SlideShare a Scribd company logo
1 of 5
ETHIOPIA USES FOREIGN
KIT TO SPY ON
OPPONENTS - HRW
By. Tori Alvarez
THE REPORT
The 137 page report details the technologies the Ethiopian government
has acquired from several countries and uses to facilitate surveillance of
perceived political opponents inside the country and among the diaspora.
The government’s surveillance practices violate the rights to freedom of
expression, association, and access to information. The government’s
monopoly over all mobile and Internet services through its sole, state-
owned telecom operator, Ethio Telecom, facilitates abuse of surveillance
powers.
 The government is accused of installing spyware on dissidents'
computers
 Ethiopia's government is using imported technology to spy on
the phones and computers of its perceived opponents, a Human
Rights Watch report says.
 The New York-based rights group accuses the government of trying
to silence dissent, using software and kit sold by European and Chinese
firms.
ABOUT THE SPYING!
‘OVERSEAS SURVEILLENCE’
 All phone and internet connections in Ethiopia are provided by a state-owned company. According to HRW,
this has given the government unrecorded conversations are also alleged to have featured in abusive interrogations
of suspected dissidents.
 The technology used by to monitor the communications is said to have been provided by companies based in
China, the UK, Italy and Germany.
 hacked power to monitor communications According to the report, the government has extended its
surveillance to Ethiopians living overseas.
 Ethiopians living in the UK and the US have accused the authorities in Addis Ababa of planting spy software
on their computers.
 Both countries have been urged to investigate the claims, on the grounds that they may have violated
domestic laws against invasions of privacy.
 HRW says the firms that sell surveillance technology to governments also have a duty to ensure that their
products are not helping to suppress human rights.
WORK CITED
http://www.bbc.com/news/world-africa-26730437

More Related Content

Similar to Ethipoia power point

Wired for repression_Document
Wired for repression_DocumentWired for repression_Document
Wired for repression_DocumentMahesh Jakhotia
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docxvickeryr87
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...JohnGacinya
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
Censorship down under
Censorship down underCensorship down under
Censorship down underErhan Boduk
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportarchiejones4
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Technology and Crime.docx
Technology and Crime.docxTechnology and Crime.docx
Technology and Crime.docxwrite22
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Hr report 2015 eg (2)
Hr report 2015 eg (2)Hr report 2015 eg (2)
Hr report 2015 eg (2)egjustice
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdfaesalem06
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Vania_Chaker
 
Assignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advanceAssignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advanceAbramMartino96
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paperMonica Chan
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collectiontrupassion
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and securityGolden Locksmith
 

Similar to Ethipoia power point (20)

Wired for repression_Document
Wired for repression_DocumentWired for repression_Document
Wired for repression_Document
 
250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx250 word agree or disagreeThis week we have been tasked with a.docx
250 word agree or disagreeThis week we have been tasked with a.docx
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Censorship down under
Censorship down underCensorship down under
Censorship down under
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Technology and Crime.docx
Technology and Crime.docxTechnology and Crime.docx
Technology and Crime.docx
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Hr report 2015 eg (2)
Hr report 2015 eg (2)Hr report 2015 eg (2)
Hr report 2015 eg (2)
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...
 
Assignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advanceAssignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advance
 
Polinter11
Polinter11Polinter11
Polinter11
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paper
 
Obama administration defends massive phone record collection
Obama administration defends massive phone record collectionObama administration defends massive phone record collection
Obama administration defends massive phone record collection
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security
 

Ethipoia power point

  • 1. ETHIOPIA USES FOREIGN KIT TO SPY ON OPPONENTS - HRW By. Tori Alvarez
  • 2. THE REPORT The 137 page report details the technologies the Ethiopian government has acquired from several countries and uses to facilitate surveillance of perceived political opponents inside the country and among the diaspora. The government’s surveillance practices violate the rights to freedom of expression, association, and access to information. The government’s monopoly over all mobile and Internet services through its sole, state- owned telecom operator, Ethio Telecom, facilitates abuse of surveillance powers.
  • 3.  The government is accused of installing spyware on dissidents' computers  Ethiopia's government is using imported technology to spy on the phones and computers of its perceived opponents, a Human Rights Watch report says.  The New York-based rights group accuses the government of trying to silence dissent, using software and kit sold by European and Chinese firms. ABOUT THE SPYING!
  • 4. ‘OVERSEAS SURVEILLENCE’  All phone and internet connections in Ethiopia are provided by a state-owned company. According to HRW, this has given the government unrecorded conversations are also alleged to have featured in abusive interrogations of suspected dissidents.  The technology used by to monitor the communications is said to have been provided by companies based in China, the UK, Italy and Germany.  hacked power to monitor communications According to the report, the government has extended its surveillance to Ethiopians living overseas.  Ethiopians living in the UK and the US have accused the authorities in Addis Ababa of planting spy software on their computers.  Both countries have been urged to investigate the claims, on the grounds that they may have violated domestic laws against invasions of privacy.  HRW says the firms that sell surveillance technology to governments also have a duty to ensure that their products are not helping to suppress human rights.