The purpose of this paper will address problems with Ethiopia’s unofficial cyber espionage and evaluate the effects this has on journalist Article 19 freedom of expression is violated. Ethiopia’s Anti-Terrorism Proclamation are explained along with The International Covenant on Civil and Political Rights which includes Article 19 and how both are used in journalism. The Ethiopian Constitution will show that the culture of the people understands freedom of speech. The constitution also shows that the Ethiopian regime is violating its own agreement with the people. Main points will be supported by examples of Ethiopian regime supported journalism and journalists who are in jail for speaking out against the regime. The assumptions are that the U.S. and U.N. allow the Ethiopian regime to conduct an unofficial cyber espionage program. Another assumption is that China is directly supporting the unofficial cyber espionage program with aid.
The people of Ethiopia are under the impression that if they live their lives in a lawful manner they have nothing to worry about. The constitution affords them the rights to privacy and their own thoughts. This is not the case for journalist or bloggers who have a dissident view of the regime in Ethiopia. The...
... middle of paper ...
...ia, 2014) Arrested and tortured journalists or bloggers in Ethiopia are not new; these nine represent only a fraction. More than eight convicted journalists have up to life sentences, since 2012.
**Swedish** This is something that affects journalist that are from the country; who are from other countries visiting; or from Ethiopia and living in the United States. The far reaching duct tape of the Ethiopian Government makes some wonder what they are hiding. There are acts of
Espionage in Ethiopia fuels suspicion of what they are hiding.
***“Journalism is way to provide oversight for the people of any country in keeping the government organization in line. Without investigative journalism the government can hide anything from corruption to terrorism. The use of the term Anti-Terrorism would be a clever ploy to hide illegal actions on the government’s part.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- A major challenging impacting organizations, is having a comprehensive security plan that will safeguard the personal information of their clients and employees. While at the same time, it must be able to streamline the different administrative and technical functions. The result is that firms must develop and update their strategies to deal with the changing nature of the threats they are facing. This is because as technology improves, more are increasingly vulnerable to a host of ever changing tactics.... [tags: Security, Computer security, Information security]
1242 words (3.5 pages)
- ... In order for companies or firms to avoid being rocked by industrial espionage, it is vital to first identify the means of corporate espionage so then companies may be able guard themselves against this unfair trading practice. Proprietary information can get into the hands of competitors via various methods. More frequent than not, trade secrets get funneled to the wrong channels through employees, telecommunications interceptions, human intelligence and reverse engineering12. Other common means of espionage include also mole planting, outsourcing, third party acquisition, blackmailing, bribery, eavesdropping, third party acquisition and many more.13 A few methods and examples will be di... [tags: spying, industrial espionage, cyber espionage]
2469 words (7.1 pages)
- Mandiant Report APT1 Exposing One of China’s Cyber Espionage Units Mandiant APT1 Report Mandiant is an information security company which deals with the advanced threat detections and response solutions. It has investigated various computer security breaches, the major security breaches are attributed to advanced threat actors referred to as the “Advanced Persistent Threat” (APT). APT1 is one of the most prolific cyber espionage groups in China, it has stolen the large amount of confidential data from 141 organizations all over the world.... [tags: mandiant, china, information security]
1130 words (3.2 pages)
- On April 8, 1941, the former Italian colony of Eritrea was placed under the British Military Administration (BMA) pending an international decision of its fate as an independent nation. Ethiopia laid claim to Eritrea and the United Nations passed a motion to federate Eritrea with imperial Ethiopia in 1952. However, the UN mandated that Eritrea was to remain as a semiautonomous, self-governing territory with legislative, executive, and judicial powers over its own domestic affairs. This was to last ten years, at which time Eritrea would become liberated.... [tags: Ethiopia and Sudan]
2743 words (7.8 pages)
- People want to feel safe. If someone owns a precious object it is stored in a safe hidden in their house. To further protect a house the front doors have handle locks and dead-bolts. To keep personal items safe items like wallet chains are used to stop criminals in their tracks. In the case of cars where they cannot always be watched, car alarms were made to protect from thieves. All of these systems are in place to keep people and their possessions safe. There is an area in people’s lives that is not heavily inspected for weaknesses, however.... [tags: Cyber-Crime Essays]
1424 words (4.1 pages)
- EPRDF (Ethiopian People Revolutionary Democratic Front) has intimidated and suppressed voter in order to win the 2010 Ethiopian Parliamentary Election. The Meles Zenawi administration has cracked down opposition party and dismantled people who are supporters of the opposition parties. Many national and international human rights activists criticized the ruling party. In many parts of Ethiopian rural areas, the ruling party EPRDF deployed many of its supporters and cadres to put pressure on local villagers and opposition members.... [tags: Ethiopian People Revolutionary Democratic Front]
2346 words (6.7 pages)
- Cyber Warfare Introduction Many nations in the world - the United States, China, Russia, Iran, Germany, and more- use cyber warfare as a method of conducting sabotage and espionage. Nations, such as China and Russia, use espionage in order to prevent their economy and their military technology from falling behind by stealing advanced nations’ technology. Other nations, including Israel and Iran, focus on sabotaging other nations to cripple them, by sending malwares that destroy important data on the system, from advancing their technology and costing them a decent amount of money due to repairs.... [tags: Sabotage, Espionage, Technology]
1748 words (5 pages)
- Economic Espionage act (1996) states that “Whoever, intending or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent, knowingly without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret shall, except as provided in subsection (b), be fined not more than $500,000 or imprisoned not more than 15 years, or both.”.... [tags: Business ]
935 words (2.7 pages)
- Ethiopia It stands as one of the oldest nations of the world, dating back to 1000 BC when the Queen of Sheba visited King Solomon. Ethiopia was a nation with promise, a nation with riches and the greatest Ivory market as far as the eye can see. So one would assume that Ethiopia is the place to live. Well if you have been to Ethiopia you would see this is not the case. Ethiopia is a povershed country where people are fighting to live everyday. There economy is nearly in ruins and there main export, is almost stolen from them.... [tags: Economy Geography Ethiopia Essays]
1936 words (5.5 pages)
- TOPIC: Ethiopia Introduction paragraphs The history of Ethiopia’s development. Ethiopia brief history in the colonial era. Body paragraphs 1. First paragraph Economic development since 2000 till present and agriculture as the major contributor Growth theory, Examples of theories and strategies; growth model, structural model 2. Next paragraph Factors that affect development as a general process in Ethiopia, Strategies implemented by the government and policies on the economic development and economic growth challenges.... [tags: Ethiopia Research paper]
2428 words (6.9 pages)