Evidence of Social Media Blocking and Internet Censorship in Ethiopia
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Jawar Mohammed Biography: the Interesting Profile of an Influential Man
Jawar Mohammed Biography: The Interesting Profile of an Influential Man Jawar Mohammed is the energetic, dynamic and controversial political face of the majority of young Ethiopian Oromo’s, who now have been given the green light to freely participate in the country’s changing political scene. It is evident that he now has a wide reaching network that spans across continents, namely, the Americas, Europe, and obviously Africa. Jawar has perfected the art of disseminating his views to reach his massive audience base through the expert use of the many media outlets, some of which he runs. His OMN (Oromia Media Network) was a constant source of information for those hoping to hear and watch the news from a TV broadcast that was not associated with the government. Furthermore, Jawar’s handling of Facebook with a following of no less than 1.2 million people, as well as, his skillful use of various other social media tools has helped firmly place him as an important and influential leader in today's ever changing Ethiopian political landscape. Jawar Mohammed: Childhood Jawar Mohammed was born in Dumuga (Dhummugaa), a small and quiet rural town located on the border of Hararghe and Arsi within the Oromia region of Ethiopia. His parents were considered to be one of the first in the area to have an inter-religious marriage. Some estimates claim that Dumuga, is largely an Islamic town, with over 90% of the population adhering to the Muslim faith. His father being a Muslim opted to marry a Christian woman, thereby; the young couple destroyed one of the age old social norms and customs in Dumuga. -
Internet Censorship and Resistance May 15, 2009 1 / 32 Historical Censorship
INTERNET CENSORSHIP AND RESISTANCE Joseph Bonneau [email protected] (thanks to Steven Murdoch) Computer Laboratory Gates Scholars' Symposium 2010 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 1 / 32 Historical Censorship He who controls the past controls the future, and he who controls the present controls the past —George Orwell, Nineteen Eighty Four, 1949 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 2 / 32 Historical Censorship He who controls the past controls the future, and he who controls the present controls the past —George Orwell, Nineteen Eighty Four, 1949 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 2 / 32 Information as a Human Right Everyone has the right to freedom of opinion and expres- sion; this right includes freedom to hold opinions without inter- ference and to seek, receive and impart information and ideas through any media and regardless of frontiers. —Article 19, UN Declaration of Human Rights (1948) Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 3 / 32 Information as a Human Right The final freedom, one that was probably inherent in what both President and Mrs. Roosevelt thought about and wrote about all those years ago, ... is the freedom to connect—the idea that governments should not prevent people from con- necting to the internet, to websites, or to each other... a new information curtain is descending across much of the world. —Hillary Clinton, US Secretary of State (2010) Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 3 / 32 The Internet Dream The Net treats censorship as damage and routes around it. -
Social Media and Politics: Theoretical and Methodological Considerations in Designing a Study of Political Engagement
Social Media and Politics: Theoretical and Methodological Considerations in Designing a Study of Political Engagement Paper presented at Politics: Web 2.0: An International Conference New Political Communication Unit Royal Holloway, University of London April 17-18, 2008 Maja Turnšek University of Ljubljana, Faculty of Social Sciences, Slovenia [email protected] Nicholas W. Jankowski Virtual Knowledge Studio for the Humanities and Social Sciences, Amsterdam, The Netherlands [email protected] 1 Introduction Web 2.0 has become the buzz word describing a plethora of social media available on the internet, includingblogs, photo and file sharing systems (e.g., Flickr, SlideShare, YouTube), and social networking sites (e.g., Friendster, MySpace, SecondLife). Although these media are largely designed for personal presentation, political speech and action sometime emerge, such as in postings protesting government actions on YouTube, creation of candidate headquarters in SecondLife, and utilization of still image and video functionalities on mobile phones during demonstrations and police confrontations. Last year, as candidates began preparing for the U.S. Presidential Primaries, CNN coined the term YouTube-ification of Politics to describe this development. From a perspective ascribing importance to everyday settings as venues for political expression, these Internet-based social media have become both the tools for and sites of politics. The question, however, is how such manifestations of political life can be empirically investigated within a social science theoretical framework. In this paper we examine the theoretical and methodological approaches involved in studying social media utilized for political expression and action. In question form, we ask: How do empirically oriented social scientists consider the theoretical and methodological challenges involved in investigating social media? We address this question through examining a sample of research-oriented peer reviewed journal articles addressing facets of social media. -
Human Rights Violations in Ethiopia
/ w / %w '* v *')( /)( )% +6/& $FOUFSGPS*OUFSOBUJPOBM)VNBO3JHIUT-BX"EWPDBDZ 6OJWFSTJUZPG8ZPNJOH$PMMFHFPG-BX ACKNOWLEDGMENTS This report was prepared by University of Wyoming College of Law students participating in the Fall 2017 Human Rights Practicum: Jennie Boulerice, Catherine Di Santo, Emily Madden, Brie Richardson, and Gabriela Sala. The students were supervised and the report was edited by Professor Noah Novogrodsky, Carl M. Williams Professor of Law and Ethics and Director the Center for Human Rights Law & Advocacy (CIHRLA), and Adam Severson, Robert J. Golten Fellow of International Human Rights. The team gives special thanks to Julia Brower and Mark Clifford of Covington & Burling LLP for drafting the section of the report addressing LGBT rights, and for their valuable comments and edits to other sections. We also thank human rights experts from Human Rights Watch, the United States Department of State, and the United Kingdom Foreign and Commonwealth Office for sharing their time and expertise. Finally, we are grateful to Ethiopian human rights advocates inside and outside Ethiopia for sharing their knowledge and experience, and for the courage with which they continue to document and challenge human rights abuses in Ethiopia. 1 DIVIDE, DEVELOP, AND RULE: HUMAN RIGHTS VIOLATIONS IN ETHIOPIA CENTER FOR INTERNATIONAL HUMAN RIGHTS LAW & ADVOCACY UNIVERSITY OF WYOMING COLLEGE OF LAW 1. PURPOSE, SCOPE AND METHODOLOGY 3 2. INTRODUCTION 3 3. POLITICAL DISSENTERS 7 3.1. CIVIC AND POLITICAL SPACE 7 3.1.1. Elections 8 3.1.2. Laws Targeting Dissent 14 3.1.2.1. Charities and Society Proclamation 14 3.1.2.2. Anti-Terrorism Proclamation 17 3.1.2.3. -
Everyone's Guide to Bypassing Internet Censorship
EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable. -
Shedding Light on Mobile App Store Censorship
Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China. -
Threat Modeling and Circumvention of Internet Censorship by David Fifield
Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. -
In Search of Shelter the Case of Hawassa, Ethiopia
In search of shelter The case of Hawassa, Ethiopia Emma Grant, Gemechu Desta, Yeraswork Admassie, Faraz Hassan, Sophie Stevens and Meheret Ayenew Working Paper Urban Keywords: January 2020 Urbanisation, Informal Settlements, Urban Poverty, Housing About the authors Emma Grant, senior expert, Social Development Direct Gemechu Desta, executive director, Econvalue Consult Yeraswork Admassie, former associate professor of sociology, Addis Ababa University Faraz Hassan, senior urban specialist, Social Development Direct Sophie Stevens, principal consultant, Social Development Direct Meheret Ayenew, senior public policy researcher Acknowledgements With special thanks to Kussia Bekele, senior civil society advisor and research assistant. All photos were taken by members of the Ethiopia research team. The research was funded by the UK Department for International Development’s East Africa Research Fund (EARF) and contributed to the EARF’s research programme: Shaping East African Cities as Systems to Work Better for All. This material has been funded by UK aid from the UK government. However, the views expressed do not necessarily reflect the UK government’s official policies. Produced by IIED’s Human Settlements group The Human Settlements Group works to reduce poverty and improve health and housing conditions in the urban centres of Africa, Asia and Latin America. It seeks to combine this with promoting good governance and more ecologically sustainable patterns of urban development and rural-urban linkages. About Econvalue Consult Econvalue Consult offers advanced policy research expertise on a range of social and economic topics. About Social Development Direct Social Development Direct (SDDirect) provides high-quality, innovative and expert social development assistance and research services. Published by IIED, January 2020 Grant, E, Desta, G, Admassie, Y, Hassan, F, Stevens, S and Ayenew, M (2019) In search of shelter: the case of Hawassa, Ethiopia. -
The Media Democracy Agenda the Strategy and Legacy of Federal Communications Commissioner Michael J
The Media Democracy Agenda The Strategy and Legacy of Federal Communications Commissioner Michael J. Copps by Victor Pickard and Pawel Popiel Annenberg School for Communication, University of Pennsylvania Published by the Benton Foundation The Media Democracy Agenda The Strategy and Legacy of FCC Commissioner Michael J. Copps This Benton Foundation publication is written by Victor Pickard and Pawel Popiel. This work is licensed under the Creative Commons Attribution-Noncommercial 3.0 United States License. A copy of this license is available at http://creativecommons.org/licenses/by-nc/3.0/us Please include the following attribution when citing this report: Pickard, Victor and Pawel Popiel. September 2018. The Media Democracy Agenda: The Strategy and Legacy of FCC Commissioner Michael J. Copps. Evanston, IL: Benton Foundation. https://www.benton.org/publications/Copps-legacy Benton Foundation 727 Chicago Ave. Evanston, IL 60202 www.benton.org Table of Contents Foreword ....................................................................................................................................... 2 Introduction .................................................................................................................................. 4 Historical Context ......................................................................................................................... 5 Biographical Background .............................................................................................................. 7 Democratic Principles -
Ethiopia COI Compilation
BEREICH | EVENTL. ABTEILUNG | WWW.ROTESKREUZ.AT ACCORD - Austrian Centre for Country of Origin & Asylum Research and Documentation Ethiopia: COI Compilation November 2019 This report serves the specific purpose of collating legally relevant information on conditions in countries of origin pertinent to the assessment of claims for asylum. It is not intended to be a general report on human rights conditions. The report is prepared within a specified time frame on the basis of publicly available documents as well as information provided by experts. All sources are cited and fully referenced. This report is not, and does not purport to be, either exhaustive with regard to conditions in the country surveyed, or conclusive as to the merits of any particular claim to refugee status or asylum. Every effort has been made to compile information from reliable sources; users should refer to the full text of documents cited and assess the credibility, relevance and timeliness of source material with reference to the specific research concerns arising from individual applications. © Austrian Red Cross/ACCORD An electronic version of this report is available on www.ecoi.net. Austrian Red Cross/ACCORD Wiedner Hauptstraße 32 A- 1040 Vienna, Austria Phone: +43 1 58 900 – 582 E-Mail: [email protected] Web: http://www.redcross.at/accord This report was commissioned by the United Nations High Commissioner for Refugees (UNHCR), Division of International Protection. UNHCR is not responsible for, nor does it endorse, its content. TABLE OF CONTENTS List of abbreviations ........................................................................................................................ 4 1 Background information ......................................................................................................... 6 1.1 Geographical information .................................................................................................... 6 1.1.1 Map of Ethiopia ........................................................................................................... -
The Mass Media, Democracy and the Public Sphere
Sonia Livingstone and Peter Lunt The mass media, democracy and the public sphere Book section Original citation: Originally published in Livingstone, Sonia and Lunt, Peter, (eds.) Talk on television audience participation and public debate. London : Routledge, UK, 1994, pp. 9-35. © 1994 Sonia Livingstone and Peter Lunt This version available at: http://eprints.lse.ac.uk/48964/ Available in LSE Research Online: April 2013 LSE has developed LSE Research Online so that users may access research output of the School. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LSE Research Online to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain. You may freely distribute the URL (http://eprints.lse.ac.uk) of the LSE Research Online website. This document is the author’s submitted version of the book section. There may be differences between this version and the published version. You are advised to consult the publisher’s version if you wish to cite from it. Original citation: Livingstone, S., and Lunt, P. (1994) The mass media, democracy and the public sphere. In Talk on Television: Audience participation and public debate (9-35). London: Routledge. Chapter 2 The mass media, democracy and the public sphere INTRODUCTION In this chapter we explore the role played by the mass media in political participation, in particular in the relationship between the laity and established power. -
Integration of Variable Renewable Energy in The
INTEGRATION OF VARIABLE RENEWABLE ENERGY IN THE NATIONAL ELECTRIC SYSTEM OF ETHIOPIA ABSTRACT FEBRUARY 2019 The study frame has been crafted and developed in close coordination with the Ethiopian Electric Power (EEP), coordinated by RES4Africa in 2018 in partnership with Enel Foundation and with the technical support of CESI. Acknowlegments Supervisor: Luca Marena, RES4Africa Working group members: Ulderico Bagalini, Bruno Cova, Andrea Prudenzi, CESI – Leonhard Braun, Daniele Paladini, RES4AFRICA – Tesfaye Batu, Daniel Mulatu, Bizuayehu Tesfaye, Mulat Azene, Melaku Yigzaw, Estifanos Gebru, Ethiopian Electric Power – Mirko Armiento, Giuseppe Montesano, Enel Foundation Special thanks to Carlo Papa (Enel Foundation) for supporting the study. Executive Summary Ethiopia is endowed with outstanding and diversified renewable energy resources, namely hydro, wind, solar, geothermal, and biomass. For many decades, the development of the electricity sector was based on the exploitation of huge hydro resources that made the electric power system dependent on water and particularly exposed to the climate change. The non-hydro renewable sources can be efficiently exploited in the power sector to improve energy diversification and support both short- and long-term power system resilience, in order to cope with current and future water challenges related to climate change and to support the national strategy to become a world class exporter of large amounts of clean and cheap renewable energies. However, the deployment of RES generation, especially if variable as in the case of PV and wind, shall be accurately designed to ensure the compliance with reliability standards and security constraints. The following study is focused on the integration of variable renewables into the Ethiopian electrical grid considering the development scenario until 2030.