Zimababwe Cyber Law Threatens Freedom of Expression

#ThisFlag

President Robert Mugabe’s government is under unprecedented pressure to deliver on its 2013 election promises, with protests by disgruntled Zimbabweans becoming a daily phenomenon.

The anger is more pronounced on social media platforms such as Facebook and Twitter, where fed-up citizens vent their anger over runaway corruption, unemployment and police brutality.

Pastor Evan Mawarire’s #ThisFlag movement successfully tapped into this anger before he was hounded out of the country through the familiar treason trump card used against Mugabe’s critics such as Dumiso Dabengwa, Ndabaningi Sithole, Morgan Tsvangirai, Welshman Ncube and Renson Gasela, among many others in the past.

Instead of listening to the issues raised by Mawarire and many other Zimbabweans, Mugabe and his ruling Zanu PF reacted with venom, labelling all critics enemies of the country.

In typical Zanu PF fashion, the critics were labelled cyber terrorists to deligitimise their cause and justify a government crackdown that would only help to concretise Zimbabwe’s image as a dictatorship.

Zimbabwe Defence Forces commander Constantino Chiwenga waded into the debate and claimed that Zimbabweans were waging cyber warfare against the government.

Chiwenga went on to threaten those who use social media to exercise their freedom of expression with unspecified action.

Information minister Christopher Mushohwe upped the ante, saying the government would not fold its hands while people violated the Constitution through social media.

State media dutifully amplified the government and the military voices, going to the extent of naming some Zimbabweans in the diaspora as cyber terrorists in typical lynch mob-style.

The government says it is now crafting a law to regulate social media in the wake of protests that have been mainly organised through the platforms.

The Computer and Cyber Crime Bill if passed into law would enable the government to demand the source of information of any content deemed to be in violation of the law.

Similar legislation has been used in the past to persecute government critics including the privately owned media through cooked up criminal cases that never stick in the courts. However, this time the government is fighting a losing battle. The Internet cannot be shut-down even by the most autocratic regimes especially by bankrupt ones.

As State media columnist Nathaniel Manheru, believed to be Mugabe’s spokesperson George Charamba, noted yesterday it would be folly for the government to try and regulate how Zimbabweans use social media.

Granted, internet use needs serious policing to curb threats to national security and clampdown on criminal activities such as the distribution of pornographic materials as well as violation of children’s rights, regulating social media is a Stone Age phenomenon.

The government, instead of harnessing the opportunities brought about by information technology wants to stifle its proliferation to the detriment of citizens.

It is high time the government listened to the concerns of the electorate without resorting to draconian instruments to silence them.

Zimbabwe has many pressing needs that include aligning several laws with the country’s Constitution and legislation regulating the use of social media is not one of those priorities.

The Standard: 

 

« NSA Hackers Demand One Million Bitcoin
UK Army Goes High-Tech With Future Drones »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.