During a recent investigation into the infrastructure of some of South Africa’s major ISPs, we discovered that a large portion of South Africa’s email communications are being routed through SpamExperts’ servers. SpamExperts is a third-party email filtering service provided by a company called N-Able (formerly SolarWinds MSP), headquartered in Austin, Texas.

While the initial investigation was prompted by various technical security challenges, it is the national security implications of this arrangement that now demand our attention.

The dangers of unencrypted email

The email protocol was never designed with end-to-end encryption in mind, meaning that every email sent is visible to the ISP that controls the MTA infrastructure. Many major South African ISPs, including Afrihost, Xneelo, and other prominent names in the market, have begun routing all of their clients’ mail through SpamExperts. This decision was presumably made to combat spam. However, it presents a critical vulnerability: a significant volume of unencrypted emails is now passing through foreign third-party infrastructure.

National security implications

The use of non-local infrastructure for filtering email communications poses several serious risks to South Africa’s national security:

  • Data exposure: Since most emails are not encrypted by default, sensitive communications—including governmental, corporate, and personal data—are exposed during transit.
  • Foreign oversight: Filtering through SpamExperts means that a third party based outside of South Africa handles a large percentage of national email traffic. This raises concerns about potential access, surveillance, and even exploitation by foreign entities.
  • Sovereignty concerns: The involvement of a foreign service provider compromises national data sovereignty. In today’s volatile geopolitical climate, sensitive information could be subjected to external political and legal pressures.

Geopolitical tensions and their impact

Current international conflicts further compound these concerns. With heightened tensions between the United States, Israel, and South Africa, the risk that sensitive communications could be intercepted or misused has never been greater. Nation states often have a vested interest in data that flows across borders, and the involvement of a foreign third party in the email filtering process could offer a backdoor for espionage or other forms of interference.

This situation underscores a broader challenge: when critical telecommunications—integral to both national security and economic stability—are handled by non-local infrastructures, they become vulnerable to international power plays and conflicts. Such vulnerabilities are especially dangerous in an era where cyber threats are escalating alongside geopolitical disputes.

Strengthening South Africa’s cybersecurity

To mitigate these risks, South African organizations and policymakers must consider several proactive measures:

  • Localize critical infrastructure: Encourage the use of local, decentralized email filtering and cybersecurity services to maintain better control over sensitive communications.
  • Enhance encryption standards: Implement robust end-to-end encryption (such as GnuPGP) for email communications, ensuring that even if data passes through third-party systems, it remains secure and inaccessible to unauthorized parties.
  • Policy and oversight: Develop and enforce stringent cybersecurity policies on governmental departments that regulate how foreign entities interact with national data, especially during periods of heightened international tensions.

Conclusion

The discovery that large ISPs in South Africa are filtering a significant portion of unencrypted email traffic through a foreign third party like SpamExperts poses a grave national security concern. As international conflicts continue to unfold between key nation states such as the US, Israel, and South Africa, the risks associated with this non-local handling of critical communications cannot be ignored.

Ensuring the security and sovereignty of our digital communications must become a priority. By localizing critical infrastructure, enforcing stronger encryption protocols, and instituting rigorous cybersecurity policies, South Africa can better protect its sensitive data against foreign exploitation and safeguard its national security in an increasingly complex global landscape.

For more insights and updates on cybersecurity challenges and solutions, visit Noiz.

Further reading and external resources