11 Mar 2015

Possibility Of Escape

Kathy Kelly


Photo credit: Asylumprojects.org

That is also us, the possibility of us, if the wonderful accident of our birth had taken place elsewhere: you could be the refugee, I could be the torturer. To face that truth is also our burden. After all, each of us has been the bystander, the reasonable person who just happens not to hear, not to speak, not to see those people, the invisible ones, those who live on the other side of the border.
- Karen Connelly, The Lizard Cage

It was a little over two weeks ago that Marlo entered Atwood Hall, here in Lexington federal prison. Nearly all the women here are nonviolent offenders. When I first saw Marlo, her eyes seemed glued to the tiled floors as she shuffled along hallways. I guessed her age to be 25 or so. A few days later, she came to a choir rehearsal. She was still shy, but she looked up and offered a quiet smile when she joined the soprano section. The next time our choir gathered, Marlo raised her hand before we ended our rehearsal. "I got something to say," she said, as she stood. "When I first came here, I can tell all of you now, I was terrified. Just plain terrified. I have 70 months, and I felt so scared." The intake process for this, her introduction to the prison system, had badly frightened her, but before sundown that same day, a second intake process had occurred, with several inmates finding her, reassuring her, and getting her beyond that first panic. 
During my four stints in U.S. federal prisons, I've witnessed long-term inmates' unconquerably humane response when a newcomer arrives. An unscripted choreography occurs and the new prisoner finds that other women will help her through the trauma of adjustment to being locked up for many months or years. Halfway through a three-month sentence myself, I'm saddened to realize that I'll very likely adapt to an outside world for which these women, and prisoners throughout the U.S. prison system, are often completely invisible. 
U.S. state and federal prison populations have risen, since 1988, from 600,000 to an estimated 1,600,000 in 2012. This trend shows inhumane behavior on the part of lawmakers and myriads of employees who benefit from the so-called "criminal justice" system. But our entire society bears responsibility for what now can aptly be labeled a "prison-industrial complex." Constructing prisons and filling prisons with people who posed little or no threat to our security didn't happen secretively, without our consent. We watched, mesmerized perhaps, and allowed ourselves to become a country with the world's largest prison system. 
A friend from home recently sent me encouraging news of Illinois Governor Rauner's initiative to address the problems in some of the United States' most brutally overcrowded prisons. A Chicago Tribune article from several weeks ago notes that Rauner plans to reduce the state's prison population by 25% over the next ten years, establishing the reduction as a goal through executive order.  The article, by columnist Eric Zorn, cites a widely-cited recent report by the Vera Institute of Justice that "nearly 75% of the population of both sentenced offenders and pretrial detainees are in jail for nonviolent offenses like traffic, property, drugs or public order violations." 
Skyrocketing costs of incarceration have finally convinced some lawmakers to work toward "reducing prison populations." Yesterday, I read a long report about how the California Department of Corrections has responded to a court-ordered demand that the state reduce the numbers of people locked up in California state prisons. The order was first issued in 2009 by a three-judge panel. The state appealed the order, but in 2011, the U.S. Supreme Court upheld it, ordering the state of California to comply by 2013. The California government sought and was granted two extensions. As of now, the order insists that California must reduce its prison population, by 2016, to "no more than 137.5 percent of the design capacity" of its state prisons.
Whatever plans Gov. Rauner's committee proposes for Illinois, the notoriously incarceration-minded Illinois state legislature is likely to put up just as vigorous a fight. Meanwhile the California report discusses "cost-effective measures," "recidivism reduction results," "rehabilitative programming" and "programming slots" at "in-state contract facilities." The language, highly impersonal, suggests warehousing. I wonder if zookeepers might be more attentive to the individuality of the beings they cage. 
Trapped in a cruel and uncaring system, women here in Atwood Hall reliably find humane ways to cope. Among many signs of daily generosity, one of my favorites is the practice of "window shopping." Women place extra items they can spare in the window sills nearest the stairwells. A new prisoner can find new fresh socks, a warm knit cap, books, magazines, pitchers – items that quickly disappear and are soon replenished.
Perhaps we'll begin to see a trend toward finding humane ways to cope with seemingly intractable problems in today's criminal justice system. The U.S. Supreme Court's insistence that the State of California must release many thousands of prisoners signals a trend in which, as Gov. Rauner's order recognizes, "States across the country have enacted bi-partisan, data driven and evidence based reforms that have reduced the use of incarceration and its costs while protecting and improving public safety." Zorn notes that the Mac Arthur Foundation recently granted $75 million for a 5 year "Safety and Justice Challenge" meant "to reduce over-incarceration by changing the way America thinks about its prisons and jails."

I can't imagine a figure too high to pay, in dollars or in human work hours, to effectively challenge the way U.S. people think about safety and justice. In describing a class that he taught in a New Jersey maximum-security prison, Chris Hedges wrote:

The mass incarceration of primarily poor people of color, people who seldom have access to adequate legal defense and who are often kept behind bars for years for nonviolent crimes or for crimes they did not commit, is one of the most shameful mass injustices committed in the United States. The 28 men in my class have cumulatively spent 515 years in prison. Some of their sentences are utterly disproportionate to the crimes of which they are accused. Most are not even close to finishing their sentences or coming before a parole board, which rarely grants first-time applicants their liberty. Many of them are in for life. One of my students was arrested at the age of 14 for a crime that strong evidence suggests he did not commit. He will not be eligible for parole until he is 70. He never had a chance in court and because he cannot afford a private attorney he has no chance now of challenging the grotesque sentence handed to him as a child.

Here in Atwood Hall, guards and administrators know that they imprison humane, caring, generous and talented women, people not very different from their own relatives, friends and co-workers. Where are the "bad sisters" that could ever justify the punishment of isolating women like Marlo from their children and other loved ones for long and wearying years? I imagine that many BOP guards admire, as I do, the courage and fortitude of the women facing long sentences here. Do they wonder, sometimes, what courage would be required, in their own lives, to stop working as enforcers of the prison system?  Or do they perhaps wish, sometimes, that the general public could muster up the will to stop voting for the prison system?
There is a cynical quote which a cynical friend of mine likes to quote to me, from the philosopher David Hume: "A prisoner who has neither money nor interest, discovers the impossibility of his escape, as well when he considers the obstinacy of the gaoler, as the walls and bars with which he is surrounded; and, in all attempts for his freedom, chooses rather to work upon the stone and iron of the one, than upon the inflexible nature of the other." It's the cliché of the prisoner attempting escape: the prisoner sees more hope tunneling out through bricks than appealing to the stone-faced jailer. 
But who are the jailers? These prisons were built, and filled, in our name - in the name of making us "safer". More guards, more lawyers, judges, wardens, marshals, probation officers and court personnel would be hired even if the present ones resigned. Meanwhile the creative work to create real security, real community in the face of social dislocation and crime, would still need to be done. We, the broader public, must be the jailers. Sometimes we seem to be a stone rolling down the path of least resistance. But we're not stone. We can choose not to be jailers, and choose, instead, to be ever more inflexible in our resistance to injustice and to hatred born of fear. 
I'm here among women, some of whom, I've been told, are supposed to be "hardened criminals." Fellow activists incarcerated in men's prisons likewise concur that the system is futile, merciless and wrongheaded. Our jailers, I'm convinced, can see this. Men like Governor Rauner, it seems, can see it, or his advisers can. Where are the inflexible ones keeping women like Marlo isolated from and lost to the world, trembling for their future for the next five years? I would like to make an appeal to you, and to myself two months from now when I've left here and once more rejoined the polite society of these women's "inflexible jailers." I choose to believe that we can be moved and these women can escape. I am writing this, as many have written and will write, to see if we're easier to move than iron and stone.

A Solution For The Global Crisis

William Kotke

The human species cannot survive on planet earth in perpetuity unless it lives in biological balance with the life around it. This thesis is just common sense. If one can agree with this thesis then we can deduce many conclusions from it.
This offering of a solution may seem like a grandiose proposal, but it is not. It is only common sense. If civilization sucks out only one percent of the earth’s fertility each year we can see that there will be no fertility within a geologically brief amount of time. This means soil exhaustion, deforestation, the absence of large fish in the ocean and much more. The imbalance of an exploding population based on dwindling resources points us toward planetary exhaustion.
PLANET HEALTH
Now let us look at planetary health. Our highly successful two million year human family of forager/hunters left us with a pristine planet - as of ten thousand years ago, when agriculture began. This pristine planet at that time featured climax ecosystems everywhere on the earth. Climax ecosystems are the most efficient ecological systems because they have the highest diversity of species meaning that they can capture more photosynthesis. This is the standard of planetary health.
The civilized practice of agriculture breaks up these highly complex energy flow systems of climax ecosystems and drains the fertility such as clearing forest and planting crops until soil exhaustion. We can see this in North Africa which once contained a thriving semi-arid desert ecosystem and forests in the mountains. The Greek and Roman empires considered it their "breadbasket." Now, some of the ports from which that "surplus" was shipped are ten and fifteen miles from the water. All that filled in with erosion material from the exhausted land. Once that topsoil is gone the ecosystem can never recover because those plants can’t grow on subsoil, so the culture of civilization moved on to deforest Europe.
CREATING HUMAN CULTURE?
For the human species at this point in history there is only one question. That question is: "How do we construct a human culture that allows us to live in biological balance with the earth?" This is THE question of the human species on earth. If this question is not answered then all other questions become irrelevant.
THE PLANET SAVING PROPOSAL
We have no historical record of we humans actually creating a new human culture from scratch, but we are now faced with that task as the present culture has taken us to ruin. The human culture that developed with agriculture emphasizes the growth of wealth and power over other people. This growth, historically, has been based on extorting "surpluses" from the fertility of the earth and leaving behind injured and destroyed ecologies. If we are to survive as a species we must now reverse this cultural value to be the restoration of the earth toward its standard of health, the climax ecosystem. This is a new foundational value, a culture pointed to the nurturing of life.
LET ‘S PRETEND
Let’s pretend that humans are a mature species and have reached adulthood. The first task would be to manage the household, the earth. Once that is stabilized we can go on to pursue real non-material human progress such as perfecting a culture that serves the earth and facilitates the utmost development of the humans involved. How do we do that?
People will say that this proposition is ridiculous when cutting edge science is saying that there is a real possibility of Near Term Extinction from global warming if not from resource exhaustion and die off. There is no solution to the present situation. The best we can hope for is for a few to make it through the apocalypse and come out the other side to start a new culture. Given our dire straits, that is a solution we can hope for.
Small scale eco villages starting at the top of their watersheds using permaculture to establish self-sufficiency while restoring the ecology is the plan. Post apocalypse, these "seed communities" will spread to restore the earth. The Global Ecovillage Network (http://gen.ecovillage.org/) has already many hundreds of villages affiliated around the planet.
We vote with our feet for a new human culture of ecological sanity that focuses on nurturing life; our earth, our selves, our children, our gardens, our ecology. We create a culture of gender and ecological balance. Simply to raise pristine children without emotional damage will be a great leap in human progress.
We humans are amazingly creative and resourceful and have emerged successfully from many dire situations. We can easily create this on the ground, while we work on the big problem of transferring from the negative emotional condition of the death culture- civilization- to the positive emotional condition of a life nurturing survival.

Managing Africa’s Natural Capital for Sustainable Development

Mounkaila Goumandakoye

Africa is endowed with immense natural capital and these invaluable assets needs to be used in the best way possible to foster economic growth, social welfare and sustainable livelihoods. The natural capital potential for the continent is indeed huge. Africa is endowed of 40% of the biodiversity of the world and 60% of the uncultivated arable land. Renewable energy is immense as Africa is using less than 7 % of its hydroelectricity and less than 2 % of what geothermal energy can offer. The majority of the African countries receive an average of 325 days/year of bright sunlight and more than 80 % of the landscape is receiving more than 2000 KW/h per square meter and per year. Wind power is available and still insufficiently tapped. Economic growth is expected to remain strong (among the highest in the world).
We are now preparing for the Post 2015 era. Africa is set for strong future growth, both in terms of its population, and its economy. By 2050, we are expected to be over 2bn people – double today number, with more than half who will leave in cities. The majority of the population is composed of youth and this will remain for the decades to come. This population increase will drive energy demand, food consumption and transport requirements, demand for jobs and social services, increased investments in infrastructure.
The growth we want, needs to continue to be robust, inclusive and we want it to be sustainable. We are however still grappling with intractable challenges: climate change is threatening the development gains of the continent. We have not been successful in reducing poverty significantly and inequality is widening. Eight (8) out of the 10 most food insecure countries are in Africa.
Another environmental asset not well managed is the air we breathe (10 000 liters/day). According to the recent assessment of WHO, air pollution is fast becoming one of the leading causes of illness and death in developing countries, and leads to more than 700,000 deaths annually in Africa (from outdoor and indoor air pollution).
While the continent is characterized by remarkable biodiversity, the diversity is declining. In 2014, a total number of 6,419 animals and 3,148 plants in Africa were recorded as threatened with extinction. Illegal trade of wildlife is part of the constraints to development as it contributes to weaken the economy and serve also terrorist groups in some parts of the continent. In one African country, Rhino poaching increases by 7,700% between 2007 and 2013. This illicit trade of wildlife is contributing also to the illicit financial flow that is crippling our economies. It is estimated that Africa loses in excess of USD50billion annually from IFFs including illegal trade of fauna and flora.
We cannot continue business as usual. Research by WWF identifies that the Ecological Footprint of all African countries increased by 240% between 1961 and 2008. Worldwide, we are pushing the planetary boundaries to their extreme limits. Resource exploitation exceeds the earth biological capacity by more than 25%. Humanity has increased the global ecological footprint: 0.5 Earth in 1950 to more than 1’25 Earth today. We may soon need two or more planets to satisfy our needs unless we curb the trends of resource depletion. But we have only one planet, one Africa. There is no plan B.
It is gratifying and encouraging to note the great effort made by African countries in engaging in a sustainable development path. Transitioning to green economy provides an opportunity for Africa to harness the full potential of its rich natural resource endowments for domestic revenue sourcing to compliment global support in financing sustainable development.
The Post 2015 agenda and SDGs will offer great opportunity for a green growth scenario in the continent. I would like to take this opportunity to laud the effort of the African Union and NEPAD in providing leadership in this area and to thank African Development Bank, ECA, WWF, UNIDO, ILO, UNDP, IUCN , our partners from the North and the South and many others for the great cooperation in support to Africa in its effort to transition to green economy.
In light of the foregoing, 2015 is set to be a strategic year for Africa. This year marks a crucial shift in the way the world and Africa will deal with their own development, with three decisive conferences: the 70th UNGA on post 2015 agenda in September, the financing for development in July, and climate change in December, that should create a more conducive setting for sustainable development.
Environment is an important component of these agendas. It has to be adequately taken into account alongside the economic and social dimension. At the International level but also at the regional, national and local level, let’s work together with a sense of renewed commitment for effective sustainable development that will create the conditions for the ‘Africa we want,’ the Africa that provides peace and prosperity for all in a sound managed environment.

Women’s Empowerment and Development Towards Africa Agenda 2063

H.E. Dr. Nkosazana Dlamini Zuma

I would like to add my voice to all women worldwide and especially the women of Africa in acknowledging the fight led by female pioneers for the rights of women throughout the past centuries.
Today, the issue of recognizing women’s rights and its implementation is pivotal because it has been proven that sustainable development, political stability and economic growth cannot be achieved when a portion of the population is marginalized and excluded in the access and distribution of national resources.
Today, we can point to marked achievements in the representation of women – we have our first women Presidents, increased numbers of women in African parliaments, and we have gender parity in the African Union Commission leadership.
These must be celebrated, but much more remains to be done to increase women’s representation in all spheres – in the judiciary and in parliaments, in the economy and in the security sector. We must also intensify efforts to improve the visibility of African women on the national, regional and international scenes. Indeed, in traditional African society, it is actually women who are often, but discreetly, consulted by men when important decisions have to be taken in the community.
But why is it that women's decision-making power is not reflected in public? Why is the African woman always relegated to the background in the instances of modern public decisions? Why is the African woman excluded during elections in our countries? Why is she deprived from access to credit? To land? To education? To employment? To participation in peace negotiations? and so forth. These are existential issues for women who are awaiting concrete answers from all leaders.
Let us try to envision an International Women’s Day in the next 50 years, and know that the world will not celebrate women just for their struggles for gender equality, but will recognize every day as the days of both female and male citizens regardless of gender with equal and equitable rights for both women and men to be autonomous, educated, free to move and living in a stable and prosperous Africa.
Indeed, Agenda 2063 is led by the African people, particularly women and young people who are considered as the driving force of the continent, the pillars on which the continent must rely on to achieve a sustainable development and a prosperous and peaceful Africa. Agenda 2063 envisages a non-sexist Africa, an Africa where girls and boys can reach their full potential, where men and women contribute equally to the development of their societies.
It is with a view to successfully complete the Post-2015 Development Agenda, to accelerate Beijing and Dakar Platforms for Action and to implement gender equality and women’s empowerment policies that the Heads of State and Government of the African Union have declared 2015 as the "Year of Women’s Empowerment and Development towards Africa’s Agenda 2063."
The choice of African Union’s theme this year is indeed an opportunity for us to demonstrate our commitment to the empowerment of African women to make it a reality rather than a mere statement.
Allow me to emphasize the five (5) major priorities areas that African women have identified as essential to empower them in achieving Agenda 2063. During the Consultation of Stakeholders held from 21st to 23rd January 2015, on the margins of the AU Summit, African women agreed on the following:
1. Women's health is a major concern in our countries since the sexual health and reproductive rights of women are still not sufficiently respected, which is why maternal and infant mortality rates continue to be high in the continent. I commend the national launches of the CAARMA (Campaign on Accelerated Reduction of Maternal, Newborn and Child Mortality in Africa). Its effective implementation will contribute to strengthening healthcare systems to benefit women and their socio-economic empowerment. We must invest in quality health services for all women and girls. I take this opportunity to recall the vulnerability and courage of women in countries affected by the Ebola virus outbreak. Women are paying the heaviest price for this epidemic, and special measures for their physical and mental recovery must be taken to protect them.
2. Quality education must be accessible for all our girls so that they do not become brides. This concern is one that’s shared today by many mothers and fathers in Africa, especially after the abduction of the Chibok Girls, in Nigeria. Africa needs a well-educated and prepared child and youth to succeed the elders. Agenda 2063 calls for the mobilization of an education revolution on the continent. This has been demonstrated by the Pan-African University, which is an educational institution that provides access to education in science and technology especially to young women and girls. Moreover, the private and public sectors of Information Communication Technology continue to provide training to girls and women, an effort that must be encouraged and promoted.
3. Peace and security on the continent is another priority of the African Union. It is an essential condition for the effective empowerment of women. Generally regarded as the most vulnerable group during armed conflicts and post-conflict, women should not only be seen in this light. Rather, it is necessary to see the contribution of African women in the peacekeeping process and the post-conflict reconstruction, and even in the transitional phase of justice and in the drafting of a new constitution. In the implementation of the AU program “Silencing the Guns by 2020”, the African Union is committed to mainstreaming gender in the African Peace and Security Architecture (APSA) and its African Governance Architecture (AGA). For this, African women should be strongly engaged in policy and decision–making processes to reach 50/50 gender parity, especially during Presidential and Legislative elections on the continent. Women's voices should not count anymore as those of mere voters, but as candidates in instances relating to the highest decision-making bodies.
4. Agriculture is indeed one of the priorities that, if properly taken into account, will be the catalyst for the economic growth and social development of Africa. It is this vision that our African leaders had in 2014, when they declared it as the “Year of Agriculture” with the objective to achieve inclusive growth and sustainable development. The theme of 2015 "Year of Women’s Empowerment and Development towards Africa’s Agenda 2063" is indeed a continuation of this commitment.
How can we speak of inclusive growth and sustainable development without recognizing the work of some of our African population, consisting mostly of women in rural areas? African women constitute more than 70 percent of small farmers that help to feed the majority of the growing population of Africa. They are mainly present in the agricultural sector and the informal sector of the Agribusiness.
Despite this critical role, rural African women continue to work the land with archaic working methods such as the handheld hoe! African women made this clear when they said:
“THIS HOE, WE DO NOT WANT IT ANY MORE!! IT MUST HENCEFORTH BE CONFINED TO THE MUSEUM AS AN ARTIFACT! A SUBJECT OF ART FOR FUTURE GENERATIONS!”
Each male and female farmer should now have a “Tiller”, a modern agricultural working tool that gives more dignity to the human being in her/his function as a farmer by reducing heavy labor load and by contributing to increased yields in agriculture, fisheries, livestock and poultry.
5. Economic empowerment of women essentially aims at the creation of a Bank for African women as has been done in some African countries such as Ethiopia, an example that should be replicated throughout Africa. I congratulate all those African countries who have gone beyond microfinance and microcredit by including gender equality in the financial mechanisms. Indeed, we must harness the power of women entrepreneurship with increased access and control over resources by African women. Our continent is rich in natural resources but our people, and, in particular women, remain poor.
I would like to conclude by emphasizing that the effective implementation of the theme of 2015 requires joint and determined efforts by all stakeholders: the RECs, Civil Society Organizations, and of course our Development Partners. We need all of you, men and women, as actors and actresses to achieve the Africa we want.

Emerging Issues in Cyber Security in the Financial Sector

 G Padmanabhan

Technology is quickly altering all elements related to end-to-end financial transactions. Infrastructures that support this transformation are increasingly becoming ubiquitous as they ought to be, more sophisticated and mobile. More importantly, financial transactions are increasingly getting processed in real time with lesser human intervention. End users are becoming more demanding for faster, more efficient, easier and more secure means of carrying out their transactions. At the same time, the financial sector is facing ever-escalating threats from cyber criminals. In an interconnected world, although all organisations are targets for cyber attacks, financial institutions are more vulnerable than most others.

The vulnerability arises out of two reasons. One is the nature of banking. Banks deal with money. Money is today stored and transferred in digital form. An attack on banks can help the perpetrator to gain funds, which makes them the prime target. As banks have to keep their systems open to the customers unlike other vulnerable systems like defence, they are in general easier targets. So security in banks is not just important. It is essential.
More importantly, the financial sector is based on trust. A customer would be willing to park his money with a bank if he believes that it is safe. In the digital world, the customer trust depends on the strength of security, or more precisely, perceived strength of security. This perception gets built on the experience of the customers. As more and more customers experience fraud - free transactions through digital channels, their trust in that bank is likely to be higher.
IT security
Before getting into specifics of cyber security issues, let me talk about IT security in general. IT security implies that the IT systems including data are held in a secure manner and made available only to the legitimate users of the system. It implies protecting the IT systems, networks, programs and data bases, from damage, attack, or unauthorised access, so that resources are available for business transactions whenever required.
The security issues or failures can be broadly discussed under two segments-unintended and intended. The unintended failures largely occur due to IT systems hardware failure, application systems crashes, non-availability of infra resources such as power, bandwidth etc. All these factors could completely halt the business process with all-round negative fallouts. To address the unintended failures, an institution is expected to take several steps such as adoption of Board-approved IT governance policies, establishing data centres, third party contracts, robust service level agreements, IS audit etc. As far as the risk of unintended failure is concerned, the IT management policy framework that has evolved over a period of time along with corporate governance has addressed the risk factors to a large extent. All these have come at a huge cost, but a definite resilience has been achieved. However the intended intrusions to disrupt business, misuse the information available at the institutional level and to perpetrate fraud at the customer level continue to be orchestrated largely by a sophisticated group of cyber criminals.
Tackling cyber threats
While vulnerabilities in software and network continue to be the target of cyber attackers and defending these resources remain the focus of every organisation, the weakest link continues to be the user. Data breach arising from phishing attacks and social engineering continues to be on the rise. No doubt banks have made significant efforts to educate the user on safe banking, but it is often found to be inadequate in the face of a targeted attack. Social media provides the platform required for an attacker to mine information on an individual. This information is then used to make the user believe that he is communicating with a legitimate source. With easier access to social media and the tendency to share personal information, the number of users that are exposed to such attacks will continue to increase.
Internet of things is no longer just a catch phrase. Today, a typical Indian home has mobile phones, tablets, laptops, smart TVs and gaming devices all connected to the Internet and with each other. It is estimated that by 2020 there would be 30 billion wireless devices connected to the Internet of things. Most of these devices have not been principally designed with security in mind. The issue that I am trying to flag is that as we acquire more and more modern electronic gadgets, there will be a large number of insecure devices that co-exist on the same network with more secure ones. Since in an inter-connected world, security is as good as the weakest link, the criminals will attempt to exploit a less secure but trusted device to attack the critical and well protected resources.
Mobile devices have been getting more powerful every year. Smart phones available today are capable of carrying out all the functionalities generally done on a PC. While there are efforts made to ensure that a PC is kept secure, a smart phone that does the same functionality does not receive similar attention. Mobile Banking has gained popularity in the last few years. In the coming years mobile devices are going to be increasingly used for transferring funds and for making payments. Mobile devices, if regular updating of security is given a go by, could well become an attractive and easy target for cyber criminals.
Large banks, retail establishments and restaurants are often the main targets of cyber attacks. In 2014, J.P. Morgan Chase & Co, the largest U.S. bank by assets conceded that unknown attackers stole about 76 million customers' contact information - including names, email addresses, phone numbers and addresses. It also affected about seven million of J.P. Morgan's small-business customers. Mercifully, the hackers were reportedly unable to gather detailed information on accounts, such as account numbers, passwords, social security numbers or dates of birth. That these breaches happened even to banks like JPMorgan Chase that spend billions of dollars to fund IT budgets and employ large teams of security analysts points to sophistication of cyber attacks.
A survey conducted in the United States revealed that the cost of cyber crimes for the retail stores doubled between the years 2013 and 2014. Information of tens of millions of customers were stolen from retail stores Target, insurance company Anthem, formerly known as WellPoint, Anthem (ANTM) is the second-largest health insurer in the United States. In this context, FBI Director James Comey was quoted as stating "There are two kinds of big companies in the United States. There are those who've been hacked ... and those who don't know they've been hacked."
The latest Kaspersky Labs Report-Financial Cyberthreats in 2014- highlights certain new, disturbing trends: Cybercriminals are becoming less interested in "mass" malicious attacks on users, preferring fewer, more "targeted" attacks.   A shift in the cybercriminals' focus - instead of attacking end-users, they started to pursue organisations that work with financial information and payment tools.
The recent uncovering of estimated $1 billion heist against several banks is a pointer to the above. As per the report, $1 billion has been stolen in the attacks, which started in 2013 and are still ongoing. The gang, dubbed as Carbanak, used computer viruses to infect company networks with malware including video surveillance, enabling it to see and record everything that happened on staff's screens. In some cases it was then able to transfer money from the banks' accounts to their own, or even able to tell cash machines to dispense cash at a pre-determined time of the day.
Another concern is the increasing tendency of the insiders using the information they have about their organisation, against itself. Companies have no option but to trust their employees and provide them privileged access to systems. The Snowden incident in the US has clearly shown the amount of damage an insider can cause to an institution. It is easier for an insider to carry out a cyber-attack as he is already aware of all the security devices and procedures in place. An attack by an insider is often more difficult to identify and recover from. Attacks by nation states - cyber war - wars among nations are increasingly being fought in cyber space than on the battle field. Acts of cyber espionage are increasingly being reported and many nation states are suspected of being covertly involved. Cyber attackers that have the backing of the state have powerful systems and monetary resources at their disposal.
Need for robust policies and practices
As we have seen, any electronic system connected to a network can be potentially compromised. The best preventive solutions have been found inadequate to thwart a sophisticated, targeted attack by a motivated attacker. This is not to say that preventive solutions do not serve any purpose. Traditional prevention solutions like firewalls and Intrusion prevention systems help prevent a large number of known attacks and should be a part of any network, however, they are becoming quite inadequate as attacks become more sophisticated. For instance, a new but disturbing feature is the advent of malafide attacks on computer systems, which are difficult for even experts to identify.
Some of the examples include malware which get attached to songs (which are commonly downloaded from recognised sites), or as links on e-mail messages. The malware gets itself installed in the computer of the user and starts watching the actions of the user. Some of the malware have the capability to read, recognise and record the commands and actions keyed in by accessing the kernel (which is at the heart) of the computer and gather information such as user id and password of internet banking transactions. Once these are obtained, the information is transmitted to the hacker who could simply log on to the bank's site using safe (but compromised) credentials and siphon off money from an unsuspecting bank customer. By the time the customer realises this, the fraud is complete and most of the money is lost. There are reports that some versions of the malware "wear" disguises and have the capability of capturing the key strokes entered in the key board using the user's own camera on the computer! One approach towards ensuring that such attacks do not occur is to create a culture of selecting only those sites / addresses which we are very sure about as being safe and secure, which is commonly referred to as "white listing" of sites for granting access.
Today, tools like Security Incident and Event Management (SIEM), Network Behaviour Anomaly Detection (NBAD), Data Leakage Prevention (DLP), etc are available which provides deep visibility into operations and quickly detect a security breach. Besides, one approach being increasingly adopted by banks - apart from procuring tools and having rules - is following the age-old and time tested method of using analytics. We have all read about the advantages of Big Data and Big Data Analytics. While this is more often used for business development and customer behaviour analysis and customer preferences, there is scope of using this for mapping general customer behaviour patterns and whenever there is an exception or an outlier, the computer system could trigger a warning. For example, if a credit card holder has always been doing transactions in India, an SMS alert for confirmation could be sent when use of the card is noticed at let's say Malaysia. Or, if a computer user always browses data and speeches on the internet, when an attempt to download is performed, an alert seeking confirmation could be automatically generated. Thus, analysis of customer behaviour could result in pattern formation based on which exceptions could be highlighted by the computer itself, with little or no human intervention. This may of course necessitate some investment in the form of enhanced human resources with specialised skills. There are financial organisations in the world which have implemented these approaches with remarkable success.
What lessons do we draw from the foregoing? In this scenario, it is important to ensure that at the organisation level, the policy on cyber security clearly identifies different types of systems and data based on sensitiveness and criticality. It should set out the type of preventive measures required for each category, with critical systems having more stringent security. Cyber-attack is generally met with panic. A policy that clearly states the roles and responsibilities of each stake holder and the response that is required for each scenario will ensure that panic is replaced with decisive action.
International efforts
The biggest challenge in making the financial sector cyber resilient is to first acknowledge the complexities and interdependencies and then to proactively address failures, adopt effective resilience techniques, and resolve problems through cooperation. In order to cope with the idiosyncrasies of cyber attacks and enabling services to resume, the financial sector has to follow an integrated approach based on the adoption of a cyber resilience framework developed internally or adapted from a more generic framework - examples being: the NIST framework 1 (February 2014); the World Economic Forum's cyber resilience approach, (January 2014) 2 ; and the MITRE framework (2013) 3. However, it is equally important to recognise that any framework would not provide a one-size-fits-all approach to managing cyber security risk for the financial institutions.
Generally, cyber resilience frameworks aim to address three broad scenarios:
  • Confidentiality breach, which involves confidential information being stolen.
  • Availability breach, where the services provided are inaccessible or unusable upon demand by customers but where the systems per se are still intact.
  • Integrity breach, which is the corruption of data or systems affecting the accuracy or completeness of the information and processing methods (and which could also impact the availability of services). The focus of the majority of cyber attacks continues to be on compromising confidentiality (eg stealing sensitive data) and degrading system availability (eg DDoS* attacks). An integrated approach has to address cyber threat holistically.
Let me highlight a few international initiatives in this regard that could be instructive. Bank for International Settlements through its Committee on Payments and Market Infrastructures has setup working groups and task forces to examine the issue of Cyber threats and have published reports on the subject to guide the industry in preparing polices to protect cyber resources. Based on these reports, I would like to flag a few key points that would need to be kept in mind while formulating a cyber security policy:
Having multiple sites providing for effective recovery against traditional forms of risks however is mostly ineffective in recovering from a cyber attack. "Unintended consequence of resiliency" (for example corruption at the primary site gets replicated to the DR sites) makes them ineffective in case of a cyber attack.
Systems at primary and DR sites are generally similar in architecture and equipment. This constitutes a major risk as the vulnerability that exists at one site is there at all. On the other hand heterogenic systems would be very difficult to manage.
Periodic Real time, scenario based simulations is necessary to rehearse the management of a cyber security incident. The scenarios should focus on cyber attacks that could disrupt the normal day-to-day business functions, and the processes and procedures the incident response team utilise to address a cyber security incident.
Business staff often spots a problem first, not the IT staff. Business staff is potentially best placed to see parameters changing dramatically and/or bottlenecks occurring where they shouldn't. A process for business staff to quickly escalate such anomalies to IT staff will help in quick detection.
Services of personnel with expertise in cyber forensics should be utilised to understand which systems have been compromised and to isolate them.
"Buddy Banking" helps where operational management capability as well as the service itself is lost. "Buddy Banking" is where a second system or organisation is capable of taking over the functionalities of the affected organisation so that the service offered by the affected organisation continues to be available to its users. The usage of RTGS and NEFT as a backup to each other is an example in the Indian context.
In case of a disaster, communication is the key. Robust communication channels with all stake holders should be available.
I would also like to draw your attention to two important initiatives undertaken by Bank of England towards ensuring cyber resiliency. The first relates to prevention and the second, recovery.
CBEST testing framework
Penetration testing services as they are currently conducted do not provide assurance against sophisticated attacks on critical assets. This is because testing is not done on critical assets because of the perceived associated risk and the testing is not done based on current and specific threats. Identifying this lacuna, Bank of England introduced CBEST. CBEST is a framework that brings together Cyber intelligence service providers, penetration testing companies and financial Institutions to deliver customised, intelligence-led cyber security tests in a controlled environment. The tests conducted by identified penetration testing companies replicate real world scenarios taking into account intelligence on cyber risks provided by the Cyber intelligence service providers. Further the tests are conducted on critical systems and essential services. This ensures that the critical infrastructures of financial institutions are tested with scenarios that are most relevant and which they are most likely to face in case of a real attack.
Use of SWIFT-MIRS as a disaster recovery system for RTGS
Unlike many other countries including India which maintain more than two sites for their RTGS system, the RTGS system in UK has two sites. BoE decided against investing in a fully operational third site as it was felt that the risk of losing both sites at once, though of critical impact, is very low probability. Further, in their perception, having a third site which replicates the technology platform of the first and second sites does not fully address all risks. A successful breach of one site would almost certainly lead to a breach of the second or third sites if they were exact duplicates. As an alternative, BoE considered the SWIFT MIRS initiative.
The SWIFT Market Infrastructure Resilience Service (MIRS) is a generic RTGS platform developed and hosted by SWIFT. The generic RTGS system could be used by Bank of England (or any central bank) in the event that all their sites are lost. The Bank would continue to run the business operation, while SWIFT technically operates MIRS. Apart from offering an additional contingency option, MIRS increases operational resilience in two key ways. First, it will be technically operated from outside the United Kingdom, so bringing greater geographic diversity to the sites hosting the infrastructure. And second, MIRS achieves technical diversity as it will be based on a different technology platform. This addresses a problem common in contingency arrangements that sites share software and hardware configurations and so are susceptible to the same risks.
The way forward
The uncomfortable truth all of us need to come to terms with is that cyber crime is here to stay. Crime and money are often linked. Hence the financial sector remains most vulnerable in an inter-connected world. While what has been discussed thus far will be instructive to increase the defences and agility to deal with cyber criminals and attacks, I have a few suggestions as we look ahead.
Customer protection and legal framework
Today, a customer can use, apart from paper based instruments, debit cards, credit cards, automated teller machines, mobile phones, points of sale terminals or Internet for undertaking financial transactions. Cyber fraud can be perpetrated through any of the above medium/device. The Reserve Bank and the Government of India have been consistently making efforts over several years to encourage electronic banking and electronic financial transactions to bring the economy out of cash based system. If the efforts have to bring in sustained and substantial benefits, then the system has to be made robust enough for customers to have confidence in the system. For this to happen, the common person has to be safeguarded against any loss, as long as he has not been negligent, the onus of proving negligence being on the service provider.
In this regard, it is my considered view that India needs a statute protecting a common citizen against cyber fraud or cyber crime. A strong law, which protects a diligent customer from cyber frauds would infuse institutional safeguard to a common person and increase his confidence to use technology in financial transactions.
Let me quote two well known US based cases to support my suggestion. Take for instance, the widely referred case of Patco Construction Co., Inc. v. People's United Bank, 684 F.3d 197, (1st. Cir. July 3, 2012). The First Circuit Court of Appeals held the bank potentially liable for its corporate customer's losses after hackers intruded into the computer systems, stole the customer's bank account access security information, and used that information for effecting unauthorised funds transfers from the customer's account. In seven days, nearly $600,000 of fraudulent wire transfers were made from Patco's account by the time the fraud came to light. The Court found the bank's security procedures were not "commercially reasonable" under Article 4A of Uniform Commercial Code. Second, The Electronic Funds Transfers Act of the U.S. Federal Government and the Regulation E of the Electronic Funds Transfers adopted by the Board of the Federal Reserve serve well to protect the interest of the customer. The loss or liability for the customer is capped in case of card or the electronic transfers, if reported within a specific number of days and the limit varies depending upon the customer's compliance on the incidence reporting. This gives Federal protection against cyber crime.
One might argue that we already have RBI issued directives currently in place today to protect the customers' interest. Besides, institutions such as BCSBI, set up by the Reserve Bank has also been very active in setting up codes for protecting the customer interest. These are largely in the regulatory domain and the common person is not well aware of these nor are these seen as basic rights of the customers. The point that I am trying to flag is that a customer must be legally protected from suffering losses when he becomes a victim of the cyber crime as a matter of right rather than having to run from pillar to post to prove that he was not negligent.
Today, for instance, if a debit card is fraudulently used causing loss to the customer, how long does it take for the customer to get the balance restored? I have come across instances -where even after fraud is proved- of banks waiting for insurance claim to be settled before the amount is restored to the customer. Is this fair? How is a customer concerned about the insurance arrangement that the bank has? This is where statutory protection helps. Can this protection also cover issues relating to cloud computing which could give a push for this cost effective technology being adopted more by the financial sector?
Customer protection and insurance
To implement the kind of customer protection as discussed above, it is important that the insurance sector also responds. Even in the US, the companies lament that the insurance cover does not give adequate financial indemnity to losses arising out of cyber attacks. What is the Indian position? The traditional insurance products cover risks against losses arising from natural calamity, theft, crime etc but typically do not cover losses arising on account of cyber crimes or cyber failures. An insurance cover against cyber crime or cyber failure would mitigate the risk to a large extent.
There can be First Party as well as Third Party Insurance Cover against the cyber crime or failure. The First Party Insurance can cover losses faced directly by the insurance holder including personal information asset damage, including damage to the data, software, and a system failure due to cyber attack and post cyber attack crisis management expenses. The Third Party insurance can protect against claims for losses from another organisation or individuals affected by a cyber breach, including losses arising due to malware, virus etc. This can include network security liability, losses due to the theft and misuse of data, protecting against DOS attacks, liability costs due to internet publishing, including websites, e-mail, instant messaging, and chat rooms, crisis management expenses etc.
Insurance cover is certainly an option worth looking at as part of risk management, but this poses several challenges to both the regulator and the insurance companies. There are several issues in arriving at an acceptable formula for insurance premium due to paucity of historical data. We need to have systematic data on the losses suffered in the past due to cyber attacks covering incident occurrences and incidence reporting, impact analysis, third party damages suffered etc. This is certainly challenging but not insurmountable. I am confident that if we can find a way in arriving at a practical risk mitigating insurance solution, it would certainly add to the push of digital economy.
Cyber information analytics centre
Different institutions, different customers, individually or collectively undergo the pains of cyber crime. To my mind, we need to collect all the data, collate the attacks, failures, measures to mitigate the security gaps, the losses suffered, the turnaround time for fixing the security gap and analyse them in order to guide the industry participants as well as customers. This would also over a period of time, reflect the number of attacks, volume and value of loss, cost of correction and offer a wealth of information, apart from sharing the solutions for preventing known attacks. In particular, this effort would reduce the turnaround time for the sector as whole in bridging the security gap. IDRBT has started this effort last year. But a lot more needs to be shared to serve the full purpose of this important initiative.
May I point out in this connection that when CIBIL was instituted to share credit and default status of the account holders, there was lack of enthusiasm from the banks in sharing information. But then, the regulator gave a push and today it has become a SOP (standard operating procedure) to check on CIBIL site. I would urge all the banks to proactively share information to IDRBT, which would help us to build a better response support system. We will not hesitate to walk the extra mile to make this happen.
Challenge is expertise
As we have seen, security is a function of four parameters - governance, policies, systems and awareness. Of these, the real challenge for the Indian financial system is the awareness. There are two kinds of awareness. One is the awareness among customers about the dos and donts in digital transactions. It may be required for banks to take upon continuous awareness campaign among all customers on the importance of information security and the abundant caution to be exercised by them. Internal awareness is the awareness among employees of the bank about security. While it is necessary to increase the overall awareness among all employees, it is imperative that a small section of employees are groomed to handle higher end security concerns, including digital forensics. Unless banks are able to have strong internal security teams, their position would be weak. Unlike other technology related activities, no organisation can afford to outsource its entire security. Banks have to take up measures to recruit and retain the right talent. More importantly, they should keep the security skills sets always alert and up to date in a world of constant threats by a more motivated group of skilled attackers. The challenge is that there is no readymade skill set in the market too. Banks have to build an entire banking security eco system themselves.
Conclusion
Let me summarise what I have been trying to communicate:
i) Cyber threat is real and is constantly evolving. No organisation is immune or can claim to be fully secure against a cyber attack.
ii) Preventive measures are a must in this scenario.
iii) Where prevention fails, make up with quick detection and decisive response.
iv) Every organisation should have an IT Governance Policy as a subset of cyber security policy. The policy should identify key assets, the risks they are exposed to, prescribe mitigation measures, roles and responsibilities in case of a cyber incident and state the response required.
v) Identify worst case scenarios and plan and practice the response in each case. This is challenging as one is facing a fast moving target.
vi) The aim should be to recover from a worst case scenario as set forth in the cyber security policy.
vii) Be an active participant in sharing information on cyber threats faced.
viii) Adopt ISO 27001 which is internationally recognised best-practice standard for information security management.
In conclusion, in today's interconnected world, eternal vigilance is the price we have to pay not merely for the benefits of democracy as the old saying goes, but also to enjoy the benefits of a safe and secure financial system.

Self Preservation: Which Way for Africans?

Ejike E. Okpa II

I am not an engineer but I know when I studied the History of Architecture during my first year of college and having read the book Why Buildings Stand Up – The Strength of Architecture by Mario Salvadori, I informed myself on the basic science and engineering that go into structures. An easy and evergreen take-away - cracks are ever present in concrete, which is a result of steel, sand and cement in reinforced compositions no matter the effort to eliminate them. 
The United States of America is an aging country.  As a result, there are cracks in its existing infrastructure. Even in the White House, folks, there are cracks. I saw some when I visited the place. Sometimes, the plumbing does not work as well. No engineering project is devoid of flaws in design and construction. Age due to depreciation adds to the remaining age of a structure and its effectiveness. This is not an to excuse for bad projects which abound. How we cure the deficiencies is the zillion dollar question. Anyone believing there is a flawless engineering project does not understanding engineering.
There is the Politics of Business and the Business of Politics. The former determines who gets what and that is where black folks are annoyingly absent. Even in Africa, where one would think there is comparative advantage for blacks folks and native Africans themselves, they are still at the fringes. 
For example, AU – African Union Headquarters in Addis Ababa was built by China -www.bbc.com/news/world-africa. The project cost was $200m. Question, does it mean the 54 African nations could not raise a mere $3.703 million per country, hire a group of black/African architects and engineers, and award the construction contract to black/African firms, as a show of confidence in the quality of work they can do? Why pile up on degrees when we are not even accorded honor and dignity of labor by our own leadership. 
It is very disappointing when it comes to matters where Africans and African-Americans should stand up and out, and make profound statement demonstrating self-centered stance on a project. They yield to others out of timidity and shyness. Self-preservation is the first undisputed order of business and survival. Anyone not disposed to that is naïve and will always remain a doormat. 
I believe wholeheartedly that whoever inserted the saying in the Bible that ‘A prophet has no honor in his own village’ must have studied blacks/Africans. No surprise there: Africans are recorded as the first humans on earth-- maybe that came from their longevity on earth. Sad, very sad folks. Everyone recognizes their own except the BLACK RACE. In Nigeria, a former Power Minister Barth Nnaji, PhD, to boot, was forced out of President Jonathan’s  administration two years ago, because in a bid he was supposed to decide on, he failed to disclose that his Indian partner was a likely bidder and winner. He stuck out his neck for an Indian. Here is the other side: It is very unlikely and highly improbable that the same Indian would  stick out his neck for Mr. Nnaji in India had such an opportunity  risen. Indians win millions of dollars in contracts in Africa but no African has ever won a dime of contract in India. It makes one wonder, why do blacks go to war for others, when the same ‘others’ will not go to war for them? They are basically a front for others, settling for peanuts.
While at it, consider and ponder the following  thoughts:
•All Fingers are not shaped to be equal and alike
•There shall never be a level playing field
•Racism/tribalism will never go away
•Jesus and God will never come to address why he created people differently
•Many are players but very few always are Referees calling the game fair or foul
•Black folks and their African cousins, have not learned to collaborate to build great enterprises to be competitive despite flashes of rich and wealthy folks
•Black folks and their African cousins will rally to build mega-churches often using contactors outside of their community but will not invest to have viable economic vehicles
•Africans on the continent are dangling between China – east and US/UK – west, BEGGING while African-Americans hinge their faith on race/racism/victimization.
•Who will bail the black race?
•African-Americans and their African cousins look for ANGELS in human endeavors while other  people look for ANGLES.
•It is because we looked for ANGELS, we were colonized and enslaved, and still trying to figure out how to rise and deal with other races.
Folks, stop the CRY and look for ANGLES to exact your concerns. While we black folks via our church establishments in US deposit billions annually in banks, there are hardly banks owned by us that are valued in billions. In no given year can we track 10% of what we deposited come back to the community in fulfillment of CRA requirements. 
PayDay and Title Loans predominate our neighborhoods in US and more than 60% of black folks in US are unbanked. In Africa, they are excited about Micro-financing, go figure, and more than 90% have no banking experience. It goes to say, if the African-American, the most educated and exposed black person in the world is still a product of self-doubt and pettiness when it comes to matters germane to his/her existence, I think the largely uneducated Africans can be excused for their naivety. Debate this. 
Asians in US with a population of less than 4% have commercial enterprise exposure of more than 10% while we with a 13% population have less than 4% exposure in commercial enterprise ownership. More than 75% businesses formed in most states by US black folks are geared towards NON-PROFIT, making me ask – whose profit are we looking for?
"Take it, leave it, or better be different," my mom often reminded me. Except she saw  red tears from my eyes, she would not be moved by crocodile tears. She told me that if a snake could climb, run, feed itself, swallow other animals, but it has no hands and legs, what would be my excuse? I got it. Mom, thank you so much for instilling in me a steel heart to stand up and fend for myself.

Before any school could school me, my parents did pretty awesome job reminding me that at the end, I should count and be significant as well as relevant. Informal education often is more effective and powerful than the one learned in 4-walls, which may be processed to make one behave in a predictable manner. Heck no, I look for ANGLES in all human endeavors and exercises because as humans, we are imperfect.

God the Creator made it that way; and if there is a problem, I wait to speak with Him during the Judgment Day, and I will demand He be ready to deal with me His Son. No shaking. Thank God, there will be no witnesses, just me and my Father. Who can fault such privilege and no one will know the outcome. WOW God is awesome, I knew it and still know it. He keeps matters very confidential.

The Origin of African Women Disempowerment

Garikai Chengu

The International Women's Day was founded in 1908 by the Socialist party of America in order to promote the struggle for women's equality. Unbeknown to many, for the vast majority of human history, which took place in Africa, women have been equal if not superior to men.
The world's first civilizations arose from the spiritual, economic and social efforts of African women and African women in turn went on to lead those Matriarchal societies. Matriarchy in ancient Africa was not a mirror image of patriarchy today, as it was not based on appropriation and violence. The rituals and culture of matriarchy did not celebrate violence; rather, they had a lot to do with fecundity, exchange and redistribution.
Early man was unaware of the link between intercourse and birth, therefore it was thought that new life was created by the woman alone. This belief created the first concept of God as a caring, compassionate, generous, all loving and all powerful Mother, which is the basis of the African matriarchal ideology.
Historian Cheikh Anta Diop illustrates how as early as 10,000 BC women in Africa pioneered organized cultivation, thereby creating the pre-conditions for surplus, wealth and trade. African women are responsible for the greatest invention for the well being of human kind, namely, food security. It is the practice of organized agriculture that made population expansion, food surpluses and the emergence civilization possible.
Pre-capitalist matriarchal civilizations in Africa included the Nigerian Zazzau, Sudanese Kandake,  Angolan Nzinga, and Ashanti of Ghana, to name but a few. The quintessential African matriarchal system was most evident and most enduring in black Ancient Egypt.
Women in Ancient Egypt owned and had complete control over both movable and immovable property such as real estate in 3000 BC. As late as the 1960s, this right could not be claimed by women in some parts of the United States. A closer look at ancient Egyptian papyrus' reveals that society was strictly matrilineal and inheritance and descent was through the female line. The Egyptian woman enjoyed the same legal and economic rights as the Egyptian man, and the proof of this is reflected in Egyptian art and historical inscriptions. Egypt was an unequal society but the inequality was based much more upon differences in the social classes, rather than differences in gender.
From ancient legal documents, we know that women were able to manage and dispose of private property, including: land, portable goods, servants, slaves, livestock, and financial instruments such as endowments and annuities. A woman could administer all her property independently and according to her free will and in several excavated cemeteries the richest tombs were those of women.
The independence and leadership roles of ancient Egyptian women are part of an African cultural pattern that began millennia ago and continued into recent times, until Europeans brought capitalism and Christianity to Africa.
In the 1860s, the colonial explorer Dr. David Livingstone wrote of meeting female chiefs in the Congo, and in most of the monarchical systems of traditional Africa, there were either one or two women of the highest rank who occupied a position  at par with that of the king or complementary to it.
Professor of Ancient African History, Barbara Lesko illustrates how anthropologists who have studied African history and records of early travelers and missionaries tell us "everywhere in Africa that one scrapes the surface, one finds ethno-historical data on the authority once shared by women."
Under colonial misrule, black women suffered double-edged discrimination and dis-empowerment both as women and as black people.
It is difficult for many people to accept that racial discrimination and antagonism, which is such a pervasive phenomenon in the world today, has not been a permanent historical feature of humanity. In fact, the very notion of "race" and the ideology and practice of racism is a relatively modern concept.
For instance, historians recount how the Romans and Greeks attached no particular stigma to the colour of a person's skin and there were no theories about the inferiority of darker skin. Slavery in ancient societies was not defined by color, but primarily by military fortune: conquered peoples, irrespective of their color, were enslaved.
Just before colonisation, African women were largely equal to men. The significant value of African women's productive labour in producing and processing food created and maintained their rights in domestic, political, cultural, economic, religious and social spheres, among others. Because women were central to production in these pre-class societies, systematic inequality between the sexes was nonexistent, and elder women in particular enjoyed relatively high status.
With the creation of the capitalist colonial economy, the marginalization of women came in several ways:
Firstly, the advent of title deeds, made men the sole owners of land. Consequently, as women lost access and control of land, they became increasingly economically dependent on men. This in turn led to an intensification of domestic patriarchy, reinforced by colonial social institutions.
Secondly, as colonialism continued to entrench itself on African soil, the perceived importance of women’s agricultural contribution to the household was greatly reduced, as their vital role in food production was overshadowed by the more lucrative male-dominated cash crop cultivation for the international market. Prior to colonialism, women dominated trade. Markets were not governed by pure profit values; but rather, by the basic need to exchange, redistribute and socialize. Traditional African economic systems were not capitalist in nature.
Thirdly, colonialism brought with it Christianity and a masculine fundamentalism, which is now prevalent across Africa today. The imported patriarchal religion does not allow women to play the leading roles they have in the indigenous African religion.
In Ancient African religions it is not only God who is female, but also the main guardian spirits and sacred principles. Rosalind Jeffries, a historian, documents the concept of the Supreme Mother.  In a paper entitled, “The Image of Woman in African Cave Art,” she shows how African Creation stories focused on the Primordial Mother, creating woman first, then man.
Christianity brought the monogamous nuclear family unit to Africa. Its sole purpose was to pass on private property, in the form of inheritance, from one generation of men to the next. Under capitalism, the modern family unit is founded on concealed, domestic slavery of the wife; and, the modern capitalist society is a compound made up of many individual families as its molecules.
A glance at the dictionary will reveal that the word family, has rather telling Latin origins. Famulus literally means domestic slave; and familia, which is also the Italian word for family, signified the total number of slaves belonging to one man. Karl Marx lays it bare: "The modern family contains in germ not only slavery (servitus) but also serfdom, since from the beginning it is related to agricultural services. It contains in miniature all the contradictions which later extend throughout society and its state."
Finally, the introduction of wage labour affected women by uprooting men from villages to work in urban areas, causing profound, negative economic impacts on women. Colonial authorities routinely used native African males to impose taxes on women, thereby entrenching male dominance in the Native’s psyche. After all, colonialists brought to Africa the concept of the Victorian woman: a woman who should stay in the private domain and leave "real work" to the men. Due to the Victorian concept of women held by all colonialists, African women were excluded from the new political and administrative system, whose sole purpose was to extract raw materials and labour from the colony.
Colonialism replaced the role and status of the pre-colonial, African woman with a landless and disenfranchised domestic slave.
The United Nations Development Program notes that nowadays, African women perform sixty-six percent of the world’s work, produce fifty percent of the food, but earn only ten percent of the income and own only one percent of the property.
The greatest threat towards the African woman’s glorious future is her ignorance of her glorious past. Armed with knowledge, Africans must now fight to restore women to a position of respect and of economic freedom that exceeds that which she enjoyed before colonialism.