Zimababwe Cyber Law Threatens Freedom of Expression

#ThisFlag

President Robert Mugabe’s government is under unprecedented pressure to deliver on its 2013 election promises, with protests by disgruntled Zimbabweans becoming a daily phenomenon.

The anger is more pronounced on social media platforms such as Facebook and Twitter, where fed-up citizens vent their anger over runaway corruption, unemployment and police brutality.

Pastor Evan Mawarire’s #ThisFlag movement successfully tapped into this anger before he was hounded out of the country through the familiar treason trump card used against Mugabe’s critics such as Dumiso Dabengwa, Ndabaningi Sithole, Morgan Tsvangirai, Welshman Ncube and Renson Gasela, among many others in the past.

Instead of listening to the issues raised by Mawarire and many other Zimbabweans, Mugabe and his ruling Zanu PF reacted with venom, labelling all critics enemies of the country.

In typical Zanu PF fashion, the critics were labelled cyber terrorists to deligitimise their cause and justify a government crackdown that would only help to concretise Zimbabwe’s image as a dictatorship.

Zimbabwe Defence Forces commander Constantino Chiwenga waded into the debate and claimed that Zimbabweans were waging cyber warfare against the government.

Chiwenga went on to threaten those who use social media to exercise their freedom of expression with unspecified action.

Information minister Christopher Mushohwe upped the ante, saying the government would not fold its hands while people violated the Constitution through social media.

State media dutifully amplified the government and the military voices, going to the extent of naming some Zimbabweans in the diaspora as cyber terrorists in typical lynch mob-style.

The government says it is now crafting a law to regulate social media in the wake of protests that have been mainly organised through the platforms.

The Computer and Cyber Crime Bill if passed into law would enable the government to demand the source of information of any content deemed to be in violation of the law.

Similar legislation has been used in the past to persecute government critics including the privately owned media through cooked up criminal cases that never stick in the courts. However, this time the government is fighting a losing battle. The Internet cannot be shut-down even by the most autocratic regimes especially by bankrupt ones.

As State media columnist Nathaniel Manheru, believed to be Mugabe’s spokesperson George Charamba, noted yesterday it would be folly for the government to try and regulate how Zimbabweans use social media.

Granted, internet use needs serious policing to curb threats to national security and clampdown on criminal activities such as the distribution of pornographic materials as well as violation of children’s rights, regulating social media is a Stone Age phenomenon.

The government, instead of harnessing the opportunities brought about by information technology wants to stifle its proliferation to the detriment of citizens.

It is high time the government listened to the concerns of the electorate without resorting to draconian instruments to silence them.

Zimbabwe has many pressing needs that include aligning several laws with the country’s Constitution and legislation regulating the use of social media is not one of those priorities.

The Standard: 

 

« NSA Hackers Demand One Million Bitcoin
UK Army Goes High-Tech With Future Drones »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

National Institute of Standards & Technology (NIST) - USA

National Institute of Standards & Technology (NIST) - USA

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

Beauceron Security

Beauceron Security

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours.

Scarlett Cybersecurity

Scarlett Cybersecurity

Scarlett Cybersecurity provide cybersecurity services to US private and public organizations with specific emphasis on compliance and cybersecurity incident prevention, detection, and response.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Softcell Technologies Global

Softcell Technologies Global

Softcell is one of India's leading System Integrators. We serve enterprise customers in the areas of IT Security, Mobility, Optimised IT Infrastructure, Cloud and Engineering Services.