Dr Jenfan Muswere
We reproduce below Information, Publicity and Broadcasting Services Minister Dr Jenfan Muswere’s presentation at the Zimbabwe National Defence University on Wednesday last week
***************************
LADIES AND GENTLEMEN, esteemed guests and fellow citizens, I am honoured to stand before you today to present a critical subject of our nation’s well-being on “The Evolution of Information Systems and How the Evolution Impacts National Security”.
With participants drawn from Africa, the Zimbabwe National Defence University (ZNDU) is ideologically instructive of the benefits of our continental goals.
I am proud to affirm from a point of conviction that this institution remains a towering example of Pan-Africanism in action.
The scope of the discussion shall be limited to technology evolution within the information and broadcasting sector and the effects that they have on national security.
In the past, national security relied heavily on manual processes, which were slow and prone to errors but on the positive side limited complexity of information leakages, thereby reducing incidents.
Data was stored on physical media such as paper or microfiche before transitioning to digital formats.
Digitisation has facilitated easier sharing and dissemination of critical information; however, it also poses substantial risks to national security due to the potential for misinformation to spread rapidly across various uncensored media platforms.
As we are gathered here today, the global community is going through enormous transformation.
Technology is developing at an unprecedented rate, and this has a complex effect on national security.
Information, publicity and broadcasting is equally not immune from these major transformations.
It is, therefore, imperative to reflect on evolutions of technology and their impact on national security if we are to have total sovereignty on national security issues through a solid strategy. In the context of our national zones of belonging, we have shared desires for peace and security, and we all grapple with common enemies such as instability and misinformation.
Therefore, while our common interests are prescriptive of what we should do to maintain peace, our existential threats point out the mistakes we must avoid in consolidating our respective nations’ peace.
We face a common enemy of Western-funded propaganda through social media channels and radio stations like the Voice of America (VOA), which is riding on a tantrum of social media imperialism.
This action by the United States is against International Telecommunications Union (ITU) Radio Regulations.
Through the Voice of America, the US has been able to voice its opinions on African issues, thereby interfering with matters beyond the reach of its geographical boundaries.
I should start by pointing out that the subject of information systems is multi-disciplinary and transcends the information and communication technology (ICT) terrain.
In a multi-polar and intermingling context of knowledge production, information systems must also be defined in social science terms.
In adopting this epistemic framework, I consider information systems to be an organised socio-political and technical structure to gather and disseminate information for national strategic importance.
Guided by the policy direction of “Leaving no one and no place behind”, the information systems architecture in Zimbabwe has been underpinned on the integration of inclusive broadband and broadcast access for all.
As it stands, Zimbabwe enjoys a generous share of this hybrid broadcasting model and the migration from analogue to digital broadcasting.
This means the information ecosystem is made up of various institutional players whose service to the citizenry ensures compliance to values of information freedoms and access.
The birth of the Second Republic has further fast-tracked connecting unconnected communities and extending the radio signal to the rural areas.
This explains the fast proliferation of community radio stations under the Second Republic.
New television stations are mushrooming in all corners of the country.
Since 1980, Zimbabwe only had one broadcaster and today, under the astute leadership of our President, Cde Dr ED Mnangagwa, Zimbabwe enjoys a flourishing information access economy.
Likewise, the President has also taken it upon himself to reach all parts of our country to initiate and disseminate socio-economic development.
To commence the discussion, I will unpack the technology evolution eras that the global community has gone through and the vulnerabilities that these technologies introduced to a once-safe environment that was conscious of national security issues.
Converge of broadcasting and ICT
Whilst Zimbabwe has registered a lot of success in terms of infrastructure, the convergence between ICT and broadcasting has got challenges in that social media platforms, which utilise ICT infrastructure for broadcasting purposes are not properly governed in Africa, thereby contributing to misinformation and disinformation. So, Africa needs a framework to develop its own platforms which it can direct and control.
Whoever owns or controls social media platforms has the power to utilise artificial intelligence or algorithms and information science to the detriment of anyone or any nation.
Technology evolution phase
The world has recorded six major technology evolutions from the 1950s to date.
According to ITU reports, Africa is still lagging behind on the transition from analogue to digital, although Africa has now reached a point of convergence between ICT and broadcasting.
The world has gone through the following evolutions from 1950 to date:
- Mainframe phase originated by IBM (America);
- Personal computing phase first computer, the Kenbak-1 of 1971 (Germany);
- Network phase;
- Internet phase;
- Cloud computing phase; and
- Artificial Intelligence and Internet of Things phase.
The above-mentioned evolutions have introduced a new threat landscape, which our adversaries can exploit to compromise our national security posture.
Allow me to go through these evolutions, starting with the mainframe phase.
Mainframe phase
This phase was mainly characterised by centralised data storage, data analysis and batch processing systems. The main outcome of this era was transaction processing systems, coupled with time sharing on the central computing resources.
Mainframe computers in use beginning in the 1950s had most of the capabilities we associate with cloud computing, such as powerful servers providing data storage, software and processing.
National security was in this phase not yet a topical issue as dissemination of information was mainly over printed media and scope of information sharing was limited to printed media and oral communication between one person and the other.
In the early 1970s, hardware virtualisation was then made possible, but its usability was thin due to lack of graphical user interfaces and centralised data storage associated with it.
During the mainframe era, national security threats were limited to printed copies of confidential information that relates to trade secrets and oaths of secrecy, national strategy that would have been leaked to the wrong hands.
Personal computing phase
This phase was mainly characterised by user-centric computing and decentralised computing.
The main outcome of this era was the advent of personal computers with capacity for storage and minimal processing on analysis activities.
It was a great time as it introduced many devices such as home computers, portable computers, electronic typewriter, single-chip microprocessor and graphical user interfaces.
Main threats in this era were non-sophisticated data breaches, unauthorised access, malware and viruses, espionage, insider threats, unsecured communications, lack of standardisation, social engineering, physical security risks and lack of cybersecurity awareness.
Those threats were not yet as sophisticated as the eras that followed.
Network phase
This phase was characterised by the network connectivity layer that was added on top of computing gains achieved in the previous era.
The main outcomes of this era were local area networks (LANs) and wide area networks (WANs), which resulted in data sharing and communication.
There was an advancement of threats on national security introduced by widespread malware, including viruses, worms and trojan horses.
Examples were the “Michelangelo” virus (1991) and the Concept virus (1995), which contained malicious codes targeted at national infrastructure.
Other prevalent threats were early cyber espionage; insider threats and social engineering; unsecured networks and dial-up connections being exploited by hackers; and early cyber warfare, which was mainly used by nation state actors to carry out cyber-attacks on critical infrastructure, stealing sensitive information and influencing public opinion.
Internet phase
This phase was a further extension of network connectivity into global connectivity, e-commerce and various online services that changed the way people interact, share information and access information.
This era was associated with very advanced vulnerabilities that brought a lot of damage to national security due to the complexity of threat actors.
Information on the internet was accessible to anyone with access to the internet and made public.
Topical issues were vulnerabilities in internet protocols and standards that could be easily exploited by attackers, identity theft and online fraud on previously confidential secret trade lines, cyber warfare and nation-state attacks inclusive of disruption of services, terrorist organisations’ online presence that were targeting national infrastructure, unsecured wireless networks and devices, denial of service, phishing and social engineering.
Cloud computing phase
This phase is associated with on-demand services, scalability of resources, access of computer resources through secure channels and distributed data storage services.
The main outcomes of this phase are hot topics such as cloud hosting, information security, cyber security, computer resources scalability, service availability, quantum computing, data localisation, data sovereignty, supply chain and big data analytics.
National security threats in this domain are data breaches and unauthorised access, data localisation and sovereignty risks, lack of visibility and control on data and applications, externalisation of sensitive information and cloud-based malware and ransomware.
Artificial intelligence (AI), internet of things (IOT) and 5G phase
This phase is associated with the use of AI, machine learning and IOT devices.
It has also expanded the cyber space and in some instances caused more harm due to vulnerabilities that are associated with this technology.
Many are the threats introduced by AI on national security.
These are unfair outcomes and potential discrimination caused bias in AI decision-making, AI-powered cyber solutions which are used to launch sophisticated cyber-attacks such as phishing and malware.
Deep fakes and disinformation have often been used to manipulate public opinion and also in undermining trust in state institutions and their representatives.
Autonomous weapon systems also raise concerns on accountability, decision-making and potential unintended consequences.
AI models also have vulnerabilities associated with them such as model inversion and data poisoning, which pose a serious risk on national security.
AI is also associated with job displacements and social unrest, which compromise national security.
On the other extreme, IOT poses threats on national security through increased attack surface, weak passwords and authentication, lack of encryption and insecure firmware and software.
Overall impact on broadcasting and national security
The United Nations defines national security as the capacity of a state to protect and defend its citizens. For this discussion, national security encompasses the safeguarding of a sovereign state, including its citizens, economy and institutions, which is considered a governmental duty.
The management and censorship of information flow have been crucial for maintaining societal peace throughout history.
Information systems play a vital role in governance by serving as a source of power through knowledge dissemination.
The media acts as the Fourth Estate, influencing political opinion and overseeing Government actions.
As technology has advanced, so, too, have information systems.
These systems have become increasingly sophisticated, enabling global interactions that complicate national security enforcement.
In my presentation, I argue that, while the proliferation of information and its ubiquities has significantly contributed to human development, it has also introduced serious challenges to national security.
Information can enhance the well-being of a nation; however, it can also be weaponised to threaten that very security.
Negative impacts of technology evolutions on national security issues:
1. Information warfare
The ability to manipulate information through social media, which influences public perception and destabilises societies.
Case study
Arab Spring: Social media played a pivotal role in mobilising protests, demonstrating how information dissemination can impact political stability.
2. Cyber-security threats
Increased connectivity which exposes broadcasting systems to cyberattacks, risking the integrity of information.
3. Surveillance capabilities
Advanced technologies that enable better monitoring of communications for national security purposes but raise privacy concerns.
Case studies
North Africa and the Middle East: Social media has become a powerful tool for communication but also poses risks such as the spread of misinformation and disinformation, which can incite unrest and create public alarm.
The proliferation of fake news can undermine confidence in government institutions and destabilise the economy.
Events such as the uprisings in North Africa and the Middle East during 2011-2012 exemplify how online platforms can facilitate revolts against legitimate governments.
TikTok conflict in the US: The US officials are fighting to ban TikTok from its territory on grounds of data mining relating to its citizens due to a CEO who oversees the parent company, ByteDance.
4. Data privacy issues
The use of advanced information systems, which raises significant concerns regarding individual privacy rights and potential government overreach.
Case study
Facebook privacy issues in the United Kingdom: In July 2019, it was announced that Facebook was allegedly fined US$5 billion by the Federal Trade Commission due to its privacy violations.
In October 2019, Facebook was reportedly fined by the UK Information Commissioner’s Office for exposing the data of its users to a “serious risk of harm”.
5. Cyber terrorism issues
Terrorism, which seeks to instil fear through violence for ideological purposes, has adeptly exploited advancements in information technology.
Terrorist groups have utilised platforms like social media and citizen journalism to disseminate extremist ideologies and mobilise support for their causes.
6. Adversarial exploitation
Adversaries that exploit information systems for misinformation campaigns and cyber-attacks, posing new threats to national security.
7. Deep fake technology
Increased vulnerabilities introduced by new technology such as deep fake technology, and AI-generated content meant to misinform the public.
8. Cyber warfare and espionage
Cyber warfare and espionage associated with character assassination, disruption of critical infrastructure and stealing of sensitive state information.
9. Information operations and disinformation through social media and online platforms have posed a significant risk to national security, as well as lack of trust in state institutions.
10 . Fake news and propaganda that compromise national security by undermining trust in institutions and eroding social cohesion.
11. Data sovereignty issues introduced by cloud hosting, which allows other countries to have access to sensitive information that they were not supposed to access in the first place. Zimbabwe is building data centres in order to have total control of data for its citizenry, thereby minimising data leakages within its region.
12. Drones as part of broadcasting and military warfare
Intelligent drone technology is now rampant on the global market.
Cyber bullying perpetrators are on the verge of unlawfully obtaining information in African countries by operating drones in African countries without prior approval.
In some instances, these drones are used in war, as a strategy to demoralise enemy hosts during war.
Social media imperialism consequences
The power of technology cannot be overlooked.
History has it on record that World War II was shortened and short-lived after the British intercepted traffic from German, putting the war to an end. The cost of hardware and software, especially to Africa, has at all times been pegged too high in order to cripple the continent from building its own capacity.
This facilitates for the Western powers to easily interfere with African politics, economics and internal affairs.
The current tense fights between the US and China are on 5G technology, with Chinese-owned companies being banned to trade in American territories.
That is a clear sign of fight over control for power derived from technology.
The US has been able to voice its concerns through the VOA, which it fully funds to interfere with issues that pertain to African people, thereby violating ITU regulations on the use of radio frequencies and bordering on the offence of abuse of radio frequencies.
These unacceptable actions by the US have allowed it to manipulate public opinion to work in its favour.
Social media usage is on the rise and is consistently affecting mainstream media.
As we speak, printed media used to be 100 000 in terms of circulation but is now less than 10 000, yet without any meaningful dividends to the citizens of Zimbabwe.
All that revenue used to support the local industry, and is now at no cost being recouped by social media channels that misinform and manipulate the public.
Case study
The power of social media cannot be overlooked as it has a huge interference on public opinion.
In 2024, Musk facilitated for Donald Trump to be active on X, formerly known as Twitter, and he won the election through a back- attacking strategy.
Mitigation controls by Government of Zimbabwe
The Zimbabwean Government has initiated several measures to mitigate the challenges posed by information systems on national security.
Cyber and Data Protection Act
This legislation aims to combat misinformation and protect citizens’ data privacy while addressing the risks posed by social media platforms. It will enhance Zimbabwe’s national security by addressing cyber threats, protecting personal data, promoting accountability and fostering a secure digital environment.
As cyber threats continue to evolve, the effectiveness of this legislation will be crucial in safeguarding both individual rights and national interests.
Investment in cyber security infrastructure
The Government is focusing on enhancing cyber security capabilities to safeguard national interests against emerging threats posed by digital technologies.
Home-grown solutions
Africa must play its part in the development of its own information systems, and Africa must investment in research and development so that is doesn’t become a consumer of all hardware and software.
In fact, Africa must take a lead in the manufacture and development of information systems, social media platforms, ICT infrastructure, broadcasting infrastructure and national security infrastructure for the benefit of Africa in order to support broadcasting and national security.
Public awareness campaigns
Educating citizens about the risks associated with misinformation on social media is crucial in fostering a more informed public that can critically assess information sources.
To achieve the democratisation of the information political-economy of the sector, the Second Republic ensured the main-streaming of legislation that strengthened the constitutional imperatives of information dissemination, distribution and subsequent citizen engagement in matters of State interest.
To this end, Zimbabwe has the following legislative reform milestones that support the above-mentioned strategies:
- Media and Commission Policy (2025-2030)
- ZimDigital Phase 2
- ZMC Act
- Electronic Transactions Bill
- Cyber Security Centre
- Zimbabwe Media Commission Act;
- Freedom of Information Act;
- The Repeal of Access to Information and Protection of Privacy Act (AIPPA);
- Smart Zimbabwe Master Plan;
- National Broadband Plan (2020-2030);
- Use of the telecommunication pricing index that ensures affordability and business availability;
- Revision of the licensing framework to include satellite players;
- Use of radio communication for education;
- Development of the New ICT Policy 2022-2025, approved by Cabinet;
- Supporting the migration from analogue to digitalisation broadcast;
- Incentivising the emergency of new media and broadcasting players;
- Mainstreaming the licensing of new ICT players, including mobile virtual network operators (MVNOs).
- Licensing of more internet service providers;
- Creation of a business-friendly environment for private sector players to flourish;
- Infrastructure sharing policy across the entire information ecosystem;
- Upgrading of third generation to fifth generation licensing framework;
- Increase of public use of the nationwide 180 community information centres;
- National e-learning strategy for all schools, especially in the marginalised areas; and
- Licensing and operationalisation of 14 community radio stations.
Ladies and gentlemen, a comprehensive and forward-thinking approach is necessary for our national security in the era of rapid technological change.
We must confront the threats and challenges posed by developing technologies while simultaneously seizing their opportunities.
Let us, therefore, implement security by design principles, foster a culture of cyber security, invest in cyber security and invest in artificial intelligence-powered solutions.
It is evident that the Government is interested in depolarising society and enhancing public access to information and the digital economy.
Beyond the paranoia of the abuse of digital liberties, we are more committed to translate this economic revolution to dividends of economic growth.
This direction should see a growth in information entrepreneurship and accelerated capacitation of the existing players in the sector.
With all these enablers, the media must champion positive national image construction; at the same time, pursuing a resilient fight against potential neo-colonial intrusion of this sector. This is an important cause in fighting all existential threats that may arise out of biased reportage and demonised constructs of our national identity.
Zimbabwe now has at least 14 community radio stations and six operational campus radio stations in Zimbabwe that have been brought about by advancement in digital technology. Zimbabwe will continue to invest in defence research centres, the Zimbabwe Techno-park and innovation hubs.
Funding for innovation is a critical driving factor if we are to record meaningful strides towards a peaceful and secure society that is safe from Western interference.
I have faith that if we work together, we can create a more secure, wealthy and safe future for our country and future generations with reference to information publicity and broadcasting.