Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation - Dark Reading
Dark ReadingArchived Mar 21, 2026✓ Full text saved
Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation Dark Reading
Full text archived locally
✦ AI Summary· Claude Sonnet
CYBERSECURITY OPERATIONS
CYBER RISK
THREAT INTELLIGENCE
MOBILE SECURITY
NEWS
Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific
Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation
Rapid digitization, uneven cybersecurity know-how, and growing cybercriminal syndicates in the region have challenged law enforcement and prosecutors.
Robert Lemos,Contributing Writer
December 17, 2025
4 Min Read
SOURCE: JURGENS POTGIETER VIA SHUTTERSTOCK
Law enforcement representatives from more than 40 African nations met Dec. 10 to discuss the ongoing challenges presented by cross-border cybercrime, standardizing on essential equipment and infrastructure, and educating officers on how to investigate and prosecute cybercrimes.
At the Sixth Meeting of the Heads of National Liaison Offices (NLOs) in Algiers earlier this month, law-enforcement representatives from African nations discussed improving digital connectivity, widening the access to training for cyber investigations, and focusing on data to inform policing strategies, according to a statement published Dec. 10. The meeting marks progress of the African Union's collaborative law enforcement organizations, which have struggled with cross-border investigations into cybercriminal organizations over the past five years, but has recently marked significant wins.
"The progress we have achieved in digital platforms, training delivery, and national coordination reflects the collective determination of our Member States to enhance their policing capabilities," Benaired Mohamed, the head of Afripol's Training and Capacity Building Division, said in the statement.
Related:Operation Red Card 2.0 Leads to 651 Arrests in Africa
African has experienced significant growth in digital adoption, but that growth has come with a rise in cybercrimes and cyberattacks. As a greater share of citizens access online services, often through mobile devices, cybersecurity has lagged, with African companies and government organizations failing to establish strong cyber-resilient infrastructure and services. The fast adoption of AI technologies promises to bolster national economies, but gives cybercriminals better tools to use in attacks.
While the number of cyberattacks against the average African organizations has declined over the year, it still remains well above the global average. Source: Check Point Software
As a result, African organizations experienced an average of 3,153 cyberattacks every week in 2025, 61% higher than the global average, according to the report "2025 African Perspectives on Cyber Security," published by cybersecurity firm Check Point Software. The continued elevated risk for Africa means that law enforcement organizations need to improve quickly, says Ian Van Rensburg, head of security engineering Africa at Check Point Software.
"Cross-border cooperation is now essential, as cybercriminals exploit legal and technical gaps between nations," he says. "But challenges remain: varying laws and concerns over data sensitivity still slow evidence sharing, even as digital threats move in real time."
'They're Talking to Each Other'
While African nations have taken steps to improve and advance their legal frameworks and to gain the necessary skills to investigate and prosecute cybercrimes more effectively, legal and judicial gaps remain, as well as a lack of training opportunities and a shortfall in investigatory capacity, says Neal Jetton, director of Interpol's cybercrime unit.
Related:Extra Extra! Announcing DR Global Latin America
"The primary change for law enforcement is that we are always playing catch-up to the cybercriminals due to the evolving nature of the cybercriminal landscape," Jetton says. "The need for specialized cybercrime units is recognized by [African] law enforcement and being implemented."
Over the past five years, African law enforcement agencies have dramatically improved their sophistication and their capabilities for collaboration, says Check Point's Van Rensburg. Coordinated operations across multiple countries are no longer exceptions, and investigations of entire criminal organizations are possible.
In the past two years, Afripol and national law enforcement agencies have collaborated with Interpol and private companies to investigate cybercriminals gangs, seize their assets, and take down their infrastructure.
"It's not perfect, but it's progress," Van Rensburg says, adding, "Five years ago, if a hacker in Lagos scammed someone in Nairobi, both countries would open separate investigations that went nowhere. Now? They’re talking to each other."
Related:Cyberattacks Likely Part of Military Operation in Venezuela
Building Capacity and Collaboration
Among the priorities for Afripol are the adoption of investigative tools that can adapt to the latest criminal tactics and techniques to help agencies deal with the fast-moving threat landscape and regular training for investigators, rather than annual seminars, says Check Point's Van Rensburg. In addition, the national police agencies have worked toward better encrypted channels for case communication and to harmonize legal frameworks, so that evidence collected in one country can be used to prosecute criminals in another country, he says.
"They've made progress by standardizing digital evidence procedures, so a laptop seized in Kenya can support a prosecution in Nigeria," Van Rensburg says. "Before this, cases often collapsed due to incompatible standards."
Interpol's Jetton agrees that building out law enforcement's capacity to investigate cybercrimes through training and cooperation is critically important. The only way to prosecute cybercriminals syndicates, which are increasingly moving in from Southeast Asia, is to cooperate regionally and internationally, he says.
"It is important for Interpol and Afripol to work together to build a unified and effective response targeting transnational cyber threats," Jetton says, pointing to initiatives like Interpol's African Joint Operation against Cybercrime (AFJOC), which leverages Interpol global network and intelligence-sharing mechanisms with Afripol's regional network and focus to plan, coordinate, and executive effective regional operations.
"The benefits of cross-border collaboration are many," he says. "For both organizations [Interpol and Afripol], cross-border collaboration is a strategic priority, and both are working to strengthen institutional ties between national offices, with the goal to overcome procedural and jurisdictional barriers."
Read more about:
DR Global Middle East & Africa
About the Author
Robert Lemos
Contributing Writer
Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends.
Want more Dark Reading stories in your Google search results?
ADD US NOW
More Insights
Industry Reports
Frost Radar™: Non-human Identity Solutions
2026 CISO AI Risk Report
Cybersecurity Forecast 2026
The ROI of AI in Security
ThreatLabz 2025 Ransomware Report
Access More Research
Webinars
Building a Robust SOC in a Post-AI World
Retail Security: Protecting Customer Data and Payment Systems
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
Securing Remote and Hybrid Work Forecast: Beyond the VPN
AI-Powered Threat Detection: Beyond Traditional Security Models
More Webinars
Editor's Choice
CYBERSECURITY OPERATIONS
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
byJai Vijayan
MAR 12, 2026
5 MIN READ
CYBER RISK
What Orgs Can Learn From Olympics, World Cup IR Plans
byTara Seals
MAR 12, 2026
THREAT INTELLIGENCE
Commercial Spyware Opponents Fear US Policy Shifting
byRob Wright
MAR 12, 2026
9 MIN READ
Want more Dark Reading stories in your Google search results?
2026 Security Trends & Outlooks
THREAT INTELLIGENCE
Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats
JAN 2, 2026
CYBER RISK
Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult
JAN 12, 2026
ENDPOINT SECURITY
CISOs Face a Tighter Insurance Market in 2026
JAN 5, 2026
THREAT INTELLIGENCE
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
JAN 30, 2026
Download the Collection
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
SUBSCRIBE
Webinars
Building a Robust SOC in a Post-AI World
THURS, MARCH 19, 2026 AT 1PM EST
Retail Security: Protecting Customer Data and Payment Systems
THURS, APRIL 2, 2026 AT 1PM EST
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
WED, APRIL 1, 2026 AT 1PM EST
Securing Remote and Hybrid Work Forecast: Beyond the VPN
TUES, MARCH 10, 2026 AT 1PM EST
AI-Powered Threat Detection: Beyond Traditional Security Models
WED, MARCH 25, 2026 AT 1PM EST
More Webinars
White Papers
Autonomous Pentesting at Machine Speed, Without False Positives
Fixing Organizations' Identity Security Posture
Best practices for incident response planning
Industry Report: AI, SOC, and Modernizing Cybersecurity
The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks.
Explore More White Papers
GISEC GLOBAL 2026
GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills.
📌 BOOK YOUR SPACE