Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Telkom recovering after Cape storms disrupt network

      Telkom recovering after Cape storms disrupt network

      14 May 2026
      The lesson Seacom learnt from its massive 2024 outage - Richard Schumacher

      The lessons Seacom learnt from its massive 2024 outage

      14 May 2026
      Major new security feature coming to WhatsApp

      Major new security feature coming to WhatsApp

      14 May 2026
      Starlink wait set to drag on as Icasa flags legal hurdle

      Starlink wait set to drag on as Icasa flags legal hurdle

      13 May 2026
      Malatsi opens door to 'some' partial privatisations of SOEs - communications minister Solly Malatsi

      Malatsi opens door to ‘some’ partial privatisations of SOEs

      13 May 2026
    • World
      Pop star sues Samsung for $15-million - Dua Lipa

      Pop star sues Samsung for $15-million

      11 May 2026
      OpenAI's new audio APIs aim for conversational voice agents

      OpenAI’s new audio APIs aim for conversational voice agents

      8 May 2026
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
      Pivotal week for US tech stocks

      Pivotal week for US tech stocks

      28 April 2026
      Sam Altman denies betraying Elon Musk. Shelby Tauber/Reuters

      Worries over OpenAI’s growth as Anthropic gains ground

      28 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      Datatec is firing on all cylinders - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      TCS+ | The Up&Up Group on the hidden cost of AI - Jason Harrison

      TCS+ | The Up&Up Group on the hidden cost of AI

      13 May 2026
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
    • Opinion
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CM Telecom
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » News » South Africa’s power plan is meaningless without protecting the infrastructure

    South Africa’s power plan is meaningless without protecting the infrastructure

    By The Conversation7 August 2022
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    President Cyril Ramaphosa recently outlined plans to solve the country’s devastating electricity supply crisis. But he didn’t mention the country’s ability to protect its energy infrastructure as a prerequisite to any solution.

    South Africa has had power cuts since 2007 when Eskom, the power utility, began failing to meet demand. This got worse every year. The power utility is struggling to keep its aged coal-fired power stations running after many years of poor maintenance. It is also struggling to get its two new power stations to operate at full capacity.

    Explaining some of the recent power cuts, Ramaphosa said that some of the energy infrastructure had been sabotaged.

    A comprehensive approach is needed – including managing security threats – to address the energy crisis

    We flagged this in an earlier article. We argued that Eskom was the target of hybrid warfare operations aimed at destabilising South Africa’s national power generation capability.

    The question is whether the country has the necessary security capabilities to protect its energy infrastructure from such threats and risks. An assessment of the security capabilities also has to include a fit for purpose test of the legislation for the protection of critical infrastructure.

    Enhanced intelligence capacities are required to detect, deter and neutralise threats such as sabotage, or subversion caused by rioting. More – and appropriately equipped – security forces are also needed to physically secure critical infrastructure. These could be privately or publicly funded.

    Our view is that the country does not have what is required where and when it is needed. A comprehensive approach is needed – including managing security threats – to address its energy crisis. This requires collaboration between the state and private sector to implement the president’s long-term energy security vision.

    Hybrid attacks now common

    South Africa is not the only country whose energy infrastructure is facing security threats. There are numerous examples of attacks on critical infrastructure. These are typically cyber-related. But physical attacks such as sabotage also occur.

    The Institute for Security Studies argues that attacks on the critical infrastructure of developing countries, such as South Africa, could be “potentially devastating”. South Africa’s national security vulnerabilities, combined with the security risks to a monolithic state-owned entity with no backup, could exacerbate the country’s power supply insecurities.

    Cyberattacks on Eskom’s critical infrastructure could lead to severe damage. The result could be corresponding losses of generation capacity and damage to the economy.

    National security vulnerabilities can be reduced by state security capabilities that are equal to the task. A Report of the Expert Panel into civil unrest in the country in July 2021 revealed serious capacity problems within the state security sector. The sector is mandated to forewarn government, and to protect critical infrastructure and the public against hybrid threats. These include terrorism, subversion, sabotage, espionage and organised crime.

    This weakness was also highlighted in the 2018 High-Level Review Panel on the State Security Agency. It concluded that the country’s State Security Agency had been “compromised by factionalism, mismanagement and inefficiency.

    The agency is South Africa’s primary authority tasked with protecting the country against such hybrid threats. Yet it is in a state of disrepair. This calls for the country to focus efforts on (at least) the capability to secure Eskom against obvious national security threats.

    The importance of critical infrastructure

    The protection of South Africa’s energy infrastructure falls within the remit of the new Critical Infrastructure Protection Act 8 of 2019. Such infrastructure is crucial for the effective functioning of the economy, national security and public safety.

    Critical infrastructure consists of national assets that are viewed as having strategic importance. South Africa has plenty of critical infrastructure spread across its length and breadth – measuring about 1.219 million km². These include the Eskom energy grid – including power stations, substations and transmission networks – dams, the banking system and oil storage. The sheer scale requires extensive security capabilities necessary for physical protection and monitoring threats.

    Beyond physically securing this infrastructure, the state also needs to have the ability to detect, deter and neutralise threat actors. These are classical counterintelligence prerogatives. Failure on this front makes the country vulnerable to destabilisation.

    The stretched nature of the country’s security agencies was laid bare during the violent riots in July 2021. It is thus reasonable to question the capacity of the police, and other security agencies, to secure Eskom’s critical infrastructure and that of private power producers.

    Planning for security

    In our view, all planning to develop and diversify the national power grid and energy supply should include enough resources to protect them. This requires cooperative planning between Eskom and the South African security sector (both state and private).

    The exact role of the defence force in providing security for critical infrastructure remains unclear. The National Key Points Act 1980, the Defence Act 2002 and the Critical Infrastructure Protection Act 8 of 2019 are not explicit on the issue.

    The protection of critical infrastructure has been assigned to the police, with the defence force supporting it. Given that the defence budget has been shrinking annually, the military will probably not be able to sustain this.

    It is time the country took stock of its security requirements in the same way it has started being serious about its energy vulnerabilities

    With the private sector playing an increased role in the energy sector, South Africa needs to develop dedicated private security capacities to protect its critical infrastructure. At the very least, it should adopt a mixed public-private security model akin to the police service’s community policing concept.

    The president’s energy vision envisages a much larger private industrial capacity. If left unsecured, such capacity would be just as vulnerable to sabotage as the current Eskom infrastructure is. It is time the country took stock of its security requirements in the same way it has started being serious about its energy vulnerabilities.

    There’s also the question of whether the penalties prescribed by law are fit to deter sabotage.

    What needs to happen

    The hybrid nature of threats to the country’s infrastructure can only be solved by an integrated solution. That requires, firstly, clarity about mandates as well as state security capabilities.

    Secondly, security sector capacity needs to be developed alongside critical infrastructure. Thirdly, legislation needs to increase existing sanctions in terms of fines and imprisonment.

    Lastly, public-private security partnerships must be established to bolster the security of the country’s electricity infrastructure.The Conversation

    • Written by Sascha-Dominik (Dov) Bachmann, professor in law and co-convener of the National Security Hub (University of Canberra), and Dries Putter, lecturer at the faculty of military science / affiliate member, National Security Hub, University of Canberra, and researcher for Security Institute for Governance and Leadership in Africa, Stellenbosch University
    • This article is republished from The Conversation under a Creative Commons licence

    Click here for the best South African tech news

    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleMusk challenges Twitter CEO to a public debate
    Next Article Load shedding suspended as generation picture improves

    Related Posts

    Telkom recovering after Cape storms disrupt network

    Telkom recovering after Cape storms disrupt network

    14 May 2026
    The lesson Seacom learnt from its massive 2024 outage - Richard Schumacher

    The lessons Seacom learnt from its massive 2024 outage

    14 May 2026
    7 key digital platforms to market your business online - Domains.co.za

    7 key digital platforms to market your business online

    14 May 2026
    Company News
    7 key digital platforms to market your business online - Domains.co.za

    7 key digital platforms to market your business online

    14 May 2026
    In crypto, trust is the new currency - Binance South Africa's Sam Mkhize

    In crypto, trust is the new currency

    13 May 2026
    Don't miss the Telviva Tech Insights webinar

    Don’t miss the Telviva Tech Insights webinar

    13 May 2026
    Opinion
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Telkom recovering after Cape storms disrupt network

    Telkom recovering after Cape storms disrupt network

    14 May 2026
    The lesson Seacom learnt from its massive 2024 outage - Richard Schumacher

    The lessons Seacom learnt from its massive 2024 outage

    14 May 2026
    7 key digital platforms to market your business online - Domains.co.za

    7 key digital platforms to market your business online

    14 May 2026
    Major new security feature coming to WhatsApp

    Major new security feature coming to WhatsApp

    14 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}