Thursday, March 14, 2013

Stifling human rights work, The impact of civil society legislation in Ethiopia (Amnesty)

The Charities and Societies law is debilitating us” Human rights organization staff member.

In practice, the law has had a devastating impact on human rights work in Ethiopia. Since the law was passed human rights organizations have decreased in number, many have changed the focus of their mandate, and those human rights organizations who have ‘survived’ have significantly scaled down their activities due to the major impact of funding restrictions. Offices have been closed, and large numbers of staff have lost their jobs.Development organizations have abandoned the ‘rights-based approach’ to development.  In restricting human rights organizations from doing their legitimate and essential work, the law has significantly affected the promotion and protection of the rights of the Ethiopian people. Civil society organizations are essential to upholding human rights, equality and justice at all levels of society, and to holding governments to account for their performance and adherence to national and international human rights commitments.
"Before the law was passed, HRCO were undertaking significant levels of human rights work across the country. For example, during 2008 HRCO investigators documented 9,000 reports of human rights abuse. Of these, 1,723 were further investigated and reports issued. These included 475 reports of unlawful detention, 435 reports of extra-judicial killings, and 201 reports of torture. Its mandated activities also included issuing three regular reports per year on ‘The Human Rights Situation in Ethiopia,’ and special reports from detailed investigations of specific issues. In 2008 HRCO issued the three regular reports, and six special reports on specific issues."

የስለላ ተግባርን ቀዳሚ አጀንዳ ያደረገው የወያኔ አገዛዝ የግንቦት7 ንቅናቄን መሰለሉ ተጋለጠ

ኢትዮጵያዊያንን አፍኖና ረግጦ አንድ ለአምስት በተሰኘ አደረጃጀት እስከቤተሰብ የወረደ የስለላ ተግባርን እየፈጸመ ያለው ዘረኛ የወያኔ አገዛዝ የግንቦት 7 ንቅናቄን መረጃ ለማግኘት ከፍተኛ የሆነ የስለላ ተግባር ሲፈጽም እንደቆየ ተቀማጭነቱ አውሮፓ የሆነ አንድ አለማቀፍ የሶፍት ዌር ኩባንያ አጋለጠ።
የወምበዴዎች ጥርቅም የሆነው የወያኔ አገዛዝ በስሩ ለዚሁ ተግባር ያቋቋመው ኢትዮ ቴሌኮም ፊን ሰፓይ በመባል የሚታወቀውን ሶፍትዌር በመጠቀም የግንቦት 7 ለፍትህ፣ ለነጻነትና ለዲሞክራሲ መረጃዎችን ሲሰልል መገኘቱን ያጋለጡት ሞርጋን ማርኩዊስ ቦሪ፣ ቢል ማርዛክ ፣ ክላውዲዮ ጋርኔሪ እና ጆን ስኮት በመባል የሚታወቁ ባለሙያዎች ሬይላተን ሲትዝን ላብ በተባለ ዌብሳይት ላይ ባወጡት ጽሑፍ ነው።
እነኝሁ ባለሙያዎች ፊን ስፓይ የግንቦት 7ትን መሪዎች ፎቶግራፍ ወደ ኮምፒዩተር ተጠቃሚዎች በመላክ መረጃዎችን ለኢትዮጵያ መንግስት ባለስልጣናት ለማቀበል መሞከሩን የገለጹ ሲሆን የግንቦት ሰባት ንቅናቄ ኢንተለጀንስ በበኩሉ ፣ የወያኔው አፋኝ አገዛዝ ከድርጅቱ መረጃዎችን ለመውሰድ ተደጋጋሚ ሙከራ ሲያደርግ እንደነበር መረጃዎች እንዳሉት አስታውቋል።
የድርጂቱ መረጃዎች ወደ አፋኙ አገዛዝ እጅ አለመግባታቸውን ያረጋገጠው የግንቦት ሰባት ንቅናቄ ድርጅቱ በስልጣን ላይ ካለው ዘረኛና አፋኝ የወያኔ አገዛዝ ጋር ከፍተኛ የሳይበር ጦርነት ሲያድረግ እንደነበር ም ታውቋል።
ፊን ስፓይ ወንጀለኞችን ለመያዝ ተብሎ የፍትህና የደህንነት ሰራተኞች እንዲጠቀሙበት በሚል መነሻ የተመረተ መሆኑ የሚታወቅ ሲሆን፣ እንደወያኔ አገዛዝ ያሉ አፋኝ መንግስታት ሶፍትዌሩን ተቃዋሚዎቻቸውን በስፋት ይጠቀሙበታል።

Ethiopia uses ginbot 7 pictures to plant spayware on computers

                                                                                                                           March 13, 2013
Authors: Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri, and John Scott-Railton.
This post describes the results of a comprehensive global Internet scan for the command and control servers of FinFisher’s surveillance software. It also details the discovery of a campaign using FinFisher in Ethiopia used to target individuals linked to an opposition group. Additionally, it provides examination of a FinSpy Mobile sample found in the wild, which appears to have been used in Vietnam.

Summary of Key Findings

  • We have found command and control servers for FinSpy backdoors, part of Gamma International’s FinFisher “remote monitoring solution,” in a total of 25 countries: Australia, Bahrain, Bangladesh, Brunei, Canada, Czech Republic, Estonia, Ethiopia, Germany, India, Indonesia, Japan, Latvia, Malaysia, Mexico, Mongolia, Netherlands, Qatar, Serbia, Singapore, Turkmenistan, United Arab Emirates, United Kingdom, United States, Vietnam.
  • A FinSpy campaign in Ethiopia uses pictures of Ginbot 7, an Ethiopian opposition group, as bait to infect users. This continues the theme of FinSpy deployments with strong indications of politically-motivated targeting.
  • There is strong evidence of a Vietnamese FinSpy Mobile Campaign. We found an Android FinSpy Mobile sample in the wild with a command & control server in Vietnam that also exfiltrates text messages to a local phone number.
  • These findings call into question claims by Gamma International that previously reported servers were not part of their product line, and that previously discovered copies of their software were either stolen or demo copies.

1. Background and Introduction

FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International GmbH. FinFisher products are marketed and sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.1 Although touted as a “lawful interception” suite for monitoring criminals, FinFisher has gained notoriety because it has been used in targeted attacks against human rights campaigners and opposition activists in countries with questionable human rights records.2
In late July 2012, we published the results of an investigation into a suspicious e-mail campaign targeting Bahraini activists.3 We analyzed the attachments and discovered that they contained the FinSpy spyware, FinFisher’s remote monitoring product. FinSpy captures information from an infected computer, such as passwords and Skype calls, and sends the information to a FinSpy command & control (C2) server. The attachments we analyzed sent data to a command & control server inside Bahrain.
This discovery motivated researchers to search for other command & control servers to understand how widely FinFisher might be used. Claudio Guarnieri at Rapid7 (one of the authors of this report) was the first to search for these servers. He fingerprinted the Bahrain server and looked at historical Internet scanning data to identify other servers around the world that responded to the same fingerprint. Rapid7 published this list of servers, and described their fingerprinting technique. Other groups, including CrowdStrike and SpiderLabs also analyzed and published reports on FinSpy.
Immediately after publication, the servers were apparently updated to evade detection by the Rapid7 fingerprint. We devised a different fingerprinting technique and scanned portions of the internet. We confirmed Rapid7’s results, and also found several new servers, including one inside Turkmenistan’s Ministry of Communications. We published our list of servers in late August 2012, in addition to an analysis of mobile phone versions of FinSpy. FinSpy servers were apparently updated again in October 2012 to disable this newer fingerprinting technique, although it was never publicly described.
Nevertheless, via analysis of existing samples and observation of command & control servers, we managed to enumerate yet more fingerprinting methods and continue our survey of the internet for this surveillance software. We describe the results in this post.
Civil society groups have found cause for concern in these findings,