear friend Strini Moodley to lead us back on the path towards a more human face.

However, even in the face of this leadership vacuum, military intervention is short sighted, ahistoric, and temporary at best. The wounds are all open now, the military cannot heal, only repress.

Ultimately the scale and intensity of these riots have very little to do with political infighting within the ANC and the tensions between communities could not be set alight if there was not already kindling of unresolved tensions. The material conditions of South Africa indicate that it’s been ripe for mass political uprising for years now. With grants cut under lockdown, youth unemployment over 70%, service delivery a mess or none existent, trust in government, media and political parties at record lows—there seems to be meagre hope for South Africans on the wrong side of the poverty line—and very little to lose.

Whether it’s an orchestrated plot by devious political agendas, a student throwing poop on a colonial statue or an increase in bread prices as was seen in South America—a spark is all that’s needed to set alight a desperate people.

The best case scenario with military intervention this time is further repression of people’s material frustrations. If people die, the situation becomes further inflamed. When the next spark goes off the riots will be more organized, with living memory of the injustices of this moment. And if not organized by our dysfunctional Left, it will be led by reactionary forces. Most dangerous of all is, as with other examples from history, as military forces play a greater role in a country’s internal policing, they become more used to enacting power over its populace, and ambitious autocrats rise up their ranks in military command.

With military intervention, we admit that the violence and death that will be enacted on the working class populace is worth a return to South Africa’s abnormal normal. The violence of this moment simply transferred back to those who held it silently a week ago.

Repression and military enforcement of a violent status quo is not the answer. Material conditions need to change, people need to be fed, grants need to be returned and our septic wounds that have laid open for centuries need urgent attention.

If there is no material justice and investment in healing the generations of harm enacted onto us—and by us—the rot in our wounds will overcome us. And we will become the rot.

This post is from a partnership between Africa Is a Country and The Elephant. We will be publishing a series of posts from their site once a week.

Continue Reading

Op-Eds

They Are Watching You: Israeli-Made Spyware Used to Monitor Journalists and Activists Worldwide

The use of spyware to surveil, harass, and intimidate journalists and activists — and those close to them has become a key activity for many governments worldwide.

Published

on

By

They Are Watching You: Israeli-Made Spyware Used to Monitor Journalists and Activists Worldwide
Download PDFPrint Article

In Hungary, Szabolcs Panyi exposed spy intrigue and murky arms deals. In India, Paranjoy Guha Thakurta probed the ties between business and political interests. In Azerbaijan, Sevinj Vaqifqizi caught vote-rigging on tape.

Separated by thousands of miles, these journalists have one thing in common: their governments considered them a threat.

All three were among dozens of journalists and activists around the world whose smartphones were infected by Pegasus: spyware made by Israeli firm NSO Group that is able to secretly steal personal data, read conversations, and switch on microphones and cameras at will.

The attacks were revealed by The Pegasus Project, an international collaboration of more than 80 journalists from 17 media organizations, including OCCRP, and coordinated by Forbidden Stories.

What Does ‘Selected for Targeting’ Mean?

The phones of Panyi, Thakurta, and Vaqifqizi were analyzed by Amnesty International’s Security Lab and found to be infected after their numbers appeared on a list of over 50,000 numbers that were allegedly selected for targeting by governments using NSO software. Reporters were able to identify the owners of hundreds of those numbers, and Amnesty conducted forensic analysis on as many of their phones as possible, confirming infection in dozens of cases. The reporting was backed up with interviews, documents, and other materials.

The strongest evidence that the list really does represent Pegasus targets came through forensic analysis.

Amnesty International’s Security Lab examined data from 67 phones whose numbers were in the list. Thirty-seven phones showed traces of Pegasus activity: 23 phones were successfully infected, and 14 showed signs of attempted targeting. For the remaining 30 phones, the tests were inconclusive, in several cases because the phones had been replaced.

Fifteen of the phones in the data were Android devices. Unlike iPhones, Androids do not log the kinds of information required for Amnesty’s detective work. However, three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

In a subset of 27 analyzed phones, Amnesty International researchers found 84 separate traces of Pegasus activity that closely corresponded to the numbers’ appearance on the leaked list. In 59 of these cases, the Pegasus traces appeared within 20 minutes of selection. In 15 cases, the trace appeared within one minute of selection.

The strongest evidence that the list really does represent Pegasus targets came through forensic analysis.

Amnesty International’s Security Lab examined data from 67 phones whose numbers were in the list. Thirty-seven phones showed traces of Pegasus activity: 23 phones were successfully infected, and 14 showed signs of attempted targeting. For the remaining 30 phones, the tests were inconclusive, in several cases because the phones had been replaced.

Fifteen of the phones in the data were Android devices. Unlike iPhones, Androids do not log the kinds of information required for Amnesty’s detective work. However, three Android phones showed signs of targeting, such as Pegasus-linked SMS messages.

In a subset of 27 analyzed phones, Amnesty International researchers found 84 separate traces of Pegasus activity that closely corresponded to the numbers’ appearance on the leaked list. In 59 of these cases, the Pegasus traces appeared within 20 minutes of selection. In 15 cases, the trace appeared within one minute of selection.

In a series of responses, NSO Group denied that its spyware was systematically misused and challenged the validity of data obtained by reporters. It argued that Pegasus is sold to governments to go after criminals and terrorists, and has saved many lives. The company, which enjoys close ties to Israel’s security services, says it implements stringent controls to prevent misuse. NSO Group also specifically denies that it created or could create this type of list.

But instead of targeting only criminals, governments in more than 10 countries appear to have also selected political opponents, academics, reporters, human rights defenders, doctors, and religious leaders. NSO clients may have also used the company’s software to conduct espionage by targeting foreign officials, diplomats, and even heads of state.

Based on the geographical clustering of the numbers on the leaked list, reporters identified potential NSO Group clients from more than 10 countries, including: Azerbaijan, Bahrain, Hungary, India, Kazakhstan, Mexico, Morocco, Rwanda, Saudi Arabia, Togo, and the United Arab Emirates.

Journalists and Activists in the Crosshairs

In the coming days, OCCRP and other Pegasus Project partners will release stories highlighting the threat of surveillance through misuse of NSO Group software around the world. But to start with, we will focus on some of the most egregious cases: the use of spyware to surveil, harass, and intimidate journalists and activists — and those close to them.

Among those on the list were multiple close relations of Jamal Khashoggi, the Washington Post columnist who was murdered and dismembered by Saudi operatives in the country’s Istanbul consulate. Forensic analyses show that Khashoggi’s Turkish fiancée, Hatice Cengiz, and other loved ones and colleagues were successfully compromised with NSO Group software both before and after Khashoggi’s 2018 killing. (NSO Group said that it has investigated this claim and has denied its software was used in connection with the Khashoggi case.)

Sandra Nogales, the assistant of star Mexican journalist Carmen Aristegui, was also targeted with Pegasus through a malicious text message, according to a forensic analysis of her phone.

Aristegui had already known that she was a Pegasus target. Her case was featured in a 2017 report by Citizen Lab, an interdisciplinary laboratory at the University of Toronto. Still, “it was a huge shock to see others close to me on the list,” Aristegui told The Pegasus Project.

“My assistant, Sandra Nogales, who knew everything about me — who had access to my schedule, all of my contacts, my day-to-day, my hour-to-hour — was also entered into the system.”

Several reporters in OCCRP’s network were among the at least 188 journalists on the list of potential targets. They include Khadija Ismayilova, an OCCRP investigative journalist whose uncompromising reporting has made her a target of the kleptocratic regime of the country’s president, Ilham Aliyev. Independent forensic analysis of Ismayilova’s Apple iPhone shows that Pegasus was used consistently from 2019 to 2021 to penetrate her device, primarily by using an exploit in the iMessage app.

Ismayilova is no stranger to government surveillance. Roughly a decade ago, her reporting led her to be threatened with compromising videos that she learned to her horror had been shot with hidden cameras installed in her home. She refused to back down, and as a result had the footage broadcast across the internet.

But even after this, Ismayilova was shocked by the all-consuming nature of her surveillance by Pegasus.

“It’s horrifying, because you think that this tool is encrypted, you can use it… but then you realize that no, the moment you are on the internet they [can] watch you,” Ismayilova said. “I’m angry with the governments who produce all of these tools and sell it to the bad guys like [the] Aliyev regime.”

Panyi and his colleague András Szabó, both OCCRP partner journalists in Hungary, also had their phones successfully hijacked by Pegasus, potentially granting their attackers access to sensitive data like encrypted chats and story drafts. As investigative journalists at one of the country’s few remaining independent outlets, Direkt36, they had spent years investigating corruption and intrigue as their country became increasingly authoritarian under the rule of Prime Minister Viktor Orban.

Now they found out that they were the story.

For Panyi, the descendant of Jewish Holocaust survivors, something stung in particular: that the software had been developed in Israel, and exported to a country whose leadership regularly flirts with antisemitism.

“According to my family memory, after surviving Auschwitz, my grandmother’s brother left to Israel, where he became a soldier and soon died during the Arab-Israeli war of 1948,” Panyi wrote in a first-person account of learning he had been hacked. “I know it is silly and makes no difference at all, but probably I would feel slightly different if it turned out that my surveillance was assisted by any other state, like Russia or China.”

The alleged surveillance list includes more than 15,000 potential targets in Mexico during the previous government of President Enrique Peña Nieto. Many were journalists, like Alejandro Sicairos, a reporter from Sinaloa state who co-founded the journalism site RíoDoce. Data seen by The Pegasus Project show Sicairos’ phone was selected as a target for NSO Group’s software in 2017 shortly after his colleague, prominent journalist Javier Valdéz, was shot dead near RíoDoce’s office.

Others on the list were regular people thrust into activism by Mexico’s chaos and violence. Cristina Bautista is a poor farmer whose son, Benjamin Ascencio Bautista, was one of 43 students abducted in Iguala, in the Mexican state of Guerrero, in 2014 and remains missing until this day. The case shook Mexican society to its core and prompted Bautista and other parents to take to the streets in protest, and to assist independent experts in their own investigations.

The vocal stance taken by Bautista and other parents put them directly in the sights of Mexican authorities and Peña Nieto, who denounced the protests as destabilizing the country.

“Oh yeah, they were watching us! Whenever we went, a patrol followed us,” she said.

“They were chasing us.”

A “Natural Tool” for Autocrats

While The Pegasus Project exposes clear cases of misuse of NSO Group’s software, the company is just one player in a global, multi-billion-dollar spyware industry.

Estimated by NSO managers to be worth approximately $12 billion, the mobile spyware market has democratized access to cutting-edge technology for intelligence agencies and police forces that, in years past, could only dream of having it.

“You’re giving lots more regimes an intelligence service,” said John Scott-Railton, a senior researcher at Citizen Lab. “Like a foreign intelligence service in a box.”

Like many private spyware companies, NSO Group’s stock in trade is so-called “zero-day exploits” — previously undiscovered flaws in commercial software that can allow third parties to gain access to devices, such as mobile phones. Pegasus and other top tools enjoy a particular strength: They are often able to infect devices silently, without the user even having to click a link.

Such tools have given governments the edge amid the widespread adoption of encrypted messaging applications, such as WhatsApp and Signal, which otherwise supposedly allow for users to communicate beyond the reach of state surveillance. Once devices are successfully compromised, however, the contents of such apps become readily available, along with other sensitive data like messages, photographs, and calls. Meanwhile, the ubiquity of mobile phone cameras and microphones means they can be easily accessed by spyware clients as remote recording devices.

While The Pegasus Project exposes clear cases of misuse of NSO Group’s software, the company is just one player in a global, multi-billion-dollar spyware industry.

“In order to bypass [encrypted messaging] you just need to get to the device at one or the other end of that communication,” said Claudio Guarnieri, head of Amnesty International’s Security Lab. Pegasus does just that. “Pegasus can do more [with the device] than the owner can. If Signal, for example, encrypts the message… [an attacker] can just record using the microphone, or take screenshots of the phone so you can read [the conversation]. There is virtually nothing from an encryption standpoint to protect against this.”

In fact, there isn’t much anyone can do to protect themselves from a Pegasus attack. Guarnieri is skeptical of applications that claim they are completely secure, and instead recommends mitigating the risks of spyware by practicing good cybersecurity hygiene. “Make sure to compartmentalize things and divide your information in such a way that even if an attack is successful, the damage can be minimized.”

At its heart, The Pegasus Project reveals a disturbing truth: In a world where smartphones are ubiquitous, governments have a simple, commercial solution that allows them to spy on virtually whoever they want, wherever they want.

“I think it’s very clear: Autocrats fear the truth and autocrats fear criticism,” said Scott-Railton of Citizen Lab.

“They see journalists as a threat, and Pegasus is a natural tool for them to target their threats.”

Continue Reading

Trending