Posted by OromianEconomist in Africa, African Internet Censorship, Amnesty International's Report: Because I Am Oromo, Censorship, Internet Freedom.
Tags: Africa, African Studies, Because I am Oromo, Ethiopia: Digital Attacks Intensify, The Tyranny of Ethiopia, Tightening the net


“They Know Everything We Do”
Telecom and Internet Surveillance in Ethiopia
One day they arrested me and they showed me everything. They showed me a list of all my phone calls and they played a conversation I had with my brother. They arrested me because we talked about politics on the phone. It was the first phone I ever owned, and I thought I could finally talk freely. — Former member of an Oromo opposition party, now a refugee in Kenya, May 2013
The vast majority of the cases documented by Human Rights Watch involving access to phone recordings involved Oromo defendants organizing Oromos in cultural associations, student associations, and trade unions. No credible evidence was presented that would appear to justify their arrest and detention or the accessing of their private phone records. These interrogations took place not only in Addis Ababa, but in numerous police stations and detention centers throughout Oromia and elsewhere in Ethiopia. As described in other publications, the government has gone to great lengths to prevent Oromos and other ethnicities from organizing groups and associations.123 While the increasing usefulness of the mobile phone to mobilize large groups of people quickly provides opportunities for young people, in particular, to form their own networks, Ethiopia’s monopoly and control over this technology provides Ethiopia with another tool to suppress the formation of these organizations and restrict freedoms of association and peaceful assembly. Human Rights Watch interviews revealed that interrogations seem to follow a similar pattern in which individuals are repeatedly told that security “is monitoring everything” and they should confess to various charges. If confessions are not forthcoming, security officials reveal knowledge of individual phone calls. If a confession or information is not revealed then an entire list of phone calls is produced or an individual phone call is played. At this stage, if no confession or information is obtained, prolonged detention takes place. As is often the case in Ethiopia, arbitrary detention without formal charges is common. In the cases Human Rights Watch has documented, mistreatment in detention at this stage frequently occurs. THEY KNOW EVERYTHING WE DO
Ethiopia: Digital Attacks Intensify
Spyware Firm Should Address Alleged Misuse

(Human Rights Watch, New York) – The Ethiopian government has renewed efforts to silence independent voices abroad by using apparent foreign spyware, Human Rights Watch said today. The Ethiopian authorities should immediately cease digital attacks on journalists, while foreign surveillance technology sellers should investigate alleged abuses linked to their products.
Independent researchers at the Toronto-based research center Citizen Lab on March 9, 2015, reported new attempts by Ethiopia to hack into computers and accounts of Ethiopian Satellite Television (ESAT) employees based in the United States. The attacks bear similarities to earlier attempts to target Ethiopian journalists outside Ethiopia dating back to December 2013. ESAT is an independent, diaspora-run television and radio station.
“Ethiopia’s government has over the past year intensified its assault on media freedom by systematically trying to silence journalists,” saidCynthia Wong, senior Internet researcher at Human Rights Watch. “These digital attacks threaten journalists’ ability to protect the safety of their sources and to avoid retaliation.”
The government has repressed independent media in Ethiopia ahead of the general elections scheduled for May, Human Rights Watch said. Many privately owned print publications heavily self-censor coverage of politically sensitive issues or have shut down. In the last year, at least 22 journalists, bloggers, and publishers have been criminally charged, at least six publications have closed amid a campaign of harassment, and many journalists have fled the country.
Many Ethiopians turn to ESAT and other foreign stations to obtain news and analysis that is independent of the ruling Ethiopian People’s Revolutionary Democratic Front. However, intrusive surveillance of these news organizations undermines their ability to protect sources and further restricts the media environment ahead of the elections. Government authorities have repeatedly intimidated, harassed, and arbitrarily detained sources providing information to ESAT and other foreign stations.
Citizen Lab’s analysis suggests the attacks were carried out with spyware called Remote Control System (RCS) sold by the Italian firm Hacking Team, which sells surveillance and hacking technology. This spyware was allegedly used in previous attempts to infect computers of ESAT employees in December 2013. If successfully installed on a target’s computer, the spyware would allow a government controlling the software access to activity on a computer or phone, including email, files, passwords typed into the device, contact lists, and audio and video from the device’s microphone and camera.
Citizen Lab also found that the spyware used in the attacks against ESAT appeared to have been updated as recently as December 2014. On November 19, a security researcher, Claudio Guarnieri, along with several nongovernmental organizations, publicly released a tool called Detekt, which can be used to scan computers for Hacking Team RCS and other spyware. Citizen Lab’s testing determined that Detekt was able to successfully recognize the version of RCS used in a November attack, but not the version used in a December attack. Citizen Lab concluded that this may indicate that the software had been updated sometime between the two attempts.
These new findings, if accurate, raise serious concerns that Hacking Team has not addressed evidence of abuseof its product by the Ethiopian government and may be continuing to facilitate that abuse through updates or other support, Human Rights Watch said.
Hacking Team states that it sells exclusively to governments, particularly law enforcement and intelligence agencies. The firm told Human Rights Watch in 2014 that “we expect our clients to behave responsibly and within the law as it applies to them” and that the firm will suspend support for its technology if it believes the customer has used it “to facilitate gross human rights abuses” or “who refuse to agree to or comply with provisions in [the company’s] contracts that describe intended use of HT [Hacking Team] software.” Hacking Team has also stated that it has suspended support for their product in the past, in which case the “product soon becomes useless.”
Media reports and research by independent human rights organizations in the past year have documented serious human rights violations by the Ethiopian government that at times have been facilitated by misuse of surveillance powers. Although spyware companies market their products as “lawful intercept” solutions used to fight serious crime or counterterrorism, the Ethiopian government has abused its counterterrorism laws to prosecute bloggers and journalists who merely report on public affairs or politically sensitive issues. Ethiopian laws that authorize surveillance do not adequately protect the right to privacy, due process, and other basic rights, and are inconsistent with international human rights requirements.
Hacking Team previously told Human Rights Watch that “to maintain their confidentiality” the firm does not “confirm or deny the existence of any individual customer or their country location.” On February 25, 2015, Human Rights Watch wrote to the firm to ask whether it has investigated possible abuse of its products by the Ethiopian government to target independent media and hack into ESAT computers. In response, on March 6 a representative of the firm emailed Human Rights Watch that the company “take[s] precautions with every client to assure that they do not abuse our systems, and, we investigate when allegations of misuse arise” and that the firm is “attempting to understand the circumstances in this case.” The company also stated that “it can be quite difficult to get to actual facts particularly since we do not operate surveillance systems in the field for our clients.” Hacking Team raised unspecified questions about the evidence presented to identify the spyware used in these attacks.
Human Rights Watch also asked the company whether contractual provisions to which governmental customers agree address governments’ obligations under international human rights law to protect the right to privacy, freedom of expression, and other human rights. In a separate March 7 response from the firm’s representative, Hacking Team told Human Rights Watch that the use of its technology is “governed by the laws of the countries of our clients,” and sales of its technology are regulated by the Italian Economics Ministry under the Wassenaar Arrangement, a multilateral export controls regime for dual-use technologies. The company stated that it relies “on the International community to enforce its standards for human rights protection.”
The firm has not reported on what, if any, investigation was undertaken in response to the March 2014 Human Rights Watch report discussing how spyware that appeared to be Hacking Team’s RCS was used to target ESAT employees in 2013. In its March 7 response, the company told Human Rights Watch that it will “take appropriate action depending on what we can determine,” but they “do not report the results of our investigation to the press or other groups, because we consider this to be an internal business matter.”
Without more disclosure of how Hacking Team has addressed potential abuses linked to its business, the strength of its human rights policy will be in question, Human Rights Watch said.
Sellers of surveillance systems have a responsibility to respect human rights, which includes preventing, mitigating, and addressing abuses linked to its business operations, regardless of whether government customers adequately protect rights.
“Hacking Team should publicly disclose what steps it has taken to avoid abuses of its product such as those alleged against the Ethiopian government,” Wong said. “The company protects the confidentiality of its customers, yet the Ethiopian government appears to use its spyware to compromise the privacy and security of journalists and their sources.”
http://www.hrw.org/news/2015/03/08/ethiopia-digital-attacks-intensify
THEY KNOW EVERYTHING WE DO
Spyware vendor may have helped Ethiopia target journalists – even after it was aware of abuses, researchers say
http://ayyaantuu.com/horn-of-africa-news/spyware-vendor-may-have-helped-ethiopia-target-journalists-even-after-it-was-aware-of-abuses-researchers-say/
http://www.washingtonpost.com/blogs/the-switch/wp/2015/03/09/spyware-vendor-may-have-helped-ethiopia-spy-on-journalists-even-after-it-was-aware-of-abuses-researchers-say/
Gabaasa Qeerroo Naqamtee,Bitootessa 9,2015, Dhaabbanni Ethio Telecommunication jedhamu Oromiyaa godinoota adda addaa fi naannoolee Beeneshangul Gumuz tajaajila bilbilaa dhorkachaa jira. Addatti Wallagga lixa keessaa fi naannoon Beeneshangul gum, tajaajila bilbilaa fi bittaa SIM akka hin arganne guutummaatti dhorkaa jira,haalli kunis uumanni Oromoo technology fayyadamuun mootummaa irratti wal kakaasaa jira sababaa jedhuun jiraattoti bilbilaa fi SIM kaardii argatanii akka hin bitannee sababaa dhorkeef jecha jiraattoti konkolaataan hamma magaalaa Naqamtee deemanii akka bitatan taasifamaa jira.
Haala kanaan hiriitti tajaajila bilbila bituu daran hammaachaa jira,jiraatoti godina adda addaa irraa gara magaalaa Naqamtee dhufuuf illee geejjibi gahaa akka hin jirre Qeerroon addeesse.
http://qeerroo.org/2015/03/10/wal-quunamtii-uummata-jidduu-kutuuf-jecha-dhaabbati-tajaajila-bilbila-itiyoophiyaa-godinoota-oromiyaa-fi-beneshangul-gumz-tajaajila-bittaa-siim-kaardii-dhorkataa-jira/
You must be logged in to post a comment.